<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Palo firewall routing in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/palo-firewall-routing/m-p/516801#M449</link>
    <description>&lt;P&gt;Hello. New to Palo's. I have a question re routing.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have an interface with, say, 1.1.1.1/24. There is a router on the same network on 1.1.1.2.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have had to add a static route in order to ping/communicate with 1.1.1.2&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is this normal Palo behaviour?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 05 Oct 2022 06:04:04 GMT</pubDate>
    <dc:creator>nemeses666</dc:creator>
    <dc:date>2022-10-05T06:04:04Z</dc:date>
    <item>
      <title>Palo firewall routing</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/palo-firewall-routing/m-p/516801#M449</link>
      <description>&lt;P&gt;Hello. New to Palo's. I have a question re routing.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have an interface with, say, 1.1.1.1/24. There is a router on the same network on 1.1.1.2.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have had to add a static route in order to ping/communicate with 1.1.1.2&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is this normal Palo behaviour?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 05 Oct 2022 06:04:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/palo-firewall-routing/m-p/516801#M449</guid>
      <dc:creator>nemeses666</dc:creator>
      <dc:date>2022-10-05T06:04:04Z</dc:date>
    </item>
    <item>
      <title>Re: Palo firewall routing</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/palo-firewall-routing/m-p/516819#M450</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/242218"&gt;@nemeses666&lt;/a&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;thanks for the post.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Yes, this is correct understanding. Unless you have dynamic routing in place, for any indirectly connected subnet, you will have to configure static route with egress interface. Here is a KB for reference:&amp;nbsp;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000001V3WCAU&amp;amp;lang=en_US%E2%80%A9" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000001V3WCAU&amp;amp;lang=en_US%E2%80%A9&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If the other subnet has a route back, this communication should be functional.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Kind Regards&lt;/P&gt;
&lt;P&gt;Pavel&lt;/P&gt;</description>
      <pubDate>Tue, 04 Oct 2022 23:57:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/palo-firewall-routing/m-p/516819#M450</guid>
      <dc:creator>PavelK</dc:creator>
      <dc:date>2022-10-04T23:57:03Z</dc:date>
    </item>
    <item>
      <title>Re: Palo firewall routing</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/palo-firewall-routing/m-p/516843#M451</link>
      <description>&lt;P&gt;Hi. I have edited my post as I originally wrote it incorrectly.&lt;/P&gt;</description>
      <pubDate>Wed, 05 Oct 2022 06:05:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/palo-firewall-routing/m-p/516843#M451</guid>
      <dc:creator>nemeses666</dc:creator>
      <dc:date>2022-10-05T06:05:02Z</dc:date>
    </item>
    <item>
      <title>Re: Palo firewall routing</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/palo-firewall-routing/m-p/516861#M454</link>
      <description>&lt;P&gt;Thank you for reply&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/242218"&gt;@nemeses666&lt;/a&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;by looking into your edited post, no this is not expected behavior. May I ask, how did you diagnose/concluded that adding static route is resolving this issue?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regarding ping, by default it is using management interface. If you want to change it to data plane interface you have to specify source:&amp;nbsp;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000Clk7CAC" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000Clk7CAC&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Kind Regards&lt;/P&gt;
&lt;P&gt;Pavel&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 05 Oct 2022 06:48:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/palo-firewall-routing/m-p/516861#M454</guid>
      <dc:creator>PavelK</dc:creator>
      <dc:date>2022-10-05T06:48:05Z</dc:date>
    </item>
    <item>
      <title>Re: Palo firewall routing</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/palo-firewall-routing/m-p/516869#M455</link>
      <description>&lt;P&gt;Hi Pavel. Without the static route I am unable to communicate with IP address attached to the local interface. Even using the 'source' option with ping I am unable to ping 1.1.1.2 unless the static route exists. A site to site VPN will not come up without it. I can see the IKE packets from the remote peer however the Palo does not respond unless the static is in place.&lt;/P&gt;</description>
