<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Multi-VR routes and security policies issues in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/multi-vr-routes-and-security-policies-issues/m-p/75147#M41888</link>
    <description>&lt;P&gt;Sorry for not getting back we ended up putting static routes to next hop vr XYZ. Until we want to decide going down the BGP option or the OSPF with loopback (port to port) on PA in different VR's.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 24 Mar 2016 12:03:06 GMT</pubDate>
    <dc:creator>CZaloba</dc:creator>
    <dc:date>2016-03-24T12:03:06Z</dc:date>
    <item>
      <title>Multi-VR routes and security policies issues</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/multi-vr-routes-and-security-policies-issues/m-p/72835#M41198</link>
      <description>&lt;P&gt;I have an issue where we have mulit-VRs in place 1) default and 2nd) VR that is utilized for DMZ and untrust routes&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Both VR's share a common zone name "public" for example.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have issues routing where for instance I have my internal network segments in the VR's FIB's and my routed networks fail to return back through the correct interfaces.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have a need for select internal subnets but RFC 1918 and Public routed ranges reaching into into the DMZ for administrating a Server.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The security policy logic is in place and sound transit zone VR default &amp;gt; public zone (VR Untrust/DMZ) &amp;nbsp;with applications ssh,ssh-tunnel.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This DMZ server also has restricted subnets from Public zone to allow Untrust traffic to server.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Issue my my server works from untrust perspective, however if my more trusted zones access the server in the DMZ I don't get traffic there.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Server is a Virtualized we got it to route properly once we added a second v-nic to the host server and had the server administrator add static routes pointing out a different gateway which lays in the VR default.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am hoping as we build and scale this network edge / dmz services over the internet that we don't have to apply host routing and allow OSPF to take place and advertise into both respected Virtual Routers.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Still working with TAC on this.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 14 Feb 2016 22:06:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/multi-vr-routes-and-security-policies-issues/m-p/72835#M41198</guid>
      <dc:creator>CZaloba</dc:creator>
      <dc:date>2016-02-14T22:06:49Z</dc:date>
    </item>
    <item>
      <title>Re: Multi-VR routes and security policies issues</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/multi-vr-routes-and-security-policies-issues/m-p/72869#M41212</link>
      <description>&lt;P&gt;Hi!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;could you provide a schematic to help us gain some insight into your design ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you want to keep networks separate through multiple VRs, I would recommend also changing the zones so none are shared to prevent confusion or accidental overlap. To enable intra-VR routing, static routes need to be added in the VR where you assign the &lt;EM&gt;other&lt;/EM&gt; VR as next hop and a returning static route needs to be in place to allow the traffic to take the same route back&lt;/P&gt;</description>
      <pubDate>Mon, 15 Feb 2016 13:05:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/multi-vr-routes-and-security-policies-issues/m-p/72869#M41212</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2016-02-15T13:05:02Z</dc:date>
    </item>
    <item>
      <title>Re: Multi-VR routes and security policies issues</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/multi-vr-routes-and-security-policies-issues/m-p/75147#M41888</link>
      <description>&lt;P&gt;Sorry for not getting back we ended up putting static routes to next hop vr XYZ. Until we want to decide going down the BGP option or the OSPF with loopback (port to port) on PA in different VR's.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 24 Mar 2016 12:03:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/multi-vr-routes-and-security-policies-issues/m-p/75147#M41888</guid>
      <dc:creator>CZaloba</dc:creator>
      <dc:date>2016-03-24T12:03:06Z</dc:date>
    </item>
  </channel>
</rss>

