<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Same traffic traverses the firewall twice. in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/same-traffic-traverses-the-firewall-twice/m-p/3507#M2593</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That is correct. We currently see two sessions. But our question is why did we not see two sessons before setting up the third zone?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 19 Aug 2013 11:22:56 GMT</pubDate>
    <dc:creator>rbit0965</dc:creator>
    <dc:date>2013-08-19T11:22:56Z</dc:date>
    <item>
      <title>Same traffic traverses the firewall twice.</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/same-traffic-traverses-the-firewall-twice/m-p/3502#M2588</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I will try to draw this out the best I can and then ask my question.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Remote Site (zone is trust, vrouter2, tunnel.1) &amp;lt;&amp;lt;&amp;gt;&amp;gt; Core network (zone is trust, Interface 1/10, vrouter2, layer3) &lt;/P&gt;&lt;P&gt;Rule for this is any, any in both directions.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The above is how all remote traffic flows. (all traffic hits the core)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Core Network &amp;lt;&amp;lt;&amp;gt;&amp;gt; interface 1/9 (zone is trust, Vrouter1) &amp;lt;&amp;lt;&amp;gt;&amp;gt; Out to the web (zone is untrust, Vrouter1)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What should happen:&lt;/P&gt;&lt;P&gt;Remote user surfs the web, Traffic comes down the ipsec tunnel&lt;/P&gt;&lt;P&gt;assigned a session ID by PA and logged.&lt;/P&gt;&lt;P&gt;And is passed on to the core.&lt;/P&gt;&lt;P&gt;and then passed back up to the firewall on interface1/9 where it would match a rule, gets logged, and be passed out to the web.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is whats happening:&lt;/P&gt;&lt;P&gt;Remote user surfs the web, Traffic comes down the ipsec tunnel&lt;/P&gt;&lt;P&gt;assigned a session ID by PA and logged.&lt;/P&gt;&lt;P&gt;And is passed on to the core.&lt;/P&gt;&lt;P&gt;and then passed back up to the firewall on interface1/9 ....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Nothing Happens. We cannot see a log or a deny at all.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;remote users cannot ping the 1/9 interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My Originall suspicion is that the traffic is already assigned a session ID so PA drops the traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To fix this I would think I need to change my tunnel and tunnel to core(1/10) connection to be their own zone.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any ideas?&lt;/P&gt;&lt;P&gt;I can provided more details if needed.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 15 Aug 2013 21:44:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/same-traffic-traverses-the-firewall-twice/m-p/3502#M2588</guid>
      <dc:creator>rbit0965</dc:creator>
      <dc:date>2013-08-15T21:44:32Z</dc:date>
    </item>
    <item>
      <title>Re: Same traffic traverses the firewall twice.</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/same-traffic-traverses-the-firewall-twice/m-p/3503#M2589</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;IMG alt="multi-vr.JPG" class="jive-image-thumbnail jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/7732_multi-vr.JPG" width="450" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you verify if the routers on the core network ( r1, r2..rn ) have a route back to the remote network? You can either configure static routes for the remote network, such that they reach back to the IP address of eth1/10 interface. Else the easier way is to enable a dynamic routing protocol like OSPF, on the interfaces tunnel.1, eth1/10, and eth1/9 and on all the interfaces of the transit routers, so that they can dynamically learn a route back to the remote network. It appears that this is a routing issue and the transit routers do not have a route back to the remote network&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;BR,&lt;/P&gt;&lt;P&gt;Karthik&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 15 Aug 2013 22:07:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/same-traffic-traverses-the-firewall-twice/m-p/3503#M2589</guid>
      <dc:creator>kprakash</dc:creator>
      <dc:date>2013-08-15T22:07:47Z</dc:date>
    </item>
    <item>
      <title>Re: Same traffic traverses the firewall twice.</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/same-traffic-traverses-the-firewall-twice/m-p/3504#M2590</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am able to ping and traceroute from 1/9 interface (via cli) to the remote site.&lt;/P&gt;&lt;P&gt;So i would assume all the routes are correct.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Aug 2013 00:17:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/same-traffic-traverses-the-firewall-twice/m-p/3504#M2590</guid>
      <dc:creator>rbit0965</dc:creator>
      <dc:date>2013-08-16T00:17:40Z</dc:date>
    </item>
    <item>
