<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Two WAN Ports on one Switch. Split of physical VPN and Internet port. in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/two-wan-ports-on-one-switch-split-of-physical-vpn-and-internet/m-p/590324#M117595</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;I hope theres someone here who´s more capeable than me for my problem &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;BR /&gt;I searched the forum and the documentations for quite a while but&amp;nbsp; i cant figure it out.&lt;BR /&gt;&lt;BR /&gt;Current Situation:&lt;/P&gt;
&lt;P&gt;All incoming traffic gets sourced through port eth1/7 with the zone 'Untrust' and all other IPs ( XXX/29) provided from our ISP are handled via loopbacks also situated in 'Untrust'.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Final Setup:&lt;BR /&gt;We try to split now GlobalProtect and Ike gateways on a different physical cable eth1/2 zone: 'VPN-Gate'. Both ports are on the same switch in the same VLAN called 'WAN' as the ISPs connection is as well.&lt;BR /&gt;&lt;BR /&gt;The second we activated the physical cable connection eth1/2 some of our incoming webtraffic was sorted into the new zone ' VPN-Gate' instead in the usual 'Untrust' zone.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Configwise theres just the IP of the physical interface and the GlobalProtect-Gateway IP as loopback in the Zone 'VPN-Gate'. All other IPs are bound to 'Untrust'.&lt;BR /&gt;&lt;BR /&gt;Why does the palo decide that some of the traffic ment for an IP, not bound to the 'VPN-Gate' Zone needs to be sorted into 'VPN-Gate'.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 25 Jun 2024 12:14:42 GMT</pubDate>
    <dc:creator>AndreGoebel</dc:creator>
    <dc:date>2024-06-25T12:14:42Z</dc:date>
    <item>
      <title>Two WAN Ports on one Switch. Split of physical VPN and Internet port.</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/two-wan-ports-on-one-switch-split-of-physical-vpn-and-internet/m-p/590324#M117595</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;I hope theres someone here who´s more capeable than me for my problem &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;BR /&gt;I searched the forum and the documentations for quite a while but&amp;nbsp; i cant figure it out.&lt;BR /&gt;&lt;BR /&gt;Current Situation:&lt;/P&gt;
&lt;P&gt;All incoming traffic gets sourced through port eth1/7 with the zone 'Untrust' and all other IPs ( XXX/29) provided from our ISP are handled via loopbacks also situated in 'Untrust'.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Final Setup:&lt;BR /&gt;We try to split now GlobalProtect and Ike gateways on a different physical cable eth1/2 zone: 'VPN-Gate'. Both ports are on the same switch in the same VLAN called 'WAN' as the ISPs connection is as well.&lt;BR /&gt;&lt;BR /&gt;The second we activated the physical cable connection eth1/2 some of our incoming webtraffic was sorted into the new zone ' VPN-Gate' instead in the usual 'Untrust' zone.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Configwise theres just the IP of the physical interface and the GlobalProtect-Gateway IP as loopback in the Zone 'VPN-Gate'. All other IPs are bound to 'Untrust'.&lt;BR /&gt;&lt;BR /&gt;Why does the palo decide that some of the traffic ment for an IP, not bound to the 'VPN-Gate' Zone needs to be sorted into 'VPN-Gate'.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 25 Jun 2024 12:14:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/two-wan-ports-on-one-switch-split-of-physical-vpn-and-internet/m-p/590324#M117595</guid>
      <dc:creator>AndreGoebel</dc:creator>
      <dc:date>2024-06-25T12:14:42Z</dc:date>
    </item>
    <item>
      <title>Re: Two WAN Ports on one Switch. Split of physical VPN and Internet port.</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/two-wan-ports-on-one-switch-split-of-physical-vpn-and-internet/m-p/590359#M117607</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/330128"&gt;@AndreGoebel&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;The switch is sending some of the traffic to the interface that you aren't expecting. You may need to setup actual routes on your switch to ensure that traffic you expect on ethernet1/7 doesn't present itself on ethernet1/2.&lt;/P&gt;</description>
      <pubDate>Tue, 25 Jun 2024 20:22:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/two-wan-ports-on-one-switch-split-of-physical-vpn-and-internet/m-p/590359#M117607</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2024-06-25T20:22:51Z</dc:date>
    </item>
    <item>
      <title>Re: Two WAN Ports on one Switch. Split of physical VPN and Internet port.</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/two-wan-ports-on-one-switch-split-of-physical-vpn-and-internet/m-p/590414#M117612</link>
      <description>&lt;P&gt;Thank you for your input. &lt;BR /&gt;I did not consider our switch as point of failure. As the switch we are using right now, is a layer 2 switch, routing wont be an option at this moment.&lt;BR /&gt;So i might be stuck with the one cable solution for now.&lt;/P&gt;</description>
      <pubDate>Wed, 26 Jun 2024 06:09:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/two-wan-ports-on-one-switch-split-of-physical-vpn-and-internet/m-p/590414#M117612</guid>
      <dc:creator>AndreGoebel</dc:creator>
      <dc:date>2024-06-26T06:09:21Z</dc:date>
    </item>
  </channel>
</rss>

