<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic IP SLA - but not dual ISP. Receiving and Forwarding from the same Interface. in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ip-sla-but-not-dual-isp-receiving-and-forwarding-from-the-same/m-p/74755#M41776</link>
    <description>&lt;P&gt;hi, I know PA doesn't have IP SLA and i've read documents that talks about using VR&amp;nbsp;and PBF to handle dual ISPs.&lt;/P&gt;&lt;P&gt;this works with an&amp;nbsp;ASA but not sure how to do it with PA.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But&amp;nbsp;there's a slight difference on my implementation and it seems to fail with a lot of SSL sites:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have two links at each site.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;First Link, ISP&lt;/STRONG&gt; &amp;lt;----&amp;gt; Palo alto (10.1.1.1) &amp;lt;----&amp;gt; L3 Switch (10.1.1.3)&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Second Link, MPLS&lt;/STRONG&gt; &amp;lt;----&amp;gt; Cisco Router (10.1.1.2) &amp;lt;---&amp;gt; L3 Switch (10.1.1.3)&lt;/P&gt;&lt;P&gt;Basically, I have a layer 3 switch that connects both PA and Cisco Router to the same LAN (10.1.1.0).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1) All Devices talk to each other via OSPF&lt;/P&gt;&lt;P&gt;2) PA Firewall&amp;nbsp;has a static&amp;nbsp;default route with metric 5 to ISP&lt;/P&gt;&lt;P&gt;3)&amp;nbsp;Cisco Router has a static default route with metric 10 to MPLS Cloud (where there is another internet breakout)&lt;/P&gt;&lt;P&gt;4) PA Firewall and Cisco router redistribute&amp;nbsp;default route into OSPF.&lt;/P&gt;&lt;P&gt;5) Layer 3 sees PA firewall with better metric and sends to PA firewall when PA Firewall is up.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The idea is if I can't reach 8.8.8.8 on PA, it will tell me to send it out via the MPLS. This is accomplished in the past with IP SLA on the static route on the ASA, where the static route is removed and L3 stops forwarding traffic to the ASA.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;PA recommends using PBR to "monitor" IPs. The challenge I have is that when PA receives traffic, and&amp;nbsp;forwards&amp;nbsp;traffic out of the same interface (back to MPLS) , SSL traffic seem to stall.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Example when ISP is down:&lt;/P&gt;&lt;P&gt;1) User sends to L3 switch.&lt;/P&gt;&lt;P&gt;2) L3 switch sends packets to PA's ingress&amp;nbsp;e1/1&lt;/P&gt;&lt;P&gt;3) PA determines ISP is down, and sends packet&amp;nbsp;back out the same interface (e1/1) to&amp;nbsp;Cisco router on the same LAN.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This seems to work for non-SSL. but fails with&amp;nbsp;secure traffic to Google, facebook, etc... it just hangs&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any thoughts?&lt;/P&gt;</description>
    <pubDate>Wed, 16 Mar 2016 03:19:53 GMT</pubDate>
    <dc:creator>fogmeister</dc:creator>
    <dc:date>2016-03-16T03:19:53Z</dc:date>
    <item>
      <title>IP SLA - but not dual ISP. Receiving and Forwarding from the same Interface.</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ip-sla-but-not-dual-isp-receiving-and-forwarding-from-the-same/m-p/74755#M41776</link>
      <description>&lt;P&gt;hi, I know PA doesn't have IP SLA and i've read documents that talks about using VR&amp;nbsp;and PBF to handle dual ISPs.&lt;/P&gt;&lt;P&gt;this works with an&amp;nbsp;ASA but not sure how to do it with PA.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But&amp;nbsp;there's a slight difference on my implementation and it seems to fail with a lot of SSL sites:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have two links at each site.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;First Link, ISP&lt;/STRONG&gt; &amp;lt;----&amp;gt; Palo alto (10.1.1.1) &amp;lt;----&amp;gt; L3 Switch (10.1.1.3)&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Second Link, MPLS&lt;/STRONG&gt; &amp;lt;----&amp;gt; Cisco Router (10.1.1.2) &amp;lt;---&amp;gt; L3 Switch (10.1.1.3)&lt;/P&gt;&lt;P&gt;Basically, I have a layer 3 switch that connects both PA and Cisco Router to the same LAN (10.1.1.0).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1) All Devices talk to each other via OSPF&lt;/P&gt;&lt;P&gt;2) PA Firewall&amp;nbsp;has a static&amp;nbsp;default route with metric 5 to ISP&lt;/P&gt;&lt;P&gt;3)&amp;nbsp;Cisco Router has a static default route with metric 10 to MPLS Cloud (where there is another internet breakout)&lt;/P&gt;&lt;P&gt;4) PA Firewall and Cisco router redistribute&amp;nbsp;default route into OSPF.&lt;/P&gt;&lt;P&gt;5) Layer 3 sees PA firewall with better metric and sends to PA firewall when PA Firewall is up.