<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Help required to convert Cisco ASA NAT rule onto Palo Alto in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/help-required-to-convert-cisco-asa-nat-rule-onto-palo-alto/m-p/6633#M4851</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Roland,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I did know there was a migration tool and it does not convert the NAT rules is what I got to know.&amp;nbsp; Secondly, I am not a CNSE qualified yet so might not have access to the tool is what I got to know.&amp;nbsp; Am I correct?&amp;nbsp; If not is there any way to get it sorted out?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;&lt;P&gt;Kal&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 23 Feb 2012 13:44:52 GMT</pubDate>
    <dc:creator>kalyanram.piratla</dc:creator>
    <dc:date>2012-02-23T13:44:52Z</dc:date>
    <item>
      <title>Help required to convert Cisco ASA NAT rule onto Palo Alto</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/help-required-to-convert-cisco-asa-nat-rule-onto-palo-alto/m-p/6628#M4846</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Guys,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am not expert in reading or understanding the Cisco ASA NAT rules and I have just started to feel comfortable with Palo Alto except for NAT rules.&amp;nbsp; Can someone please guide me through on how to go around configuring the following Cisco ASA NAT rule onto the Palo Alto?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have just taken a couple of rules to convert.&amp;nbsp; Based on this, I would get the rest done on my own.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Following are the CISCO ASA NAT RULEs:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rule 1 # access-list inside_nat0_outbound extended permit ip 10.1.2.0 255.255.255.0 10.1.250.128 255.255.255.128 &lt;/P&gt;&lt;P&gt;Rule 2 # access-list inside_nat0_outbound extended permit ip EH_Staff_Network 255.255.255.0 10.1.250.128 255.255.255.128&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I know the exact rule cannot be expalined, but an overview on how to re-configure the above rules will be very helpful.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Many Thanks in Advance.&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Kal&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 22 Feb 2012 10:56:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/help-required-to-convert-cisco-asa-nat-rule-onto-palo-alto/m-p/6628#M4846</guid>
      <dc:creator>kalyanram.piratla</dc:creator>
      <dc:date>2012-02-22T10:56:53Z</dc:date>
    </item>
    <item>
      <title>Re: Help required to convert Cisco ASA NAT rule onto Palo Alto</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/help-required-to-convert-cisco-asa-nat-rule-onto-palo-alto/m-p/6629#M4847</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Kal,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;with my limited ASA knowledge I would say your sample code does not look like a NAT rule it looks like an ACL security rule.&lt;/P&gt;&lt;P&gt;This site might be a starting point for you to understand the cisco config:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.tech21century.com/access-lists-and-nat-on-cisco-asa-firewalls-some-clarifications/"&gt;http://www.tech21century.com/access-lists-and-nat-on-cisco-asa-firewalls-some-clarifications/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;rgds Roland&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 22 Feb 2012 18:39:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/help-required-to-convert-cisco-asa-nat-rule-onto-palo-alto/m-p/6629#M4847</guid>
      <dc:creator>gafrol</dc:creator>
      <dc:date>2012-02-22T18:39:31Z</dc:date>
    </item>
    <item>
      <title>Re: Help required to convert Cisco ASA NAT rule onto Palo Alto</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/help-required-to-convert-cisco-asa-nat-rule-onto-palo-alto/m-p/6630#M4848</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Look to me like that is the ACL that dictates what is allowed to be NAT'd outbound.&amp;nbsp; The actuall NAT rule is setup with the command nat syntax below&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;xxxx(config)# nat ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;configure mode commands/options:&lt;BR /&gt;&amp;nbsp; (&amp;nbsp; Open parenthesis for the name of the network interface where the&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; hosts/network designated by the local IP address are accessed&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 22 Feb 2012 19:07:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/help-required-to-convert-cisco-asa-nat-rule-onto-palo-alto/m-p/6630#M4848</guid>
