<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Traffic forwarding based on security policy? in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/traffic-forwarding-based-on-security-policy/m-p/42505#M31203</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Let me review what I understand&lt;/P&gt;&lt;P&gt;Segment A is your trusted zone&lt;/P&gt;&lt;P&gt;Segment B is your untrusted zone&lt;/P&gt;&lt;P&gt;Segment C is your server zone.&lt;/P&gt;&lt;P&gt;For traffic to pass between these zones you have to configure security and NAT policies.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For&amp;nbsp; traffic to get from segment A (internal user) to segment B (website on&amp;nbsp; someonet else's network) you have to create a security policy that&amp;nbsp; allows that traffic and a NAT policy to translate the source traffic to&amp;nbsp; the assigned external IP.&lt;/P&gt;&lt;P&gt;For traffic to get from segment B&amp;nbsp; (Internet user) to a load balanced server on segment C you have to&amp;nbsp; create a security policy for the allowed traffic and a No translation&amp;nbsp; NAT policy for the source and destination&lt;/P&gt;&lt;P&gt;For traffic to get from&amp;nbsp; segment A (internal user) to a load balanced server on segment C you&amp;nbsp; have to create a security policy for the allowed traffic and the&amp;nbsp; appropriate translation of the source traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your&amp;nbsp; ping/traceroute traffic was not going off into segment B, it did not&amp;nbsp; have a policy to allow it to the proper destination and was following&amp;nbsp; the default route on the PaloAlto on which it could go.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Additionally if Segment A and Segment C are in the same zone, there would need to be an intra-zone rule that would allow it. (Source and destination zones are both the trust zone)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 13 Jul 2011 15:32:37 GMT</pubDate>
    <dc:creator>jcostello</dc:creator>
    <dc:date>2011-07-13T15:32:37Z</dc:date>
    <item>
      <title>Traffic forwarding based on security policy?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/traffic-forwarding-based-on-security-policy/m-p/42504#M31202</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We have been trying to troubleshoot an issue for a couple weeks now.&amp;nbsp; We seem to have found the issue, but it doesn't make sense.&amp;nbsp; I'm hoping someone can shed some light on this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;First off, we have a pair of PAN-4020's in HA @ 3.1.9.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm going to oversimplify the situation, but I think the logic will hold:&lt;/P&gt;&lt;P&gt;Segments A, B and C&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Segment A is a user segment with 2 routers, in serial, (layer 3 switches) between the test user and the PAN&lt;/P&gt;&lt;P&gt;Segment B is our connection to the Internet via a Cisco router connected to the PAN&lt;/P&gt;&lt;P&gt;Segment C is a Data Center segment with one router (layer 3 switch) between the servers and the PAN.&lt;/P&gt;&lt;P&gt;It's all layer 3, so this doesn't matter much, but Segments A, B and C hit the PAN on different interfaces.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Segment C also has a load balancer on it (same device as the layer 3 switch).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Users on Segment A are dynamically NAT'd ("many" users to 1 public address)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Servers on Segment C are 1:1 static NAT'd&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Load balancer uses public addresses; All users access the servers via the public address, whether local or from the Internet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;------------&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The issue:&lt;/P&gt;&lt;P&gt;From a workstation on Segment A, if I web/ssl to a server on Segment C it works fine (there is a policy allowing this)&lt;/P&gt;&lt;P&gt;From a workstation on Segment A I can go out on the Internet (obviously also a policy)&lt;/P&gt;&lt;P&gt;From a workstation on Segment A, if I try to traceroute to a server (public or private address) on Segment C it fails.&amp;nbsp; This is where the confusion lies .. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There is not a policy allowing ping/icmp from A to C.&amp;nbsp; What I don't understand is I do NOT see any failures in the logs from the workstation on A (either its public or private address) to the server on C (also checking both public and private addresses).&amp;nbsp; ALSO, the traceroute goes off to the Internet (Segment B) and eventually fails rather than heading toward Segment C.&amp;nbsp; Lastly, once I do put an explicit policy in place allowing icmp/ping (and SSH for that matter) from Segment A to Segment C, everything is happy.&amp;nbsp; I don't understand how a security policy is impacting routing paths.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 12 Jul 2011 17:56:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/traffic-forwarding-based-on-security-policy/m-p/42504#M31202</guid>
      <dc:creator>bhelman</dc:creator>
      <dc:date>2011-07-12T17:56:04Z</dc:date>
    </item>
    <item>
