<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Workstations no internet after receive IP from firewall DHCP Server in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/workstations-no-internet-after-receive-ip-from-firewall-dhcp/m-p/451200#M101130</link>
    <description>&lt;P&gt;Hi,&lt;BR /&gt;&lt;BR /&gt;We have a PaloAlto firewall which is connected to a Cisco switch and on this Cisco swtich an AP is connected.&lt;/P&gt;&lt;P&gt;On the firewall I use ethernet 1/2 port to handle the free wifi clients. This port is in Layer 3 mode.&lt;/P&gt;&lt;P&gt;This port is connected with the Cisco switch. The port on the Cisco switch is configured in access mode and in vlan 5.&lt;/P&gt;&lt;P&gt;On my AP I set the option that the free wifi is connected with vlan 5.&lt;/P&gt;&lt;P&gt;On the firewall my ISP is connected on port 1/3.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;On the firewall I have configured the following:&lt;/P&gt;&lt;P&gt;- Ethernet 1/2 is in mode Layer 3 and has IP address 192.168.128.1/24&lt;/P&gt;&lt;P&gt;- This interface is in virtual router internal and in security zone FREE_WIFI&lt;BR /&gt;- DHCP server configured on Ethernet 1/2 with these options:&lt;/P&gt;&lt;P&gt;IP pool: 192.168.128.2-192.168.128.254&lt;BR /&gt;GW: 192.168.128.1&lt;BR /&gt;DNS: 1.1.1.1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I configured the following security rules:&lt;/P&gt;&lt;P&gt;- Deny from zone Free_WiFi to zone Internal_Network&lt;BR /&gt;- Allow from zone Free_WiFi to zone Free_WiFi&lt;/P&gt;&lt;P&gt;- Allow from zone Free_WiFi to zone Extern&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I configured NAT:&lt;/P&gt;&lt;P&gt;- From zone Free_WiFi to zone Extern&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I configured PBF:&lt;/P&gt;&lt;P&gt;- NO PBF for zone FREE_WIFI&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I configured the virtual routers:&lt;/P&gt;&lt;P&gt;Internal:&lt;/P&gt;&lt;P&gt;Interfaces: Ethernet 1/2&lt;/P&gt;&lt;P&gt;Static route: 0.0.0.0/0 to ISP and 192.168.128.0/24 next hop 192.168.128.1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Extern:&lt;/P&gt;&lt;P&gt;Interaces: Ethernet 1/3&lt;/P&gt;&lt;P&gt;Static route: 0.0.0.0/0 to ISP and 192.168.128.0./24 next-vr is Internal&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The users get an ip address but they don't have internet access.&lt;BR /&gt;The only rule that is getting hit is Allow from zone Free_WiFi to zone Free_WiFi.&lt;/P&gt;&lt;P&gt;The client always do a ping to 192.168.128.1 and that's it.&lt;/P&gt;&lt;P&gt;When they want to access the internet I see the following in the monitoring:&lt;/P&gt;&lt;P&gt;Source 192.168.128.x to Destination 192.168.128.1 Port 80.&lt;/P&gt;</description>
    <pubDate>Fri, 03 Dec 2021 10:47:09 GMT</pubDate>
    <dc:creator>ZEBIT</dc:creator>
    <dc:date>2021-12-03T10:47:09Z</dc:date>
    <item>
      <title>Workstations no internet after receive IP from firewall DHCP Server</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/workstations-no-internet-after-receive-ip-from-firewall-dhcp/m-p/451200#M101130</link>
      <description>&lt;P&gt;Hi,&lt;BR /&gt;&lt;BR /&gt;We have a PaloAlto firewall which is connected to a Cisco switch and on this Cisco swtich an AP is connected.&lt;/P&gt;&lt;P&gt;On the firewall I use ethernet 1/2 port to handle the free wifi clients. This port is in Layer 3 mode.&lt;/P&gt;&lt;P&gt;This port is connected with the Cisco switch. The port on the Cisco switch is configured in access mode and in vlan 5.&lt;/P&gt;&lt;P&gt;On my AP I set the option that the free wifi is connected with vlan 5.&lt;/P&gt;&lt;P&gt;On the firewall my ISP is connected on port 1/3.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;On the firewall I have configured the following:&lt;/P&gt;&lt;P&gt;- Ethernet 1/2 is in mode Layer 3 and has IP address 192.168.128.1/24&lt;/P&gt;&lt;P&gt;- This interface is in virtual router internal and in security zone FREE_WIFI&lt;BR /&gt;- DHCP server configured on Ethernet 1/2 with these options:&lt;/P&gt;&lt;P&gt;IP pool: 192.168.128.2-192.168.128.254&lt;BR /&gt;GW: 192.168.128.1&lt;BR /&gt;DNS: 1.1.1.1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I configured the following security rules:&lt;/P&gt;&lt;P&gt;- Deny from zone Free_WiFi to zone Internal_Network&lt;BR /&gt;- Allow from zone Free_WiFi to zone Free_WiFi&lt;/P&gt;&lt;P&gt;- Allow from zone Free_WiFi to zone Extern&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I configured NAT:&lt;/P&gt;&lt;P&gt;- From zone Free_WiFi to zone Extern&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I configured PBF:&lt;/P&gt;&lt;P&gt;- NO PBF for zone FREE_WIFI&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I configured the virtual routers:&lt;/P&gt;&lt;P&gt;Internal:&lt;/P&gt;&lt;P&gt;Interfaces: Ethernet 1/2&lt;/P&gt;&lt;P&gt;Static route: 0.0.0.0/0 to ISP and 192.168.128.0/24 next hop 192.168.128.1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Extern:&lt;/P&gt;&lt;P&gt;Interaces: Ethernet 1/3&lt;/P&gt;&lt;P&gt;Static route: 0.0.0.0/0 to ISP and 192.168.128.0./24 next-vr is Internal&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The users get an ip address but they don't have internet access.&lt;BR /&gt;The only rule that is getting hit is Allow from zone Free_WiFi to zone Free_WiFi.&lt;/P&gt;&lt;P&gt;The client always do a ping to 192.168.128.1 and that's it.&lt;/P&gt;&lt;P&gt;When they want to access the internet I see the following in the monitoring:&lt;/P&gt;&lt;P&gt;Source 192.168.128.x to Destination 192.168.128.1 Port 80.&lt;/P&gt;</description>