      <pubDate>Wed, 05 Oct 2022 07:10:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/palo-firewall-routing/m-p/516869#M455</guid>
      <dc:creator>nemeses666</dc:creator>
      <dc:date>2022-10-05T07:10:28Z</dc:date>
    </item>
    <item>
      <title>Re: Palo firewall routing</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/palo-firewall-routing/m-p/516911#M456</link>
      <description>&lt;P&gt;There are an awful lot of things that could be going on; multiple route tables, more specific routes, incorrect netmask, NATs, PBFs, etc. Starting simple since you say you can not ping the directly attached host (this shouldn't need a source option since the device is locally connected, i.e.):&lt;/P&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;PA&amp;gt;&amp;nbsp; ping host 1.1.1.2&lt;/P&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Remove the static route for 1.1.1.0/24 you put in. Can you ping the PA itself?&lt;/P&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;PA&amp;gt;&amp;nbsp; ping host 1.1.1.1&lt;/P&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;What does the routing table show for a destination matching 1.1.1.2?&lt;/P&gt;
&lt;P class="lia-indent-padding-left-60px"&gt;PA&amp;gt;&amp;nbsp; show routing route&lt;/P&gt;</description>
      <pubDate>Wed, 05 Oct 2022 15:57:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/palo-firewall-routing/m-p/516911#M456</guid>
      <dc:creator>Adrian_Jensen</dc:creator>
      <dc:date>2022-10-05T15:57:29Z</dc:date>
    </item>
    <item>
      <title>Re: Palo firewall routing</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/palo-firewall-routing/m-p/516953#M457</link>
      <description>&lt;P&gt;Hi Adrian.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If I remove the static (which just points to the Interface) I can still ping the locally attached address however not 1.1.1.2.&lt;/P&gt;</description>
      <pubDate>Thu, 06 Oct 2022 06:58:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/palo-firewall-routing/m-p/516953#M457</guid>
      <dc:creator>nemeses666</dc:creator>
      <dc:date>2022-10-06T06:58:49Z</dc:date>
    </item>
    <item>
      <title>Re: Palo firewall routing</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/palo-firewall-routing/m-p/517026#M458</link>
      <description>&lt;P&gt;And what is the routing table?&lt;/P&gt;</description>
      <pubDate>Thu, 06 Oct 2022 18:37:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/palo-firewall-routing/m-p/517026#M458</guid>
      <dc:creator>Adrian_Jensen</dc:creator>
      <dc:date>2022-10-06T18:37:44Z</dc:date>
    </item>
    <item>
      <title>Re: Palo firewall routing</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/palo-firewall-routing/m-p/517077#M460</link>
      <description>&lt;P&gt;&amp;nbsp;Adrian,&lt;/P&gt;
&lt;P&gt;Can you explain how the routing table is relevant when the address I wish to ping is in a directly connected network? I am unable to present the routing table on a public platform due to company security policies.&lt;/P&gt;</description>
      <pubDate>Fri, 07 Oct 2022 08:49:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/palo-firewall-routing/m-p/517077#M460</guid>
      <dc:creator>nemeses666</dc:creator>
      <dc:date>2022-10-07T08:49:22Z</dc:date>
    </item>
    <item>
      <title>Re: Palo firewall routing</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/palo-firewall-routing/m-p/517144#M466</link>
      <description>&lt;P&gt;Because the routing table will show:&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;- the route mask applied to the route, which may indicate incorrect or corrupted netmask applied to the interface&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;- route existing on an alternate interface, meaning the IP range is already being used elsewhere on the PA&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;- route existing with something other than "C" connected status, i.e. its being learned from elsewhere, overridden by some other static route "S", etc.&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;- a more specific route is redirecting traffic to another interface&lt;/P&gt;
&lt;P class="lia-indent-padding-left-30px"&gt;- look at whether the route exists in your default routing table, as well as in alternate routing tables which may exist in your specific configuration&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Also look carefully through your PBFs to see if something might be matching/redirecting traffic there. There is a "Test Policy Match" tool at the bottom that you can use to see if traffic would potentially match a rule.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You don't need to post your actual IPs from the routing tables, you can obscure them. Netmask/routing type/interface matching the expected values is more important than the actual IP.&lt;/P&gt;</description>
      <pubDate>Fri, 07 Oct 2022 15:57:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/palo-firewall-routing/m-p/517144#M466</guid>
      <dc:creator>Adrian_Jensen</dc:creator>
      <dc:date>2022-10-07T15:57:41Z</dc:date>
    </item>
  </channel>
</rss>

