<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Data center firewall design? in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/data-center-firewall-design/m-p/357496#M87773</link>
    <description>&lt;P&gt;Hi Valentine,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for thi interesting approach, i would like to test this in lab.&amp;nbsp; Can you point me to a direction&amp;nbsp; on how to do the vlan tag rewriting on palo.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 20 Oct 2020 16:03:19 GMT</pubDate>
    <dc:creator>GOMEZZZ</dc:creator>
    <dc:date>2020-10-20T16:03:19Z</dc:date>
    <item>
      <title>Data center firewall design?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/data-center-firewall-design/m-p/34359#M25211</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have couple question in mind when I’m think about implementation PAN firewalls in Data center design. In reviewing design guide “Designing Networks with Palo Alto Networks Firewalls”, mostly where described perimeter firewall with upstream untrusted networks, exceptionally where we got hierarchical design with trunks between aggregation and core. But in most used scenarios by this guide, I cannot find such scenario, where is implemented aggregation and core in one layer. &lt;/P&gt;&lt;P&gt;Example: One customer has two L2/L3 switches with implemented VRRP, which is access, aggregation and core in same time.&amp;nbsp; Clients, servers and others, are divided into VLAN’s and they are terminated on L3 within same switches. &lt;/P&gt;&lt;P&gt;Questions:&lt;/P&gt;&lt;P&gt;In such design, is there possible to implement PAN and secure communication between VLAN’s, or redesign is needed?&lt;BR /&gt; &lt;BR /&gt; &lt;/P&gt;&lt;P&gt;If such design is supported, can you provide some configuration example?&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;SBS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 09 Sep 2013 10:27:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/data-center-firewall-design/m-p/34359#M25211</guid>
      <dc:creator>Tician</dc:creator>
      <dc:date>2013-09-09T10:27:58Z</dc:date>
    </item>
    <item>
      <title>Re: Data center firewall design?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/data-center-firewall-design/m-p/34360#M25212</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;For&amp;nbsp; VLANs behind L2 switch you can set up PA firewall as a Router on a stick.&lt;/P&gt;&lt;P&gt;Not sure how PA could play a role in securing inter-VLAN traffic for the VLANs terminated on the L3 Switch.&lt;/P&gt;&lt;P&gt;Following References can be helpful.&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/docs/DOC-1618"&gt;Securing Inter VLAN Traffic&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/docs/DOC-2011"&gt;Layer 2 Networking&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 09 Sep 2013 12:44:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/data-center-firewall-design/m-p/34360#M25212</guid>
      <dc:creator>UhMayYeah</dc:creator>
      <dc:date>2013-09-09T12:44:42Z</dc:date>
    </item>
    <item>
      <title>Re: Data center firewall design?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/data-center-firewall-design/m-p/34361#M25213</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Tician,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Apart from the tech knowledge shared by akawimandan, in regards to design questions our SE's should be glad to share your concerns and suggest you design.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 09 Sep 2013 15:24:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/data-center-firewall-design/m-p/34361#M25213</guid>
      <dc:creator>Phoenix</dc:creator>
      <dc:date>2013-09-09T15:24:13Z</dc:date>
    </item>
    <item>
      <title>Re: Data center firewall design?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/data-center-firewall-design/m-p/34362#M25214</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="line-height: 1.5em; font-size: 10pt;"&gt;I think you need to readmit the questions that you need answered. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="line-height: 1.5em; font-size: 10pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="line-height: 1.5em; font-size: 10pt;"&gt;If all you want to know is if the PAN can be used as the L3 Gateway for your VLANs, the answer is yes.