      <dc:creator>migration</dc:creator>
      <dc:date>2012-02-22T19:07:43Z</dc:date>
    </item>
    <item>
      <title>Re: Help required to convert Cisco ASA NAT rule onto Palo Alto</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/help-required-to-convert-cisco-asa-nat-rule-onto-palo-alto/m-p/6631#M4849</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you for the web link.&amp;nbsp; Will look into it, find out more relevant stuff and then come back to you guys.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers Guys.. Very Kind of you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Kal&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 Feb 2012 13:03:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/help-required-to-convert-cisco-asa-nat-rule-onto-palo-alto/m-p/6631#M4849</guid>
      <dc:creator>kalyanram.piratla</dc:creator>
      <dc:date>2012-02-23T13:03:36Z</dc:date>
    </item>
    <item>
      <title>Re: Help required to convert Cisco ASA NAT rule onto Palo Alto</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/help-required-to-convert-cisco-asa-nat-rule-onto-palo-alto/m-p/6632#M4850</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Kal just to let you know if you are not already aware of there is a migration tool.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="2664" alt="Download.png" class="jive-image-thumbnail jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/2664_Download.png" width="450" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This tool can migrate a Cisco config to a PA config.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;More info &lt;A href="http://www.securlabs.net/"&gt;http://www.securlabs.net/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;rgds Roland&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 Feb 2012 13:36:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/help-required-to-convert-cisco-asa-nat-rule-onto-palo-alto/m-p/6632#M4850</guid>
      <dc:creator>gafrol</dc:creator>
      <dc:date>2012-02-23T13:36:01Z</dc:date>
    </item>
    <item>
      <title>Re: Help required to convert Cisco ASA NAT rule onto Palo Alto</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/help-required-to-convert-cisco-asa-nat-rule-onto-palo-alto/m-p/6633#M4851</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Roland,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I did know there was a migration tool and it does not convert the NAT rules is what I got to know.&amp;nbsp; Secondly, I am not a CNSE qualified yet so might not have access to the tool is what I got to know.&amp;nbsp; Am I correct?&amp;nbsp; If not is there any way to get it sorted out?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;&lt;P&gt;Kal&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 Feb 2012 13:44:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/help-required-to-convert-cisco-asa-nat-rule-onto-palo-alto/m-p/6633#M4851</guid>
      <dc:creator>kalyanram.piratla</dc:creator>
      <dc:date>2012-02-23T13:44:52Z</dc:date>
    </item>
    <item>
      <title>Re: Help required to convert Cisco ASA NAT rule onto Palo Alto</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/help-required-to-convert-cisco-asa-nat-rule-onto-palo-alto/m-p/6634#M4852</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Kal,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;everybody can use the migration tool just follow this link:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.securlabs.net/"&gt;http://www.securlabs.net/&lt;/A&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Yes you are right&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;Doesn't Convert VPN and Nat Rules&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;rgds Roland&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 Feb 2012 13:46:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/help-required-to-convert-cisco-asa-nat-rule-onto-palo-alto/m-p/6634#M4852</guid>
      <dc:creator>gafrol</dc:creator>
      <dc:date>2012-02-23T13:46:16Z</dc:date>
    </item>
    <item>
