<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: NAT configuration for a Networks (Not) Connected to the Firewall in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/nat-configuration-for-a-networks-not-connected-to-the-firewall/m-p/169054#M53757</link>
    <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/8884"&gt;@mkopcic&lt;/a&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;pretty good config&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Your inbound NAT rules, however, are incorrect. NAT zones are determined pre-NAT based on the routing table, so inbound connections to 3.3.3.10 should be internet to internet because 3.3.3.10 also lives on the external interface from the firewall perspective&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;i'd recommend attaching the 3.3.3.10 IP on the external interface (not sure if you did that, the graph doesn't show it) as secondary IP, this makes management a bit easier and prevents accidents, plus you can then use 'dropdown' options where applicable (and will fix bi-directional)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If possible i'd also recommend attaching 2.2.2.0/24 to the external interface and provisioning your public DMZ with private IP addresses, this is a little more secure as you control not only security policy but NAT translation, and this will allow other segments to benefit more easily from this address pool without creating tricky U-Turn NAT because you use an IP that physically belongs to an internal interface on 2 different and unrelated (internet + privdmz) interfaces&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Check out the &lt;A title="Getting Started: Network Address Translation (NAT)" href="https://live.paloaltonetworks.com/t5/Tutorials/Getting-Started-Network-Address-Translation-NAT/ta-p/116340" target="_blank"&gt;Getting Started: Network Address Translation (NAT)&lt;/A&gt; article + tutorial video &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;and the &lt;A title="How to Configure U-Turn NAT" href="https://live.paloaltonetworks.com/t5/Configuration-Articles/How-to-Configure-U-Turn-NAT/ta-p/61889" target="_blank"&gt;How to Configure U-Turn NAT&lt;/A&gt; article + tutorial&lt;/P&gt;</description>
    <pubDate>Mon, 31 Jul 2017 14:34:20 GMT</pubDate>
    <dc:creator>reaper</dc:creator>
    <dc:date>2017-07-31T14:34:20Z</dc:date>
    <item>
      <title>NAT configuration for a Networks (Not) Connected to the Firewall</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/nat-configuration-for-a-networks-not-connected-to-the-firewall/m-p/168367#M53649</link>
      <description>&lt;P&gt;Hello!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is the scenario and configuration that works on 8.0.3. It is implemented in our company.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="NAT_slika.jpg" style="width: 583px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/10524i6BB7DA5F55B82FFE/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="NAT_slika.jpg" alt="NAT_slika.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Servers on public_dmz have public addresses and access Internet with that addresses. Only server with address 2.2.2.10 needs to be translated to 3.3.3.10 in both directions.&lt;/P&gt;&lt;P&gt;2.2.2.10 -&amp;gt; 3.3.3.10&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Servers from private_dmz are published on the Internet using address from the address space used for public_dmz 2.2.2.0/24. They are using the same addresses when they are accessing Internet.&lt;/P&gt;&lt;P&gt;For example: 10.10.10.20 -&amp;gt; 2.2.2.20&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hosts from LAN are published on the Internet using address from the address space 2.2.2.0/24. They are using the same addresses when they are accessing Internet.&lt;/P&gt;&lt;P&gt;For example: 172.16.10.100 -&amp;gt; 2.2.2.100&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;One server from LAN has to be destination translated to 1.1.1.3.&lt;/P&gt;&lt;P&gt;192.168.3.3 -&amp;gt; 1.1.1.3&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Basic routing&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;ISP configured routes for 2.2.2.0/24 and 3.3.3.10/32 pointing to the PAN (1.1.1.2).