<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Not able to ping ISP B interface -10.2.9-h1 in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/not-able-to-ping-isp-b-interface-10-2-9-h1/m-p/595442#M3613</link>
    <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/240639"&gt;@UtkarshKumar&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;This is expected behaviour. Although this is considered "local" traffic (targeting the firewall itself, not passing through). Firewall will still perform policy and route lookup when generating reply for traffic to Data Plane interface.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Why this is happening:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;As described in &lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClTJCA0" target="_blank"&gt;Getting Started: Packet Capture - Knowledge Base - Palo Alto Networks&lt;/A&gt; and &lt;A href="https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-web-interface-help/monitor/monitor-packet-capture/building-blocks-for-a-custom-packet-capture" target="_blank"&gt;Building Blocks for a Custom Packet Capture (paloaltonetworks.com)&lt;/A&gt; the four stages for the packet captures are:
&lt;OL&gt;
&lt;LI&gt;
&lt;DIV style="display: inline;"&gt;
&lt;DIV style="display: inline;"&gt;&lt;STRONG&gt;drop&lt;/STRONG&gt;&lt;/DIV&gt;
- When packet processing encounters an error and the packet is dropped.&lt;/DIV&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;DIV style="display: inline;"&gt;&lt;STRONG&gt;receive&lt;/STRONG&gt; - &lt;LI-WRAPPER&gt;When the packet is received on the dataplane processor.&lt;/LI-WRAPPER&gt;&lt;/DIV&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;DIV style="display: inline;"&gt;&lt;STRONG&gt;transmit&lt;/STRONG&gt; - &lt;LI-WRAPPER&gt;When the packet is transmitted on the dataplane processor&lt;/LI-WRAPPER&gt;&lt;/DIV&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;DIV style="display: inline;"&gt;&lt;LI-WRAPPER&gt;&lt;/LI-WRAPPER&gt;&lt;LI-WRAPPER&gt;
&lt;DIV style="display: inline;"&gt;&lt;STRONG&gt;firewall &lt;/STRONG&gt;&lt;/DIV&gt;
- When the packet has a session match or a first packet with a session is successfully create&lt;/LI-WRAPPER&gt;&lt;/DIV&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;/LI&gt;
&lt;LI&gt;These stages can roughtly map as follow to the flow sequence - &lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClVHCA0" target="_blank"&gt;Packet Flow Sequence in PAN-OS - Knowledge Base - Palo Alto Networks&lt;/A&gt;
&lt;OL&gt;
&lt;LI&gt;receive = ingress stage&lt;/LI&gt;
&lt;LI&gt;firewall = firewall session lookup + session setup + AppID + Content inspection&lt;/LI&gt;
&lt;LI&gt;trasmit = forward/eggress stage&lt;/LI&gt;
&lt;/OL&gt;
&lt;/LI&gt;
&lt;LI&gt;As you can see during firewall stage, firewall perform route lookup to identify the destination/egress interface.&lt;/LI&gt;
&lt;LI&gt;Since the default route for ISP-A is with better metric, only that route is installed in the FIB (forwarding table).&lt;/LI&gt;
&lt;LI&gt;And since the FIB lookup return only ISP-A default route, the reply packet is forwarded through the interface connected to ISP-A&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Suggested Solutions:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;The simplest solution would be to create static host route for the source IP via ISP-B. This way reply will take the host route (since it is better match then the default route). The disadvantage of this approach is that ping to ISP-A from the same source IP will now fail, because replies will always go via ISP-B&lt;/LI&gt;
&lt;LI&gt;More scalable solutions would require a bit more configuration. &lt;U&gt;Note: I haven't tested, this but I am almost certain that it will work that way&lt;/U&gt;
&lt;OL&gt;
&lt;LI&gt;Enable ECMP and create two default routes via ISP-A and -B using same metric. This way both default routes will be installed in the FIB&lt;/LI&gt;
&lt;LI&gt;Enable "Symmetric Return" for the ECMP. This will ensure firewall will reply with the same interface, which has received the original packet&lt;/LI&gt;
&lt;LI&gt;Enabling ECMP however will cause your outbound traffic to be load-balanced between the two ISP, which you don't want. To avoid this you will need PBF (policy based routes) with path monitor, which will make sure that outbound traffic is forwarded via ISP-A and when path monitor is&amp;nbsp; down, traffic will be failovered to ISP-B&lt;/LI&gt;
