Issue:
After working with support apparently for devices that perform NAT (such as netflow export from a Palo Alto Firewall) where the flow includes an IP that is NATTED you can only see some of the IPs involved in the actual NTA conversation.
Example 1 (no NAT):
10.10.10.1 access an internal IP 10.20.20.20.
In NTA you see a conversation between 10.10.10.1 and 10.20.20.20
Example 2:
10.10.10.1 access a public website 179.179.179.1, the firewall NATs all outbound traffic to the internet to a public IP of 75.75.75.1
In NTA you only see a conversation between 75.75.75.1 and 179.179.179.1
This is not very useful as you cannot see the actual LAN host/IP in the conversation (10.10.10.1).
All IPs are being sent via netflow as seen in packet captures on Orion.
Feature Request:
Simply add four fields in NTA showing SRCADDR, Post NAT Source IPv4 Addres, DSTADDR, Post Nat Destination IPv4 Address when you drill into conversations. This would allow anyone with a device performing NAT and sending flows with NAT involved to drill in and see the relevant information needed.
Thanks!
Ken