<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: u-turn - why? in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/u-turn-why/m-p/210410#M61461</link>
    <description>&lt;P&gt;You're confusing double-NAT with U-Turn NAT.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Double-NAT&lt;/STRONG&gt; means you translate the source IP address *and* the destination IP addres.&amp;nbsp; This is needed for crossing zones and subnets where you don't have direct routing for private IP addresses enabled.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Client has 192.168.0.0/24 subnet.&amp;nbsp; Server has 10.0.0.2 IP.&amp;nbsp; You have public IP 1.2.3.4 for your outgoing client NAT for Internet access.&amp;nbsp; You have 1.2.3.5 for your server's public IP.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So you need to create a NAT Policy that takes traffic from 192.168.0.0/24 to 1.2.3.5 and translates the source IP to 1.2.3.4.&amp;nbsp; *AND*, in the same policy, also translates the destination IP to 10.10.10.2.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;And there's a few other NAT/Security Policies needed to make that work.&amp;nbsp; But the above double-NAT rule is the important one.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This way, the clients only every connect to the public IP, and the server only ever sees the public IP of the clients, and everything is handled nicely through the normal routing tables.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;U-Turn NAT&lt;/STRONG&gt; also means you translate the source IP and the destination IP, but is used for sending traffic back to the source zone and to the same subnet as the client.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Client has 192.168.0.0/24 subnet.&amp;nbsp; Server has&amp;nbsp;192.168.0.2 IP.&amp;nbsp; You have public IP 1.2.3.4 for your outgoing client NAT for Internet access.&amp;nbsp; You have 1.2.3.5 for your server's public IP.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So you need to create a NAT policy that takes traffic from 192.168.0.0/24 to 1.2.3.5 and translatest the source IP to 1.2.3.4 *AND* translates the destination IP to 192.168.0.2.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;And there's a few other NAT/Security Policies needed to make the traffic work.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This way, the clients only ever connect to the server's public IP, and the server only ever sees the public IP for the clients, and all the traffic is handled via the normal routing tables on the server.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;However&lt;/STRONG&gt;, a much nicer solution to the U-Turn NAT is split-DNS, or DNS Views (in BIND).&amp;nbsp; When a client on the private network does a DNS query for my.server.com, it gets the private IP of the server returned.&amp;nbsp; If a device on the Internet does a DNS query for my.server.com, it gets the public IP of the server returned.&amp;nbsp; That way, local traffic never goes through the firewall at all.&lt;/P&gt;</description>
    <pubDate>Mon, 16 Apr 2018 17:51:55 GMT</pubDate>
    <dc:creator>fjwcash</dc:creator>
    <dc:date>2018-04-16T17:51:55Z</dc:date>
    <item>
      <title>u-turn - why?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/u-turn-why/m-p/208767#M61085</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;i'm moving complex configuration from Juniper's ISG2000 (ScreenOS) to PA-5220 and i faced a problem with internal servers (in DMZ zone) which should be available for everyone (including our own employees) on public IP addresses.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;On ScreenOS it was simple:&lt;/P&gt;&lt;P&gt;Created MIP/VIP object (server-public-ip -&amp;gt; server-internal-ip)&lt;/P&gt;&lt;P&gt;1st rule from trust any to untrust any permit with source NAT enabled&lt;/P&gt;&lt;P&gt;2nd rule from untrust any to dmz mip/vip-object permit&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When i started moving this setup to PA i read about something like U-Turn and i got shocked why something like that is necessary: to setup special NAT for EVERY internal vlan/subinterface, which both translates source and destination address... Imagine you've got 100 vlans/subinterfaces and 50 servers and you have to set u-turn for all of them (or am i missing something?)...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So i setup configuration like this and it WORKS. I'm PA newbie so i would like to hear comments what's wrong with this approach since u-turn is recommended, not this solution.