<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Device-originated traffic source in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/device-originated-traffic-source/m-p/9689#M7094</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi James,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you for the response. Let my try to clarify:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Goal: since alot of our customers do not have OOB Management, we usually use the inside/trust interface for management purposes (with permitted IPs of management stations) and disconnect the management port. So my intention is not to use the PA-500 management port at all.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Since device originated traffic uses the management port as the source by default, I entered service routes. e.g. 0.0.0.0/0 with the outside interface public IP as source address. Also I entered a route to the internal LAN, e.g. 172.16.1.0/24 with the inside interface IP as source address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So in theory (correct me if I'm wrong), if the PA-500 sends DNS/ICMP/NTP queries to a public server, the traffic should be sourced from the outside interface. If the PA-500 sends DNS/ICMP/NTP queries to a Server in the LAN, the inside interface should be used as the source. The same goes for dynamic updates.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In practice however the PA-500 still uses the management port as the source. I notice this when I sent a ping from the PA-500. If I ping without specifying the source interface I get the following output:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;admin@PA-500-IV&amp;gt; ping host 4.2.2.2&lt;BR /&gt;PING 4.2.2.2 (4.2.2.2) 56(84) bytes of data.&lt;BR /&gt;&lt;STRONG&gt;From 192.168.1.1&lt;/STRONG&gt; icmp_seq=1 Destination Host Unreachable&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I ping sourced from the outside interface I get:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;admin@PA-500-IV&amp;gt; ping source 92.x.x.x host 4.2.2.2&lt;BR /&gt;PING 4.2.2.2 (4.2.2.2) &lt;STRONG&gt;from 92.x.x.x&lt;/STRONG&gt; : 56(84) bytes of data.&lt;BR /&gt;64 bytes from 4.2.2.2: icmp_seq=1 ttl=248 time=27.7 ms&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The same goes for DNS queries and other traffic to e.g. the public DNS server 4.2.2.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Once I configure the management port with an IP and gateway which has internet access (through a second Firewall) everything works fine. The PA-500 however still uses the management interface as a source regardless of the service route configuration. I can see this in the logs of the other firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there an explanation for this behavior??&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;BR /&gt;Ingo&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 29 Dec 2010 10:34:52 GMT</pubDate>
    <dc:creator>LAN10PAN</dc:creator>
    <dc:date>2010-12-29T10:34:52Z</dc:date>
    <item>
      <title>Device-originated traffic source</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/device-originated-traffic-source/m-p/9687#M7092</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am currently learning about PAN devices, and have a PA-500 in a lab environment (PANOS 3.1.6). Client internet access through the PA-500 does not pose a problem. However traffic originating from the PA-500 seems to be sourced from the management interface regardless of the service route configuration. e.g. I cannot resolve host names via DNS if the management port does not have access to the DNS server. If the DNS server resides in the internet, I need internet access on both the management and outside ports. This seems a bit complicated. Is there anyway I can source traffic from other interfaces? As said before, adding networks and source interfaces under service route configuration does not work. Am I missing something?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Ingo&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 Dec 2010 15:57:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/device-originated-traffic-source/m-p/9687#M7092</guid>
      <dc:creator>LAN10PAN</dc:creator>
      <dc:date>2010-12-28T15:57:04Z</dc:date>
    </item>
    <item>
      <title>Re: Device-originated traffic source</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/device-originated-traffic-source/m-p/9688#M7093</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Ingo,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The Service route configuration is the correct place to do this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However - the primary and secondary DNS servers in the device configuration are for backup purposes, not failed lookups.&amp;nbsp; So that means, if you can connect to the primary server and get a response - then it is up.&amp;nbsp; There will be no further lookups to the secondary DNS server, unless the primary is down.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This means, you will need the Internal server to be abe to do external lookups as well.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best Regards&lt;/P&gt;&lt;P&gt;James&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 Dec 2010 16:51:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/device-originated-traffic-source/m-p/9688#M7093</guid>
      <dc:creator>James</dc:creator>
      <dc:date>2010-12-28T16:51:53Z</dc:date>
    </item>
    <item>
