<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic issues with traffic passing through vWire in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/issues-with-traffic-passing-through-vwire/m-p/1219139#M5485</link>
    <description>&lt;P&gt;hi guys, i'm trying to set up a new Palo Alto firewall, a PA 440, for a customer. But they want minimal impact on their network and don't want to change anything, so i proposed setting up a vWire so they change nothing and can benefit from the inspection features of the new Palo box.&lt;/P&gt;
&lt;P&gt;pretty much here's how it kinda looks like:&lt;/P&gt;
&lt;P&gt;ISP Router --&amp;gt; Core Switch --&amp;gt; PA 440 --&amp;gt; Existing Firewall --&amp;gt; LAN&lt;/P&gt;
&lt;P&gt;Following the official documentation, i set up 2 vWire interfaces with a zone for each and i create a policy to allow everything, with just antivirus and vulnerabilty profile activated, the idea being i'll tighten it later&lt;/P&gt;
&lt;P&gt;but there is no connectivity to the internet: pings are not responsive and websites don't load. in the monitor logs, i see all requests are allowed, but they all say application is incomplete&lt;/P&gt;
&lt;P&gt;what have i missed ?&lt;/P&gt;</description>
    <pubDate>Mon, 03 Feb 2025 19:45:46 GMT</pubDate>
    <dc:creator>D.Sine</dc:creator>
    <dc:date>2025-02-03T19:45:46Z</dc:date>
    <item>
      <title>issues with traffic passing through vWire</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/issues-with-traffic-passing-through-vwire/m-p/1219139#M5485</link>
      <description>&lt;P&gt;hi guys, i'm trying to set up a new Palo Alto firewall, a PA 440, for a customer. But they want minimal impact on their network and don't want to change anything, so i proposed setting up a vWire so they change nothing and can benefit from the inspection features of the new Palo box.&lt;/P&gt;
&lt;P&gt;pretty much here's how it kinda looks like:&lt;/P&gt;
&lt;P&gt;ISP Router --&amp;gt; Core Switch --&amp;gt; PA 440 --&amp;gt; Existing Firewall --&amp;gt; LAN&lt;/P&gt;
&lt;P&gt;Following the official documentation, i set up 2 vWire interfaces with a zone for each and i create a policy to allow everything, with just antivirus and vulnerabilty profile activated, the idea being i'll tighten it later&lt;/P&gt;
&lt;P&gt;but there is no connectivity to the internet: pings are not responsive and websites don't load. in the monitor logs, i see all requests are allowed, but they all say application is incomplete&lt;/P&gt;
&lt;P&gt;what have i missed ?&lt;/P&gt;</description>
      <pubDate>Mon, 03 Feb 2025 19:45:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/issues-with-traffic-passing-through-vwire/m-p/1219139#M5485</guid>
      <dc:creator>D.Sine</dc:creator>
      <dc:date>2025-02-03T19:45:46Z</dc:date>
    </item>
    <item>
      <title>Re: issues with traffic passing through vWire</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/issues-with-traffic-passing-through-vwire/m-p/1219401#M5492</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;Most of the time when I see the application as 'unknown' its a connectivity issue. Also I would suggest putting the PAN between the existing firewall and the clients so you can see that traffic and build policies on it. Also make sure your policie(s) allow traffic in both directions.&lt;/P&gt;</description>
      <pubDate>Tue, 04 Feb 2025 20:02:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/issues-with-traffic-passing-through-vwire/m-p/1219401#M5492</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2025-02-04T20:02:50Z</dc:date>
    </item>
    <item>
      <title>Re: issues with traffic passing through vWire</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/issues-with-traffic-passing-through-vwire/m-p/1221914#M5603</link>
      <description>&lt;P&gt;&lt;SPAN&gt;just to give a quick update: in the end i added the VLAN tags to the vWire, and also had to create a Zone Protection Profile and set TCP Non-SYN Packet rejection to No. apparently it is an asymetric routing issue, see this kb for details:&amp;nbsp;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClSHCA0" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClSHCA0&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 25 Feb 2025 13:24:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/issues-with-traffic-passing-through-vwire/m-p/1221914#M5603</guid>
      <dc:creator>D.Sine</dc:creator>
      <dc:date>2025-02-25T13:24:16Z</dc:date>
    </item>
  </channel>
</rss>