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="line-height: 1.5em; font-size: 10pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="line-height: 1.5em; font-size: 10pt;"&gt;Using the PAN for several VLANs as their gateway,&amp;nbsp; and create security zones between VLAN segments is a very simple setup:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="line-height: 1.5em; font-size: 10pt;"&gt;1. Add&amp;nbsp; L3 "sub-interface" on the PAN in Network&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="line-height: 1.5em; font-size: 10pt;"&gt;2. Assign it the interface and assign a tag&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="line-height: 1.5em; font-size: 10pt;"&gt;3. Give it an ip address the the VLAN will be using as a gateway&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="line-height: 1.5em; font-size: 10pt;"&gt;4. Assign it a zone &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="line-height: 1.5em; font-size: 10pt;"&gt;5. create your policies&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="line-height: 1.5em; font-size: 10pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="line-height: 1.5em; font-size: 10pt;"&gt;If you are asking how would create a setup like VRRP, I believe you are asking about how to do an HA Active/Active setup, or if you are asking if VRRP works with PAN firewalls, I don't think it will.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="line-height: 1.5em; font-size: 10pt;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="line-height: 1.5em; font-size: 10pt;"&gt; If you are trying to &lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;achieve redundancy between 2 switches and the PAN, you might look at LAG/MLAG&lt;/SPAN&gt;&lt;SPAN style="line-height: 1.5em; font-size: 10pt;"&gt; between the switches and the PAN firewall.&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 09 Sep 2013 19:16:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/data-center-firewall-design/m-p/34362#M25214</guid>
      <dc:creator>craymond</dc:creator>
      <dc:date>2013-09-09T19:16:58Z</dc:date>
    </item>
    <item>
      <title>Re: Data center firewall design?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/data-center-firewall-design/m-p/34363#M25215</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The pan does not support the protocol VRRP as stated above.&amp;nbsp; However it can pass that traffic as well as it has its own redundancy protocol High Availability.&amp;nbsp; You can follow these doc's and video that will give you more information.&amp;nbsp; I&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://live.paloaltonetworks.com/docs/DOC-2926" style="font-size: 10pt; line-height: 1.5em;"&gt;https://live.paloaltonetworks.com/docs/DOC-2926&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://live.paloaltonetworks.com/videos/1173"&gt;https://live.paloaltonetworks.com/videos/1173&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As far as design you can create aggregate links and add vlans with tags to separate the traffic.&amp;nbsp;&amp;nbsp; Or you can set the pan up as a pass through with just tagged ports.&amp;nbsp; You will also need to keep in consideration if nat needs to be implemented on the pan or if it is happening some where else on the network.&amp;nbsp; You should consult your SE to help with design if you have any doubts.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 09 Sep 2013 20:52:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/data-center-firewall-design/m-p/34363#M25215</guid>
      <dc:creator>nayubi</dc:creator>
      <dc:date>2013-09-09T20:52:02Z</dc:date>
    </item>
    <item>
      <title>Re: Data center firewall design?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/data-center-firewall-design/m-p/34364#M25216</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Router on a stick is definitely preferred if you can make it happen! &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However, I have seen some environments where the requirement was to keep the router interfaces on the L3 switch while still firewalling inter-VLAN traffic.&amp;nbsp; Additionally, due to the # of edge switches &amp;amp; connections, it was not feasible to place the Palo Alto Networks firewall physically in-line.