<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Add source NAT: Bi-directional NAT breaks in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/add-source-nat-bi-directional-nat-breaks/m-p/7523#M5560</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Chris&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The public IP's of your dmz servers are also identified by the unit as being in the "public" zone, hence your source NAT policy may be taking over any previous nat/no-nat actions.&lt;/P&gt;&lt;P&gt;eg: 192.16.1.10 to 164.67.80.77 equals trust to untrust in the sense of NAT translation&lt;/P&gt;&lt;P&gt;The bi directional rules will have a second implied rule for the inbound traffic "from any ; to untrust ; to ip 164.67.80.x ; translate to 192.16.2.x", allowing both external and internal hosts to NAT to the proper dmz IP&lt;/P&gt;&lt;P&gt;I would guess the new source nat rule is at the top of your policy? if you move it down to the bottom and commit the issue should be resolved&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 02 Sep 2014 09:55:47 GMT</pubDate>
    <dc:creator>reaper</dc:creator>
    <dc:date>2014-09-02T09:55:47Z</dc:date>
    <item>
      <title>Add source NAT: Bi-directional NAT breaks</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/add-source-nat-bi-directional-nat-breaks/m-p/7522#M5559</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. I have three zones: Public, DMZ, Private&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Public interface: bound to 164.67.80.124/26&lt;/P&gt;&lt;P&gt;Private interface: bound to 192.168.1.1/24&lt;/P&gt;&lt;P&gt;DMZ interface: bound to 192.168.2.1/24&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2. I use bi-directional NAT to expose a few of the DMZ machines via their own public IP addresses:&lt;/P&gt;&lt;P&gt;164.67.80.77 &amp;lt;-&amp;gt; 192.168.2.77&lt;/P&gt;&lt;P&gt;164.67.80.78 &amp;lt;-&amp;gt; 192.168.2.78&lt;/P&gt;&lt;P&gt;164.67.80.79 &amp;lt;-&amp;gt; 192.168.2.79&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Example:&lt;/P&gt;&lt;P&gt;Source zone: DMZ&lt;/P&gt;&lt;P&gt;Destination zone: Public&lt;/P&gt;&lt;P&gt;Destination Interface: any&lt;/P&gt;&lt;P&gt;Source Address: 192.168.2.77&lt;/P&gt;&lt;P&gt;Destination Address: any&lt;/P&gt;&lt;P&gt;Service: any&lt;/P&gt;&lt;P&gt;Source Translation: static-ip, 164.67.80.77, bi-directional: yes&lt;/P&gt;&lt;P&gt;Destination Translation: none&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3. I add security policies to allow the DMZ machines to access the internet and be accessed from the internet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;4. None of my interfaces are explicitly bound to 164.67.80.77, 78, or 79.&amp;nbsp; This works due to something called "Proxy ARP" on the public interface (as explained to me in these discussion forums).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;5. I add a "Source NAT" policy with the intention of providing internet access to the Private zone:&lt;/P&gt;&lt;P&gt;Source zone: Private&lt;/P&gt;&lt;P&gt;Destination zone: Public&lt;/P&gt;&lt;P&gt;Destination Interface: any&lt;/P&gt;&lt;P&gt;Source Address: any&lt;/P&gt;&lt;P&gt;Destination Address: any&lt;/P&gt;&lt;P&gt;Service: any&lt;/P&gt;&lt;P&gt;Source Translation: dynamic-ip-and-port, 164.67.80.124&lt;/P&gt;&lt;P&gt;Destination Translation: none&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;6. I don't yet add a security policy to allow Private machines to the Public zone.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;7. After step 5, the communication between the DMZ and Public stops.&amp;nbsp; Internet cannot access the DMZ machines via the public IP addresses and the DMZ cannot access the internet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Question: Why does the DMZ stop working when I perform step 5?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Chris&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 02 Sep 2014 06:44:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/add-source-nat-bi-directional-nat-breaks/m-p/7522#M5559</guid>
      <dc:creator>cstech</dc:creator>
      <dc:date>2014-09-02T06:44:26Z</dc:date>
    </item>
    <item>
      <title>Re: Add source NAT: Bi-directional NAT breaks</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/add-source-nat-bi-directional-nat-breaks/m-p/7523#M5560</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Chris&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The public IP's of your dmz servers are also identified by the unit as being in the "public" zone, hence your source NAT policy may be taking over any previous nat/no-nat actions.&lt;/P&gt;&lt;P&gt;eg: 192.16.1.10 to 164.67.80.77 equals trust to untrust in the sense of NAT translation&lt;/P&gt;&lt;P&gt;The bi directional rules will have a second implied rule for the inbound traffic "from any ; to untrust ; to ip 164.67.80.x ; translate to 192.16.2.x", allowing both external and internal hosts to NAT to the proper dmz IP&lt;/P&gt;&lt;P&gt;I would guess the new source nat rule is at the top of your policy? if you move it down to the bottom and commit the issue should be resolved&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 02 Sep 2014 09:55:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/add-source-nat-bi-directional-nat-breaks/m-p/7523#M5560</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2014-09-02T09:55:47Z</dc:date>
    </item>
    <item>
