Understanding and Configuring NAT Tech Note PAN-OS 4.1
|
|
|
- Allison Dawson
- 10 years ago
- Views:
Transcription
1 Understanding and Configuring NAT Tech Note PAN-OS 4.1 Revision C 2012, Palo Alto Networks, Inc.
2 Contents Overview... 3 Scope... 3 Design Consideration... 3 Software requirement... 3 Hardware requirement... 3 NAT with PAN-OS... 3 Life of a packet... 4 Address Pools... 5 Proxy-ARP for NAT Pools... 5 Source NAT... 5 Dynamic-ip-and-port... 5 Dynamic-ip... 5 Source NAT examples... 6 Case 1: Source NAT IP Address and Port Translation... 6 Case 1a: Using the Interface IP Address for Translation... 6 Case 1b: Using an Address Object for Translation... 8 Case 2: Source NAT IP Address Translation... 9 Reserving IP Addresses Static NAT: Bi-directional Translation Destination NAT Case1: One-to-one mapping Case 2: Destination IP and Port Translation Case 3: One-to-Many Mapping Case 4: Server Access for Internal Users or U-turn NAT Case 5: Server in the Same Zone as the Clients Translating source and destination IP address Virtual Wire NAT Source NAT Static NAT Destination NAT NAT with IPSec VPN Verifying NAT rules NAT Exemptions NAT interaction with applications Summary Revision History , Palo Alto Networks, Inc. [2]
3 Overview Network address translation (NAT) was designed to address the depletion of the IPv4 address space. Since then NAT is not only used to conserve available IP addresses, but also as a security feature to hide the real IP addresses of hosts, securely providing private LAN users access to the public addresses. NAT is also sometimes used to solve network design challenges, enabling networks with identical IP subnets communicate with each other. Scope The purpose of this application note is to explain Palo Alto Networks PAN-OS NAT architecture, and to provide several common configuration examples. This paper assumes that the reader is familiar with NAT and how it is used in both service provider and enterprise networks. Design Consideration Software requirement Virtual wire NAT requires PAN-OS 4.1 Hardware requirement PA-5000, PA-4000, PA-2000 and PA-500 series of firewalls NAT with PAN-OS PAN-OS provides a mechanism for translating both the source IP addresses/port numbers and destination IP addresses/port numbers. PAN-OS uses rules to configure NAT. These rules are separate entities, and not configured as part of the allow/drop security rules. NAT rules are configured to match on: Source and destination zone Destination interface (optional) Source and destination addresses Service The configurable fields in the NAT rule are as follows: There can be multiple NAT rules configured on a PAN-OS device. NAT rules are evaluated top down like security rules. Once a packet matches a NAT rule, any other NAT rules configured are skipped for processing. Therefore, more specific NAT rules must be at the top to the rule list. 2012, Palo Alto Networks, Inc. [3]
4 Life of a packet The following diagram captures the packet processing sequence when NAT is involved. For the sake of simplicity the APP-ID, Content- ID and User- ID processing is not shown in the flow chart. Packet received Ingress interface/zone determined Update session timer, and forward packet Yes Existing session? No Route lookup Fail Success Egress interface/zone determined DST NAT rule? No Yes Translate destination address Route lookup Fail Drop Packet No Source NAT match? matched Yes Translate source address Success Egress interface/zone determined No Security rule allow? Yes Create session 2012, Palo Alto Networks, Inc. [4]
5 The translated addresses are determined after a packet matches the NAT rule. It is very important to note that the IP address and port translation happens only when the packet egresses the firewall. Hence the NAT rules and security rules always refer to the original IP addresses in the packet (i.e. the pre-nat addresses). Address Pools In PAN-OS, the IP address (also commonly referred to as IP address pools) used for address translation is configured as an address object. The address object can be a host IP address, IP subnet or IP address range. Because the address objects are used both in the security policies and NAT rules, it is recommended to use names that identify the address objects specifically used as NAT address pools. For example the names of address objects used in NAT rules begin with prefix NAT-<name>. Proxy-ARP for NAT Pools The address pools are not bound to any interfaces. If the address pool is in the same subnet as the egress/ingress interface IP address, the firewall will respond to ARP requests received on that interface for the IP addresses configured in the pool. If the address pool is not in the same subnet as the egress interface IP address, you must configure the necessary routes on the upstream devices in order to ensure the response traffic after address translation is routed back to the firewall. Source NAT PAN-OS supports the following options for source translation: Dynamic-ip-and-port Dynamic-ip Static IP Dynamic-ip-and-port This method allows for translation of the source IP address and port numbers to: Interface IP address IP address IP subnet Range of IP addresses Dynamic-ip This method allows for translation of only the source IP address to: IP address IP subnet, or Range of IP addresses The size of the dynamic-ip pool defines the number of the hosts that can be translated. If all the IP addresses in the dynamicip pool are used, any new connections that require address translation will be dropped. As sessions terminate, and IP addresses in the pool become available, these addresses can be used to translate new connections. Note: Dynamic-IP does not guarantee IP addresses reservation by default. 2012, Palo Alto Networks, Inc. [5]
6 Source NAT examples We shall discuss different scenarios where source NAT can be used to translate the source IP address and/or port numbers. Because the security policies always match the original IP address in the IP packet, for the sake of simplicity a generic security policy between the zones trust-l3 and untrust-l3 is applied to the device for all NAT configuration used in this document unless otherwise noted. Topology Case 1: Source NAT IP Address and Port Translation For translating both the source IP address and port numbers dynamic-ip-and-port type of translation must be used. This form of NAT is also commonly referred to as interface-based NAT or network address port translation (NAPT). Case 1a: Using the Interface IP Address for Translation In this example all the traffic from the subnet /24 is translated to the egress interface ethernet1/1 IP address /24: Configuration The NAT rule for this configuration would look as follows: 2012, Palo Alto Networks, Inc. [6]
7 Verification The show session command can be used to view the session table. Notice that the source IP address and port of the hosts and are both translated to the interface IP and to unique port numbers: show session all ID Application State Type Flag Src[Sport]/Zone/Proto (translated IP[Port]) Vsys Dst[Dport]/Zone (translated IP[Port]) ssh ACTIVE FLOW NS [59534]/trust-l3/6 ( [50219]) vsys [22]/untrust-l3 ( [22]) ssh ACTIVE FLOW NS [50034]/trust-l3/6 ( [51650]) vsys [22]/untrust-l3 ( [22]) The show session id command can be used to view more details about the session. Note in the server to client flow, the response is to the IP address on port 50219, which is the translated address of the host : show session id Session c2s flow: source: [trust-l3] dst: proto: 6 sport: dport: 22 state: ACTIVE type: FLOW src user: unknown dst user: unknown s2c flow: source: [untrust-l3] dst: proto: 6 sport: 22 dport: state: ACTIVE type: FLOW src user: unknown dst user: unknown start time : Fri Apr 8 10:26: timeout : sec time to live : sec total byte count : 5686 output truncated 2012, Palo Alto Networks, Inc. [7]
