Enhanced Security Measures in Place:   To ensure a safer experience, we’ve implemented additional, temporary security measures for all users.

mail and dns server

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
Announcements

mail and dns server

L2 Linker

Hello friends ,

 

I am runnng pv-vm on kvm , which  has no license presently ,(version 9.0.4)

baiscally this setup is understand palo alto firewall

i have domain /fqdn  (want to run all a mx ns server to run locally )

i have setup a web ,mail and ftp and dns server ,web server and ftp server working but need some help/understanting on mail and dns server ,

do i need nat rule or proxy ?

i have configure nat rule but there is problem with over shadows rules which is confusing me

how to setup a u-turn nat when intenal dns server is setup ?

if 9.0.4 does not support submission then which mail it support and how to config it 

 any reseller pls send me pm/dm 

Thanks

 

 

1 accepted solution

Accepted Solutions

Cyber Elite
Cyber Elite

Hello,

Just like security policies, the firewall reads the rules top-down. So the ones at the top once hit, the rest get disregarded. I would move your more specific NAT policies higher in the list and your more general one to the bottom.

View solution in original post

5 REPLIES 5

Cyber Elite
Cyber Elite

Hello,

It all depends on where the traffic is being sourced from and where the servers are located in the network. If you could give us a bit more guidance, we can help you out.

 

U-Turn rules are used if I want internal clients to connect to the public facing IP of a system. May not be required but it does depend on your environment.

 

Regards,

L2 Linker

what should be nat rule sequence if i am running web ,mail ,dns and ftp server from 1 server only ?

using panos 9.0.4

as  some nat rule are shadowdown

i am planing to use all possible dns setting localy

which is best method ,while just start using /exploring functionality of panos 

 

Cyber Elite
Cyber Elite

Hello,

Just like security policies, the firewall reads the rules top-down. So the ones at the top once hit, the rest get disregarded. I would move your more specific NAT policies higher in the list and your more general one to the bottom.

can you please tell me from image i post ,what is wrong ?

if i use internal dns server and dns proxy from palo alto ,does nat rule still shadow down ,(some nat rule doesnt hit )

Cyber Elite
Cyber Elite

Hello,

Move rule 1 to the bottom of the list.

 

OtakarKlier_0-1726764266483.png

See if that helps.

 

Regards,

  • 1 accepted solution
  • 832 Views
  • 5 replies
  • 0 Likes
Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!

The LIVEcommunity thanks you for your participation!