&lt;/OL&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 21 Aug 2024 08:19:12 GMT</pubDate>
    <dc:creator>aleksandar.astardzhiev</dc:creator>
    <dc:date>2024-08-21T08:19:12Z</dc:date>
    <item>
      <title>Not able to ping ISP B interface -10.2.9-h1</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/not-able-to-ping-isp-b-interface-10-2-9-h1/m-p/595268#M3604</link>
      <description>&lt;P&gt;Hi team,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We are facing an issue where we are not able to ping the secondary ISP's external interface when the default route is set for the primary ISP to take preference.&lt;BR /&gt;&lt;BR /&gt;We have two ISPs: ISP A and ISP B.&lt;/P&gt;
&lt;P&gt;The metric is set to prefer the ISP A route. When we try and ping the external interface of ISP B, we can see a weird behavior where when traffic comes on ISP B's external interface - in packet captures we can see the firewall does an echo reply from the same ISP B's interface but it changes in transmit stage of pcaps.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In traffic captures we can see that when we are in receive, Firewall stage the &lt;STRONG&gt;Source MAC&lt;/STRONG&gt; is of ISP B's interface-- as expected but as soon as it comes to the transmit stage of the firewall the &lt;STRONG&gt;source MAC changes to ISP A's interface mac address.&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;We have verified there is no PBF, we have the IP under permit IP addresses, and also have the right MGMT profile attached to the interface.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;No NAT rule to perform a NAT on traffic originating from outside. We checked under routes we can see there is only 1 Static default route pointing toward ISP A.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If we do a failover the same scenario will get replicated for the primary ISP link where we would not be able to ping the ISP A external interface.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Question is why firewall would change the Source mac address/interface after coming to TRANSMIT stage. The PANOS is 10.2.9-h1&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Can someone help in identify if we are missing anything or if there is something we can check?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 19 Aug 2024 19:12:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/not-able-to-ping-isp-b-interface-10-2-9-h1/m-p/595268#M3604</guid>
      <dc:creator>UtkarshKumar</dc:creator>
      <dc:date>2024-08-19T19:12:01Z</dc:date>
    </item>
    <item>
      <title>Re: Not able to ping ISP B interface -10.2.9-h1</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/not-able-to-ping-isp-b-interface-10-2-9-h1/m-p/595435#M3611</link>
      <description>&lt;P&gt;Hi team, did anyone faced a similar issue?&lt;/P&gt;</description>
      <pubDate>Wed, 21 Aug 2024 07:28:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/not-able-to-ping-isp-b-interface-10-2-9-h1/m-p/595435#M3611</guid>
      <dc:creator>UtkarshKumar</dc:creator>
      <dc:date>2024-08-21T07:28:17Z</dc:date>
    </item>
    <item>
      <title>Re: Not able to ping ISP B interface -10.2.9-h1</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/not-able-to-ping-isp-b-interface-10-2-9-h1/m-p/595441#M3612</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/240639"&gt;@UtkarshKumar&lt;/a&gt;&amp;nbsp;Looking at the issue description, it looks it is happening because symmetric return is not happening.&lt;/P&gt;
&lt;P&gt;Can you confirm how your two ISPs are load balanced ? Are you using ECMP ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you have ECMP enabled, you need to make sure symmetric return is enabled.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="SutareMayur_0-1724227448923.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/61625i23857BED3215BAC2/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="SutareMayur_0-1724227448923.png" alt="SutareMayur_0-1724227448923.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you are not using ECMP, refer &lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClF5CAK" target="_self"&gt;this article&lt;/A&gt;. This is for kind of a same scenario but for destination NAT. You can follow steps as per your use case.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Let us know how it goes!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 21 Aug 2024 08:05:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/not-able-to-ping-isp-b-interface-10-2-9-h1/m-p/595441#M3612</guid>
