<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Asym routing and policies in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/asym-routing-and-policies/m-p/162408#M52695</link>
    <description>&lt;P&gt;I am having troube picturing the path here.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is loopback.2 in the same zone as vlan 13?&lt;/P&gt;</description>
    <pubDate>Tue, 20 Jun 2017 22:54:35 GMT</pubDate>
    <dc:creator>pulukas</dc:creator>
    <dc:date>2017-06-20T22:54:35Z</dc:date>
    <item>
      <title>Asym routing and policies</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/asym-routing-and-policies/m-p/158554#M51877</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If I have a TCP stream that is initiated and because of routing changes now has to flow through my PA, how to I allow this through.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;On my other firewall's I can allow non SYN and SYN/ACK through but block SYN's.. How does one do that on a PA with policies ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Alex&lt;/P&gt;</description>
      <pubDate>Sun, 28 May 2017 01:27:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/asym-routing-and-policies/m-p/158554#M51877</guid>
      <dc:creator>Alex_Samad</dc:creator>
      <dc:date>2017-05-28T01:27:42Z</dc:date>
    </item>
    <item>
      <title>Re: Asym routing and policies</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/asym-routing-and-policies/m-p/158561#M51884</link>
      <description>&lt;P&gt;Instructions are here. &amp;nbsp;Be sure to correct to symmetrical routing as soon as possible and remove.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/Configuration-Articles/How-to-Set-the-Palo-Alto-Networks-Firewall-to-Allow-non-Syn/ta-p/62868" target="_blank"&gt;https://live.paloaltonetworks.com/t5/Configuration-Articles/How-to-Set-the-Palo-Alto-Networks-Firewall-to-Allow-non-Syn/ta-p/62868&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 28 May 2017 13:34:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/asym-routing-and-policies/m-p/158561#M51884</guid>
      <dc:creator>pulukas</dc:creator>
      <dc:date>2017-05-28T13:34:29Z</dc:date>
    </item>
    <item>
      <title>Re: Asym routing and policies</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/asym-routing-and-policies/m-p/158563#M51886</link>
      <description>&lt;P&gt;I totally agree sith &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/9524"&gt;@pulukas&lt;/a&gt;. There is something wrong in the network if you have (new/additional) traffic on the firewall because of a routing change/asymetric routing.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But ... because of this post I had the following idea: Would it be possible to temporary use this "security issue" for pa-200-cluster upgrades without having the sessions interrupted?&lt;/P&gt;</description>
      <pubDate>Sun, 28 May 2017 15:19:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/asym-routing-and-policies/m-p/158563#M51886</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2017-05-28T15:19:25Z</dc:date>
    </item>
    <item>
      <title>Re: Asym routing and policies</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/asym-routing-and-policies/m-p/158567#M51890</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks, for the link.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So tell me how would you deal with this scenario. &amp;nbsp;2 DC at each DC I have a HA Cluster. &amp;nbsp;The HA Clusters are first hops onto the internet say 2 transit providers at each site. &amp;nbsp;You publish your Prefix out.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You have long lived TCP streams to addresses inside so&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;inside server (with public ip address) -&amp;gt; core network -&amp;gt; PA HA cluster -&amp;gt; ISP -&amp;gt; internet -&amp;gt; Client fw -&amp;gt; client server&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;just say there is an issue with one of the providers, so the stream that was coming from one internet provider and over the HA pair at DC A is now coming over the internet on HA pair at DC B.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I don't see any reson why the TCP session should be dropped and re created&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Alex&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 28 May 2017 20:28:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/asym-routing-and-policies/m-p/158567#M51890</guid>
      <dc:creator>Alex_Samad</dc:creator>
      <dc:date>2017-05-28T20:28:56Z</dc:date>
    </item>
    <item>
