<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Incomplete sessions for NATTING/Access to different site DMZ in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/incomplete-sessions-for-natting-access-to-different-site-dmz/m-p/344883#M86251</link>
    <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;I am having a complex and tricky setup that require NATTING and host web server in different network/site DMZ, I know it is not best practice but hope you can help:&lt;/P&gt;&lt;P&gt;Here is topology:&lt;/P&gt;&lt;P&gt;Site A zones: Trust, Untrust and DMZ with their own public IP and web servers&lt;/P&gt;&lt;P&gt;Site B zones: Trust, Untrust and DMZ with their own public IP and web servers&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;In case site B internet is down and all of the web servers in Site B is unreachable, but internal connection from Site A and Side B is up, I want to re-direct hosting Site B web server in Site A. For reasons, we cannot move the Site B server to site A.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;This is what I did:&lt;/P&gt;&lt;P&gt;-Site A PAN Firewall: NATTING from Site A (public IP) to Site B – DMZ web server. Then allow web services access from UNTRUST&lt;/P&gt;&lt;P&gt;-Site B PAN firewall: Allow web services access rule to Site B DMZ web server from both TRUST and UNTRUST&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Connection will be from public (UNTRUST) hit the site A public IP address (NATTING to Site B web server), then travel cross internal connection to web server in Site B DMZ. Problem is Site B firewall confused this connection from TRUST or UNTRUST, so it keeps drop and aged-out the sessions. Internal connection from SITE A to SITE B for sure is TRUST.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;I know the traffic is allowed on both SiteA/B firewall, is there any better way for this scenario? Or I miss anything else.&lt;/P&gt;&lt;P&gt;Thanks and Regards,&lt;/P&gt;&lt;P&gt;Long Nguyen&lt;/P&gt;</description>
    <pubDate>Fri, 21 Aug 2020 00:02:40 GMT</pubDate>
    <dc:creator>infoit</dc:creator>
    <dc:date>2020-08-21T00:02:40Z</dc:date>
    <item>
      <title>Incomplete sessions for NATTING/Access to different site DMZ</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/incomplete-sessions-for-natting-access-to-different-site-dmz/m-p/344883#M86251</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;I am having a complex and tricky setup that require NATTING and host web server in different network/site DMZ, I know it is not best practice but hope you can help:&lt;/P&gt;&lt;P&gt;Here is topology:&lt;/P&gt;&lt;P&gt;Site A zones: Trust, Untrust and DMZ with their own public IP and web servers&lt;/P&gt;&lt;P&gt;Site B zones: Trust, Untrust and DMZ with their own public IP and web servers&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;In case site B internet is down and all of the web servers in Site B is unreachable, but internal connection from Site A and Side B is up, I want to re-direct hosting Site B web server in Site A. For reasons, we cannot move the Site B server to site A.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;This is what I did:&lt;/P&gt;&lt;P&gt;-Site A PAN Firewall: NATTING from Site A (public IP) to Site B – DMZ web server. Then allow web services access from UNTRUST&lt;/P&gt;&lt;P&gt;-Site B PAN firewall: Allow web services access rule to Site B DMZ web server from both TRUST and UNTRUST&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Connection will be from public (UNTRUST) hit the site A public IP address (NATTING to Site B web server), then travel cross internal connection to web server in Site B DMZ. Problem is Site B firewall confused this connection from TRUST or UNTRUST, so it keeps drop and aged-out the sessions. Internal connection from SITE A to SITE B for sure is TRUST.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;I know the traffic is allowed on both SiteA/B firewall, is there any better way for this scenario? Or I miss anything else.&lt;/P&gt;&lt;P&gt;Thanks and Regards,&lt;/P&gt;&lt;P&gt;Long Nguyen&lt;/P&gt;</description>
      <pubDate>Fri, 21 Aug 2020 00:02:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/incomplete-sessions-for-natting-access-to-different-site-dmz/m-p/344883#M86251</guid>
      <dc:creator>infoit</dc:creator>
      <dc:date>2020-08-21T00:02:40Z</dc:date>
    </item>
    <item>
      <title>Re: Incomplete sessions for NATTING/Access to different site DMZ</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/incomplete-sessions-for-natting-access-to-different-site-dmz/m-p/344920#M86259</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/89298"&gt;@infoit&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;First, as your traffic from public (UNTRUST) will hit the site A public IP address (NATTING to Site B web server), then travel cross internal connection to web server in Site B DMZ so traffic towards SITE-B firewall will come up with &lt;STRONG&gt;source zone as trust&lt;/STRONG&gt; as it is traveling via your internal interface (trust) connected between both firewalls.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now the source will be public IP so you need to check routing for those source public IP addresses on SITE-B Firewall. Most of the times on the firewalls, default route is set to external interface. Due to this route, the response from DMZ server at Site-B will go towards external interface (as it will match default route).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I think, this is creating problems. I can suggest few pointers -&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1. If you know the source public IP addresses/networks, make proper routing on SITE-B firewall so response will go through proper path. Not sure if you would have these details as most of the times we are not aware of all public source IP addresses unless whitelisting is done.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2. You can NAT source IP address of traffic initiator on SITE-A Firewall. So if you NAT source public IP with any internal IP address (can be trust and known to SITE-B). So all the request will come from single source on SITE-B Firewall.&amp;nbsp; But with this, you won't be able to see actual client IP address om DMZ end.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Aug 2020 10:49:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/incomplete-sessions-for-natting-access-to-different-site-dmz/m-p/344920#M86259</guid>
      <dc:creator>SutareMayur</dc:creator>
      <dc:date>2020-08-21T10:49:50Z</dc:date>
    </item>
    <item>
      <title>Re: Incomplete sessions for NATTING/Access to different site DMZ</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/incomplete-sessions-for-natting-access-to-different-site-dmz/m-p/345011#M86277</link>
      <description>&lt;P&gt;Thank you Sutare for your ideas.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;For option 1: I have a list of site A Public IP, so&amp;nbsp; of I am thinking about setup a new route on Site B to re-route the traffic hitting Site B DMZ and return back to Site A public IP&lt;/P&gt;&lt;P&gt;Option 2: I already setup&amp;nbsp;&lt;SPAN&gt;NAT source Site A IP with internal IP address on Site B already, but still fail. Routing work but I need to check if PAN inspect the traffic and drop the connection as spoofing TRUST connection from untrust.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Aug 2020 18:04:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/incomplete-sessions-for-natting-access-to-different-site-dmz/m-p/345011#M86277</guid>
      <dc:creator>infoit</dc:creator>
      <dc:date>2020-08-21T18:04:25Z</dc:date>
    </item>
  </channel>
</rss>