      <dc:creator>SutareMayur</dc:creator>
      <dc:date>2024-08-21T08:05:35Z</dc:date>
    </item>
    <item>
      <title>Re: Not able to ping ISP B interface -10.2.9-h1</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/not-able-to-ping-isp-b-interface-10-2-9-h1/m-p/595442#M3613</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/240639"&gt;@UtkarshKumar&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;This is expected behaviour. Although this is considered "local" traffic (targeting the firewall itself, not passing through). Firewall will still perform policy and route lookup when generating reply for traffic to Data Plane interface.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Why this is happening:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;As described in &lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClTJCA0" target="_blank"&gt;Getting Started: Packet Capture - Knowledge Base - Palo Alto Networks&lt;/A&gt; and &lt;A href="https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-web-interface-help/monitor/monitor-packet-capture/building-blocks-for-a-custom-packet-capture" target="_blank"&gt;Building Blocks for a Custom Packet Capture (paloaltonetworks.com)&lt;/A&gt; the four stages for the packet captures are:
&lt;OL&gt;
&lt;LI&gt;
&lt;DIV style="display: inline;"&gt;
&lt;DIV style="display: inline;"&gt;&lt;STRONG&gt;drop&lt;/STRONG&gt;&lt;/DIV&gt;
- When packet processing encounters an error and the packet is dropped.&lt;/DIV&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;DIV style="display: inline;"&gt;&lt;STRONG&gt;receive&lt;/STRONG&gt; - &lt;LI-WRAPPER&gt;When the packet is received on the dataplane processor.&lt;/LI-WRAPPER&gt;&lt;/DIV&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;DIV style="display: inline;"&gt;&lt;STRONG&gt;transmit&lt;/STRONG&gt; - &lt;LI-WRAPPER&gt;When the packet is transmitted on the dataplane processor&lt;/LI-WRAPPER&gt;&lt;/DIV&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;DIV style="display: inline;"&gt;&lt;LI-WRAPPER&gt;&lt;/LI-WRAPPER&gt;&lt;LI-WRAPPER&gt;
&lt;DIV style="display: inline;"&gt;&lt;STRONG&gt;firewall &lt;/STRONG&gt;&lt;/DIV&gt;
- When the packet has a session match or a first packet with a session is successfully create&lt;/LI-WRAPPER&gt;&lt;/DIV&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;/LI&gt;
&lt;LI&gt;These stages can roughtly map as follow to the flow sequence - &lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClVHCA0" target="_blank"&gt;Packet Flow Sequence in PAN-OS - Knowledge Base - Palo Alto Networks&lt;/A&gt;
&lt;OL&gt;
&lt;LI&gt;receive = ingress stage&lt;/LI&gt;
&lt;LI&gt;firewall = firewall session lookup + session setup + AppID + Content inspection&lt;/LI&gt;
&lt;LI&gt;trasmit = forward/eggress stage&lt;/LI&gt;
&lt;/OL&gt;
&lt;/LI&gt;
&lt;LI&gt;As you can see during firewall stage, firewall perform route lookup to identify the destination/egress interface.&lt;/LI&gt;
&lt;LI&gt;Since the default route for ISP-A is with better metric, only that route is installed in the FIB (forwarding table).&lt;/LI&gt;
&lt;LI&gt;And since the FIB lookup return only ISP-A default route, the reply packet is forwarded through the interface connected to ISP-A&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Suggested Solutions:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;The simplest solution would be to create static host route for the source IP via ISP-B. This way reply will take the host route (since it is better match then the default route). The disadvantage of this approach is that ping to ISP-A from the same source IP will now fail, because replies will always go via ISP-B&lt;/LI&gt;
&lt;LI&gt;More scalable solutions would require a bit more configuration. &lt;U&gt;Note: I haven't tested, this but I am almost certain that it will work that way&lt;/U&gt;
&lt;OL&gt;