&amp;nbsp; It is possible to logically insert a firewall into an environment like this as an L2-firewall "on a stick", but it requires some "creative" VLAN configuration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let's say you have 2 servers, 2 vlans, and an L3 switch routing between those VLANs like this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;server1 --- (vlan10) --- L3 Switch --- (vlan20) --- server2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The relevant parts of a Cisco L3 switch configuration would look something like this: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;vlan 10&lt;/P&gt;&lt;P&gt;vlan 20&lt;/P&gt;&lt;P&gt;int gi1/0/1&lt;/P&gt;&lt;P&gt;&amp;nbsp; desc "connection to server 1"&lt;/P&gt;&lt;P&gt;&amp;nbsp; switchport&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; switchport mode access&lt;/P&gt;&lt;P&gt;&amp;nbsp; switchport access vlan 10&lt;/P&gt;&lt;P&gt;&amp;nbsp; no shut&lt;/P&gt;&lt;P&gt;int gi1/0/2&lt;/P&gt;&lt;P&gt;&amp;nbsp; desc "connection to server 2"&lt;/P&gt;&lt;P&gt;&amp;nbsp; switchport&lt;/P&gt;&lt;P&gt;&amp;nbsp; switchport mode access&lt;/P&gt;&lt;P&gt;&amp;nbsp; switchport access vlan 20&lt;/P&gt;&lt;P&gt;&amp;nbsp; no shut&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface vlan10&lt;/P&gt;&lt;P&gt;&amp;nbsp; ip address 10.1.10.1 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface vlan20&lt;/P&gt;&lt;P&gt;&amp;nbsp; ip address 10.1.20.1 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In order to do "layer-2" firewalling on a stick, you need to move the IP address for VLAN10 out of VLAN10 and into a different VLAN (we'll use VLAN110 in this example).&amp;nbsp; Same thing for VLAN20, move the IP address out of that VLAN and into VLAN120.&amp;nbsp; We then configure the Palo Alto Networks firewall to do L2 bridging (aka VLAN tag re-write) between VLAN10 and VLAN110, and between VLAN20 and VLAN120.&amp;nbsp; That's pretty easy to do on the Firewall side of things.&amp;nbsp; If you have trouble figuring that part out, let us know.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The Cisco L3 switch configuration will change to look like this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;vlan 10&lt;/P&gt;&lt;P&gt;vlan 20&lt;/P&gt;&lt;P&gt;vlan 110&lt;/P&gt;&lt;P&gt;vlan 120&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;int gi1/0/1&lt;/P&gt;&lt;P&gt;&amp;nbsp; desc "connection to server 1"&lt;/P&gt;&lt;P&gt;&amp;nbsp; switchport&amp;nbsp; &lt;/P&gt;&lt;P&gt;&amp;nbsp; switchport mode access&lt;/P&gt;&lt;P&gt;&amp;nbsp; switchport access vlan 10&lt;/P&gt;&lt;P&gt;&amp;nbsp; no shut&lt;/P&gt;&lt;P&gt;int gi1/0/2&lt;/P&gt;&lt;P&gt;&amp;nbsp; desc "connection to server 2"&lt;/P&gt;&lt;P&gt;&amp;nbsp; switchport&lt;/P&gt;&lt;P&gt;&amp;nbsp; switchport mode access&lt;/P&gt;&lt;P&gt;&amp;nbsp; switchport access vlan 20&lt;/P&gt;&lt;P&gt;&amp;nbsp; no shut&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;int gi1/0/24&lt;/P&gt;&lt;P&gt;&amp;nbsp; desc "trunk to PaloAltoNetworks"&lt;/P&gt;&lt;P&gt;&amp;nbsp; switchport&lt;/P&gt;&lt;P&gt;&amp;nbsp; switchport mode trunk&lt;/P&gt;&lt;P&gt;&amp;nbsp; switchport trunk allowed vlan all&lt;/P&gt;&lt;P&gt;&amp;nbsp; no shut&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface vlan10&lt;/P&gt;&lt;P&gt;&amp;nbsp; no ip address&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface vlan 110&lt;/P&gt;&lt;P&gt;&amp;nbsp; ip address 10.1.10.1 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface vlan20&lt;/P&gt;&lt;P&gt;&amp;nbsp; no ip address&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;interface vlan120 &lt;/P&gt;&lt;P&gt;&amp;nbsp; ip address 10.1.20.1 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So now if server1 wants to send packets anywhere, this is what happens:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;server1 arps for its default gateway.&amp;nbsp; The arp response doesn't come from the L3 switch in vlan10 because it doesn't have a virtual router interface in vlan10.&amp;nbsp; However, the arp broadcast gets sent out gi1/0/24 to the firewall, where the vlan tag 10 is stripped and tag 110 is added and sent back into the network.&amp;nbsp; The switch sees the ARP request from server1 in vlan110 and responds in vlan110.&amp;nbsp; That response is sent through the firewall where vlan tag 110 is stripped and vlan tag 10 is added.&amp;nbsp; Now, all traffic routing out of vlan10 must traverse the firewall at Layer2 before being routed by the L3 switch.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The end result is that traffic will be routed out of vlan10, but only after passing through through the firewall at layer2 - while keeping routing on the L3 switch itself.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps (and hope I described it well enough).&amp;nbsp;&amp;nbsp; Like I said earlier, L3 firewall on a stick is preferred, but this can work as well.&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Sep 2013 01:35:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/data-center-firewall-design/m-p/34364#M25216</guid>
      <dc:creator>jvalentine</dc:creator>
      <dc:date>2013-09-10T01:35:38Z</dc:date>
    </item>
    <item>
