<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Routing between Virutal Systems with a VWIRE in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/routing-between-virutal-systems-with-a-vwire/m-p/16581#M12092</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We currently have our Main PA configured in a VWIRE deployment with a TRUST and UNTRUST Zone.&amp;nbsp; We have many different VLANs on our network and the default route for all internet bound traffic passes through the VWIRE.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We want to configure multiple VSYS on the PA for our different divisions. Example VSYS1 - Enterprise, VSYS2 - Retail, VSYS3 - Public, etc. with a Shared Gateway.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is it possible to configure the PA so that the VWIRE stays in place and as traffic passes through direct that traffic to the other VSYS based on VLAN id in order to apply security policies and then that VSYS would send the traffic to the Shared Gateway out to the internet?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In other words if Packet A has VLAN 10 stay with VSYS1 and apply security policy if Packet B has VLAN 20 send to VSYS2 and apply VSYS2 security policy then send Packet A and Packet B to the shared gateway.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 27 Jan 2012 14:58:06 GMT</pubDate>
    <dc:creator>oneidanation</dc:creator>
    <dc:date>2012-01-27T14:58:06Z</dc:date>
    <item>
      <title>Routing between Virutal Systems with a VWIRE</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/routing-between-virutal-systems-with-a-vwire/m-p/16581#M12092</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We currently have our Main PA configured in a VWIRE deployment with a TRUST and UNTRUST Zone.&amp;nbsp; We have many different VLANs on our network and the default route for all internet bound traffic passes through the VWIRE.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We want to configure multiple VSYS on the PA for our different divisions. Example VSYS1 - Enterprise, VSYS2 - Retail, VSYS3 - Public, etc. with a Shared Gateway.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is it possible to configure the PA so that the VWIRE stays in place and as traffic passes through direct that traffic to the other VSYS based on VLAN id in order to apply security policies and then that VSYS would send the traffic to the Shared Gateway out to the internet?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In other words if Packet A has VLAN 10 stay with VSYS1 and apply security policy if Packet B has VLAN 20 send to VSYS2 and apply VSYS2 security policy then send Packet A and Packet B to the shared gateway.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 Jan 2012 14:58:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/routing-between-virutal-systems-with-a-vwire/m-p/16581#M12092</guid>
      <dc:creator>oneidanation</dc:creator>
      <dc:date>2012-01-27T14:58:06Z</dc:date>
    </item>
    <item>
      <title>Re: Routing between Virutal Systems with a VWIRE</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/routing-between-virutal-systems-with-a-vwire/m-p/16582#M12093</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Would we need to go away from VWIRE and go to a LAYER 3 type deployment using sub-interfaces and VLAN tagging?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also note that each VLAN is on its own unique IP-Subnet.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 Jan 2012 16:24:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/routing-between-virutal-systems-with-a-vwire/m-p/16582#M12093</guid>
      <dc:creator>oneidanation</dc:creator>
      <dc:date>2012-01-27T16:24:02Z</dc:date>
    </item>
    <item>
      <title>Re: Routing between Virutal Systems with a VWIRE</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/routing-between-virutal-systems-with-a-vwire/m-p/16583#M12094</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You could setup it this way if you still want to keep the VWIRE (just an example):&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;VSYS1: int0, int1&lt;BR /&gt;VSYS2: int2, int3&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and then in the switch before and after your PAN split up which VLAN will be sent through which VSYS like so:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;internal-switch (VLAN10) gi0/1 -&amp;gt; PAN int0&lt;BR /&gt;internal-switch (VLAN20) gi0/2 -&amp;gt; PAN int2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;external-switch (VLAN10) gi0/1 -&amp;gt; PAN int1&lt;BR /&gt;external-switch (VLAN20) gi0/2 -&amp;gt; PAN int3&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But I would recommend you switch to a layer3 type deployment. Using VWIRE (in my opinion) is more of a IDP/IPS scenario rather than having the PAN taking more decisions regarding what the nexthop should be and stuff like that.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can still use VSYS with layer3 deployment, actually it will in some way better utilize the interfaces available (comparing to just use a single interface for all traffic connected to the uplink) and it will also minimize rules needed in each VSYS if you for example split up so one VSYS will be for webbrowsing while the other VSYS will be used for handling your regular production based traffic like email, DMZ etc.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 Jan 2012 21:57:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/routing-between-virutal-systems-with-a-vwire/m-p/16583#M12094</guid>
      <dc:creator>mikand</dc:creator>
      <dc:date>2012-01-27T21:57:55Z</dc:date>
    </item>
  </channel>
</rss>