&lt;LI&gt;Enable ECMP and create two default routes via ISP-A and -B using same metric. This way both default routes will be installed in the FIB&lt;/LI&gt;
&lt;LI&gt;Enable "Symmetric Return" for the ECMP. This will ensure firewall will reply with the same interface, which has received the original packet&lt;/LI&gt;
&lt;LI&gt;Enabling ECMP however will cause your outbound traffic to be load-balanced between the two ISP, which you don't want. To avoid this you will need PBF (policy based routes) with path monitor, which will make sure that outbound traffic is forwarded via ISP-A and when path monitor is&amp;nbsp; down, traffic will be failovered to ISP-B&lt;/LI&gt;
&lt;/OL&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 21 Aug 2024 08:19:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/not-able-to-ping-isp-b-interface-10-2-9-h1/m-p/595442#M3613</guid>
      <dc:creator>aleksandar.astardzhiev</dc:creator>
      <dc:date>2024-08-21T08:19:12Z</dc:date>
    </item>
    <item>
      <title>Re: Not able to ping ISP B interface -10.2.9-h1</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/not-able-to-ping-isp-b-interface-10-2-9-h1/m-p/595483#M3614</link>
      <description>&lt;P&gt;Thanks&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/70130"&gt;@aleksandar.astardzhiev&lt;/a&gt;&amp;nbsp;. I too thought the same but then we see:&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClF5CAK" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClF5CAK&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Where it's mentioned&amp;nbsp;This feature forwards the packet to the MAC address from where the SYN or lost packet was received. This ensures return traffic follows the same interface which the session created and is useful in asymmetric routing or Dual ISP environments.&lt;BR /&gt;&lt;BR /&gt;Is it not correct that based on this we should see the same interface reply to pings and not follow the routing table?&lt;/P&gt;</description>
      <pubDate>Wed, 21 Aug 2024 14:23:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/not-able-to-ping-isp-b-interface-10-2-9-h1/m-p/595483#M3614</guid>
      <dc:creator>UtkarshKumar</dc:creator>
      <dc:date>2024-08-21T14:23:28Z</dc:date>
    </item>
    <item>
      <title>Re: Not able to ping ISP B interface -10.2.9-h1</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/not-able-to-ping-isp-b-interface-10-2-9-h1/m-p/595487#M3615</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/240639"&gt;@UtkarshKumar&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;As I mentioned in the KB and also in my post, this feature is enabled &lt;U&gt;only&lt;/U&gt; when ECMP is enabled. From your original post it looks like you have two default routes with different metric. Even if ECMP is enabled for the virtual-router (VR), only one of the routes will be installed in the FIB if they have different metrics. &lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;If you have ECMP enabled and configure both routes with the same metric, than this feature will allow you to receive reply from the same interface from which the request is received.&lt;/P&gt;</description>
      <pubDate>Wed, 21 Aug 2024 14:48:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/not-able-to-ping-isp-b-interface-10-2-9-h1/m-p/595487#M3615</guid>
      <dc:creator>aleksandar.astardzhiev</dc:creator>
      <dc:date>2024-08-21T14:48:53Z</dc:date>
    </item>
    <item>
      <title>Re: Not able to ping ISP B interface -10.2.9-h1</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/not-able-to-ping-isp-b-interface-10-2-9-h1/m-p/595759#M3623</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/1419309827"&gt;@glennne&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;What do you mean by "verfied the settings"?&lt;/P&gt;
&lt;P&gt;In my previous post I have tried to explain why this is expected behaviour if you have two default routes with different metric and/or ECMP is not enabled.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Can you share little bit more of your configuration?&lt;/P&gt;</description>
      <pubDate>Fri, 23 Aug 2024 15:17:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/not-able-to-ping-isp-b-interface-10-2-9-h1/m-p/595759#M3623</guid>
      <dc:creator>aleksandar.astardzhiev</dc:creator>
      <dc:date>2024-08-23T15:17:25Z</dc:date>
    </item>
  </channel>
</rss>