&lt;/P&gt;&lt;P&gt;PAN has default route pointing to the 1.1.1.1.&lt;/P&gt;&lt;P&gt;Routes on PAN for LAN networks are pointing to the 172.16.1.2.&lt;/P&gt;&lt;P&gt;Layer3 switch has default route to the 172.16.1.1.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;NAT rules configuration&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;U&gt;NAT for server 2.2.2.10.&lt;/U&gt; Bi-directional NAT doesn’t work. Separate source and destination NAT rules must be configured.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Source NAT:&lt;/P&gt;&lt;P&gt;Source zone: public_dmz&lt;/P&gt;&lt;P&gt;Destination zone: Internet&lt;/P&gt;&lt;P&gt;Destination interface: Eth1/1&lt;/P&gt;&lt;P&gt;Source IP: 2.2.2.10&lt;/P&gt;&lt;P&gt;Destination IP: any&lt;/P&gt;&lt;P&gt;Source translation static: 3.3.3.10&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Destination NAT:&lt;/P&gt;&lt;P&gt;Source zone: Internet&lt;/P&gt;&lt;P&gt;Destination zone: public_dmz&lt;/P&gt;&lt;P&gt;Destination interface: Any&lt;/P&gt;&lt;P&gt;Source IP: any&lt;/P&gt;&lt;P&gt;Destination IP: 3.3.3.10&lt;/P&gt;&lt;P&gt;Destination translation: 2.2.2.10&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;U&gt;NAT for server on the private_dmz&lt;/U&gt;. Bi-directional NAT doesn’t work. Separate source and destination NAT rules must be configured.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Source NAT:&lt;/P&gt;&lt;P&gt;Source zone: private_dmz&lt;/P&gt;&lt;P&gt;Destination zone: Internet&lt;/P&gt;&lt;P&gt;Destination interface: Eth1/1&lt;/P&gt;&lt;P&gt;Source IP: 10.10.10.20&lt;/P&gt;&lt;P&gt;Destination IP: any&lt;/P&gt;&lt;P&gt;Source translation static: 2.2.2.20&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Destination NAT:&lt;/P&gt;&lt;P&gt;Source zone: Internet&lt;/P&gt;&lt;P&gt;Destination zone: private_dmz&lt;/P&gt;&lt;P&gt;Destination interface: Any&lt;/P&gt;&lt;P&gt;Source IP: any&lt;/P&gt;&lt;P&gt;Destination IP: 2.2.2.20&lt;/P&gt;&lt;P&gt;Destination translation: 10.10.10.20&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;U&gt;NAT for the first server on the LAN&lt;/U&gt;. Bi-directional NAT doesn’t work. Separate source and destination NAT rules must be configured.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Source NAT:&lt;/P&gt;&lt;P&gt;Source zone: trust&lt;/P&gt;&lt;P&gt;Destination zone: Internet&lt;/P&gt;&lt;P&gt;Destination interface: Eth1/1&lt;/P&gt;&lt;P&gt;Source IP: 172.16.10.100&lt;/P&gt;&lt;P&gt;Destination IP: any&lt;/P&gt;&lt;P&gt;Source translation static: 2.2.2.100&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Destination NAT:&lt;/P&gt;&lt;P&gt;Source zone: Internet&lt;/P&gt;&lt;P&gt;Destination zone: trust&lt;/P&gt;&lt;P&gt;Destination interface: Any&lt;/P&gt;&lt;P&gt;Source IP: any&lt;/P&gt;&lt;P&gt;Destination IP: 2.2.2.100&lt;/P&gt;&lt;P&gt;Destination translation: 172.16.10.100&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;U&gt;NAT for the second server on the LAN&lt;/U&gt;.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Destination NAT:&lt;/P&gt;&lt;P&gt;Source zone: Internet&lt;/P&gt;&lt;P&gt;Destination zone: Internet&lt;/P&gt;&lt;P&gt;Destination interface: any or Eth1/1 (works with both settings)&lt;/P&gt;&lt;P&gt;Source IP: any&lt;/P&gt;&lt;P&gt;Destination IP: 1.1.1.3&lt;/P&gt;&lt;P&gt;Destination translation: 192.168.3.3&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;NAT routing&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;/32 for public address used in destination NAT, /32 routes must be configured. For &lt;U&gt;ONLY&lt;/U&gt; source NAT, these routes don’t have to be configured.