<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: palo alto networks configuration in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-networks-configuration/m-p/65437#M39078</link>
    <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Here's a couple of things you can check to make sure everything is set up properly&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;from the CLI, check if you can see all relevant mac addresses:&lt;/P&gt;
&lt;P&gt;&amp;gt; show arp all&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;verify if your routing is configured properly (you'll need a default gateway)&lt;/P&gt;
&lt;P&gt;&amp;gt;show routing route&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;make sure all interfaces have been configured with the proper IP/subnet&lt;/P&gt;
&lt;P&gt;&amp;gt;show interface all&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;make sure all hosts can be reached on the connected interface:&lt;/P&gt;
&lt;P&gt;&amp;gt;ping source &amp;lt;trust_interface_IP&amp;gt; host &amp;lt;internal_client_IP&amp;gt;&lt;/P&gt;
&lt;P&gt;&amp;gt;ping source &amp;lt;untrust_interface_IP&amp;gt; host &amp;lt;internet_router_IP&amp;gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;see if you can reach the internet from the untrust interface:&lt;/P&gt;
&lt;P&gt;&amp;gt;ping source &amp;lt;untrust_interface_IP&amp;gt; host 4.2.2.2&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;and lastly from the trust interface:&lt;/P&gt;
&lt;P&gt;&amp;gt;ping source &amp;lt;trust_interface_IP&amp;gt; host 4.2.2.2&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;you can start a session from a host in the trust zone and then check the sessions being created&lt;/P&gt;
&lt;P&gt;&amp;gt; show session all&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;it should look something like this:&lt;/P&gt;
&lt;PRE&gt;--------------------------------------------------------------------------------
ID          Application    State   Type Flag  Src[Sport]/Zone/Proto (translated IP[Port])
Vsys                                          Dst[Dport]/Zone (translated IP[Port])
--------------------------------------------------------------------------------
24795        ping           ACTIVE  FLOW  NS   192.168.0.21[512]/trust/1  (198.51.100.230[512])
vsys1                                          4.2.2.2[33024]/untrust  (4.2.2.2[33024])
24796        ping           ACTIVE  FLOW  NS   192.168.0.21[512]/trust/1  (198.51.100.230[512])
vsys1                                          4.2.2.2[33280]/untrust  (4.2.2.2[33280])
&lt;/PRE&gt;
&lt;P&gt;then verify a session's parameters&lt;/P&gt;
&lt;P&gt;&amp;gt;show session id &amp;lt;id#&amp;gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;Session           24795

        c2s flow:
                source:      192.168.0.21 [trust]
                dst:         4.2.2.2
                proto:       1
                sport:       512             dport:      33024
                state:       INIT            type:       FLOW
                src user:    unknown
                dst user:    unknown

        s2c flow:
                source:      4.2.2.2 [untrust]
                dst:         198.51.100.230
                proto:       1
                sport:       33024           dport:      512
                state:       INIT            type:       FLOW
                src user:    unknown
                dst user:    unknown

