<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Dual ingress ISP setup vs Juniper SRX in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/dual-ingress-isp-setup-vs-juniper-srx/m-p/229252#M65911</link>
    <description>&lt;P&gt;Thanks for the diagram.&amp;nbsp; I think you are verifying you are using PBF.&amp;nbsp; You will need to remove PBF and configure the PAN the same way you do the SRX.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;PAN also allows you to create virtual routers and put the second upstream in a separate VR rather than use the PBF method for dual ISP.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 03 Sep 2018 12:11:00 GMT</pubDate>
    <dc:creator>pulukas</dc:creator>
    <dc:date>2018-09-03T12:11:00Z</dc:date>
    <item>
      <title>Dual ingress ISP setup vs Juniper SRX</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dual-ingress-isp-setup-vs-juniper-srx/m-p/228985#M65815</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; there is a fundamental difference between Juniper SRX and Palo Alto Firewalls regarding how reverse route look up occurs&lt;/P&gt;&lt;P&gt;for a session. With Juniper SRX, if I have two ingress traffic via two different ISPs, I can put each into its own routing instance&lt;/P&gt;&lt;P&gt;and Juniper forwards the reverse traffic back via ingress ISP. It is very simple and elegant solution I think.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; However on PAN, reverse traffic e.g SYN+ACK requires another routing lookup which ruins this scenario as look up occurs&lt;/P&gt;&lt;P&gt;on another routing instance and response exits via what ever the default gateway is.&lt;/P&gt;&lt;P&gt;As far as I can see PAN has "enforce symmetric return" which is way limited per platform so you can't rely on this or some PBF&lt;/P&gt;&lt;P&gt;but it isn't comparible to what Juniper does. I wonder if there is anything on the roadmap or any other workaround which we can accomplish this on PAN. Hoping it isn't wishful thinking.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thanks.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 31 Aug 2018 08:27:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dual-ingress-isp-setup-vs-juniper-srx/m-p/228985#M65815</guid>
      <dc:creator>tirexxerit</dc:creator>
      <dc:date>2018-08-31T08:27:51Z</dc:date>
    </item>
    <item>
      <title>Re: Dual ingress ISP setup vs Juniper SRX</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dual-ingress-isp-setup-vs-juniper-srx/m-p/229104#M65867</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/80006"&gt;@tirexxerit&lt;/a&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For roadmap information you need to talk to your SE and you also have to sign a NDA with PaloAlto Networks. But even then the chance is not really high that you will get the information you ask for. If you intend to buy 20 PA-7080 where you would need this juniper-behaviour/feature, then the situation probably looks a little bit different &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt; &lt;span class="lia-unicode-emoji" title=":face_with_tongue:"&gt;😛&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But back to your problem: In what way is the enforce symwtric return future limited. From what you describe in your post, to me it seems like this feature would do exactly what you ask for. Or I don't fully understand your post.&lt;/P&gt;&lt;P&gt;On a paloalto firewall you could also configure the two interfaces in to different virtual routers which would eliminate the need for PBF (but requires some additional steps if the two virtual routers both connect to the same networks)&lt;/P&gt;</description>
      <pubDate>Sat, 01 Sep 2018 14:27:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dual-ingress-isp-setup-vs-juniper-srx/m-p/229104#M65867</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2018-09-01T14:27:18Z</dc:date>
    </item>
    <item>
      <title>Re: Dual ingress ISP setup vs Juniper SRX</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dual-ingress-isp-setup-vs-juniper-srx/m-p/229105#M65868</link>
      <description>&lt;P&gt;Not sure I'm reading your topology correctly but I think you can do the same in PAN as you have in the SRX.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;PAN also supports having the second ISP in a virtual router and if that is setup then the route lookup for the return path would stay on the same ISP as it does with your SRX configuration.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I think you might have the Policy Based routing method for dual ISP setup on the PAN instead of the separate VR?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 01 Sep 2018 14:59:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dual-ingress-isp-setup-vs-juniper-srx/m-p/229105#M65868</guid>
      <dc:creator>pulukas</dc:creator>
      <dc:date>2018-09-01T14:59:47Z</dc:date>
    </item>
    <item>
