<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Multiple External Interfaces in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/multiple-external-interfaces/m-p/17064#M12455</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a pan 4020 that will be replacing multiple firewalls.&amp;nbsp; The internet side of the firewall has a /25 network.&amp;nbsp; I have a corporate network that has an external interface of x.x.x.2/25 in the Internet zone and a guest wireless network that has an external address of x.x.x.3/25 in the Internet zone. The corporate network has an internal interface on the LAN zone. The guest wireless network has a internal interface in the guestwireless zone.&amp;nbsp; The firewall will act as the default router for hosts on the guest wireless network. My question is should I configure two virtual routers? By having two external interfaces on the same network with separate virtual routers cause overlap issues? I don't want the guest wireless network to have the ability to route other networks like the my DMZ.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Bane&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 16 Feb 2010 14:04:47 GMT</pubDate>
    <dc:creator>bbraunschweig</dc:creator>
    <dc:date>2010-02-16T14:04:47Z</dc:date>
    <item>
      <title>Multiple External Interfaces</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/multiple-external-interfaces/m-p/17064#M12455</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a pan 4020 that will be replacing multiple firewalls.&amp;nbsp; The internet side of the firewall has a /25 network.&amp;nbsp; I have a corporate network that has an external interface of x.x.x.2/25 in the Internet zone and a guest wireless network that has an external address of x.x.x.3/25 in the Internet zone. The corporate network has an internal interface on the LAN zone. The guest wireless network has a internal interface in the guestwireless zone.&amp;nbsp; The firewall will act as the default router for hosts on the guest wireless network. My question is should I configure two virtual routers? By having two external interfaces on the same network with separate virtual routers cause overlap issues? I don't want the guest wireless network to have the ability to route other networks like the my DMZ.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Bane&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Feb 2010 14:04:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/multiple-external-interfaces/m-p/17064#M12455</guid>
      <dc:creator>bbraunschweig</dc:creator>
      <dc:date>2010-02-16T14:04:47Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple External Interfaces</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/multiple-external-interfaces/m-p/17065#M12456</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You could create two virtual routers, as you indicated. They would not communicate with each other and they could be in the same subnet if necessary- as long as you do not configure the same IP address on each router.&amp;nbsp; Another option would be to point both the corporate and wireless users to the same gateway and use your security policies to control the traffic between zones.&amp;nbsp;&amp;nbsp; You may want to open a case with Support and send a diagram of your network so that they can help with your configuration.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 17 Feb 2010 00:28:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/multiple-external-interfaces/m-p/17065#M12456</guid>
      <dc:creator>nrice</dc:creator>
      <dc:date>2010-02-17T00:28:24Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple External Interfaces</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/multiple-external-interfaces/m-p/17066#M12457</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So the configuration that works best for me was to have both networks egress the same interface and use security zones and policy to control the traffic. One thing I did learn is that if you have a Cisco router on the same external segment then turn off proxy arp if you want to have two external interfaces.&amp;nbsp; This prevents the router from putting incorrect arp entries in the arp table. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Bane&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 17 Feb 2010 16:28:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/multiple-external-interfaces/m-p/17066#M12457</guid>
      <dc:creator>bbraunschweig</dc:creator>
      <dc:date>2010-02-17T16:28:17Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple External Interfaces</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/multiple-external-interfaces/m-p/17067#M12458</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I think the simplest way and what we did was created a seperate network on another interface and used the same internet gateway for guest access. And only allowed the guest network to have controlled internet access and no access to anything else through Security Policies etc.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 21 Sep 2011 14:47:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/multiple-external-interfaces/m-p/17067#M12458</guid>
      <dc:creator>defjam</dc:creator>
      <dc:date>2011-09-21T14:47:43Z</dc:date>
    </item>
  </channel>
</rss>

