<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Layer 2 to Layer 3 Connection , but on same Subnet and IP range? in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/layer-2-to-layer-3-connection-but-on-same-subnet-and-ip-range/m-p/309846#M80259</link>
    <description>&lt;P&gt;I would agree with&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/71756"&gt;@RobinClayton&lt;/a&gt;&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/27580"&gt;@OtakarKlier&lt;/a&gt;&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/107910"&gt;@jeremy.larsen&lt;/a&gt;&amp;nbsp;here... this is not simply getting rid of a switch but also redesigning your outbound traffic layer... today, specific traffic (SIP/VoIP) is directed via some kind of route engineering (I assume) to go thru the PA220 and the rest is engineered to go thru CP and bypass the PA220... the proposed design now puts the PA220 in line with the CP and capacity issues aside you still need a common L2 north/south of the CP FWs for HA to work and pushing that to the PA220 is just moving the same functionality to a new spot...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If full resiliency is required, you have HA on the CP FWs, then having redundant L2 switches north/south gets you there as a failure on either switch means use lose outbound connectivity regardless of the HA on the CP FWs.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;On the capacity front it would be recommended to understand the traffic load/rates currently going thru the CP FWs and add that to what the PA220 is currently doing to see if it can handle the additional load, you still would have a SPOF as the PA220 is not in HA...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Lots of things to consider, perhaps reaching out to your SE to have a more detailed conversation on this would be a good next step.&lt;/P&gt;</description>
    <pubDate>Thu, 06 Feb 2020 16:49:25 GMT</pubDate>
    <dc:creator>ddelcourt</dc:creator>
    <dc:date>2020-02-06T16:49:25Z</dc:date>
    <item>
      <title>Layer 2 to Layer 3 Connection , but on same Subnet and IP range?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/layer-2-to-layer-3-connection-but-on-same-subnet-and-ip-range/m-p/309465#M80200</link>
      <description>&lt;P&gt;We have a PaloAlto PA220 at work what is used for telephony/SIP traffic that I&amp;nbsp; set up&amp;nbsp; several months ago.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Upstream&amp;nbsp; of the PaloAlto is a&amp;nbsp; unmanaged L2 netgear switch&amp;nbsp; what sits&amp;nbsp; between the leased internet line, the PaloAlto , and a&amp;nbsp; another non-PaloAlto firewall. I want to get rid of this unmanged L2 netgear&amp;nbsp; switch and connect our other non-PaloAlto firewall and the Internet leased line directly into the PaloAlto.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The thing is is through the PaloAlto has a&amp;nbsp; external IP of 5.X.X.36/28 and the&amp;nbsp; &amp;nbsp;non-PaloAlto firewall has a IP of&amp;nbsp; 5.X.X.34/28, and following the guide linked below fails (commit fails) due to&amp;nbsp; &amp;nbsp;setting the VLAN interface IP to&amp;nbsp;&amp;nbsp;5.X.X.34/28 overlaps and conflicts with&amp;nbsp;&amp;nbsp;5.X.X.36/28. Both the PaloAlto and the non-PaloAlto firewall both use the same ISP gateway (5.x.x.33/28.)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClKMCA0" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClKMCA0&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;How do I get around this issue and&amp;nbsp; connect our&amp;nbsp;&amp;nbsp;non-PaloAlto&amp;nbsp; firewall into the PaloAlto firewall so that the Layer 2 switch can be got rid off.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards: Elliott.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 04 Feb 2020 21:04:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/layer-2-to-layer-3-connection-but-on-same-subnet-and-ip-range/m-p/309465#M80200</guid>
      <dc:creator>eveares</dc:creator>
      <dc:date>2020-02-04T21:04:30Z</dc:date>
    </item>
    <item>
      <title>Re: Layer 2 to Layer 3 Connection , but on same Subnet and IP range?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/layer-2-to-layer-3-connection-but-on-same-subnet-and-ip-range/m-p/309535#M80210</link>
      <description>&lt;P&gt;If the other firewall has&amp;nbsp;&lt;SPAN&gt;5.X.X.34 , then it's going to conflict if both are the same?? Or are you getting rid of the other firewall?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Rob&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 05 Feb 2020 08:28:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/layer-2-to-layer-3-connection-but-on-same-subnet-and-ip-range/m-p/309535#M80210</guid>
