<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Palo Alto unable to route traffic into LACP trunked subinterface vlans in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-unable-to-route-traffic-into-lacp-trunked-subinterface/m-p/355009#M87504</link>
    <description>&lt;P&gt;Hi Reaper,&lt;/P&gt;&lt;P&gt;since you created aggregates and are using all links for the same vlans, is there a specific reason you went for layer2 vs layer3?&lt;/P&gt;&lt;P&gt;BTC.pa : Yes, trying to keep the VRF-lite setup simpler and minimize hops vs. the layer 3 point to point.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;did you add a management profile to all the vlan interface (l3) zones with ping enabled?&lt;/P&gt;&lt;P&gt;BTC.pa : yes done.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;did you set up 'external' zones with visibility to each vsys, with routing entries to next VR and security policies from/to the 'external' zones ?&lt;/P&gt;&lt;P&gt;BTC.pa : Yes the external zones are able to pass traffic to one another.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;PS : I think I found the root cause of the problem to be route not established in the DMZ switch back.&lt;BR /&gt;The global config has the "ip route vrf A 0.0.0.0 0.0.0.0 (AE.1x)"&lt;BR /&gt;But this is not reflected in the "sh ip route vrf A"&lt;/P&gt;&lt;P&gt;Trying to resolve this. IP routing is enabled on the switch. Able to route within VRF.&lt;/P&gt;</description>
    <pubDate>Thu, 08 Oct 2020 03:52:42 GMT</pubDate>
    <dc:creator>BTC.pa</dc:creator>
    <dc:date>2020-10-08T03:52:42Z</dc:date>
    <item>
      <title>Palo Alto unable to route traffic into LACP trunked subinterface vlans</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-unable-to-route-traffic-into-lacp-trunked-subinterface/m-p/353890#M87371</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I have an issue with routing traffic over to a new DMZ SW implementation. Hope someone can crack the nut.&lt;/P&gt;&lt;P&gt;Issue : Palo Alto unable to route traffic into LACP trunked sub-interface vlans in VRFs&lt;/P&gt;&lt;P&gt;1. Each switch VRF is a Zone on the PA.&lt;/P&gt;&lt;P&gt;2. All routes defined in respective VRs.&lt;/P&gt;&lt;P&gt;3. All VRFs default route is the respective vlan IP tagged at the subinterface of AE at firewall.&lt;/P&gt;&lt;P&gt;4. All objects created are shared between Vsys.&lt;/P&gt;&lt;P&gt;5. reason for vsys splitting is for easier visibility of rule-list based on zones functions.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What the set up is &lt;U&gt;&lt;STRONG&gt;able&lt;/STRONG&gt; &lt;/U&gt;to do now.&lt;/P&gt;&lt;P&gt;1. all vlans in AE.2 is able to ping the firewall and DMZ switch and vice versa&lt;/P&gt;&lt;P&gt;2. a client behind INT Firewall is able to ping/tracert all AE1.x and&amp;nbsp; AE2.x interfaces&lt;/P&gt;&lt;P&gt;3. traffic is able to pass from vys1-2 and back&lt;/P&gt;&lt;P&gt;4. traffic withing VRFs are able to reach each other.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What the set up is &lt;EM&gt;&lt;STRONG&gt;&lt;U&gt;unable&lt;/U&gt; &lt;/STRONG&gt;&lt;/EM&gt;to do now.&lt;/P&gt;&lt;P&gt;1. all vlans in AE.1 is unable to ping the firewall and DMZ switch and vice versa&lt;/P&gt;&lt;P&gt;2. a client behind INT Firewall is able to ping all vlan gateways on the DMZ switch&lt;/P&gt;&lt;P&gt;3. traffic from vlans from DMZ switch do not reach the firewall.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 12 Oct 2020 08:25:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-unable-to-route-traffic-into-lacp-trunked-subinterface/m-p/353890#M87371</guid>
      <dc:creator>BTC.pa</dc:creator>
      <dc:date>2020-10-12T08:25:14Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto unable to route traffic into LACP trunked subinterface vlans</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-unable-to-route-traffic-into-lacp-trunked-subinterface/m-p/353920#M87376</link>
      <description>&lt;P&gt;since you created aggregates and are using all links for the same vlans, is there a specific reason you wentfor layer2 vs layer3?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;did you add a management profile to all the vlan interface (l3) zones with ping enabled?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;did you set up 'external' zones with visibility to each vsys, with routing entries to next VR and security policies from/to the 'external' zones ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 05 Oct 2020 11:23:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-unable-to-route-traffic-into-lacp-trunked-subinterface/m-p/353920#M87376</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2020-10-05T11:23:41Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto unable to route traffic into LACP trunked subinterface vlans</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-unable-to-route-traffic-into-lacp-trunked-subinterface/m-p/355009#M87504</link>
      <description>&lt;P&gt;Hi Reaper,&lt;/P&gt;&lt;P&gt;since you created aggregates and are using all links for the same vlans, is there a specific reason you went for layer2 vs layer3?&lt;/P&gt;&lt;P&gt;BTC.pa : Yes, trying to keep the VRF-lite setup simpler and minimize hops vs. the layer 3 point to point.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;did you add a management profile to all the vlan interface (l3) zones with ping enabled?&lt;/P&gt;&lt;P&gt;BTC.pa : yes done.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;did you set up 'external' zones with visibility to each vsys, with routing entries to next VR and security policies from/to the 'external' zones ?&lt;/P&gt;&lt;P&gt;BTC.pa : Yes the external zones are able to pass traffic to one another.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;PS : I think I found the root cause of the problem to be route not established in the DMZ switch back.&lt;BR /&gt;The global config has the "ip route vrf A 0.0.0.0 0.0.0.0 (AE.1x)"&lt;BR /&gt;But this is not reflected in the "sh ip route vrf A"&lt;/P&gt;&lt;P&gt;Trying to resolve this. IP routing is enabled on the switch. Able to route within VRF.&lt;/P&gt;</description>
      <pubDate>Thu, 08 Oct 2020 03:52:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-unable-to-route-traffic-into-lacp-trunked-subinterface/m-p/355009#M87504</guid>
      <dc:creator>BTC.pa</dc:creator>
      <dc:date>2020-10-08T03:52:42Z</dc:date>
    </item>
  </channel>
</rss>

