<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic New to PAN - coming from ASA - NAT nightmares in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/new-to-pan-coming-from-asa-nat-nightmares/m-p/162320#M52678</link>
    <description>&lt;P&gt;Hi guys,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have come from Cisco ASAs whereby it is super easy to create port forwarding/translation - really useful when only have single public IP.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;object network web-server&lt;/P&gt;&lt;P&gt;&amp;nbsp;host 192.168.1.10&lt;/P&gt;&lt;P&gt;&amp;nbsp;nat (inside,outisde) static interface service tcp 80 80&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;access-list outside extended permit any object web-server eq 80&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am finding this impossibly difficult on the Palo! &amp;nbsp;I have created a NAT as follows:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;"INBOUND WWW; index: 4" {&lt;BR /&gt;nat-type ipv4;&lt;BR /&gt;from untrust;&lt;BR /&gt;source any;&lt;BR /&gt;to untrust;&lt;BR /&gt;to-interface ethernet1/1 ;&lt;BR /&gt;destination a.b.c.d;&lt;BR /&gt;service [ tcp/any/80 tcp/any/8080 ];&lt;BR /&gt;translate-to "dst: 172.22.1.10:80";&lt;BR /&gt;terminal no;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;"UNTRUST TO WEB SERVER; index: 6" {&lt;BR /&gt;from untrust;&lt;BR /&gt;source any;&lt;BR /&gt;source-region none;&lt;BR /&gt;to trust;&lt;BR /&gt;destination&amp;nbsp;a.b.c.d&lt;BR /&gt;destination-region none;&lt;BR /&gt;user any;&lt;BR /&gt;category any;&lt;BR /&gt;application/service web-browsing/tcp/any/80;&lt;BR /&gt;action allow;&lt;BR /&gt;icmp-unreachable: no&lt;BR /&gt;terminal yes;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Access to the webserver is not working and there is nothing in the live traffic logs - I'm sure I am doing something stupid if someone could hlpe...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cheers,&lt;/P&gt;&lt;P&gt;Darren&lt;/P&gt;</description>
    <pubDate>Tue, 20 Jun 2017 16:44:34 GMT</pubDate>
    <dc:creator>darren-bucknell</dc:creator>
    <dc:date>2017-06-20T16:44:34Z</dc:date>
    <item>
      <title>New to PAN - coming from ASA - NAT nightmares</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/new-to-pan-coming-from-asa-nat-nightmares/m-p/162320#M52678</link>
      <description>&lt;P&gt;Hi guys,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have come from Cisco ASAs whereby it is super easy to create port forwarding/translation - really useful when only have single public IP.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;object network web-server&lt;/P&gt;&lt;P&gt;&amp;nbsp;host 192.168.1.10&lt;/P&gt;&lt;P&gt;&amp;nbsp;nat (inside,outisde) static interface service tcp 80 80&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;access-list outside extended permit any object web-server eq 80&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am finding this impossibly difficult on the Palo! &amp;nbsp;I have created a NAT as follows:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;"INBOUND WWW; index: 4" {&lt;BR /&gt;nat-type ipv4;&lt;BR /&gt;from untrust;&lt;BR /&gt;source any;&lt;BR /&gt;to untrust;&lt;BR /&gt;to-interface ethernet1/1 ;&lt;BR /&gt;destination a.b.c.d;&lt;BR /&gt;service [ tcp/any/80 tcp/any/8080 ];&lt;BR /&gt;translate-to "dst: 172.22.1.10:80";&lt;BR /&gt;terminal no;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;"UNTRUST TO WEB SERVER; index: 6" {&lt;BR /&gt;from untrust;&lt;BR /&gt;source any;&lt;BR /&gt;source-region none;&lt;BR /&gt;to trust;&lt;BR /&gt;destination&amp;nbsp;a.b.c.d&lt;BR /&gt;destination-region none;&lt;BR /&gt;user any;&lt;BR /&gt;category any;&lt;BR /&gt;application/service web-browsing/tcp/any/80;&lt;BR /&gt;action allow;&lt;BR /&gt;icmp-unreachable: no&lt;BR /&gt;terminal yes;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Access to the webserver is not working and there is nothing in the live traffic logs - I'm sure I am doing something stupid if someone could hlpe...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cheers,&lt;/P&gt;&lt;P&gt;Darren&lt;/P&gt;</description>
      <pubDate>Tue, 20 Jun 2017 16:44:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/new-to-pan-coming-from-asa-nat-nightmares/m-p/162320#M52678</guid>
      <dc:creator>darren-bucknell</dc:creator>
      <dc:date>2017-06-20T16:44:34Z</dc:date>
    </item>
    <item>
      <title>Re: New to PAN - coming from ASA - NAT nightmares</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/new-to-pan-coming-from-asa-nat-nightmares/m-p/162335#M52679</link>
      <description>&lt;P&gt;Fixed it - wrong zone &amp;lt;blush&amp;gt; &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 20 Jun 2017 16:51:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/new-to-pan-coming-from-asa-nat-nightmares/m-p/162335#M52679</guid>
      <dc:creator>darren-bucknell</dc:creator>
      <dc:date>2017-06-20T16:51:05Z</dc:date>
    </item>
    <item>
      <title>Re: New to PAN - coming from ASA - NAT nightmares</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/new-to-pan-coming-from-asa-nat-nightmares/m-p/162343#M52680</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/66702"&gt;@darren-bucknell&lt;/a&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;That's how you need to configure your policy in ordert to allow inbound traffic to your Web Server.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;NAT Policy Example&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Public-WWW.PNG" style="width: 500px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/9836i6798768EE2D80E4B/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="Public-WWW.PNG" alt="Public-WWW.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Private-WWW.PNG" style="width: 500px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/9835i6ECC25BA95B8052F/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="Private-WWW.PNG" alt="Private-WWW.