<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Redistribute Route to GlobalProtect with BGP in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/redistribute-route-to-globalprotect-with-bgp/m-p/93294#M43790</link>
    <description>&lt;P&gt;Here is some additional info testing the route to my AWS resources.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;&lt;BR /&gt;&lt;BR /&gt;bob@PA-3020&amp;gt; test routing fib-lookup virtual-router default-vr ip 172.21.1.121&lt;BR /&gt;&lt;BR /&gt;--------------------------------------------------------------------------------&lt;BR /&gt;runtime route lookup&lt;BR /&gt;--------------------------------------------------------------------------------&lt;BR /&gt;virtual-router: default-vr&lt;BR /&gt;destination: 172.21.1.121&lt;BR /&gt;result:&lt;BR /&gt; via 169.254.255.89 interface tunnel.4, source 169.254.255.90, metric 65434&lt;BR /&gt;--------------------------------------------------------------------------------&lt;BR /&gt;&lt;BR /&gt;bob@PA-3020&amp;gt; show routing route | match tunnel.4&lt;BR /&gt;169.254.255.88/30 169.254.255.90 0 A C tunnel.4                                                    &lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In the GlobalProtect Gatway&amp;nbsp;--&amp;gt; Agent --&amp;gt; Client Settings I added the following Access routes&lt;/P&gt;&lt;P&gt;172.20.0.0/16&lt;/P&gt;&lt;P&gt;172.21.0.0/16&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;On my connected GlobalProtect VPN client I can confirm the presence of both routes&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;       172.19.0.2  255.255.255.255         On-link        172.19.0.2    256
&lt;STRONG&gt;       172.20.0.0      255.255.0.0         On-link        172.19.0.2      1&lt;/STRONG&gt;
   172.20.255.255  255.255.255.255         On-link        172.19.0.2    256
&lt;STRONG&gt;       172.21.0.0      255.255.0.0         On-link        172.19.0.2      1&lt;/STRONG&gt;
   172.21.255.255  255.255.255.255         On-link        172.19.0.2    256&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 29 Jun 2016 02:20:36 GMT</pubDate>
    <dc:creator>AndrewMoore</dc:creator>
    <dc:date>2016-06-29T02:20:36Z</dc:date>
    <item>
      <title>Redistribute Route to GlobalProtect with BGP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/redistribute-route-to-globalprotect-with-bgp/m-p/93284#M43782</link>
      <description>&lt;P&gt;Background:&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;We have a 172.20.0.0/16 internal network that is connected to our Amazon AWS VPC. A route is&amp;nbsp;successfully advertized to our AWS peer using BGP and from the local network I can reach our server instances in the VPC. AWS resources are assigned an address in the 172.21.0.0/16 network.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;After I created a remote-access VPN using Global Protect, I can reach our local network from outside the building. Remote users are assigned an address in&amp;nbsp;the 172.19.0.0/16 network.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Problem:&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Unable to reach our AWS resources while remotely connected to the local network using Global Protect.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My Thoughts:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Believe I need to redistribute a route to the 172.19.0.0/16 network assigned to GlobalProtect clients. I followed the article &lt;A href="https://live.paloaltonetworks.com/t5/Management-Articles/How-to-redistribute-GlobalProtect-routes-into-OSPF/ta-p/54163" target="_self"&gt;How to Redistribute GlobalProtect Routes into OSPF&lt;/A&gt;. As a result I created a 2nd Redistribution Profile within my virtual router and configured a 2nd BGP Export Rule.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Despite this when I issue&amp;nbsp;&lt;EM&gt;&amp;gt; show routing protocols bgp rib-out&amp;nbsp;&lt;/EM&gt; only displays the original, single route to my local 172.20.0.0/16 local network.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any thoughts are greatly appreciated!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;</description>
      <pubDate>Wed, 29 Jun 2016 00:29:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/redistribute-route-to-globalprotect-with-bgp/m-p/93284#M43782</guid>
      <dc:creator>AndrewMoore</dc:creator>
      <dc:date>2016-06-29T00:29:17Z</dc:date>
    </item>
    <item>
      <title>Re: Redistribute Route to GlobalProtect with BGP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/redistribute-route-to-globalprotect-with-bgp/m-p/93285#M43783</link>
      <description>&lt;P&gt;Additional Info:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When I issue the command &amp;gt; show routing fib I expected to see a single entry for GlobalProtect, such as 172.19.0.0/16.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Instead I see this:&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;2       172.20.0.0/16         0.0.0.0            u      ethernet1/2        1500
