<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Paloalto NGFW - Policy-Based Forwarding (PBF) - Enforce Symmetric Return in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/paloalto-ngfw-policy-based-forwarding-pbf-enforce-symmetric/m-p/1223765#M123633</link>
    <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/534718697"&gt;@atalakeytamkeen&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;"is there a way to manage these routes without adding them one by one in the virtual server static routes?"&amp;nbsp; You could create summary routes.&amp;nbsp; For example, if Site2 only has the 1 VPN then you could route RFC1918 traffic (10.0.0.0/8, 172.16.0.0/12, 192.168.0.0/16) over the tunnel and all else would go to the Internet.&amp;nbsp; You could also create summaries tailored to your specific routes.&amp;nbsp; ECMP would allow you to load balance the traffic across both circuits if desired.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You could also use a routing protocol.&amp;nbsp; &lt;A href="https://docs.paloaltonetworks.com/network-security/ipsec-vpn/administration/site-to-site-vpn-quick-configs/site-to-site-vpn-with-ospf" target="_blank"&gt;https://docs.paloaltonetworks.com/network-security/ipsec-vpn/administration/site-to-site-vpn-quick-configs/site-to-site-vpn-with-ospf&lt;/A&gt;. With regard to MPLS, configure OSPF on your trust interface.&amp;nbsp; On Site1, you may need to redistribute static into OSPF.&amp;nbsp; In the end, dynamic routing is easier, but it takes a while to get used to it.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;"Or can PBF still be used for routing while ECMP handles the Symmetric Return?"&amp;nbsp; PBF still can be used, but in the end routing is more straightforward and easier to troubleshoot.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Tom&lt;/P&gt;</description>
    <pubDate>Thu, 13 Mar 2025 13:36:54 GMT</pubDate>
    <dc:creator>TomYoung</dc:creator>
    <dc:date>2025-03-13T13:36:54Z</dc:date>
    <item>
      <title>Paloalto NGFW - Policy-Based Forwarding (PBF) - Enforce Symmetric Return</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/paloalto-ngfw-policy-based-forwarding-pbf-enforce-symmetric/m-p/1223715#M123625</link>
      <description>&lt;P data-start="45" data-end="51"&gt;Hello,&lt;/P&gt;
&lt;P data-start="45" data-end="51"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-start="53" data-end="311"&gt;I have two sites: Site 1 and Site 1, both running Palo Alto NGFW. Currently, traffic is routed between the sites via an IPSec VPN tunnel. However, we’ve recently set up MPLS between the sites and are planning to gradually migrate traffic from IPSec to MPLS.&lt;/P&gt;
&lt;P data-start="53" data-end="311"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-start="313" data-end="555"&gt;The challenge we're facing is related to asymmetric routing, where requests coming from MPLS are being returned via IPSec. I am attempting to use PBF (Policy-Based Forwarding) to enforce symmetric return, but it's not functioning as expected.&lt;/P&gt;
&lt;P data-start="313" data-end="555"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-start="557" data-end="616"&gt;The diagram below outlines the high-level network topology:&lt;/P&gt;
&lt;P data-start="557" data-end="616"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Untitled Diagram.drawio.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/66618iB4FFD7F1DC6E7D0B/image-size/large?v=v2&amp;amp;px=999" role="button" title="Untitled Diagram.drawio.png" alt="Untitled Diagram.drawio.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-start="728" data-end="780"&gt;I would greatly appreciate any help with this issue.&lt;/P&gt;
&lt;P data-start="782" data-end="789"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-start="782" data-end="789"&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Thu, 13 Mar 2025 09:01:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/paloalto-ngfw-policy-based-forwarding-pbf-enforce-symmetric/m-p/1223715#M123625</guid>
      <dc:creator>atalakeytamkeen</dc:creator>
      <dc:date>2025-03-13T09:01:28Z</dc:date>
    </item>
    <item>