8 Case 1b: Using an Address Object for Translation You can also translate the source IP address and port numbers to a single IP address instead of using the egress interface IP address. In this example all the traffic from the subnet /24 will be translated to the IP address Configuration: An address object referring to the NAT IP address of must be created as shown in the following rule: admin@pa-5060> show session all ID Application State Type Flag Src[Sport]/Zone/Proto (translated IP[Port]) Vsys Dst[Dport]/Zone (translated IP[Port]) ssh ACTIVE FLOW NS [50964]/trust-l3/6 ( [7987]) vsys [22]/untrust-l3 ( [22]) ssh ACTIVE FLOW NS [50426]/trust-l3/6 ( [43853]) vsys [22]/untrust-l3 ( [22]) admin@pa-5060> Note: You can also use a pool of IP addresses for dynamic-ip-and-port source translation. 2012, Palo Alto Networks, Inc. [8]
9 Case 2: Source NAT IP Address Translation For translating only the source IP address, the dynamic-ip type of source translation must be used. In this form of NAT, the original source port number is left intact. Only the source IP address will be translated. Note: When using the dynamic-ip type of source NAT, the size of the NAT pool must be equal to the number of the internal hosts that require address translation. If all the IP addresses in the pool are in use, any connections from new hosts cannot be address translated and hence will be dropped. New sessions from hosts with established sessions with NAT will be allowed. Configuration: In this example an address pool of eleven IP addresses is created. The address pool is defined as an address object as follows: Network>address The NAT rule would look as follows: 2012, Palo Alto Networks, Inc. [9]
10 Verification Run the show session command; note that the source port is not translated: show session all ID Application State Type Flag Src[Sport]/Zone/Proto (translated IP[Port]) Vsys Dst[Dport]/Zone (translated IP[Port]) ssh ACTIVE FLOW NS [51298]/trust-l3/6 ( [51298]) vsys [22]/untrust-l3 ( [22]) ssh ACTIVE FLOW NS [43409]/trust-l3/6 ( [43409]) vsys [22]/untrust-l3 ( [22]) Troubleshooting tip: If all the addresses in the pool are in use, any new connections will not be translated and instead the packets will be dropped. Use the following command to see if any sessions have failed due to NAT IP allocation: show counter global filter aspect session severity drop match nat Debug output from a NAT allocation failure is shown below: Packet received at slowpath stage Packet info: len 74 port 17 interface 1 wqe index packet 0x0x fef0e6 Packet decoded dump: L2: 00:15:17:dd:9f:bb->00:1b:17:2c:c2:01, type 0x0800 IP: > , protocol 6 version 4, ihl 5, tos 0x00, len 60, id 49401, frag_off 0x4000, ttl 64, checksum TCP: sport 49099, dport 22, seq , ack 0, reserved 0, offset 10, window 5840, checksum 61035, flags 0x0002 ( SYN), urgent data 0 TCP option: : b a fd c gU< : Session setup: vsys 1 PBF lookup (vsys 1) with application ssh Session setup: ingress interface vlan egress interface ethernet1/1 (zone 5) NAT policy lookup, matched rule index 0 Policy lookup, matched rule index , Palo Alto Networks, Inc. [10]
11 DP2 is selected to process this session. Allocated new session 203. Packet dropped, source NAT IP/port allocation failed k Packet dropped, Session setup failed Reserving IP Addresses Dynamic-IP address pools can be configured to reserve IP addresses for translation. By default, the IP reservation setting, reserve-ip, is disabled. If reserve-ip is set to yes, reserve-time must also be set to a value between seconds (30 days). If set, the dynamic IP rules will support reserving an IP address up to the user specified reserve-time after all sessions of that original source IP address translation expire. For example, if reserve-time is set to 8 hours, when the last session of the original source IP expires, the translated IP will be reserved for another 8 hours. During this time the IP address is reserved for the original source IP address. This means that other hosts will not be able to get a translated IP address from the pool even if there are active sessions because all translated IP addresses are reserved. IP reservation is configured from the CLI as follows: set setting nat reserve-ip <yes/no> set setting nat reserve-time < secs> Static NAT: Bi-directional Translation Static NAT is used for translating a range of IP addresses or a subnet to another IP address range or subnet. The size of the static NAT pool must be same as the size of the source addresses to be translated. Static NAT also offers the benefit of bi-directional translation, where the destination IP can also be translated for inbound connections. Static NAT is commonly used to access servers behind a firewall from the outside. The following diagram shows static NAT use case. The server is mapped to IP With a static NAT configuration, all connections initiated from the server will be translated to as follows: If the bi-directional setting is configured for static NAT, then all connections to the IP address of will be translated to the real IP address of the server : 2012, Palo Alto Networks, Inc. [11]
12 Configuration: In this example, the server is mapped to IP Static NAT is configured for bi-directional NAT. The following address objects are required for this setup: Address object for the real IP address of the server Address object for the translated IP address of the server The following shows the configured address objects on the firewall: The NAT rules would look as follows. Note that the NAT rule Int Source NAT is required for translating hosts other than : Configuration Tip: Static NAT does not have precedence over other forms of NAT. Therefore the order of the NAT rules is very important. For static NAT to work, the static NAT rules must above all configured NAT rules Security Policy configuration For outbound access from the host , the generic security policy to permit any from the dmz-l3 zone to the untrust-l3 zone is required. In order to allow inbound access from outside hosts, the security policy must match the following: 1. Source and destination IP address as seen in the original packet 2. Source zone: Incoming zone of the packet to the server 3. Destination zone: zone where the server is physically connected The configured security policy to provide access to the server from the untrust-l3 zone would look as follows: 2012, Palo Alto Networks, Inc. [12]
13 Configuration Tip: The destination address in the policy is and NOT Verification The connection initiated from host is translated to The port numbers remain unchanged. show session all ID Application State Type Flag Src[Sport]/Zone/Proto (translated IP[Port]) Vsys Dst[Dport]/Zone (translated IP[Port]) ssh ACTIVE FLOW NS [54121]/dmz-l3/6 ( [54121]) vsys [22]/untrust-l3 ( [22]) In the following connection from host to , the destination IP address is translated to show session all ID Application State Type Flag Src[Sport]/Zone/Proto (translated IP[Port]) Vsys Dst[Dport]/Zone (translated IP[Port]) ssh ACTIVE FLOW ND [60616]/untrust-l3/6 ( [60616]) vsys [22]/dmz-l3 ( [22]) Note: The bi-directional option in the static NAT configuration must be enabled for the outside host to access the server. This function creates a hidden NAT rule, allowing the destination translation to the static NAT host. admin@pa-5060> show running nat-policy "Static NAT" { from dmz-l3; source ; to untrust-l3; to-interface ; destination any; service any/any; translate-to "src: (static-ip) (pool idx: 2)"; } "Static NAT" { from any; source any; to untrust-l3; to-interface ; destination ; service any/any; translate-to "dst: "; } System generated NAT rule 2012, Palo Alto Networks, Inc. [13]
14 With these settings, connections from any zone to the server are permitted. This requires creating the security policy to allow traffic to the destination zone where the server is connected. In the following topology, in order to allow hosts from partner-l3 zone to access the server, the security policy in the previous configuration is modified to allow connections from any host in the partner-l3 zone. The modified security policy would look as follows: Verification show session all ID Application State Type Flag Src[Sport]/Zone/Proto (translated IP[Port]) Vsys Dst[Dport]/Zone (translated IP[Port]) ssh ACTIVE FLOW ND [56970]/partner-l3/6 ( [56970]) vsys [22]/dmz-l3 ( [22]) ssh ACTIVE FLOW ND [46504]/untrust-l3/6 ( [46504]) vsys [22]/dmz-l3 ( [22]) 2012, Palo Alto Networks, Inc. [14]
