<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: BGP Configuration Help in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/bgp-configuration-help/m-p/386515#M90265</link>
    <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/145463"&gt;@DavidMaas1&lt;/a&gt; ,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It seems you are going in the right direction. First think I want to point out (I always start with this after it bit me in the past...) - By default firewall will receive and advertise (import and export) any rule that is in the BGP process - implicit allow. By once you create one rule for given peer, FW will switch to implicit deny - meaning that anything that is not matched by the rule you have configured for that peer will be denied (this is valid for both import and export).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So for me this boils down to two options:&lt;/P&gt;&lt;P&gt;- Create allow rules and list the networks you want to import/export. Deny everything else with the implicit deny&lt;/P&gt;&lt;P&gt;- Create allow all rule and create deny rules for the specific networks you don't want to import/export above the "allow-all".&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 18 Feb 2021 08:00:45 GMT</pubDate>
    <dc:creator>aleksandar.astardzhiev</dc:creator>
    <dc:date>2021-02-18T08:00:45Z</dc:date>
    <item>
      <title>BGP Configuration Help</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/bgp-configuration-help/m-p/386484#M90260</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;I am not a network engineer by no means and have setup basic BGP in the past with various peers with the peers being the source of truth for all routes.&lt;/P&gt;&lt;P&gt;I have a situation were our primary firewall has been using static routes for everything, default to internet, specific to DMZ, and all others to internal core switches. With the core switches having a default route pointing to the firewall.&lt;/P&gt;&lt;P&gt;The firewall has BGP setup to several of our Cloud solutions, and only being distributed to the firewall.&lt;/P&gt;&lt;P&gt;We not want to enable BGP between the core switches and the firewall. The network team wants the Firewall to redistribute all its static routes to the core switches, with a few exceptions. At the same time we need to distribute the same static routes to our Prisma, while denying specific ones to both the core and Prisma and the Cloud (ie. aws). I know we need to setup a redistribution profile to include all local static routes we want to advertise. Then setup export rules. This is were I have been having some issues, on the best way to implement these exports rules. If I use a permit rule for prisma and core, then I would need to include all the static routes, all the routes that would be learning from the cores and the routes learning from the existing Cloud. Then was thinking maybe using just a deny rule to restrict the learned routes, whether from local static or core, making&amp;nbsp; so everything else being distributed to everywhere else (i.e. core, prisma etc). Any guidance would be helpful... Thank you&lt;/P&gt;</description>
      <pubDate>Wed, 17 Feb 2021 21:46:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/bgp-configuration-help/m-p/386484#M90260</guid>
      <dc:creator>DavidMaas1</dc:creator>
      <dc:date>2021-02-17T21:46:10Z</dc:date>
    </item>
    <item>
      <title>Re: BGP Configuration Help</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/bgp-configuration-help/m-p/386515#M90265</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/145463"&gt;@DavidMaas1&lt;/a&gt; ,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It seems you are going in the right direction. First think I want to point out (I always start with this after it bit me in the past...) - By default firewall will receive and advertise (import and export) any rule that is in the BGP process - implicit allow. By once you create one rule for given peer, FW will switch to implicit deny - meaning that anything that is not matched by the rule you have configured for that peer will be denied (this is valid for both import and export).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So for me this boils down to two options:&lt;/P&gt;&lt;P&gt;- Create allow rules and list the networks you want to import/export. Deny everything else with the implicit deny&lt;/P&gt;&lt;P&gt;- Create allow all rule and create deny rules for the specific networks you don't want to import/export above the "allow-all".&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 18 Feb 2021 08:00:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/bgp-configuration-help/m-p/386515#M90265</guid>
      <dc:creator>aleksandar.astardzhiev</dc:creator>
      <dc:date>2021-02-18T08:00:45Z</dc:date>
    </item>
    <item>
      <title>Re: BGP Configuration Help</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/bgp-configuration-help/m-p/393114#M90984</link>
      <description>&lt;P&gt;Thank you .. that is how we went down the path, allow all and had specific denies.&lt;/P&gt;</description>
      <pubDate>Tue, 23 Mar 2021 20:40:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/bgp-configuration-help/m-p/393114#M90984</guid>
      <dc:creator>DavidMaas1</dc:creator>
      <dc:date>2021-03-23T20:40:21Z</dc:date>
    </item>
  </channel>
</rss>

