I'm new to PAN Firewalls and currently I am trying to publish a customer's SBS Server via a PAN200. The Firewall has the public IP 126.96.36.199(of course i posted a fake one :smileywink:) and the server shall be accessible via 188.8.131.52.
- I've configured Accessrules allowing traffic from WAN to LAN + SBS internal IP
- Static unidirectional NAT for LAN -> WAN source sbs internal to 184.108.40.206
- Destination NAT for WAN -> WAN destination 220.127.116.11 to SBS internal IP
I've tried to reach the server and I can't find anything recorder in traffic monitoring.
Hope someone has a idea to solve this.
Solved! Go to Solution.
source zone: WAN any any any
dest zone: LAN SBS_internal
application and service: any
src zone: LAN src address SBS_internal
dst zone: WAN
static nat: 18.104.22.168
bi directional: no
src zone: WAN
dst zone: WAN dst address 22.214.171.124
Dest NAT: SBS_internal
all rules are on top, so nat+pat doesn't hit traffic from the server.
pinged 126.96.36.199 from the server and it was sucessfully nat'ed to the expected public IP and replies came back in. however inbound connections are not logged for this public ip
yep also filtered the logs for the specific ip or WAN as dst zone, but even without filters i didn't see the traffic
thanks guys, that was indeed the problem :smileyhappy:
for those wondering why the traffic was dropped but not logged: you need to define a rule that matches a drop, the default deny rule does not log.
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!