      <title>Re: Asym routing and policies</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/asym-routing-and-policies/m-p/158570#M51892</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/62286"&gt;@Alex_Samad&lt;/a&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;With this description your situation makes more sense to me and I understand why you want to allow non-syn-tcp traffic. What I did not unterstand: do you want to allow this traffic globally ond both of your clusters or for traffic coming from your internal network?&lt;/P&gt;&lt;P&gt;I evaluate the risk as lower when&amp;nbsp;you only allow this traffic&amp;nbsp;from internal network.&lt;/P&gt;&lt;P&gt;Allowing this traffic from the internet exposes your infrastructure&amp;nbsp;to the following risks:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Reconnaisance holes: many servers (windows for example) respond to packets on closed ports with a TCP RST. On open ports the server does not respond to tcp-non-syn traffic. An attacker may use these facts to probe if there is a server behind a specific IP and may also probe the server and the firewallruleset&lt;/LI&gt;&lt;LI&gt;Session table flooding: because of no required TCP Handshake the firewall has to install a session in the session table for every packet. So there is a risk for full session tables and the firewall will not be able to process normal sessions. (With tcp-non-syn traffic dropped there are still syn-flood attacks, but there are methods like syn cookie or RED against that type of attack. These protections are useless when allowing tcp-non-syn traffic)&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When you allow this traffic "only" from internal, there are still packets which will be dropped, but at least answers from publicly available&amp;nbsp;servers/requests from internal clients will be processed without the need to establish the session again.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Remo&lt;/P&gt;</description>
      <pubDate>Sun, 28 May 2017 23:23:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/asym-routing-and-policies/m-p/158570#M51892</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2017-05-28T23:23:33Z</dc:date>
    </item>
    <item>
      <title>Re: Asym routing and policies</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/asym-routing-and-policies/m-p/158571#M51893</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;No my hope was to only allow say port 443.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If I have a long lived websocket connection so only 443. I would hope to allow non syn tcp packets only if they are destined for a specific IP and only specific port.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Alex&lt;/P&gt;</description>
      <pubDate>Sun, 28 May 2017 23:40:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/asym-routing-and-policies/m-p/158571#M51893</guid>
      <dc:creator>Alex_Samad</dc:creator>
      <dc:date>2017-05-28T23:40:59Z</dc:date>
    </item>
    <item>
      <title>Re: Asym routing and policies</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/asym-routing-and-policies/m-p/158592#M51909</link>
      <description>&lt;P&gt;security policy will still be applied, so you can limit the total exposure somewhat, but disabling tcp sanity with non-syn is a system wide setting and can't be limited to a specific port only&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;-- one gotcha: in zone protection profiles you can also opt to disable non-syn checks, which would allow you to only disable this for one or two specific zones while still enforcing syn on other zones, this could be helpful ? (a little? maybe? &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; )&lt;/P&gt;</description>
      <pubDate>Mon, 29 May 2017 08:17:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/asym-routing-and-policies/m-p/158592#M51909</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2017-05-29T08:17:54Z</dc:date>
    </item>
    <item>
      <title>Re: Asym routing and policies</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/asym-routing-and-policies/m-p/158594#M51910</link>
      <description>&lt;P&gt;Hmmm, okay have to keep that in mind&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;</description>
      <pubDate>Mon, 29 May 2017 08:50:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/asym-routing-and-policies/m-p/158594#M51910</guid>
      <dc:creator>Alex_Samad</dc:creator>
      <dc:date>2017-05-29T08:50:50Z</dc:date>
    </item>
    <item>
