Enhanced Security Measures in Place:   To ensure a safer experience, we’ve implemented additional, temporary security measures for all users.

Source and Destination NAT at the same time

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
Announcements

Source and Destination NAT at the same time

L2 Linker

Hallo

Before going to my question, please assume the following scenario:

There is a Non-Palo Alto Firewall in internet (lets call it FW-Extern). There is another Non Palo Alto Firewall inside my network (lets call it FW-intern). The FW-Extern initiates IPSec VPN to FW-Intern. The VPN connections are always initiated by the FW-Extern in the direction of FW-Intern on the public IP of FW-Intern.

Now, I put a Palo Alto Firewall (lets call it PA-FW) between these two Non Palo Alto Firewalls. The PA-FW, should allow all this IPSec traffic between these two Non Palo Alto firewalls. The VPN tunnel should NOT terminate on PA-FW.

The FW-Extern has a Dynamic Public IP.

The FW-Intern, has a public IP address (lets say, for example, 1.2.3.4) and a private IP address (lets, say, for example, 192.168.1.1).

So when PA-FW, receives the connection for the IP 1.2.3.4, it performs destination NAT and changes the destination IP to 192.168.1.1.

Note that the PA-FW has an interface called e1/1, which is connected to the FW-Intern and that interface on PA-FW has an IP of 192.168.1.5.

Question:

Now there is a new requirement that when the PA-FW forwards packets to FW-Intern, then the PA-FW should also do Source Address Translation and change the source address to 192.168.1.5. (which is of its interface)

This means that the FW-Intern should talk only to PA-FW, and the FW-Intern has no idea about any external world.

How should the NAT, Security Policy and Routing for such a scenario configured?

Thanks!!

1 accepted solution

Accepted Solutions

L7 Applicator

Hello Amit,

As per my understanding from the above explanation, while PAN-FW will pass that traffic to FW-Intern it will be look like:

Source Address: 192.168.1.5

Destination Address: 192.168.1.1

Lets assume, PA connected with FW-Extern through "UNTRUST: security zone and ethernet-1/1 connected with FW-Intern is TRUST zone.

You should configure the NAT as:

From zone UNTRUST

To zone UNTRUST

NAT-Amit.jpg

Thanks

View solution in original post

10 REPLIES 10

L5 Sessionator

Hi Amit,

FW-Extrn has dynamic IP address which might cause the issue here. Assuming it has static ip say 4.5.6.7, you can configure following NAT :

Untrust to Untrust if source address is 4.5.6.7 and destination is 1.2.3.4 translate source (dynamic ip-and port to interface e1/1 192.168.1.5) and destination to 192.168.1.1

But since source address keeps on changing and it is the one which initiates vpn traffic, inbound NAT cannot be configured as desired. Hope this helps. Thank you.

L7 Applicator

Hello Amit,

As per my understanding from the above explanation, while PAN-FW will pass that traffic to FW-Intern it will be look like:

Source Address: 192.168.1.5

Destination Address: 192.168.1.1

Lets assume, PA connected with FW-Extern through "UNTRUST: security zone and ethernet-1/1 connected with FW-Intern is TRUST zone.

You should configure the NAT as:

From zone UNTRUST

To zone UNTRUST

NAT-Amit.jpg

Thanks

Hi Hulk,

Thanks for your reply!

This is exactly what I have done. However this is not working. The connection seems to go to the FW-Intern, but the return traffic is the problem!

How about Routing and Security Policies?

L7 Applicator

Hello Amit,

> You will also have to enable NAT-Traversal on both FW-Intern and FW-Extern firewalls, sine the packet is getting NAT'd in the path.

> The FW-Extern always should be the VPN initiator.

> VPN should be configured in aggressive mode.

Hope this helps.

Thanks

Hello AMit,

Routing is not required in your FW-Intern, since, source and destination belongs to the same subnet, instead it will do an ARP lookup to send traffic back to PA-FW. In PAN FW, you may try to configure a policy as:

Source zone: Untrust

Destination Zone: Trust ( ethernet-1/1)

Destination address: 1.2.3.4

Application -ANY

Service- AN

Action- allow

Before initiating the VPN, i would suggest you to check the normal connectivity between PA-Extern and PA-Intern through PING.

Thanks

Hi Amit,

Your security policy should say from Untrust to Trust to destination 1.2.3.4 allow. Your routing should be good as you have a host route already for interface E1/1 and a default route of 0.0.0.0

Next step would be to do a pcap for the traffic in question and see if anything is getting drop.

L7 Applicator

Hello Amit,

During the connectivity check, you may follow the session details to ensure NAT, policy lookup is happening in PAN firewall correctly.

Please check the real time session in the CLI by using 'show session all filter source IP_ADD_OF_THE_FW-Extern destination IP_ADD_OF_THE_DESTINATION'.


>  If there is a session exist for the same traffic,  then please apply  CLI command PAN> show session id XYZ   >>>>>>>> to get detailed information about that session, i.e NAT rule, security rule, ingress/egress interface etc.


Hope this helps.


Thanks

L2 Linker

Hi all,

Thanks for your replies.

As suggested by all, the security policy and routing are in place. However still stuff does not work.

HULK : In the command show session all filter source IP_ADD_OF_THE_FW-Extern, the problem is that IP_ADD_OF_THE_FW-Extern is dynamic and unknown.

Moreover, I cannot administer Non Palo Alto Firewalls and so I cannot ping between the 2.

Hello Amit,

It is not necessary to track the session based on both source and destination address. You may track it based on only destination address, port 500 /4500, protocol-ike etc.

Thanks

Hi Amit,

Like HULK suggested , you can only look for destination

show session all filter destination 1.2.3.4

This should give you ike and ipsec application in the session information and you can look for source address is there. I assume, these source will be there for another hour or 2 at least. In the mean time you can run pcap capture to see if firewall is dropping anything. If not, you can explore other avenues for troubleshooting. Hope this helps. Thank you.

  • 1 accepted solution
  • 6509 Views
  • 10 replies
  • 0 Likes
Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!

The LIVEcommunity thanks you for your participation!