<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Policy based forwarding for traffic filtering in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/policy-based-forwarding-for-traffic-filtering/m-p/8085#M5961</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I believe you cannot do PBF by destination interface or zone because the device only knows the egress interface after consulting the routing table, but PBF is performed before routing.&amp;nbsp; You can configure PBF by destination address, however.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kelly&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 30 Mar 2011 02:04:14 GMT</pubDate>
    <dc:creator>kbrazil</dc:creator>
    <dc:date>2011-03-30T02:04:14Z</dc:date>
    <item>
      <title>Policy based forwarding for traffic filtering</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/policy-based-forwarding-for-traffic-filtering/m-p/8081#M5957</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm trying to set up a PBF rule to take all my inside traffic, filter it through a security appliance, and then continue out to the Internet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Without the rule applied, traffic works fine.&amp;nbsp; I can hit the Internet and all is well.&amp;nbsp; With the rule enabled, all packets are sent to the security appliance, which then sends it back to the PAN, which then sends it back to the security appliance, and so on until the TTL expires.&amp;nbsp; A packet capture from the security appliance shows packets originating from the client PC's IP and going to the real destination IP, as expected.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here's the relevent portion of my device setup:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;eth1/1 - [Outside Internet connection]&amp;nbsp; (Zone: Outside)&lt;/P&gt;&lt;P&gt;eth1/2 - [DMZ]&amp;nbsp; (Zone: DMZ)&lt;/P&gt;&lt;P&gt;eth1/3 - 10.2.42.1/24&amp;nbsp; (Zone:&amp;nbsp; Inside)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;eth1/7 - 10.2.43.1/24&amp;nbsp; (Zone:&amp;nbsp; Inside)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;All my inside clients are on a switch off of eth1/3 in the 10.2.42.0/24 network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The security appliance is at 10.2.43.20/24, hanging off of eth1/7.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The PBF rule takes any traffic from interface 1/3 and forwards it to 10.2.43.20 through interface 1/7.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The security appliance's default gateway is 10.2.43.1.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Traffic is looping from 10.2.43.1 -&amp;gt; 10.2.43.20 -&amp;gt; 10.2.43.1 -&amp;gt; 10.2.43.20 -&amp;gt; 10.2.43.1....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The only static route is for 0.0.0.0/0 to the outside router.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So, why is the PAN forwarding packets back to the security appliance?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 30 Mar 2011 01:01:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/policy-based-forwarding-for-traffic-filtering/m-p/8081#M5957</guid>
      <dc:creator>nwallette</dc:creator>
      <dc:date>2011-03-30T01:01:39Z</dc:date>
    </item>
    <item>
      <title>Re: Policy based forwarding for traffic filtering</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/policy-based-forwarding-for-traffic-filtering/m-p/8082#M5958</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi there,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can we get a screen capture of your PBF policy?&amp;nbsp; If the policy is correct, it might be a bug and I imagine you could work around it by putting e1/7 into a new zone and using the source zone in the policy instead of source interface.&amp;nbsp; Alternatively you could exempt PBF forwarding for traffic sourced from 10.2.43.20 with another PBF rule above the existing rule.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kelly&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 30 Mar 2011 01:24:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/policy-based-forwarding-for-traffic-filtering/m-p/8082#M5958</guid>
      <dc:creator>kbrazil</dc:creator>
      <dc:date>2011-03-30T01:24:54Z</dc:date>
    </item>
    <item>
