<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic AWS VM-series - untrust interface - eating packets in VM-Series in the Public Cloud</title>
    <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-vm-series-untrust-interface-eating-packets/m-p/420562#M1266</link>
    <description>&lt;P&gt;Hi Guys,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am working on inbound (from the internet) flow on the VM-series untrust interface directly.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Set up -&lt;/P&gt;&lt;P&gt;VM-series FW - 3 interface -- Mgmt , Untrust , Trust&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Client -&amp;gt; Internet GW -&amp;gt; EIP -&amp;gt; Firewall untrust interface - eth1/1 - &amp;gt; (SNAT - &amp;nbsp;eth1/2 ; DNAT - Server private IP ) -&amp;gt; Server&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;In the monitor log, I can see the SNAT &amp;amp; DNAT taking place, traffic being allowed by Security rule.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;But nothing is getting forwarded to the Server ... No packets are received on the server-side.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I have checked routes ,&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;default - 0.0.0.0/0 -- exit thru untrust -&amp;gt; IGW&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;private subnet - 10.x.x.x/24 -- thru Trust interface&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Is this not bound to work with directly attaching EIP to untrust interface ?? The same set-up works fine , with an NLB (network load balancer) in front of VM-series fw (untrust interface)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Just to note - Already have opened TAC support case , with no luck -- too much of back and forth of info sharing , with zero constructive suggestions &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;++&amp;nbsp;&lt;A href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/70475" target="_blank"&gt;@jmeurer&lt;/A&gt;&amp;nbsp; --&amp;nbsp;Any suggestions??&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 20 Jul 2021 06:32:40 GMT</pubDate>
    <dc:creator>abhishah03</dc:creator>
    <dc:date>2021-07-20T06:32:40Z</dc:date>
    <item>
      <title>AWS VM-series - untrust interface - eating packets</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-vm-series-untrust-interface-eating-packets/m-p/420562#M1266</link>
      <description>&lt;P&gt;Hi Guys,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am working on inbound (from the internet) flow on the VM-series untrust interface directly.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Set up -&lt;/P&gt;&lt;P&gt;VM-series FW - 3 interface -- Mgmt , Untrust , Trust&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Client -&amp;gt; Internet GW -&amp;gt; EIP -&amp;gt; Firewall untrust interface - eth1/1 - &amp;gt; (SNAT - &amp;nbsp;eth1/2 ; DNAT - Server private IP ) -&amp;gt; Server&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;In the monitor log, I can see the SNAT &amp;amp; DNAT taking place, traffic being allowed by Security rule.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;But nothing is getting forwarded to the Server ... No packets are received on the server-side.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I have checked routes ,&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;default - 0.0.0.0/0 -- exit thru untrust -&amp;gt; IGW&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;private subnet - 10.x.x.x/24 -- thru Trust interface&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Is this not bound to work with directly attaching EIP to untrust interface ?? The same set-up works fine , with an NLB (network load balancer) in front of VM-series fw (untrust interface)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Just to note - Already have opened TAC support case , with no luck -- too much of back and forth of info sharing , with zero constructive suggestions &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;++&amp;nbsp;&lt;A href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/70475" target="_blank"&gt;@jmeurer&lt;/A&gt;&amp;nbsp; --&amp;nbsp;Any suggestions??&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 20 Jul 2021 06:32:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-vm-series-untrust-interface-eating-packets/m-p/420562#M1266</guid>
      <dc:creator>abhishah03</dc:creator>
      <dc:date>2021-07-20T06:32:40Z</dc:date>
    </item>
    <item>
      <title>Re: AWS VM-series - untrust interface - eating packets</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-vm-series-untrust-interface-eating-packets/m-p/420574#M1267</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/179457"&gt;@abhishah03&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;sorry to hear that had no luck with our TAC team.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Your problem that you subscribes could have many reasons.&lt;/P&gt;&lt;P&gt;- Did you checked your Security Groups on all interfaces?&lt;/P&gt;&lt;P&gt;- Did you reviewed all route tables that the traffic get's forwarded correctly?&lt;/P&gt;&lt;P&gt;- Did you already asked AWS TAC if they can see the packets and could they explain you the reason why the packets didn't received the client host?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Torsten&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 20 Jul 2021 06:43:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-vm-series-untrust-interface-eating-packets/m-p/420574#M1267</guid>
      <dc:creator>tostern</dc:creator>
      <dc:date>2021-07-20T06:43:12Z</dc:date>
    </item>
    <item>
