3
security policy and nat policy
Last updated
All traffic traversing the data plane of the Palo Alto Networks firewall is matched against a Security Policy
Traffic matching does not include traffic originating from MGT interface as MGT interface does not pass through the data plane of the firewall
All traffic passing through the firewall is matched against a session
A session is matched against a security policy rule
Each session is assigned a unique session ID number
After a session is matched, firewall applies matching SPR to the bidirectional traffic in that session.
Intrazone
Applies matching traffic within the specified source zone
A destination zone cannot be applied, all traffic will be within the Zone specified.
Interzone
Applies matching traffic between specified source and destination zone
Universal
Applies matching interzone and intrazone traffic in specified source and destination zone
By default, firewall allows intrazone traffic and denies interzone
Identify rules that are used frequently to determine which rules are unused and should be removed
Traffic can match multiple rules
Earlier rule hides over later rule
Rule Shadow in Commit tab will show any rules that are shadowed
Source NAT is used for internal users to access public internet
Destination NAT is used for external users to access internal servers
Translates original source IP address to an alternate source IP address
Static
1-1fixed translations
Changes source IP while leaving source port unchanged
Supports implicit bidirectional rule feature
Dynamic
1-to-1 translations of a source IP address only (no port number)
Private source address translates to the next available address in the range
Dynamic IP and port (DIPP)
Allows multiple clients to use the same public IP address with different source port numbers
Assigned address can be set to the interface address or to a translated address.
Translates original destination IP address to an alternate destination IP address