63      172.21.0.0/16         169.254.255.XYZ     ug     tunnel.4           1427
50      172.19.0.64/26        172.19.0.64        ug     tunnel.3           1500
49      172.19.0.32/27        172.19.0.32        ug     tunnel.3           1500
48      172.19.0.16/28        172.19.0.16        ug     tunnel.3           1500
46      172.19.0.4/30         172.19.0.4         ug     tunnel.3           1500
45      172.19.0.2/31         172.19.0.2         ug     tunnel.3           1500
47      172.19.0.8/29         172.19.0.8         ug     tunnel.3           1500
51      172.19.0.128/26       172.19.0.128       ug     tunnel.3           1500
52      172.19.0.192/27       172.19.0.192       ug     tunnel.3           1500
53      172.19.0.224/28       172.19.0.224       ug     tunnel.3           1500
54      172.19.0.240/29       172.19.0.240       ug     tunnel.3           1500
55      172.19.0.248/30       172.19.0.248       ug     tunnel.3           1500&lt;/PRE&gt;&lt;P&gt;Would I need to instead define these networks in my Export and Redistribution Profiles?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Follow Up:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Why would the router implement these CIDR networks instead of a large 172.19.0.0/16 as I defined in the GUI?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks Again!&lt;/P&gt;</description>
      <pubDate>Wed, 29 Jun 2016 00:34:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/redistribute-route-to-globalprotect-with-bgp/m-p/93285#M43783</guid>
      <dc:creator>AndrewMoore</dc:creator>
      <dc:date>2016-06-29T00:34:48Z</dc:date>
    </item>
    <item>
      <title>Re: Redistribute Route to GlobalProtect with BGP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/redistribute-route-to-globalprotect-with-bgp/m-p/93287#M43785</link>
      <description>&lt;P&gt;Do you have proper security policy in place to allow GP user to access AWs resources? Try assiging ip address on tunnel interface give ip address to tunnel interface in the pool that you are assiging to GP client and then try to ping from tunnel interface to the AWS resources.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Try to ping from firewall any interface to any aws resource check if the ping is working or not.&lt;/P&gt;</description>
      <pubDate>Wed, 29 Jun 2016 00:51:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/redistribute-route-to-globalprotect-with-bgp/m-p/93287#M43785</guid>
      <dc:creator>pankaku</dc:creator>
      <dc:date>2016-06-29T00:51:09Z</dc:date>
    </item>
    <item>
      <title>Re: Redistribute Route to GlobalProtect with BGP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/redistribute-route-to-globalprotect-with-bgp/m-p/93289#M43787</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/20090"&gt;@pankaku﻿&lt;/a&gt;&amp;nbsp;and thank you for the reply. The tunnel interfaces associated with Amazon and the LAN are assigned to the same security profile. I realize this leads to no visibility or control over the traffic and eventually want to assign the AWS tunnel interfaces to a seperate security zone.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Per your suggestion I think I understand you and wanted to summarize what you said as I go about trying what you suggested.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Try assigning an IP address from the GP address pool to the GP tunnel interface and then try pinging a resource in AWS&lt;/P&gt;</description>
      <pubDate>Wed, 29 Jun 2016 01:14:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/redistribute-route-to-globalprotect-with-bgp/m-p/93289#M43787</guid>
      <dc:creator>AndrewMoore</dc:creator>
      <dc:date>2016-06-29T01:14:23Z</dc:date>
    </item>
    <item>
      <title>Re: Redistribute Route to GlobalProtect with BGP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/redistribute-route-to-globalprotect-with-bgp/m-p/93292#M43788</link>
      <description>&lt;P&gt;yes that's correct. I will let us know if we have reachability from firewall tunnel inteface to aws resources.&lt;/P&gt;&lt;P&gt;Also try to ping from firewall's any other interface to aws resources.&lt;/P&gt;</description>
      <pubDate>Wed, 29 Jun 2016 01:19:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/redistribute-route-to-globalprotect-with-bgp/m-p/93292#M43788</guid>
      <dc:creator>pankaku</dc:creator>
      <dc:date>2016-06-29T01:19:12Z</dc:date>
    </item>
    <item>
      <title>Re: Redistribute Route to GlobalProtect with BGP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/redistribute-route-to-globalprotect-with-bgp/m-p/93293#M43789</link>