      <title>Re: Dual ingress ISP setup vs Juniper SRX</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dual-ingress-isp-setup-vs-juniper-srx/m-p/229205#M65903</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; Here is a simplified topology. You have a server which may need to receive request&lt;/P&gt;&lt;P&gt;from two different IP blocks (each on two different ISPs) and PAN does DNAT towards&lt;/P&gt;&lt;P&gt;this server. I am saying I can do it on SRX because when I put ISP1 and ISP2 on two different VRs&lt;/P&gt;&lt;P&gt;SRX does the reverse look up on the VR that the first packet arrived hence flow already knows&lt;/P&gt;&lt;P&gt;how to return it back via ISP2 or 1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; but on PAN, reverse routing lookup is not done on the ingress VR. At least this is what I can&lt;/P&gt;&lt;P&gt;see on the flow trace. So on PAN if SYN packet entered via ISP2 and if PAN's default gateway is ISP1 then&lt;/P&gt;&lt;P&gt;serverA's SYN+ACK exits via ISP1 not ISP2.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; As for symmetric return, correct me if I am wrong but this is based on keeping ARP per source address.&lt;/P&gt;&lt;P&gt;I tested this and when you receive a request from external IP, it puts an ARP entry in its PBF pool and it is&lt;/P&gt;&lt;P&gt;limited per platform. So if you exceed your ARP capacity you are done. (I believe so)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Via PBF, I can only instruct PAN to return serverA's packets via ISP2 instead of default gateway but this doesn't&lt;/P&gt;&lt;P&gt;give me the flexibility I have on SRX i.e to respond via each ISP simultaneously.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In this scenario, you are saying I should be able to achieve it?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thanks.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="pan-dual-isp.png" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/16415i9A6445AD9D88FDD5/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="pan-dual-isp.png" alt="pan-dual-isp.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 03 Sep 2018 08:30:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dual-ingress-isp-setup-vs-juniper-srx/m-p/229205#M65903</guid>
      <dc:creator>tirexxerit</dc:creator>
      <dc:date>2018-09-03T08:30:06Z</dc:date>
    </item>
    <item>
      <title>Re: Dual ingress ISP setup vs Juniper SRX</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dual-ingress-isp-setup-vs-juniper-srx/m-p/229215#M65907</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/80006"&gt;@tirexxerit&lt;/a&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do you know how many IPs need to connecr over one specific ISP? You are right about the capacity per platform. On a PA-220 this number is 750. So it depends how many concurrent sessions you have.&lt;/P&gt;&lt;P&gt;Do you need the have the IPs on ISP1 available on ISP2 when ISP1 fails and do you need the server to see the real source IP? If this isn't a requirement you could assign dedicated VRs for each ISP and NAT the connection on the PA, so intenally you don't get routing problems for the reverse traffic - in case the capacity of return mac entries isn't enough on the platform you use/plan to use to support the amount of concurrent connections you need.&lt;/P&gt;</description>
      <pubDate>Mon, 03 Sep 2018 09:32:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dual-ingress-isp-setup-vs-juniper-srx/m-p/229215#M65907</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2018-09-03T09:32:05Z</dc:date>
    </item>
    <item>
      <title>Re: Dual ingress ISP setup vs Juniper SRX</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dual-ingress-isp-setup-vs-juniper-srx/m-p/229222#M65908</link>
      <description>&lt;P&gt;As the numbers grow and even the current source addresses are more than our current platform, it isn't really scalable actually.&lt;/P&gt;&lt;P&gt;I am not sure about server side but NAT on the VR was one of the options but I think it is not a nice one. There may be 300-400K sessions which we may need to source NAT (which might grow as well)and when there is an issue about NAT or pools that will bring more operational complexity I think.&amp;nbsp;&lt;/P&gt;&lt;P&gt;From the discussions, I can see there is no built-in solution and the only automated workaround is NAT on the VRs&lt;/P&gt;&lt;P&gt;if we don't touch the server side. I will also reach out to PAN as well to see if they can implement such feature like SRX other than symmetric return &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;In the past, I had found SRX's behavior of reverse look-up design a bit odd but now I see in this particular scenario, it is near perfect.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thanks.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 03 Sep 2018 10:04:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dual-ingress-isp-setup-vs-juniper-srx/m-p/229222#M65908</guid>
      <dc:creator>tirexxerit</dc:creator>
      <dc:date>2018-09-03T10:04:40Z</dc:date>
    </item>
    <item>
      <title>Re: Dual ingress ISP setup vs Juniper SRX</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dual-ingress-isp-setup-vs-juniper-srx/m-p/229252#M65911</link>
      <description>&lt;P&gt;Thanks for the diagram.&amp;nbsp; I think you are verifying you are using PBF.&amp;nbsp; You will need to remove PBF and configure the PAN the same way you do the SRX.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;PAN also allows you to create virtual routers and put the second upstream in a separate VR rather than use the PBF method for dual ISP.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 03 Sep 2018 12:11:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dual-ingress-isp-setup-vs-juniper-srx/m-p/229252#M65911</guid>
