<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Management Interface and In Band Network Overlap in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/management-interface-and-in-band-network-overlap/m-p/592174#M3418</link>
    <description>&lt;P&gt;I ended up creating a separate p2p interface for the management interface. I thought about running it through another PA but after thinking about it, I wouldn't want a scenario where the other PA was blocking access to the management of the device for some reason. Likewise with the FW inspecting its own flow to the mgt interface could cause traffic interuptions.&lt;/P&gt;</description>
    <pubDate>Tue, 16 Jul 2024 13:20:11 GMT</pubDate>
    <dc:creator>NSutfin</dc:creator>
    <dc:date>2024-07-16T13:20:11Z</dc:date>
    <item>
      <title>Management Interface and In Band Network Overlap</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/management-interface-and-in-band-network-overlap/m-p/565360#M2079</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;I have the management interface of some PAs in the 10.10.10.0/24 management network. This is the a corporate management network for network devices etc. I also want to inspect traffic on this network and have assigned a interface/security zone with the default gateway for the management network on the PAs. I am having trouble getting the routing to work inband vs default management route. the fib takes&amp;nbsp; traffic destined for the network devices and sends down the management interface. I have included a simple network diagram.Any ideas on how to accomplish this? &lt;/P&gt;
&lt;P&gt;Thank you&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="NSutfin_0-1699885772086.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/55140i647C0DA71F7AECDC/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="NSutfin_0-1699885772086.png" alt="NSutfin_0-1699885772086.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 13 Nov 2023 14:30:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/management-interface-and-in-band-network-overlap/m-p/565360#M2079</guid>
      <dc:creator>NSutfin</dc:creator>
      <dc:date>2023-11-13T14:30:25Z</dc:date>
    </item>
    <item>
      <title>Re: Management Interface and In Band Network Overlap</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/management-interface-and-in-band-network-overlap/m-p/565392#M2081</link>
      <description>&lt;P&gt;That doesn't seem possible since the management interface isn't bound to a virtual router and e1.10 should be.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Can you provide output on the mgmt interface configuration and the routing table output that shows the traffic flow?&lt;/P&gt;</description>
      <pubDate>Mon, 13 Nov 2023 16:50:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/management-interface-and-in-band-network-overlap/m-p/565392#M2081</guid>
      <dc:creator>rmfalconer</dc:creator>
      <dc:date>2023-11-13T16:50:11Z</dc:date>
    </item>
    <item>
      <title>Re: Management Interface and In Band Network Overlap</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/management-interface-and-in-band-network-overlap/m-p/592174#M3418</link>
      <description>&lt;P&gt;I ended up creating a separate p2p interface for the management interface. I thought about running it through another PA but after thinking about it, I wouldn't want a scenario where the other PA was blocking access to the management of the device for some reason. Likewise with the FW inspecting its own flow to the mgt interface could cause traffic interuptions.&lt;/P&gt;</description>
      <pubDate>Tue, 16 Jul 2024 13:20:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/management-interface-and-in-band-network-overlap/m-p/592174#M3418</guid>
      <dc:creator>NSutfin</dc:creator>
      <dc:date>2024-07-16T13:20:11Z</dc:date>
    </item>
  </channel>
</rss>