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The idea is if I can't reach 8.8.8.8 on PA, it will tell me to send it out via the MPLS. This is accomplished in the past with IP SLA on the static route on the ASA, where the static route is removed and L3 stops forwarding traffic to the ASA.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;PA recommends using PBR to "monitor" IPs. The challenge I have is that when PA receives traffic, and&amp;nbsp;forwards&amp;nbsp;traffic out of the same interface (back to MPLS) , SSL traffic seem to stall.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Example when ISP is down:&lt;/P&gt;&lt;P&gt;1) User sends to L3 switch.&lt;/P&gt;&lt;P&gt;2) L3 switch sends packets to PA's ingress&amp;nbsp;e1/1&lt;/P&gt;&lt;P&gt;3) PA determines ISP is down, and sends packet&amp;nbsp;back out the same interface (e1/1) to&amp;nbsp;Cisco router on the same LAN.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This seems to work for non-SSL. but fails with&amp;nbsp;secure traffic to Google, facebook, etc... it just hangs&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any thoughts?&lt;/P&gt;</description>
      <pubDate>Wed, 16 Mar 2016 03:19:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ip-sla-but-not-dual-isp-receiving-and-forwarding-from-the-same/m-p/74755#M41776</guid>
      <dc:creator>fogmeister</dc:creator>
      <dc:date>2016-03-16T03:19:53Z</dc:date>
    </item>
    <item>
      <title>Re: IP SLA - but not dual ISP. Receiving and Forwarding from the same Interface.</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ip-sla-but-not-dual-isp-receiving-and-forwarding-from-the-same/m-p/74756#M41777</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In your case, when ISP connected to PA is down, is all the forward traffic (Client-&amp;gt; Internet) still going through the Palo Alto?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Two things are possible:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;1. When Palo Alto forwards traffic back to Cisco, it sends a ICMP redirect to the L3 switch. I don't think PA does that.&lt;/P&gt;
&lt;P&gt;2. Palo Alto sends traffic to Cisco, which forwards it out to Internet, but the reply traffic is forwarded directly by Cisco to L3 switch.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In case 2 above, Palo Alto will only be seeing half of the traffic and this is a scenario of asymmetric routing. Palo Alto session will not see a SYN/ACK so the session does not matures and times out after 5 seconds (Default TCP init timeout).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can do two things,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;1. Allow asymmetric bypass on the PA firewall and disable TCP Reject Non SYN:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;# set deviceconfig setting tcp asymmetric-path bypass&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;#&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="s1"&gt;set deviceconfig setting session tcp-reject-non-syn no&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;# commit&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;2. Do a hair pinning NAT, so that when PA firewall forwards the traffic to Cisco, it does a source NAT on this traffic, so that the Cisco will see traffic coming from PA, and hence will forward reply packets to PA. For this create a source NAT rule from trust to trust zones doing a source NAT on e1/1 IP.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Regards&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 16 Mar 2016 05:24:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ip-sla-but-not-dual-isp-receiving-and-forwarding-from-the-same/m-p/74756#M41777</guid>
      <dc:creator>abjain</dc:creator>
      <dc:date>2016-03-16T05:24:20Z</dc:date>
    </item>
    <item>
      <title>Re: IP SLA - but not dual ISP. Receiving and Forwarding from the same Interface.</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ip-sla-but-not-dual-isp-receiving-and-forwarding-from-the-same/m-p/74762#M41780</link>
      <description>&lt;P&gt;Abjain, thanks for the quick reply.&amp;nbsp;What you've described makes perfect sense.&lt;/P&gt;&lt;P&gt;I will give it a shot over the weekend and hopefully, it'll work.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;(will&amp;nbsp;come back and give an update either way).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 16 Mar 2016 06:19:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ip-sla-but-not-dual-isp-receiving-and-forwarding-from-the-same/m-p/74762#M41780</guid>
      <dc:creator>fogmeister</dc:creator>
      <dc:date>2016-03-16T06:19:15Z</dc:date>
    </item>
  </channel>
</rss>

