<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Adding in an additional new firewall to the edge, attracting return traffic in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/adding-in-an-additional-new-firewall-to-the-edge-attracting/m-p/344518#M86189</link>
    <description>&lt;P&gt;I currently have a Brand X firewall at our perimeter with a /24 on the outside and private addressing on the inside.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I want to add a PAN in parallel to the current firewall and gradually move services from Brand X to PAN.&amp;nbsp;&lt;/P&gt;&lt;P&gt;The plan at present is to take a /26 of the public space and route to the PAN outside interface from the edge routes.&lt;/P&gt;&lt;P&gt;The trick is that the return traffic to the client on the Internet needs to be attracted to the PAN firewall and not to Brand X firewall to which the default route now points. My plan is to NAT the source IP as the traffic comes inside the PAN.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;BUT the problem is if I have a load balancer inside using source IP for balancing that would break. And there could be some applications that want to know the real public source IP. Are there any other approaches that I'm missing with regards to having servers send the traffic back to the PAN regardless of the default route on the inside?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If in the end I just need to do source IP NAT I may be able to live with it. But I wanted to ping the hive brain.&lt;/P&gt;</description>
    <pubDate>Wed, 19 Aug 2020 04:58:43 GMT</pubDate>
    <dc:creator>palomed</dc:creator>
    <dc:date>2020-08-19T04:58:43Z</dc:date>
    <item>
      <title>Adding in an additional new firewall to the edge, attracting return traffic</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/adding-in-an-additional-new-firewall-to-the-edge-attracting/m-p/344518#M86189</link>
      <description>&lt;P&gt;I currently have a Brand X firewall at our perimeter with a /24 on the outside and private addressing on the inside.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I want to add a PAN in parallel to the current firewall and gradually move services from Brand X to PAN.&amp;nbsp;&lt;/P&gt;&lt;P&gt;The plan at present is to take a /26 of the public space and route to the PAN outside interface from the edge routes.&lt;/P&gt;&lt;P&gt;The trick is that the return traffic to the client on the Internet needs to be attracted to the PAN firewall and not to Brand X firewall to which the default route now points. My plan is to NAT the source IP as the traffic comes inside the PAN.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;BUT the problem is if I have a load balancer inside using source IP for balancing that would break. And there could be some applications that want to know the real public source IP. Are there any other approaches that I'm missing with regards to having servers send the traffic back to the PAN regardless of the default route on the inside?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If in the end I just need to do source IP NAT I may be able to live with it. But I wanted to ping the hive brain.&lt;/P&gt;</description>
      <pubDate>Wed, 19 Aug 2020 04:58:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/adding-in-an-additional-new-firewall-to-the-edge-attracting/m-p/344518#M86189</guid>
      <dc:creator>palomed</dc:creator>
      <dc:date>2020-08-19T04:58:43Z</dc:date>
    </item>
    <item>
      <title>Re: Adding in an additional new firewall to the edge, attracting return tra</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/adding-in-an-additional-new-firewall-to-the-edge-attracting/m-p/344526#M86191</link>
      <description>&lt;P&gt;on the outside the PAN will be able to use proxy-arp to assimilate IP addresses. for every NAT rule you create with an IP in the /24 range, the PAN will send out proxy-arp, letting the routers know it owns those IPs (just make sure no other device uses or proxy-arps for that IP)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;on the inside it kind of depends on your design and available hardware&lt;/P&gt;&lt;P&gt;if the inside is a flat network with the default gateway set to brandX, setting source-nat to the pan inside interface for inbound connections will be the easiest way to trick inside hosts to reply to the PAN&lt;/P&gt;&lt;P&gt;The same trick with proxy-arp applies to the inside interface: you could set up dynamic-IP nat and provide the PAN with an IP pool, which may help overcome the loadbalancing issues&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;if the inside router/loadbalancer supports policy based forwarding/routing you could set up source routes toward the PAN&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 19 Aug 2020 06:33:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/adding-in-an-additional-new-firewall-to-the-edge-attracting/m-p/344526#M86191</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2020-08-19T06:33:29Z</dc:date>
    </item>
    <item>
      <title>Re: Adding in an additional new firewall to the edge, attracting return tra</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/adding-in-an-additional-new-firewall-to-the-edge-attracting/m-p/344561#M86202</link>
      <description>&lt;P&gt;Thank you. I didn't realize that this could be accomplished with the proxy arping at the PAN.&amp;nbsp;&lt;/P&gt;&lt;P&gt;And Dynamic NAT on the inside with a pool is also an interesting thought on dealing with&amp;nbsp;&lt;/P&gt;&lt;P&gt;the load balancer. The policy routing could have a place too.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 19 Aug 2020 13:55:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/adding-in-an-additional-new-firewall-to-the-edge-attracting/m-p/344561#M86202</guid>
      <dc:creator>palomed</dc:creator>
      <dc:date>2020-08-19T13:55:36Z</dc:date>
    </item>
  </channel>
</rss>

