- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
04-16-2024 08:16 AM
Hello all,
I have been updating our NAT policies within our PA-3220 to specify traffic translation mapping from our public addresses to private addresses. After committing the changes the traffic has only been routing to the catch all NAT rule at the bottom of our NAT policies. I am concerned that I did not configure everything correctly after following Palo's guide and would like any suggestions to correct the traffic.
The current NAT configurations look like this (image attached below):
Name: Squid Proxy | Source: Untrusted | Destination : Trusted | Destination Interface: e1/19 | Source Address: Any | Destination: (Public IP) | Service: Any | Source Translation: dynamic-ip-and-port, e1/19 | Destination Translation: 10.20.1.249
Any help would be appreciated. Thank you!
04-16-2024 09:24 AM
Hi @BenjaminRaimondi ,
Please change your destination zone to untrusted as well. In your security policy, the destination zone will be the true source zone. Here is a very helpful article written by @reaper on NATs. https://live.paloaltonetworks.com/t5/community-blogs/i-m-gonna-make-him-a-nat-rule-he-can-t-refuse/b...
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!