<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ECMP Strict Source Path in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ecmp-strict-source-path/m-p/250179#M71164</link>
    <description>&lt;P&gt;Ty for the info.&lt;/P&gt;</description>
    <pubDate>Fri, 15 Feb 2019 07:03:17 GMT</pubDate>
    <dc:creator>santonic</dc:creator>
    <dc:date>2019-02-15T07:03:17Z</dc:date>
    <item>
      <title>ECMP Strict Source Path</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ecmp-strict-source-path/m-p/249622#M70989</link>
      <description>&lt;P&gt;Hello.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In ECMP settings there is&amp;nbsp;Strict Source Path option to enable. But I can't find any descriptin about this option anywhere. Anyone knows what exactly does this option do?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Feb 2019 07:31:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ecmp-strict-source-path/m-p/249622#M70989</guid>
      <dc:creator>santonic</dc:creator>
      <dc:date>2019-02-11T07:31:52Z</dc:date>
    </item>
    <item>
      <title>Re: ECMP Strict Source Path</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ecmp-strict-source-path/m-p/249823#M71040</link>
      <description>&lt;P&gt;This has been bugging me since it was posted. I was finally able to do enough digging and found the answer.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Strict Source Path is a feature of the ECMP specification, rather than a feature unique to Palo Alto Networks. There are 2 types of source routing with ECMP, loose and strict.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Check the following RFC, section 3.1. The subsections are titled "Loose Source and Record Route" and "Strict Source and Record Route".&lt;/P&gt;&lt;P&gt;&lt;A href="https://tools.ietf.org/rfc/rfc791.txt" target="_blank"&gt;https://tools.ietf.org/rfc/rfc791.txt&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Both require options in the IP header.&amp;nbsp;Loose (type=131) is by far the most common, but some environments will need strict (type=137).&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Feb 2019 13:53:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ecmp-strict-source-path/m-p/249823#M71040</guid>
      <dc:creator>gwesson</dc:creator>
      <dc:date>2019-02-12T13:53:15Z</dc:date>
    </item>
    <item>
      <title>Re: ECMP Strict Source Path</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ecmp-strict-source-path/m-p/249825#M71042</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/28203"&gt;@gwesson&lt;/a&gt;,&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks, i also had this query.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It may be not relevent here, but appreciate if you can clarify me in this option, I can see 'symmetric return' under ECMP option, is this a alternative option for symmetric return in dual ISP failover/ECMP scenario ?. i have seen in dual ISP scenarios, poeple were using PBF for symmetric return enforcement.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So if i have web services running inside and ECMP is enabled in dual ISP scenario, i just need to enable this option instead of doing PBF and select ' symmetric return' ?&lt;/P&gt;</description>
      <pubDate>Tue, 12 Feb 2019 14:09:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ecmp-strict-source-path/m-p/249825#M71042</guid>
      <dc:creator>Abdul_Razaq</dc:creator>
      <dc:date>2019-02-12T14:09:24Z</dc:date>
    </item>
    <item>
      <title>Re: ECMP Strict Source Path</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ecmp-strict-source-path/m-p/249826#M71043</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/101029"&gt;@Abdul_Razaq&lt;/a&gt;&amp;nbsp;they're related, but do different things in their own context. The PBF option is when you could have asymmetric routes, whereas in ECMP it overrides the inherent load balancing that ECMP provides. Both of the following are pulled from the inline help on the firewall from their respective sections:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;U&gt;Symmetric return in ECMP&lt;/U&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Select&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="uicontrol"&gt;Symmetric Return&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;to cause return packets to egress out the same interface on which the associated ingress packets arrived. That is, the firewall will use the ingress interface on which to send return packets, rather than use the ECMP interface, so the&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="uicontrol"&gt;Symmetric Return&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;setting overrides load balancing. This behavior occurs only for traffic flows from the server to the client.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;U&gt;Symmetric return in PBF&lt;/U&gt;&lt;/P&gt;&lt;DIV class="Table_Cell"&gt;Select&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="uicontrol"&gt;Enforce Symmetric Return&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;and enter one or more IP addresses in the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="uicontrol"&gt;Next Hop Address&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;List. Enabling symmetric return ensures that return traffic (such as from the Trust zone on the LAN to the Internet) is forwarded out through the same interface through which traffic ingresses from the internet.&lt;/DIV&gt;</description>
      <pubDate>Tue, 12 Feb 2019 14:19:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ecmp-strict-source-path/m-p/249826#M71043</guid>
      <dc:creator>gwesson</dc:creator>
      <dc:date>2019-02-12T14:19:13Z</dc:date>
    </item>
