<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: BI- DIRECTINAL NAT IN PALO ALTO in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/bi-directinal-nat-in-palo-alto/m-p/301875#M78728</link>
    <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/92499"&gt;@Aashish74&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Although in general this may work, there are a few points in the workflow that are not quite a best practice and can be misleading.&lt;/P&gt;&lt;P&gt;Bi-directional is generally not recommended as you don’t have full control of the return traffic. Packets will be translated correctly from LAN to WAN, but in the opposite direction, they will match any zone to WAN , which could complicate things if you have multiple zones.&lt;/P&gt;&lt;P&gt;I would always recommend having specific inbound destination NAT rule to your servers and a generic source NAT outbound if your servers need to connect to Internet.&lt;/P&gt;&lt;P&gt;The second point is that you suggest adding a service to the bidirectional NAT rule, which means that the rule will match only this service port for both the &amp;nbsp;inbound and outbound translation. This kind of defeats the purpose of bi-direction, as you presumably want to configure it for outbound internet traffic for your server.&lt;/P&gt;&lt;P&gt;Next, your security rule will match the inbound packets to the server, but not outbound from the server.&lt;/P&gt;&lt;P&gt;Finally it is not a good practice to configure the same multiple zones in source and destination.&lt;/P&gt;</description>
    <pubDate>Tue, 03 Dec 2019 14:15:56 GMT</pubDate>
    <dc:creator>BatD</dc:creator>
    <dc:date>2019-12-03T14:15:56Z</dc:date>
    <item>
      <title>BI- DIRECTINAL NAT IN PALO ALTO</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/bi-directinal-nat-in-palo-alto/m-p/301643#M78698</link>
      <description>&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;BI- DIRECTINAL NAT IN PALO ALTO&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Go to Policies &amp;gt; NAT &amp;gt; Add&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Create a NAT Rule:&lt;/STRONG&gt;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Name the rule as per your convivence.&lt;/LI&gt;&lt;LI&gt;Select the source zone as LAN&lt;/LI&gt;&lt;LI&gt;Destination zone as WAN&lt;/LI&gt;&lt;LI&gt;Interface as the WAN (exit interface)&lt;/LI&gt;&lt;LI&gt;Service as the preferred port.&lt;/LI&gt;&lt;LI&gt;Source ip address as the internal LAN IP.&lt;/LI&gt;&lt;LI&gt;Destination ip address as any.&lt;/LI&gt;&lt;LI&gt;Now in translated packet, Select Static Ip in source translation and use the Public IP you wish to have.&lt;/LI&gt;&lt;LI&gt;Make sure you enable bi-directional.&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Go to Policies &amp;gt; Security &amp;gt; Add&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Create a Security Rule:&lt;/STRONG&gt;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Name the rule.&lt;/LI&gt;&lt;LI&gt;Select Source as LAN and WAN&lt;/LI&gt;&lt;LI&gt;Select Destination as WAN and LAN&lt;/LI&gt;&lt;LI&gt;Source address as any&lt;/LI&gt;&lt;LI&gt;Destination address as the public ip&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;Commit the changes and test the rule. Also take care of the rule priority and placement of the rules.&lt;/P&gt;</description>
      <pubDate>Mon, 02 Dec 2019 15:08:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/bi-directinal-nat-in-palo-alto/m-p/301643#M78698</guid>
      <dc:creator>Aashish74</dc:creator>
      <dc:date>2019-12-02T15:08:42Z</dc:date>
    </item>
    <item>
      <title>Re: BI- DIRECTINAL NAT IN PALO ALTO</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/bi-directinal-nat-in-palo-alto/m-p/301784#M78713</link>
      <description>&lt;P&gt;Thanks&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/92499"&gt;@Aashish74&lt;/a&gt;&amp;nbsp; for this. This can be good for people wanting some basics.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Soon, we may have additional tools like Iron Skillets that can help accomplish things like this.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For anyone who wants to know more about Iron Skillets, please look at these blogs:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/Blogs/Getting-Started-with-IronSkillet-Best-Practices-Templates/ba-p/233175" target="_blank"&gt;https://live.paloaltonetworks.com/t5/Blogs/Getting-Started-with-IronSkillet-Best-Practices-Templates/ba-p/233175&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Also there is information about Expedition here that will work with Iron Skillet.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/Expedition-Articles/Expedition-The-Glue-Between-IronSkillet-and-Best-Practices/ta-p/255373" target="_blank"&gt;https://live.paloaltonetworks.com/t5/Expedition-Articles/Expedition-The-Glue-Between-IronSkillet-and-Best-Practices/ta-p/255373&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 03 Dec 2019 00:01:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/bi-directinal-nat-in-palo-alto/m-p/301784#M78713</guid>
      <dc:creator>jdelio</dc:creator>
      <dc:date>2019-12-03T00:01:24Z</dc:date>
    </item>
    <item>
      <title>Re: BI- DIRECTINAL NAT IN PALO ALTO</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/bi-directinal-nat-in-palo-alto/m-p/301875#M78728</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/92499"&gt;@Aashish74&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Although in general this may work, there are a few points in the workflow that are not quite a best practice and can be misleading.&lt;/P&gt;&lt;P&gt;Bi-directional is generally not recommended as you don’t have full control of the return traffic. Packets will be translated correctly from LAN to WAN, but in the opposite direction, they will match any zone to WAN , which could complicate things if you have multiple zones.&lt;/P&gt;&lt;P&gt;I would always recommend having specific inbound destination NAT rule to your servers and a generic source NAT outbound if your servers need to connect to Internet.&lt;/P&gt;&lt;P&gt;The second point is that you suggest adding a service to the bidirectional NAT rule, which means that the rule will match only this service port for both the &amp;nbsp;inbound and outbound translation. This kind of defeats the purpose of bi-direction, as you presumably want to configure it for outbound internet traffic for your server.&lt;/P&gt;&lt;P&gt;Next, your security rule will match the inbound packets to the server, but not outbound from the server.&lt;/P&gt;&lt;P&gt;Finally it is not a good practice to configure the same multiple zones in source and destination.&lt;/P&gt;</description>
      <pubDate>Tue, 03 Dec 2019 14:15:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/bi-directinal-nat-in-palo-alto/m-p/301875#M78728</guid>
      <dc:creator>BatD</dc:creator>
      <dc:date>2019-12-03T14:15:56Z</dc:date>
    </item>
    <item>
      <title>Re: BI- DIRECTINAL NAT IN PALO ALTO</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/bi-directinal-nat-in-palo-alto/m-p/302013#M78753</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/74884"&gt;@BatD&lt;/a&gt;&amp;nbsp; Thanks for the details and insight provided !!&lt;/P&gt;</description>
      <pubDate>Wed, 04 Dec 2019 05:03:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/bi-directinal-nat-in-palo-alto/m-p/302013#M78753</guid>
      <dc:creator>Aashish74</dc:creator>
      <dc:date>2019-12-04T05:03:15Z</dc:date>
    </item>
  </channel>
</rss>

