Resource Type: panos_nat_policy

Defined in:
lib/puppet/type/panos_nat_policy.rb

Overview

This type provides Puppet with the capabilities to manage “NAT Policy Rule” objects on Palo Alto devices.

Properties

  • bi_directional

    Enable bidirectional translation if you want the firewall to create a corresponding translation (NAT or NPTv6) in the opposite direction of the translation you configure. Note: If you enable bidirectional translation, you must ensure that you have security policies in place to control the traffic in both directions. Without such policies, the bidirectional feature allows packets to be translated automatically in both directions.

  • description

    A description of the NAT Policy Rule

  • destination (defaults to: ["any"])

    Specify a combination of destination addresses for the firewall to translate. For NPTv6, the prefixes configured for Source Address and Destination Address must be in the format xxxx:xxxx::/yy. The address cannot have an interface identifier (host) portion defined. The range of supported prefix lengths is /32 to /64.

  • destination_interface

    Specify the destination interface of packets the firewall translates. You can use the destination interface to translate IP addresses differently in the case where the network is connected to two ISPs with different IP address pools

  • destination_translated_address

    The address to which the packets are translated.

    For NPTv6, the prefixes configured for Destination prefix Translated Address must be in the format xxxx:xxxx::/yy. The address cannot have an interface identifier (host) portion defined. The range of supported prefix lengths is /32 to /64.

  • destination_translated_port

    The port of the translated address

    Note that Translated Port is not supported for NPTv6 because NPTv6 is strictly prefix translation. The Port and Host address section is simply forwarded unchanged.

  • disable

    A boolean control to disable the NAT policy.

  • ensure (defaults to: present)

    Whether this resource should be present or absent on the target system.

  • fallback_address

    The translated addresses used as a fallback. Required if ‘fallback_address_type` is set to `translated-address`

  • fallback_address_type

    Whether the NAT policy used translated-address or interface-address as a fallback

  • fallback_interface

    The interface used as fallback. Required if ‘fallback_address_type` is set to `interface-address`

  • fallback_interface_ip

    The ip of the interface used as fallback. Required if ‘fallback_address_type` is set to `interface-address`

  • fallback_interface_ip_type

    The type of ip for the interface used as fallback. Required if ‘fallback_address_type` is set to `interface-address`

  • from (defaults to: ["any"])

    Specify one or more source zones for the original (non-NAT) packet. Zones must be of the same type (Layer 2, Layer 3, or virtual wire). You can specify multiple zones to simplify management. For example, you can configure settings so that multiple internal NAT addresses are directed to the same external IP address.

  • insert_after

    Specifies where the rule should be inserted.

    • If specified with an empty string, the rule will be inserted at the TOP. NOTE: Only one rule should be set to top

    • If a rule name is specified, the rule will be inserted after the given rule.

    • If this attribute is omitted, the rule will be added at the bottom. NOTE: Rules cannot be moved to the bottom once created. Instead specify the rule name to insert after.

  • nat_type (defaults to: ipv4)

    The nat type of the policy

  • sat_interface

    The interface used in SAT

  • sat_interface_ip

    The interface used in SAT

  • service (defaults to: any)

    Specify the service for which the firewall translates the source or destination address.

  • source (defaults to: ["any"])

    Specify a combination of source addresses for the firewall to translate. For NPTv6, the prefixes configured for Source Address and Destination Address must be in the format xxxx:xxxx::/yy. The address cannot have an interface identifier (host) portion defined. The range of supported prefix lengths is /32 to /64.

  • source_translated_address

    The translated source addresses.

  • source_translated_static_address

    The translated source addresses.

  • source_translation_type

    The size of the address range is limited by the type of address pool:

    • dynamic-ip-and-port: Address selection is based on a hash of the source IP address. For a given source IP address, the firewall will use the same translated source address for all sessions. Dynamic IP and Port source NAT supports approximately 64k concurrent sessions on each IP address in the NAT pool. On some platforms, over-subscription is supported, which will allow a single IP to host more than 64k concurrent sessions. Palo Alto Networks Dynamic IP/port NAT supports more NAT sessions than are supported by the number of available IP addresses and ports. The firewall can use IP address and port combinations up to two times (simultaneously) on the PA-200, PA-500, PA-2000 Series and PA-3000 Series firewalls, four times on the PA-4020 and PA-5020 firewalls, and eight times on the PA‑4050, PA-4060, PA-5050, and PA-5060 firewalls when destination IP addresses are unique.

    • dynamic-ip: The next available address in the specified range is used, but the port number is unchanged. Up to 32k consecutive IP addresses are supported. A dynamic IP pool can contain multiple subnets, so you can translate your internal network addresses to two or more separate public subnets.

      * Advanced (Fall back Dynamic IP Translation)—Use this option to create a fall back pool that will perform IP and port translation and will be used if the primary pool runs out of addresses.
        You can define addresses for the pool by using the Translated Address option or the Interface Address option, which is for interfaces that receive an IP address dynamically.
        When creating a fall back pool, make sure addresses do not overlap with addresses in the primary pool.
      
    • static-ip: The same address is always used for the translation and the port is unchanged. For example, if the source range is 192.168.0.1-192.168.0.10 and the translation range is 10.0.0.1-10.0.0.10, address 192.168.0.2 is always translated to 10.0.0.2. The address range is virtually unlimited.

      * NPTv6 must use Static IP translation for Source Address Translation. For NPTv6, the prefixes configured for Translated Address must be in the format xxxx:xxxx::/yy.
        The address cannot have an interface identifier (host) portion defined. The range of supported prefix lengths is /32 to /64.
      
    • None: Translation is not performed.

  • tags

    A policy tag is a keyword or phrase that allows you to sort or filter policies. This is useful when you have defined many policies and want to view those that are tagged with a particular keyword.

  • to

    Specify one or more destinations zones for the original (non-NAT) packet. Zones must be of the same type (Layer 2, Layer 3, or virtual wire). You can specify multiple zones to simplify management. For example, you can configure settings so that multiple internal NAT addresses are directed to the same external IP address.

Parameters

  • name (namevar)

    The display-name of the zone. Restricted to 31 characters on PAN-OS version 7.1.0.