    <item>
      <title>Re: ECMP Strict Source Path</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ecmp-strict-source-path/m-p/250179#M71164</link>
      <description>&lt;P&gt;Ty for the info.&lt;/P&gt;</description>
      <pubDate>Fri, 15 Feb 2019 07:03:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ecmp-strict-source-path/m-p/250179#M71164</guid>
      <dc:creator>santonic</dc:creator>
      <dc:date>2019-02-15T07:03:17Z</dc:date>
    </item>
    <item>
      <title>Re: ECMP Strict Source Path</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ecmp-strict-source-path/m-p/281820#M76006</link>
      <description>&lt;P&gt;"strict source path" means no ECMP. It applies to firewall originated IKE/IPsec traffic. Traffic will be sent out over the tunnel based on which tunnel the source address belong to. It has nothing to do with real "source routing". It does not affect transit traffic. Similar to "symetric return" it is an exception of ECMP hashing.&lt;/P&gt;</description>
      <pubDate>Thu, 08 Aug 2019 22:46:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ecmp-strict-source-path/m-p/281820#M76006</guid>
      <dc:creator>jchen1</dc:creator>
      <dc:date>2019-08-08T22:46:22Z</dc:date>
    </item>
    <item>
      <title>Re: ECMP Strict Source Path</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ecmp-strict-source-path/m-p/300134#M78457</link>
      <description>&lt;P&gt;Strict Source Path - I still to this day have no idea what this option is for, what it does or doesn't do, and when to and not to use it. Not a lot of documentation on it from Palo themselves.&lt;/P&gt;</description>
      <pubDate>Fri, 22 Nov 2019 03:53:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ecmp-strict-source-path/m-p/300134#M78457</guid>
      <dc:creator>Stevenjwilliams83</dc:creator>
      <dc:date>2019-11-22T03:53:11Z</dc:date>
    </item>
    <item>
      <title>Re: ECMP Strict Source Path</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ecmp-strict-source-path/m-p/303793#M79052</link>
      <description>&lt;P&gt;are we sure this is correct?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;"strict source path" means no ECMP. It applies to firewall originated IKE/IPsec traffic. Traffic will be sent out over the tunnel based on which tunnel the source address belong to. It has nothing to do with real "source routing". It does not affect transit traffic. Similar to "symetric return" it is an exception of ECMP hashing.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I see different behavior . Where traffic is from source is still doing route lookup to send traffic out.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Sun, 15 Dec 2019 18:50:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ecmp-strict-source-path/m-p/303793#M79052</guid>
      <dc:creator>junior_r</dc:creator>
      <dc:date>2019-12-15T18:50:07Z</dc:date>
    </item>
    <item>
      <title>Re: ECMP Strict Source Path</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ecmp-strict-source-path/m-p/303938#M79074</link>
      <description>&lt;P&gt;There seems some rework after my last comments. However, the behavior should not changed. Have you checked the new release notes?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 16 Dec 2019 17:50:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ecmp-strict-source-path/m-p/303938#M79074</guid>
      <dc:creator>jchen1</dc:creator>
      <dc:date>2019-12-16T17:50:32Z</dc:date>
    </item>
    <item>
      <title>Re: ECMP Strict Source Path</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ecmp-strict-source-path/m-p/576500#M115701</link>
      <description>&lt;P&gt;For everyone potentially still looking and wondering, I found this in Palo 10.1 documentation:&lt;/P&gt;
&lt;TABLE class="table colsep rowsep  table-striped"&gt;
&lt;TBODY class="tbody"&gt;
&lt;TR class="row rowsep"&gt;
&lt;TD class="entry"&gt;
&lt;DIV&gt;
&lt;DIV class="p"&gt;
&lt;DIV&gt;Strict Source Path&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/TD&gt;
&lt;TD class="entry relcol"&gt;
&lt;DIV&gt;
&lt;DIV class="p"&gt;
&lt;DIV&gt;By default, IKE and IPSec traffic originating at the firewall egresses an interface that the ECMP load-balancing method determines. Select&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;
&lt;DIV&gt;Strict Source Path&lt;/DIV&gt;
&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;to ensure that IKE and IPSec traffic originating at the firewall always egresses the physical interface to which the source IP address of the IPSec tunnel belongs. Enable Strict Source Path when the firewall has more than one ISP providing equal-cost paths to the same destination. The ISPs typically perform a Reverse Path Forwarding (RPF) check (or a different check to prevent IP address spoofing) to confirm that the traffic is egressing the same interface on which it arrived. Because ECMP by default chooses an egress interface based on the configured ECMP method (instead of choosing the source interface as the egress interface), that will not be what the ISP expects and the ISP can block legitimate return traffic. In this use case, enable&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;
&lt;DIV&gt;Strict Source Path&lt;/DIV&gt;
&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;so that the firewall uses the egress interface that is the interface to which the source IP address of the IPSec tunnel belongs.&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;</description>
      <pubDate>Wed, 07 Feb 2024 19:30:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ecmp-strict-source-path/m-p/576500#M115701</guid>
      <dc:creator>tburdettek2</dc:creator>
      <dc:date>2024-02-07T19:30:08Z</dc:date>
    </item>
  </channel>
</rss>

