<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Source and Destination NAT at the same time in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/source-and-destination-nat-at-the-same-time/m-p/51659#M38004</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Amit,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;FW-Extrn has dynamic IP address which might cause the issue here. Assuming it has static ip say 4.5.6.7, you can configure following NAT :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Untrust to Untrust if source address is 4.5.6.7 and destination is 1.2.3.4 translate source (dynamic ip-and port to interface e1/1 192.168.1.5) and destination to 192.168.1.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But since source address keeps on changing and it is the one which initiates vpn traffic, inbound NAT cannot be configured as desired. Hope this helps. Thank you.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 04 Nov 2014 13:13:49 GMT</pubDate>
    <dc:creator>ssharma</dc:creator>
    <dc:date>2014-11-04T13:13:49Z</dc:date>
    <item>
      <title>Source and Destination NAT at the same time</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/source-and-destination-nat-at-the-same-time/m-p/51658#M38003</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hallo&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Before going to my question, please assume the following scenario:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There is a Non-Palo Alto Firewall in internet (lets call it FW-Extern). There is another Non Palo Alto Firewall inside my network (lets call it FW-intern). The FW-Extern initiates IPSec VPN to FW-Intern. The VPN connections are always initiated by the FW-Extern in the direction of FW-Intern on the public IP of FW-Intern.&lt;/P&gt;&lt;P&gt;Now, I put a Palo Alto Firewall (lets call it PA-FW) between these two Non Palo Alto Firewalls. The PA-FW, should allow all this IPSec traffic between these two Non Palo Alto firewalls. The VPN tunnel should NOT terminate on PA-FW.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The FW-Extern has a Dynamic Public IP.&lt;/P&gt;&lt;P&gt;The FW-Intern, has a public IP address (lets say, for example, 1.2.3.4) and a private IP address (lets, say, for example, 192.168.1.1).&lt;/P&gt;&lt;P&gt;So when PA-FW, receives the connection for the IP 1.2.3.4, it performs destination NAT and changes the destination IP to 192.168.1.1.&lt;/P&gt;&lt;P&gt;Note that the PA-FW has an interface called e1/1, which is connected to the FW-Intern and that interface on PA-FW has an IP of 192.168.1.5.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Question:&lt;/P&gt;&lt;P&gt;Now there is a new requirement that when the PA-FW forwards packets to FW-Intern, then the PA-FW should also do Source Address Translation and change the source address to 192.168.1.5. (which is of its interface) &lt;/P&gt;&lt;P&gt;This means that the FW-Intern should talk only to PA-FW, and the FW-Intern has no idea about any external world.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How should the NAT, Security Policy and Routing for such a scenario configured?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Nov 2014 11:58:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/source-and-destination-nat-at-the-same-time/m-p/51658#M38003</guid>
      <dc:creator>Neo.The.One</dc:creator>
      <dc:date>2014-11-04T11:58:01Z</dc:date>
    </item>
    <item>
      <title>Re: Source and Destination NAT at the same time</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/source-and-destination-nat-at-the-same-time/m-p/51659#M38004</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Amit,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;FW-Extrn has dynamic IP address which might cause the issue here. Assuming it has static ip say 4.5.6.7, you can configure following NAT :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Untrust to Untrust if source address is 4.5.6.7 and destination is 1.2.3.4 translate source (dynamic ip-and port to interface e1/1 192.168.1.5) and destination to 192.168.1.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But since source address keeps on changing and it is the one which initiates vpn traffic, inbound NAT cannot be configured as desired. Hope this helps. Thank you.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Nov 2014 13:13:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/source-and-destination-nat-at-the-same-time/m-p/51659#M38004</guid>
      <dc:creator>ssharma</dc:creator>
      <dc:date>2014-11-04T13:13:49Z</dc:date>
    </item>
    <item>
      <title>Re: Source and Destination NAT at the same time</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/source-and-destination-nat-at-the-same-time/m-p/51660#M38005</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Amit,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As per my understanding from the above explanation, while PAN-FW will pass that traffic to FW-Intern it will be look like:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Source Address: 192.168.1.5&lt;/P&gt;&lt;P&gt;Destination Address: 192.168.1.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;Lets&lt;/SPAN&gt; assume, PA connected with FW-Extern through "UNTRUST: security zone and ethernet-1/1 connected with FW-Intern is TRUST zone.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You should configure the NAT as:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From zone UNTRUST&lt;/P&gt;&lt;P&gt;To zone UNTRUST&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="NAT-Amit.jpg" class="image-0 jive-image" height="79" src="https://live.paloaltonetworks.com/legacyfs/online/16723_NAT-Amit.jpg" style="height: 79px; width: 1064.78260869565px;" width="1065" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Nov 2014 13:20:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/source-and-destination-nat-at-the-same-time/m-p/51660#M38005</guid>
