<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Clarity on Overlay routing with GWLB for Combined (Centralized Egress + Distributed Ingress) deployment model in VM-Series in the Public Cloud</title>
    <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/clarity-on-overlay-routing-with-gwlb-for-combined-centralized/m-p/575924#M2110</link>
    <description>&lt;P&gt;Thank you&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/127749"&gt;@mb_equate&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Yes, that's what I was thinking as well and it makes sense.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So the reason I asked this question was a colleague also tested this out and in their case, the FW sent the return flow out its Public interface - causing asymmetric routing.&amp;nbsp;I was not able to reproduce the issue though, so I wanted to check if it was a configurable option.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It is probably a misconfiguration/bug in their FW.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 05 Feb 2024 00:42:39 GMT</pubDate>
    <dc:creator>Yelzamani</dc:creator>
    <dc:date>2024-02-05T00:42:39Z</dc:date>
    <item>
      <title>Clarity on Overlay routing with GWLB for Combined (Centralized Egress + Distributed Ingress) deployment model</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/clarity-on-overlay-routing-with-gwlb-for-combined-centralized/m-p/575909#M2108</link>
      <description>&lt;P&gt;Hi,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am looking for some clarity on the Overlay routing feature on VM Series FW.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am using the&amp;nbsp;Combined (Centralized Egress + Distributed Ingress) deployment model described in this &lt;A title="Securing Application in AWS - Centralized Model Deployment Guide" href="https://www.paloaltonetworks.com/apps/pan/public/downloadResource?pagePath=/content/pan/en_US/resources/guides/aws-transit-gateway-deployment-guide" target="_self"&gt;Securing Application in AWS - Centralized Model Deployment Guide&lt;/A&gt;.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2024-02-04 at 1.31.23 PM.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/57339iB24716C20FE6D7EE/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="Screenshot 2024-02-04 at 1.31.23 PM.png" alt="Screenshot 2024-02-04 at 1.31.23 PM.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;In this pattern, &lt;A href="https://docs.paloaltonetworks.com/vm-series/10-1/vm-series-deployment/set-up-the-vm-series-firewall-on-aws/vm-series-integration-with-gateway-load-balancer/integrate-the-vm-series-with-an-aws-gateway-load-balancer/enable-overlay-routing-for-the-vm-series-on-aws" target="_self"&gt;overlay routing&lt;/A&gt; is enabled so that the FW can handle both inspection and NAT for outbound traffic flows. It&amp;nbsp;&lt;SPAN&gt;allows packets to leave the VM-Series firewall through a different interface than that which they entered through.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have built this out in my lab and it works well but I want to understand why it does.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Egress Traffic&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;I understand for outbound flow (Traffic initiated from the VPC to the internet) - The traffic from the EC2 instance leaves the VPC via the TGW and lands on the TGW attachment in the Security VPC, which then sends it to the GWLB endpoint for inspection on the FW. With Overlay routing, the FW is able to check the destination address (internet bound) and directly route it out its public interface.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;EC2 --&amp;gt; TGW (App VPC) --&amp;gt; TGW (Security VPC) --&amp;gt; GWLBe --&amp;gt; (inside)VM Series FW(outside)---&amp;gt; IGW&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Ingress Traffic&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Here is where it gets confusing. For inbound traffic (Traffic initiated from internet to VPC)&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;Inbound flow&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;The traffic first hits the GWLB endpoint in the app VPC and gets send to the Inspection VPC for inspection, FW inspects (destination is app VPC) and sends the traffic back out the inside interface. Traffic gets send back through the GWLB endpoint and on to the ALB and to the EC2 instance&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Client --&amp;gt; IGW --&amp;gt; GWLBe(App VPC) --&amp;gt; GWLB (Inspection VPC) ---&amp;gt; (inside)VM Series FW (inside) --&amp;gt; GWLB (Inspection) ---&amp;gt; GWLBe (App VPC) ---&amp;gt; ALB (SNAT) ---&amp;gt; EC2&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;Return flow&lt;/EM&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Here the EC2 responds directly to the ALB private IP, ALB forwards to the internet via the GWLB endpoint, which then gets sent to the&amp;nbsp;Inspection VPC for inspection, FW inspects and sends&amp;nbsp;the traffic back out the inside interface to the GWLB and it makes it way back to GWLB endpoint in the App VOC and to the client on the internet.