      <description>&lt;P&gt;Thanks for the clarification &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/20090"&gt;@pankaku&lt;/a&gt;.&lt;/P&gt;&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/8358"&gt;@Pankaj&lt;/a&gt;.kumar wrote:&lt;BR /&gt;&lt;P&gt;yes that's correct. I will let us know if we have reachability from firewall tunnel inteface to aws resources.&lt;/P&gt;&lt;P&gt;Also try to ping from firewall's any other interface to aws resources.&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&lt;BR /&gt;I assigned 172.21.0.99 to the AWS tunnel and tried to ping an AWS resource with no success.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;However, I can ping an AWS resource from the Palo Alto internal gateway interface 172.20.0.1.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Running a packet capture I can see on the receive side ICMP traffic flowing from 172.19.0.2 to 172.21.ABC.EFG and on the transmit side I see ESP traffic flowing from the PA egress interface (public IP) to the AWS resource.&lt;/P&gt;</description>
      <pubDate>Wed, 29 Jun 2016 01:57:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/redistribute-route-to-globalprotect-with-bgp/m-p/93293#M43789</guid>
      <dc:creator>AndrewMoore</dc:creator>
      <dc:date>2016-06-29T01:57:04Z</dc:date>
    </item>
    <item>
      <title>Re: Redistribute Route to GlobalProtect with BGP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/redistribute-route-to-globalprotect-with-bgp/m-p/93294#M43790</link>
      <description>&lt;P&gt;Here is some additional info testing the route to my AWS resources.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;&lt;BR /&gt;&lt;BR /&gt;bob@PA-3020&amp;gt; test routing fib-lookup virtual-router default-vr ip 172.21.1.121&lt;BR /&gt;&lt;BR /&gt;--------------------------------------------------------------------------------&lt;BR /&gt;runtime route lookup&lt;BR /&gt;--------------------------------------------------------------------------------&lt;BR /&gt;virtual-router: default-vr&lt;BR /&gt;destination: 172.21.1.121&lt;BR /&gt;result:&lt;BR /&gt; via 169.254.255.89 interface tunnel.4, source 169.254.255.90, metric 65434&lt;BR /&gt;--------------------------------------------------------------------------------&lt;BR /&gt;&lt;BR /&gt;bob@PA-3020&amp;gt; show routing route | match tunnel.4&lt;BR /&gt;169.254.255.88/30 169.254.255.90 0 A C tunnel.4                                                    &lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In the GlobalProtect Gatway&amp;nbsp;--&amp;gt; Agent --&amp;gt; Client Settings I added the following Access routes&lt;/P&gt;&lt;P&gt;172.20.0.0/16&lt;/P&gt;&lt;P&gt;172.21.0.0/16&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;On my connected GlobalProtect VPN client I can confirm the presence of both routes&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;       172.19.0.2  255.255.255.255         On-link        172.19.0.2    256
&lt;STRONG&gt;       172.20.0.0      255.255.0.0         On-link        172.19.0.2      1&lt;/STRONG&gt;
   172.20.255.255  255.255.255.255         On-link        172.19.0.2    256
&lt;STRONG&gt;       172.21.0.0      255.255.0.0         On-link        172.19.0.2      1&lt;/STRONG&gt;
   172.21.255.255  255.255.255.255         On-link        172.19.0.2    256&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 29 Jun 2016 02:20:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/redistribute-route-to-globalprotect-with-bgp/m-p/93294#M43790</guid>
      <dc:creator>AndrewMoore</dc:creator>
      <dc:date>2016-06-29T02:20:36Z</dc:date>
    </item>
    <item>
      <title>Re: Redistribute Route to GlobalProtect with BGP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/redistribute-route-to-globalprotect-with-bgp/m-p/93334#M43818</link>
      <description>&lt;P&gt;Let me clarify what i understand.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You are able to ping from firewall's interface but not from GP tunnel interface.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If that is correct then try following doc:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/Management-Articles/GlobalProtect-Users-and-Internal-Resources/ta-p/65354" target="_blank"&gt;https://live.paloaltonetworks.com/t5/Management-Articles/GlobalProtect-Users-and-Internal-Resources/ta-p/65354&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 29 Jun 2016 15:54:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/redistribute-route-to-globalprotect-with-bgp/m-p/93334#M43818</guid>
      <dc:creator>pankaku</dc:creator>
      <dc:date>2016-06-29T15:54:40Z</dc:date>
    </item>
    <item>
      <title>Re: Redistribute Route to GlobalProtect with BGP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/redistribute-route-to-globalprotect-with-bgp/m-p/93335#M43819</link>
      <description>&lt;P&gt;That's &amp;nbsp;absolutely right&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/20090"&gt;@pankaku﻿&lt;/a&gt;. I will take a look at your suggestion.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you again.&lt;/P&gt;</description>
      <pubDate>Wed, 29 Jun 2016 15:59:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/redistribute-route-to-globalprotect-with-bgp/m-p/93335#M43819</guid>
      <dc:creator>AndrewMoore</dc:creator>
      <dc:date>2016-06-29T15:59:43Z</dc:date>
    </item>
  </channel>
</rss>