      <title>Re: Paloalto NGFW - Policy-Based Forwarding (PBF) - Enforce Symmetric Return</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/paloalto-ngfw-policy-based-forwarding-pbf-enforce-symmetric/m-p/1223742#M123627</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/534718697"&gt;@atalakeytamkeen&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I would get rid of PBF and use ECMP.&amp;nbsp; I have had good success with ECMP and symmetric return.&amp;nbsp; &lt;A href="https://docs.paloaltonetworks.com/pan-os/10-2/pan-os-networking-admin/ecmp/configure-ecmp-on-a-virtual-router" target="_blank" rel="noopener"&gt;https://docs.paloaltonetworks.com/pan-os/10-2/pan-os-networking-admin/ecmp/configure-ecmp-on-a-virtual-router&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can use route metrics to select your preferred path with ECMP.&amp;nbsp; Routing is more effective and simple vs. PBF IMHO.&amp;nbsp; Please continue this thread if you need more detail.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Tom&lt;/P&gt;</description>
      <pubDate>Thu, 13 Mar 2025 11:09:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/paloalto-ngfw-policy-based-forwarding-pbf-enforce-symmetric/m-p/1223742#M123627</guid>
      <dc:creator>TomYoung</dc:creator>
      <dc:date>2025-03-13T11:09:02Z</dc:date>
    </item>
    <item>
      <title>Re: Paloalto NGFW - Policy-Based Forwarding (PBF) - Enforce Symmetric Return</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/paloalto-ngfw-policy-based-forwarding-pbf-enforce-symmetric/m-p/1223762#M123631</link>
      <description>&lt;P data-start="124" data-end="210"&gt;Thanks for your help! The ECMP Symmetric Return worked perfectly and got the job done.&lt;/P&gt;
&lt;P data-start="124" data-end="210"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-start="212" data-end="669"&gt;I have another question I hope you can assist with. Site 2 is accessing numerous resources on Site 1, and to avoid adding too many static routes on the virtual router, I’m currently using PBF to group all destination addresses into a single rule. Now that we’re using ECMP, is there a way to manage these routes without adding them one by one in the virtual server static routes? Or can PBF still be used for routing while ECMP handles the Symmetric Return?&lt;/P&gt;
&lt;P data-start="212" data-end="669"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-start="671" data-end="689"&gt;Thanks in advance!&lt;/P&gt;</description>
      <pubDate>Thu, 13 Mar 2025 13:00:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/paloalto-ngfw-policy-based-forwarding-pbf-enforce-symmetric/m-p/1223762#M123631</guid>
      <dc:creator>atalakeytamkeen</dc:creator>
      <dc:date>2025-03-13T13:00:15Z</dc:date>
    </item>
    <item>
      <title>Re: Paloalto NGFW - Policy-Based Forwarding (PBF) - Enforce Symmetric Return</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/paloalto-ngfw-policy-based-forwarding-pbf-enforce-symmetric/m-p/1223765#M123633</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/534718697"&gt;@atalakeytamkeen&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;"is there a way to manage these routes without adding them one by one in the virtual server static routes?"&amp;nbsp; You could create summary routes.&amp;nbsp; For example, if Site2 only has the 1 VPN then you could route RFC1918 traffic (10.0.0.0/8, 172.16.0.0/12, 192.168.0.0/16) over the tunnel and all else would go to the Internet.&amp;nbsp; You could also create summaries tailored to your specific routes.&amp;nbsp; ECMP would allow you to load balance the traffic across both circuits if desired.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You could also use a routing protocol.&amp;nbsp; &lt;A href="https://docs.paloaltonetworks.com/network-security/ipsec-vpn/administration/site-to-site-vpn-quick-configs/site-to-site-vpn-with-ospf" target="_blank"&gt;https://docs.paloaltonetworks.com/network-security/ipsec-vpn/administration/site-to-site-vpn-quick-configs/site-to-site-vpn-with-ospf&lt;/A&gt;. With regard to MPLS, configure OSPF on your trust interface.&amp;nbsp; On Site1, you may need to redistribute static into OSPF.&amp;nbsp; In the end, dynamic routing is easier, but it takes a while to get used to it.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;"Or can PBF still be used for routing while ECMP handles the Symmetric Return?"&amp;nbsp; PBF still can be used, but in the end routing is more straightforward and easier to troubleshoot.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Tom&lt;/P&gt;</description>
      <pubDate>Thu, 13 Mar 2025 13:36:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/paloalto-ngfw-policy-based-forwarding-pbf-enforce-symmetric/m-p/1223765#M123633</guid>
      <dc:creator>TomYoung</dc:creator>
      <dc:date>2025-03-13T13:36:54Z</dc:date>
    </item>
  </channel>
</rss>

