<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: PA Destination NAT in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/pa-destination-nat/m-p/405994#M92056</link>
    <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/163084"&gt;@Nikko&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;If I understand correctly what you are asking it is possible yes.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;set rulebase nat rules Web-Server-Destination-NAT to loopback-zone&lt;BR /&gt;set rulebase nat rules Web-Server-Destination-NAT from [ vlan5-zone vlan10-zone]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; # or select any if&lt;BR /&gt;set rulebase nat rules Web-Server-Destination-NAT source any&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;BR /&gt;set rulebase nat rules Web-Server-Destination-NAT destination loopback_192.168.6.2&lt;BR /&gt;set rulebase nat rules Web-Server-Destination-NAT service any&lt;BR /&gt;set rulebase nat rules Web-Server-Destination-NAT destination-translation translated-address server_192.168.4.4&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In addition you need to create allow rule:&lt;/P&gt;&lt;P&gt;set rulebase security rules Access-to-Web-Server profile-setting group default&lt;BR /&gt;set rulebase security rules Access-to-Web-Server to [ server-zone ]&lt;BR /&gt;set rulebase security rules Access-to-Web-Server from [ vlan5-zone vlan10-zone]&lt;BR /&gt;set rulebase security rules Access-to-Web-Server source any&lt;BR /&gt;set rulebase security rules Access-to-Web-Server destination [ loopback_192.168.6.2 ]&lt;BR /&gt;set rulebase security rules Access-to-Web-Server application [ web-browsing ]&lt;BR /&gt;set rulebase security rules Access-to-Web-Server service application-default&lt;BR /&gt;set rulebase security rules Access-to-Web-Server action allow&lt;BR /&gt;set rulebase security rules Access-to-Web-Server log-setting default&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You need to note couple of thinks:&lt;/P&gt;&lt;P&gt;- In the &lt;U&gt;security rule&lt;/U&gt; you need specify the &lt;STRONG&gt;destination zone&lt;/STRONG&gt; where your &lt;STRONG&gt;web server&lt;/STRONG&gt; is located.&lt;/P&gt;&lt;P&gt;- In the &lt;U&gt;security rule &lt;/U&gt;you need to specify the &lt;STRONG&gt;destination address&lt;/STRONG&gt; of your &lt;STRONG&gt;loopback, &lt;/STRONG&gt;aka the destination address before the NAT (users will use the loopback to access the server)&lt;/P&gt;&lt;P&gt;- In the &lt;U&gt;NAT rule &lt;/U&gt;you need to specify the &lt;STRONG&gt;destination zone &lt;/STRONG&gt;where your &lt;STRONG&gt;loopback interface &lt;/STRONG&gt;is located. This is because the NAT is &lt;U&gt;evaluated first and applied later&lt;/U&gt;. Which means that when the original packet (from user) hit the firewall, FW will use the original destination IP (in this case the loopback) to determine which is the destination zone&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;By the way - based on your network setup it is not necessary to have the IP as loopback on the FW to use it in NAT. Your devices only need to know to route 192.168.6.2 to the firewall (either with specific or default route)&lt;/P&gt;</description>
    <pubDate>Tue, 11 May 2021 10:06:30 GMT</pubDate>
    <dc:creator>aleksandar.astardzhiev</dc:creator>
    <dc:date>2021-05-11T10:06:30Z</dc:date>
    <item>
      <title>PA Destination NAT</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-destination-nat/m-p/405836#M92043</link>
      <description>&lt;P&gt;I have a use-case that all subnets/VLANs should be able to access the server (192.168.4.4) via HTTP using the loopback IP address 192.168.6.2/32.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The PA firewall is the gateway for all the VLANs. I would like to confirm if this is possible? The source will be VLAN 5 or VLAN 10 and destination is VLAN 20's loopback IP 192.168.6.2/32 using HTTP service then the PA should redirect the traffic to VLAN 30's 192.168.4.4 address.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Mon, 10 May 2021 18:29:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-destination-nat/m-p/405836#M92043</guid>
      <dc:creator>Nikko</dc:creator>
      <dc:date>2021-05-10T18:29:36Z</dc:date>
    </item>
    <item>
