<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: NAT translation help in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/nat-translation-help/m-p/250281#M71181</link>
    <description>&lt;DIV&gt;What I am trying to do is replicate the following rules that are currently in an old Cisco 2901 router&amp;nbsp;that I am replacing with the&amp;nbsp;PA-220:&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&lt;TABLE border="0" cellspacing="0" cellpadding="0"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;FONT face="Calibri" size="3" color="#000000"&gt;ip nat inside source static 10.47.5.22 172.16.221.33 route-map 2EDF&lt;/FONT&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;FONT face="Calibri" size="3" color="#000000"&gt;ip nat inside source static 10.47.5.21 172.16.221.34 route-map 2EDF&lt;/FONT&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;FONT face="Calibri" size="3" color="#000000"&gt;ip nat inside source static 10.47.28.100 172.16.221.35 route-map 2EDF&lt;/FONT&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;FONT face="Calibri" size="3" color="#000000"&gt;ip nat inside source static 10.47.20.22 172.16.221.36 route-map 2EDF&lt;/FONT&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;FONT face="Calibri" size="3" color="#000000"&gt;ip nat inside source static 10.47.20.5 172.16.221.37 route-map 2EDF&lt;/FONT&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;FONT face="Calibri" size="3" color="#000000"&gt;ip nat inside source static 10.47.20.11 172.16.221.38 route-map 2EDF&lt;/FONT&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;FONT face="Calibri" size="3" color="#000000"&gt;ip nat inside source static 10.47.20.12 172.16.221.39 route-map 2EDF&lt;/FONT&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;FONT face="Calibri" size="3" color="#000000"&gt;ip nat inside source static 10.47.20.26 172.16.221.40 route-map 2EDF&lt;/FONT&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;FONT face="Calibri" size="3" color="#000000"&gt;ip nat inside source static 10.47.20.27 172.16.221.41 route-map 2EDF&lt;/FONT&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;FONT face="Calibri" size="3" color="#000000"&gt;ip nat inside source static 10.47.20.50 172.16.221.42 route-map 2EDF&lt;/FONT&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;FONT face="Calibri" size="3" color="#000000"&gt;ip nat inside source static 10.47.20.51 172.16.221.43 route-map 2EDF&lt;/FONT&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;!&lt;/DIV&gt;&lt;DIV&gt;&lt;TABLE border="0" cellspacing="0" cellpadding="0"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;DIV&gt;&lt;FONT face="Calibri" size="3" color="#000000"&gt;!&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT face="Calibri" size="3" color="#000000"&gt;access-list 101 permit ip 172.16.221.32 0.0.0.15 172.16.200.0 0.0.0.255&lt;/FONT&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;FONT face="Calibri" size="3" color="#000000"&gt;access-list 101 permit ip 172.16.221.32 0.0.0.15 172.16.202.0 0.0.0.255&lt;/FONT&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;FONT face="Calibri" size="3" color="#000000"&gt;access-list 101 permit ip 172.16.221.32 0.0.0.15 172.16.207.0 0.0.0.255&lt;/FONT&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;FONT face="Calibri" size="3" color="#000000"&gt;access-list 101 permit ip 172.16.221.32 0.0.0.15 172.16.208.0 0.0.0.255&lt;/FONT&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;DIV&gt;&lt;TABLE border="0" cellspacing="0" cellpadding="0"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;FONT face="Calibri" size="3" color="#000000"&gt;access-list 105 permit ip 10.0.0.0 0.255.255.255 172.16.0.0 0.0.255.255&lt;/FONT&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;!&lt;/DIV&gt;&lt;DIV&gt;&lt;TABLE border="0" cellspacing="0" cellpadding="0"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;FONT face="Calibri" size="3" color="#000000"&gt;route-map 2EDF permit 10&lt;/FONT&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;FONT face="Calibri"&gt;&lt;FONT size="3"&gt;&lt;FONT color="#000000"&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;match ip address 105&lt;/FONT&gt;&lt;/FONT&gt;&lt;/FONT&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;I've tried about every combination of NAT rule, Zone config, Security Policy, and virtual router static route that I can think of and I cannot figure it out. With the above rules on the old router, I can ping from, say, a server at 10.47.20.50 to the natted IP of another server on the local network such as 172.16.221.43 (that is mapped to 10.47.20.51). I can't for the life of me get this to work on the PA-220. Also, the other end of the VPN can ping from one of their subnets to the 172.16.221.32/28 range successfully when the VPN is active on the old CIsco router.&lt;/DIV&gt;&lt;/DIV&gt;</description>