      <title>Re: Traffic forwarding based on security policy?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/traffic-forwarding-based-on-security-policy/m-p/42505#M31203</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Let me review what I understand&lt;/P&gt;&lt;P&gt;Segment A is your trusted zone&lt;/P&gt;&lt;P&gt;Segment B is your untrusted zone&lt;/P&gt;&lt;P&gt;Segment C is your server zone.&lt;/P&gt;&lt;P&gt;For traffic to pass between these zones you have to configure security and NAT policies.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For&amp;nbsp; traffic to get from segment A (internal user) to segment B (website on&amp;nbsp; someonet else's network) you have to create a security policy that&amp;nbsp; allows that traffic and a NAT policy to translate the source traffic to&amp;nbsp; the assigned external IP.&lt;/P&gt;&lt;P&gt;For traffic to get from segment B&amp;nbsp; (Internet user) to a load balanced server on segment C you have to&amp;nbsp; create a security policy for the allowed traffic and a No translation&amp;nbsp; NAT policy for the source and destination&lt;/P&gt;&lt;P&gt;For traffic to get from&amp;nbsp; segment A (internal user) to a load balanced server on segment C you&amp;nbsp; have to create a security policy for the allowed traffic and the&amp;nbsp; appropriate translation of the source traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your&amp;nbsp; ping/traceroute traffic was not going off into segment B, it did not&amp;nbsp; have a policy to allow it to the proper destination and was following&amp;nbsp; the default route on the PaloAlto on which it could go.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Additionally if Segment A and Segment C are in the same zone, there would need to be an intra-zone rule that would allow it. (Source and destination zones are both the trust zone)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Jul 2011 15:32:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/traffic-forwarding-based-on-security-policy/m-p/42505#M31203</guid>
      <dc:creator>jcostello</dc:creator>
      <dc:date>2011-07-13T15:32:37Z</dc:date>
    </item>
    <item>
      <title>Re: Traffic forwarding based on security policy?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/traffic-forwarding-based-on-security-policy/m-p/42506#M31204</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I need to parse most of what you said to fully understand it, but I don't think my original questions are answered:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) why is traffic following the fw's default route rather than the known route of the destination server?&amp;nbsp; Granted, without a security rule in place, it isn't going to work, but it should still try .. and that leads to #2&lt;/P&gt;&lt;P&gt;2) why do I not see "deny"'s in the monitor log?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It really appears that the fw is making an assumption rather than routing.&amp;nbsp; It makes no sense to me that a security policy impacts the routing path.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Brian&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Jul 2011 17:58:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/traffic-forwarding-based-on-security-policy/m-p/42506#M31204</guid>
      <dc:creator>bhelman</dc:creator>
      <dc:date>2011-07-13T17:58:03Z</dc:date>
    </item>
    <item>
      <title>Re: Traffic forwarding based on security policy?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/traffic-forwarding-based-on-security-policy/m-p/42507#M31205</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;"Your&amp;nbsp; ping/traceroute traffic was not going off into segment B, it did not&amp;nbsp; have a policy to allow it to the proper destination and was following&amp;nbsp; the default route on the PaloAlto on which it could go."&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think this is where I am confused.&amp;nbsp; How do you define a "policy" that controls routing?&amp;nbsp; Shouldn't that be an entry in the Virtual Router/Static Routes?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Jul 2011 18:05:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/traffic-forwarding-based-on-security-policy/m-p/42507#M31205</guid>
      <dc:creator>bhelman</dc:creator>
      <dc:date>2011-07-13T18:05:52Z</dc:date>
    </item>
    <item>
      <title>Re: Traffic forwarding based on security policy?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/traffic-forwarding-based-on-security-policy/m-p/42508#M31206</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Forget about routing, the PAN is more than a layer 3 device.&lt;/P&gt;&lt;P&gt;Routing will not occur if there is not a rule. There is an implicit deny in place at the end of the policy rules. The implicit deny does not log, if you want to see what is being denied you will need to create an implicit rule.&lt;/P&gt;&lt;P&gt;Can you provide an output of what a ping or traceroute shows when the rule allowing ping is not in place or disabled.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 13 Jul 2011 20:01:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/traffic-forwarding-based-on-security-policy/m-p/42508#M31206</guid>
      <dc:creator>jcostello</dc:creator>
      <dc:date>2011-07-13T20:01:56Z</dc:date>
    </item>
  </channel>
</rss>