      <title>Re: Asym routing and policies</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/asym-routing-and-policies/m-p/158595#M51911</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/7608"&gt;@reaper&lt;/a&gt;wrote:&lt;BR /&gt;&lt;P&gt;-- one gotcha: in zone protection profiles you can also opt to disable non-syn checks, which would allow you to only disable this for one or two specific zones while still enforcing syn on other zones, this could be helpful ? (a little? maybe? &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; )&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;as I wrote, but as soon as you disable these checks from the internet you have the potential problem of session table flooding ...&lt;/P&gt;</description>
      <pubDate>Mon, 29 May 2017 09:48:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/asym-routing-and-policies/m-p/158595#M51911</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2017-05-29T09:48:26Z</dc:date>
    </item>
    <item>
      <title>Re: Asym routing and policies</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/asym-routing-and-policies/m-p/158606#M51914</link>
      <description>&lt;P&gt;true true, disabling non-syn protection is never a good idea and should only be enabled to temporarily solve an issue or for troubleshooting&lt;/P&gt;</description>
      <pubDate>Mon, 29 May 2017 13:32:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/asym-routing-and-policies/m-p/158606#M51914</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2017-05-29T13:32:50Z</dc:date>
    </item>
    <item>
      <title>Re: Asym routing and policies</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/asym-routing-and-policies/m-p/158640#M51927</link>
      <description>&lt;P&gt;Ideally, I would create a connection between the peering routers at the two DC upstream of the PA clusters.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Have the PA cluster at each DC assume primary routing for particular subnets or even specific addresses that are published to the internet. &amp;nbsp;Advertise these specific routes up to the peering routers.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now both peering routers have specific internal routes for the services published to the internet and that will be the path taken no matter which ISP or DC the traffic arrives on.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Not the assymetry issue will only arise during a failover situation where the prefix or address has to move from DC to DC. &amp;nbsp;And the need to re-establish the session will be far less disruptive and only need to happen at the time of failover.&lt;/P&gt;</description>
      <pubDate>Mon, 29 May 2017 17:07:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/asym-routing-and-policies/m-p/158640#M51927</guid>
      <dc:creator>pulukas</dc:creator>
      <dc:date>2017-05-29T17:07:56Z</dc:date>
    </item>
    <item>
      <title>Re: Asym routing and policies</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/asym-routing-and-policies/m-p/158658#M51935</link>
      <description>&lt;P&gt;So that seems to be a work around a failing of the PA's&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Sorry i think the mantra asym routing is bad is well not the issue. I think I outline a situation where it can happen quite easily.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Happy to accept that the PA don't handle it the best and I will have to take that into account when I build out my network.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But thanks for the input, definitely learning alot&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 29 May 2017 22:24:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/asym-routing-and-policies/m-p/158658#M51935</guid>
      <dc:creator>Alex_Samad</dc:creator>
      <dc:date>2017-05-29T22:24:58Z</dc:date>
    </item>
    <item>
      <title>Re: Asym routing and policies</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/asym-routing-and-policies/m-p/158759#M51977</link>
      <description>&lt;P&gt;Just to clarify, &amp;nbsp;the reason asymmetrical routing is bad is because the PA is doing deep packet inspection for the entire flow. &amp;nbsp;In order to fully protect for threats the PA needs to see all of the packets. &amp;nbsp;When you have asymmetrical routing the each side is only seeing some of the packets and neither has the full picture to evaluate and block the threats.&lt;/P&gt;</description>
      <pubDate>Wed, 31 May 2017 00:52:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/asym-routing-and-policies/m-p/158759#M51977</guid>
      <dc:creator>pulukas</dc:creator>
      <dc:date>2017-05-31T00:52:23Z</dc:date>
    </item>
    <item>
      <title>Re: Asym routing and policies</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/asym-routing-and-policies/m-p/161519#M52543</link>