15 Destination NAT Destination NAT is used to translate the destination IP address and/or the destination IP address and port number of packet. This form of NAT can also be used to map one IP address to multiple internal host IP addresses. In this case, the destination port numbers are used to identify the destination host. NAT and Security Rule Interaction with Destination NAT The most common mistake in configuring the NAT and security rules are the references to the zones and address objects. The addresses used in destination NAT rules always refer to the original IP address in the packet (i.e. the pre-translated address). The destination zone in the NAT rule is determined after the route lookup of the destination IP address on the original packet (i.e. the pre-nat destination IP address). The addresses in the security policy also refer to the IP address in the original packet (i.e. the pre-nat address). However, the destination zone is the zone where the end host is physically connected. The other way to look at it is the destination zone in the security rule is determined after the route lookup of the post NAT destination IP address. Case1: One-to-one mapping Configuration In this example, users from zone untrust-l3 access the server in zone dmz-l3 using the IP address Before configuring the NAT rules, let us walk through the sequence of the events for this flow: 1. Host , sends an ARP request for the address The firewall receives the ARP request packet for destination on the interface ethernet1/1 and processes the request. The firewall responds to the ARP request with its own MAC address because of the destination NAT rule configured. 3. The NAT rule is evaluated for a match. For the destination IP address to be translated, a destination NAT rule from zone untrust-l3 to zone untrust-l3 must be created to translate the destination IP of to After the translated address is determined, a route lookup for destination is performed to determine the egress interface. In this example the egress interface will be ethernet1/2 in zone dmz-l3. 5. A security policy lookup is performed to see if the traffic is permitted from zone untrust-l3 to dmz-l3. It is important to note, the direction of the policy matches the ingress zone and the zone where the server is physically located. Also note that the security policy refers to the IP addresses in the original packet, which has a destination address of The packet is then forwarded out to the server via the egress interface ethernet1/2. The destination address is changed to as the packet leaves the firewall. 2012, Palo Alto Networks, Inc. [15]
16 Configuration The following address objects are required for this setup: Address object for the real IP address of the server Address object for the translated IP address of the server The configured address objects would look like this: And the configured NAT rules would look like this: Configuration tip: The direction of the NAT rules is based on the result of route lookup. Also note that the security policy refers to the IP addresses in the original packet, which has a destination address of The configured security policy to provide access to the server from the untrust-l3 zone would look as follows: Configuration tip: The direction of the security policy matches the ingress zone and the zone where the server is physically located. Also note that the security policy refers to the IP addresses in the original packet, which has a destination address of Verification Verify the sender IP address and target IP address in the ARP request packet: Packet received at ingress stage Packet info: len 60 port 16 interface 16 wqe index packet 0x0x ffe0e0 Packet decoded dump: L2: a4:ba:db:ba:3f:07->ff:ff:ff:ff:ff:ff, type 0x0806 ARP: hardware type 0x0001 protocol type 0x0800 hardware size 6 protocol size 4 opcode REQUEST sender mac address a4:ba:db:ba:3f:07 sender ip address target mac address 00:00:00:00:00:00 target ip address No flow lookup for packet, continue with forwarding Forwarding lookup, ingress interface 16 L3 mode, virtual-router 1 Enqueue packet to ARP process 2012, Palo Alto Networks, Inc. [16]
17 Flow debug Packet received at fastpath stage Packet info: len 477 port 16 interface 16 wqe index packet 0x0x fe70e6 Packet decoded dump: L2: a4:ba:db:ba:3f:07->00:1b:17:01:4a:10, type 0x0800 IP: > , protocol 6 version 4, ihl 5, tos 0x00, len 463, id 699, frag_off 0x4000, ttl 128, checksum TCP: sport 52288, dport 80, seq , ack , reserved 0, offset 5, window 63537, checksum 28577, flags 0x0018 ( ACK PSH), urgent data 0 TCP option: Flow fastpath, session 15 NAT session, run address/port translation session 15 packet sequeunce old 13 new 14 == Jun 07 10:43:07 == Packet received at forwarding stage Packet info: len 477 port 16 interface 16 wqe index packet 0x0x fe70e6 Packet decoded dump: L2: a4:ba:db:ba:3f:07->00:1b:17:01:4a:10, type 0x0800 IP: > , protocol 6 version 4, ihl 5, tos 0x00, len 463, id 699, frag_off 0x4000, ttl 128, checksum TCP: sport 52288, dport 80, seq , ack , reserved 0, offset 5, window 63537, checksum 26273, flags 0x0018 ( ACK PSH), urgent data 0 TCP option: Forwarding lookup, ingress interface 16 L3 mode, virtual-router 1 Route lookup in virtual-router 1, IP Route found, interface ethernet1/2, zone 19 Resolve ARP for IP on interface ethernet1/2 ARP entry found on interface 17 Transmit packet on port 17 admin@pa-2050# run show session all ID Application State Type Flag Src[Sport]/Zone/Proto (translated IP[Port]) Vsys Dst[Dport]/Zone (translated IP[Port]) 30 web-browsing ACTIVE FLOW ND [53079]/untrust-l3/6 ( [53079]) vsys [80]/dmz-l3 ( [80]) 2012, Palo Alto Networks, Inc. [17]
18 Case 1a: In this example, the firewall is configured to use a destination NAT IP address that does not belong to any of its connected interfaces. The upstream router must be configured to route the traffic to the destination NAT address to the firewall. In this example, the traffic to destination must be routed to the firewall for address translation. The following is a snapshot of the routing table on the firewall: admin@pa-2050> show routing fib total virtual-router shown : 1 virtual-router name: VR1 interfaces: ethernet1/1 ethernet1/2 ethernet1/3 tunnel.1 route table: flags: u - up, h - host, g - gateway maximum of fib entries for device: 5000 number of fib entries for device: 5 maximum of fib entries for this fib: 5000 number of fib entries for this fib: 5 number of fib entries shown: 5 id destination nexthop flags interface mtu / ug ethernet1/ / u ethernet1/ / uh ethernet1/ / u ethernet1/ / uh ethernet1/ Before configuring the NAT rules, let us walk through the sequence of the events for this flow: 1. The router forwards the packet with destination IP address to the firewall. The ingress interface for this packet is ethernet1/1, which is in the zone untrust-l3. 2. The firewall does a route lookup to determine the egress interface. The best route match is the default route, route id The packet is then forwarded back on to the interface ethernet1/1. The egress zone for this packet is same as ingress zone: untrust-l3. 4. The NAT rule is evaluated for a match. In order for the destination IP address to be translated, a destination NAT rule from zone untrust-l3 to zone untrust-l3 must be created to translate the destination IP of to , Palo Alto Networks, Inc. [18]
19 5. After the translated address is determined, a route lookup for destination is performed to determine the egress interface. In this example the egress interface will be ethernet1/2 in zone dmz-l3. 6. A security policy lookup is performed to see if the traffic is permitted from zone untrust-l3 to dmz-l3. It is important to note, the direction of the policy matches the ingress zone and the zone where the server is physically located. Also note that the security policy refers to the IP addresses in the original packet, which has a destination address of The packet is then forwarded out to the server via the egress interface ethernet1/2. The destination address is changed to as the packet leaves the firewall. Configuration: This configuration requires the following address objects: The NAT rules and the security policies are configured similar to Case1: admin@pa-2050> show session all ID Application State Type Flag Src[Sport]/Zone/Proto (translated IP[Port]) Vsys Dst[Dport]/Zone (translated IP[Port]) 146 web-browsing ACTIVE FLOW ND [58820]/untrust-l3/6 ( [58820]) vsys [80]/dmz-l3 ( [80]) Case 2: Destination IP and Port Translation In this example, the web server is configured to listen for HTTP traffic on port The clients access the web server using the IP address and TCP port 80. The destination NAT rule is configured to translate both IP and port to and TCP port Configuration: The following NAT and security rules must be configured on the firewall: 2012, Palo Alto Networks, Inc. [19]