      <dc:creator>HULK</dc:creator>
      <dc:date>2014-11-04T13:20:43Z</dc:date>
    </item>
    <item>
      <title>Re: Source and Destination NAT at the same time</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/source-and-destination-nat-at-the-same-time/m-p/51661#M38006</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Hulk,&lt;/P&gt;&lt;P&gt;Thanks for your reply!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is exactly what I have done. However this is not working. The connection seems to go to the FW-Intern, but the return traffic is the problem!&lt;/P&gt;&lt;P&gt;How about Routing and Security Policies?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Nov 2014 13:29:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/source-and-destination-nat-at-the-same-time/m-p/51661#M38006</guid>
      <dc:creator>Neo.The.One</dc:creator>
      <dc:date>2014-11-04T13:29:09Z</dc:date>
    </item>
    <item>
      <title>Re: Source and Destination NAT at the same time</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/source-and-destination-nat-at-the-same-time/m-p/51662#M38007</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Amit,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;gt; You will also have to enable NAT-Traversal on both FW-Intern and FW-&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;Extern&lt;/SPAN&gt; firewalls, sine the packet is getting NAT'd in the path. &lt;/P&gt;&lt;P&gt;&amp;gt; The FW-Extern always should be the VPN initiator.&lt;/P&gt;&lt;P&gt;&amp;gt; &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;VPN&lt;/SPAN&gt; should be configured in aggressive mode.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Nov 2014 13:29:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/source-and-destination-nat-at-the-same-time/m-p/51662#M38007</guid>
      <dc:creator>HULK</dc:creator>
      <dc:date>2014-11-04T13:29:42Z</dc:date>
    </item>
    <item>
      <title>Re: Source and Destination NAT at the same time</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/source-and-destination-nat-at-the-same-time/m-p/51663#M38008</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello AMit,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Routing is not required in your FW-Intern, since, source and destination belongs to the same subnet, instead it will do an ARP lookup to send traffic back to PA-FW. In PAN FW, you may try to configure a policy as:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Source zone: Untrust&lt;/P&gt;&lt;P&gt;Destination Zone: Trust &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;( &lt;/SPAN&gt;ethernet-1/1)&lt;/P&gt;&lt;P&gt;Destination address: 1.2.3.4&lt;/P&gt;&lt;P&gt;Application -ANY&lt;/P&gt;&lt;P&gt;Service- AN&lt;/P&gt;&lt;P&gt;Action- allow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Before initiating the VPN, &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;i&lt;/SPAN&gt; would suggest you to check the normal connectivity between PA-Extern and PA-Intern through PING.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Nov 2014 13:36:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/source-and-destination-nat-at-the-same-time/m-p/51663#M38008</guid>
      <dc:creator>HULK</dc:creator>
      <dc:date>2014-11-04T13:36:27Z</dc:date>
    </item>
    <item>
      <title>Re: Source and Destination NAT at the same time</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/source-and-destination-nat-at-the-same-time/m-p/51664#M38009</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Amit,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your security policy should say from Untrust to Trust to destination 1.2.3.4 allow. Your routing should be good as you have a host route already for interface E1/1 and a default route of 0.0.0.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Next step would be to do a pcap for the traffic in question and see if anything is getting drop.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Nov 2014 13:37:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/source-and-destination-nat-at-the-same-time/m-p/51664#M38009</guid>
      <dc:creator>ssharma</dc:creator>
      <dc:date>2014-11-04T13:37:55Z</dc:date>
    </item>
    <item>
      <title>Re: Source and Destination NAT at the same time</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/source-and-destination-nat-at-the-same-time/m-p/51665#M38010</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Amit,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;During the connectivity check, you may follow the session details to ensure NAT, policy lookup is happening in PAN firewall correctly.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;&lt;SPAN style="font-weight: inherit; font-style: inherit; font-size: 10pt; font-family: inherit;"&gt;Please check the real time session in the CLI by using 'show session all filter &lt;/SPAN&gt;&lt;SPAN style="font-weight: inherit; font-style: inherit; font-size: 10pt; font-family: inherit;"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark" style="font-weight: inherit; font-style: inherit; font-family: inherit;"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;source&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN style="font-weight: inherit; font-style: inherit; font-size: 10pt; font-family: inherit;"&gt; IP_ADD_OF_THE_FW-Extern destination IP_ADD_OF_THE_DESTINATION'.