Hi @NoRaindropsInTheSky ,
The cool thing about this document https://docs.paloaltonetworks.com/pan-os/10-2/pan-os-networking-admin/nat/nat-configuration-examples/destination-nat-exampleone-to-one-mapping is that is has example security and NAT policy rules on the bottom. Follow those examples and your inbound traffic will work fine. Pay close attention to the zones used, the correct configuration may not be intuitive at first.
With regard to your traffic logs, traffic that does not match a security policy rule will hit the interzone-default rule. This rule does not log by default. You will need to highlight the rule, click the Override button on the bottom, configure logging, and commit your changes. Then you will see the dropped traffic in the logs.
Since you have a NGFW and a CSP (Customer Support Portal) account, you can also log into Beacon. https://beacon.paloaltonetworks.com. From there, search "firewall essentials". You will see the free 9.1 training. The PAN-OS is old, but the foundational configuration is the same. It is very good.
If you don't like the older audio/video type training, you can search for "next generation firewall". You will see training of the same name in the new interactive HTML format. Both free training have lots of good material.
If you have any question as to why, feel free to ask.
Thanks,
Tom
... View more