<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>article Nominated Discussion: VLAN Confusion in General Articles</title>
    <link>https://live.paloaltonetworks.com/t5/general-articles/nominated-discussion-vlan-confusion/ta-p/537588</link>
    <description>&lt;P&gt;This Nominated Discussion Article is based on the post "&lt;A href="https://live.paloaltonetworks.com/t5/general-topics/vlan-confusion/m-p/537313" target="_blank" rel="noopener"&gt;VLAN Confusion&lt;/A&gt;" by&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/280597"&gt;@bgre033&lt;/a&gt; and responded to by &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/282057"&gt;@seb_rupik&lt;/a&gt;&amp;nbsp; and &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/15603"&gt;@Raido_Rattameister&lt;/a&gt;&amp;nbsp;. Read on to see the discussion and solution!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV class="lia-message-template-content-zone"&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;I’ve recently got a PA-440, and trying to make sense of the VLAN logic on PAN-OS has got me stumped.&lt;BR /&gt;&lt;BR /&gt;First of all, I get creating a layer 3 sub interface and assigning a VLAN tag, easy. A bit odd that the 'tag' doesn't then show up as a VLAN under Network &amp;gt; VLANs, but I can let that slide.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It's an access port where things really don't make sense. I follow the steps below, and even though it works it just doesn't make sense.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Mark an interface as layer 2, and assign a layer 2 zone to it, ok.&lt;/LI&gt;
&lt;LI&gt;Create a VLAN (Network &amp;gt; VLANs) - sure, but you don’t specify a VLAN ID, just a name. What is the point of this construct?&lt;/LI&gt;
&lt;LI&gt;Assign created VLAN (from step 2) to the physical layer 2 interface - again, ok, but given the VLAN hasn’t got an ID, does this achieve anything?&lt;/LI&gt;
&lt;LI&gt;Create a VLAN Interface (with an ID between 1-9999) and assign a VLAN to it. I assume this is like an SVI, but I don’t need a layer 3 VLAN interface, why is this necessary? Also, it seems like the ID is meant to be the VLAN tag (but the range is not right, 1-9999 rather than 1-4094)?&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;I'm hoping someone can explain this to be, as the documentation isn't clear.&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;What is the point of VLANs under Network &amp;gt; VLANs? Given you don't specify a VLAN ID.&lt;/LI&gt;
&lt;LI&gt;Is the ID under the VLAN interface actually a VLAN tag, rather than an interface ID? If so, why is the range 1-9999 (rather than 1-4094)?&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Palo Alto has taken the approach of decoupling the VLAN ID from the VLAN virtual-bridge construct. When you create a VLAN object under &lt;STRONG&gt;Network -&amp;gt; VLAN&lt;/STRONG&gt;, the name is the UID not a VLAN ID as would be the case on a cisco. The object you create here is a virtual-bridge which is used to bind the various Layer 2 interfaces defined &lt;STRONG&gt;Network -&amp;gt; Interfaces -&amp;gt; Ethernet&lt;/STRONG&gt; and a single SVI under &lt;STRONG&gt;Network -&amp;gt; Interfaces -&amp;gt; VLAN&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The ID number which is required by a sub-interface or VLAN/SVI interface is arbitrary. The &lt;EM&gt;&lt;STRONG&gt;tag number&lt;/STRONG&gt;&lt;/EM&gt;&lt;STRONG&gt;,&lt;/STRONG&gt; which is selected under the sub-interface,&amp;nbsp;&lt;EM&gt;&lt;STRONG&gt;is the VLAN ID&lt;/STRONG&gt;&lt;/EM&gt; and is used for the 802.1Q encapsulation. The sub-interface ID and tag number do not have to match, but it can help with readability!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It is worth noting that this decoupling of VLAN ID from the VLAN object means that sub-interfaces, which uses different 802.1Q tags, can use the same VLAN virtual-bridge effectively performing VLAN tag rewriting.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="foo.png" style="width: 858px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/49218iB38C456A0030DC15/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="foo.png" alt="foo.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;This would suggest that an access port cannot exist (for example) in VLAN 20 unless a sub-interface has been created with tag '20' and both of these objects have been associated with a VLAN object (Network &amp;gt; VLAN)? Suppose this doesn't really matter, as an access port VLAN ID isn't relevant unless a trunk port exists somewhere on the said device (which it won't unless sub-interfaces have been created).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Finally, I take it a VLAN sub-interface (Network &amp;gt; Interfaces &amp;gt; VLAN) isn't needed unless inter-VLAN routing is required?&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It is always easier to set interfaces in Layer3.&amp;nbsp; The main interface will be untagged and sub-interfaces will tag packets.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Layer2 makes sense only if you deploy firewalls in small office with few devices and you don't have a dedicated switch (all devices connect directly to Palo) and you need multiple interfaces to be in same subnet/vlan&lt;/LI&gt;
&lt;LI&gt;Other reason to use Layer2 is if you have existing setup. Let's say a web server and database servers were historically deployed in a single VLAN. You want to separate them and place a firewall in between&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;BR /&gt;What you can do is connect web server and database server directly to the PA Firewall. Set the firewall interfaces in Layer2 and create a policy in between to permit only specific traffic. As a result, no re-IP needed but security posture improved.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Once you configure a Layer2 sub-interface you are creating a trunk link and 802.1q will be enabled, using the 'tag' value as the VLAN ID on the encapsulated frame.&amp;nbsp;An access port doesn't really need a VLAN tag, as it is never imposed on the frame, they arrive and leave untagged.&amp;nbsp; The VLAN tag/ID is there purely to identify which virtual-bridge the frames belong to.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The object created under &lt;STRONG&gt;Network -&amp;gt; Interfaces -&amp;gt; VLAN&lt;/STRONG&gt; is &lt;STRONG&gt;not&lt;/STRONG&gt; a sub-interface. I understand the confusion as it prepends a digit to the interface name. The interface here is a SVI/IRB . If you have configured your firewall interfaces all as Layer2, then yes you will need these for inter-VLAN routing. You can have a mix of routed Layer 3 interfaces (dedicated or sub-interface) and VLAN interfaces for inter-VLAN routing, depending on your topology.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Once you get to PAN-OS 11.x you can configure PPPoE on sub-interface.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Raido_Rattameister_0-1680567640642.png" style="width: 865px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/49256iAFFE23EDC0E2C4C1/image-dimensions/865x572/is-moderation-mode/true?v=v2" width="865" height="572" role="button" title="Raido_Rattameister_0-1680567640642.png" alt="Raido_Rattameister_0-1680567640642.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;</description>
    <pubDate>Tue, 05 Nov 2024 01:32:01 GMT</pubDate>
    <dc:creator>kiwi</dc:creator>
    <dc:date>2024-11-05T01:32:01Z</dc:date>
    <item>
      <title>Nominated Discussion: VLAN Confusion</title>
      <link>https://live.paloaltonetworks.com/t5/general-articles/nominated-discussion-vlan-confusion/ta-p/537588</link>
      <description>&lt;P&gt;This Nominated Discussion Article is based on the post "&lt;A href="https://live.paloaltonetworks.com/t5/general-topics/vlan-confusion/m-p/537313" target="_blank" rel="noopener"&gt;VLAN Confusion&lt;/A&gt;".&lt;/P&gt;</description>
      <pubDate>Tue, 05 Nov 2024 01:32:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-articles/nominated-discussion-vlan-confusion/ta-p/537588</guid>
      <dc:creator>kiwi</dc:creator>
      <dc:date>2024-11-05T01:32:01Z</dc:date>
    </item>
  </channel>
</rss>

