<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Internet facing interface dhcp-client inbound NAT in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/internet-facing-interface-dhcp-client-inbound-nat/m-p/10875#M8017</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Damn thats the change I needed to make... I read the advanced NAT PDF and I got the impression that It first nats THEN check policies... Obviously, this is NOT the case &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://live.paloaltonetworks.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;SO by adding the external IP to the ruleset - BAM, it started working right of the bat... &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://live.paloaltonetworks.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I soo searched for DHCP on this site and NAT.. And did not get it to work &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://live.paloaltonetworks.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt; But with your great help.. It-s working like a charm.. SO The zone reflect the NATted actions, but the IP does not. Not that obvious imho... And not like any other FW i've worked. with... Juniper, Checkpoint, Clavister..... &lt;img id="smileywink" class="emoticon emoticon-smileywink" src="https://live.paloaltonetworks.com/i/smilies/16x16_smiley-wink.png" alt="Smiley Wink" title="Smiley Wink" /&gt; So, one more thing to get used to &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://live.paloaltonetworks.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Again, THANKS!!! Much appreciated !!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;/C&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 07 Jan 2013 10:05:07 GMT</pubDate>
    <dc:creator>criiser</dc:creator>
    <dc:date>2013-01-07T10:05:07Z</dc:date>
    <item>
      <title>Internet facing interface dhcp-client inbound NAT</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/internet-facing-interface-dhcp-client-inbound-nat/m-p/10871#M8013</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PAN 5.0.1 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;eth1/1 - Layer 3 / Internal network 10.0.0.1/24&lt;/P&gt;&lt;P&gt;eth1/2 - Layer 3 / External network - DHCP assigned IP adress from ISP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Outbound NAT works. Inbound NAT i simply doesnt get to work.. &lt;img id="smileysad" class="emoticon emoticon-smileysad" src="https://live.paloaltonetworks.com/i/smilies/16x16_smiley-sad.png" alt="Smiley Sad" title="Smiley Sad" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Used the cli command test nat-policy-match from Untrust source 8.8.8.8 destination [assigned ip adress of eth 1/2] destination port 3389 protocol 6&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Got rule matched on that..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Followed that up with &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;debug dataplane packet-diag set filter match destination [ip adress of etch1/2]&lt;/P&gt;&lt;P&gt;debug dataplane packet-diag set filter on&lt;/P&gt;&lt;P&gt;debug dataplane packet-diag set log feature flow basic&lt;/P&gt;&lt;P&gt;debug dataplane packet-diag clear log log&lt;/P&gt;&lt;P&gt;debug dataplane packet-diag set log on&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then several:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tail&amp;nbsp; mp-log pan_packet_diag.log&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Nothing in that log &lt;img id="smileysad" class="emoticon emoticon-smileysad" src="https://live.paloaltonetworks.com/i/smilies/16x16_smiley-sad.png" alt="Smiley Sad" title="Smiley Sad" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;End result wanted.. Traffic going to DHCP assigned IP is NAT:ed into internal network. Ie. Satelite office ISP's gives us dhcp issued adresses / or one static / I want to host services such as rdp / ssh etc etc. IPSEC is not an option in this scenario. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ideas for sollution? Is it even possible???&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;BR, Christian&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 06 Jan 2013 18:12:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/internet-facing-interface-dhcp-client-inbound-nat/m-p/10871#M8013</guid>
      <dc:creator>criiser</dc:creator>
      <dc:date>2013-01-06T18:12:08Z</dc:date>
    </item>
    <item>
      <title>Re: Internet facing interface dhcp-client inbound NAT</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/internet-facing-interface-dhcp-client-inbound-nat/m-p/10872#M8014</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It should be possible. I have the same setup on my PA-200 at home, and inbound NAT working without any problems.&lt;/P&gt;&lt;P&gt;Is your security policy allowing the NATed traffic? What does your nat policy and matching security policy look like?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 07 Jan 2013 08:25:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/internet-facing-interface-dhcp-client-inbound-nat/m-p/10872#M8014</guid>
      <dc:creator>torm</dc:creator>
      <dc:date>2013-01-07T08:25:57Z</dc:date>
    </item>
    <item>
