<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: outside to inside nat tcp and udp specific? in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/outside-to-inside-nat-tcp-and-udp-specific/m-p/260167#M73735</link>
    <description>&lt;P&gt;You have to have a matching firewall rule that is going to allow TCP/UDP/etc.&amp;nbsp; NAT doesn't really care about the protocol.&amp;nbsp; Also, you might want to consider using APP-ID instead of a blanket Port/Protocol statement for your inbound firewall rule.&amp;nbsp; Personally I don't like port forwarding if I can avoid it (can cause all sorts of NAT frustrations).&amp;nbsp; Get another IP from your ISP if you can.&amp;nbsp; If you have multiple services, look into a good load balancer or application delivery platform (ie - F5/Citrix offerings).&lt;/P&gt;</description>
    <pubDate>Tue, 07 May 2019 19:44:50 GMT</pubDate>
    <dc:creator>jeremy.larsen</dc:creator>
    <dc:date>2019-05-07T19:44:50Z</dc:date>
    <item>
      <title>outside to inside nat tcp and udp specific?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/outside-to-inside-nat-tcp-and-udp-specific/m-p/260149#M73730</link>
      <description>&lt;P&gt;i have a situation where outside users will tupe in a public ip which the palo alto will nat it into a inside privtae address like&lt;/P&gt;&lt;P&gt;destination "public" x.x.x.x port udp 8443&amp;nbsp; &amp;nbsp;&amp;gt;&amp;gt;&amp;gt; translated destination "private" y.y.y.y udp 8443&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;,but when i tired to do it i couldnt set the tanslated address port to tcp or udp? does it take the same tcp or udp set in the original service port?&lt;/P&gt;&lt;P&gt;also is my config correct for this nat?&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Capture1.PNG" style="width: 702px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/19910iB7ADA7E36550E6C4/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Capture1.PNG" alt="Capture1.PNG" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Capture2.PNG" style="width: 704px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/19909i007DF334768FA716/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Capture2.PNG" alt="Capture2.PNG" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Capture.PNG" style="width: 486px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/19908i6123F728A83C2D58/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Capture.PNG" alt="Capture.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 07 May 2019 19:02:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/outside-to-inside-nat-tcp-and-udp-specific/m-p/260149#M73730</guid>
      <dc:creator>chuckles</dc:creator>
      <dc:date>2019-05-07T19:02:50Z</dc:date>
    </item>
    <item>
      <title>Re: outside to inside nat tcp and udp specific?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/outside-to-inside-nat-tcp-and-udp-specific/m-p/260167#M73735</link>
      <description>&lt;P&gt;You have to have a matching firewall rule that is going to allow TCP/UDP/etc.&amp;nbsp; NAT doesn't really care about the protocol.&amp;nbsp; Also, you might want to consider using APP-ID instead of a blanket Port/Protocol statement for your inbound firewall rule.&amp;nbsp; Personally I don't like port forwarding if I can avoid it (can cause all sorts of NAT frustrations).&amp;nbsp; Get another IP from your ISP if you can.&amp;nbsp; If you have multiple services, look into a good load balancer or application delivery platform (ie - F5/Citrix offerings).&lt;/P&gt;</description>
      <pubDate>Tue, 07 May 2019 19:44:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/outside-to-inside-nat-tcp-and-udp-specific/m-p/260167#M73735</guid>
      <dc:creator>jeremy.larsen</dc:creator>
      <dc:date>2019-05-07T19:44:50Z</dc:date>
    </item>
    <item>
      <title>Re: outside to inside nat tcp and udp specific?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/outside-to-inside-nat-tcp-and-udp-specific/m-p/260169#M73737</link>
      <description>&lt;P&gt;but is my nat rule correct?&lt;/P&gt;&lt;P&gt;if i set the original traffic coming into udp 8443 , does the translated private ip also use udp? as there is no option to use udp or tcp in the translated port&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;also how the firewall rule should be for the destination? should i make the (outisde&amp;gt;&amp;gt;inside) rule destination ip the translated private ip or the public ip?&lt;/P&gt;</description>
      <pubDate>Tue, 07 May 2019 19:53:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/outside-to-inside-nat-tcp-and-udp-specific/m-p/260169#M73737</guid>
      <dc:creator>chuckles</dc:creator>
      <dc:date>2019-05-07T19:53:12Z</dc:date>
    </item>
    <item>
      <title>Re: outside to inside nat tcp and udp specific?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/outside-to-inside-nat-tcp-and-udp-specific/m-p/260173#M73738</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;Yes as far as protocol, if its UDP then its UDP all the way from source to destination, same for TCP. Also here is a good example for NAT:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000CllzCAC" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000CllzCAC&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I also agree with&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/107910"&gt;@jeremy.larsen&lt;/a&gt;&amp;nbsp;, let the NAT just to IP translation and let the security policy do the policing.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Tue, 07 May 2019 20:49:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/outside-to-inside-nat-tcp-and-udp-specific/m-p/260173#M73738</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2019-05-07T20:49:29Z</dc:date>
    </item>
    <item>
      <title>Re: outside to inside nat tcp and udp specific?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/outside-to-inside-nat-tcp-and-udp-specific/m-p/260175#M73740</link>
      <description>&lt;P&gt;but how the security policy destination ip should be , is it the public ip or the translated private ip like:-&lt;/P&gt;&lt;P&gt;allow outisde to inside , source any ip , destination "public" or "translated private ip"???&lt;/P&gt;</description>
      <pubDate>Tue, 07 May 2019 20:54:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/outside-to-inside-nat-tcp-and-udp-specific/m-p/260175#M73740</guid>
      <dc:creator>chuckles</dc:creator>
      <dc:date>2019-05-07T20:54:56Z</dc:date>
    </item>
    <item>
      <title>Re: outside to inside nat tcp and udp specific?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/outside-to-inside-nat-tcp-and-udp-specific/m-p/260177#M73742</link>
      <description>&lt;P&gt;Here is a good example of a destination NAT. I believe this is what you are looking for.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/8-0/pan-os-admin/networking/nat/nat-configuration-examples/destination-nat-exampleone-to-one-mapping.html" target="_blank"&gt;https://docs.paloaltonetworks.com/pan-os/8-0/pan-os-admin/networking/nat/nat-configuration-examples/destination-nat-exampleone-to-one-mapping.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So in your case the source and destination is Outside, dont select an interface or service, destination IP is the Public IP of your server.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Translated packet: just put the internal IP of your server&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Then the security policies should be Source "outside' destination inside address of the Public IP of your server and then select the application and server here.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope that makes sense. The picture of the rules in the link should be all you need.&lt;/P&gt;</description>
      <pubDate>Tue, 07 May 2019 21:03:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/outside-to-inside-nat-tcp-and-udp-specific/m-p/260177#M73742</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2019-05-07T21:03:15Z</dc:date>
    </item>
  </channel>
</rss>

