<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Getting to internal servers in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/getting-to-internal-servers/m-p/163897#M52999</link>
    <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/67865"&gt;@SNikolaidis&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;I actually thought that you were trying to access the public IP of your web server while the NAT policy had all traffic from this zone sharing that same IP.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I suspect that&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/36590"&gt;@acc6d0b3610eec313831f7900fdbd235&lt;/a&gt;&amp;nbsp;is correct and you simply need to configure the U-turn correctly to get this to function.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 29 Jun 2017 19:58:23 GMT</pubDate>
    <dc:creator>BPry</dc:creator>
    <dc:date>2017-06-29T19:58:23Z</dc:date>
    <item>
      <title>Getting to internal servers</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/getting-to-internal-servers/m-p/163885#M52994</link>
      <description>&lt;P&gt;Hello all,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have a Guest/BYOD Wireless Zone that can get out to the internet just fine. The internet &amp;amp; internal network can get to my webservers just fine. The problem im having is that my Wireless zone can not get an internallyu hosted website from the public IP of my webserver. I do not want any kind of connection or link of the wireless and internal zones (ie be on guest wireless and be able to access anything on the internal network). Any help would be appreciated!&lt;/P&gt;</description>
      <pubDate>Thu, 29 Jun 2017 19:07:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/getting-to-internal-servers/m-p/163885#M52994</guid>
      <dc:creator>SNikolaidis</dc:creator>
      <dc:date>2017-06-29T19:07:46Z</dc:date>
    </item>
    <item>
      <title>Re: Getting to internal servers</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/getting-to-internal-servers/m-p/163892#M52995</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/67865"&gt;@SNikolaidis&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;IS the public IP of your webserver the same public IP that is getting NATd for to your Guest/BYOD wireless zone users?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 29 Jun 2017 19:14:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/getting-to-internal-servers/m-p/163892#M52995</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2017-06-29T19:14:42Z</dc:date>
    </item>
    <item>
      <title>Re: Getting to internal servers</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/getting-to-internal-servers/m-p/163893#M52996</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/67865"&gt;@SNikolaidis&lt;/a&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If my understanding is correct, you have the users in the Wireless network, that need to go out to the Internet to hit your Webserver public IP address and come back in to access the actual DMZ server.&amp;nbsp;&lt;/P&gt;&lt;P&gt;If this is the case, we are talking about a uTurn-NAT situation, and it needs to be explicitly configured in the NAT and security policies.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Take a look at this article and let me know if this is your exact scenario.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/Learning-Articles/DotW-U-Turn-NAT-Issue/ta-p/53115" target="_blank"&gt;https://live.paloaltonetworks.com/t5/Learning-Articles/DotW-U-Turn-NAT-Issue/ta-p/53115&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 29 Jun 2017 19:20:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/getting-to-internal-servers/m-p/163893#M52996</guid>
      <dc:creator>acc6d0b3610eec313831f7900fdbd235</dc:creator>
      <dc:date>2017-06-29T19:20:56Z</dc:date>
    </item>
    <item>
      <title>Re: Getting to internal servers</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/getting-to-internal-servers/m-p/163894#M52997</link>
      <description>&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;&lt;BR /&gt;&lt;BR /&gt;The outward internet interface is x.x.x.70 the public ip of the server is x.x.x.10 all on the same class c if that's what you are asking</description>
      <pubDate>Thu, 29 Jun 2017 19:21:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/getting-to-internal-servers/m-p/163894#M52997</guid>
      <dc:creator>SNikolaidis</dc:creator>
      <dc:date>2017-06-29T19:21:44Z</dc:date>
    </item>
    <item>
      <title>Re: Getting to internal servers</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/getting-to-internal-servers/m-p/163895#M52998</link>
      <description>&lt;P&gt;I think this link video will help you.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://youtu.be/Bdbn1pbe74o" target="_blank"&gt;https://youtu.be/Bdbn1pbe74o&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If I try to explain here it will not be very interactive &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 29 Jun 2017 19:36:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/getting-to-internal-servers/m-p/163895#M52998</guid>
      <dc:creator>acc6d0b3610eec313831f7900fdbd235</dc:creator>
      <dc:date>2017-06-29T19:36:15Z</dc:date>
    </item>
    <item>
      <title>Re: Getting to internal servers</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/getting-to-internal-servers/m-p/163897#M52999</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/67865"&gt;@SNikolaidis&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;I actually thought that you were trying to access the public IP of your web server while the NAT policy had all traffic from this zone sharing that same IP.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I suspect that&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/36590"&gt;@acc6d0b3610eec313831f7900fdbd235&lt;/a&gt;&amp;nbsp;is correct and you simply need to configure the U-turn correctly to get this to function.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 29 Jun 2017 19:58:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/getting-to-internal-servers/m-p/163897#M52999</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2017-06-29T19:58:23Z</dc:date>
    </item>
    <item>
      <title>Re: Getting to internal servers</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/getting-to-internal-servers/m-p/163898#M53000</link>
      <description>&lt;P&gt;Thank you I will try it as soon as I get home, Does it make a differance if the server is not in a DMZ?&lt;/P&gt;</description>
      <pubDate>Thu, 29 Jun 2017 20:23:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/getting-to-internal-servers/m-p/163898#M53000</guid>
      <dc:creator>SNikolaidis</dc:creator>
      <dc:date>2017-06-29T20:23:43Z</dc:date>
    </item>
    <item>