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Security&amp;nbsp;&amp;nbsp;Policy Example&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Security-Policy1.PNG" style="width: 500px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/9837iBC9CABB21BEA5FB6/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="Security-Policy1.PNG" alt="Security-Policy1.PNG" /&gt;&lt;/span&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Security-Policy2.PNG" style="width: 500px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/9838i7F20E0458F3FC1A8/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="Security-Policy2.PNG" alt="Security-Policy2.PNG" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Security-Policy3.PNG" style="width: 500px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/9841i8299F7E34E03B8D2/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="Security-Policy3.PNG" alt="Security-Policy3.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now if you need your WebServer to also access the Internet (Bidirectional) I can give another example, then the NAT policy will work a little bit different.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Let me know how it goes.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 20 Jun 2017 17:01:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/new-to-pan-coming-from-asa-nat-nightmares/m-p/162343#M52680</guid>
      <dc:creator>acc6d0b3610eec313831f7900fdbd235</dc:creator>
      <dc:date>2017-06-20T17:01:05Z</dc:date>
    </item>
    <item>
      <title>Re: New to PAN - coming from ASA - NAT nightmares</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/new-to-pan-coming-from-asa-nat-nightmares/m-p/162347#M52681</link>
      <description>&lt;P&gt;Hey thanks for this Willian!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I used the "application (web-browsing)" ID and it worked.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Basically, I am getting used to the PAN zonal configuration that the ASA has no concept of. &amp;nbsp;It's a learning curve but will be worth it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best regards,&lt;/P&gt;&lt;P&gt;Darren&lt;/P&gt;</description>
      <pubDate>Tue, 20 Jun 2017 17:15:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/new-to-pan-coming-from-asa-nat-nightmares/m-p/162347#M52681</guid>
      <dc:creator>darren-bucknell</dc:creator>
      <dc:date>2017-06-20T17:15:10Z</dc:date>
    </item>
    <item>
      <title>Re: New to PAN - coming from ASA - NAT nightmares</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/new-to-pan-coming-from-asa-nat-nightmares/m-p/162348#M52682</link>
      <description>&lt;P&gt;The web server does have a dynamic NAT (overload) policy configured. &amp;nbsp;Is there a better way?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Darren&lt;/P&gt;</description>
      <pubDate>Tue, 20 Jun 2017 17:16:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/new-to-pan-coming-from-asa-nat-nightmares/m-p/162348#M52682</guid>
      <dc:creator>darren-bucknell</dc:creator>
      <dc:date>2017-06-20T17:16:11Z</dc:date>
    </item>
    <item>
      <title>Re: New to PAN - coming from ASA - NAT nightmares</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/new-to-pan-coming-from-asa-nat-nightmares/m-p/162355#M52683</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/66702"&gt;@darren-bucknell&lt;/a&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;No problem, you can definitely use the web-browsing App-ID. Just a heads up&amp;nbsp;that if you use the service-http as service and web-browsing, you will be locking down the use of the application to port tcp/80 and tcp/8080 :). In most cases I typically leave the service field as Application-default, unless the application has a different specification.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If your application uses web-browsing, but do HTTP over a different port than i.e 5000, then obviously, you have to create a service object and then specify that in the service cell in the policy &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 20 Jun 2017 17:40:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/new-to-pan-coming-from-asa-nat-nightmares/m-p/162355#M52683</guid>
      <dc:creator>acc6d0b3610eec313831f7900fdbd235</dc:creator>
      <dc:date>2017-06-20T17:40:21Z</dc:date>
    </item>
    <item>
      <title>Re: New to PAN - coming from ASA - NAT nightmares</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/new-to-pan-coming-from-asa-nat-nightmares/m-p/162356#M52684</link>
      <description>&lt;P&gt;I would simply configure it the NAT policy as bidirectional policy instead. This way, the server can receive inbound traffic and send traffic out at the same time.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Maybe these two articles here will help you.&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.paloaltonetworks.com/documentation/60/pan-os/pan-os/getting-started/configure-nat-policies" target="_blank"&gt;https://www.paloaltonetworks.com/documentation/60/pan-os/pan-os/getting-started/configure-nat-policies&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.paloaltonetworks.com/documentation/70/pan-os/pan-os/networking/nat-configuration-examples" target="_blank"&gt;https://www.paloaltonetworks.com/documentation/70/pan-os/pan-os/networking/nat-configuration-examples&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 20 Jun 2017 17:46:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/new-to-pan-coming-from-asa-nat-nightmares/m-p/162356#M52684</guid>
      <dc:creator>acc6d0b3610eec313831f7900fdbd235</dc:creator>
      <dc:date>2017-06-20T17:46:00Z</dc:date>
    </item>
    <item>
      <title>Re: New to PAN - coming from ASA - NAT nightmares</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/new-to-pan-coming-from-asa-nat-nightmares/m-p/162359#M52686</link>
      <description>&lt;P&gt;Thanks Willian,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I only have a single public IP address and have dynamic NAT rules configured for the DMZ and other subnets. &amp;nbsp;Wouldn't a biderctional NAT (only available for a static IP) &amp;nbsp;break general PAT?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;PAN-OS certainly does things differently to Cisco ASA!&lt;/P&gt;</description>
      <pubDate>Tue, 20 Jun 2017 18:06:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/new-to-pan-coming-from-asa-nat-nightmares/m-p/162359#M52686</guid>
      <dc:creator>darren-bucknell</dc:creator>
      <dc:date>2017-06-20T18:06:05Z</dc:date>
    </item>
  </channel>
</rss>

