<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Degraded services after introducing Vwire + link aggregation deployment in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/degraded-services-after-introducing-vwire-link-aggregation/m-p/358677#M87911</link>
    <description>&lt;P&gt;So, if your original [internet switches (VSS pair)] &amp;lt;&amp;gt; [Cisco ASR] link is LACP, then when you introduce a Palo firewall you do not have to build AE-based v-wire. Just create several "single-legged" v-wires. In such configuration Palo will pass-through LACP control frames and thus the new firewall will be completeley transparent to the internet switches and the ASR, and thus you won't have to change anything on them.&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClHTCA0" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClHTCA0&lt;/A&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;You also need to make sure you specify tags of all VLANs that you want to allow on that link. By default you have only 0 that means only untagged traffic (all tagged frames will be dropped).&lt;/P&gt;</description>
    <pubDate>Mon, 26 Oct 2020 01:10:51 GMT</pubDate>
    <dc:creator>Nikolay-Matveev</dc:creator>
    <dc:date>2020-10-26T01:10:51Z</dc:date>
    <item>
      <title>Degraded services after introducing Vwire + link aggregation deployment</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/degraded-services-after-introducing-vwire-link-aggregation/m-p/358628#M87904</link>
      <description>&lt;P&gt;New guy, trying to deploy a new Palo Alto 3260 to my internet edge for extra protection -&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When I bring my Palo Alto 3260 inline at my internet edge, I start to experience severe packet loss almost immediately. It affects VDI View sessions and our Cisco Anyconnect solution, that live behind the Palo Alto firewall. I'm using this PA FW, temporarily, as a means to introduce DoS protection and GEO/country blocking. However, even before I could get to building and enabling those security profiles, the PA is degrading my hosted services. I built two aggregate interfaces, ae1 = outside and ae2 = inside. I added three copper connections toeach, and then applied vwire to it. I built my zones, and added the aggregate interfaces to the appropriate zone.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As a pretest - I setup a small network and routed it through the connecting devices that sit on each side of the PA as a test, and that worked great after moving away from LACP on the connected devices and went with standard etherchannel. However, when I swing multiple networks through the PA (multiple VLANs) I start seeing heavy packet loss and dropping 2 out of 3 packets in ping tests.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Initially, I was seeing drops in the logs from the "Intrazone" pre-built security policy, but once I changed the action on that rule to "PERMIT", I was no longer seeing drops in my logs on any security feature. I'm not confident that this was the right thing to do, but it seemed to cease the drop logs. This rule seemed to appear after applying the day1configuration file.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here is the topology:&amp;nbsp;&lt;/P&gt;&lt;P&gt;ISP -- &amp;gt; internet switches (VSS pair) --&amp;gt; PA 3260 --&amp;gt; Cisco ASR ---&amp;gt; DMZ switches --&amp;gt; ASA firewall ---&amp;gt;services&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When I only route a single network through the PA, I can send 1k+ packets between the internet switches and ASR without any loss.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any thoughts/feedback on where I should be looking???&lt;/P&gt;&lt;P&gt;Thanks in advance!&lt;/P&gt;</description>
      <pubDate>Sat, 24 Oct 2020 19:28:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/degraded-services-after-introducing-vwire-link-aggregation/m-p/358628#M87904</guid>
      <dc:creator>stephens112</dc:creator>
      <dc:date>2020-10-24T19:28:31Z</dc:date>
    </item>
    <item>
      <title>Re: Degraded services after introducing Vwire + link aggregation deployment</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/degraded-services-after-introducing-vwire-link-aggregation/m-p/358677#M87911</link>
      <description>&lt;P&gt;So, if your original [internet switches (VSS pair)] &amp;lt;&amp;gt; [Cisco ASR] link is LACP, then when you introduce a Palo firewall you do not have to build AE-based v-wire. Just create several "single-legged" v-wires. In such configuration Palo will pass-through LACP control frames and thus the new firewall will be completeley transparent to the internet switches and the ASR, and thus you won't have to change anything on them.&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClHTCA0" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClHTCA0&lt;/A&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;You also need to make sure you specify tags of all VLANs that you want to allow on that link. By default you have only 0 that means only untagged traffic (all tagged frames will be dropped).&lt;/P&gt;</description>
      <pubDate>Mon, 26 Oct 2020 01:10:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/degraded-services-after-introducing-vwire-link-aggregation/m-p/358677#M87911</guid>
      <dc:creator>Nikolay-Matveev</dc:creator>
      <dc:date>2020-10-26T01:10:51Z</dc:date>
    </item>
    <item>
      <title>Re: Degraded services after introducing Vwire + link aggregation deployment</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/degraded-services-after-introducing-vwire-link-aggregation/m-p/359915#M88029</link>
      <description>&lt;P&gt;Thank you Nikolay!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I will certainely give that a try and let you know how it goes.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Fri, 30 Oct 2020 14:52:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/degraded-services-after-introducing-vwire-link-aggregation/m-p/359915#M88029</guid>
      <dc:creator>stephens112</dc:creator>
      <dc:date>2020-10-30T14:52:12Z</dc:date>
    </item>
    <item>
      <title>Re: Degraded services after introducing Vwire + link aggregation deployment</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/degraded-services-after-introducing-vwire-link-aggregation/m-p/359916#M88030</link>
      <description>&lt;P&gt;Yes, please - post the outcome here. vwire deployments are always a good fun&lt;/P&gt;</description>
      <pubDate>Fri, 30 Oct 2020 15:08:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/degraded-services-after-introducing-vwire-link-aggregation/m-p/359916#M88030</guid>
      <dc:creator>Nikolay-Matveev</dc:creator>
      <dc:date>2020-10-30T15:08:48Z</dc:date>
    </item>
  </channel>
</rss>