20 NAT rule Security rule Verification show session all ID Application State Type Flag Src[Sport]/Zone/Proto (translated IP[Port]) Vsys Dst[Dport]/Zone (translated IP[Port]) 80 web-browsing ACTIVE FLOW ND [55077]/untrust-l3/6 ( [55077]) vsys [80]/dmz-l3 ( [8080]) Case 3: One-to-Many Mapping In this example, one IP address maps to two different internal hosts. The application is used to identify the internal host to which the firewall will forward the traffic. All HTTP traffic is sent to the host and SSH traffic is sent to the server as follows: 2012, Palo Alto Networks, Inc. [20]
21 Configuration The following address objects are required for this setup: Address object for the real IP address of the web server Address object for real IP address of the SSH server Address object for the translated IP address of the server The configured address objects would look like this: The NAT rules would look like this: And the security rules would look like this: Verification show session all ID Application State Type Flag Src[Sport]/Zone/Proto (translated IP[Port]) Vsys Dst[Dport]/Zone (translated IP[Port]) 75 web-browsing ACTIVE FLOW ND [54863]/untrust-l3/6 ( [54863]) vsys [80]/dmz-l3 ( [80]) 74 ssh ACTIVE FLOW ND [54862]/untrust-l3/6 ( [54862]) vsys [22]/dmz-l3 ( [22]) 2012, Palo Alto Networks, Inc. [21]
22 Case 4: Server Access for Internal Users or U-turn NAT In the scenario, destination NAT is configured for outside users to access the server in the dmz-l3 zone using the address This example shows the configuration to allow the internal users to access the same server using the IP address The routing configuration on the firewall: show routing fib total virtual-router shown : 1 virtual-router name: VR1 interfaces: ethernet1/1 ethernet1/2 ethernet1/3 tunnel.1 route table: flags: u - up, h - host, g - gateway maximum of fib entries for device: 5000 number of fib entries for device: 5 maximum of fib entries for this fib: 5000 number of fib entries for this fib: 5 number of fib entries shown: 5 id destination nexthop flags interface mtu / ug ethernet1/ / u ethernet1/ / uh ethernet1/ / u ethernet1/ / uh ethernet1/ Packet flow sequence: 1. The firewall receives the packet for destination on the interface ethernet1/15 and does a route lookup to determine the egress interface. 2. The packet is forwarded on to the interface etherenet1/1. 3. The NAT rule is evaluated for a match. In order for the destination IP address to be translated, a destination NAT rule from zone trust-l3 to zone untrust-l3 must be created to translate the destination IP of to , Palo Alto Networks, Inc. [22]
23 4. After the translated address is determined, a route lookup for destination is performed to determine the egress interface. In this example the egress interface will be ethernet1/2 in zone dmz-l3. 5. A security policy lookup is performed to see if the traffic is permitted from zone trust-l3 to dmz-l3. It is important to note, the direction of the policy matches the ingress zone and the zone where the server is physically located. Also note that the security policy refers to the IP address in the original packet, which has a destination address of The packet is then forwarded out to the server via the egress interface ethernet1/2. The destination address is changed to as the packet leaves the firewall. Configuration: NAT rule Security rule Verification admin@pa-2050> show session all ID Application State Type Flag Src[Sport]/Zone/Proto (translated IP[Port]) Vsys Dst[Dport]/Zone (translated IP[Port]) 187 web-browsing ACTIVE FLOW ND [60848]/trust-l3/6 ( [60848]) vsys [80]/dmz-l3 ( [80]) Case 5: Server in the Same Zone as the Clients In this example, the clients and the server are in same network/zone. The clients access the server using the public IP address of The response from the server is also routed back through the firewall. 2012, Palo Alto Networks, Inc. [23]
24 Configuration: The NAT rule required for this configuration is similar to the previous example. The NAT rule is required to match traffic from the trust-l3 zone to the untrust-l3 zone. Because the response from the server is also routed back through the firewall, source NAT must also be enabled on the rule. NAT rule After translation, security policy is matched. In this example, because the clients and the server are in the same network/zone, no security policy is needed. Translating source and destination IP address In this example, we will configure NAT rule to translate both the source and destination IP address of the packet. The following address objects are created 1. Server-Pre-NAT: Server-post-NAT: Screen shot of the NAT policy is as shown 2012, Palo Alto Networks, Inc. [24]
25 Verification show session all filter destination ID Application State Type Flag Src[Sport]/Zone/Proto (translated IP[Port]) Vsys Dst[Dport]/Zone (translated IP[Port]) ssh ACTIVE FLOW NB [50281]/l3-trust/6 ( [23707]) vsys [22]/l3-untrust ( [22]) The output of the relevant debug is shown below with ICMP traffic is shown below == Oct 26 17:16:52 == Packet received at slowpath stage Packet info: len 74 port 17 interface 266 vsys 1 wqe index packet 0x0x b6dce0c6 Packet decoded dump: L2: 5c:26:0a:45:e7:b6->b4:0c:25:f5:8b:01, type 0x0800 IP: > , protocol 1 version 4, ihl 5, tos 0x00, len 60, id 5220, frag_off 0x0000, ttl 128, checksum ICMP: type 8, code 0, checksum 19769, id 1, seq 34 Session setup: vsys 1 PBF lookup (vsys 1) with application ping Session setup: ingress interface vlan.1 egress interface ethernet1/1 (zone 9) NAT policy lookup, matched rule index 0 Destination NAT, translated IP PBF lookup (vsys 1) with application ping Session setup: egress zone 9 for natted IP Translated IP in zone 9, egress id 16 Policy lookup, matched rule index 0 DP0 is selected to process this session. Allocated new session Packet matched vsys 1 NAT rule 'Server NAT' (index 1), source translation /1 => /1 destination translation /34 => /34 Created session, enqueue to install --- pan_debug_tag=5---pan_sys_up_ticks= == Oct 26 17:16:52 == Packet received at fastpath stage Packet info: len 74 port 17 interface 266 vsys 1 wqe index packet 0x0x b6dce0c6 Packet decoded dump: L2: 5c:26:0a:45:e7:b6->b4:0c:25:f5:8b:01, type 0x0800 IP: > , protocol 1 version 4, ihl 5, tos 0x00, len 60, 2012, Palo Alto Networks, Inc. [25]
26 id 5220, frag_off 0x0000, ttl 128, checksum ICMP: type 8, code 0, checksum 19769, id 1, seq 34 Flow fastpath, session NAT session, run address/port translation --- pan_debug_tag=5---pan_sys_up_ticks= == Oct 26 17:16:52 == Packet received at forwarding stage Packet info: len 74 port 17 interface 266 vsys 1 wqe index packet 0x0x b6dce0c6 Packet decoded dump: L2: 5c:26:0a:45:e7:b6->b4:0c:25:f5:8b:01, type 0x0800 IP: > , protocol 1 version 4, ihl 5, tos 0x00, len 60, id 5220, frag_off 0x0000, ttl 128, checksum ICMP: type 8, code 0, checksum 19769, id 1, seq 34 Forwarding lookup, ingress interface 266 L3 mode, virtual-router 1 Route lookup in virtual-router 1, IP Route found, interface ethernet1/1, zone 9, nexthop Resolve ARP for IP on interface ethernet1/1 ARP entry found on interface 16 Transmit packet on port 16 Virtual Wire NAT With PAN-OS version 4.1, it is possible to configure NAT for interfaces configured in a virtual wire. The following types of NAT configurations are supported in virtual wire NAT: Source NAT o Dynamic IP o Dynamic IP and port o Static NAT Destination NAT Note: Because interfaces in a virtual wire do not have an IP address assigned, it is not possible to translate an IP address to an interface IP address. You must configure IP address pool. The firewalls will not proxy ARP for NAT addresses. Ensure that routes are configured on the upstream and downstream devices. Proper routing must be configured on the upstream and downstream routers in order for the packets to be translated in virtual wire mode. Virtual wire NAT policies do allow using ANY as the destination zone. Some of the virtual wire NAT scenarios are discussed in the sections that follow. The security policies for both source NAT and static NAT are configured to be from virtual wire zones vw-trust to vw-untrust. Source NAT Virtual wire deployment of a Palo Alto Networks firewall provides the benefit of providing security transparently to the end devices. In the following topology example, two routers are configured to provide connectivity between the subnets /24 and /24 respectively. The link between the routers is configured in subnet /30. Static routing is configured on both the routers to establish connectivity between the networks. 2012, Palo Alto Networks, Inc. [26]