      <description>&lt;P&gt;Ok some across an interesting problem around asym routing&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;again pa1 pa2 ... active active HA config&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;vlan 13 is my OSPF network&amp;nbsp;&lt;/P&gt;&lt;P&gt;vlan 17 is my client network dgw (10.0.17.1) is a HA arp load sharing ip&amp;nbsp;&lt;/P&gt;&lt;P&gt;loopback.2 is my global protect ip -&amp;gt; this is a /32 and is a HA fail over bound to primary.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have a pc on vlan 17, it just happens to be hashed to pa2 (backup) dgw.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So packet destined for GP (global protect portal), go pc -&amp;gt; PA2 VLAN17 interface -&amp;gt; vlan 13 (this is the interface is learns about the address via OSPF ) -&amp;gt; PA1 vlan 13 -&amp;gt; loopback.2 from there there return path is loopback.2 -&amp;gt; out vlan 17&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;And I am having issues with packets not making it to some &amp;nbsp;clients&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I can't make global protect portal on a arp load share ... So what to do ...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 16 Jun 2017 06:00:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/asym-routing-and-policies/m-p/161519#M52543</guid>
      <dc:creator>Alex_Samad</dc:creator>
      <dc:date>2017-06-16T06:00:27Z</dc:date>
    </item>
    <item>
      <title>Re: Asym routing and policies</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/asym-routing-and-policies/m-p/162408#M52695</link>
      <description>&lt;P&gt;I am having troube picturing the path here.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is loopback.2 in the same zone as vlan 13?&lt;/P&gt;</description>
      <pubDate>Tue, 20 Jun 2017 22:54:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/asym-routing-and-policies/m-p/162408#M52695</guid>
      <dc:creator>pulukas</dc:creator>
      <dc:date>2017-06-20T22:54:35Z</dc:date>
    </item>
    <item>
      <title>Re: Asym routing and policies</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/asym-routing-and-policies/m-p/162411#M52696</link>
      <description>&lt;P&gt;No loopback.2 is not part of the same zone.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;does zoning influence routing ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I will see if I can describe it again, maybe better.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2 PA - active active&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1 trunk (LACP) into the switch ae.1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2 vlans'&lt;/P&gt;&lt;P&gt;213 zone ospf&lt;/P&gt;&lt;P&gt;217 zone app server&lt;/P&gt;&lt;P&gt;loopback.1 zone ospf - routerid&amp;nbsp;&lt;/P&gt;&lt;P&gt;loopback.2 zone inf - Global protect portal - HA IP but fail over , bound to primary no ip arp loading sharing&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;213 - no HA active ip. &amp;nbsp;but active OSPF interface&lt;/P&gt;&lt;P&gt;217 - HA active ip, enabled ospf but passive &amp;nbsp;ip - arp load sharing&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;this is duplicated on the PA's - pa1 and pa2 ... pa1 is the active primary and pa2 - active backup&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;if I have a host PC in vlan 217 that happens to use PA2 , because of the algo used to share.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;A packet going from the PC to GP portal goes like this&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;PC -&amp;gt; vlan 217 -&amp;gt; PA2 -&amp;gt; out via vlan 213 - because OSPF routes this way -&amp;gt; PA1 -&amp;gt; loopback.2&lt;/P&gt;&lt;P&gt;return path&lt;/P&gt;&lt;P&gt;loopback.2 -&amp;gt; vlan 217 because its directly attached to vlan217.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 20 Jun 2017 23:03:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/asym-routing-and-policies/m-p/162411#M52696</guid>
      <dc:creator>Alex_Samad</dc:creator>
      <dc:date>2017-06-20T23:03:46Z</dc:date>
    </item>
    <item>
      <title>Re: Asym routing and policies</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/asym-routing-and-policies/m-p/163141#M52847</link>
      <description>&lt;P&gt;Found best practise setup for OSPF Active / Active&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/Configuration-Articles/How-to-Configure-OSPF/ta-p/52283?attachment-id=2880" target="_blank"&gt;https://live.paloaltonetworks.com/t5/Configuration-Articles/How-to-Configure-OSPF/ta-p/52283?attachment-id=2880&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;With asym&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 25 Jun 2017 07:07:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/asym-routing-and-policies/m-p/163141#M52847</guid>
      <dc:creator>Alex_Samad</dc:creator>
      <dc:date>2017-06-25T07:07:51Z</dc:date>
    </item>
  </channel>
</rss>

