<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: External/Untrust IP's showing up as Internal/Trust in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/external-untrust-ip-s-showing-up-as-internal-trust/m-p/337946#M85036</link>
    <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/125387"&gt;@dennistobias&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;Was this working prior to the upgrade to 9.1.2 as expected, or is this something that you are just trying to configure now?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Just to verify exactly what you are talking about; in your traffic logs you are currently seeing traffic with an ingress interface of your ae2.699 interface when you should be seeing the ingress interface of ae1.706 and ae1.707? Is that correct?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Since the traffic is actually coming in on a completely different AE and a completely separate group of interfaces, I would want to take a PCAP on the switch side of things and verify that the switch is routing the traffic as it should. The firewall will accept any traffic that comes in on a zones assigned interfaces (one of the reasons we say never use 'any' in source/destination address) and accept and route the traffic according to your rulebase and routing statements. It really seems like something upstream is causing this issue if we're seeing the traffic ingress on an improper interface when you do the PCAP.&lt;/P&gt;</description>
    <pubDate>Sun, 12 Jul 2020 13:21:35 GMT</pubDate>
    <dc:creator>BPry</dc:creator>
    <dc:date>2020-07-12T13:21:35Z</dc:date>
    <item>
      <title>External/Untrust IP's showing up as Internal/Trust</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/external-untrust-ip-s-showing-up-as-internal-trust/m-p/337897#M85023</link>
      <description>&lt;P&gt;I am at a complete loss as to what I am seeing. I have PA-3250's running 9.1.2 code in L3 mode. The interfaces are split up into 2 aggregated ethernet interfaces, each using subinterfaces (ae1.706, ae1.707, ae2.699, ae2.698, etc.) When looking at traffic logs I see my interfaces assigned to ae1.706 and ae1.707 sourcing traffic from my trust zone when they are in an untrust zone. A pcap confirms that the traffic is indeed being sourced and it is coming in on ae2.699! How in the world does this work? I am losing my mind.&lt;/P&gt;</description>
      <pubDate>Sun, 12 Jul 2020 01:32:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/external-untrust-ip-s-showing-up-as-internal-trust/m-p/337897#M85023</guid>
      <dc:creator>dennistobias</dc:creator>
      <dc:date>2020-07-12T01:32:41Z</dc:date>
    </item>
    <item>
      <title>Re: External/Untrust IP's showing up as Internal/Trust</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/external-untrust-ip-s-showing-up-as-internal-trust/m-p/337946#M85036</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/125387"&gt;@dennistobias&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;Was this working prior to the upgrade to 9.1.2 as expected, or is this something that you are just trying to configure now?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Just to verify exactly what you are talking about; in your traffic logs you are currently seeing traffic with an ingress interface of your ae2.699 interface when you should be seeing the ingress interface of ae1.706 and ae1.707? Is that correct?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Since the traffic is actually coming in on a completely different AE and a completely separate group of interfaces, I would want to take a PCAP on the switch side of things and verify that the switch is routing the traffic as it should. The firewall will accept any traffic that comes in on a zones assigned interfaces (one of the reasons we say never use 'any' in source/destination address) and accept and route the traffic according to your rulebase and routing statements. It really seems like something upstream is causing this issue if we're seeing the traffic ingress on an improper interface when you do the PCAP.&lt;/P&gt;</description>
      <pubDate>Sun, 12 Jul 2020 13:21:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/external-untrust-ip-s-showing-up-as-internal-trust/m-p/337946#M85036</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2020-07-12T13:21:35Z</dc:date>
    </item>
  </channel>
</rss>

