<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Destination NAT to other Port in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/destination-nat-to-other-port/m-p/311277#M80563</link>
    <description>&lt;P&gt;All of my rules that are one NAT and one Security for a given access work, but I have a unique rule that does not seem to be working correctly. I have four NAT rules for a given public IP that use different service ports that I created destined for unique IPs with the same port.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Example:&lt;/P&gt;&lt;P&gt;NAT1 Original Packet is Untrust/Untrust, Any Interface / Any Source address, Public IP destination, TCP-1234 service, destination translation is IP: 1.1.1.1 on Port: 2222&lt;/P&gt;&lt;P&gt;NAT2&amp;nbsp;Original Packet is Untrust/Untrust, Any Interface / Any Source address, Public IP destination, TCP-4321 service, destination translation is IP: 1.1.1.2 on Port: 2222&lt;/P&gt;&lt;P&gt;NAT3&amp;nbsp;Original Packet is Untrust/Untrust, Any Interface / Any Source address, Public IP destination, TCP-5678 service, destination translation is IP: 1.1.1.3 on Port: 2222&lt;/P&gt;&lt;P&gt;NAT4 Original Packet is Untrust/Untrust, Any Interface / Any Source address, Public IP destination, TCP-2222 service, destination translation is IP: 1.1.1.4 on Port: 2222&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have one security rule that includes all four services and ANY app with the public IP and untrust/untrust zones.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Note that the only NAT rule that hits is NAT4 where the ports are the same. None of the others hit and the security rule allows traffic to only the #4 server. When users try to access with the other service ports, they get no response and NAT1-3 are currently labeled as UNUSED.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Am I going to have to divide the security rule up? Or is there something I can do to get it to recognize the different ports when they are attempted?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;PAN-OS v9.0.4&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 14 Feb 2020 17:58:11 GMT</pubDate>
    <dc:creator>kprewitt</dc:creator>
    <dc:date>2020-02-14T17:58:11Z</dc:date>
    <item>
      <title>Destination NAT to other Port</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/destination-nat-to-other-port/m-p/245675#M69993</link>
      <description>&lt;P&gt;Hey all,&lt;/P&gt;&lt;P&gt;there is a ssh server in an internal network. I want to access that server from public, but with source port for example 11111. The server listens on normal ssh port 22.&lt;/P&gt;&lt;P&gt;So I would like the firewall to do a port translation from 11111 to 22.&lt;/P&gt;&lt;P&gt;Is that possible?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 11 Jan 2019 09:06:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/destination-nat-to-other-port/m-p/245675#M69993</guid>
      <dc:creator>MPI-AE</dc:creator>
      <dc:date>2019-01-11T09:06:40Z</dc:date>
    </item>
    <item>
      <title>Re: Destination NAT to other Port</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/destination-nat-to-other-port/m-p/245684#M69994</link>
      <description>&lt;P&gt;Hey&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/50331"&gt;@MPI-AE&lt;/a&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yep this is totally possible. First create a new service for tcp/&lt;SPAN&gt;11111 then create a new NAT rule as follows:&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Source Zone: Untrust&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Source IP: Any&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Destination Zone: Untrust&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Destination IP: {Public IP}&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Service: New service you created for&amp;nbsp;11111&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Translated packet tab:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp; Destination Translation:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Static IP: {Private IP}&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Translated Port: 22&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Of course you will then need a security policy rule to allow the traffic&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Source Zone: Untrust&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Source IP: Any (Preferable to limit this if you can)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Destination Zone: {Zone that private IP resides in, Trust etc.}&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Destination IP: {Public IP}&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Application: ssh&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Service: application-default&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Cheers,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Luke.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 11 Jan 2019 09:34:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/destination-nat-to-other-port/m-p/245684#M69994</guid>
      <dc:creator>LukeBullimore</dc:creator>
      <dc:date>2019-01-11T09:34:13Z</dc:date>
    </item>
    <item>
      <title>Re: Destination NAT to other Port</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/destination-nat-to-other-port/m-p/245694#M69997</link>
      <description>&lt;P&gt;Hey Luke,&lt;/P&gt;&lt;P&gt;that works, thank you!&lt;/P&gt;&lt;P&gt;The only thing I had to adjust was the Application in the policy rule: App any and select service tcp 11111.&lt;/P&gt;</description>
      <pubDate>Fri, 11 Jan 2019 14:12:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/destination-nat-to-other-port/m-p/245694#M69997</guid>
      <dc:creator>MPI-AE</dc:creator>
      <dc:date>2019-01-11T14:12:59Z</dc:date>
    </item>
    <item>
      <title>Re: Destination NAT to other Port</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/destination-nat-to-other-port/m-p/245751#M70019</link>
      <description>&lt;P&gt;In the Security Policy, you can use application=ssh and service=same service object you used in the NAT policy (11111).&lt;/P&gt;</description>
      <pubDate>Fri, 11 Jan 2019 21:25:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/destination-nat-to-other-port/m-p/245751#M70019</guid>
      <dc:creator>fjwcash</dc:creator>
      <dc:date>2019-01-11T21:25:57Z</dc:date>
    </item>
    <item>
      <title>Re: Destination NAT to other Port</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/destination-nat-to-other-port/m-p/311277#M80563</link>
      <description>&lt;P&gt;All of my rules that are one NAT and one Security for a given access work, but I have a unique rule that does not seem to be working correctly. I have four NAT rules for a given public IP that use different service ports that I created destined for unique IPs with the same port.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Example:&lt;/P&gt;&lt;P&gt;NAT1 Original Packet is Untrust/Untrust, Any Interface / Any Source address, Public IP destination, TCP-1234 service, destination translation is IP: 1.1.1.1 on Port: 2222&lt;/P&gt;&lt;P&gt;NAT2&amp;nbsp;Original Packet is Untrust/Untrust, Any Interface / Any Source address, Public IP destination, TCP-4321 service, destination translation is IP: 1.1.1.2 on Port: 2222&lt;/P&gt;&lt;P&gt;NAT3&amp;nbsp;Original Packet is Untrust/Untrust, Any Interface / Any Source address, Public IP destination, TCP-5678 service, destination translation is IP: 1.1.1.3 on Port: 2222&lt;/P&gt;&lt;P&gt;NAT4 Original Packet is Untrust/Untrust, Any Interface / Any Source address, Public IP destination, TCP-2222 service, destination translation is IP: 1.1.1.4 on Port: 2222&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have one security rule that includes all four services and ANY app with the public IP and untrust/untrust zones.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Note that the only NAT rule that hits is NAT4 where the ports are the same. None of the others hit and the security rule allows traffic to only the #4 server. When users try to access with the other service ports, they get no response and NAT1-3 are currently labeled as UNUSED.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Am I going to have to divide the security rule up? Or is there something I can do to get it to recognize the different ports when they are attempted?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;PAN-OS v9.0.4&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 14 Feb 2020 17:58:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/destination-nat-to-other-port/m-p/311277#M80563</guid>
      <dc:creator>kprewitt</dc:creator>
      <dc:date>2020-02-14T17:58:11Z</dc:date>
    </item>
  </channel>
</rss>