      <title>Re: Device-originated traffic source</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/device-originated-traffic-source/m-p/9689#M7094</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi James,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you for the response. Let my try to clarify:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Goal: since alot of our customers do not have OOB Management, we usually use the inside/trust interface for management purposes (with permitted IPs of management stations) and disconnect the management port. So my intention is not to use the PA-500 management port at all.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Since device originated traffic uses the management port as the source by default, I entered service routes. e.g. 0.0.0.0/0 with the outside interface public IP as source address. Also I entered a route to the internal LAN, e.g. 172.16.1.0/24 with the inside interface IP as source address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So in theory (correct me if I'm wrong), if the PA-500 sends DNS/ICMP/NTP queries to a public server, the traffic should be sourced from the outside interface. If the PA-500 sends DNS/ICMP/NTP queries to a Server in the LAN, the inside interface should be used as the source. The same goes for dynamic updates.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In practice however the PA-500 still uses the management port as the source. I notice this when I sent a ping from the PA-500. If I ping without specifying the source interface I get the following output:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;admin@PA-500-IV&amp;gt; ping host 4.2.2.2&lt;BR /&gt;PING 4.2.2.2 (4.2.2.2) 56(84) bytes of data.&lt;BR /&gt;&lt;STRONG&gt;From 192.168.1.1&lt;/STRONG&gt; icmp_seq=1 Destination Host Unreachable&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I ping sourced from the outside interface I get:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;admin@PA-500-IV&amp;gt; ping source 92.x.x.x host 4.2.2.2&lt;BR /&gt;PING 4.2.2.2 (4.2.2.2) &lt;STRONG&gt;from 92.x.x.x&lt;/STRONG&gt; : 56(84) bytes of data.&lt;BR /&gt;64 bytes from 4.2.2.2: icmp_seq=1 ttl=248 time=27.7 ms&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The same goes for DNS queries and other traffic to e.g. the public DNS server 4.2.2.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Once I configure the management port with an IP and gateway which has internet access (through a second Firewall) everything works fine. The PA-500 however still uses the management interface as a source regardless of the service route configuration. I can see this in the logs of the other firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there an explanation for this behavior??&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;BR /&gt;Ingo&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 Dec 2010 10:34:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/device-originated-traffic-source/m-p/9689#M7094</guid>
      <dc:creator>LAN10PAN</dc:creator>
      <dc:date>2010-12-29T10:34:52Z</dc:date>
    </item>
    <item>
      <title>Re: Device-originated traffic source</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/device-originated-traffic-source/m-p/9690#M7095</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In addition to the Service Route "destinations" configuration (where it seems you have put 0.0.0.0/0) there are "services" that are pre-defined.&amp;nbsp; DNS is one of them.&amp;nbsp; I believe the defined service may take precedence over the "destinations" configuration since "destinations" is supposed to be used for any other traffic not specified in the services section.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, I was not aware that the "destinations" area allows subnets.&amp;nbsp; I think it should be a single IP or FQDN, so the 0.0.0.0/0 configuration may not work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ping will always source from the management interface by default unless you modify the source option on the command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kelly&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 Dec 2010 20:04:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/device-originated-traffic-source/m-p/9690#M7095</guid>
      <dc:creator>kbrazil</dc:creator>
      <dc:date>2010-12-29T20:04:06Z</dc:date>
    </item>
    <item>
      <title>Re: Device-originated traffic source</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/device-originated-traffic-source/m-p/9691#M7096</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Kelly,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thank you for the feeback! Since entries with subnet mask notation were accepted under service route configuration (also after commiting), I assumed it was a valid configuration. I tried entering single IPs and it did the trick. The (host) routes also seem to take precedence over the services as described in the configuration guide. Now I can use the services without having to have internet access via the management port.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ingo &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://live.paloaltonetworks.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 30 Dec 2010 08:53:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/device-originated-traffic-source/m-p/9691#M7096</guid>
      <dc:creator>LAN10PAN</dc:creator>
      <dc:date>2010-12-30T08:53:12Z</dc:date>
    </item>
  </channel>
</rss>