27 Route on R1: Destination Next hop / Route on R2: Destination Next hop / In this example, the firewall is deployed in virtual wire mode between two layer 3 devices. All connections from clients in network /24 accessing servers in network /24 will be translated to IP range of A NAT IP address pool with range is configured on the firewall. All connections from the clients in subnet /24 will arrive at the router R2 with translated source address in the range The response from servers will be directed to these addresses. In order for source NAT to work, proper routing must be configured on router R2. The table below shows the modified routing table on router R2. This will ensure the traffic to the destination i.e. subnet /29, will be sent back via the firewall to router R1. Route on R2: Destination Next hop / Static NAT In this example, host is statically translated to address Static NAT with the bi-directional option is also supported in virtual wire mode. In this example, with the bi-directional option enabled, system generated NAT policy is generated from the vw-untrust zone to vw-trust zone. Clients on the vw-untrust zone access the server using the IP address , which will be translated by the firewall to Any connections initiated by the server at will be translated to source IP address , Palo Alto Networks, Inc. [27]
28 Route on R2: Destination Next hop / NAT policy Destination NAT Clients in the vw-untrust zone access the server using the IP address , which will be translated by the firewall to Both the NAT and security policy must be configured from vw-untrust zone to vw-trust zone. Route on R2: Destination Next hop / , Palo Alto Networks, Inc. [28]
29 NAT policy NAT with IPSec VPN NAT can be configured to translate packets before they are encrypted. For configuration examples, refer to the document at Verifying NAT rules With multiple NAT rules configured on the device, the order of the NAT rules is important for address translation. NAT rule processing can be verified from the CLI using the operational mode test nat-policy-match command. test nat-policy-match <options> + destination destination IP address + destination-port Destination port + from From zone + protocol IP protocol value + source source IP address + source-port Source port + to To zone + to-interface Egress interface to use For example: admin@fw> test nat-policy-match from l3-untrust source destination destination-port 443 protocol 6 Destination-NAT: Rule matched: CA2-DEMO :443 => :443 NAT Exemptions Both source NAT and destination NAT rules can be configured to disable address translation. This is used in scenarios where NAT has to be disabled for certain hosts in a subnet, or when NAT is not required for traffic exiting a specific interface. This is accomplished by setting the source NAT translation type to NONE as follows: 2012, Palo Alto Networks, Inc. [29]
30 NAT interaction with applications Dynamic-IP address translation works with only TCP- and UDP-based applications. Traceroute is not supported with dynamic-ip translation. Summary PAN-OS rule-based NAT offers a very flexible way of implementing address translation to meet challenging network requirements while offering increased ease of use. When combined with application visibility, application control and threat prevention, Palo Alto Network firewalls offer the best of breed in security and networking functions. Revision History Date Revision Comment 8/26/2012 C 6/15/ /10/2011 B A Editorial updates and included scenario with source and destination NAT Updated with new flow chart, example on U turn NAT First draft 2012, Palo Alto Networks, Inc. [30]
Policy Based Forwarding
Policy Based Forwarding Tech Note PAN-OS 4.1 Revision A 2012, Palo Alto Networks, Inc. www.paloaltonetworks.com Contents Overview... 3 Security... 3 Performance... 3 Symmetric Routing... 3 Service Versus
Configuring PA Firewalls for a Layer 3 Deployment
Configuring PA Firewalls for a Layer 3 Deployment Configuring PAN Firewalls for a Layer 3 Deployment Configuration Guide January 2009 Introduction The following document provides detailed step-by-step
Scaling Next-Generation Firewalls with Citrix NetScaler
Scaling Next-Generation Firewalls with Citrix NetScaler SOLUTION OVERVIEW Citrix NetScaler service and application delivery solutions are deployed in thousands of networks around the globe to optimize
Sample Configuration Using the ip nat outside source static
Sample Configuration Using the ip nat outside source static Table of Contents Sample Configuration Using the ip nat outside source static Command...1 Introduction...1 Before You Begin...1 Conventions...1
QoS in PAN-OS. Tech Note PAN-OS 4.1. Revision A 2011, Palo Alto Networks, Inc.
QoS in PAN-OS Tech Note PAN-OS 4.1 Revision A Contents Overview... 3 Why QoS... 3 Learn about Applications in your Network... 3 Terms and Concepts... 3 Classification... 3 Priority Queues... 4 Limiting
Configuring a Lan-to-Lan VPN with Overlapping Subnets with Juniper NetScreen/ISG/SSG Products
Application Note Configuring a Lan-to-Lan VPN with Overlapping Subnets with Juniper NetScreen/ISG/SSG Products Version 1.0 January 2008 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089
Layer 2 Networking. Overview. VLANs. Tech Note
Layer 2 Networking Tech Note Overview PAN-OS is very flexible, allowing administrators to mix and match physical firewall interfaces amongst virtual wire, layer 2, layer 3, and tap mode configurations.
Set Up a VM-Series Firewall on the Citrix SDX Server
Set Up a VM-Series Firewall on the Citrix SDX Server Palo Alto Networks VM-Series Deployment Guide PAN-OS 6.1 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa
Configuring Flexible NetFlow
CHAPTER 62 Note Flexible NetFlow is only supported on Supervisor Engine 7-E, Supervisor Engine 7L-E, and Catalyst 4500X. Flow is defined as a unique set of key fields attributes, which might include fields
Link Load Balancing 2015-04-28 08:50:44 UTC. 2015 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement
Link Load Balancing 2015-04-28 08:50:44 UTC 2015 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement Contents Link Load Balancing... 3 Link Load Balancing... 4 Configuring
Configuring Network Address Translation (NAT)
8 Configuring Network Address Translation (NAT) Contents Overview...................................................... 8-3 Translating Between an Inside and an Outside Network........... 8-3 Local and
Innominate mguard Version 6
Innominate mguard Version 6 Application Note: Firewall Logging mguard smart mguard PCI mguard blade mguard industrial RS EAGLE mguard mguard delta Innominate Security Technologies AG Albert-Einstein-Str.
Sample Configuration Using the ip nat outside source list C
Sample Configuration Using the ip nat outside source list C Table of Contents Sample Configuration Using the ip nat outside source list Command...1 Introduction...1 Before You Begin...1 Conventions...1
Internet Protocol: IP packet headers. vendredi 18 octobre 13
Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)
Configuring Dual VPNs with Dual ISP Links Using ECMP Tech Note PAN-OS 7.0
Configuring Dual VPNs with Dual ISP Links Using ECMP Tech Note PAN-OS 7.0 Revision A 2015, Palo Alto Networks, Inc. www.paloaltonetworks.com Contents Overview... 3 Use Case... 3 Equal Cost MultiPath (ECMP)...