      <title>Re: Same traffic traverses the firewall twice.</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/same-traffic-traverses-the-firewall-twice/m-p/3505#M2591</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Update:&lt;/P&gt;&lt;P&gt;First I changed my VPN Tunnels to a newly created zone (IPSEC_Trust) and&amp;nbsp; did the same thing for the 1/10 interface.&lt;/P&gt;&lt;P&gt;Updated my any any rule to allow from and to IPSEC_Trust and also update my IPsec tunnels to the same Zone.&lt;/P&gt;&lt;P&gt;This created mixed results. Some traffic was fitting the any any rule and other traffic wasnt.&lt;/P&gt;&lt;P&gt;I did have both zones (ipsec_trust and trust) in the source and destination... would that fail?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I then changed 1/10 interface back to trust.&lt;/P&gt;&lt;P&gt;Updated my any any rule to allow from and to IPSEC_Trust and trust&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;All untrust traffic from the remote site now works, and shows up as two sessions on the firewall.&lt;/P&gt;&lt;P&gt;IPSec_Trust &amp;gt;&amp;gt; Trust&lt;/P&gt;&lt;P&gt;Trust &amp;gt;&amp;gt; Untrust&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is this the only solution for this?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Aug 2013 01:14:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/same-traffic-traverses-the-firewall-twice/m-p/3505#M2591</guid>
      <dc:creator>rbit0965</dc:creator>
      <dc:date>2013-08-16T01:14:33Z</dc:date>
    </item>
    <item>
      <title>Re: Same traffic traverses the firewall twice.</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/same-traffic-traverses-the-firewall-twice/m-p/3506#M2592</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;As long as we are passing traffic through the correct zones, have the correct polices, we shouldnt have any issues with the traffic. Your new configuration looks valid. We will still see 2 sessions on the firewall, because there are 3 zones being involved here.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Traffic ingressing into the IPSEC_Trust zone (tunnel.1), and egressing out via the Trust zone ( eth1/10) will have one session associated with it&lt;/P&gt;&lt;P&gt;Traffic ingressing into the trust zone ( eth1/9 ) and egressing out via the untrust zone (eth&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Or you could configure a policy base forwarding rule with the below settings:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;source zone IPSEC_Trust&lt;/P&gt;&lt;P&gt;source address: remote network&lt;/P&gt;&lt;P&gt;destination address: 0.0.0.0/0 &lt;/P&gt;&lt;P&gt;Forwarding:&lt;/P&gt;&lt;P&gt;action:Forward&lt;/P&gt;&lt;P&gt;Egress interface: untrust interface&lt;/P&gt;&lt;P&gt;Next hop: Firewalls gateway&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And have a security policy from IPSEC_Trust to Untrust&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Be sure to have a static route route on the VR1 to have a route to the remote-network, pointing to VR2 ( ie remote-networks: nexthop VR2 )&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;BR,&lt;/P&gt;&lt;P&gt;Karthik RP&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Aug 2013 17:53:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/same-traffic-traverses-the-firewall-twice/m-p/3506#M2592</guid>
      <dc:creator>kprakash</dc:creator>
      <dc:date>2013-08-16T17:53:50Z</dc:date>
    </item>
    <item>
      <title>Re: Same traffic traverses the firewall twice.</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/same-traffic-traverses-the-firewall-twice/m-p/3507#M2593</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That is correct. We currently see two sessions. But our question is why did we not see two sessons before setting up the third zone?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 19 Aug 2013 11:22:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/same-traffic-traverses-the-firewall-twice/m-p/3507#M2593</guid>
      <dc:creator>rbit0965</dc:creator>
      <dc:date>2013-08-19T11:22:56Z</dc:date>
    </item>
    <item>
      <title>Re: Same traffic traverses the firewall twice.</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/same-traffic-traverses-the-firewall-twice/m-p/3508#M2594</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Did we verify if the eth1/9 was configured with a zone and/or virtual router ? &lt;/P&gt;&lt;P&gt;Your description seems contradicting:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;Here is whats happening:&lt;/P&gt;&lt;P style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;Remote user surfs the web, Traffic comes down the ipsec tunnel&lt;/P&gt;&lt;P style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;assigned a session ID by PA and logged.&lt;/P&gt;&lt;P style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;And is passed on to the core.&lt;/P&gt;&lt;P style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;and then passed back up to the firewall on interface1/9&amp;nbsp; ---------------------------------------------------------------------&amp;gt; how did you know if the traffic reached the eth1/9 interface? If we do not have traffic logs for the traffic, it means that the traffic never reached the firewall, &lt;/P&gt;&lt;P style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; or it would have been dropped because it did not have any zone/ v router assigned to it. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;Nothing Happens. We cannot see a log or a deny at all.-----------------------------------------------------------------------&amp;gt; usually the case, when the traffic did not reach the firewall at all ( else there would be a deny or an allow )&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;remote users cannot ping the 1/9 interface. ----------------------------------------------------------------------------------------&amp;gt; users might not have been able to ping the interface, if the eth1/9 interface did not have any interface management profile with ping configured under it&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 19 Aug 2013 19:59:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/same-traffic-traverses-the-firewall-twice/m-p/3508#M2594</guid>
      <dc:creator>kprakash</dc:creator>
      <dc:date>2013-08-19T19:59:55Z</dc:date>
    </item>
  </channel>
</rss>