        start time                           : Mon Oct  5 09:38:48 2015
        timeout                              : 6 sec
&lt;/PRE&gt;
&lt;P&gt;Please note the difference between the c2s and s2c flows&lt;/P&gt;
&lt;P&gt;You'll see that c2s has source ip 192.168.0.21, which is my internal IP, where the s2c flow has destination 198.51.100.230, which is my NAT address, this will show you if NAT is being applied properly&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;hope this helps you get started, please let us know if this helps&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Tom&lt;/P&gt;</description>
    <pubDate>Mon, 05 Oct 2015 07:43:43 GMT</pubDate>
    <dc:creator>reaper</dc:creator>
    <dc:date>2015-10-05T07:43:43Z</dc:date>
    <item>
      <title>palo alto networks configuration</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-networks-configuration/m-p/65429#M39071</link>
      <description>&lt;P&gt;hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I configured a PA-500 with routing mode in our company . I set the zone , the security rules , the nat rules . I allow all traffic from trust zone to untrust zone. But the problem there is no internet connection. We use a DNS server , that is in trust zone.&lt;/P&gt;&lt;P&gt;I add a security role from untrust zone to a trust zone (with addressof DNS server) but the problem always we don't hav the internet connection in the office &amp;nbsp;. I process all the steps of the administraion guide of PAN in my configuration but always i have the same issue!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any one can help me pleaseto resolve this problem&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 04 Oct 2015 23:46:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-networks-configuration/m-p/65429#M39071</guid>
      <dc:creator>RCHAIBI</dc:creator>
      <dc:date>2015-10-04T23:46:48Z</dc:date>
    </item>
    <item>
      <title>Re: palo alto networks configuration</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-networks-configuration/m-p/65437#M39078</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Here's a couple of things you can check to make sure everything is set up properly&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;from the CLI, check if you can see all relevant mac addresses:&lt;/P&gt;
&lt;P&gt;&amp;gt; show arp all&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;verify if your routing is configured properly (you'll need a default gateway)&lt;/P&gt;
&lt;P&gt;&amp;gt;show routing route&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;make sure all interfaces have been configured with the proper IP/subnet&lt;/P&gt;
&lt;P&gt;&amp;gt;show interface all&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;make sure all hosts can be reached on the connected interface:&lt;/P&gt;
&lt;P&gt;&amp;gt;ping source &amp;lt;trust_interface_IP&amp;gt; host &amp;lt;internal_client_IP&amp;gt;&lt;/P&gt;
&lt;P&gt;&amp;gt;ping source &amp;lt;untrust_interface_IP&amp;gt; host &amp;lt;internet_router_IP&amp;gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;see if you can reach the internet from the untrust interface:&lt;/P&gt;
&lt;P&gt;&amp;gt;ping source &amp;lt;untrust_interface_IP&amp;gt; host 4.2.2.2&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;and lastly from the trust interface:&lt;/P&gt;
&lt;P&gt;&amp;gt;ping source &amp;lt;trust_interface_IP&amp;gt; host 4.2.2.2&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;you can start a session from a host in the trust zone and then check the sessions being created&lt;/P&gt;
&lt;P&gt;&amp;gt; show session all&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;it should look something like this:&lt;/P&gt;
&lt;PRE&gt;--------------------------------------------------------------------------------
ID          Application    State   Type Flag  Src[Sport]/Zone/Proto (translated IP[Port])
Vsys                                          Dst[Dport]/Zone (translated IP[Port])
--------------------------------------------------------------------------------
24795        ping           ACTIVE  FLOW  NS   192.168.0.21[512]/trust/1  (198.51.100.230[512])
vsys1                                          4.2.2.2[33024]/untrust  (4.2.2.2[33024])
24796        ping           ACTIVE  FLOW  NS   192.168.0.21[512]/trust/1  (198.51.100.230[512])
vsys1                                          4.2.2.2[33280]/untrust  (4.2.2.2[33280])
&lt;/PRE&gt;
&lt;P&gt;then verify a session's parameters&lt;/P&gt;
&lt;P&gt;&amp;gt;show session id &amp;lt;id#&amp;gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;Session           24795

        c2s flow:
                source:      192.168.0.21 [trust]
                dst:         4.2.2.2
                proto:       1
                sport:       512             dport:      33024
                state:       INIT            type:       FLOW
                src user:    unknown
                dst user:    unknown

        s2c flow:
                source:      4.2.2.2 [untrust]
                dst:         198.51.100.230
                proto:       1
                sport:       33024           dport:      512
                state:       INIT            type:       FLOW
                src user:    unknown
                dst user:    unknown

        start time                           : Mon Oct  5 09:38:48 2015
        timeout                              : 6 sec
&lt;/PRE&gt;
&lt;P&gt;Please note the difference between the c2s and s2c flows&lt;/P&gt;
&lt;P&gt;You'll see that c2s has source ip 192.168.0.21, which is my internal IP, where the s2c flow has destination 198.51.100.230, which is my NAT address, this will show you if NAT is being applied properly&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;hope this helps you get started, please let us know if this helps&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Tom&lt;/P&gt;</description>
      <pubDate>Mon, 05 Oct 2015 07:43:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-networks-configuration/m-p/65437#M39078</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2015-10-05T07:43:43Z</dc:date>
    </item>
  </channel>
</rss>