Network Agent Quick Start
Network Agent Quick Start Topic 50500 Network Agent Quick Start Updated 17-Sep-2013 Applies To: Web Filter, Web Security, Web Security Gateway, and Web Security Gateway Anywhere, v7.7 and 7.8 Websense
Firewall Defaults and Some Basic Rules
Firewall Defaults and Some Basic Rules ProSecure UTM Quick Start Guide This quick start guide provides the firewall defaults and explains how to configure some basic firewall rules for the ProSecure Unified
PAN-OS Syslog Integration
PAN-OS Syslog Integration Tech Note Revision M 2012, Palo Alto Networks, Inc. www.paloaltonetworks.com Contents Log Formats...3 TRAFFIC...3 Descriptions...3 Subtype Field...5 Action Field...6 Flags Field...6
PassGuide.PCNSE6 (48Q)
PassGuide.PCNSE6 (48Q) Number: PCNSE6 Passing Score: 800 Time Limit: 120 min File Version: 4.9 http://www.gratisexam.com/ PCNSE6 Palo Alto Networks Certified Network Security Engineer 6.0 1. I was so happy
Smart Tips. Enabling WAN Load Balancing. Key Features. Network Diagram. Overview. Featured Products. WAN Failover. Enabling WAN Load Balancing Page 1
Smart Tips Enabling WAN Load Balancing Overview Many small businesses today use broadband links such as DSL or Cable, favoring them over the traditional link such as T1/E1 or leased lines because of the
CSE331: Introduction to Networks and Security. Lecture 12 Fall 2006
CSE331: Introduction to Networks and Security Lecture 12 Fall 2006 Announcements Midterm I will be held Friday, Oct. 6th. True/False Multiple Choice Calculation Short answer Short essay Project 2 is on
NAT REFERENCE GUIDE. VYATTA, INC. Vyatta System NAT. Title
Title VYATTA, INC. Vyatta System NAT REFERENCE GUIDE NAT Vyatta Suite 200 1301 Shoreway Road Belmont, CA 94002 vyatta.com 650 413 7200 1 888 VYATTA 1 (US and Canada) Copyright COPYRIGHT Copyright 2005
VLAN und MPLS, Firewall und NAT,
Internet-Technologien (CS262) VLAN und MPLS, Firewall und NAT, 15.4.2015 Christian Tschudin Departement Mathematik und Informatik, Universität Basel 6-1 Wiederholung Unterschied CSMA/CD und CSMA/CA? Was
Understanding Virtual Router and Virtual Systems
Understanding Virtual Router and Virtual Systems PAN- OS 6.0 Humair Ali Professional Services Content Table of Contents VIRTUAL ROUTER... 5 CONNECTED... 8 STATIC ROUTING... 9 OSPF... 11 BGP... 17 IMPORT
H3C Firewall and UTM Devices DNS and NAT Configuration Examples (Comware V5)
H3C Firewall and UTM Devices DNS and NAT Configuration Examples (Comware V5) Copyright 2015 Hangzhou H3C Technologies Co., Ltd. All rights reserved. No part of this manual may be reproduced or transmitted
Linux Routers and Community Networks
Summer Course at Mekelle Institute of Technology. July, 2015. Linux Routers and Community Networks Llorenç Cerdà-Alabern http://personals.ac.upc.edu/llorenc [email protected] Universitat Politènica de
Chapter 11 Network Address Translation
Chapter 11 Network Address Translation You can configure an HP routing switch to perform standard Network Address Translation (NAT). NAT enables private IP networks that use nonregistered IP addresses
Technical Support Information Belkin internal use only
The fundamentals of TCP/IP networking TCP/IP (Transmission Control Protocol / Internet Protocols) is a set of networking protocols that is used for communication on the Internet and on many other networks.
Internet Firewall CSIS 3230. Internet Firewall. Spring 2012 CSIS 4222. net13 1. Firewalls. Stateless Packet Filtering
Internet Firewall CSIS 3230 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 8.8: Packet filtering, firewalls, intrusion detection Ch
642 523 Securing Networks with PIX and ASA
642 523 Securing Networks with PIX and ASA Course Number: 642 523 Length: 1 Day(s) Course Overview This course is part of the training for the Cisco Certified Security Professional and the Cisco Firewall
Firewall Implementation
CS425: Computer Networks Firewall Implementation Ankit Kumar Y8088 Akshay Mittal Y8056 Ashish Gupta Y8410 Sayandeep Ghosh Y8465 October 31, 2010 under the guidance of Prof. Dheeraj Sanghi Department of
Troubleshooting the Firewall Services Module
CHAPTER 25 This chapter describes how to troubleshoot the FWSM, and includes the following sections: Testing Your Configuration, page 25-1 Reloading the FWSM, page 25-6 Performing Password Recovery, page
Configuring Active/Active HA Tech Note PAN-OS 4.0
Configuring Active/Active HA Tech Note PAN-OS 4.0 Revision B 2014, Palo Alto Networks, Inc. www.paloaltonetworks.com Contents Overview...3 Hardware requirements...3 Software requirements...3 Feature description...3
21.4 Network Address Translation (NAT) 21.4.1 NAT concept
21.4 Network Address Translation (NAT) This section explains Network Address Translation (NAT). NAT is also known as IP masquerading. It provides a mapping between internal IP addresses and officially
Firewall. FortiOS Handbook v3 for FortiOS 4.0 MR3
Firewall FortiOS Handbook v3 for FortiOS 4.0 MR3 FortiOS Handbook Firewall v3 24 January 2012 01-432-148222-20120124 Copyright 2012 Fortinet, Inc. All rights reserved. Contents and terms are subject to
Configuring IP Load Sharing in AOS Quick Configuration Guide
Configuring IP Load Sharing in AOS Quick Configuration Guide ADTRAN Operating System (AOS) includes IP Load Sharing for balancing outbound IP traffic across multiple interfaces. This feature can be used
Configuring IPSec VPN Tunnel between NetScreen Remote Client and RN300
Configuring IPSec VPN Tunnel between NetScreen Remote Client and RN300 This example explains how to configure pre-shared key based simple IPSec tunnel between NetScreen Remote Client and RN300 VPN Gateway.
Implementing Network Address Translation and Port Redirection in epipe
Implementing Network Address Translation and Port Redirection in epipe Contents 1 Introduction... 2 2 Network Address Translation... 2 2.1 What is NAT?... 2 2.2 NAT Redirection... 3 2.3 Bimap... 4 2.4
Configuring the Transparent or Routed Firewall
5 CHAPTER This chapter describes how to set the firewall mode to routed or transparent, as well as how the firewall works in each firewall mode. This chapter also includes information about customizing
CS155 - Firewalls. Simon Cooper <[email protected]> CS155 Firewalls 22 May 2003
CS155 - Firewalls Simon Cooper CS155 Firewalls 22 May 2003 1 Why Firewalls? Need for the exchange of information; education, business, recreation, social and political Need to do something
Evaluation guide. Vyatta Quick Evaluation Guide
VYATTA, INC. Evaluation guide Vyatta Quick Evaluation Guide A simple step-by-step guide to configuring network services with Vyatta Open Source Networking http://www.vyatta.com Overview...1 Booting Up
Introduction to Cisco IOS Flexible NetFlow
Introduction to Cisco IOS Flexible NetFlow Last updated: September 2008 The next-generation in flow technology allowing optimization of the network infrastructure, reducing operation costs, improving capacity
Chapter 12 Supporting Network Address Translation (NAT)
[Previous] [Next] Chapter 12 Supporting Network Address Translation (NAT) About This Chapter Network address translation (NAT) is a protocol that allows a network with private addresses to access information
Quick Start for Network Agent. 5-Step Quick Start. What is Network Agent?