    <pubDate>Fri, 15 Feb 2019 20:04:19 GMT</pubDate>
    <dc:creator>GIT_Sean</dc:creator>
    <dc:date>2019-02-15T20:04:19Z</dc:date>
    <item>
      <title>NAT translation help</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/nat-translation-help/m-p/250247#M71175</link>
      <description>&lt;P&gt;For the life of me I can't figure out something that should be simple. I'm having a problem with a nat translation setup. Here is the requirement:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have various computers/devices on several IP addresses and different subinterfaces, for example:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Device 1:&lt;/P&gt;&lt;P&gt;IP address: 10.47.5.21&lt;/P&gt;&lt;P&gt;Subinterface: Ethernet1/1.5&lt;/P&gt;&lt;P&gt;Zone: Control_NET&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;Device 2:&lt;/P&gt;&lt;P&gt;IP address: 10.47.20.50&lt;BR /&gt;Subinterface: Ethernet1/1.20&lt;/P&gt;&lt;P&gt;Zone: Server_NET&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I need to NAT these devices to another range, in this example, to 172.221.16.32/28 range. So it should go like this:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;10.47.5.21 &amp;lt;-&amp;gt; 172.221.16.32&lt;/P&gt;&lt;P&gt;10.47.20.50 &amp;lt;-&amp;gt; 172.221.16.42&lt;/P&gt;&lt;P&gt;...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The reason for this is I have a customer that has a site-to-site VPN connection and will only be looking at the 172.221.16.32/28 range. What sort of NAT translation do I need to do? I've tried the following and it's not working:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="NAT Rule.png" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/18792i10DF38FA4031B321/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="NAT Rule.png" alt="NAT Rule.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 15 Feb 2019 17:30:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/nat-translation-help/m-p/250247#M71175</guid>
      <dc:creator>GIT_Sean</dc:creator>
      <dc:date>2019-02-15T17:30:03Z</dc:date>
    </item>
    <item>
      <title>Re: NAT translation help</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/nat-translation-help/m-p/250259#M71176</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;Do you have corresponding security policies to allow the traffic? The logs should show if/why the traffic is getting blocked. This is just the NAT part of it. Also check routing?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Just some thoughts.&lt;/P&gt;</description>
      <pubDate>Fri, 15 Feb 2019 18:03:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/nat-translation-help/m-p/250259#M71176</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2019-02-15T18:03:10Z</dc:date>
    </item>
    <item>
      <title>Re: NAT translation help</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/nat-translation-help/m-p/250268#M71178</link>
      <description>&lt;P&gt;I believe so. I have an allow policy&amp;nbsp;with Control_Net and Server_Net as the source zone and the VPN as the destination zone, and a corrisponding allow policy with the VPN as the source zone and Control_Net and Server_Net as the destination zone. I'm not sure if this is the right way as the Control_Net zone is for the 10.47.5.0/24 addresses and the Server_Net zone is for 10.47.20.0/24 addresses. Where do I place a security policy that allows traffic to/from the NAT range of 172.16.221.32/28? Do I need to devine a zone for the NAT range, and if so, how do I go about it?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 15 Feb 2019 18:22:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/nat-translation-help/m-p/250268#M71178</guid>
      <dc:creator>GIT_Sean</dc:creator>
      <dc:date>2019-02-15T18:22:55Z</dc:date>
    </item>
    <item>
      <title>Re: NAT translation help</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/nat-translation-help/m-p/250281#M71181</link>