      <title>Re: Add source NAT: Bi-directional NAT breaks</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/add-source-nat-bi-directional-nat-breaks/m-p/7524#M5561</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;tpiens,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you for your reply.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Re your comment "192.16.1.10 to 164.67.80.77 equals trust to untrust in the sense of NAT translation" thank you I would have been unsure of that if/when I thought about it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Re the second implied rule for the bi-directional NAT policy, I figured something like that must be happening.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Re the position of the source NAT rule that breaks my DMZ: Unfortunately the new source NAT rule is and has always been at the bottom of the list. &lt;img id="smileysad" class="emoticon emoticon-smileysad" src="https://live.paloaltonetworks.com/i/smilies/16x16_smiley-sad.png" alt="Smiley Sad" title="Smiley Sad" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there anything is unusual about my setup (I thought it was straight forward)?&amp;nbsp; If nothing is unusual about my setup, then I will have to look for something really odd on my network like a cable plugged into the wrong port etc.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you again,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Chris&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 02 Sep 2014 16:55:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/add-source-nat-bi-directional-nat-breaks/m-p/7524#M5561</guid>
      <dc:creator>cstech</dc:creator>
      <dc:date>2014-09-02T16:55:08Z</dc:date>
    </item>
    <item>
      <title>Re: Add source NAT: Bi-directional NAT breaks</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/add-source-nat-bi-directional-nat-breaks/m-p/7525#M5562</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Chris&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The setup in itself is straight forward but there can always be nuances missing, would you mind checking your sessions, there should be an indication of what NAT is being applied by looking at the c2s/s2c flows&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I usually recommend configuring the bidirectional NAT rules as 2 separate rules as this allows a little more visibility in what has been configured exactly. Are you accessing your DMZ servers on their physical IP's or on the public ones ? &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 02 Sep 2014 21:55:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/add-source-nat-bi-directional-nat-breaks/m-p/7525#M5562</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2014-09-02T21:55:01Z</dc:date>
    </item>
    <item>
      <title>Re: Add source NAT: Bi-directional NAT breaks</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/add-source-nat-bi-directional-nat-breaks/m-p/7526#M5563</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;tpiens,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you again for your help.&amp;nbsp; I am embarrassed to say that I have never "checked my sessions" but I am going to do that now.&amp;nbsp; I will split the bi-directional NAT policy and hopefully in the process will discover my error.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Chris&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 02 Sep 2014 22:15:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/add-source-nat-bi-directional-nat-breaks/m-p/7526#M5563</guid>
      <dc:creator>cstech</dc:creator>
      <dc:date>2014-09-02T22:15:27Z</dc:date>
    </item>
    <item>
      <title>Re: Add source NAT: Bi-directional NAT breaks</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/add-source-nat-bi-directional-nat-breaks/m-p/7527#M5564</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;HI Chris&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Don't sweat it, that means everything's been going smoothly &lt;img id="smileywink" class="emoticon emoticon-smileywink" src="https://live.paloaltonetworks.com/i/smilies/16x16_smiley-wink.png" alt="Smiley Wink" title="Smiley Wink" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the sessions can be seen either through the session browser under the monitor tab in the GUI, or through the &amp;gt;show session all / &amp;gt;show session id ## commands in cli and look sort of like this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P class="p1"&gt;admin@PA-3020-241&amp;gt; show&amp;nbsp; session&amp;nbsp; id 32002&lt;/P&gt;&lt;P class="p2"&gt;&lt;/P&gt;&lt;P class="p1"&gt;Session&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 32002&lt;/P&gt;&lt;P class="p2"&gt;&lt;/P&gt;&lt;P class="p1"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; c2s flow:&lt;/P&gt;&lt;P class="p1"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; source:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.0.21 [v1-trust]&lt;/P&gt;&lt;P class="p1"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 4.2.2.2&lt;/P&gt;&lt;P class="p1"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; proto:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1&lt;/P&gt;&lt;P class="p1"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; sport:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1024&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dport:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 15104&lt;/P&gt;&lt;P class="p1"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; state:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; INIT&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; type:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; FLOW&lt;/P&gt;&lt;P class="p1"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src user:&amp;nbsp;&amp;nbsp;&amp;nbsp; unknown&lt;/P&gt;&lt;P class="p1"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst user:&amp;nbsp;&amp;nbsp;&amp;nbsp; unknown&lt;/P&gt;&lt;P class="p2"&gt;&lt;/P&gt;&lt;P class="p1"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; s2c flow:&lt;/P&gt;&lt;P class="p1"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; source:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 4.2.2.2 [v1-untrust]&lt;/P&gt;&lt;P class="p1"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 172.16.31.241&lt;/P&gt;&lt;P class="p1"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; proto:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1&lt;/P&gt;&lt;P class="p1"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; sport:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 15104&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dport:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1024&lt;/P&gt;&lt;P