<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: behavior in multi-vsys with shared gateway and DNAT policies in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/behavior-in-multi-vsys-with-shared-gateway-and-dnat-policies/m-p/381286#M89739</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/7608"&gt;@reaper&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for your answers. Do you know if there´s any&amp;nbsp;&lt;SPAN&gt;KB link where that behavior is explained?&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Kind Regards!&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Thu, 21 Jan 2021 19:58:18 GMT</pubDate>
    <dc:creator>Carracido</dc:creator>
    <dc:date>2021-01-21T19:58:18Z</dc:date>
    <item>
      <title>behavior in multi-vsys with shared gateway and DNAT policies</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/behavior-in-multi-vsys-with-shared-gateway-and-dnat-policies/m-p/379663#M89597</link>
      <description>&lt;P&gt;Dear community,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have a firewall with multi-vsys and the following scenario:&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;1 shared gateway and 1 public IP on external zone&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;1 virtual system and 1 private IP on internal zone&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We configured DNAT to allow access to private IP from Internet following this article:&lt;BR /&gt;&lt;SPAN&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClHxCAK" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClHxCAK&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Observations to this configuration:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;- Our&amp;nbsp;"inbound web" security policy worked allowing only the internal IP and not including the public one.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;# Question_1: is this because the vsys receives the traffic after DNAT from SG and only private IP is visible here?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;- on the traffic log the destination IP shows the pre-NAT IP which is the public one with source zone =&amp;nbsp;untrust_SG and destination zone = trust_vsys.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;# Question_2: How it is possible that the traffic log is showing as source zone the untrust-SG if no security policy is used on the shared gateway?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;It seems that this log shows transparently the trace from external zone of Shared gateway to the internal zone of vsys.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thank you!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 13 Jan 2021 20:17:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/behavior-in-multi-vsys-with-shared-gateway-and-dnat-policies/m-p/379663#M89597</guid>
      <dc:creator>Carracido</dc:creator>
      <dc:date>2021-01-13T20:17:18Z</dc:date>
    </item>
    <item>
      <title>Re: behavior in multi-vsys with shared gateway and DNAT policies</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/behavior-in-multi-vsys-with-shared-gateway-and-dnat-policies/m-p/379807#M89620</link>
      <description>&lt;P&gt;hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/24977"&gt;@Carracido&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;BLOCKQUOTE&gt;&lt;BR /&gt;&lt;P&gt;&lt;SPAN&gt;- Our&amp;nbsp;"inbound web" security policy worked allowing only the internal IP and not including the public one.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;# Question_1: is this because the vsys receives the traffic after DNAT from SG and only private IP is visible here?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;A1: yes, the SG performs NAT so the internal VSYS no longer needs to do the dnat lookup/security match&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;BLOCKQUOTE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;- on the traffic log the destination IP shows the pre-NAT IP which is the public one with source zone =&amp;nbsp;untrust_SG and destination zone = trust_vsys.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;# Question_2: How it is possible that the traffic log is showing as source zone the untrust-SG if no security policy is used on the shared gateway?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;It seems that this log shows transparently the trace from external zone of Shared gateway to the internal zone of vsys.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;A2:&amp;nbsp; the shared gateway is not a fullblown vsys, it is 'shared' so some behavior is different from a regular vsys: it performs some rudimantary tasks, like NAT and routing, but packets are handed off to the actual sending/receiving vsys (because of tha lack of security policy)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 14 Jan 2021 10:22:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/behavior-in-multi-vsys-with-shared-gateway-and-dnat-policies/m-p/379807#M89620</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2021-01-14T10:22:09Z</dc:date>
    </item>
    <item>
      <title>Re: behavior in multi-vsys with shared gateway and DNAT policies</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/behavior-in-multi-vsys-with-shared-gateway-and-dnat-policies/m-p/381286#M89739</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/7608"&gt;@reaper&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for your answers. Do you know if there´s any&amp;nbsp;&lt;SPAN&gt;KB link where that behavior is explained?&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Kind Regards!&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 21 Jan 2021 19:58:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/behavior-in-multi-vsys-with-shared-gateway-and-dnat-policies/m-p/381286#M89739</guid>
      <dc:creator>Carracido</dc:creator>
      <dc:date>2021-01-21T19:58:18Z</dc:date>
    </item>
    <item>
      <title>Re: behavior in multi-vsys with shared gateway and DNAT policies</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/behavior-in-multi-vsys-with-shared-gateway-and-dnat-policies/m-p/415597#M93276</link>
      <description>&lt;P&gt;I have a strange behavior in the similar scenario.&lt;/P&gt;&lt;P&gt;We configured a destination nat with original port 10443 and traslated to port 443 on shared gateway.&lt;/P&gt;&lt;P&gt;In order to allow traffic to internal web server we opened port 10443 instead of 443 on security policy of internal virtual system.&lt;/P&gt;&lt;P&gt;Why I see traffic on port 443 of internal virtual system when the NAT is configured on shared gateway?&lt;/P&gt;&lt;P&gt;Best Regards&lt;/P&gt;&lt;P&gt;Marco&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 28 Jun 2021 13:21:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/behavior-in-multi-vsys-with-shared-gateway-and-dnat-policies/m-p/415597#M93276</guid>
      <dc:creator>MarcoBergonzoni</dc:creator>
      <dc:date>2021-06-28T13:21:46Z</dc:date>
    </item>
  </channel>
</rss>

