<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: NAT - Tips and Gotchas? in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/nat-tips-and-gotchas/m-p/93#M70</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi &lt;A href="https://live.paloaltonetworks.com/u1/28274"&gt;bdunbar&lt;/A&gt; ,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Outbound nat is straight forward, from trust to untrust nat to this address. Or this specific source gets natted to this destination address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Inbound nat is however tricky. ie. if you have a host that is reachable from outside on address 1.1.1.1 and private address of 192.168.1.1, your nat will look like following :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From Untrust to Untrust any source to destination 1.1.1.1 translate to 192.168.1.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Security policy :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From Untrust to Trust from any source to destination 1.1.1.1 allow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You are already reading Understanding NAT-4.1-RevC, this should give you more insight into its working. Hope this helps. Thank you.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 03 Dec 2014 00:47:35 GMT</pubDate>
    <dc:creator>ssharma</dc:creator>
    <dc:date>2014-12-03T00:47:35Z</dc:date>
    <item>
      <title>NAT - Tips and Gotchas?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/nat-tips-and-gotchas/m-p/92#M69</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;PAN-200&lt;/P&gt;&lt;P&gt;PAN OS 6.0.0.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've been directed to implement NAT on our PAN-200.&amp;nbsp; Given that this will disrupt current traffic, I've scheduled tomorrow night to make it happen.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm reading 'PAN-OS Administrator's Guide Version 6.0' - it seems reasonably straightforward.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm about to dive into 'Understanding NAT-4.1-RevC'.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are there any gotchas, problems, boners, things to look out for, issues, or headaches I should be aware of before I pull the trigger?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 02 Dec 2014 23:14:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/nat-tips-and-gotchas/m-p/92#M69</guid>
      <dc:creator>bdunbar</dc:creator>
      <dc:date>2014-12-02T23:14:08Z</dc:date>
    </item>
    <item>
      <title>Re: NAT - Tips and Gotchas?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/nat-tips-and-gotchas/m-p/93#M70</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi &lt;A href="https://live.paloaltonetworks.com/u1/28274"&gt;bdunbar&lt;/A&gt; ,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Outbound nat is straight forward, from trust to untrust nat to this address. Or this specific source gets natted to this destination address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Inbound nat is however tricky. ie. if you have a host that is reachable from outside on address 1.1.1.1 and private address of 192.168.1.1, your nat will look like following :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From Untrust to Untrust any source to destination 1.1.1.1 translate to 192.168.1.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Security policy :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From Untrust to Trust from any source to destination 1.1.1.1 allow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You are already reading Understanding NAT-4.1-RevC, this should give you more insight into its working. Hope this helps. Thank you.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 03 Dec 2014 00:47:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/nat-tips-and-gotchas/m-p/93#M70</guid>
      <dc:creator>ssharma</dc:creator>
      <dc:date>2014-12-03T00:47:35Z</dc:date>
    </item>
    <item>
      <title>Re: NAT - Tips and Gotchas?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/nat-tips-and-gotchas/m-p/94#M71</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Just an heads-up, if you have any internal server to access from LAN: &lt;A href="https://live.paloaltonetworks.com/docs/DOC-1678"&gt;How to Configure U-Turn NAT&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 03 Dec 2014 04:53:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/nat-tips-and-gotchas/m-p/94#M71</guid>
      <dc:creator>HULK</dc:creator>
      <dc:date>2014-12-03T04:53:58Z</dc:date>
    </item>
    <item>
      <title>Re: NAT - Tips and Gotchas?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/nat-tips-and-gotchas/m-p/95#M72</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;As ssharma mentioned, Destination NAT configuration can be tricky.&lt;/P&gt;&lt;P&gt;Here's a video tutorial that guides you through its configuration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/videos/1550"&gt; Video Link : 1550&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Bi-Directional rules are not one of my favorite features, it attempts to simplify configuration and by doing so obscures sections of the configuration. If you choose to use Bi-Directional NAT rules, make sure to review the rules that have been implicitly created with command:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;gt; show running nat-policy&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Source NAT is pretty straightforward. One gotcha is that if you're trying to ping (or terminate any connection on one of the firewall's own interfaces), your source IP may be changed with the NAT policy, resulting in a LAND attack, thus having packets dropped. Make sure to configure No-NAT rules for connections that are intended to terminate in the firewall's own interfaces.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Dec 2014 23:50:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/nat-tips-and-gotchas/m-p/95#M72</guid>
      <dc:creator>mivaldi</dc:creator>
      <dc:date>2014-12-30T23:50:01Z</dc:date>
    </item>
    <item>
      <title>Re: NAT - Tips and Gotchas?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/nat-tips-and-gotchas/m-p/96#M73</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I also like to keep things simple. Let a NAT rule be a NAT rule and let the security rule handle hte security. That is I try not to use ports in my NAT rules, especially since I write my security rules using application and not specific ports.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 31 Dec 2014 22:40:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/nat-tips-and-gotchas/m-p/96#M73</guid>
      <dc:creator>oklier</dc:creator>
      <dc:date>2014-12-31T22:40:17Z</dc:date>
    </item>
    <item>
      <title>Re: NAT - Tips and Gotchas?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/nat-tips-and-gotchas/m-p/97#M74</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You can keep it simple as you like if you have enough nat address space that you don't need to share addresses to the multiple servers.&amp;nbsp; We just don't always have that luxury.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Jan 2015 13:12:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/nat-tips-and-gotchas/m-p/97#M74</guid>
      <dc:creator>pulukas</dc:creator>
      <dc:date>2015-01-01T13:12:41Z</dc:date>
    </item>
  </channel>
</rss>

