<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: PA 440 MGMT Interface and Regular Interface in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/pa-440-mgmt-interface-and-regular-interface/m-p/572977#M115258</link>
    <description>&lt;P&gt;Hi there,&lt;/P&gt;
&lt;P&gt;Your management interface would typically be connected via an edge (access) port on your switch. Assuming your switch is Layer3 capable then you would assign an SVI to this management VLAN. I will assume on your VLAN one must be an 'inside/ trust' type. So on your switch you would configure another SVI, this would allow traffic in the trusted zone to be routed towards your management interface.&lt;/P&gt;
&lt;P&gt;The other VLAN, lets guess are something like DMZ and wireless. Both of these will be switched on your switch but not routed. The firewall will be configured with routed sub-interfaces, this way the firewall will be the gateway for those subnets and will be able to control all inter-vlan flows.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I would not worry about additional Virtual Routers at this early stage.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Your security zones will probably have a 1:1 mapping to your VLANs: inside, DMZ, wifi and WAN. The Security policy which you define will secure inter-zone flows, ie traffic moving from one VLAN (zone) to another. Lets say for example wifi can initiate communication with WAN and DMZ but not trust. DMZ can only initiate communication with WAN, but all the other zones can talk to it...etc,&lt;BR /&gt;&lt;BR /&gt;Regarding NAT, I would imagine you would only need to configure translation on your WAN interface with source NAT for all outbound flows. You would also configure static NAT for selected ports towards your DMZ hosts.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hope that helps.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;cheers,&lt;/P&gt;
&lt;P&gt;Seb.&lt;/P&gt;</description>
    <pubDate>Sat, 13 Jan 2024 23:13:00 GMT</pubDate>
    <dc:creator>seb_rupik</dc:creator>
    <dc:date>2024-01-13T23:13:00Z</dc:date>
    <item>
      <title>PA 440 MGMT Interface and Regular Interface</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-440-mgmt-interface-and-regular-interface/m-p/572976#M115257</link>
      <description>&lt;P&gt;Good afternoon all,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am very new to this field and I wanted to acquire some knowledge or perhaps a better explaination.&amp;nbsp; Looking at all of these videos online I think some basic fundamentals are missing in terms of real world scenarios; and not so much made up topologies.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;SO, I am looking at my home network as a real world example.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The PA-440 was gifted to me and I want to see if the following is possible:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;1.&amp;nbsp; MGT Interface &amp;gt; If I choose to have this interface on its own subnet (/27) 192.168.90.1/27 in my switch (layer 3) i would imagine I would need to have a ip route to know this interface is alive and i'm able to manage my firewall.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;2. Gig ports 1/1 and 1/2 on the PA440&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Gig 1/1 &amp;gt;&amp;gt; this will be my internet port as in directly from my router which has been placed in bridge mode and I have set the G 1/1 Interface to DHCP (under IPv4)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Gig 1/2 &amp;gt;&amp;gt; this will have a little more work; as I have been reading I can create sub interface such as&lt;/P&gt;
&lt;P&gt;Gig 1/2.1 &amp;gt;&amp;gt; I'm assigning 192.168.50.1/27 - &amp;gt;tagged 50&lt;/P&gt;
&lt;P&gt;Gig 1/2.2 &amp;gt;&amp;gt; I'm assigning 192.168.60.1/27 - tagged 60&lt;/P&gt;
&lt;P&gt;Gig 1/2.3 &amp;gt;&amp;gt; I'm assigning 192.168.70.1/27 - tagged 70&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;DHCP is configured to distrubute each /27 and the subinterfaces are selected.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Keep in mind 1/2 will be terminated to a trunk on my switch with 3 VLANS, 50,60,70&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I'm having a hard time understanding how the Management interface will operate from my switch&lt;/P&gt;
&lt;P&gt;I'm having a hard configuring the Virtual Router&lt;/P&gt;
&lt;P&gt;I''m having a hard time understanding how the security / NAT will work.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Any insight would be great; I know its a lot to ask.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 13 Jan 2024 21:24:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-440-mgmt-interface-and-regular-interface/m-p/572976#M115257</guid>
      <dc:creator>networkingnoobie</dc:creator>
      <dc:date>2024-01-13T21:24:45Z</dc:date>
    </item>
    <item>
      <title>Re: PA 440 MGMT Interface and Regular Interface</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-440-mgmt-interface-and-regular-interface/m-p/572977#M115258</link>
      <description>&lt;P&gt;Hi there,&lt;/P&gt;
&lt;P&gt;Your management interface would typically be connected via an edge (access) port on your switch. Assuming your switch is Layer3 capable then you would assign an SVI to this management VLAN. I will assume on your VLAN one must be an 'inside/ trust' type. So on your switch you would configure another SVI, this would allow traffic in the trusted zone to be routed towards your management interface.&lt;/P&gt;
&lt;P&gt;The other VLAN, lets guess are something like DMZ and wireless. Both of these will be switched on your switch but not routed. The firewall will be configured with routed sub-interfaces, this way the firewall will be the gateway for those subnets and will be able to control all inter-vlan flows.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I would not worry about additional Virtual Routers at this early stage.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Your security zones will probably have a 1:1 mapping to your VLANs: inside, DMZ, wifi and WAN. The Security policy which you define will secure inter-zone flows, ie traffic moving from one VLAN (zone) to another. Lets say for example wifi can initiate communication with WAN and DMZ but not trust. DMZ can only initiate communication with WAN, but all the other zones can talk to it...etc,&lt;BR /&gt;&lt;BR /&gt;Regarding NAT, I would imagine you would only need to configure translation on your WAN interface with source NAT for all outbound flows. You would also configure static NAT for selected ports towards your DMZ hosts.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hope that helps.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;cheers,&lt;/P&gt;
&lt;P&gt;Seb.&lt;/P&gt;</description>
      <pubDate>Sat, 13 Jan 2024 23:13:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-440-mgmt-interface-and-regular-interface/m-p/572977#M115258</guid>
      <dc:creator>seb_rupik</dc:creator>
      <dc:date>2024-01-13T23:13:00Z</dc:date>
    </item>
    <item>
      <title>Re: PA 440 MGMT Interface and Regular Interface</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-440-mgmt-interface-and-regular-interface/m-p/573437#M115305</link>
      <description>&lt;P&gt;Thank you very much for the response.&amp;nbsp; I did get this working however made some such as non static routing vs dynamic.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 18 Jan 2024 06:07:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-440-mgmt-interface-and-regular-interface/m-p/573437#M115305</guid>
      <dc:creator>networkingnoobie</dc:creator>
      <dc:date>2024-01-18T06:07:14Z</dc:date>
    </item>
  </channel>
</rss>