      <dc:creator>RobinClayton</dc:creator>
      <dc:date>2020-02-05T08:28:13Z</dc:date>
    </item>
    <item>
      <title>Re: Layer 2 to Layer 3 Connection , but on same Subnet and IP range?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/layer-2-to-layer-3-connection-but-on-same-subnet-and-ip-range/m-p/309558#M80212</link>
      <description>&lt;P&gt;&lt;FONT face="arial,helvetica,sans-serif" color="#333333"&gt;The other firewall is our main corporate Checkpoint branded firewall and can not be got rid of. Yes it uses a IP on the same subnet and the same default gateway as the PaloAlto firewall.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT face="arial,helvetica,sans-serif" color="#333333"&gt;I essentially want to integrate the layer 2 switch into the PaloAlto so the layer 2 switch is not needed anymore.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT face="arial,helvetica,sans-serif" color="#333333"&gt;Regards: Elliott&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 05 Feb 2020 13:55:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/layer-2-to-layer-3-connection-but-on-same-subnet-and-ip-range/m-p/309558#M80212</guid>
      <dc:creator>eveares</dc:creator>
      <dc:date>2020-02-05T13:55:19Z</dc:date>
    </item>
    <item>
      <title>Re: Layer 2 to Layer 3 Connection , but on same Subnet and IP range?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/layer-2-to-layer-3-connection-but-on-same-subnet-and-ip-range/m-p/309559#M80213</link>
      <description>&lt;P&gt;I don't think you've provided enough information here for people to help you.&amp;nbsp; A diagram would be nice.&amp;nbsp; I am guessing you want to use your PA-220 as a switch just so you can remove some equipment.&amp;nbsp; On the surface, you can do this but it sounds like a really bad idea.&amp;nbsp; Is there a technical reason you want to remove this switch?&lt;/P&gt;</description>
      <pubDate>Wed, 05 Feb 2020 14:00:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/layer-2-to-layer-3-connection-but-on-same-subnet-and-ip-range/m-p/309559#M80213</guid>
      <dc:creator>jeremy.larsen</dc:creator>
      <dc:date>2020-02-05T14:00:50Z</dc:date>
    </item>
    <item>
      <title>Re: Layer 2 to Layer 3 Connection , but on same Subnet and IP range?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/layer-2-to-layer-3-connection-but-on-same-subnet-and-ip-range/m-p/309574#M80215</link>
      <description>&lt;P&gt;So the L2 Switch has the&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Internet on one port.&lt;/P&gt;&lt;P&gt;PA on another port&lt;/P&gt;&lt;P&gt;Checkpoint on another port.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;All there&amp;nbsp; in the same vlan.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Personally that's how I intend my external infrastructure to be, I can then have multiple ISP's and trusted their part circuits&amp;nbsp; on different VLANS going to any combination of firewalls.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 05 Feb 2020 14:59:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/layer-2-to-layer-3-connection-but-on-same-subnet-and-ip-range/m-p/309574#M80215</guid>
      <dc:creator>RobinClayton</dc:creator>
      <dc:date>2020-02-05T14:59:14Z</dc:date>
    </item>
    <item>
      <title>Re: Layer 2 to Layer 3 Connection , but on same Subnet and IP range?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/layer-2-to-layer-3-connection-but-on-same-subnet-and-ip-range/m-p/309595#M80219</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/71756"&gt;@RobinClayton&lt;/a&gt;&amp;nbsp;so, I think the issue you are having is that you are trying to prestage the PA220 by creating the second interface in the same subnet before you deprecate the existing one... if this is the case that explains the error as PANOS will not let you do that in the same VR IIRC.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As for removing the L2 switch and directly connecting that should be OK, based on what we know at this point, so long as your upstream CP FW is not in HA and doesn't need a common L2 to accommodate...&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Assuming below is a simple representation:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="simplediagram.png" style="width: 92px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/23835i1D329A4D92FA27F3/image-size/small/is-moderation-mode/true?v=v2&amp;amp;px=200" role="button" title="simplediagram.png" alt="simplediagram.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;The L2 switch should not be needed... could you just leave the configs as-is and directly connect the CP/PA FWs directly?&lt;/P&gt;</description>
