- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
03-26-2026 04:32 AM
The customer is currently unable to access our server using the NAT IP addresses.
03-26-2026 06:54 AM
You host servers?
Customers come from Internet and you apply destination NAT on your Palo towards servers that are using IPs from RFC 1918 IP range?
03-29-2026 01:30 AM
To troubleshoot access issues to a server via NAT IP on a Palo Alto firewall, you should verify whether NAT is being applied correctly, confirm the matching security policy, and validate routing for both forward and return traffic.
Troubleshooting Steps
1️⃣ Identify Source Information
Start by confirming the source IP address of the customer attempting to access the server.
2️⃣ Check Traffic Logs
Go to:
Monitor → Traffic
• Add the column “NAT Destination IP”
• Apply a filter for the customer source IP
This helps determine whether Destination NAT is being applied.
3️⃣ Verify NAT Behavior
• If NAT is applied (NAT Destination IP is visible):
→ The traffic is correctly translated.
→ Check connectivity and routing on downstream devices (inside/DMZ side).
• If NAT is NOT applied:
→ Continue with the checks below.
4️⃣ Validate Security Policy
A common mistake in Palo Alto:
👉 The Destination Zone in the Security Policy must be the post-NAT zone, not the original zone.
Check:
• Correct Source Zone
• Correct Destination Zone (after NAT)
• Application / Service
Also verify the hit count on the rule.
5️⃣ Check NAT Rule Hit Count
Go to NAT policy and verify:
• Is the NAT rule being hit?
6️⃣ Correlate NAT vs Security Policy
• NAT hit count increases, but no hit on Security Policy →
👉 This usually indicates a routing issue or zone mismatch.
7️⃣ Verify Routing / PBF
Check:
• Routing table (forward path)
• Return path from server
• Policy-Based Forwarding (if configured)
Incorrect routing can prevent the session from completing even if NAT is correct.
Summary
The key checks are:
• Confirm NAT translation in traffic logs
• Ensure security policy uses post-NAT zone
• Compare hit counts between NAT and security rules
• Validate routing and return path
Most issues in this scenario are caused by zone mismatch in policy or routing problems after NAT.
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!

