Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Palo Alto Networks Exam PCNSE Topic 9 Question 97 Discussion

Actual exam question for Palo Alto Networks's PCNSE exam
Question #: 97
Topic #: 9
[All PCNSE Questions]

A new application server 192.168.197.40 has been deployed in the DMZ. There are no public IP addresses available resulting in the server sharing MAT IP 198 51 100 B8 with another OMZ serve that uses IP address 192 168 19? 60 Firewall security and NAT rules have been configured The application team has confirmed mat the new server is able to establish a secure connection to an external database with IP address 203.0.113.40. The database team reports that they are unable to establish a secure connection to 196 51 100 88 from 203.0.113.40 However it confirm a successful prig test to 198 51 100 88 Referring to the MAT configuration and traffic logs provided how can the firewall engineer resolve the situation and ensure inbound and outbound connections work concurrently for both DMZ servers?

Show Suggested Answer Hide Answer
Suggested Answer: C

The table displays NAT rules configured on the firewall. The key points are:

Source Zone and Destination Zone define the traffic flow.

Source Address and Destination Address specify the IP addresses involved.

Service indicates the type of traffic (e.g., any, ping).

Source Translation and Destination Translation show the translated IP addresses for NAT.

Issue and Resolution Options

The application server at 192.168.197.40 can establish outbound connections but faces issues with inbound connections due to the shared NAT IP 198.51.100.88. The external database server cannot establish a secure connection back to 192.168.197.40.

Options to Resolve the Issue:

Replace the Two NAT Rules with a Single Rule:

Combining both DMZ servers into one NAT rule might simplify configuration but could cause issues in distinguishing inbound traffic for each server.

Pros: Simplifies rule management.

Cons: Might not address the inbound traffic issue properly.

New Public IP Address:

Obtaining a new public IP address for the new server (192.168.197.40) ensures dedicated inbound and outbound NAT.

Pros: Clear separation of traffic, resolves inbound connectivity issues.

Cons: Requires additional public IP.

Separate Source NAT and Destination NAT Rules:

Configuring distinct NAT rules for source and destination addresses without using the bidirectional option.

Pros: Clear and distinct rules for each direction of traffic.

Cons: More complex to manage, might require more firewall resources.

Move the NAT Rule:

Adjusting the order of NAT rules to prioritize the new server's rule.

Pros: Simple reordering might resolve prioritization conflicts.

Cons: Might not fully resolve the inbound connection issue.


Contribute your Thoughts:

Nell
23 days ago
Alright, let's see here... Separate NAT rules, no bidirectional action. Sounds like the way to go. Nice and clean, just the way I like it.
upvoted 0 times
...
Freida
26 days ago
Haha, imagine the database team trying to figure out which server to connect to. It's like a game of 'guess the server'!
upvoted 0 times
Delbert
3 days ago
Moving the NAT rule for DMZ server 2 above the one for DMZ server 1 could also help resolve the issue.
upvoted 0 times
...
Toi
6 days ago
Yeah, that would make it easier for the database team to establish a secure connection.
upvoted 0 times
...
Kaitlyn
12 days ago
They should definitely update the NAT rules to include both DMZ servers as source addresses and external servers as destination addresses.
upvoted 0 times
...
...
Hyun
29 days ago
I'm not sure, but option D could also work by changing the order of the NAT rules.
upvoted 0 times
...
Beckie
30 days ago
I agree with Denise, combining the NAT rules seems like the most efficient way to resolve the issue.
upvoted 0 times
...
Denise
1 months ago
I think option A is the best solution.
upvoted 0 times
...
Kyoko
1 months ago
Ah, the old 'bidirectional' trick. Clever, but I'd rather just get a new public IP for that second server. Keeps things nice and tidy.
upvoted 0 times
Gladys
7 days ago
C) Configure separate source NAT and destination NAT rules for the two DMZ servers without using the bidirectional option.
upvoted 0 times
...
Isaac
13 days ago
B) Sharing a single NAT IP is possible for outbound connectivity not for inbound, therefore, a new public IP address must be obtained for the new DMZ server and used in the NAT rule 6 DMZ server 2.
upvoted 0 times
...
Eun
23 days ago
A) Replace the two NAT rules with a single rule that has both DMZ servers as 'Source Address,' both external servers as 'Destination Address,' and Source Translation remaining as is with bidirectional option enabled.
upvoted 0 times
...
...
Ruthann
2 months ago
Hmm, I think the key here is to use separate source and destination NAT rules for the two servers. Gotta keep that traffic flow organized, you know?
upvoted 0 times
Jestine
7 days ago
Looks like configuring separate source and destination NAT rules is the best approach to resolve the connectivity problem.
upvoted 0 times
...
Natalya
12 days ago
Definitely, it's important to keep the traffic organized to ensure both servers can establish connections without issues.
upvoted 0 times
...
Colby
22 days ago
I agree, having distinct rules for each server will help avoid any conflicts in the traffic flow.
upvoted 0 times
...
Desire
1 months ago
Option C sounds like the way to go. Separate rules for each server will keep things running smoothly.
upvoted 0 times
...
...
Hillary
2 months ago
Wait, so we're supposed to have both DMZ servers sharing the same NAT IP? That's a recipe for disaster!
upvoted 0 times
Silva
28 days ago
User 2
upvoted 0 times
...
Sheron
1 months ago
User 1
upvoted 0 times
...
...

Save Cancel