      <title>Re: Help required to convert Cisco ASA NAT rule onto Palo Alto</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/help-required-to-convert-cisco-asa-nat-rule-onto-palo-alto/m-p/6635#M4853</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://live.paloaltonetworks.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt; that is exactly where i was stuck.&amp;nbsp; Unfortunately, I do not feel very comfortable with configuring the NAT rules of PAN even though I understand them theoritically.&amp;nbsp; Hence was asking for help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Out of the cisco config, I could only find 3 these rules that state NAT:&amp;nbsp; (do they make sense)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list inside_nat0_outbound&lt;/P&gt;&lt;P&gt;nat (inside) 1 10.0.0.0 255.0.0.0&lt;/P&gt;&lt;P&gt;nat (dmz) 1 172.16.50.0 255.255.255.0&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 Feb 2012 17:00:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/help-required-to-convert-cisco-asa-nat-rule-onto-palo-alto/m-p/6635#M4853</guid>
      <dc:creator>kalyanram.piratla</dc:creator>
      <dc:date>2012-02-23T17:00:41Z</dc:date>
    </item>
    <item>
      <title>Re: Help required to convert Cisco ASA NAT rule onto Palo Alto</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/help-required-to-convert-cisco-asa-nat-rule-onto-palo-alto/m-p/6636#M4854</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Kalyanram,&lt;/P&gt;&lt;P&gt;Here you go...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list inside_nat0_outbound&lt;/P&gt;&lt;P&gt;This statement is a no-nat rule.&amp;nbsp; Traffic that arriving on the interface "inside" that matches the ACL "inside_nat0_outbound" is not natted.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (inside) 1 10.0.0.0 255.0.0.0&lt;/P&gt;&lt;P&gt;This statement does a hide nat for all traffic arriving on the interface "inside" that comes from 10.0.0.0/8.&amp;nbsp; It will hide it behind the global nat address that corresponds to ID 1, and the correct outgoing interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;nat (dmz) 1 172.16.50.0 255.255.255.0&lt;/P&gt;&lt;P&gt;This statement (you guessed it!) does a hide nat for all traffic arriving on your "dmz" interface that comes from 172.16.50.0/24.&amp;nbsp; It nats behind the same global statements as the prior rule.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you post (or PM me) the output of "show run | in global" and "show run | in static", I can explain the rest of the rules for you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The nat rulebase in your PAN should do the same thing... one rule from inside to outside that does not nat (matching that ACL), and one that does nat (you can create a single rule that handles traffic from both your dmz and inside zones).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH,&lt;/P&gt;&lt;P&gt;James&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 Feb 2012 23:12:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/help-required-to-convert-cisco-asa-nat-rule-onto-palo-alto/m-p/6636#M4854</guid>
      <dc:creator>jhansf5</dc:creator>
      <dc:date>2012-02-23T23:12:53Z</dc:date>
    </item>
    <item>
      <title>Re: Help required to convert Cisco ASA NAT rule onto Palo Alto</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/help-required-to-convert-cisco-asa-nat-rule-onto-palo-alto/m-p/6637#M4855</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;James,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you for the explanation.&amp;nbsp; I will be going on site to do the migration for the customer.&amp;nbsp; If any thing goes wrong in terms of NAT rules, I will post (or PM you).&amp;nbsp; Thank you once again for your help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Kal&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 24 Feb 2012 16:20:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/help-required-to-convert-cisco-asa-nat-rule-onto-palo-alto/m-p/6637#M4855</guid>
      <dc:creator>kalyanram.piratla</dc:creator>
      <dc:date>2012-02-24T16:20:26Z</dc:date>
    </item>
    <item>
      <title>Re: Help required to convert Cisco ASA NAT rule onto Palo Alto</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/help-required-to-convert-cisco-asa-nat-rule-onto-palo-alto/m-p/6638#M4856</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P class="MsoNormal"&gt;The &lt;A href="http://www.securlabs.net"&gt;www.securlabs.net&lt;/A&gt; website is not affiliated with, endorsed or supported by Palo Alto Networks. Use of the site is at your own discretion and risk.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 Feb 2012 19:31:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/help-required-to-convert-cisco-asa-nat-rule-onto-palo-alto/m-p/6638#M4856</guid>
      <dc:creator>panagent</dc:creator>
      <dc:date>2012-02-28T19:31:34Z</dc:date>
    </item>
    <item>