What is Network Agent? The Websense Network Agent software component uses sniffer technology to monitor all of the internet traffic on the network machines that you assign to it. Network Agent filters
LAB THREE STATIC ROUTING
LAB THREE STATIC ROUTING In this lab you will work with four different network topologies. The topology for Parts 1-4 is shown in Figure 3.1. These parts address router configuration on Linux PCs and a
Configuring Static and Dynamic NAT Simultaneously
Configuring Static and Dynamic NAT Simultaneously Document ID: 13778 Contents Introduction Prerequisites Requirements Components Used Conventions Configuring NAT Related Information Introduction In some
Firewall Defaults, Public Server Rule, and Secondary WAN IP Address
Firewall Defaults, Public Server Rule, and Secondary WAN IP Address This quick start guide provides the firewall defaults and explains how to configure some basic firewall rules for the ProSafe Wireless-N
Deployment Guide AX Series for Palo Alto Networks Firewall Load Balancing
Deployment Guide AX Series for Palo Alto Networks Firewall Load Balancing DG_PAFWLB_120718.1 TABLE OF CONTENTS 1 Overview... 4 2 Deployment Prerequisites... 4 3 Architecture Overview... 5 4 Access Credentials...
IP Routing Features. Contents
7 IP Routing Features Contents Overview of IP Routing.......................................... 7-3 IP Interfaces................................................ 7-3 IP Tables and Caches........................................
IP address format: Dotted decimal notation: 10000000 00001011 00000011 00011111 128.11.3.31
IP address format: 7 24 Class A 0 Network ID Host ID 14 16 Class B 1 0 Network ID Host ID 21 8 Class C 1 1 0 Network ID Host ID 28 Class D 1 1 1 0 Multicast Address Dotted decimal notation: 10000000 00001011
VM-Series Firewall Deployment Tech Note PAN-OS 5.0
VM-Series Firewall Deployment Tech Note PAN-OS 5.0 Revision A 2012, Palo Alto Networks, Inc. www.paloaltonetworks.com Contents Overview... 3 Supported Topologies... 3 Prerequisites... 4 Licensing... 5
Network Security. Chapter 3. Cornelius Diekmann. Version: October 21, 2015. Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik
Network Security Chapter 3 Cornelius Diekmann Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik Version: October 21, 2015 IN2101, WS 15/16, Network Security 1 Security Policies and
Transport and Network Layer
Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a
We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall
Chapter 10 Firewall Firewalls are devices used to protect a local network from network based security threats while at the same time affording access to the wide area network and the internet. Basically,
Command Manual - Network Protocol Quidway S3000 Series Ethernet Switches. Table of Contents
Table of Contents Table of Contents Chapter 1 ARP Configuration Commands... 1-1 1.1 ARP Configuration Commands... 1-1 1.1.1 arp static... 1-1 1.1.2 arp timer aging... 1-2 1.1.3 debugging arp packet...
Troubleshooting the Firewall Services Module
25 CHAPTER This chapter describes how to troubleshoot the FWSM, and includes the following sections: Testing Your Configuration, page 25-1 Reloading the FWSM, page 25-6 Performing Password Recovery, page
Firewall. Vyatta System. REFERENCE GUIDE IPv4 Firewall IPv6 Firewall Zone Based Firewall VYATTA, INC.
VYATTA, INC. Vyatta System Firewall REFERENCE GUIDE IPv4 Firewall IPv6 Firewall Zone Based Firewall Vyatta Suite 200 1301 Shoreway Road Belmont, CA 94002 vyatta.com 650 413 7200 1 888 VYATTA 1 (US and
Load Balancing. Final Network Exam LSNAT. Sommaire. How works a "traditional" NAT? Un article de Le wiki des TPs RSM.
Load Balancing Un article de Le wiki des TPs RSM. PC Final Network Exam Sommaire 1 LSNAT 1.1 Deployement of LSNAT in a globally unique address space (LS-NAT) 1.2 Operation of LSNAT in conjunction with
Introduction to Analyzer and the ARP protocol
Laboratory 6 Introduction to Analyzer and the ARP protocol Objetives Network monitoring tools are of interest when studying the behavior of network protocols, in particular TCP/IP, and for determining
Firewall. IPTables and its use in a realistic scenario. José Bateira ei10133 Pedro Cunha ei05064 Pedro Grilo ei09137 FEUP MIEIC SSIN
Firewall IPTables and its use in a realistic scenario FEUP MIEIC SSIN José Bateira ei10133 Pedro Cunha ei05064 Pedro Grilo ei09137 Topics 1- Firewall 1.1 - How they work? 1.2 - Why use them? 1.3 - NAT
NetFlow/IPFIX Various Thoughts
NetFlow/IPFIX Various Thoughts Paul Aitken & Benoit Claise 3 rd NMRG Workshop on NetFlow/IPFIX Usage in Network Management, July 2010 1 B #1 Application Visibility Business Case NetFlow (L3/L4) DPI Application
Concepts & Examples ScreenOS Reference Guide
Concepts & Examples ScreenOS Reference Guide Address Translation Release 6.3.0, Rev. 02 Published: 2012-12-10 Revision 02 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA
Internet Protocols Fall 2005. Lectures 7-8 Andreas Terzis
Internet Protocols Fall 2005 Lectures 7-8 Andreas Terzis Outline Internet Protocol Service Model Fragmentation Addressing Original addressing scheme Subnetting CIDR Forwarding ICMP ARP Address Shortage
NEFSIS DEDICATED SERVER
NEFSIS TRAINING SERIES Nefsis Dedicated Server version 5.2.0.XXX (DRAFT Document) Requirements and Implementation Guide (Rev5-113009) REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER Nefsis
Quick Note 20. Configuring a GRE tunnel over an IPSec tunnel and using BGP to propagate routing information. (GRE over IPSec with BGP)
Quick Note 20 Configuring a GRE tunnel over an IPSec tunnel and using BGP to propagate routing information. (GRE over IPSec with BGP) Appendix A GRE over IPSec with Static routes UK Support August 2012
Exam 1 Review Questions
CSE 473 Introduction to Computer Networks Exam 1 Review Questions Jon Turner 10/2013 1. A user in St. Louis, connected to the internet via a 20 Mb/s (b=bits) connection retrieves a 250 KB (B=bytes) web
Cisco AnyConnect Secure Mobility Solution Guide
Cisco AnyConnect Secure Mobility Solution Guide This document contains the following information: Cisco AnyConnect Secure Mobility Overview, page 1 Understanding How AnyConnect Secure Mobility Works, page
DEPLOYMENT GUIDE Version 1.1. DNS Traffic Management using the BIG-IP Local Traffic Manager
DEPLOYMENT GUIDE Version 1.1 DNS Traffic Management using the BIG-IP Local Traffic Manager Table of Contents Table of Contents Introducing DNS server traffic management with the BIG-IP LTM Prerequisites
Application Note. Stateful Firewall, IPS or IDS Load- Balancing
Application Note Stateful Firewall, IPS or IDS Load- Balancing Document version: v1.0 Last update: 8th November 2013 Purpose Improve scallability of the security layer Limitations when Load-Balancing firewalls
Configuring Static and Dynamic NAT Translation
This chapter contains the following sections: Network Address Translation Overview, page 1 Information About Static NAT, page 2 Dynamic NAT Overview, page 3 Timeout Mechanisms, page 4 NAT Inside and Outside
Hosting more than one FortiOS instance on. VLANs. 1. Network topology
Hosting more than one FortiOS instance on a single FortiGate unit using VDOMs and VLANs 1. Network topology Use Virtual domains (VDOMs) to divide the FortiGate unit into two or more virtual instances of
Internetworking. Problem: There is more than one network (heterogeneity & scale)
Internetworking Problem: There is more than one network (heterogeneity & scale) Hongwei Zhang http://www.cs.wayne.edu/~hzhang Internetworking: Internet Protocol (IP) Routing and scalability Group Communication
Palo Alto Networks Certified Network Security Engineer (PCNSE6) Study Guide
Palo Alto Networks Certified Network Security Engineer (PCNSE6) Study Guide Welcome to the wonderful world of Palo Alto Networks Certification! We are very excited you have decided to embark upon such
Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN
Virtual private network Network security protocols COMP347 2006 Len Hamey Instead of a dedicated data link Packets securely sent over a shared network Internet VPN Public internet Security protocol encrypts
TECHNICAL NOTE. Technical Note P/N 300-999-649 REV 03. EMC NetWorker Simplifying firewall port requirements with NSR tunnel Release 8.
