<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: HTTPS and SSH Traffic Is Not Working in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/https-and-ssh-traffic-is-not-working/m-p/234847#M67330</link>
    <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/99342"&gt;@ballen317&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;In that case I actually wouldn't do this how you have it. What I would do is bring VLANs 10,20,30,40,50,60 to the aggregation switch, then I would utilize sub-interfaces to make the PA the default gateway of each VLAN. This simplifies routing substantially and you wouldn't have to make any physical cabling changes so you could continue to utilize the 10G interfaces on the PA.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 10 Oct 2018 19:11:40 GMT</pubDate>
    <dc:creator>BPry</dc:creator>
    <dc:date>2018-10-10T19:11:40Z</dc:date>
    <item>
      <title>HTTPS and SSH Traffic Is Not Working</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/https-and-ssh-traffic-is-not-working/m-p/234670#M67271</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Hello,&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;I’m new to the Palo Alto community. I’m hoping someone would be able to help me with this problem we are having.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;We have a Palo Alto PA3060 firewall that has a Layer 3 interface configured with a sub-interface that is also Layer 3 and tagged with VLAN250. The sub-interface is assigned an IP address of 192.168.250.1.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;On the other end of the link is a Cisco Nexus switch. It’s interface is configured as a &lt;EM&gt;switchport trunk&lt;/EM&gt;. The trunk has formed successfully between the Palo Alto firewall and the Cisco Nexus switch.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Conncected off&amp;nbsp;the Cisco Nexus switch are 6&amp;nbsp;more Cisco Nexus switches. Each of these 6 Cisco Nexus switches are configured as a router for a&amp;nbsp;network that is unique to each switch. See the attached network drawing for reference.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="PaloAlto_Network_Drawing.png" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/17086iF46BA24C1A6B7665/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="PaloAlto_Network_Drawing.png" alt="PaloAlto_Network_Drawing.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;Below are the networks configured on each Cisco Nexus switch:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;R1 - 192.168.10.1/24&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;R2 - 192.168.20.1/24&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;R3 - 192.168.30.1/24&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;R4 - 192.168.40.1/24&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;R5 - 192.168.50.1/24&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;R6 - 192.168.60.1/24&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;The Palo Alto firewall, the Cisco Nexus switch that is trunked to it, and the links to each of the 6 Cisco Nexus switches are all configured for the 192.168.250.0/24 network. The reason we have a middle switch in between the firewall and the 6 Cisco Nexus switches is because we are utilizing the 2x 10gig ports on the Palo Alto firewall. If we were to connect each of the 6 Cisco Nexus switches directly to the firewall, we would only be able to use the 8x 1 gig ports on the firewall (if this is incorrect, please let me know.) &lt;SPAN&gt;In order to get routing to work, each of the 6 Cisco Nexus switches has a SVI that has an IP address on the 192.168.250.0 network. The Palo Alto firewall has a static route for each network that points to the respective 192.168.250.0 address on the Cisco Nexus switch.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;With all that being said,&amp;nbsp;&lt;SPAN&gt;I am able to ping from a laptop connected to VLAN10 to the web server connected to VLAN60. The laptop in VLAN10 can also ping any of the 192.168.250.x addresses. The laptop in VLAN10 can also open a web page from the server in VLAN60. However, a laptop connected to VLAN250 is unable to access&amp;nbsp;that same&amp;nbsp;webpage on the server in VLAN60. The laptop connected to VLAN250 is also not able to SSH to 192.168.10.1, 192.168.20.1, 192.168.30.1, 192.168.40.1, 192.168.50.1, or 192.168.60.1. The laptop connected to VLAN250 is able to ping all the devices though.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The firewall sees all the ICMP traffic&amp;nbsp;as "intrazone" since its leaving R1 on the 192.168.250.10 interface and entering R6 on the 192.168.250.60 interface. I am not seeing any HTTPS or SSH traffic in the Monitor view on the firewall.&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Does anyone have any idea why this would be happening? It's not a routing issue from what I can tell as I can ping all devices from anywhere on the network. If you have any questions or need something clarified, just let me know. Thanks in advance for your help in this matter.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 10 Oct 2018 03:10:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/https-and-ssh-traffic-is-not-working/m-p/234670#M67271</guid>
      <dc:creator>ballen317</dc:creator>