      <title>Re: Help required to convert Cisco ASA NAT rule onto Palo Alto</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/help-required-to-convert-cisco-asa-nat-rule-onto-palo-alto/m-p/6639#M4857</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;James,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This installation has been a disaster for me.&amp;nbsp; Just could not understand how the Cisco ASA works in terms of VPN and NAT.&amp;nbsp; Hence, i had to pull back and leave the network as it is.&amp;nbsp; &lt;img id="smileysad" class="emoticon emoticon-smileysad" src="https://live.paloaltonetworks.com/i/smilies/16x16_smiley-sad.png" alt="Smiley Sad" title="Smiley Sad" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Mar 2012 13:45:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/help-required-to-convert-cisco-asa-nat-rule-onto-palo-alto/m-p/6639#M4857</guid>
      <dc:creator>kalyanram.piratla</dc:creator>
      <dc:date>2012-03-01T13:45:50Z</dc:date>
    </item>
    <item>
      <title>Re: Help required to convert Cisco ASA NAT rule onto Palo Alto</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/help-required-to-convert-cisco-asa-nat-rule-onto-palo-alto/m-p/6640#M4858</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Issues I had faced were:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P class="MsoListParagraph" style="margin-left:72.0pt;text-indent:-18.0pt; mso-list:l0 level2 lfo1"&gt;&lt;SPAN style="font-size:11.0pt; font-family:&amp;amp;quot;Calibri&amp;amp;quot;,&amp;amp;quot;sans-serif&amp;amp;quot;;mso-fareast-font-family:Calibri;color:#1F497D"&gt;a.&lt;SPAN style="font-family: 'Times New Roman'; font-size: 7pt; "&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size:11.0pt;font-family:&amp;amp;quot;Calibri&amp;amp;quot;,&amp;amp;quot;sans-serif&amp;amp;quot;; color:#1F497D"&gt;We could access the Internet &lt;/SPAN&gt;&lt;STRONG style=": ; color: red; font-size: 11.0pt; sans-serif&amp;amp;quot: ; font-family: &amp;amp;quot; ,&amp;amp;quot: ; Calibri&amp;amp;quot: ; "&gt;ONLY IF&lt;/STRONG&gt;&lt;SPAN style="font-size:11.0pt;font-family:&amp;amp;quot;Calibri&amp;amp;quot;,&amp;amp;quot;sans-serif&amp;amp;quot;;color:red"&gt; &lt;/SPAN&gt;&lt;SPAN style="font-size:11.0pt;font-family:&amp;amp;quot;Calibri&amp;amp;quot;,&amp;amp;quot;sans-serif&amp;amp;quot;;color:#1F497D"&gt;the Proxy settings were enabled on the web-browser ( The settings for proxy were; IP address set to 10.1.30.8 on port 8080).&amp;nbsp; If the proxy settings were disabled, we &lt;/SPAN&gt;&lt;STRONG style=": ; color: red; font-size: 11.0pt; sans-serif&amp;amp;quot: ; font-family: &amp;amp;quot; ,&amp;amp;quot: ; Calibri&amp;amp;quot: ; "&gt;COULD NOT&lt;/STRONG&gt;&lt;SPAN style="font-size:11.0pt;font-family:&amp;amp;quot;Calibri&amp;amp;quot;,&amp;amp;quot;sans-serif&amp;amp;quot;; color:#1F497D"&gt; access the Internet.&amp;nbsp; This meant, all those who were using the proxy settings were able to browse to the internet and administrators who do not use the Proxy, but go through their Cisco ASA were unable to browse to the internet.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoListParagraph" style="margin-left:72.0pt"&gt;&lt;SPAN style="font-size: 11.0pt;font-family:&amp;amp;quot;Calibri&amp;amp;quot;,&amp;amp;quot;sans-serif&amp;amp;quot;;color:#1F497D"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoListParagraph" style="margin-left:72.0pt;text-indent:-18.0pt; mso-list:l0 level2 lfo1"&gt;&lt;SPAN style="font-size:11.0pt; font-family:&amp;amp;quot;Calibri&amp;amp;quot;,&amp;amp;quot;sans-serif&amp;amp;quot;;mso-fareast-font-family:Calibri;color:#1F497D"&gt;b.&lt;SPAN style="font-family: 'Times New Roman'; font-size: 7pt; "&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size:11.0pt;font-family:&amp;amp;quot;Calibri&amp;amp;quot;,&amp;amp;quot;sans-serif&amp;amp;quot;; color:#1F497D"&gt;We were &lt;/SPAN&gt;&lt;STRONG style=": ; color: red; font-size: 11.0pt; sans-serif&amp;amp;quot: ; font-family: &amp;amp;quot; ,&amp;amp;quot: ; Calibri&amp;amp;quot: ; "&gt;UNABLE&lt;/STRONG&gt;&lt;SPAN style="font-size:11.0pt; font-family:&amp;amp;quot;Calibri&amp;amp;quot;,&amp;amp;quot;sans-serif&amp;amp;quot;;color:#1F497D"&gt; to gain access to servers in DMZ ( FYI, on a couple of occasions, we could access the DMZ, strange..!!!).&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoListParagraph"&gt;&lt;SPAN style="font-size:11.0pt;font-family:&amp;amp;quot;Calibri&amp;amp;quot;,&amp;amp;quot;sans-serif&amp;amp;quot;; color:#1F497D"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoListParagraph" style="margin-left:72.0pt"&gt;&lt;SPAN style="font-size: 11.0pt;font-family:&amp;amp;quot;Calibri&amp;amp;quot;,&amp;amp;quot;sans-serif&amp;amp;quot;;color:#1F497D"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P class="MsoListParagraph" style="margin-left:72.0pt;text-indent:-18.0pt; mso-list:l0 level2 lfo1"&gt;&lt;SPAN style="font-size:11.0pt; font-family:&amp;amp;quot;Calibri&amp;amp;quot;,&amp;amp;quot;sans-serif&amp;amp;quot;;mso-fareast-font-family:Calibri;color:#1F497D"&gt;c.