SolarWinds NAT Lookup Quick Reference Guide

Easily search for policies that of a given IP addresses across a single or multiple firewalls with the SolarWinds NAT Lookup free tool. Enable other team members to quickly verify if NAT policies are correctly configured and working as intended.

SolarWinds NAT lookup helps you easily search for an IP address in your Palo Alto Networks (PAN) firewalls NAT policies. Reduce the complexity of having to search through the firewall to find a dedicated translated IP address, overlapping NAT policies, or session traffic for the translated IP address. NAT Lookup provides an easy to use results table for each firewall, that gives you the policy and translated address information that you need to verify policy configuration and sequence.

The NAT Lookup took can be installed on WindowsRegistered 8.1 and 10, Windows Server 2012 R2, 2016 and 2019

Downloading and Unpacking

You can download the NAT Lookup tool here:

Be sure to unzip the executable and you are all set!

Using NAT Lookup

  1. Add PAN firewall(s)

  2. Execute a search

  3. Understand the results

  4. Export the results

To use the NAT Lookup, simply launch the executable.


The first time you open NAT Lookup you will see the UI prompting you to add a firewall. Once you add a firewall the opening screen will be slightly different, skip to . To add a firewall, you need to ensure you have the following prior:

  1. NAT Lookup supports PAN Firewall OS versions of 7.1, 8.0, 8.1, and 9.0. For a complete list of models supported by these OS versions, please reference Palo Alto Networks site: Palo Alto Networks Next-Gen Firewalls.

  2. Ensure that the user credentials also have API access enabled. The NAT Lookup tool connects to the PAN firewalls via their API.

Once you have verified that your firewall has a support OS version and the user credentials have suitable access, simply click on "Add Firewall".

Screen Shot 2019-05-21 at 11.14.35 AM.png

Here you will need to enter a few pieces of information to allow NAT Lookup to access the firewall like IP/hostname, username, and password. It is strongly recommended that you create a unique name for your firewall, as the NAT Lookup tool can support up to 10 Palo Alto Network firewalls. After the credentials have been added successfully, the tool is ready for its first IP address search.

NOTE: If you would like to delete or edit information for a firewall, refer to the below:

Screen Shot 2019-05-21 at 1.21.51 PM.png

First navigate to the "Firewalls" dropdown and click on "Manage firewalls". This menu will open a new dialog window with a list of all the firewalls currently added to the tool. Click on the 3 dots to get a menu of Edit and Delete. If you wish to delete, simply click "Delete" and follow the prompt.

Screen Shot 2019-05-21 at 11.28.12 AM.png

If you are updating the firewall name or IP address/hostname - simply modify the information and click save. If you need to change the credentials then click "Update" and modify the username and password. If you happen to enter your credentials or device information incorrectly, you may see one or more of the following errors. Simply verify the information is correct and retry.

To then execute a search, after you have added your firewall(s), you need only to enter the IP address and click "Lookup" (be sure to use a valid IPv4 address). If at any point there is a firewall that you do not want to execute a search against, simply click the little "x" next to its name in the Firewalls list to remove it. If you want to add it back, the firewall will remain in the drop down list and can be added back for future queries.


Once the tool completes its lookup, it provides a detailed list of all the policies that affect that translation of the searched IP address. The details under each firewall can be expanded and collapsed, making it easier to read in the event there are multiple firewalls and results. For each policy NAT Lookup provides the translation, the type of translation (if the searched IP is form the source or destination side of the translation), the dynamic/static setting for the policy, the sequence order, and the policy name. If live session traffic is available, for this particular IP address translation, the NAT Lookup tool will provide a button to click in and verify if the actual translation matches the policy configuration. If you wish to preserve this information for later use, simply click "Export Results" and save the results locally as a CSV file.

Now go out and understand what your NAT policies are doing to your IP addresses! Post your comments and observations here.

Want More Palo Alto Network Firewall Monitoring and Management Features?...

Be sure to head on over and view Network Performance Monitor Network Configuration ManagerNetFlow Traffic Analyzer​ for all the details on Network Insight for Palo Alto Network firewalls! Gain insight into your VPN tunnels, security policies, and characterize your traffics content.