Making a note because its a bit different to cisco ASA
NAT rule
OUTSIDE > OUTSIDE
Public src > Public dst
FW rule
OUTSIDE > INSIDE (counted as inside because of the NAT)
Public src > Public dst
Making a note because its a bit different to cisco ASA
NAT rule
OUTSIDE > OUTSIDE
Public src > Public dst
FW rule
OUTSIDE > INSIDE (counted as inside because of the NAT)
Public src > Public dst
Had an issue could ping vlan1 (LAN) SVI but not vlan146 (VOICE)
The setup was
LAN client -> L2 VL1 -> L3 SVL VL1 -> Inside ASA -> S2S VPN -> HQ
Phone client -> L2 VL146 -> L3SVI VL146 -> L3 SVI 1 -> Inside ASA-> S2S VPN -> HQ -> Phone server
I found some messed up NAT's
Removed the global
object network obj_any
nat (any,outside) dynamic interface
The NoNat had a missing object in the destination
nat (voice,outside) source static obj-10.60.146.0 obj-10.60.146.0 destination static HQ-NET HQ-NETS no-proxy-arp route-lookup
Also needed this NAT on the INSIDE with the 146 networks to ping the SVI. This is becuase the route to the HQ network is through the inside interface of the ASA.
nat (inside,outside) source static obj-10.60.146.0 obj-10.60.146.0 destination static HQ-NET HQ-NETS no-proxy-arp route-lookup
I find switching from ASA to palo alto NAT confusing because they work in a different way and I've worked on ASA for so long.
nat rule (to nat traffic)
outside -> outside
Destination address is customer public IP: 100.200.200.114
Destination translations address is inside IP of the server: 192.168.0.1
policy rule (to allow traffic)
outside -> inside
Source IP is outside source public 8.8.8.8
inside destination IP is the public IP: 100.200.200.114
The main thing there is a public IP NAT is outside to outside on palo. On ASA its outside to inside for a public IP NAT.
Devices -> NAT
Edit NAT pol
Add rule button
NAT rule: Auto NAT rule
Type: Dynamic
Interface, set inside -> outside
Translated destination interface IP
show session all filter nat destination | match 100.200.200.10