<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Global Protect Asymmetric routing issue in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-asymmetric-routing-issue/m-p/354805#M87470</link>
    <description>&lt;P&gt;Hey team hope someone can help me. I am pretty new to Palo and I am trying to setup Global Protect PreLogon in our corporate environment. I have managed to get it all working in the lab (awesome) now doing that in the live environment is different ball game...&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Issue is that I am getting asymmetric routing, our default route goes out via another interface and to a legacy firewall, and I can see that the GP's wan interface is sending traffic using the default route. Not sure how I can force traffic received from GP's WAN interface. Below is my setup&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;IP's are different to live these are just sample IPs&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;WAN 1 - IP 192.168.50.1/30 (has sub IPs as well, 1 of which is used for GP wan 192.168.10.1)&lt;/P&gt;&lt;P&gt;WAN 2 - IP 192.168.100.1/30 (this goes to our legacy watchguard firwall) also default route is set to this next hop is 192.168.100.2/30&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The Portal and Gateway uses Loopback address&amp;nbsp; 10.10.10.253&amp;nbsp;&lt;/P&gt;&lt;P&gt;Both WAN and Loopback are in the Internet Zone&amp;nbsp;&lt;/P&gt;&lt;P&gt;Tunnel is Global Protect Zone&amp;nbsp;&lt;/P&gt;&lt;P&gt;Destianation NAT any source zone , Internet destination Zone , to 192.168.10.1 Destination Address, Service (Port6000) Destination Translation address 10.10.10.253 port 443&amp;nbsp;&lt;/P&gt;&lt;P&gt;Security Policy&amp;nbsp;&lt;/P&gt;&lt;P&gt;Inbound - any source to Internet Zone Detination with address 10.10.10.253 and 192.168.10.1 Global Protect applications Allow&amp;nbsp;&lt;/P&gt;&lt;P&gt;Outbound - Global Protect Zone any address to Corporate LAN, Internet default application allow&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Both loopback and tunnel has been added to the default router&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Now how do I say any traffic from 192.168.10.1 going outbound goes via 192.168.50.1 and NOT via default route ?&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I tried setting up a policy based forwarding but there doesn't seem to be any traffic that is going to it.&lt;/P&gt;&lt;P&gt;the Policy is&amp;nbsp;&lt;/P&gt;&lt;P&gt;From interface WAN1 Address 192.168.50.1 and 10.10.10.253 , negate the internal LANs , forward traffic to WAN1 Interface 192.168.100.2.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 07 Oct 2020 10:57:22 GMT</pubDate>
    <dc:creator>Shadmin</dc:creator>
    <dc:date>2020-10-07T10:57:22Z</dc:date>
    <item>
      <title>Global Protect Asymmetric routing issue</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-asymmetric-routing-issue/m-p/354805#M87470</link>
      <description>&lt;P&gt;Hey team hope someone can help me. I am pretty new to Palo and I am trying to setup Global Protect PreLogon in our corporate environment. I have managed to get it all working in the lab (awesome) now doing that in the live environment is different ball game...&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Issue is that I am getting asymmetric routing, our default route goes out via another interface and to a legacy firewall, and I can see that the GP's wan interface is sending traffic using the default route. Not sure how I can force traffic received from GP's WAN interface. Below is my setup&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;IP's are different to live these are just sample IPs&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;WAN 1 - IP 192.168.50.1/30 (has sub IPs as well, 1 of which is used for GP wan 192.168.10.1)&lt;/P&gt;&lt;P&gt;WAN 2 - IP 192.168.100.1/30 (this goes to our legacy watchguard firwall) also default route is set to this next hop is 192.168.100.2/30&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The Portal and Gateway uses Loopback address&amp;nbsp; 10.10.10.253&amp;nbsp;&lt;/P&gt;&lt;P&gt;Both WAN and Loopback are in the Internet Zone&amp;nbsp;&lt;/P&gt;&lt;P&gt;Tunnel is Global Protect Zone&amp;nbsp;&lt;/P&gt;&lt;P&gt;Destianation NAT any source zone , Internet destination Zone , to 192.168.10.1 Destination