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Situation:&lt;/P&gt;&lt;P&gt;DMZ interface: 172.18.0.254/24&lt;/P&gt;&lt;P&gt;Server internal: 172.18.0.82&lt;/P&gt;&lt;P&gt;Server external: 200.200.200.200&lt;/P&gt;&lt;P&gt;Untrust interface: 200.200.200.254/24&lt;/P&gt;&lt;P&gt;Workstation in Trust: 10.0.0.1&lt;/P&gt;&lt;P&gt;Interface in Trust: 10.0.0.254/24&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;NAT1:&lt;/P&gt;&lt;P&gt;source zone: DMZ&lt;/P&gt;&lt;P&gt;destination zone: Untrust&amp;nbsp;&lt;/P&gt;&lt;P&gt;source address: 172.18.0.82&lt;/P&gt;&lt;P&gt;destination address: any&lt;/P&gt;&lt;P&gt;source translation: static-ip 200.200.200.200&amp;nbsp; bidirectional: yes&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;NAT2 (general)&lt;/P&gt;&lt;P&gt;source zone: Trust&lt;/P&gt;&lt;P&gt;destination zone: Untrust&amp;nbsp;&lt;/P&gt;&lt;P&gt;source address: any&lt;/P&gt;&lt;P&gt;destination address: any&lt;/P&gt;&lt;P&gt;source translation: dynamic-ip-and-port 200.200.200.199&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;security policy1:&lt;/P&gt;&lt;P&gt;source zone: any&lt;/P&gt;&lt;P&gt;source address: any&lt;/P&gt;&lt;P&gt;destination zone: dmz&lt;/P&gt;&lt;P&gt;destination address: 200.200.200.200&lt;/P&gt;&lt;P&gt;service: any&lt;/P&gt;&lt;P&gt;action: allow&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;security policy2:&lt;/P&gt;&lt;P&gt;source zone: any&lt;/P&gt;&lt;P&gt;source address: any&lt;/P&gt;&lt;P&gt;destination zone: Untrust&lt;/P&gt;&lt;P&gt;destination address: 200.200.200.200&amp;nbsp;&lt;/P&gt;&lt;P&gt;service: any&lt;/P&gt;&lt;P&gt;action: allow&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;security policy3 (general):&lt;/P&gt;&lt;P&gt;source zone: Trust&lt;/P&gt;&lt;P&gt;source address:&amp;nbsp;&lt;SPAN&gt;10.0.0.0/24&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;destination zone: Untrust&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;destination address: any&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;service: any&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;action: allow&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;That's it. Workstation in Trust zone (eg. 10.0.0.1) access server on IP address 200.200.200.200.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Moreover, it doesn't matter how many internal zones/subinterfaces(vlans) you have, all of them will have access to server in DMZ using it's public IP address. There's no need to add additional NAT for u-turns.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Ofcourse it's also possible for one-way destination NAT:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;source zone: any&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;destination zone: untrust&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;source address: any&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;destination address: 200.200.200.200&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;destination translation: 172.18.0.82&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;What's wrong with this approach?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Regards,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Marcin&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 04 Apr 2018 15:39:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/u-turn-why/m-p/208767#M61085</guid>
      <dc:creator>MarcinR</dc:creator>
      <dc:date>2018-04-04T15:39:30Z</dc:date>
    </item>
    <item>
      <title>Re: u-turn - why?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/u-turn-why/m-p/208786#M61087</link>
      <description>&lt;P&gt;I had to setup u-turn for webmail access on our guest wifi network. The reason is because they are&amp;nbsp;segregated from our internal network they use public DNS to go out and query the IP and get the public IP for e-mail rather than the internal. Then when the client goes out to this IP the internet would send it right back in the same connection and come back in. By default routers do not like to receive traffic that they send out the same interface. So the U-turn basically just tells the DNS query to use the&amp;nbsp;DMZ IP rather than the public IP to get to this service.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This fixed the issue for us.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 04 Apr 2018 16:52:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/u-turn-why/m-p/208786#M61087</guid>
      <dc:creator>dstjames</dc:creator>
      <dc:date>2018-04-04T16:52:18Z</dc:date>
    </item>
    <item>
      <title>Re: u-turn - why?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/u-turn-why/m-p/208851#M61095</link>
