-
Notifications
You must be signed in to change notification settings - Fork 19
Description
Summary:
When modeling Palo Alto Networks (PAN-OS 11.1.1) NAT and Security policies in the Nautobot Security plugin, several gaps exist that make it difficult or impossible to accurately represent basic rules especially those that use the standard “any → any” logic or dynamic NAT translations.
Palo Alto firewalls natively support any for source, destination, service, and zone fields, but Nautobot Security requires fully defined object references (IP range, prefix, etc.). This creates validation errors, prevents imports, and breaks fidelity when syncing or documenting real-world firewall configurations.
Environment:
Firewall Platform: Palo Alto Networks PA-850
PAN-OS Version: 11.1.1
Nautobot Version: 2.4.20
Nautobot Security Plugin: 2.3.0
Example Issue
Palo Alto Rule:
| Field | Value |
|---|---|
| Name | NAT_GBR1_XYZ_EXT_DYNAMIC |
| Source Zone | ZONE-GBR1-XYZ |
| Destination Zone | ZONE-GBR1-EDGE1-UNTRUST |
| Destination Interface | any |
| Source Address | any |
| Destination Address | any |
| Service | any |
| Source Translation | dynamic-ip-and-port (ethernet1/1) |
| Destination Translation | none |
| Tags | outbound |
Root Cause:
Nautobot Security does not provide built-in “any” placeholder objects or dynamic translation templates compatible with Palo Alto’s configuration schema.