class="p1"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; state:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; INIT&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; type:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; FLOW&lt;/P&gt;&lt;P class="p1"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; src user:&amp;nbsp;&amp;nbsp;&amp;nbsp; unknown&lt;/P&gt;&lt;P class="p1"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; dst user:&amp;nbsp;&amp;nbsp;&amp;nbsp; unknown&lt;/P&gt;&lt;P class="p1"&gt;&lt;/P&gt;&lt;P class="p1"&gt;in the c2s you see your original ip's as the client tries to reach them, in the s2c you see the expected returning ip's. in a normal hide-NAT setup only the dst would be different as this is now an external ip in the firewall untrust interface&lt;/P&gt;&lt;P class="p1"&gt;In your case I'd expect the dst would need to be an internal IP and source the dmz server physical ip. if this is not the case one of your nat rules is doing something unexpected&lt;/P&gt;&lt;P class="p1"&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;/P&gt;&lt;P class="p1"&gt;further down the session details you can see exactly which NAT rule is being hit:&lt;/P&gt;&lt;P class="p1"&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;/P&gt;&lt;P class="p1"&gt;start time&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Wed Sep&amp;nbsp; 3 00:24:19 2014&lt;/P&gt;&lt;P class="p1"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; timeout&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 6 sec&lt;/P&gt;&lt;P class="p1"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; total byte count(c2s)&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 74&lt;/P&gt;&lt;P class="p1"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; total byte count(s2c)&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 74&lt;/P&gt;&lt;P class="p1"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; layer7 packet count(c2s)&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 1&lt;/P&gt;&lt;P class="p1"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; layer7 packet count(s2c)&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : 1&lt;/P&gt;&lt;P class="p1"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; vsys&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : vsys1&lt;/P&gt;&lt;P class="p1"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; application&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : ping &lt;/P&gt;&lt;P class="p1"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; rule&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : out&lt;/P&gt;&lt;P class="p1"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; session to be logged at end&amp;nbsp;&amp;nbsp; : True&lt;/P&gt;&lt;P class="p1"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; session in session ager&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : False&lt;/P&gt;&lt;P class="p1"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; session synced from HA peer&amp;nbsp;&amp;nbsp; : False&lt;/P&gt;&lt;P class="p1"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; address/port translation&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : source + destination&lt;/P&gt;&lt;P class="p1"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;STRONG&gt;nat-rule&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : hidenat(vsys1)&lt;/STRONG&gt;&lt;/P&gt;&lt;P class="p1"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; layer7 processing&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : enabled&lt;/P&gt;&lt;P class="p1"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; URL filtering enabled&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : False&lt;/P&gt;&lt;P class="p1"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; session via syn-cookies&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : False&lt;/P&gt;&lt;P class="p1"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; session terminated on host&amp;nbsp;&amp;nbsp;&amp;nbsp; : False&lt;/P&gt;&lt;P class="p1"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; session traverses tunnel&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : False&lt;/P&gt;&lt;P class="p1"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; captive portal session&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : False&lt;/P&gt;&lt;P class="p1"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ingress interface&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : ethernet1/2&lt;/P&gt;&lt;P class="p1"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; egress interface&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : ethernet1/1&lt;/P&gt;&lt;P class="p1"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; session QoS rule&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : N/A (class 4)&lt;/P&gt;&lt;P class="p1"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; tracker stage firewall&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : Aged out&lt;/P&gt;&lt;P class="p1"&gt;&lt;/P&gt;&lt;P class="p1"&gt;&lt;/P&gt;&lt;P class="p1"&gt;hope this helps &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://live.paloaltonetworks.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;P class="p1"&gt;Tom&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 02 Sep 2014 22:31:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/add-source-nat-bi-directional-nat-breaks/m-p/7527#M5564</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2014-09-02T22:31:58Z</dc:date>
    </item>
    <item>
