<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: virtual routers in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/virtual-routers/m-p/119074#M45738</link>
    <description>&lt;P&gt;Actually what you can to is:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- attach your trust interface to the VR&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;- attach your untrust interface to the VR&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;- go to the CLI and enter "ping source &amp;lt;ip-of-trust-interface&amp;gt; host &amp;lt;ip-of-host-in-untrust-zone&amp;gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;A setup like this would normally be trust (LAN) to untrust (internet) so in my case it would be:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;ping source 192.168.0.1 host 8.8.8.8&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;If the ping succeeds you know that your VR is working.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 13 Oct 2016 12:08:28 GMT</pubDate>
    <dc:creator>Rboehme</dc:creator>
    <dc:date>2016-10-13T12:08:28Z</dc:date>
    <item>
      <title>virtual routers</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/virtual-routers/m-p/118948#M45700</link>
      <description>&lt;P&gt;How can you tell if a virtual router is passing traffic? Is there a check or test you can run?&lt;/P&gt;</description>
      <pubDate>Tue, 11 Oct 2016 22:02:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/virtual-routers/m-p/118948#M45700</guid>
      <dc:creator>jdprovine</dc:creator>
      <dc:date>2016-10-11T22:02:56Z</dc:date>
    </item>
    <item>
      <title>Re: virtual routers</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/virtual-routers/m-p/118963#M45706</link>
      <description>&lt;P&gt;Hi jprovine,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you know which interface is using&amp;nbsp;which virtual-router you could check interface counters (received and transmitted) with the command 'show counter interface ethernet1/x'.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;hope this helps,&lt;/P&gt;
&lt;P&gt;-Kim.&lt;/P&gt;</description>
      <pubDate>Wed, 12 Oct 2016 07:31:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/virtual-routers/m-p/118963#M45706</guid>
      <dc:creator>kiwi</dc:creator>
      <dc:date>2016-10-12T07:31:11Z</dc:date>
    </item>
    <item>
      <title>Re: virtual routers</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/virtual-routers/m-p/118967#M45708</link>
      <description>&lt;P&gt;From my understanding VR is not passing traffic, it is just a bundle of the routes or single routing&amp;nbsp;table&amp;nbsp;which you attaching to the firewall interface (s). You can run simple "ping" or "traceroute" command to the destination to see next hot (path) etc. Don't&amp;nbsp;forget allow this traffic in the security policy&lt;/P&gt;</description>
      <pubDate>Wed, 12 Oct 2016 12:25:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/virtual-routers/m-p/118967#M45708</guid>
      <dc:creator>TranceforLife</dc:creator>
      <dc:date>2016-10-12T12:25:40Z</dc:date>
    </item>
    <item>
      <title>Re: virtual routers</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/virtual-routers/m-p/118985#M45711</link>
      <description>&lt;P&gt;I will give that a shot&lt;/P&gt;</description>
      <pubDate>Wed, 12 Oct 2016 12:24:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/virtual-routers/m-p/118985#M45711</guid>
      <dc:creator>jdprovine</dc:creator>
      <dc:date>2016-10-12T12:24:18Z</dc:date>
    </item>
    <item>
      <title>Re: virtual routers</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/virtual-routers/m-p/118986#M45712</link>
      <description>&lt;P&gt;I guess it would be more correct to say how do I make sure that the router is working LOL&lt;/P&gt;</description>
      <pubDate>Wed, 12 Oct 2016 12:24:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/virtual-routers/m-p/118986#M45712</guid>
      <dc:creator>jdprovine</dc:creator>
      <dc:date>2016-10-12T12:24:45Z</dc:date>
    </item>
    <item>
      <title>Re: virtual routers</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/virtual-routers/m-p/119074#M45738</link>
      <description>&lt;P&gt;Actually what you can to is:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- attach your trust interface to the VR&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;- attach your untrust interface to the VR&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;- go to the CLI and enter "ping source &amp;lt;ip-of-trust-interface&amp;gt; host &amp;lt;ip-of-host-in-untrust-zone&amp;gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;A setup like this would normally be trust (LAN) to untrust (internet) so in my case it would be:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;ping source 192.168.0.1 host 8.8.8.8&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;If the ping succeeds you know that your VR is working.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 13 Oct 2016 12:08:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/virtual-routers/m-p/119074#M45738</guid>
      <dc:creator>Rboehme</dc:creator>
      <dc:date>2016-10-13T12:08:28Z</dc:date>
    </item>
  </channel>
</rss>

