<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic NAT and security policies in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/nat-and-security-policies/m-p/206978#M60721</link>
    <description>&lt;P&gt;Hi all.&amp;nbsp; I am trying to setup a ADFS environment in our network.&amp;nbsp; The actual ADFS server is located in the internal LAN, and the ADFS Web Application proxy is reside in the DMZ; internal LAN and DMZ is in a different VLAN. &amp;nbsp;&lt;/P&gt;&lt;P&gt;The goal is to send user authentications (orginiated from the Internet) to the ADFS web application proxy, and from there it communicate with the ADFS server in the internal LAN over port 443.&lt;/P&gt;&lt;P&gt;I've created the NAT rule in the PA firewall, and pointed it to the ADFS WAP server.&lt;/P&gt;&lt;P&gt;Also created the security policies to allow port 443 communication between the ADFS WAP and the ADFS server.&lt;/P&gt;&lt;P&gt;However, this where I am having the problem.&lt;/P&gt;&lt;P&gt;The ADFS WAP and the ADFS server failed to communicate with each other over port 443.&amp;nbsp; Odd thing is this setup worked fine initially, and then suddenly stopped working.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is my 3 security policy that I've created :&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Rule #1&lt;/P&gt;&lt;P&gt;Source = L3-Untrust&lt;/P&gt;&lt;P&gt;User = Any&lt;/P&gt;&lt;P&gt;Destination Zone = L3-DMZ&lt;/P&gt;&lt;P&gt;Destination Address = public IP&lt;/P&gt;&lt;P&gt;Applicatoin = ssl&lt;/P&gt;&lt;P&gt;Service = application-default&lt;/P&gt;&lt;P&gt;Action = allow&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Rule #2&lt;/P&gt;&lt;P&gt;Source = L3-Trust&lt;/P&gt;&lt;P&gt;User = Any&lt;/P&gt;&lt;P&gt;Destination Zone = L3-DMZ&lt;/P&gt;&lt;P&gt;Destination Address = public IP&lt;/P&gt;&lt;P&gt;Application = ssl, ms-rdp, web-browsing&lt;/P&gt;&lt;P&gt;Service = application-default&lt;/P&gt;&lt;P&gt;Action = Allow&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Rule #3&lt;/P&gt;&lt;P&gt;Source = L3-DMZ&lt;BR /&gt;Source Address = private IP of the server, also the public IP for the server&lt;/P&gt;&lt;P&gt;User = Any&lt;/P&gt;&lt;P&gt;Destination Zone = L3-Trust&lt;/P&gt;&lt;P&gt;Desination Address = IP of the ADFS server&lt;/P&gt;&lt;P&gt;Application = ssl&lt;/P&gt;&lt;P&gt;Service = application-default&lt;/P&gt;&lt;P&gt;Action = allow&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Am I missing anything here?&amp;nbsp; Thank you.&amp;nbsp;&lt;BR /&gt;Note: I am able to RDP to the ADFS WAP server from the internal network.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 22 Mar 2018 18:37:21 GMT</pubDate>
    <dc:creator>UXPSystems</dc:creator>
    <dc:date>2018-03-22T18:37:21Z</dc:date>
    <item>
      <title>NAT and security policies</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/nat-and-security-policies/m-p/206978#M60721</link>
      <description>&lt;P&gt;Hi all.&amp;nbsp; I am trying to setup a ADFS environment in our network.&amp;nbsp; The actual ADFS server is located in the internal LAN, and the ADFS Web Application proxy is reside in the DMZ; internal LAN and DMZ is in a different VLAN. &amp;nbsp;&lt;/P&gt;&lt;P&gt;The goal is to send user authentications (orginiated from the Internet) to the ADFS web application proxy, and from there it communicate with the ADFS server in the internal LAN over port 443.&lt;/P&gt;&lt;P&gt;I've created the NAT rule in the PA firewall, and pointed it to the ADFS WAP server.&lt;/P&gt;&lt;P&gt;Also created the security policies to allow port 443 communication between the ADFS WAP and the ADFS server.&lt;/P&gt;&lt;P&gt;However, this where I am having the problem.&lt;/P&gt;&lt;P&gt;The ADFS WAP and the ADFS server failed to communicate with each other over port 443.&amp;nbsp; Odd thing is this setup worked fine initially, and then suddenly stopped working.