&lt;SPAN style="font-family: 'Times New Roman'; font-size: 7pt; "&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size:11.0pt;font-family:&amp;amp;quot;Calibri&amp;amp;quot;,&amp;amp;quot;sans-serif&amp;amp;quot;; color:#1F497D"&gt;We could &lt;/SPAN&gt;&lt;STRONG style=": ; color: red; font-size: 11.0pt; sans-serif&amp;amp;quot: ; font-family: &amp;amp;quot; ,&amp;amp;quot: ; Calibri&amp;amp;quot: ; "&gt;NOT&lt;/STRONG&gt;&lt;SPAN style="font-size:11.0pt; font-family:&amp;amp;quot;Calibri&amp;amp;quot;,&amp;amp;quot;sans-serif&amp;amp;quot;;color:#1F497D"&gt; send emails, but &lt;/SPAN&gt;&lt;STRONG style=": ; color: red; font-size: 11.0pt; sans-serif&amp;amp;quot: ; font-family: &amp;amp;quot; ,&amp;amp;quot: ; Calibri&amp;amp;quot: ; "&gt;COULD&lt;/STRONG&gt;&lt;SPAN style="font-size:11.0pt;font-family:&amp;amp;quot;Calibri&amp;amp;quot;,&amp;amp;quot;sans-serif&amp;amp;quot;;color:#1F497D"&gt; receive emails.&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Mar 2012 13:46:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/help-required-to-convert-cisco-asa-nat-rule-onto-palo-alto/m-p/6640#M4858</guid>
      <dc:creator>kalyanram.piratla</dc:creator>
      <dc:date>2012-03-01T13:46:49Z</dc:date>
    </item>
    <item>
      <title>Re: Help required to convert Cisco ASA NAT rule onto Palo Alto</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/help-required-to-convert-cisco-asa-nat-rule-onto-palo-alto/m-p/6641#M4859</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am sorry to hear that.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you would like some assistance, you can contact me over PM.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Mar 2012 17:41:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/help-required-to-convert-cisco-asa-nat-rule-onto-palo-alto/m-p/6641#M4859</guid>
      <dc:creator>jhansf5</dc:creator>
      <dc:date>2012-03-01T17:41:46Z</dc:date>
    </item>
    <item>
      <title>Re: Help required to convert Cisco ASA NAT rule onto Palo Alto</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/help-required-to-convert-cisco-asa-nat-rule-onto-palo-alto/m-p/6642#M4860</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Have you tried working with your SE to iron out the rules?&amp;nbsp; Ours has been more than helpful with all of our deployments.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Mar 2012 18:01:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/help-required-to-convert-cisco-asa-nat-rule-onto-palo-alto/m-p/6642#M4860</guid>
      <dc:creator>migration</dc:creator>
      <dc:date>2012-03-01T18:01:48Z</dc:date>
    </item>
    <item>
      <title>Re: Help required to convert Cisco ASA NAT rule onto Palo Alto</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/help-required-to-convert-cisco-asa-nat-rule-onto-palo-alto/m-p/6643#M4861</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Prince,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I will be doing it again during this week.&amp;nbsp; Hopefully it goes well.&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 05 Mar 2012 10:16:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/help-required-to-convert-cisco-asa-nat-rule-onto-palo-alto/m-p/6643#M4861</guid>
      <dc:creator>kalyanram.piratla</dc:creator>
      <dc:date>2012-03-05T10:16:45Z</dc:date>
    </item>
    <item>
      <title>Re: Help required to convert Cisco ASA NAT rule onto Palo Alto</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/help-required-to-convert-cisco-asa-nat-rule-onto-palo-alto/m-p/6644#M4862</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have a very good article that goes over the different types of NAT in detail with screenshots of what the security policy and the NAT policy should look like for each:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A __default_attr="1517" __jive_macro_name="document" class="jive_macro jive_macro_document" href="https://live.paloaltonetworks.com/"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you still have trouble, you could contact your SE or support.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jason&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 11 Mar 2012 02:16:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/help-required-to-convert-cisco-asa-nat-rule-onto-palo-alto/m-p/6644#M4862</guid>
      <dc:creator>jseals</dc:creator>
      <dc:date>2012-03-11T02:16:25Z</dc:date>
    </item>
  </channel>
</rss>