      <pubDate>Wed, 05 Feb 2020 16:24:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/layer-2-to-layer-3-connection-but-on-same-subnet-and-ip-range/m-p/309595#M80219</guid>
      <dc:creator>ddelcourt</dc:creator>
      <dc:date>2020-02-05T16:24:36Z</dc:date>
    </item>
    <item>
      <title>Re: Layer 2 to Layer 3 Connection , but on same Subnet and IP range?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/layer-2-to-layer-3-connection-but-on-same-subnet-and-ip-range/m-p/309652#M80221</link>
      <description>&lt;P&gt;Please see below&amp;nbsp; for the topology diagrams.&amp;nbsp; It is to note the Checkpoint firewall can not be changed and&amp;nbsp; is out of my control.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The PaloAlto&amp;nbsp; firewall servers as the route for SIP/VOIP traffic, and the Checkpoint firewall servers as&amp;nbsp; the route for&amp;nbsp; all other traffic.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;U&gt;&lt;STRONG&gt;Current Topology:&lt;/STRONG&gt;&lt;/U&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Current-topology.jpg" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/23836i994283C66676FFBE/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Current-topology.jpg" alt="Current-topology.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;U&gt;&lt;STRONG&gt;Wanted Topology:&lt;/STRONG&gt;&lt;/U&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Wanted-topology.jpg" style="width: 546px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/23837i2E59AFE506FF3AA7/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Wanted-topology.jpg" alt="Wanted-topology.jpg" /&gt;&lt;/span&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Regards: Elliott.&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 05 Feb 2020 20:13:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/layer-2-to-layer-3-connection-but-on-same-subnet-and-ip-range/m-p/309652#M80221</guid>
      <dc:creator>eveares</dc:creator>
      <dc:date>2020-02-05T20:13:25Z</dc:date>
    </item>
    <item>
      <title>Re: Layer 2 to Layer 3 Connection , but on same Subnet and IP range?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/layer-2-to-layer-3-connection-but-on-same-subnet-and-ip-range/m-p/309659#M80223</link>
      <description>&lt;P&gt;If it were me, I would prefer the setup you currently have over the proposed.&amp;nbsp; I'm still trying to see what you are trying to accomplish or gain here.&amp;nbsp; I don't like forcing Layer 2 through a PAN.&amp;nbsp; You can do it but I wouldn't unless I was forced.&lt;/P&gt;</description>
      <pubDate>Wed, 05 Feb 2020 20:59:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/layer-2-to-layer-3-connection-but-on-same-subnet-and-ip-range/m-p/309659#M80223</guid>
      <dc:creator>jeremy.larsen</dc:creator>
      <dc:date>2020-02-05T20:59:59Z</dc:date>
    </item>
    <item>
      <title>Re: Layer 2 to Layer 3 Connection , but on same Subnet and IP range?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/layer-2-to-layer-3-connection-but-on-same-subnet-and-ip-range/m-p/309684#M80228</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;In all honesty, I dont think your 220 could handle the traffic. And you might not have enough ports to do vwire plus you would still need a switch between the pan and leased line. If you made the PAN interfaces L2, you still need a L3 interface for it to route the sip traffic so you would need a L3 vlan interface for that.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;However depending on the traffic through the CheckPoints, i still dont think the PAN could handle the traffic.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Wed, 05 Feb 2020 23:35:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/layer-2-to-layer-3-connection-but-on-same-subnet-and-ip-range/m-p/309684#M80228</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2020-02-05T23:35:18Z</dc:date>
    </item>
    <item>
      <title>Re: Layer 2 to Layer 3 Connection , but on same Subnet and IP range?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/layer-2-to-layer-3-connection-but-on-same-subnet-and-ip-range/m-p/309714#M80235</link>