      <title>Re: PA Destination NAT</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-destination-nat/m-p/405994#M92056</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/163084"&gt;@Nikko&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;If I understand correctly what you are asking it is possible yes.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;set rulebase nat rules Web-Server-Destination-NAT to loopback-zone&lt;BR /&gt;set rulebase nat rules Web-Server-Destination-NAT from [ vlan5-zone vlan10-zone]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; # or select any if&lt;BR /&gt;set rulebase nat rules Web-Server-Destination-NAT source any&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;BR /&gt;set rulebase nat rules Web-Server-Destination-NAT destination loopback_192.168.6.2&lt;BR /&gt;set rulebase nat rules Web-Server-Destination-NAT service any&lt;BR /&gt;set rulebase nat rules Web-Server-Destination-NAT destination-translation translated-address server_192.168.4.4&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In addition you need to create allow rule:&lt;/P&gt;&lt;P&gt;set rulebase security rules Access-to-Web-Server profile-setting group default&lt;BR /&gt;set rulebase security rules Access-to-Web-Server to [ server-zone ]&lt;BR /&gt;set rulebase security rules Access-to-Web-Server from [ vlan5-zone vlan10-zone]&lt;BR /&gt;set rulebase security rules Access-to-Web-Server source any&lt;BR /&gt;set rulebase security rules Access-to-Web-Server destination [ loopback_192.168.6.2 ]&lt;BR /&gt;set rulebase security rules Access-to-Web-Server application [ web-browsing ]&lt;BR /&gt;set rulebase security rules Access-to-Web-Server service application-default&lt;BR /&gt;set rulebase security rules Access-to-Web-Server action allow&lt;BR /&gt;set rulebase security rules Access-to-Web-Server log-setting default&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You need to note couple of thinks:&lt;/P&gt;&lt;P&gt;- In the &lt;U&gt;security rule&lt;/U&gt; you need specify the &lt;STRONG&gt;destination zone&lt;/STRONG&gt; where your &lt;STRONG&gt;web server&lt;/STRONG&gt; is located.&lt;/P&gt;&lt;P&gt;- In the &lt;U&gt;security rule &lt;/U&gt;you need to specify the &lt;STRONG&gt;destination address&lt;/STRONG&gt; of your &lt;STRONG&gt;loopback, &lt;/STRONG&gt;aka the destination address before the NAT (users will use the loopback to access the server)&lt;/P&gt;&lt;P&gt;- In the &lt;U&gt;NAT rule &lt;/U&gt;you need to specify the &lt;STRONG&gt;destination zone &lt;/STRONG&gt;where your &lt;STRONG&gt;loopback interface &lt;/STRONG&gt;is located. This is because the NAT is &lt;U&gt;evaluated first and applied later&lt;/U&gt;. Which means that when the original packet (from user) hit the firewall, FW will use the original destination IP (in this case the loopback) to determine which is the destination zone&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;By the way - based on your network setup it is not necessary to have the IP as loopback on the FW to use it in NAT. Your devices only need to know to route 192.168.6.2 to the firewall (either with specific or default route)&lt;/P&gt;</description>
      <pubDate>Tue, 11 May 2021 10:06:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-destination-nat/m-p/405994#M92056</guid>
      <dc:creator>aleksandar.astardzhiev</dc:creator>
      <dc:date>2021-05-11T10:06:30Z</dc:date>
    </item>
    <item>
      <title>Re: PA Destination NAT</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-destination-nat/m-p/406004#M92057</link>
      <description>&lt;P&gt;hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/163084"&gt;@Nikko&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;yes, this is possible&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;the NAT rule will look like&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2021-05-11_12-11-14.png" style="width: 890px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/33753iF2A95023BFF9DFE9/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="2021-05-11_12-11-14.png" alt="2021-05-11_12-11-14.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 11 May 2021 10:14:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-destination-nat/m-p/406004#M92057</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2021-05-11T10:14:39Z</dc:date>
    </item>
  </channel>
</rss>