      <dc:creator>pulukas</dc:creator>
      <dc:date>2018-09-03T12:11:00Z</dc:date>
    </item>
    <item>
      <title>Re: Dual ingress ISP setup vs Juniper SRX</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dual-ingress-isp-setup-vs-juniper-srx/m-p/229254#M65912</link>
      <description>&lt;P&gt;PBF is for to solve a particular problem but I just made a test in my lab without PBF&lt;/P&gt;&lt;P&gt;which confirms my findings. Below is an ICMP request reply. ICMP request&lt;/P&gt;&lt;P&gt;creates the session and route lookup is done on the ingress VR3(ISP1)&lt;/P&gt;&lt;P&gt;and return packet's route lookup is done on VR1(default) and goes to a different gateway/ISP than&lt;/P&gt;&lt;P&gt;the packet initially arrived.&lt;/P&gt;&lt;P&gt;If putting both ISPs on their separate VRs worked, return packet should have done the route lookup on VR3&lt;/P&gt;&lt;P&gt;not on VR1 right?&lt;/P&gt;&lt;P&gt;&amp;nbsp;I am using PBF if I want to manipulate default routing decision which is required in some scenarios.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;== 2018-09-03 14:44:43.858 +0200 ==
Packet received at fastpath stage, tag 59941, type ATOMIC
Packet info: len 102 port 18 interface 264 vsys 1
  wqe index 81832 packet 0x0xc001156400, HA: 0
Packet decoded dump:
L2:     00:0c:29:80:5c:29-&amp;gt;00:0c:29:20:13:9f, type 0x0800
IP:     155.1.1.2-&amp;gt;192.168.234.3, protocol 1
        version 4, ihl 5, tos 0x00, len 84,
        id 28245, frag_off 0x4000, ttl 63, checksum 42118(0x86a4)
ICMP:   type 8, code 0, checksum 59428, id 1619, seq 109
Flow fastpath, session 59941
IP checksum valid
2018-09-03 14:44:43.858 +0200  pan_flow_process_fastpath(src/pan_flow_proc.c:3548): SESSION-DSCP: set session DSCP: 0x00
Forwarding lookup, ingress interface 264  
L3 mode, virtual-router 3
&lt;STRONG&gt;&lt;FONT color="#FF0000"&gt;Route lookup in virtual-router 3, IP 192.168.234.3&lt;/FONT&gt;&lt;/STRONG&gt;
Route found, interface ethernet1/3.235, zone 1, nexthop 192.168.235.6
Resolve ARP for IP 192.168.235.6 on interface ethernet1/3.235
ARP entry found on interface 256




== 2018-09-03 14:44:43.868 +0200 ==
Packet received at fastpath stage, tag 59941, type ATOMIC
Packet info: len 102 port 18 interface 256 vsys 1
  wqe index 80605 packet 0x0xc006970700, HA: 0
Packet decoded dump:
L2:     00:0c:29:80:5c:29-&amp;gt;00:0c:29:20:13:9f, type 0x0800
IP:     192.168.234.3-&amp;gt;155.1.1.2, protocol 1
        version 4, ihl 5, tos 0x00, len 84,
        id 8324, frag_off 0x0000, ttl 63, checksum 30228(0x1476)
ICMP:   type 0, code 0, checksum 61476, id 1619, seq 109
Flow fastpath, session 59941
IP checksum valid
Forwarding lookup, ingress interface 256
L3 mode, virtual-router 1
&lt;STRONG&gt;&lt;FONT color="#FF0000"&gt;Route lookup in virtual-router 1, IP 155.1.1.2&lt;/FONT&gt;&lt;/STRONG&gt;
Route found, interface ethernet1/1, zone 2, nexthop 10.1.1.1
Packet forwarded to different zone 2 than zone 7 in session 59941
Packet dropped, forwarding does not match security rule

Packet dropped, pan_flow_ingress_parse error&lt;/PRE&gt;</description>
      <pubDate>Mon, 03 Sep 2018 12:52:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dual-ingress-isp-setup-vs-juniper-srx/m-p/229254#M65912</guid>
      <dc:creator>tirexxerit</dc:creator>
      <dc:date>2018-09-03T12:52:05Z</dc:date>
    </item>
    <item>
      <title>Re: Dual ingress ISP setup vs Juniper SRX</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dual-ingress-isp-setup-vs-juniper-srx/m-p/229306#M65920</link>
      <description>&lt;P&gt;Just do a source nat to interface on the inbound traffic flow on vr3.&amp;nbsp; The the return traffic in vr1 will come back to vr3 match the session and return via the same ISP.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 03 Sep 2018 23:49:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dual-ingress-isp-setup-vs-juniper-srx/m-p/229306#M65920</guid>
      <dc:creator>pulukas</dc:creator>
      <dc:date>2018-09-03T23:49:52Z</dc:date>
    </item>
    <item>
      <title>Re: Dual ingress ISP setup vs Juniper SRX</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dual-ingress-isp-setup-vs-juniper-srx/m-p/229348#M65928</link>
      <description>&lt;P&gt;thanks for the feedback Steve. We had discussed this but not sure there maybe some scalibility issues on 500K sessions&lt;/P&gt;&lt;P&gt;and need to check if servers have any dependency on source IP or not.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 04 Sep 2018 07:23:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dual-ingress-isp-setup-vs-juniper-srx/m-p/229348#M65928</guid>
      <dc:creator>tirexxerit</dc:creator>
      <dc:date>2018-09-04T07:23:22Z</dc:date>
    </item>
    <item>
      <title>Re: Dual ingress ISP setup vs Juniper SRX</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dual-ingress-isp-setup-vs-juniper-srx/m-p/329681#M83673</link>
      <description>&lt;P&gt;symmetric return ARP entry is for next-hop only. Why do you need to add ARP for all those ISP side IPs?&lt;/P&gt;</description>
      <pubDate>Sun, 24 May 2020 19:10:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dual-ingress-isp-setup-vs-juniper-srx/m-p/329681#M83673</guid>
      <dc:creator>usomal</dc:creator>
      <dc:date>2020-05-24T19:10:22Z</dc:date>
    </item>
  </channel>
</rss>

