<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ingress/egress interfaces part of firewall session? in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/ingress-egress-interfaces-part-of-firewall-session/m-p/598896#M3810</link>
    <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/925386599"&gt;@H.Tendrup&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As you mentioned, the interface is NOT part of the 6-tuple key that identifies a session.&amp;nbsp; If the traffic comes in a different interface but the same zone, it will NOT be dropped.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You mentioned the hypothetical zone "outside".&amp;nbsp; If you are considering dual-ISPs, then the traffic out one interface will be NATed to the IP address on that interface &lt;EM&gt;which would dictate the return traffic coming back in the same interface&lt;/EM&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If the 2 interfaces are L3, you will want to enable ECMP.&amp;nbsp; For a dual-ISP scenario, you would want to enable symmetric return for VPN traffic.&amp;nbsp; Interfaces are tracked for symmetric return, but they don't define the session.&amp;nbsp; The doc you posted refers to PBF.&amp;nbsp; Using routing for ECMP is more straightforward.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Tom&lt;/P&gt;</description>
    <pubDate>Thu, 26 Sep 2024 18:57:30 GMT</pubDate>
    <dc:creator>TomYoung</dc:creator>
    <dc:date>2024-09-26T18:57:30Z</dc:date>
    <item>
      <title>ingress/egress interfaces part of firewall session?</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/ingress-egress-interfaces-part-of-firewall-session/m-p/598883#M3808</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;I'd like to configure a NGFW with dual routed interfaces on some zone, call it "outside." If some host on the inside zone initiates&amp;nbsp; traffic to the outside zone, traffic will egress through one or the other outside interfaces, if the return traffic ingresses via the other interface, will the FW drop that traffic?&amp;nbsp; In other words, are the ingress and egress interfaces tracked as part of the FW session and must be symmetric or just the zones? In this packet flow doc, interfaces are not mentioned as part of the 6-tuple that comprises a flow (zones are).&lt;/P&gt;
&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClVHCA0" target="_blank"&gt;Packet Flow Sequence in PAN-OS - Knowledge Base - Palo Alto Networks&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It would actually seem a little weird (to me) that interfaces are NOT tracked, but ¯\_(ツ)_/¯&lt;/P&gt;
&lt;P&gt;(this doc indicates that interfaces actually ARE tracked:&amp;nbsp;&lt;A href="https://docs.paloaltonetworks.com/pan-os/10-2/pan-os-admin/policy/policy-based-forwarding/pbf/egress-path-and-symmetric-return" target="_blank"&gt;Egress Path and Symmetric Return (paloaltonetworks.com)&lt;/A&gt;, but it discusses traffic initiated from the outside and using a feature to handle returning that traffic symmetrically - this doesn't help me. Also the flow doc should be updated, if that's true)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is there a nerd-knob that disables specific interface tracking?&lt;/P&gt;
&lt;P&gt;I have other options, but 2 basic ospf links is the most straight forward.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you for considering!&lt;/P&gt;</description>
      <pubDate>Thu, 26 Sep 2024 17:23:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/ingress-egress-interfaces-part-of-firewall-session/m-p/598883#M3808</guid>
      <dc:creator>H.Tendrup</dc:creator>
      <dc:date>2024-09-26T17:23:28Z</dc:date>
    </item>
    <item>
      <title>Re: ingress/egress interfaces part of firewall session?</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/ingress-egress-interfaces-part-of-firewall-session/m-p/598891#M3809</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/925386599"&gt;@H.Tendrup&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The asymmetric path monitoring feature can be configured in two ways:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;STRONG&gt;Global configuration:&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;This applies the monitoring to all zones on the device.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Zone protection:&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;This allows you to configure monitoring for individual zones.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;For more information on configuring asymmetric path monitoring, please refer to the following document:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClG2CAK" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClG2CAK&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 26 Sep 2024 18:14:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/ingress-egress-interfaces-part-of-firewall-session/m-p/598891#M3809</guid>
      <dc:creator>jpomachagua</dc:creator>
      <dc:date>2024-09-26T18:14:53Z</dc:date>
    </item>
    <item>
      <title>Re: ingress/egress interfaces part of firewall session?</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/ingress-egress-interfaces-part-of-firewall-session/m-p/598896#M3810</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/925386599"&gt;@H.Tendrup&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As you mentioned, the interface is NOT part of the 6-tuple key that identifies a session.&amp;nbsp; If the traffic comes in a different interface but the same zone, it will NOT be dropped.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You mentioned the hypothetical zone "outside".&amp;nbsp; If you are considering dual-ISPs, then the traffic out one interface will be NATed to the IP address on that interface &lt;EM&gt;which would dictate the return traffic coming back in the same interface&lt;/EM&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If the 2 interfaces are L3, you will want to enable ECMP.&amp;nbsp; For a dual-ISP scenario, you would want to enable symmetric return for VPN traffic.&amp;nbsp; Interfaces are tracked for symmetric return, but they don't define the session.&amp;nbsp; The doc you posted refers to PBF.&amp;nbsp; Using routing for ECMP is more straightforward.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Tom&lt;/P&gt;</description>
      <pubDate>Thu, 26 Sep 2024 18:57:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/ingress-egress-interfaces-part-of-firewall-session/m-p/598896#M3810</guid>
      <dc:creator>TomYoung</dc:creator>
      <dc:date>2024-09-26T18:57:30Z</dc:date>
    </item>
  </channel>
</rss>

