<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Destination vs Source Nat in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/destination-vs-source-nat/m-p/215720#M62544</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/7608"&gt;@reaper&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks again for the clarification.&amp;nbsp; I appreciate it your explanation and expertise. Makes total sense.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 29 May 2018 14:28:23 GMT</pubDate>
    <dc:creator>sgoethals</dc:creator>
    <dc:date>2018-05-29T14:28:23Z</dc:date>
    <item>
      <title>Destination vs Source Nat</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/destination-vs-source-nat/m-p/215682#M62538</link>
      <description>&lt;P&gt;I have a pretty good understanding of the difference between SRC and DST Nat, but there is one area that I could use some clarification on.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;With SRC NAT, I understand that by selecting BI-Directional, it allows an IP to be translated to an outside address and that Bi-Directional created an implied policy so that someone on the outside could initiate traffic back to the machine from the outside.&amp;nbsp; It sounds like a good use case would be when the inside machine needs access to the outside and also requires the ability for someone on the outside to connect to it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Wit DST NAT, I understand that it uses both the untrust (outside) zone for both the source and destination&amp;nbsp; Zone and that you use a translated address to get it to the proper machine hosted in another zone.&amp;nbsp; My question is does the use of DST NAT still allow the machine/server to originate traffic outbound?&amp;nbsp; For example, if you used DST NAT to provide access to a machine in a DMZ,&amp;nbsp; can that machine initiate traffic to the outside, or does it only allow inbound traffic?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I appreciate any feedback you can provide.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Tue, 29 May 2018 12:24:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/destination-vs-source-nat/m-p/215682#M62538</guid>
      <dc:creator>sgoethals</dc:creator>
      <dc:date>2018-05-29T12:24:33Z</dc:date>
    </item>
    <item>
      <title>Re: Destination vs Source Nat</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/destination-vs-source-nat/m-p/215707#M62540</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/66133"&gt;@sgoethals&lt;/a&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;All NAT policies are unidirectional in nature (save for reply packets belonging to a session that was inituially started in the appropriate direction)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hence, the option to either use an inbound and outbound policy, or use the bi-directional option which creates an implied policiy to take the role of the otherwise explicit destination policy you would create&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you do not use the bi-directional option, you will need to create both an inbound and an outbound policy (this is preferred as it provides better visibility of the policies in use) if your server also needs to connect out&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;A common 'hybrid' is to have several unique inbound policies for different servers/ports and have a 'hide' nat sourcenat outbound for all outbound connections.&lt;/P&gt;
&lt;P&gt;This is applied when each individual sertver does not require a unique IP when going out to the internet.&lt;/P&gt;</description>
      <pubDate>Tue, 29 May 2018 13:22:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/destination-vs-source-nat/m-p/215707#M62540</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2018-05-29T13:22:44Z</dc:date>
    </item>
    <item>
      <title>Re: Destination vs Source Nat</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/destination-vs-source-nat/m-p/215710#M62541</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/7608"&gt;@reaper&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for the reply and the explanation.&amp;nbsp; This helps.&amp;nbsp; When you state that creating an inbound and outbound policy provides more visibility, I assume you are referring to the ability to view more detailed information as a result of logs.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As for security, is there any difference between using either bi-directional or creating separate inbound and outbound policies?&lt;/P&gt;</description>
      <pubDate>Tue, 29 May 2018 13:37:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/destination-vs-source-nat/m-p/215710#M62541</guid>
      <dc:creator>sgoethals</dc:creator>
      <dc:date>2018-05-29T13:37:34Z</dc:date>
    </item>
    <item>
      <title>Re: Destination vs Source Nat</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/destination-vs-source-nat/m-p/215719#M62543</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/66133"&gt;@sgoethals&lt;/a&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;no I do mean the actual representation of the policies as they are all visible to you for inspection. Logs will contain all the same information&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;the bi-directional rules are invisoble so you may 'forget' they exist&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;they also drop some parameters to allow for dynamically creating a policy that matches outbound traffic&lt;/P&gt;
&lt;P&gt;eg. outbound trust to untrust, 192.168.0.1 translated to 198.51.100.1&lt;/P&gt;
&lt;P&gt;bi-dir : &lt;STRONG&gt;any&lt;/STRONG&gt; to untrust , 198.51.100.1 to 192.168.0.1&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;admin@PA-220&amp;gt; show running nat-policy

"outbound; index: 1" {
        nat-type ipv4;
        from trust;
        source 192.168.0.1;
        to untrust;
        to-interface ethernet1/3 ;
        destination any;
        service 0:any/any/any;
        translate-to "src: 195.51.100.1 (static-ip) (pool idx: 1)";
        terminal no;
}

"outbound; index: 2" {
        nat-type ipv4;
       &lt;STRONG&gt; from any;&lt;/STRONG&gt;
        source any;
        to untrust;
        to-interface ethernet1/3 ;
        destination 195.51.100.1;
        service 0:any/any/any;
        translate-to "dst: 192.168.0.1";
        terminal no;
}
&lt;/PRE&gt;
&lt;P&gt;This may be an important factor to consider&lt;/P&gt;
&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 29 May 2018 14:19:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/destination-vs-source-nat/m-p/215719#M62543</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2018-05-29T14:19:32Z</dc:date>
    </item>
    <item>
      <title>Re: Destination vs Source Nat</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/destination-vs-source-nat/m-p/215720#M62544</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/7608"&gt;@reaper&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks again for the clarification.&amp;nbsp; I appreciate it your explanation and expertise. Makes total sense.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 29 May 2018 14:28:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/destination-vs-source-nat/m-p/215720#M62544</guid>
      <dc:creator>sgoethals</dc:creator>
      <dc:date>2018-05-29T14:28:23Z</dc:date>
    </item>
  </channel>
</rss>