      <title>Re: AWS VM-series - untrust interface - eating packets</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-vm-series-untrust-interface-eating-packets/m-p/420590#M1268</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/70055"&gt;@tostern&lt;/a&gt;&amp;nbsp; -- Please find the answer inline -&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- Did you checked your Security Groups on all interfaces? --&amp;nbsp;&lt;EM&gt;SG is set, properly -- Hence the packets are reaching the PA firewall &amp;amp; logs reflecting the same on (AWS flow logs, PA monitor logs)&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;- Did you reviewed all route tables that the traffic get's forwarded correctly? --&amp;nbsp;&lt;EM&gt;Routes is straight forward --- 2 routes on virtual router --&amp;nbsp;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;default - 0.0.0.0/0 -- exit thru untrust -&amp;gt; IGW&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;private subnet - 10.x.x.x/24 -- thru Trust interface -- 10.0.0.1&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- Did you already asked AWS TAC if they can see the packets and could they explain to you the reason why the packets didn't receive the client host? --&amp;nbsp;&lt;EM&gt;Reason needs to be explained from PA I believe, the packets are reaching the firewall, but not exiting from there :(.&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 20 Jul 2021 07:01:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-vm-series-untrust-interface-eating-packets/m-p/420590#M1268</guid>
      <dc:creator>abhishah03</dc:creator>
      <dc:date>2021-07-20T07:01:53Z</dc:date>
    </item>
    <item>
      <title>Re: AWS VM-series - untrust interface - eating packets</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-vm-series-untrust-interface-eating-packets/m-p/420596#M1269</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/179457"&gt;@abhishah03&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;so you can see that the packet is leaving the PAN FW but you didn't get any return traffic?&lt;/P&gt;&lt;P&gt;Did you checked the AWS route tables and are you sure you haven't any SG on the Server that can block the traffic?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Torsten&lt;/P&gt;</description>
      <pubDate>Tue, 20 Jul 2021 07:13:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-vm-series-untrust-interface-eating-packets/m-p/420596#M1269</guid>
      <dc:creator>tostern</dc:creator>
      <dc:date>2021-07-20T07:13:51Z</dc:date>
    </item>
    <item>
      <title>Re: AWS VM-series - untrust interface - eating packets</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-vm-series-untrust-interface-eating-packets/m-p/420599#M1270</link>
      <description>&lt;P&gt;Nope , I can see the packet only entering PA FW ...&lt;/P&gt;</description>
      <pubDate>Tue, 20 Jul 2021 07:15:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-vm-series-untrust-interface-eating-packets/m-p/420599#M1270</guid>
      <dc:creator>abhishah03</dc:creator>
      <dc:date>2021-07-20T07:15:55Z</dc:date>
    </item>
    <item>
      <title>Re: AWS VM-series - untrust interface - eating packets</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-vm-series-untrust-interface-eating-packets/m-p/420602#M1271</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/179457"&gt;@abhishah03&lt;/a&gt;&amp;nbsp;please send me a email &lt;A href="mailto:tostern@paloaltonetworks.com" target="_blank"&gt;tostern@paloaltonetworks.com&lt;/A&gt;&amp;nbsp;then i want to have a deeper look into it.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Afterwards we can share here the solution of the problem.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Torsten&lt;/P&gt;</description>
      <pubDate>Tue, 20 Jul 2021 07:17:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-vm-series-untrust-interface-eating-packets/m-p/420602#M1271</guid>
      <dc:creator>tostern</dc:creator>
      <dc:date>2021-07-20T07:17:44Z</dc:date>
    </item>
    <item>
      <title>Re: AWS VM-series - untrust interface - eating packets</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-vm-series-untrust-interface-eating-packets/m-p/420632#M1272</link>
      <description>&lt;P&gt;I've just sent you email, with all the details. Pls check &amp;amp; suggest.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The interesting part is everything works fine with traffic ingress point changed to AWS NLB; rather than utilizing the EIP of untrust NIC.&lt;/P&gt;</description>
      <pubDate>Tue, 20 Jul 2021 08:32:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-vm-series-untrust-interface-eating-packets/m-p/420632#M1272</guid>
      <dc:creator>abhishah03</dc:creator>
      <dc:date>2021-07-20T08:32:20Z</dc:date>
    </item>
    <item>
      <title>Re: AWS VM-series - untrust interface - eating packets</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-vm-series-untrust-interface-eating-packets/m-p/420755#M1273</link>
      <description>&lt;P&gt;Make sure your SNAT rule is set with the original packet set to the untrust private IP and not the EIP.&amp;nbsp; AWS SNATs on the way in and firewall sees the packet after the EIP translation.&amp;nbsp; Also, ensure both interfaces are added to the VR.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 20 Jul 2021 15:52:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-vm-series-untrust-interface-eating-packets/m-p/420755#M1273</guid>
      <dc:creator>jmeurer</dc:creator>
      <dc:date>2021-07-20T15:52:35Z</dc:date>
    </item>
    <item>
      <title>Re: AWS VM-series - untrust interface - eating packets</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-vm-series-untrust-interface-eating-packets/m-p/420822#M1274</link>
      <description>&lt;P&gt;Yup , that's already in place.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Using Private (untrust) IP in NAT; also both interfaces are added in VR.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 20 Jul 2021 18:34:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-vm-series-untrust-interface-eating-packets/m-p/420822#M1274</guid>
      <dc:creator>abhishah03</dc:creator>
      <dc:date>2021-07-20T18:34:21Z</dc:date>
    </item>
    <item>
      <title>Re: AWS VM-series - untrust interface - eating packets</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-vm-series-untrust-interface-eating-packets/m-p/426640#M1297</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/179457"&gt;@abhishah03&lt;/a&gt;&amp;nbsp;what was the solution to your problem? Pls advise the steps so we can also benefit from it.&lt;/P&gt;</description>
      <pubDate>Fri, 13 Aug 2021 02:15:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-vm-series-untrust-interface-eating-packets/m-p/426640#M1297</guid>
      <dc:creator>Connected123</dc:creator>
      <dc:date>2021-08-13T02:15:05Z</dc:date>
    </item>
  </channel>
</rss>

