<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: PBF for incoming traffic in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/pbf-for-incoming-traffic/m-p/553515#M112541</link>
    <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/203588"&gt;@MicheleCane&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you enabled ECMP with Symmetric Return traffic coming in a WAN interface will go out the same interface.&amp;nbsp; If you want all traffic to continue to go out WAN-2, then you could use a Method of Weighted Round Robin with WAN-2 configured for 100 and WAN-1 and WAN-3 configured for 0.&amp;nbsp; You will need to add default routes for WAN-1 and WAN-3, but the WRR &lt;EM&gt;should&lt;/EM&gt; force all outbound traffic out WAN-2.&amp;nbsp; I have NOT tested this in a lab.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Tom&lt;/P&gt;</description>
    <pubDate>Fri, 11 Aug 2023 19:26:53 GMT</pubDate>
    <dc:creator>TomYoung</dc:creator>
    <dc:date>2023-08-11T19:26:53Z</dc:date>
    <item>
      <title>PBF for incoming traffic</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pbf-for-incoming-traffic/m-p/553502#M112536</link>
      <description>&lt;P&gt;Hello everyone,&lt;/P&gt;
&lt;P&gt;I've a setup on a PA-820 cluster with 3 ISP connections.&lt;/P&gt;
&lt;P&gt;Every connection has its own zone (for clarity WAN-1, WAN-2 and WAN-3) and the default route in the virtual router is for WAN-2.&lt;/P&gt;
&lt;P&gt;I need to publish some services from my DMZ subnet on the WAN-1 but if I try to configure the nat and security policy i can't see any sort of traffic coming from Internet because of asymmetric routing.&lt;/P&gt;
&lt;P&gt;The packet is entering from the interface on WAN-1 zone but the response packet is going through the default route to WAN-2.&lt;/P&gt;
&lt;P&gt;I try to configure a PBF policy (following this article &lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClF5CAK" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClF5CAK)&amp;nbsp;&lt;/A&gt;for the WAN-1 interface with forward to egress interface of DMZ and force return to WAN-1 isp router but is not working at all.&lt;/P&gt;
&lt;P&gt;In the traffic monitor I can't see nothing and if I make a packet capture on the interface I see a lot of tcp retransmissions.&lt;/P&gt;
&lt;P&gt;Any idea to solve the problem and to configure the pbf correctly?&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Michele&lt;/P&gt;</description>
      <pubDate>Fri, 11 Aug 2023 15:07:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pbf-for-incoming-traffic/m-p/553502#M112536</guid>
      <dc:creator>MicheleCane</dc:creator>
      <dc:date>2023-08-11T15:07:33Z</dc:date>
    </item>
    <item>
      <title>Re: PBF for incoming traffic</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pbf-for-incoming-traffic/m-p/553515#M112541</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/203588"&gt;@MicheleCane&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you enabled ECMP with Symmetric Return traffic coming in a WAN interface will go out the same interface.&amp;nbsp; If you want all traffic to continue to go out WAN-2, then you could use a Method of Weighted Round Robin with WAN-2 configured for 100 and WAN-1 and WAN-3 configured for 0.&amp;nbsp; You will need to add default routes for WAN-1 and WAN-3, but the WRR &lt;EM&gt;should&lt;/EM&gt; force all outbound traffic out WAN-2.&amp;nbsp; I have NOT tested this in a lab.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Tom&lt;/P&gt;</description>
      <pubDate>Fri, 11 Aug 2023 19:26:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pbf-for-incoming-traffic/m-p/553515#M112541</guid>
      <dc:creator>TomYoung</dc:creator>
      <dc:date>2023-08-11T19:26:53Z</dc:date>
    </item>
    <item>
      <title>Re: PBF for incoming traffic</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pbf-for-incoming-traffic/m-p/553534#M112548</link>
      <description>&lt;P&gt;Hi Michele,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Did you find the solution to you're issue?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;</description>
      <pubDate>Sat, 12 Aug 2023 11:56:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pbf-for-incoming-traffic/m-p/553534#M112548</guid>
      <dc:creator>Basavaraj_Ningappa</dc:creator>
      <dc:date>2023-08-12T11:56:57Z</dc:date>
    </item>
    <item>
      <title>Re: PBF for incoming traffic</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pbf-for-incoming-traffic/m-p/553593#M112556</link>
      <description>&lt;P&gt;Not yet, I try to find a solution using pbf because it's a production environment and I'm a little scary of making changes in the virtual router&lt;/P&gt;</description>
      <pubDate>Sun, 13 Aug 2023 13:42:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pbf-for-incoming-traffic/m-p/553593#M112556</guid>
      <dc:creator>MicheleCane</dc:creator>
      <dc:date>2023-08-13T13:42:49Z</dc:date>
    </item>
    <item>
      <title>Re: PBF for incoming traffic</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pbf-for-incoming-traffic/m-p/553598#M112557</link>
      <description>&lt;P&gt;Hi Michele,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;what I was thinking is configuring the nat with bidirectional, so whatever the service your publishing using wan 1 or 2 for those NATs you can enable bidirectional, so that they follow same session on which interface traffic is arriving&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;just a thought.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 13 Aug 2023 17:24:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pbf-for-incoming-traffic/m-p/553598#M112557</guid>
      <dc:creator>Basavaraj_Ningappa</dc:creator>
      <dc:date>2023-08-13T17:24:27Z</dc:date>
    </item>
    <item>
      <title>Re: PBF for incoming traffic</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pbf-for-incoming-traffic/m-p/553691#M112563</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/203588"&gt;@MicheleCane&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For those services on DMZ that you want to publish on WAN-1, do you want all traffic from those DMZ servers to egress WAN-1?&amp;nbsp; If so, create a simple PBF rule that forwards all traffic from that source IP to the WAN-1 next hop.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Tom&lt;/P&gt;</description>
      <pubDate>Mon, 14 Aug 2023 20:44:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pbf-for-incoming-traffic/m-p/553691#M112563</guid>
      <dc:creator>TomYoung</dc:creator>
      <dc:date>2023-08-14T20:44:39Z</dc:date>
    </item>
    <item>
      <title>Re: PBF for incoming traffic</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pbf-for-incoming-traffic/m-p/553929#M112597</link>
      <description>&lt;P&gt;Hi everyone,&lt;/P&gt;
&lt;P&gt;finally I found the resolution to my problem.&lt;/P&gt;
&lt;P&gt;I find out that on my zones WAN-1,WAN-2,WAN-3 there was a zone protection policy and the option "IP Spoofed Address" was enabled.&lt;/P&gt;
&lt;P&gt;I create a new zone protection specific for the WAN-1 zone disabling the mentioned option and suddenly everything starts working as expected.&lt;/P&gt;
&lt;P&gt;I already have a PBF for outgoing traffic from the DMZ to the WAN-1 for returning traffic as suggested by Tom.&lt;/P&gt;
&lt;P&gt;Thanks to everyone&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Michele&lt;/P&gt;</description>
      <pubDate>Wed, 16 Aug 2023 08:26:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pbf-for-incoming-traffic/m-p/553929#M112597</guid>
      <dc:creator>MicheleCane</dc:creator>
      <dc:date>2023-08-16T08:26:50Z</dc:date>
    </item>
  </channel>
</rss>