      <description>&lt;DIV&gt;What I am trying to do is replicate the following rules that are currently in an old Cisco 2901 router&amp;nbsp;that I am replacing with the&amp;nbsp;PA-220:&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&lt;TABLE border="0" cellspacing="0" cellpadding="0"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;FONT face="Calibri" size="3" color="#000000"&gt;ip nat inside source static 10.47.5.22 172.16.221.33 route-map 2EDF&lt;/FONT&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;FONT face="Calibri" size="3" color="#000000"&gt;ip nat inside source static 10.47.5.21 172.16.221.34 route-map 2EDF&lt;/FONT&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;FONT face="Calibri" size="3" color="#000000"&gt;ip nat inside source static 10.47.28.100 172.16.221.35 route-map 2EDF&lt;/FONT&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;FONT face="Calibri" size="3" color="#000000"&gt;ip nat inside source static 10.47.20.22 172.16.221.36 route-map 2EDF&lt;/FONT&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;FONT face="Calibri" size="3" color="#000000"&gt;ip nat inside source static 10.47.20.5 172.16.221.37 route-map 2EDF&lt;/FONT&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;FONT face="Calibri" size="3" color="#000000"&gt;ip nat inside source static 10.47.20.11 172.16.221.38 route-map 2EDF&lt;/FONT&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;FONT face="Calibri" size="3" color="#000000"&gt;ip nat inside source static 10.47.20.12 172.16.221.39 route-map 2EDF&lt;/FONT&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;FONT face="Calibri" size="3" color="#000000"&gt;ip nat inside source static 10.47.20.26 172.16.221.40 route-map 2EDF&lt;/FONT&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;FONT face="Calibri" size="3" color="#000000"&gt;ip nat inside source static 10.47.20.27 172.16.221.41 route-map 2EDF&lt;/FONT&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;FONT face="Calibri" size="3" color="#000000"&gt;ip nat inside source static 10.47.20.50 172.16.221.42 route-map 2EDF&lt;/FONT&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;FONT face="Calibri" size="3" color="#000000"&gt;ip nat inside source static 10.47.20.51 172.16.221.43 route-map 2EDF&lt;/FONT&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;!&lt;/DIV&gt;&lt;DIV&gt;&lt;TABLE border="0" cellspacing="0" cellpadding="0"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;DIV&gt;&lt;FONT face="Calibri" size="3" color="#000000"&gt;!&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT face="Calibri" size="3" color="#000000"&gt;access-list 101 permit ip 172.16.221.32 0.0.0.15 172.16.200.0 0.0.0.255&lt;/FONT&gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;FONT face="Calibri" size="3" color="#000000"&gt;access-list 101 permit ip 172.16.221.32 0.0.0.15 172.16.202.0 0.0.0.255&lt;/FONT&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;FONT face="Calibri" size="3" color="#000000"&gt;access-list 101 permit ip 172.16.221.32 0.0.0.15 172.16.207.0 0.0.0.255&lt;/FONT&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;FONT face="Calibri" size="3" color="#000000"&gt;access-list 101 permit ip 172.16.221.32 0.0.0.15 172.16.208.0 0.0.0.255&lt;/FONT&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;DIV&gt;&lt;TABLE border="0" cellspacing="0" cellpadding="0"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;FONT face="Calibri" size="3" color="#000000"&gt;access-list 105 permit ip 10.0.0.0 0.255.255.255 172.16.0.0 0.0.255.255&lt;/FONT&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;!&lt;/DIV&gt;&lt;DIV&gt;&lt;TABLE border="0" cellspacing="0" cellpadding="0"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;FONT face="Calibri" size="3" color="#000000"&gt;route-map 2EDF permit 10&lt;/FONT&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;FONT face="Calibri"&gt;&lt;FONT size="3"&gt;&lt;FONT color="#000000"&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;match ip address 105&lt;/FONT&gt;&lt;/FONT&gt;&lt;/FONT&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;I've tried about every combination of NAT rule, Zone config, Security Policy, and virtual router static route that I can think of and I cannot figure it out. With the above rules on the old router, I can ping from, say, a server at 10.47.20.50 to the natted IP of another server on the local network such as 172.16.221.43 (that is mapped to 10.47.20.51). I can't for the life of me get this to work on the PA-220. Also, the other end of the VPN can ping from one of their subnets to the 172.16.221.32/28 range successfully when the VPN is active on the old CIsco router.&lt;/DIV&gt;&lt;/DIV&gt;</description>
      <pubDate>Fri, 15 Feb 2019 20:04:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/nat-translation-help/m-p/250281#M71181</guid>
      <dc:creator>GIT_Sean</dc:creator>
      <dc:date>2019-02-15T20:04:19Z</dc:date>
    </item>
  </channel>
</rss>