      <title>Re: Policy based forwarding for traffic filtering</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/policy-based-forwarding-for-traffic-filtering/m-p/8083#M5959</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sent an email -- but for completeness, here's the rule:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Source Zone / I.f.:&amp;nbsp; ethernet 1/3&lt;/P&gt;&lt;P&gt;Source Address:&amp;nbsp; any&lt;/P&gt;&lt;P&gt;Source User:&amp;nbsp; any&lt;/P&gt;&lt;P&gt;Destination Address:&amp;nbsp; any&lt;/P&gt;&lt;P&gt;Application:&amp;nbsp; any&lt;/P&gt;&lt;P&gt;Service:&amp;nbsp; any&lt;/P&gt;&lt;P&gt;Action:&amp;nbsp; Forward&lt;/P&gt;&lt;P&gt;Forwarding Egress I/F:&amp;nbsp; ethernet 1/7&lt;/P&gt;&lt;P&gt;Forwarding Next Hop:&amp;nbsp; 10.2.43.20&lt;/P&gt;&lt;P&gt;Monitoring Profile:&amp;nbsp; Failover until Restored&lt;/P&gt;&lt;P&gt;Monitoring Target:&amp;nbsp; 10.2.43.20&lt;/P&gt;&lt;P&gt;Disable if Unreachable:&amp;nbsp; Yes&lt;/P&gt;&lt;P&gt;Schedule:&amp;nbsp; None&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;FYI, this is PanOS release 3.1.8 on a single (non-HA) PAN 500.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Edit:&amp;nbsp; P.S., out of curiosity, why is there no "Destination Zone / I.F." field?&amp;nbsp; Ideally, we would only filter traffic from inside clients going to the Internet.&amp;nbsp; Or at some of our sites, we would use the external appliance to do deduplication for traffic traversing site-to-site VPNs (Inside to Tunnel.)&amp;nbsp; But in this setup, we're forced to filter traffic going to/from the Inside interface to anywhere, even if it's just another subnet.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 30 Mar 2011 01:47:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/policy-based-forwarding-for-traffic-filtering/m-p/8083#M5959</guid>
      <dc:creator>nwallette</dc:creator>
      <dc:date>2011-03-30T01:47:42Z</dc:date>
    </item>
    <item>
      <title>Re: Policy based forwarding for traffic filtering</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/policy-based-forwarding-for-traffic-filtering/m-p/8084#M5960</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The policy looks good.&amp;nbsp; I think this may be working as designed - when the first packet hits the device a flow is created.&amp;nbsp; I think packets returning from the security device are matched against the original flow since the source and destination zones match.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I imagine if you do a "show session id &amp;lt;xxx&amp;gt;" for the session you will see the PBF enabled which probably applies no matter what interface the packet ingresses after the first match.&amp;nbsp; Another way to look at it is the packet is seen as the same packet that matched the PBF policy the first time the firewall saw it, so it keeps applying the PBF policy to it, even though the packet is now ingressing on another interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think one way to get out of this may be to change the zone names for both internal interfaces and re-do some of your PBF and Security policy.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think the alternative option I provided in my post above may not work since the rule will never match (since the packet is already applied to an existing flow).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kelly&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 30 Mar 2011 02:00:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/policy-based-forwarding-for-traffic-filtering/m-p/8084#M5960</guid>
      <dc:creator>kbrazil</dc:creator>
      <dc:date>2011-03-30T02:00:48Z</dc:date>
    </item>
    <item>
      <title>Re: Policy based forwarding for traffic filtering</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/policy-based-forwarding-for-traffic-filtering/m-p/8085#M5961</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I believe you cannot do PBF by destination interface or zone because the device only knows the egress interface after consulting the routing table, but PBF is performed before routing.&amp;nbsp; You can configure PBF by destination address, however.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kelly&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 30 Mar 2011 02:04:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/policy-based-forwarding-for-traffic-filtering/m-p/8085#M5961</guid>
      <dc:creator>kbrazil</dc:creator>
      <dc:date>2011-03-30T02:04:14Z</dc:date>
    </item>
    <item>
