<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: help with NAT in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/help-with-nat/m-p/152360#M50402</link>
    <description>&lt;P&gt;Agree with&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/58582"&gt;@bradk14&lt;/a&gt;&amp;nbsp;as more info&amp;nbsp;needed. Usually, &amp;nbsp;"aged-out" as a session end reason is not a good sign and most of the time indicates an issue with a 3-way handshake. Can you ping an internal server from the firewall? Do you see any bytes received in the session logs?&lt;/P&gt;</description>
    <pubDate>Wed, 12 Apr 2017 18:03:32 GMT</pubDate>
    <dc:creator>TranceforLife</dc:creator>
    <dc:date>2017-04-12T18:03:32Z</dc:date>
    <item>
      <title>help with NAT</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/help-with-nat/m-p/152344#M50399</link>
      <description>&lt;P&gt;hello im wondering if anyone can help a PAFW newbie with configuring some nat that i am trying to pass through.&amp;nbsp; i dont know how my security &amp;amp; nat rules should look but this is what i have configured:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;security rule: source zone (untrust) source address (any) destination zone (untrust) destination 99.99.99.13 Accept&lt;BR /&gt;nat rule: source zone (untrust) source address (any) destination zone (untrust) destination address 99.99.99.13 destination translation (10.10.1.4)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I did NOT set up any kind of proxy arp - believe that is unneeded?&lt;/P&gt;&lt;P&gt;when i attempt to contact my PAFW on &lt;A href="https://99.99.99.13" target="_blank"&gt;https://99.99.99.13&lt;/A&gt; i see traffic from untrust to untrust application "incomplete", action "allow", session end reason "aged out"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;i must be missing something somewhere?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thank you in advance&lt;/P&gt;</description>
      <pubDate>Thu, 13 Apr 2017 05:51:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/help-with-nat/m-p/152344#M50399</guid>
      <dc:creator>bwfreas</dc:creator>
      <dc:date>2017-04-13T05:51:14Z</dc:date>
    </item>
    <item>
      <title>Re: help with NAT</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/help-with-nat/m-p/152353#M50400</link>
      <description>&lt;P&gt;so I need to ask. is this a production environment? even if you are using private IPs for a machine, you usually wouldn't want the untrust to be able to access the trust network in a traditional network environment. if any machine on the 10.1..1.0/24 network gets compromised (or whatever the subnet mask is), it has unfiltered access to all machines on that same subnet (save for host based firewalls). even if your trust zone is subnetted, the default PA rule allows traffic between same zones. all this can be worked around of course, but best practice would be to have a DMZ zone where you can at least have a tighter control on access.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;okay, soapbox aside...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;the general rule here is that on your security policy, you use pre-nat IPs and post-nat zones. So in this example, your security policy should be something like:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;source zone: untrust&lt;/P&gt;&lt;P&gt;source ip: any&lt;/P&gt;&lt;P&gt;destination zone: trust&lt;/P&gt;&lt;P&gt;destination ip: 99.99.99.13&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;without seeing it laid out from the GUI, your destination NAT sounds correct, however.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.paloaltonetworks.com/documentation/70/pan-os/pan-os/networking/nat-configuration-examples#_58788" target="_blank"&gt;https://www.paloaltonetworks.com/documentation/70/pan-os/pan-os/networking/nat-configuration-examples#_58788&lt;/A&gt; should help.&lt;/P&gt;</description>
      <pubDate>Wed, 12 Apr 2017 17:11:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/help-with-nat/m-p/152353#M50400</guid>
      <dc:creator>bradk14</dc:creator>
      <dc:date>2017-04-12T17:11:15Z</dc:date>
    </item>
    <item>
      <title>Re: help with NAT</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/help-with-nat/m-p/152360#M50402</link>
      <description>&lt;P&gt;Agree with&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/58582"&gt;@bradk14&lt;/a&gt;&amp;nbsp;as more info&amp;nbsp;needed. Usually, &amp;nbsp;"aged-out" as a session end reason is not a good sign and most of the time indicates an issue with a 3-way handshake. Can you ping an internal server from the firewall? Do you see any bytes received in the session logs?&lt;/P&gt;</description>
      <pubDate>Wed, 12 Apr 2017 18:03:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/help-with-nat/m-p/152360#M50402</guid>
      <dc:creator>TranceforLife</dc:creator>
      <dc:date>2017-04-12T18:03:32Z</dc:date>
    </item>
    <item>
      <title>Re: help with NAT</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/help-with-nat/m-p/152449#M50408</link>
      <description>&lt;P&gt;Destination zone in security policy needs to be 'Trust'. Rest looks fine.&lt;/P&gt;</description>
      <pubDate>Thu, 13 Apr 2017 00:30:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/help-with-nat/m-p/152449#M50408</guid>
      <dc:creator>ansharma</dc:creator>
      <dc:date>2017-04-13T00:30:21Z</dc:date>
    </item>
  </channel>
</rss>

