<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Need some guidance on the VM series implementation in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/need-some-guidance-on-the-vm-series-implementation/m-p/345683#M86372</link>
    <description>&lt;P&gt;Hi there,&lt;/P&gt;&lt;P&gt;I have inherited the current network and need some help in replacing the firewall for like to like. We have a MPLS network connecting all our offices and an external firewall managed by the ISP. Traffic from all sites go out via the external firewall.&amp;nbsp;I am replacing an old ASA with the PA-VM Series firewall as an internal firewall in one of our offices and experiencing issues with return traffic. Our core switch does routing for some of the vlans (subinterfaces on the core switch) and ASA does routing some of the vlans (subinterfaces for DMZ, guest,contractors vlans).&lt;/P&gt;&lt;P&gt;We have multiple ESX hosts and I am installing 2 PA instances on 2 different hosts in Active Passive set up. I have set up the PA's and&amp;nbsp;added port groups on the ESX hosts and subinterfaces in the PA as explained in the diagram. I have a default route on the core switch to send all traffic to subinterface ( Eth1/2.11) as I want all traffic to out via PA. On the PA, I have a default route to Eth1/3 and also a static route to internal VLANS (to make PA aware of the rest of the VLAN's) This is still in testing mode and I would eventually enable RIP on the PA as the core switch runs RIP.&lt;/P&gt;&lt;P&gt;I also have a NO NAT policy because it's an internal firewall and a security policy to allow outbound traffic.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Issue&lt;/STRONG&gt;: I can see traffic going out the untrust interface but firewall is dropping the return traffic. Packet capture shows that the return traffic ends up on the trust interface Eth1/2.11 and hence the packets are being dropped.&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Network.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/27520i57F20C27005FB33B/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Network.png" alt="Network.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 27 Aug 2020 07:35:18 GMT</pubDate>
    <dc:creator>nitz-sw</dc:creator>
    <dc:date>2020-08-27T07:35:18Z</dc:date>
    <item>
      <title>Need some guidance on the VM series implementation</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/need-some-guidance-on-the-vm-series-implementation/m-p/345683#M86372</link>
      <description>&lt;P&gt;Hi there,&lt;/P&gt;&lt;P&gt;I have inherited the current network and need some help in replacing the firewall for like to like. We have a MPLS network connecting all our offices and an external firewall managed by the ISP. Traffic from all sites go out via the external firewall.&amp;nbsp;I am replacing an old ASA with the PA-VM Series firewall as an internal firewall in one of our offices and experiencing issues with return traffic. Our core switch does routing for some of the vlans (subinterfaces on the core switch) and ASA does routing some of the vlans (subinterfaces for DMZ, guest,contractors vlans).&lt;/P&gt;&lt;P&gt;We have multiple ESX hosts and I am installing 2 PA instances on 2 different hosts in Active Passive set up. I have set up the PA's and&amp;nbsp;added port groups on the ESX hosts and subinterfaces in the PA as explained in the diagram. I have a default route on the core switch to send all traffic to subinterface ( Eth1/2.11) as I want all traffic to out via PA. On the PA, I have a default route to Eth1/3 and also a static route to internal VLANS (to make PA aware of the rest of the VLAN's) This is still in testing mode and I would eventually enable RIP on the PA as the core switch runs RIP.&lt;/P&gt;&lt;P&gt;I also have a NO NAT policy because it's an internal firewall and a security policy to allow outbound traffic.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Issue&lt;/STRONG&gt;: I can see traffic going out the untrust interface but firewall is dropping the return traffic. Packet capture shows that the return traffic ends up on the trust interface Eth1/2.11 and hence the packets are being dropped.&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Network.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/27520i57F20C27005FB33B/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Network.png" alt="Network.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 27 Aug 2020 07:35:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/need-some-guidance-on-the-vm-series-implementation/m-p/345683#M86372</guid>
      <dc:creator>nitz-sw</dc:creator>
      <dc:date>2020-08-27T07:35:18Z</dc:date>
    </item>
    <item>
      <title>Re: Need some guidance on the VM series implementation</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/need-some-guidance-on-the-vm-series-implementation/m-p/345741#M86380</link>
      <description>&lt;P&gt;Does your core switch have layer 3 interfaces for VLAN3 and VLAN11? And, were the packet captures for source or destination in VALN11?&lt;/P&gt;</description>
      <pubDate>Thu, 27 Aug 2020 17:27:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/need-some-guidance-on-the-vm-series-implementation/m-p/345741#M86380</guid>
      <dc:creator>DelvinC</dc:creator>
      <dc:date>2020-08-27T17:27:16Z</dc:date>
    </item>
    <item>
      <title>Re: Need some guidance on the VM series implementation</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/need-some-guidance-on-the-vm-series-implementation/m-p/345761#M86384</link>
      <description>&lt;P&gt;Yes the core switch has layer 3 interfaces for VLAN3 and VLAN 11 as shown in the diagram ? The packet captures were done with the source IP of 192.168.20.10 from a VM on VLAN 20 which has gateway as another subinterface (192.168.20.1) on the firewall. Diagram updated. (VLAN 20 does not have a layer3 interface on the core)&lt;/P&gt;&lt;P&gt;The capture shows packet flow from the VM to its gateway 192.168.20.1 (Trust)&amp;nbsp; out to Untrust and the Gateway (192.168.3.1)&lt;/P&gt;&lt;P&gt;Return traffic from 192.168.3.1 hits the core switch and is going back via the trusted interface 192.168.11.1 (VLAN 11) following the default route which is being dropped by firewall.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Network updated.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/27528i8EC690D75507A814/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Network updated.png" alt="Network updated.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 27 Aug 2020 21:24:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/need-some-guidance-on-the-vm-series-implementation/m-p/345761#M86384</guid>
      <dc:creator>nitz-sw</dc:creator>
      <dc:date>2020-08-27T21:24:13Z</dc:date>
    </item>
    <item>
      <title>Re: Need some guidance on the VM series implementation</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/need-some-guidance-on-the-vm-series-implementation/m-p/345908#M86417</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;Check the traffic logs as you may have missed a policy?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Fri, 28 Aug 2020 21:08:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/need-some-guidance-on-the-vm-series-implementation/m-p/345908#M86417</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2020-08-28T21:08:16Z</dc:date>
    </item>
    <item>
      <title>Re: Need some guidance on the VM series implementation</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/need-some-guidance-on-the-vm-series-implementation/m-p/345913#M86420</link>
      <description>&lt;P&gt;Sounds like there is some asymmetric routing in the environment.&lt;/P&gt;&lt;P&gt;Are there any routes (static or dynamic) on the core switch to&amp;nbsp;&lt;SPAN&gt;192.168.20.0/24 or perhaps a summary route.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;A traceroute from&amp;nbsp;192.168.20.10 and another traceroute from the destination should help identify any asymmetric routing paths in the environment.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 28 Aug 2020 21:20:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/need-some-guidance-on-the-vm-series-implementation/m-p/345913#M86420</guid>
      <dc:creator>DelvinC</dc:creator>
      <dc:date>2020-08-28T21:20:25Z</dc:date>
    </item>
  </channel>
</rss>