      <title>Re: Policy based forwarding for traffic filtering</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/policy-based-forwarding-for-traffic-filtering/m-p/8086#M5962</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So basically, this can't be used as an in-line filter, because the packet (approved by our appliance) is going to match the PBF rule for the life of its session?&amp;nbsp; I assume the intended use is to dispatch packets to alternate gateways depending on some characteristic, not as a "catch all" with selective processing like we're trying to do..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That's unfortunate for my case, but I see the thought process behind it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, thanks for the reply on the destination routing.&amp;nbsp; That makes sense.&amp;nbsp; Again, I think we're applying this feature in a way that was never intended.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 30 Mar 2011 02:08:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/policy-based-forwarding-for-traffic-filtering/m-p/8086#M5962</guid>
      <dc:creator>nwallette</dc:creator>
      <dc:date>2011-03-30T02:08:13Z</dc:date>
    </item>
    <item>
      <title>Re: Policy based forwarding for traffic filtering</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/policy-based-forwarding-for-traffic-filtering/m-p/8087#M5963</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I think using different zones for interfaces 1/3 and 1/7 might make this work.&amp;nbsp; This way the firewall will see the packet coming from a different zone and will not match the original PBF flow.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just be careful about the return traffic, though.&amp;nbsp; You may need some creative security policies to make this work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You might even consider having the external device not send the traffic back through the firewall, if possible.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kelly&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 30 Mar 2011 02:18:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/policy-based-forwarding-for-traffic-filtering/m-p/8087#M5963</guid>
      <dc:creator>kbrazil</dc:creator>
      <dc:date>2011-03-30T02:18:03Z</dc:date>
    </item>
    <item>
      <title>Re: Policy based forwarding for traffic filtering</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/policy-based-forwarding-for-traffic-filtering/m-p/8088#M5964</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Need to create a rule above the PBF for the Security Appliance to avoid the loop.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Source Zone / I.f.:&amp;nbsp; ethernet 1/3&lt;/P&gt;&lt;P&gt;Source Address:&amp;nbsp; 10.2.43.20&lt;/P&gt;&lt;P&gt;Source User:&amp;nbsp; any&lt;/P&gt;&lt;P&gt;Destination Address:&amp;nbsp; any&lt;/P&gt;&lt;P&gt;Application:&amp;nbsp; any&lt;/P&gt;&lt;P&gt;Service:&amp;nbsp; any&lt;/P&gt;&lt;P&gt;Action:&amp;nbsp; no-PBF&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 30 Mar 2011 03:50:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/policy-based-forwarding-for-traffic-filtering/m-p/8088#M5964</guid>
      <dc:creator>blacksan</dc:creator>
      <dc:date>2011-03-30T03:50:12Z</dc:date>
    </item>
    <item>
      <title>Re: Policy based forwarding for traffic filtering</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/policy-based-forwarding-for-traffic-filtering/m-p/8089#M5965</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Well, just for completeness, I tried setting up the security appliance on its own zone.&amp;nbsp; That did not help.&amp;nbsp; I also put the explicit "no-pbf" rule above the PBF rule.&amp;nbsp; It no longer gets stuck in a routing loop, but instead I get this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;10.2.42.100 (my laptop IP)&lt;/P&gt;&lt;P&gt;no reply (eth 1/3, my gateway)&lt;/P&gt;&lt;P&gt;10.2.43.1&amp;nbsp; (eth 1/7 gateway)&lt;/P&gt;&lt;P&gt;10.2.43.20&amp;nbsp; (security appliance)&lt;/P&gt;&lt;P&gt;10.2.43.1&amp;nbsp; (eth 1/7 again)&lt;/P&gt;&lt;P&gt;no reply&lt;/P&gt;&lt;P&gt;no reply&lt;/P&gt;&lt;P&gt;no reply&lt;/P&gt;&lt;P&gt;.&lt;/P&gt;&lt;P&gt;.&lt;/P&gt;&lt;P&gt;.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So it looks like it's just getting dropped at the PAN interface despite the fact that traffic originating on the 10.2.43.0 subnet can hit the Internet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It looks like we'll just have to apply our filtering policies either by hanging the S.A. off our Juniper Layer 3 switches instead, or between the Juniper and PAN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the (FAST) suggestions, everyone.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 30 Mar 2011 22:49:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/policy-based-forwarding-for-traffic-filtering/m-p/8089#M5965</guid>
      <dc:creator>nwallette</dc:creator>
      <dc:date>2011-03-30T22:49:16Z</dc:date>
    </item>
  </channel>
</rss>

