<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic NAT Security rule in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/nat-security-rule/m-p/194144#M58123</link>
    <description>&lt;P&gt;I'm used to working on Cisco ASA and I'm having a hard time understanding why the security rule states Untrust-L3 for both the source and destination zone. Typically wouldn't that be Untrust-L3 to DMZ? Is there a specific reason for this behavior?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screen Shot 2018-01-06 at 6.57.18 PM.png" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/13161i5E188258FCB559DE/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Screen Shot 2018-01-06 at 6.57.18 PM.png" alt="Screen Shot 2018-01-06 at 6.57.18 PM.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sun, 07 Jan 2018 00:03:45 GMT</pubDate>
    <dc:creator>Glitchen</dc:creator>
    <dc:date>2018-01-07T00:03:45Z</dc:date>
    <item>
      <title>NAT Security rule</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/nat-security-rule/m-p/194144#M58123</link>
      <description>&lt;P&gt;I'm used to working on Cisco ASA and I'm having a hard time understanding why the security rule states Untrust-L3 for both the source and destination zone. Typically wouldn't that be Untrust-L3 to DMZ? Is there a specific reason for this behavior?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screen Shot 2018-01-06 at 6.57.18 PM.png" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/13161i5E188258FCB559DE/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Screen Shot 2018-01-06 at 6.57.18 PM.png" alt="Screen Shot 2018-01-06 at 6.57.18 PM.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 07 Jan 2018 00:03:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/nat-security-rule/m-p/194144#M58123</guid>
      <dc:creator>Glitchen</dc:creator>
      <dc:date>2018-01-07T00:03:45Z</dc:date>
    </item>
    <item>
      <title>Re: NAT Security rule</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/nat-security-rule/m-p/194259#M58136</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/78323"&gt;@Glitchen&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This is by design.&lt;/P&gt;
&lt;P&gt;Check out the following articles that can be very helpful on this topic :&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/Learning-Articles/Packet-Flow-Sequence-in-PAN-OS/ta-p/56081" target="_blank"&gt;https://live.paloaltonetworks.com/t5/Learning-Articles/Packet-Flow-Sequence-in-PAN-OS/ta-p/56081&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/Tutorials/Getting-Started-Network-Address-Translation-NAT/ta-p/116340" target="_blank"&gt;https://live.paloaltonetworks.com/t5/Tutorials/Getting-Started-Network-Address-Translation-NAT/ta-p/116340&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Cheers !&lt;/P&gt;
&lt;P&gt;-Kiwi.&lt;/P&gt;</description>
      <pubDate>Mon, 08 Jan 2018 08:56:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/nat-security-rule/m-p/194259#M58136</guid>
      <dc:creator>kiwi</dc:creator>
      <dc:date>2018-01-08T08:56:20Z</dc:date>
    </item>
    <item>
      <title>Re: NAT Security rule</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/nat-security-rule/m-p/194271#M58146</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/78323"&gt;@Glitchen&lt;/a&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;When a new packet arrives on an interface, the firewall needs to determine it's source and destination zones, these are determined by using the routing table.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So when a packet arrives from the internet, both it's source as destination IPs will be located in the untrust zone: they both follow the default gateway when performing a route lookup&lt;/P&gt;
&lt;P&gt;(eg. packet from 193.51.100.1 to 203.0.113.1, both ip will resolve via 0.0.0.0/0 to the untrust zone)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Next, the NAT policy is checked to see if this packet matches something, and if it does, which zone the final destination is located in, this is where, post translation, it is deterined that security wise the (final) destination is dmz (eg. 203.0.113.1 translates to 10.0.0.1, which is routed to the dmz interface).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The next step is to verify the security policy for matches to see if the packet is going to be allowed or not. Since we now know the final destination is DMZ, you can build a security policy to allow from untrust to dmz&lt;/P&gt;</description>
      <pubDate>Mon, 08 Jan 2018 09:56:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/nat-security-rule/m-p/194271#M58146</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2018-01-08T09:56:47Z</dc:date>
    </item>
  </channel>
</rss>

