<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: OSPF, VPN, routing and distribution in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ospf-vpn-routing-and-distribution/m-p/233208#M66891</link>
    <description>&lt;P&gt;The data center devices are also Palos, and there are other areas, as well as some BGP going on behind them (the diagram is drastically simplified). When I tested with the lab devices, I created a stub zone between the three, and found that it the DCs could still see each other through the stub and they stopped inter-zone advertising so the remote could only see what was in the area. At this point I'm looking into non-routing solutions (ie. VPN tunnel failover options, or feasibility of a single link for the remote) as I'm realizing that there may not be the tools available to manage this in Palo routing.&lt;/P&gt;</description>
    <pubDate>Mon, 01 Oct 2018 15:16:23 GMT</pubDate>
    <dc:creator>jessica-davis</dc:creator>
    <dc:date>2018-10-01T15:16:23Z</dc:date>
    <item>
      <title>OSPF, VPN, routing and distribution</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ospf-vpn-routing-and-distribution/m-p/232567#M66709</link>
      <description>&lt;P&gt;I'm trying to solve a routing conundrum to improve a remote site and provide redundancy, and hoping others may have some solutions. The short version is that we have the remote site with basic commodity internet using VPN to connect back to two datacenters. The datacenters in turn have direct links to each other, and all are running OSPF.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The issue - datacenter 1 and datacenter 2 use area 0 for all inter-site connections. When adding the remote site to this with the VPN connections, everything appears fine, but if there is a disruption to the link between datacenters, the remote is advertising the routes between them. In testing, even though everything was theoretically clear we experienced issues as the remote advertised the paths to each other, causing issues with communications between the datacenters.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I tested with dedicating a stub area for the VPN tunnels to the remote, however, it appears that we lose inter-area OSPF when this is done and you can't define an OSPF redistribution rule for OSPF, so everything known behind the datacenter palos is lost.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Below is a simplified diagram of the network with placeholder IPs:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="PAN OSPF.PNG" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/16799iA9917BF88A414150/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="PAN OSPF.PNG" alt="PAN OSPF.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 26 Sep 2018 21:03:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ospf-vpn-routing-and-distribution/m-p/232567#M66709</guid>
      <dc:creator>jessica-davis</dc:creator>
      <dc:date>2018-09-26T21:03:29Z</dc:date>
    </item>
    <item>
      <title>Re: OSPF, VPN, routing and distribution</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ospf-vpn-routing-and-distribution/m-p/232710#M66759</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;The way we solved our issue with this is to weight the OSPF links to the DR data center to force the connection. We made the remote office also area 0 to keep things simple and not have issues with LSA's. so our primary link is the default and we made the cost of the DR link much higher, like 10000 or if it was the 3rd backup link 20000.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/16821i207A63635CAE49C8/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope that helps!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 27 Sep 2018 14:20:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ospf-vpn-routing-and-distribution/m-p/232710#M66759</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2018-09-27T14:20:09Z</dc:date>
    </item>
    <item>
      <title>Re: OSPF, VPN, routing and distribution</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ospf-vpn-routing-and-distribution/m-p/232763#M66775</link>
      <description>&lt;P&gt;That does help a bit to make sure that it isn't a preferred route under normal conditions.&amp;nbsp; The problem I'm looking at is that in the case of loss of the MPLS connection between DC1 and DC2, the DCs see a route through the remote site to each other. Suffice to say, the remote site doesn't have the bandwidth to handle DC to DC traffic. Even setting the metric to max (65535) and the priority to max (255), if I cut that link in the lab the two DCs route through the VPN. The preference would be that the DCs not be able to see each other through the remote.&lt;/P&gt;</description>
      <pubDate>Thu, 27 Sep 2018 17:09:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ospf-vpn-routing-and-distribution/m-p/232763#M66775</guid>
      <dc:creator>jessica-davis</dc:creator>
      <dc:date>2018-09-27T17:09:49Z</dc:date>
    </item>
    <item>
      <title>Re: OSPF, VPN, routing and distribution</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ospf-vpn-routing-and-distribution/m-p/232775#M66779</link>
      <description>&lt;P&gt;We had the same concerns. How about a VPN tunnel between the DC's as a backup to the MPLS? That was our solution. That way it uses the internet circuit and not the remote offices.&lt;/P&gt;</description>
      <pubDate>Thu, 27 Sep 2018 17:41:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ospf-vpn-routing-and-distribution/m-p/232775#M66779</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2018-09-27T17:41:03Z</dc:date>
    </item>
    <item>
      <title>Re: OSPF, VPN, routing and distribution</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ospf-vpn-routing-and-distribution/m-p/232828#M66791</link>
      <description>&lt;P&gt;Are the data center OSPF devices PAs also?&lt;/P&gt;&lt;P&gt;When you tried creating the branch as a stub, what did you configure on all devices?&lt;/P&gt;</description>
      <pubDate>Thu, 27 Sep 2018 21:30:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ospf-vpn-routing-and-distribution/m-p/232828#M66791</guid>
      <dc:creator>rmfalconer</dc:creator>
      <dc:date>2018-09-27T21:30:23Z</dc:date>
    </item>
    <item>
      <title>Re: OSPF, VPN, routing and distribution</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ospf-vpn-routing-and-distribution/m-p/233208#M66891</link>
      <description>&lt;P&gt;The data center devices are also Palos, and there are other areas, as well as some BGP going on behind them (the diagram is drastically simplified). When I tested with the lab devices, I created a stub zone between the three, and found that it the DCs could still see each other through the stub and they stopped inter-zone advertising so the remote could only see what was in the area. At this point I'm looking into non-routing solutions (ie. VPN tunnel failover options, or feasibility of a single link for the remote) as I'm realizing that there may not be the tools available to manage this in Palo routing.&lt;/P&gt;</description>
      <pubDate>Mon, 01 Oct 2018 15:16:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ospf-vpn-routing-and-distribution/m-p/233208#M66891</guid>
      <dc:creator>jessica-davis</dc:creator>
      <dc:date>2018-10-01T15:16:23Z</dc:date>
    </item>
    <item>
      <title>Re: OSPF, VPN, routing and distribution</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ospf-vpn-routing-and-distribution/m-p/233460#M66945</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;What about a VPN over the internet between the two PAN's. That way its always data center to data center traffic, MPLs is preferred but VPN is backup.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thoughts?&lt;/P&gt;</description>
      <pubDate>Tue, 02 Oct 2018 21:11:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ospf-vpn-routing-and-distribution/m-p/233460#M66945</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2018-10-02T21:11:47Z</dc:date>
    </item>
  </channel>
</rss>