&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;&lt;SPAN style="font-weight: inherit; font-style: inherit; font-size: 10pt; font-family: inherit;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;&lt;SPAN style="font-weight: inherit; font-style: inherit; font-size: 10pt; font-family: inherit;"&gt;&amp;gt;&amp;nbsp; If there is &lt;SPAN class="GINGER_SOFTWARE_mark" style="font-weight: inherit; font-style: inherit; font-family: inherit;"&gt;a&lt;/SPAN&gt; session exist for the same traffic,&amp;nbsp; then please &lt;SPAN style="font-weight: inherit; font-style: inherit; font-family: inherit;"&gt;apply&amp;nbsp; CLI command PAN&amp;gt; show session id XYZ&amp;nbsp;&amp;nbsp; &amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt; to get detailed information about that session, &lt;/SPAN&gt;&lt;SPAN class="GINGER_SOFTWARE_mark" style="font-weight: inherit; font-style: inherit; font-family: inherit;"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark" style="font-weight: inherit; font-style: inherit; font-family: inherit;"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark" style="font-weight: inherit; font-style: inherit; font-family: inherit;"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;i.e&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN style="font-weight: inherit; font-style: inherit; font-family: inherit;"&gt; NAT rule, security rule, ingress/egress interface etc.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;&lt;SPAN style="font-size: 10pt; font-style: inherit; font-family: inherit; font-weight: inherit;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;&lt;SPAN style="font-size: 10pt; font-style: inherit; font-family: inherit; font-weight: inherit;"&gt;Hope this helps.&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;&lt;SPAN style="font-size: 10pt; font-style: inherit; font-family: inherit; font-weight: inherit;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;&lt;SPAN style="font-size: 10pt; font-style: inherit; font-family: inherit; font-weight: inherit;"&gt;Thanks&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Nov 2014 13:51:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/source-and-destination-nat-at-the-same-time/m-p/51665#M38010</guid>
      <dc:creator>HULK</dc:creator>
      <dc:date>2014-11-04T13:51:29Z</dc:date>
    </item>
    <item>
      <title>Re: Source and Destination NAT at the same time</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/source-and-destination-nat-at-the-same-time/m-p/51666#M38011</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your replies.&lt;/P&gt;&lt;P&gt;As suggested by all, the security policy and routing are in place. However still stuff does not work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/u1/19491"&gt;HULK&lt;/A&gt; : In the command &lt;SPAN style="font-weight: inherit; font-style: inherit; font-size: 10pt; font-family: inherit; color: #3b3b3b; background-color: #f6f6f6;"&gt;show session all filter &lt;/SPAN&gt;&lt;SPAN style="font-weight: inherit; font-style: inherit; font-size: 10pt; font-family: inherit; color: #3b3b3b; background-color: #f6f6f6;"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark" style="font-weight: inherit; font-style: inherit; font-family: inherit;"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark" style="font-weight: inherit; font-style: inherit; font-family: inherit;"&gt;source&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN style="font-weight: inherit; font-style: inherit; font-size: 10pt; font-family: inherit; color: #3b3b3b; background-color: #f6f6f6;"&gt; IP_ADD_OF_THE_FW-Extern, the problem is that &lt;SPAN style="color: #3b3b3b; background-color: #f6f6f6;"&gt;IP_ADD_OF_THE_FW-Extern is dynamic and unknown.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-style: inherit; font-size: 10pt; background-color: #f6f6f6; font-family: inherit; font-weight: inherit;"&gt;Moreover, I cannot administer Non Palo Alto Firewalls and so I cannot ping between the 2.&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Nov 2014 14:34:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/source-and-destination-nat-at-the-same-time/m-p/51666#M38011</guid>
      <dc:creator>Neo.The.One</dc:creator>
      <dc:date>2014-11-04T14:34:15Z</dc:date>
    </item>
    <item>
      <title>Re: Source and Destination NAT at the same time</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/source-and-destination-nat-at-the-same-time/m-p/51667#M38012</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Amit,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It is not necessary to track the session based on both source and destination address. You may &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;track&lt;/SPAN&gt; it based on &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;only destination address&lt;/SPAN&gt;, port 500 /4500, protocol-&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;ike&lt;/SPAN&gt; etc.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Nov 2014 14:43:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/source-and-destination-nat-at-the-same-time/m-p/51667#M38012</guid>
      <dc:creator>HULK</dc:creator>
      <dc:date>2014-11-04T14:43:18Z</dc:date>
    </item>
    <item>
      <title>Re: Source and Destination NAT at the same time</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/source-and-destination-nat-at-the-same-time/m-p/51668#M38013</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Amit,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Like &lt;A href="https://live.paloaltonetworks.com/u1/19491"&gt;HULK&lt;/A&gt; suggested , you can only look for destination &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;show session all filter destination 1.2.3.4&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This should give you ike and ipsec application in the session information and you can look for source address is there. I assume, these source will be there for another hour or 2 at least. In the mean time you can run pcap capture to see if firewall is dropping anything. If not, you can explore other avenues for troubleshooting. Hope this helps. Thank you.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Nov 2014 14:47:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/source-and-destination-nat-at-the-same-time/m-p/51668#M38013</guid>
      <dc:creator>ssharma</dc:creator>
      <dc:date>2014-11-04T14:47:26Z</dc:date>
    </item>
  </channel>
</rss>