      <title>Re: Add source NAT: Bi-directional NAT breaks</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/add-source-nat-bi-directional-nat-breaks/m-p/7528#M5565</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I do not know why it's happening, but what I believe should be Public-&amp;gt;Public traffic is being dropped.&amp;nbsp; I can see the data is dropped by the PAN by inspecting the drop log from the packet capture.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Eager to understand why the traffic is dropped, I added four security policies: Allow public-&amp;gt;public, allow DMZ-&amp;gt;DMZ, allow Private-&amp;gt;Private, Deny All-&amp;gt;All.&amp;nbsp; Every one of my security policies has logging turned on.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Would you believe that the PAN is dropping packets (as evidenced in the packet capture drop log) but there is no trace of it in the Traffic Log?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have seen this before: it happens for example when a PAN interface drops ping due to the management profile.&amp;nbsp; Not sure why it is happening in my case though.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Besides adding a "catch all" deny all-&amp;gt;all, is there another way to get the drops to appear in the traffic log?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Chris&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 03 Sep 2014 05:04:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/add-source-nat-bi-directional-nat-breaks/m-p/7528#M5565</guid>
      <dc:creator>cstech</dc:creator>
      <dc:date>2014-09-03T05:04:25Z</dc:date>
    </item>
    <item>
      <title>Re: Add source NAT: Bi-directional NAT breaks</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/add-source-nat-bi-directional-nat-breaks/m-p/7529#M5566</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;BTW, there is no session log for this traffic... presumably because no session can be established.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 03 Sep 2014 05:05:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/add-source-nat-bi-directional-nat-breaks/m-p/7529#M5566</guid>
      <dc:creator>cstech</dc:creator>
      <dc:date>2014-09-03T05:05:05Z</dc:date>
    </item>
    <item>
      <title>Re: Add source NAT: Bi-directional NAT breaks</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/add-source-nat-bi-directional-nat-breaks/m-p/7530#M5567</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Another way traffic can be dropped but not appear in the traffic log is if the next hop is unavailable...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 03 Sep 2014 07:34:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/add-source-nat-bi-directional-nat-breaks/m-p/7530#M5567</guid>
      <dc:creator>cstech</dc:creator>
      <dc:date>2014-09-03T07:34:07Z</dc:date>
    </item>
    <item>
      <title>Re: Add source NAT: Bi-directional NAT breaks</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/add-source-nat-bi-directional-nat-breaks/m-p/7531#M5568</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Chris&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;you could leverage packet-diag filters and global counters to get an indication of what's happening as well, you can also combine with pcaps to see what is coming into and what is leaving the firewall&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/docs/DOC-1506"&gt;Packet Capture, Debug Flow-basic and Counter Commands&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;it sounds like you may be getting a zone issue or LAND attack due to NAT (source nat an internal ip to an untrust interface ip with destination untrust interface ip) and counters may help shed light&lt;/P&gt;&lt;P&gt;It may help adding specific nat rules for the dmz public addresses from source zone trust&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;so if you go ahead and split up your nat rules there would be 3 sets per server:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;untrust to untrust; any to public ip; destination nat to physical ip&lt;/P&gt;&lt;P&gt;trust to untrust; any to public ip; destination nat to physical ip&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; (this is a half-U-turn which is pretty common if you're communicating to internal resources via their public ip&amp;nbsp; &lt;A href="https://live.paloaltonetworks.com/docs/DOC-1678"&gt;How to Configure U-Turn NAT&lt;/A&gt;)&lt;/P&gt;&lt;P&gt;dmz to untrust; physical ip to any; source nat to public ip&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and then at the end your hide nat&lt;/P&gt;&lt;P&gt;trust to untrust; any to any; source nat to interface ip&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 03 Sep 2014 09:36:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/add-source-nat-bi-directional-nat-breaks/m-p/7531#M5568</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2014-09-03T09:36:16Z</dc:date>
    </item>
    <item>
      <title>Re: Add source NAT: Bi-directional NAT breaks</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/add-source-nat-bi-directional-nat-breaks/m-p/7532#M5569</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you Tom for your help with this.&amp;nbsp; I solved the problem.&amp;nbsp; In my original post I described my source NAT rule's source translation:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"Source Translation: dynamic-ip-and-port, 164.67.80.124"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What I neglected to include in the post was the subnet mask.&amp;nbsp; I used the same address object in the NAT rule that I used for the interface: 164.67.80.124/26.&amp;nbsp; This was a mistake.&amp;nbsp; I should have created a second address object for the IP address with a subnet mask of /32: 164.67.80.124/32.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This doesn't explain all the problems I described in this post.&amp;nbsp; And unfortunately for me (or fortunately depending on your viewpoint) some of them have gone away so I cannot examine them anymore.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyhow, thank you again for your advice and introducing me to the LAND attack which is a source of packet drops that show up only in the counters and not in the logs.&amp;nbsp; And thank you for pointing out that I can can more fine grained control over my NAT rules by splitting the bi-directional rules.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Chris&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Sep 2014 16:46:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/add-source-nat-bi-directional-nat-breaks/m-p/7532#M5569</guid>
      <dc:creator>cstech</dc:creator>
      <dc:date>2014-09-04T16:46:55Z</dc:date>
    </item>
  </channel>
</rss>