      <title>Re: Getting to internal servers</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/getting-to-internal-servers/m-p/163907#M53001</link>
      <description>&lt;P&gt;That would depend on knowing a little bit more about your routing statements, but in the vast majority of circumstances you would still need a U-Turn.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 29 Jun 2017 21:03:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/getting-to-internal-servers/m-p/163907#M53001</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2017-06-29T21:03:33Z</dc:date>
    </item>
    <item>
      <title>Re: Getting to internal servers</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/getting-to-internal-servers/m-p/163925#M53002</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/36590"&gt;@acc6d0b3610eec313831f7900fdbd235&lt;/a&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The U-Turn works for my internal network, the problem with the wireless network is it is independant, it only shares the internet interface Eth1/1 and the virtual router with the rest of the network, NAT &amp;amp; Policy &amp;amp; DHCP &amp;amp; DNS Proxy take it straight out to the internet and has filtering and security applied to the Security Policy. It seems to me I need a way to differentiate destination of internet traffic and send the desination 10.66.6.1/16 to that Eth1/8 interface were the 10.66.6.1/16 network resides&lt;/P&gt;</description>
      <pubDate>Thu, 29 Jun 2017 22:03:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/getting-to-internal-servers/m-p/163925#M53002</guid>
      <dc:creator>SNikolaidis</dc:creator>
      <dc:date>2017-06-29T22:03:09Z</dc:date>
    </item>
    <item>
      <title>Re: Getting to internal servers</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/getting-to-internal-servers/m-p/163942#M53004</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/67865"&gt;@SNikolaidis&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;You could utilize PBF for that pretty easily but you shouldn't really have to. I&amp;nbsp;feel like if you shared a network diagram along with your NAT policies and routing table we could likely get this straightened out without resorting to PBF.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 29 Jun 2017 22:33:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/getting-to-internal-servers/m-p/163942#M53004</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2017-06-29T22:33:27Z</dc:date>
    </item>
    <item>
      <title>Re: Getting to internal servers</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/getting-to-internal-servers/m-p/163949#M53007</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Untitled Diagram.png" style="width: 299px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/9991i1BD2A418223CD783/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Untitled Diagram.png" alt="Untitled Diagram.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Untitle2d.png" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/9992i6FF7C3466B79C5D5/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Untitle2d.png" alt="Untitle2d.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 29 Jun 2017 23:24:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/getting-to-internal-servers/m-p/163949#M53007</guid>
      <dc:creator>SNikolaidis</dc:creator>
      <dc:date>2017-06-29T23:24:51Z</dc:date>
    </item>
    <item>
      <title>Re: Getting to internal servers</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/getting-to-internal-servers/m-p/163950#M53008</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But on the firewall is where DHCP, DNS Proxy (8.8.8.8) exist for the gateway 10.66.6.1 . The vlan 666 is completely cut off from anything other than the internet that which 10.66.6.1 gets through Security &amp;amp; NAT Policy to the ETH1/1 x.x.x.70/24 .&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We want to keep this wireless network completely isolated from everything other than the internet. That being said, type our domain name into chrome and it just times out. Internally and Publicly everything loads just fine.&lt;/P&gt;</description>
      <pubDate>Thu, 29 Jun 2017 23:35:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/getting-to-internal-servers/m-p/163950#M53008</guid>
      <dc:creator>SNikolaidis</dc:creator>
      <dc:date>2017-06-29T23:35:01Z</dc:date>
    </item>
    <item>
      <title>Re: Getting to internal servers</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/getting-to-internal-servers/m-p/164088#M53035</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/67865"&gt;@SNikolaidis&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;With how you describe it I would expect to actually see the traffic hitting the firewall as it comes back from your cable modem or at least see it trying to hit the untrust zone on your firewall. Have you enabled logging on the default interzone rule and checked the logs to see if you aren't simply blocking the traffic from reaching the server? If you can hit it with intrazone perfectly in your testig I would expect that you simply need to create a security policy to allow the zone tied to vlan 666 to access that web server.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 30 Jun 2017 13:37:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/getting-to-internal-servers/m-p/164088#M53035</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2017-06-30T13:37:09Z</dc:date>
    </item>
    <item>
      <title>Re: Getting to internal servers</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/getting-to-internal-servers/m-p/164359#M53064</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Have it working, had to set up another interface to an outside address on eth1/7 and set up a new virtual router that has my wireless network eth1/8 and 1/7 in it with a static route to the internet. May not be the best solution or best practice, but it works.&lt;/P&gt;</description>
      <pubDate>Mon, 03 Jul 2017 14:52:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/getting-to-internal-servers/m-p/164359#M53064</guid>
      <dc:creator>SNikolaidis</dc:creator>
      <dc:date>2017-07-03T14:52:31Z</dc:date>
    </item>
    <item>
      <title>Re: Getting to internal servers</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/getting-to-internal-servers/m-p/164360#M53065</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/67865"&gt;@SNikolaidis&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;Actually that may be the best solution for actually making sure that it won't have any chance to get into your production network.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 03 Jul 2017 14:54:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/getting-to-internal-servers/m-p/164360#M53065</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2017-07-03T14:54:34Z</dc:date>
    </item>
  </channel>
</rss>