      <dc:date>2018-10-10T03:10:01Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS and SSH Traffic Is Not Working</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/https-and-ssh-traffic-is-not-working/m-p/234782#M67301</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/99342"&gt;@ballen317&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;Just out of curiosity, why wouldn't you do L3 routing for the associated R1-R6 switches on your Nexus switch and then just point the traffic from the PA to your Nexus switch and let the aggregation layer do the routing?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 10 Oct 2018 13:52:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/https-and-ssh-traffic-is-not-working/m-p/234782#M67301</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2018-10-10T13:52:53Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS and SSH Traffic Is Not Working</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/https-and-ssh-traffic-is-not-working/m-p/234841#M67325</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;Our project manager has a specific requirement that any routing leaving one of the R1-R6 switches must be handled by the PA firewall. The justification behind this is that he wants the firewall to be able to log the traffic that is leaving one switch and is destined for a device connected to a different switch.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Let me know if this makes sense or if you have a different idea of how to implement this then what we are currently doing.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Wed, 10 Oct 2018 18:31:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/https-and-ssh-traffic-is-not-working/m-p/234841#M67325</guid>
      <dc:creator>ballen317</dc:creator>
      <dc:date>2018-10-10T18:31:12Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS and SSH Traffic Is Not Working</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/https-and-ssh-traffic-is-not-working/m-p/234847#M67330</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/99342"&gt;@ballen317&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;In that case I actually wouldn't do this how you have it. What I would do is bring VLANs 10,20,30,40,50,60 to the aggregation switch, then I would utilize sub-interfaces to make the PA the default gateway of each VLAN. This simplifies routing substantially and you wouldn't have to make any physical cabling changes so you could continue to utilize the 10G interfaces on the PA.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 10 Oct 2018 19:11:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/https-and-ssh-traffic-is-not-working/m-p/234847#M67330</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2018-10-10T19:11:40Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS and SSH Traffic Is Not Working</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/https-and-ssh-traffic-is-not-working/m-p/234848#M67331</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I agree with&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;, also you would be able to write policies around the differetn vlans and what traffic can pass, etc.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Are you using ACI? If yes you could then ensure all traffic is routed via the PAN and acheive the same thing.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope that makes sense.&lt;/P&gt;</description>
      <pubDate>Wed, 10 Oct 2018 19:20:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/https-and-ssh-traffic-is-not-working/m-p/234848#M67331</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2018-10-10T19:20:14Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS and SSH Traffic Is Not Working</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/https-and-ssh-traffic-is-not-working/m-p/235059#M67387</link>
      <description>&lt;P&gt;Thanks for the advice&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;&amp;nbsp;and&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/27580"&gt;@OtakarKlier&lt;/a&gt;. After doing some more reasearch, it appears the&amp;nbsp;initial problem was related to&amp;nbsp;asymmetric routing. Implementing the solution that you all recommended eliminates this problem though.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks again!&lt;/P&gt;</description>
      <pubDate>Thu, 11 Oct 2018 22:49:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/https-and-ssh-traffic-is-not-working/m-p/235059#M67387</guid>
      <dc:creator>ballen317</dc:creator>
      <dc:date>2018-10-11T22:49:27Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS and SSH Traffic Is Not Working</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/https-and-ssh-traffic-is-not-working/m-p/235061#M67388</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/27580"&gt;@OtakarKlier&lt;/a&gt;&lt;/P&gt;&lt;P&gt;I am not familiar with ACI. I&amp;nbsp;will do some research into it and see if that's something we should implement for our project. Thanks!&lt;/P&gt;</description>
      <pubDate>Thu, 11 Oct 2018 22:51:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/https-and-ssh-traffic-is-not-working/m-p/235061#M67388</guid>
      <dc:creator>ballen317</dc:creator>
      <dc:date>2018-10-11T22:51:31Z</dc:date>
    </item>
  </channel>
</rss>