      <pubDate>Fri, 03 Dec 2021 10:47:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/workstations-no-internet-after-receive-ip-from-firewall-dhcp/m-p/451200#M101130</guid>
      <dc:creator>ZEBIT</dc:creator>
      <dc:date>2021-12-03T10:47:09Z</dc:date>
    </item>
    <item>
      <title>Re: Workstations no internet after receive IP from firewall DHCP Server</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/workstations-no-internet-after-receive-ip-from-firewall-dhcp/m-p/451421#M101151</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/1006"&gt;@ZEBIT&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;I configured the virtual routers:&lt;/P&gt;&lt;P&gt;Internal:&lt;/P&gt;&lt;P&gt;Interfaces: Ethernet 1/2&lt;/P&gt;&lt;P&gt;Static route: 0.0.0.0/0 to ISP and 192.168.128.0/24&lt;STRONG&gt; next hop 192.168.128.1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Extern:&lt;/P&gt;&lt;P&gt;Interaces: Ethernet 1/3&lt;/P&gt;&lt;P&gt;Static route: 0.0.0.0/0 to ISP and 192.168.128.0./24 next-vr is Internal&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/1006"&gt;@ZEBIT&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You are using 2 virtual routers, on Extern VR you configured 'next-vr' static route from Extern to Internal- this is fine.&lt;/P&gt;&lt;P&gt;But on Internal VR you configured (marked in bold above) an IP next hop of 192.168.128.1 - this is wrong because you are 'trapping' them in their network segment and not telling the firewall where to send packets. This should be:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;VR = Internal -&amp;gt; Static Route for 0.0.0.0/0 -&amp;gt; 'next-vr' -&amp;gt; 'Extern'&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;192.168.128.0/24 is directly connected - no need for a static route.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Shai&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 05 Dec 2021 08:16:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/workstations-no-internet-after-receive-ip-from-firewall-dhcp/m-p/451421#M101151</guid>
      <dc:creator>ShaiW</dc:creator>
      <dc:date>2021-12-05T08:16:32Z</dc:date>
    </item>
    <item>
      <title>Re: Workstations no internet after receive IP from firewall DHCP Server</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/workstations-no-internet-after-receive-ip-from-firewall-dhcp/m-p/451517#M101166</link>
      <description>&lt;P&gt;Hi Shai,&lt;/P&gt;&lt;P&gt;I have changed this, but the only thing that happens when a user get's an ip address is a ping to the default gateway.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ZEBIT_0-1638785591438.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/37961i169F9DCE9FC012A2/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="ZEBIT_0-1638785591438.png" alt="ZEBIT_0-1638785591438.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 06 Dec 2021 10:13:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/workstations-no-internet-after-receive-ip-from-firewall-dhcp/m-p/451517#M101166</guid>
      <dc:creator>ZEBIT</dc:creator>
      <dc:date>2021-12-06T10:13:19Z</dc:date>
    </item>
    <item>
      <title>Re: Workstations no internet after receive IP from firewall DHCP Server</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/workstations-no-internet-after-receive-ip-from-firewall-dhcp/m-p/451518#M101167</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;All firewalls have 2 default rules - intrazone-default and interzone-default. These are catch all rules at the bottom of the rulebase.&lt;/P&gt;&lt;P&gt;Select one then click 'override' and enable log at session end. Click OK and repeat for the other rule then commit. By default any hit on either rule will not be logged at all.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Try ping &amp;amp; traceroute from a user to 8.8.8.8 to see how the packet flows.&lt;/P&gt;&lt;P&gt;Source-NAT should be happening only when packets egress from ethernet1/3 to the ISP.&lt;/P&gt;&lt;P&gt;If you see more logs now, click the magnifier glass on the left and check the log-details - this will show more info like NAT, ingress &amp;amp; egress interfaces and packet count on the session.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Shai&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 06 Dec 2021 10:41:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/workstations-no-internet-after-receive-ip-from-firewall-dhcp/m-p/451518#M101167</guid>
      <dc:creator>ShaiW</dc:creator>
      <dc:date>2021-12-06T10:41:36Z</dc:date>
    </item>
  </channel>
</rss>