      <description>&lt;P&gt;hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/65252"&gt;@MarcinR&lt;/a&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;U-turn is only required when the server is on the same subnet as the client because else you'd get asymmetric routing (client sends syn to firewall, firewall applies NAT and forwards to server, server identifies source as same subnet and sends directly (see&amp;nbsp;&lt;A title="Video Tutorial: How to Configure U-Turn NAT" href="https://youtu.be/Bdbn1pbe74o" target="_blank"&gt;https://youtu.be/Bdbn1pbe74o&lt;/A&gt; at about 1:00)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If the server is in a differend zone/subnet, this will be limited to other servers in the same zone/subnet trying to use the public IP, clients in the lan would not need source translation (u-turn), only due care that the destination nat policy for the server's public IP is above the generic outbound nat rule&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;tl:dr: u-turn is only required if client and server are in the same subnet/zone, not if the server is in dmz (just make sure your nat rules are in the appropriate order)&lt;/P&gt;</description>
      <pubDate>Thu, 05 Apr 2018 07:44:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/u-turn-why/m-p/208851#M61095</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2018-04-05T07:44:56Z</dc:date>
    </item>
    <item>
      <title>Re: u-turn - why?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/u-turn-why/m-p/208854#M61096</link>
      <description>&lt;P&gt;Thank you&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/7608"&gt;@reaper&lt;/a&gt; for your answer. If we say about hosts in the same net - that is clear to me.&amp;nbsp; U-turn is required.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The problem is that tutorials say that u-turn is required BETWEEN zones/interfaces, eg.:&lt;/P&gt;&lt;P&gt;"To enable clients on the internal network to access the public web server in the DMZ zone, we will need to&lt;/P&gt;&lt;P&gt;configure a NAT rule that redirects the packet from the external network, where the original routing table&lt;/P&gt;&lt;P&gt;lookup will determine it should go based on the destination address of 203.0.113.11 within the packet, to&lt;/P&gt;&lt;P&gt;the actual address of the web server on the DMZ network of 10.1.1.11. To do this you must create a NAT&lt;/P&gt;&lt;P&gt;rule from the trust zone (where the source address in the packet is) to the untrust zone (where the original&lt;/P&gt;&lt;P&gt;destination address is) to translate the destination address to an address in the DMZ zone."&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/Learning-Articles/DotW-U-Turn-NAT-Issue/ta-p/53115" target="_blank"&gt;https://live.paloaltonetworks.com/t5/Learning-Articles/DotW-U-Turn-NAT-Issue/ta-p/53115&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;or&amp;nbsp;&lt;A href="https://live.paloaltonetworks.com/t5/Configuration-Articles/How-to-Configure-U-Turn-NAT/ta-p/61889" target="_blank"&gt;https://live.paloaltonetworks.com/t5/Configuration-Articles/How-to-Configure-U-Turn-NAT/ta-p/61889&lt;/A&gt; (second example:&amp;nbsp;&lt;SPAN&gt;This is an example of the U-turn NAT and Security for Hosts and Web Servers in a Different Zone).&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can you please explain that?&lt;/P&gt;</description>
      <pubDate>Thu, 05 Apr 2018 09:32:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/u-turn-why/m-p/208854#M61096</guid>
      <dc:creator>MarcinR</dc:creator>
      <dc:date>2018-04-05T09:32:04Z</dc:date>
    </item>
    <item>
      <title>Re: u-turn - why?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/u-turn-why/m-p/208855#M61097</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/65252"&gt;@MarcinR&lt;/a&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I think there's confusion about the 'concept' of u-turn/hairpin nat (packet goes out to public ip, then comes back in to private ip) and the full source+destination translation configuration of u-turn&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In a configuration with strict policy (not relying on the implied policies created by bi-directional rules) you do need to create a specific NAT policy to allow internal clients to reach internal servers on their public IP&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;in strict policy:&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;untrust to untrust &amp;lt;publicIP&amp;gt; to &amp;lt;dmzIP&amp;gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;dmz to untrust &amp;lt;dmzIP&amp;gt; to &amp;lt;publicIP&amp;gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;trust to untrust &amp;lt;lanIP&amp;gt; to &amp;lt;firewallIP&amp;gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;you need to add a '&lt;EM&gt;trust to untrust &amp;lt;publicIP&amp;gt; to &amp;lt;dmzIP&amp;gt;&lt;/EM&gt;'&amp;nbsp; (u-turn) above the last policy to allow internal hosts to reach the server on it's public IP (else you will use the hide-nat policy and start a LAND attack)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;in 'loose' policy&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;dmz&amp;nbsp;to untrust &amp;lt;dmzIP&amp;gt; to &amp;lt;publicIP&amp;gt; bi-directional&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;*implied policy* any to untrust &amp;lt;publicIP&amp;gt; to &amp;lt;dmzIP&amp;gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;dmz to untrust &amp;lt;dmzIP&amp;gt; to &amp;lt;publicIP&amp;gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;trust to untrust &amp;lt;lanIP&amp;gt; to &amp;lt;firewallIP&amp;gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;so no additional policy is required&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;eg:&lt;/P&gt;