TECHNICAL NOTE EMC NetWorker Simplifying firewall port requirements with NSR tunnel Release 8.0 and later Technical Note P/N 300-999-649 REV 03 February 6, 2014 This technical note describes how to configure
CCT vs. CCENT Skill Set Comparison
Operation of IP Data Networks Recognize the purpose and functions of various network devices such as Routers, Switches, Bridges and Hubs Select the components required to meet a given network specification
GregSowell.com. Mikrotik Security
Mikrotik Security IP -> Services Disable unused services Set Available From for appropriate hosts Secure protocols are preferred (Winbox/SSH) IP -> Neighbors Disable Discovery Interfaces where not necessary.
NAT Configuration. Contents. 1 NAT Configuration. 1.1 NAT Overview. 6 3 2014 NAT Configuration
NAT Configuration Contents 1 NAT Configuration 1.1 NAT Overview 1.2 NAT Features Supported by the AR1200 1.3 Configuring NAT 1.3.1 Establishing the Configuration Task 1.3.2 Configuring an Address Pool
UIP1868P User Interface Guide
UIP1868P User Interface Guide (Firmware version 0.13.4 and later) V1.1 Monday, July 8, 2005 Table of Contents Opening the UIP1868P's Configuration Utility... 3 Connecting to Your Broadband Modem... 4 Setting
About Firewall Protection
1. This guide describes how to configure basic firewall rules in the UTM to protect your network. The firewall then can provide secure, encrypted communications between your local network and a remote
Guideline for setting up a functional VPN
Guideline for setting up a functional VPN Why do I want a VPN? VPN by definition creates a private, trusted network across an untrusted medium. It allows you to connect offices and people from around the
How To Configure A Vyatta 4.2.0 As A Ds Internet Connection Router/Gateway With A Web Server On A Dspv.Net 4.0.1 (Dspv) On A Network With A D
Open Informatics a An Information Technology Company Visit us on the web at www.openinformatics.net Tutorial Author: Zlatan Klebic Send Feedback: [email protected] Configuring a Vyatta 4.0 release
Dynamic Host Configuration Protocol (DHCP) 02 NAT and DHCP Tópicos Avançados de Redes
Dynamic Host Configuration Protocol (DHCP) 1 1 Dynamic Assignment of IP addresses Dynamic assignment of IP addresses is desirable for several reasons: IP addresses are assigned on-demand Avoid manual IP
Catalyst 6500/6000 Switches NetFlow Configuration and Troubleshooting
Catalyst 6500/6000 Switches NetFlow Configuration and Troubleshooting Document ID: 70974 Introduction Prerequisites Requirements Components Used Conventions Background Information Configure Network Diagram
Troubleshooting Bundles and Load Balancing
CHAPTER 5 This chapter explains the procedures for troubleshooting link bundles and load balancing on the Cisco ASR 9000 Aggregation Services Router. A link bundle is a group of ports that are bundled
CIT 480: Securing Computer Systems. Firewalls
CIT 480: Securing Computer Systems Firewalls Topics 1. What is a firewall? 2. Types of Firewalls 1. Packet filters (stateless) 2. Stateful firewalls 3. Proxy servers 4. Application layer firewalls 3. Configuring
Creating a VPN with overlapping subnets
Creating a VPN with overlapping subnets This recipe describes how to construct a VPN connection between two networks with overlapping IP addresses in such a way that traffic will be directed to the correct
Configuring the BIG-IP and Check Point VPN-1 /FireWall-1
Configuring the BIG-IP and Check Point VPN-1 /FireWall-1 Introducing the BIG-IP and Check Point VPN-1/FireWall-1 LB, HALB, VPN, and ELA configurations Configuring the BIG-IP and Check Point FireWall-1
Firewalls P+S Linux Router & Firewall 2013
Firewalls P+S Linux Router & Firewall 2013 Firewall Techniques What is a firewall? A firewall is a hardware or software device which is configured to permit, deny, or proxy data through a computer network
TheGreenBow IPsec VPN Client. Configuration Guide Cisco RV325 v1. Website: www.thegreenbow.com Contact: [email protected]
TheGreenBow IPsec VPN Client Configuration Guide Cisco RV325 v1 Website: www.thegreenbow.com Contact: [email protected] Table of Contents 1 Introduction... 3 1.1 Goal of this document... 3 1.2 VPN
Configuration Professional: Site to Site IPsec VPN Between Two IOS Routers Configuration Example
Configuration Professional: Site to Site IPsec VPN Between Two IOS Routers Configuration Example Document ID: 113337 Contents Introduction Prerequisites Requirements Components Used Conventions Configuration
HP Load Balancing Module
HP Load Balancing Module Load Balancing Configuration Guide Part number: 5998-2685 Document version: 6PW101-20120217 Legal and notice information Copyright 2012 Hewlett-Packard Development Company, L.P.
Firewall Troubleshooting
Firewall Troubleshooting (Checkpoint Specific) For typical connectivity issues where a firewall is in question follow these steps to eliminate any issues relating to the firewall. Firewall 1. From the
2. IP Networks, IP Hosts and IP Ports
1. Introduction to IP... 1 2. IP Networks, IP Hosts and IP Ports... 1 3. IP Packet Structure... 2 4. IP Address Structure... 2 Network Portion... 2 Host Portion... 3 Global vs. Private IP Addresses...3
Quidway MPLS VPN Solution for Financial Networks
Quidway MPLS VPN Solution for Financial Networks Using a uniform computer network to provide various value-added services is a new trend of the application systems of large banks. Transplanting traditional
INTRODUCTION TO FIREWALL SECURITY
INTRODUCTION TO FIREWALL SECURITY SESSION 1 Agenda Introduction to Firewalls Types of Firewalls Modes and Deployments Key Features in a Firewall Emerging Trends 2 Printed in USA. What Is a Firewall DMZ
Set Up a VM-Series Firewall on an ESXi Server
Set Up a VM-Series Firewall on an ESXi Server Palo Alto Networks VM-Series Deployment Guide PAN-OS 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara,
VMware vcloud Air Networking Guide
vcloud Air This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,
Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP
Guide to Network Defense and Countermeasures Third Edition Chapter 2 TCP/IP Objectives Explain the fundamentals of TCP/IP networking Describe IPv4 packet structure and explain packet fragmentation Describe
How To - Configure Virtual Host using FQDN How To Configure Virtual Host using FQDN
How To - Configure Virtual Host using FQDN How To Configure Virtual Host using FQDN Applicable Version: 10.6.2 onwards Overview Virtual host implementation is based on the Destination NAT concept. Virtual
