<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Interface Types in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/interface-types/m-p/251563#M71535</link>
    <description>&lt;P&gt;Totaly understand your viewpoint. From a security perspective the firewall should live in the middle of your network and everything should pass through it for inspection (zero trust). Yes its a bit more work, but more secure in the long run.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;That is how I set things up :).&lt;/P&gt;</description>
    <pubDate>Wed, 27 Feb 2019 18:24:44 GMT</pubDate>
    <dc:creator>OtakarKlier</dc:creator>
    <dc:date>2019-02-27T18:24:44Z</dc:date>
    <item>
      <title>Interface Types</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/interface-types/m-p/251536#M71521</link>
      <description>&lt;P&gt;When you are creating sub-interfaces, what is the reason why you would create layer 2 sub-interfaces?&lt;/P&gt;</description>
      <pubDate>Wed, 27 Feb 2019 14:38:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/interface-types/m-p/251536#M71521</guid>
      <dc:creator>stevenjwilliams83</dc:creator>
      <dc:date>2019-02-27T14:38:04Z</dc:date>
    </item>
    <item>
      <title>Re: Interface Types</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/interface-types/m-p/251543#M71522</link>
      <description>&lt;P&gt;Those would represent vlans in your trunk, they allow for easily assigning zones to each vlan and keeping packets contained within the same vlan tag&lt;/P&gt;</description>
      <pubDate>Wed, 27 Feb 2019 15:09:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/interface-types/m-p/251543#M71522</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2019-02-27T15:09:39Z</dc:date>
    </item>
    <item>
      <title>Re: Interface Types</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/interface-types/m-p/251548#M71525</link>
      <description>&lt;P&gt;Yes but a layer 2 interface wont have an IP, the only time I make sub-interfaces is when I need more logical layer 3 route points and dont have the physical port capacity.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 27 Feb 2019 16:01:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/interface-types/m-p/251548#M71525</guid>
      <dc:creator>stevenjwilliams83</dc:creator>
      <dc:date>2019-02-27T16:01:08Z</dc:date>
    </item>
    <item>
      <title>Re: Interface Types</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/interface-types/m-p/251551#M71527</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;Correct, so what I do it create a vlan interface on the PAN that is layer 3 so that traffic can be routed.&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Wed, 27 Feb 2019 17:44:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/interface-types/m-p/251551#M71527</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2019-02-27T17:44:05Z</dc:date>
    </item>
    <item>
      <title>Re: Interface Types</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/interface-types/m-p/251553#M71528</link>
      <description>&lt;P&gt;Yes, but then your interface type is layer 3, not layer 2....&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;what be the purpose to setup an interface like Ethernet1/2 in the photo?&amp;nbsp; What does a layer 2 sub-interface serve?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screen Shot 2019-02-27 at 11.45.57 AM.png" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/18904i476E74FC5DD23066/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Screen Shot 2019-02-27 at 11.45.57 AM.png" alt="Screen Shot 2019-02-27 at 11.45.57 AM.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 27 Feb 2019 17:48:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/interface-types/m-p/251553#M71528</guid>
      <dc:creator>stevenjwilliams83</dc:creator>
      <dc:date>2019-02-27T17:48:34Z</dc:date>
    </item>
    <item>
      <title>Re: Interface Types</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/interface-types/m-p/251555#M71529</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/7608"&gt;@reaper&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;Those would represent vlans in your trunk, they allow for easily assigning zones to each vlan and keeping packets contained within the same vlan tag&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yep, just as Reaper mentioned.&amp;nbsp; Here how it looks in practice.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="L2.PNG" style="width: 500px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/18905i41E3DCE089E5BD12/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="L2.PNG" alt="L2.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Then you create the associated VLANs in the VLAN tab with the pertinent info.&lt;/P&gt;</description>
      <pubDate>Wed, 27 Feb 2019 17:52:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/interface-types/m-p/251555#M71529</guid>
      <dc:creator>Brandon_Wertz</dc:creator>
      <dc:date>2019-02-27T17:52:18Z</dc:date>
    </item>
    <item>
      <title>Re: Interface Types</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/interface-types/m-p/251556#M71530</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;The Vlan interface would be layer 3 but the physical would still remain layer2. The purpose of the layer2 subinterface is what Reaper mentioned, a vlan trunk.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Perhaps I am not fully understanding the end result you are attmetping to accomplish? Would you be able to expand on this?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Wed, 27 Feb 2019 17:52:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/interface-types/m-p/251556#M71530</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2019-02-27T17:52:38Z</dc:date>
    </item>
    <item>
      <title>Re: Interface Types</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/interface-types/m-p/251557#M71531</link>
      <description>&lt;P&gt;Ok what does a network diagram look like for this?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;One switch connected to the PA with hosts on both vlan 11 and vlan 12. So when vlan 11 needs to talk to vlan 12 it NEEDS a layer 3 gateway so where is this? Unless there is another port that connects to a layer 3 router or switch upstream? But what is the design reason for that? Might as well run Layer3 on the PA.&lt;/P&gt;</description>
      <pubDate>Wed, 27 Feb 2019 18:00:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/interface-types/m-p/251557#M71531</guid>
      <dc:creator>stevenjwilliams83</dc:creator>
      <dc:date>2019-02-27T18:00:05Z</dc:date>
    </item>
    <item>