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;EC2 --&amp;gt; ALB (APP VPC) ---&amp;gt; GWLBe --&amp;gt; GWLB --&amp;gt; (Inside) VM series FW (inside) --&amp;gt; GWLB/GWLBe --&amp;gt; IGW ----&amp;gt; Client&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;With overlay routing, &lt;STRONG&gt;I expected the FW to see that the destination address on the return flow is internet bound and should have sent it out its outside/public interface (like it did on the outbound flow)&lt;/STRONG&gt; - which would of course break the flow and cause asymmetric routing.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;How does the FW know to send the return flow back out its inside interface?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I did not have to configure any PBRs to influence the routing.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 04 Feb 2024 21:17:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/clarity-on-overlay-routing-with-gwlb-for-combined-centralized/m-p/575909#M2108</guid>
      <dc:creator>Yelzamani</dc:creator>
      <dc:date>2024-02-04T21:17:11Z</dc:date>
    </item>
    <item>
      <title>Re: Clarity on Overlay routing with GWLB for Combined (Centralized Egress + Distributed Ingress) deployment model</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/clarity-on-overlay-routing-with-gwlb-for-combined-centralized/m-p/575921#M2109</link>
      <description>&lt;P&gt;I agree it does sound counterintuitive. I _think_ this is due to the firewall having already received the traffic &lt;EM&gt;from&lt;/EM&gt; the GWLB on the inbound leg, matching the return flow to the same session (which in this case includes the TLV headers associated with the GENEVE encapsulation) and symmetrically returning the traffic to the GWLB. Reading the return traffic flow for the combined option in the&amp;nbsp;&lt;A href="https://www.paloaltonetworks.com/resources/guides/aws-transit-gateway-deployment-guide" target="_self"&gt;deployment guide&lt;/A&gt;:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;"The firewall receives the traffic from the GWLB on its private dataplane interface. The firewall&amp;nbsp;receives the traffic and associates the return traffic to an active session on the firewall.&amp;nbsp;The firewall uses the session information, including the TLVs associated with the Geneve&amp;nbsp;encapsulation to return the traffic to the GWLB"&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I find the documentation doesn't go into enough technical detail for those that want to understand how stuff works not just build it &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 05 Feb 2024 00:07:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/clarity-on-overlay-routing-with-gwlb-for-combined-centralized/m-p/575921#M2109</guid>
      <dc:creator>mb_equate</dc:creator>
      <dc:date>2024-02-05T00:07:47Z</dc:date>
    </item>
    <item>
      <title>Re: Clarity on Overlay routing with GWLB for Combined (Centralized Egress + Distributed Ingress) deployment model</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/clarity-on-overlay-routing-with-gwlb-for-combined-centralized/m-p/575924#M2110</link>
      <description>&lt;P&gt;Thank you&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/127749"&gt;@mb_equate&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Yes, that's what I was thinking as well and it makes sense.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So the reason I asked this question was a colleague also tested this out and in their case, the FW sent the return flow out its Public interface - causing asymmetric routing.&amp;nbsp;I was not able to reproduce the issue though, so I wanted to check if it was a configurable option.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It is probably a misconfiguration/bug in their FW.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 05 Feb 2024 00:42:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/clarity-on-overlay-routing-with-gwlb-for-combined-centralized/m-p/575924#M2110</guid>
      <dc:creator>Yelzamani</dc:creator>
      <dc:date>2024-02-05T00:42:39Z</dc:date>
    </item>
  </channel>
</rss>