      <title>Re: Data center firewall design?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/data-center-firewall-design/m-p/34365#M25217</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello jvalentine,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your advised solution, your scenario seems closest what customer want... (retain L3 configuration and routing on switches). &lt;/P&gt;&lt;P&gt;Many customer with existing environments don't want to give firewalls to do routing jobs and they concerning in general, that routing on firewalls make significant overhead and maybe cause for potential performance issues. &lt;/P&gt;&lt;P&gt;To clarify this to customers and convince them to swap configuration, maybe right question is, how routing in general has performance impact on PAN firewalls?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Sep 2013 10:34:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/data-center-firewall-design/m-p/34365#M25217</guid>
      <dc:creator>Tician</dc:creator>
      <dc:date>2013-09-10T10:34:20Z</dc:date>
    </item>
    <item>
      <title>Re: Data center firewall design?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/data-center-firewall-design/m-p/34366#M25218</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;L3(Routing) Firewalling has the same performance as L2(Switching) Firewalling.&amp;nbsp; Palo Alto Networks does not make a performance distinction between the two.&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Sep 2013 14:53:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/data-center-firewall-design/m-p/34366#M25218</guid>
      <dc:creator>jvalentine</dc:creator>
      <dc:date>2013-09-10T14:53:19Z</dc:date>
    </item>
    <item>
      <title>Re: Data center firewall design?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/data-center-firewall-design/m-p/34367#M25219</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi jvalentine,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I trying to make this scenario but from cisco perspective, they introduced spanning-tree loop between bridged vlan's 10 and 110. Is there some recommendation, how to cope with spanning tree issue. Can I simply disable STP on cisco for bridged vlan's or other solution is preferred?&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 24 Sep 2013 10:09:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/data-center-firewall-design/m-p/34367#M25219</guid>
      <dc:creator>Tician</dc:creator>
      <dc:date>2013-09-24T10:09:49Z</dc:date>
    </item>
    <item>
      <title>Re: Data center firewall design?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/data-center-firewall-design/m-p/77137#M42534</link>
      <description>&lt;P&gt;I'm looking for the same design docs info.&lt;/P&gt;</description>
      <pubDate>Wed, 27 Apr 2016 14:36:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/data-center-firewall-design/m-p/77137#M42534</guid>
      <dc:creator>treese</dc:creator>
      <dc:date>2016-04-27T14:36:36Z</dc:date>
    </item>
    <item>
      <title>Re: Data center firewall design?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/data-center-firewall-design/m-p/357493#M87770</link>
      <description>&lt;P&gt;Hi Valentine,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thx for this interesting approach, could you point me into the direction of how I do the VLAN tag rewrite on the palo side.&lt;/P&gt;&lt;P&gt;I agree the best approach is moving SVI to palo but i would like to test&amp;nbsp; you suggestion.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Kind regards,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Frederik.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 20 Oct 2020 15:50:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/data-center-firewall-design/m-p/357493#M87770</guid>
      <dc:creator>GOMEZZZ</dc:creator>
      <dc:date>2020-10-20T15:50:59Z</dc:date>
    </item>
    <item>
      <title>Re: Data center firewall design?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/data-center-firewall-design/m-p/357496#M87773</link>
      <description>&lt;P&gt;Hi Valentine,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for thi interesting approach, i would like to test this in lab.&amp;nbsp; Can you point me to a direction&amp;nbsp; on how to do the vlan tag rewriting on palo.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 20 Oct 2020 16:03:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/data-center-firewall-design/m-p/357496#M87773</guid>
      <dc:creator>GOMEZZZ</dc:creator>
      <dc:date>2020-10-20T16:03:19Z</dc:date>
    </item>
  </channel>
</rss>