      <title>Re: Interface Types</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/interface-types/m-p/251558#M71532</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/107877"&gt;@stevenjwilliams83&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;Ok what does a network diagram look like for this?&lt;/P&gt;&lt;P&gt;... Might as well run Layer3 on the PA.&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yes, in my screenshot the FW is the GW for the 2 VLANs.&amp;nbsp; Like&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/27580"&gt;@OtakarKlier&lt;/a&gt;&amp;nbsp;mentioned we need to understand what you're trying to do.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If all you're trying to do is have your FW participate in a VLAN create a L3 interface&amp;nbsp;(sub or otherwise) and give that interface an IP address in that network.&amp;nbsp; Using routing (routing protocol or static) to tell the FW where to route for the network it's participating in.&lt;/P&gt;</description>
      <pubDate>Wed, 27 Feb 2019 18:05:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/interface-types/m-p/251558#M71532</guid>
      <dc:creator>Brandon_Wertz</dc:creator>
      <dc:date>2019-02-27T18:05:56Z</dc:date>
    </item>
    <item>
      <title>Re: Interface Types</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/interface-types/m-p/251561#M71533</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I would say the reason for it is you want inspection of the traffic between the two clients. The Layer3 interface would either need to be a router somewhere that touches each vlan, or you can created a Layer3 vlan interface on the PAN.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 461px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/18906iA80C1D0F34E9E0D0/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This way the traffic is inspected by the PAN. One reason for this design is to limit and inspect traffic between the two clients on the network.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Configure&amp;nbsp;&lt;/SPAN&gt;&lt;A title="" href="https://docs.paloaltonetworks.com/content/techdocs/en_US/pan-os/8-0/pan-os-admin/networking/configure-interfaces/layer-2-interfaces/layer-2-interfaces-with-vlans.html#idf3427fc5-aae9-4f50-b85f-6f4c5321cfb1" target="_self"&gt;Layer 2 Interfaces with VLANs&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;when you want Layer 2 switching and traffic separation among VLANs. You can optionally control non-IP protocols between security zones on a Layer 2 interface or between interfaces within a single zone on a Layer 2 VLAN.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/8-0/pan-os-admin/networking/configure-interfaces/layer-2-interfaces/configure-a-layer-2-interface-subinterface-and-vlan.html" target="_blank" rel="noopener"&gt;https://docs.paloaltonetworks.com/pan-os/8-0/pan-os-admin/networking/configure-interfaces/layer-2-interfaces/configure-a-layer-2-interface-subinterface-and-vlan.html&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Also check out this as to why Zero trust is a good thing and this is one way towards it.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://www.paloaltonetworks.com/resources/whitepapers/best-practices-for-executing-on-zero-trust" target="_blank" rel="noopener"&gt;https://www.paloaltonetworks.com/resources/whitepapers/best-practices-for-executing-on-zero-trust&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://www.youtube.com/watch?v=2IGe5zZMlDc" target="_blank" rel="noopener"&gt;https://www.youtube.com/watch?v=2IGe5zZMlDc&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Regards,&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 27 Feb 2019 18:11:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/interface-types/m-p/251561#M71533</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2019-02-27T18:11:40Z</dc:date>
    </item>
    <item>
      <title>Re: Interface Types</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/interface-types/m-p/251562#M71534</link>
      <description>&lt;P&gt;I am not trying to do anything, I am just trying to understand it. So if my gateways exist on another device other than the PAN, why not run it in vwire between the switch and layer 3 device? Many ways to skin a cat, but trying to see what way others skin it.&lt;/P&gt;</description>
      <pubDate>Wed, 27 Feb 2019 18:22:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/interface-types/m-p/251562#M71534</guid>
      <dc:creator>stevenjwilliams83</dc:creator>
      <dc:date>2019-02-27T18:22:17Z</dc:date>
    </item>
    <item>
      <title>Re: Interface Types</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/interface-types/m-p/251563#M71535</link>
      <description>&lt;P&gt;Totaly understand your viewpoint. From a security perspective the firewall should live in the middle of your network and everything should pass through it for inspection (zero trust). Yes its a bit more work, but more secure in the long run.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;That is how I set things up :).&lt;/P&gt;</description>
      <pubDate>Wed, 27 Feb 2019 18:24:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/interface-types/m-p/251563#M71535</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2019-02-27T18:24:44Z</dc:date>
    </item>
    <item>
      <title>Re: Interface Types</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/interface-types/m-p/251584#M71541</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/107877"&gt;@stevenjwilliams83&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;I am not trying to do anything, I am just trying to understand it. So if my gateways exist on another device other than the PAN, why not run it in vwire between the switch and layer 3 device? Many ways to skin a cat, but trying to see what way others skin it.&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I think in a good majority of use cases the gateway is the firewall, in the cases where it's not then you're right vwire would also be an appropriate solution.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've only ever deployed vwire once, in a limited deployment, but it's my understanding there are some things you can't do in vwire.&amp;nbsp; So if you're looking to implement a vwire deployment I would be sure all features you need/want are supported.&amp;nbsp; (I think response pages via vwire for non-decrypted traffic isn't possible.)&lt;/P&gt;</description>
      <pubDate>Wed, 27 Feb 2019 21:44:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/interface-types/m-p/251584#M71541</guid>
      <dc:creator>Brandon_Wertz</dc:creator>
      <dc:date>2019-02-27T21:44:37Z</dc:date>
    </item>
  </channel>
</rss>