&lt;PRE&gt;"bidir; index: 5" {
        nat-type ipv4;
        from internal;
        source 192.168.0.21;
        to external;
        to-interface  ;
        destination any;
        service 0:any/any/any;
        translate-to "src: 198.51.100.21 (static-ip) (pool idx: 6)";
        terminal no;
}

"bidir; index: 6" {       &lt;FONT color="#FF6600"&gt;&amp;lt;- this implied policy is autocreated by checking the &lt;/FONT&gt;
        nat-type ipv4;       &lt;FONT color="#FF6600"&gt;bi-directional toggle and takes care of u-turn sessions&lt;/FONT&gt;
        from any;
        source any;
        to external;
        to-interface  ;
        destination 198.51.100.21;
        service 0:any/any/any;
        translate-to "dst: 192.168.0.21";
        terminal no;
}
&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;hope this makes more sense&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 05 Apr 2018 09:53:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/u-turn-why/m-p/208855#M61097</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2018-04-05T09:53:36Z</dc:date>
    </item>
    <item>
      <title>Re: u-turn - why?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/u-turn-why/m-p/210410#M61461</link>
      <description>&lt;P&gt;You're confusing double-NAT with U-Turn NAT.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Double-NAT&lt;/STRONG&gt; means you translate the source IP address *and* the destination IP addres.&amp;nbsp; This is needed for crossing zones and subnets where you don't have direct routing for private IP addresses enabled.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Client has 192.168.0.0/24 subnet.&amp;nbsp; Server has 10.0.0.2 IP.&amp;nbsp; You have public IP 1.2.3.4 for your outgoing client NAT for Internet access.&amp;nbsp; You have 1.2.3.5 for your server's public IP.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So you need to create a NAT Policy that takes traffic from 192.168.0.0/24 to 1.2.3.5 and translates the source IP to 1.2.3.4.&amp;nbsp; *AND*, in the same policy, also translates the destination IP to 10.10.10.2.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;And there's a few other NAT/Security Policies needed to make that work.&amp;nbsp; But the above double-NAT rule is the important one.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This way, the clients only every connect to the public IP, and the server only ever sees the public IP of the clients, and everything is handled nicely through the normal routing tables.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;U-Turn NAT&lt;/STRONG&gt; also means you translate the source IP and the destination IP, but is used for sending traffic back to the source zone and to the same subnet as the client.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Client has 192.168.0.0/24 subnet.&amp;nbsp; Server has&amp;nbsp;192.168.0.2 IP.&amp;nbsp; You have public IP 1.2.3.4 for your outgoing client NAT for Internet access.&amp;nbsp; You have 1.2.3.5 for your server's public IP.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So you need to create a NAT policy that takes traffic from 192.168.0.0/24 to 1.2.3.5 and translatest the source IP to 1.2.3.4 *AND* translates the destination IP to 192.168.0.2.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;And there's a few other NAT/Security Policies needed to make the traffic work.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This way, the clients only ever connect to the server's public IP, and the server only ever sees the public IP for the clients, and all the traffic is handled via the normal routing tables on the server.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;However&lt;/STRONG&gt;, a much nicer solution to the U-Turn NAT is split-DNS, or DNS Views (in BIND).&amp;nbsp; When a client on the private network does a DNS query for my.server.com, it gets the private IP of the server returned.&amp;nbsp; If a device on the Internet does a DNS query for my.server.com, it gets the public IP of the server returned.&amp;nbsp; That way, local traffic never goes through the firewall at all.&lt;/P&gt;</description>
      <pubDate>Mon, 16 Apr 2018 17:51:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/u-turn-why/m-p/210410#M61461</guid>