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;U&gt;For server in public_dmz&lt;/U&gt;&lt;/P&gt;&lt;P&gt;Destination: 3.3.3.10/32&lt;/P&gt;&lt;P&gt;Interface: Eth1/2&lt;/P&gt;&lt;P&gt;Next hop: None&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;U&gt;For server in private_dmz&lt;/U&gt;&lt;/P&gt;&lt;P&gt;Destination: 2.2.2.20/32&lt;/P&gt;&lt;P&gt;Interface: Eth1/3&lt;/P&gt;&lt;P&gt;Next hop: None&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;U&gt;For the first server on LAN:&lt;/U&gt;&lt;/P&gt;&lt;P&gt;Destination: 2.2.2.100/32&lt;/P&gt;&lt;P&gt;Interface: Eth1/4&lt;/P&gt;&lt;P&gt;Next hop: None&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Security rules configuration&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;U&gt;For server in public_dmz&lt;/U&gt;&lt;/P&gt;&lt;P&gt;Source zone: Internet&lt;/P&gt;&lt;P&gt;Destination zone: public_dmz&lt;/P&gt;&lt;P&gt;Source IP: Any&lt;/P&gt;&lt;P&gt;Destination IP: 3.3.3.10&lt;/P&gt;&lt;P&gt;Destination applications: web-browsing, ssl&lt;/P&gt;&lt;P&gt;Action: Allow&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;U&gt;For server in private_dmz&lt;/U&gt;&lt;/P&gt;&lt;P&gt;Source zone: Internet&lt;/P&gt;&lt;P&gt;Destination zone: private_dmz&lt;/P&gt;&lt;P&gt;Source IP: Any&lt;/P&gt;&lt;P&gt;Destination IP: 2.2.2.20&lt;/P&gt;&lt;P&gt;Destination applications: web-browsing, ssl&lt;/P&gt;&lt;P&gt;Action: Allow&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;U&gt;For the first server in LAN&lt;/U&gt;&lt;/P&gt;&lt;P&gt;Source zone: Internet&lt;/P&gt;&lt;P&gt;Destination zone: trust&lt;/P&gt;&lt;P&gt;Source IP: Any&lt;/P&gt;&lt;P&gt;Destination IP: 2.2.2.100&lt;/P&gt;&lt;P&gt;Destination applications: web-browsing, ssl&lt;/P&gt;&lt;P&gt;Action: Allow&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;U&gt;For the second server in LAN&lt;/U&gt;&lt;/P&gt;&lt;P&gt;Source zone: Internet&lt;/P&gt;&lt;P&gt;Destination zone: trust&lt;/P&gt;&lt;P&gt;Source IP: Any&lt;/P&gt;&lt;P&gt;Destination IP: 1.1.1.3&lt;/P&gt;&lt;P&gt;Destination applications: web-browsing, ssl&lt;/P&gt;&lt;P&gt;Action: Allow&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Global permit rules for zones:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Source zone: public_dmz&lt;/P&gt;&lt;P&gt;Destination zone: Internet&lt;/P&gt;&lt;P&gt;Source IP: 2.2.2.0/24&lt;/P&gt;&lt;P&gt;Destination IP: Any&lt;/P&gt;&lt;P&gt;Destination applications: web-browsing, ssl&lt;/P&gt;&lt;P&gt;Action: Allow&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Source zone: private_dmz&lt;/P&gt;&lt;P&gt;Destination zone: Internet&lt;/P&gt;&lt;P&gt;Source IP: 10.10.10.0/24&lt;/P&gt;&lt;P&gt;Destination IP: Any&lt;/P&gt;&lt;P&gt;Destination applications: web-browsing, ssl&lt;/P&gt;&lt;P&gt;Action: Allow&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Source zone: tust&lt;/P&gt;&lt;P&gt;Destination zone: Internet&lt;/P&gt;&lt;P&gt;Source IP: 172.16.0.0/16, 192.168.0.0/16&lt;/P&gt;&lt;P&gt;Destination IP: Any&lt;/P&gt;&lt;P&gt;Destination applications: web-browsing, ssl&lt;/P&gt;&lt;P&gt;Action: Allow&lt;/P&gt;</description>
      <pubDate>Wed, 26 Jul 2017 09:44:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/nat-configuration-for-a-networks-not-connected-to-the-firewall/m-p/168367#M53649</guid>
      <dc:creator>mkopcic</dc:creator>
      <dc:date>2017-07-26T09:44:37Z</dc:date>
    </item>
    <item>
      <title>Re: NAT configuration for a Networks (Not) Connected to the Firewall</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/nat-configuration-for-a-networks-not-connected-to-the-firewall/m-p/169054#M53757</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/8884"&gt;@mkopcic&lt;/a&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;pretty good config&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Your inbound NAT rules, however, are incorrect. NAT zones are determined pre-NAT based on the routing table, so inbound connections to 3.3.3.10 should be internet to internet because 3.3.3.10 also lives on the external interface from the firewall perspective&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;i'd recommend attaching the 3.3.3.10 IP on the external interface (not sure if you did that, the graph doesn't show it) as secondary IP, this makes management a bit easier and prevents accidents, plus you can then use 'dropdown' options where applicable (and will fix bi-directional)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If possible i'd also recommend attaching 2.2.2.0/24 to the external interface and provisioning your public DMZ with private IP addresses, this is a little more secure as you control not only security policy but NAT translation, and this will allow other segments to benefit more easily from this address pool without creating tricky U-Turn NAT because