      <title>Re: Internet facing interface dhcp-client inbound NAT</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/internet-facing-interface-dhcp-client-inbound-nat/m-p/10873#M8015</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I thought it would..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;SO I have,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sec pol:&lt;/P&gt;&lt;P&gt;src - Untrust&amp;nbsp; - any -any - any dst - Unstrust - any - (Application) ms-rdp - services (any) - allow - options log&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also have:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;src - Untrust&amp;nbsp; - any -any - any dst - Trust- internal.server.object- (Application) ms-rdp - services (any) - allow - options log&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also tried - Chaging Application to ANY and services to the same I used in the NAT rule. service-ms-rdp...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NAT policy:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;src zone: Untrust dst: zone Untrust: any - any - dest adress: External DHCP interface Service: (Created service-ms-rdp 3389) - dest translation:&amp;nbsp; internal.server.object&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The sad part is - I don't see anything in the logs... &lt;img id="smileysad" class="emoticon emoticon-smileysad" src="https://live.paloaltonetworks.com/i/smilies/16x16_smiley-sad.png" alt="Smiley Sad" title="Smiley Sad" /&gt; And nothing in the debug flow either... How would you go about troubleshoot it?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And, Is there an object with the "DHCP-assigned.address" that one can use instead of the one I made that will not update if the DHCP client gets an new address... &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://live.paloaltonetworks.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Br, Christian&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 07 Jan 2013 08:53:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/internet-facing-interface-dhcp-client-inbound-nat/m-p/10873#M8015</guid>
      <dc:creator>criiser</dc:creator>
      <dc:date>2013-01-07T08:53:43Z</dc:date>
    </item>
    <item>
      <title>Re: Internet facing interface dhcp-client inbound NAT</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/internet-facing-interface-dhcp-client-inbound-nat/m-p/10874#M8016</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I think your destination address in the security policy is wrong. Destination address should be based on the pre nat address(External DCHP address), while the desination zone should be the post nat zone(LAN).&lt;/P&gt;&lt;P&gt;My rule looks like this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="" class="jiveImage" src="https://live.paloaltonetworks.com/legacyfs/online/5041_pastedImage_0.png" style="width: 1200px; height: 47px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The reason you don't get any logs is probably because PA doesn't log traffic that is blocked by the default policy. You can temporarily log this with a CLI command (&lt;A __default_attr="2118" __jive_macro_name="document" class="jive_macro jive_macro_document" href="https://live.paloaltonetworks.com/"&gt;&lt;/A&gt;)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I don't think there is any way to automatically get the DHCP assigned address in an object, but a workaround is using a dyn-dns service and use your fqdn in the security/nat policy. (&lt;A __default_attr="21150" __jive_macro_name="message" class="jive_macro jive_macro_message" href="https://live.paloaltonetworks.com/"&gt;&lt;/A&gt;)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 07 Jan 2013 09:19:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/internet-facing-interface-dhcp-client-inbound-nat/m-p/10874#M8016</guid>
      <dc:creator>torm</dc:creator>
      <dc:date>2013-01-07T09:19:37Z</dc:date>
    </item>
    <item>
      <title>Re: Internet facing interface dhcp-client inbound NAT</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/internet-facing-interface-dhcp-client-inbound-nat/m-p/10875#M8017</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Damn thats the change I needed to make... I read the advanced NAT PDF and I got the impression that It first nats THEN check policies... Obviously, this is NOT the case &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://live.paloaltonetworks.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;SO by adding the external IP to the ruleset - BAM, it started working right of the bat... &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://live.paloaltonetworks.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I soo searched for DHCP on this site and NAT.. And did not get it to work &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://live.paloaltonetworks.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt; But with your great help.. It-s working like a charm.. SO The zone reflect the NATted actions, but the IP does not. Not that obvious imho... And not like any other FW i've worked. with... Juniper, Checkpoint, Clavister..... &lt;img id="smileywink" class="emoticon emoticon-smileywink" src="https://live.paloaltonetworks.com/i/smilies/16x16_smiley-wink.png" alt="Smiley Wink" title="Smiley Wink" /&gt; So, one more thing to get used to &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://live.paloaltonetworks.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Again, THANKS!!! Much appreciated !!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;/C&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 07 Jan 2013 10:05:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/internet-facing-interface-dhcp-client-inbound-nat/m-p/10875#M8017</guid>
      <dc:creator>criiser</dc:creator>
      <dc:date>2013-01-07T10:05:07Z</dc:date>
    </item>
  </channel>
</rss>