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is my 3 security policy that I've created :&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Rule #1&lt;/P&gt;&lt;P&gt;Source = L3-Untrust&lt;/P&gt;&lt;P&gt;User = Any&lt;/P&gt;&lt;P&gt;Destination Zone = L3-DMZ&lt;/P&gt;&lt;P&gt;Destination Address = public IP&lt;/P&gt;&lt;P&gt;Applicatoin = ssl&lt;/P&gt;&lt;P&gt;Service = application-default&lt;/P&gt;&lt;P&gt;Action = allow&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Rule #2&lt;/P&gt;&lt;P&gt;Source = L3-Trust&lt;/P&gt;&lt;P&gt;User = Any&lt;/P&gt;&lt;P&gt;Destination Zone = L3-DMZ&lt;/P&gt;&lt;P&gt;Destination Address = public IP&lt;/P&gt;&lt;P&gt;Application = ssl, ms-rdp, web-browsing&lt;/P&gt;&lt;P&gt;Service = application-default&lt;/P&gt;&lt;P&gt;Action = Allow&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Rule #3&lt;/P&gt;&lt;P&gt;Source = L3-DMZ&lt;BR /&gt;Source Address = private IP of the server, also the public IP for the server&lt;/P&gt;&lt;P&gt;User = Any&lt;/P&gt;&lt;P&gt;Destination Zone = L3-Trust&lt;/P&gt;&lt;P&gt;Desination Address = IP of the ADFS server&lt;/P&gt;&lt;P&gt;Application = ssl&lt;/P&gt;&lt;P&gt;Service = application-default&lt;/P&gt;&lt;P&gt;Action = allow&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Am I missing anything here?&amp;nbsp; Thank you.&amp;nbsp;&lt;BR /&gt;Note: I am able to RDP to the ADFS WAP server from the internal network.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 22 Mar 2018 18:37:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/nat-and-security-policies/m-p/206978#M60721</guid>
      <dc:creator>UXPSystems</dc:creator>
      <dc:date>2018-03-22T18:37:21Z</dc:date>
    </item>
    <item>
      <title>Re: NAT and security policies</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/nat-and-security-policies/m-p/207033#M60729</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;The policies look ok to me for what you are descvribing. Are you seeing deny's in the logs of the PAN? The only cleanup I would probably make is in policy #3 remove the public IP from it, it does not need to be there from what I can see. Also checkthe traffic and make sure its hitting the proper NAT rule from your&amp;nbsp;Source = L3-Untrust to&amp;nbsp;Destination Zone = L3-DMZ.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Thu, 22 Mar 2018 22:13:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/nat-and-security-policies/m-p/207033#M60729</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2018-03-22T22:13:12Z</dc:date>
    </item>
    <item>
      <title>Re: NAT and security policies</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/nat-and-security-policies/m-p/207040#M60734</link>
      <description>&lt;P&gt;Can you show your NAT policies also?&lt;/P&gt;</description>
      <pubDate>Thu, 22 Mar 2018 22:40:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/nat-and-security-policies/m-p/207040#M60734</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2018-03-22T22:40:09Z</dc:date>
    </item>
    <item>
      <title>Re: NAT and security policies</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/nat-and-security-policies/m-p/207121#M60753</link>
      <description>&lt;P&gt;Hi.&amp;nbsp; Here is my two NAT policy for this setup&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;NAT #1&lt;/P&gt;&lt;P&gt;Source Zone = L3-Untrust&lt;BR /&gt;Destination Zone = L3-Untrust&lt;/P&gt;&lt;P&gt;Detination Interface = Any&lt;BR /&gt;Source Address = Any&lt;BR /&gt;Desination Address = public IP&lt;BR /&gt;Service = Any&lt;/P&gt;&lt;P&gt;Source Translation = None&lt;/P&gt;&lt;P&gt;Destination Translation = private IP of the ADFS WAP server&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;NAT Rule #2 (u-turn):&lt;/P&gt;&lt;P&gt;Source Zone = L3-Trust&lt;BR /&gt;Destination Zone = L3-Untrust&lt;/P&gt;&lt;P&gt;Destination Interface = Any&lt;/P&gt;&lt;P&gt;Source Address = Any&lt;/P&gt;&lt;P&gt;Destination Address = public IP&lt;/P&gt;&lt;P&gt;Service = Any&lt;/P&gt;&lt;P&gt;Source Translation = dynamic-ip-and-port; ethernet 1/1, public IP&lt;BR /&gt;Destination Translation = private IP of the ADFS WAP server&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;From the traffic log, I can see the ADFS WAP server is trying to access the internal ADFS server over port 443, but looks like nothing is return from the internal ADFS server.