you use an IP that physically belongs to an internal interface on 2 different and unrelated (internet + privdmz) interfaces&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Check out the &lt;A title="Getting Started: Network Address Translation (NAT)" href="https://live.paloaltonetworks.com/t5/Tutorials/Getting-Started-Network-Address-Translation-NAT/ta-p/116340" target="_blank"&gt;Getting Started: Network Address Translation (NAT)&lt;/A&gt; article + tutorial video &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;and the &lt;A title="How to Configure U-Turn NAT" href="https://live.paloaltonetworks.com/t5/Configuration-Articles/How-to-Configure-U-Turn-NAT/ta-p/61889" target="_blank"&gt;How to Configure U-Turn NAT&lt;/A&gt; article + tutorial&lt;/P&gt;</description>
      <pubDate>Mon, 31 Jul 2017 14:34:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/nat-configuration-for-a-networks-not-connected-to-the-firewall/m-p/169054#M53757</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2017-07-31T14:34:20Z</dc:date>
    </item>
    <item>
      <title>Re: NAT configuration for a Networks (Not) Connected to the Firewall</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/nat-configuration-for-a-networks-not-connected-to-the-firewall/m-p/169232#M53786</link>
      <description>&lt;P&gt;Thank you for your suggestions.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You wrote:&lt;/P&gt;&lt;P&gt;"&lt;EM&gt;Your inbound NAT rules, however, are incorrect. NAT zones are determined pre-NAT based on the routing table, so inbound connections to 3.3.3.10 should be internet to internet because 3.3.3.10 also lives on the external interface from the firewall perspective&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;i'd also recommend attaching the 3.3.3.10 IP on the external interface (not sure if you did that, the graph doesn't show it) as secondary IP, this makes management a bit easier and prevents accidents, plus you can then use 'dropdown' options where applicable (and will fix bi-directional)&lt;/EM&gt;"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This configuration just didn't work. After 3-4 hours of troubleshooting and stubbornly following Palo's documents, I quitted and followed my common sense. Few days after we had similar scenario at the customer’s Palo (version 7.1), and colleague first configured Internet for source and destination zones, and that configuration didn’t work. &amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We also tried with secondary IP address on Internet interface and also it didn’t work.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;"&lt;SPAN&gt;&lt;EM&gt;If possible i'd also recommend attaching 2.2.2.0/24 to the external interface and provisioning your public DMZ with private IP addresses, this is a little more secure as you control not only security policy but NAT translation, and this will allow other segments to benefit more easily from this address pool without creating tricky U-Turn NAT because you use an IP that physically belongs to an internal interface on 2 different and unrelated (internet + privdmz) interfaces&lt;/EM&gt;"&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is not an option.&amp;nbsp; In one day all servers from public DMZ will be migrated to private DMZ, but for now design is like that. In my experience, NAT is not security feature (it is just a way to hide private addresses and preserve public). If you open HTTP to the server and don’t harden it, it doesn’t matter if server has public or private IP address. Good rules on FW from dmzs to inside network are much more important. HTTP is&amp;nbsp;UFBP (Universal Firewall Bypass Protocol) &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;This is also example how NAT can be configured in unusual network design.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Kind regrds,&lt;/P&gt;&lt;P&gt;Maja&lt;/P&gt;</description>
      <pubDate>Tue, 01 Aug 2017 07:24:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/nat-configuration-for-a-networks-not-connected-to-the-firewall/m-p/169232#M53786</guid>
      <dc:creator>mkopcic</dc:creator>
      <dc:date>2017-08-01T07:24:50Z</dc:date>
    </item>
  </channel>
</rss>