Address, Service (Port6000) Destination Translation address 10.10.10.253 port 443&amp;nbsp;&lt;/P&gt;&lt;P&gt;Security Policy&amp;nbsp;&lt;/P&gt;&lt;P&gt;Inbound - any source to Internet Zone Detination with address 10.10.10.253 and 192.168.10.1 Global Protect applications Allow&amp;nbsp;&lt;/P&gt;&lt;P&gt;Outbound - Global Protect Zone any address to Corporate LAN, Internet default application allow&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Both loopback and tunnel has been added to the default router&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Now how do I say any traffic from 192.168.10.1 going outbound goes via 192.168.50.1 and NOT via default route ?&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I tried setting up a policy based forwarding but there doesn't seem to be any traffic that is going to it.&lt;/P&gt;&lt;P&gt;the Policy is&amp;nbsp;&lt;/P&gt;&lt;P&gt;From interface WAN1 Address 192.168.50.1 and 10.10.10.253 , negate the internal LANs , forward traffic to WAN1 Interface 192.168.100.2.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 07 Oct 2020 10:57:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-asymmetric-routing-issue/m-p/354805#M87470</guid>
      <dc:creator>Shadmin</dc:creator>
      <dc:date>2020-10-07T10:57:22Z</dc:date>
    </item>
    <item>
      <title>Re: Global Protect Asymmetric routing issue</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-asymmetric-routing-issue/m-p/354955#M87488</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;Have you setup an internal gateway for globalprotect? That way it doesnt have to go 'outside' to connect?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Couple links that may help:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClH1CAK" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClH1CAK&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClfXCAS" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClfXCAS&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Wed, 07 Oct 2020 19:32:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-asymmetric-routing-issue/m-p/354955#M87488</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2020-10-07T19:32:10Z</dc:date>
    </item>
    <item>
      <title>Re: Global Protect Asymmetric routing issue</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-asymmetric-routing-issue/m-p/354960#M87491</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;To achieve what you want. You will need to create policy based forwarding for outgoing traffic and enable “symmetric Routing”. The back traffic the will be recognized automatically.&lt;/P&gt;</description>
      <pubDate>Wed, 07 Oct 2020 19:57:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-asymmetric-routing-issue/m-p/354960#M87491</guid>
      <dc:creator>Abdul-Fattah</dc:creator>
      <dc:date>2020-10-07T19:57:58Z</dc:date>
    </item>
    <item>
      <title>Re: Global Protect Asymmetric routing issue</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-asymmetric-routing-issue/m-p/355398#M87537</link>
      <description>&lt;P&gt;Hey Abdul,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have already setup a policy based forwarding or tried to which goes something like&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Source Internet Zone with IP (WAN Subnet IP) , Negate Destination (Local subnets) forward to next hop of WAN 1&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;but no traffic seem to be using that policy&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 09 Oct 2020 12:23:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-asymmetric-routing-issue/m-p/355398#M87537</guid>
      <dc:creator>Shadmin</dc:creator>
      <dc:date>2020-10-09T12:23:28Z</dc:date>
    </item>
    <item>
      <title>Re: Global Protect Asymmetric routing issue</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-asymmetric-routing-issue/m-p/576294#M115674</link>
      <description>&lt;P&gt;Did you find an answer to this problem? I'm having the same issue, created PBF rules but the traffic does not seem to hit it.&lt;/P&gt;</description>
      <pubDate>Tue, 06 Feb 2024 16:18:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-asymmetric-routing-issue/m-p/576294#M115674</guid>
      <dc:creator>Nick.Chenault</dc:creator>
      <dc:date>2024-02-06T16:18:48Z</dc:date>
    </item>
  </channel>
</rss>