&amp;nbsp; The session end due to aged out.&amp;nbsp; I don't see any deny action.&amp;nbsp; The traffic is allowed as far I can see from the PAN traffic log, but seems the internal ADFS server is not responding for somehow.&amp;nbsp; I've verified port 443 is opened on the ADFS server's windows firewall on all the profile.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Fri, 23 Mar 2018 13:04:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/nat-and-security-policies/m-p/207121#M60753</guid>
      <dc:creator>UXPSystems</dc:creator>
      <dc:date>2018-03-23T13:04:23Z</dc:date>
    </item>
    <item>
      <title>Re: NAT and security policies</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/nat-and-security-policies/m-p/207154#M60763</link>
      <description>&lt;P&gt;Every session has "Packets sent" and "Packets received" fields in the log.&lt;/P&gt;&lt;P&gt;If packets received is 0 then&amp;nbsp;&lt;SPAN&gt;ADFS WAP server does not reply even to TCP 3 way handshake so most likely Windows firewall.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;You probably don't have to do source NAT in #2 because source is in L3-Trust and destination is in L3-DMZ.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;You need to do DNAT and SNAT usually when souce and destination are in same IP subnet but source talks to destination through public IP.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;You can test if WAP server replies to TCP SYN if you try to initiate SSH from firewall. Well SSH would not work as it is Windows server but TCP 3 way handshake should work regardless.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Example:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;gt;&amp;nbsp;ssh source Fw-L3-DMZ-IP&amp;nbsp;port 443 host&amp;nbsp;WAP-IP&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;gt;&amp;nbsp;ssh source 192.168.1.1 port 443 host 192.168.1.20&lt;BR /&gt;&lt;BR /&gt;If log shows reply packets then you can change source to fw public ip (currently you snat with nat #2 behind fw public IP) or fw L3-Trust-IP.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 23 Mar 2018 15:18:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/nat-and-security-policies/m-p/207154#M60763</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2018-03-23T15:18:39Z</dc:date>
    </item>
    <item>
      <title>Re: NAT and security policies</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/nat-and-security-policies/m-p/207161#M60764</link>
      <description>&lt;P&gt;Additionally, can you reach the WAP server from another host on L3-Trust?&lt;/P&gt;&lt;P&gt;Are there any other routers between the WAP server and the firewall, or are they on the same L2 network?&lt;/P&gt;&lt;P&gt;Can you perform a packet capture on the WAP server or the switch it is connected to in order to verify the traffic is reaching it?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The rules as they are shown look like the traffic should function so I suspect the failure is elsewhere, we just need to figure out where.&lt;/P&gt;</description>
      <pubDate>Fri, 23 Mar 2018 16:12:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/nat-and-security-policies/m-p/207161#M60764</guid>
      <dc:creator>JoeAndreini</dc:creator>
      <dc:date>2018-03-23T16:12:04Z</dc:date>
    </item>
  </channel>
</rss>