      <description>&lt;P&gt;Otakar eludes to the V-Wire, which would allow traffic to traverse the PA seamlessly, but in that scenario, as he points out, you would need bot a trusted and untrusted v-wire ports. And the untrusted v-wire and external interface still both need to connect to the Leased line somehow.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The present setup is really correct for most instances.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Or are you trying to get rid of £$&amp;nbsp; threat inspection licences on the checkpoint and put that into the PA??&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Rob&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 06 Feb 2020 08:50:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/layer-2-to-layer-3-connection-but-on-same-subnet-and-ip-range/m-p/309714#M80235</guid>
      <dc:creator>RobinClayton</dc:creator>
      <dc:date>2020-02-06T08:50:39Z</dc:date>
    </item>
    <item>
      <title>Re: Layer 2 to Layer 3 Connection , but on same Subnet and IP range?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/layer-2-to-layer-3-connection-but-on-same-subnet-and-ip-range/m-p/309846#M80259</link>
      <description>&lt;P&gt;I would agree with&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/71756"&gt;@RobinClayton&lt;/a&gt;&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/27580"&gt;@OtakarKlier&lt;/a&gt;&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/107910"&gt;@jeremy.larsen&lt;/a&gt;&amp;nbsp;here... this is not simply getting rid of a switch but also redesigning your outbound traffic layer... today, specific traffic (SIP/VoIP) is directed via some kind of route engineering (I assume) to go thru the PA220 and the rest is engineered to go thru CP and bypass the PA220... the proposed design now puts the PA220 in line with the CP and capacity issues aside you still need a common L2 north/south of the CP FWs for HA to work and pushing that to the PA220 is just moving the same functionality to a new spot...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If full resiliency is required, you have HA on the CP FWs, then having redundant L2 switches north/south gets you there as a failure on either switch means use lose outbound connectivity regardless of the HA on the CP FWs.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;On the capacity front it would be recommended to understand the traffic load/rates currently going thru the CP FWs and add that to what the PA220 is currently doing to see if it can handle the additional load, you still would have a SPOF as the PA220 is not in HA...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Lots of things to consider, perhaps reaching out to your SE to have a more detailed conversation on this would be a good next step.&lt;/P&gt;</description>
      <pubDate>Thu, 06 Feb 2020 16:49:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/layer-2-to-layer-3-connection-but-on-same-subnet-and-ip-range/m-p/309846#M80259</guid>
      <dc:creator>ddelcourt</dc:creator>
      <dc:date>2020-02-06T16:49:25Z</dc:date>
    </item>
    <item>
      <title>Re: Layer 2 to Layer 3 Connection , but on same Subnet and IP range?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/layer-2-to-layer-3-connection-but-on-same-subnet-and-ip-range/m-p/311092#M80532</link>
      <description>&lt;P&gt;I should&amp;nbsp; mention that what I want to do, we are currently doing&amp;nbsp; with another/2nd PA-220 that we have that handles&amp;nbsp; both the &lt;STRONG&gt;1)&lt;/STRONG&gt; gateway for our public Wi-Fi what&amp;nbsp; &lt;STRONG&gt;2)&lt;/STRONG&gt; also feeds our main checkpoint firewall for another connection on the Checkpoint.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But in that case the Wi-Fi (using the PalAlto as the layer 3 router) and the&amp;nbsp; &amp;nbsp;connection to our Checkpoint Firewall (via a layer 2 to layer 3 connection on the Palo Alto) are&amp;nbsp; using completely different subsets with their own distinct gateway.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I was hoping I could do the same thing&amp;nbsp; with the PaloAlto PA220 that handles the SIP traffic&amp;nbsp; and the Layer 2 connection from the unmanged switch to the Checkpoint firewall that both&amp;nbsp; use the same subnet as originally proposed in this thread.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards: Elliott.&lt;/P&gt;</description>
      <pubDate>Thu, 13 Feb 2020 15:29:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/layer-2-to-layer-3-connection-but-on-same-subnet-and-ip-range/m-p/311092#M80532</guid>
      <dc:creator>eveares</dc:creator>
      <dc:date>2020-02-13T15:29:56Z</dc:date>
    </item>
  </channel>
</rss>