      <dc:creator>fjwcash</dc:creator>
      <dc:date>2018-04-16T17:51:55Z</dc:date>
    </item>
    <item>
      <title>Re: u-turn - why?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/u-turn-why/m-p/235431#M67505</link>
      <description>&lt;P&gt;I have a totally similar setup. The issue is that Palo Alto cannot NAT both the source and the destination by matching different rules, so it uses one of the rule you configured. It probably translates the destination (that's how it gets to the server) and it leaves the source (10.0.0.1) as is. Does your server have a route to send the traffic for 10.0.0.1 back to the firewall? If so, that would work. In my case, the server wouldn't know to get back to the internal address of the source (they are on different VRFs).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can you look at your packets and see what happens? I'm curious. For me, the source doesn't get NATed unfortunately (I have a rule like the&amp;nbsp;&lt;SPAN&gt;NAT2 (general) you posted).&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 16 Oct 2018 02:35:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/u-turn-why/m-p/235431#M67505</guid>
      <dc:creator>katerinap</dc:creator>
      <dc:date>2018-10-16T02:35:34Z</dc:date>
    </item>
    <item>
      <title>Re: u-turn - why?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/u-turn-why/m-p/235451#M67512</link>
      <description>&lt;P&gt;Source IPs aren't NATed (servers on public IPs see our internal IPs). For us it isn't a big problem because servers can send packets back to internal IPs using default gateway.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you need a setup where your servers on public IPs see internal clients but on your public (NAted) IP then probably you need to create separate rule for each server where you do both NATs (source and destination). And that is a real pain if you have many servers.&lt;/P&gt;</description>
      <pubDate>Tue, 16 Oct 2018 08:02:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/u-turn-why/m-p/235451#M67512</guid>
      <dc:creator>MarcinR</dc:creator>
      <dc:date>2018-10-16T08:02:46Z</dc:date>
    </item>
    <item>
      <title>Re: u-turn - why?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/u-turn-why/m-p/235563#M67532</link>
      <description>&lt;P&gt;Thanks for your reply MarcinR. Yes, this is the issue I am facing right now and I&amp;nbsp;thought&amp;nbsp;there would be a way to get around it but apparently the only way to make this communication work is create a source and destination translation NAT for every source subnet and destination server. Not excited &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 16 Oct 2018 16:50:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/u-turn-why/m-p/235563#M67532</guid>
      <dc:creator>katerinap</dc:creator>
      <dc:date>2018-10-16T16:50:53Z</dc:date>
    </item>
    <item>
      <title>Re: u-turn - why?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/u-turn-why/m-p/235737#M67563</link>
      <description>&lt;P&gt;hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/99417"&gt;@katerinap&lt;/a&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You could also move your servers into their own zone (like a dmz), this way you'd only need 1 NAT rule for everything internal and&amp;nbsp;1 for everything external&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ie&lt;/P&gt;
&lt;P&gt;trust to untrust&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; any to publicIP&amp;nbsp; &amp;nbsp; nosourceNAT destinationNAT&amp;nbsp;&lt;/P&gt;
&lt;P&gt;untrust to untrust&amp;nbsp; any to publicIP&amp;nbsp; &amp;nbsp; nosourceNAT destinationNAT&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Uturn NAT is only required when client and server are in the same broadcast domain causing reply packets from the server to not be sent back to the firewall but directly to the client instead. This is resolved by adding sourceNAT&amp;nbsp;for the internal IP of the firewall so return packets are sent to the firewall&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ie&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;trust to untrust&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; any to&amp;nbsp;&lt;/SPAN&gt;publicIP&lt;SPAN&gt;&amp;nbsp; &amp;nbsp; sourceNATfwIP&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;destinationNAT&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;another&amp;nbsp;solution is to populate internal DNS servers with an internal IP for the servers FQDN so there's no longer a need for NAT&lt;/P&gt;</description>
      <pubDate>Wed, 17 Oct 2018 11:35:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/u-turn-why/m-p/235737#M67563</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2018-10-17T11:35:28Z</dc:date>
    </item>
  </channel>
</rss>

