- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
12-19-2021 09:31 AM
Hi, PA port e1/2 is connected to switch port f1/5(L3). Both devices can see each other's ip and mac address. The Virtual router and Security zone and Magagement profile Ping are configured. but both devices cannot ping each other. Did I miss some step? Thank you
12-19-2021 09:04 PM
Make sure Ping is allowed to PA interface under Network and Interface MGMT.
Regards
12-20-2021 01:27 PM
Thank you for feedback @DavidyPalo
I am sorry, I would like to confirm one point. In your first post you mentioned: "The Virtual router and Security zone and Management profile Ping are configured." Since you mentioned it ping is working after creating new management profile, does it mean ping was not allowed in your previous management profile or it was not applied to interface from the beginning?
Regarding overriding, the intrazone-default rule, could you please click on in intrazone-default and navigate to the bottom of the page and click on overrride button?
Thank you and Regards
Pavel
12-19-2021 01:00 PM - edited 12-19-2021 01:03 PM
Thank you for post @DavidyPalo
By default Firewall is using management interface for ping. If you want to verify reachability of data plane interface you can change source: ping source <int 1/2 ip address> host <destination ip>
Kind Regards
Pavel
12-19-2021 03:13 PM - edited 12-19-2021 03:21 PM
Thank you for your reply! Now PA can ping SW, but the SW cannot ping PA. Maybe its default router configuration issue?
PA e1/2 10.200.255.1/24 ------------f1/5 SW 10.200.255.2/24
Below is virtual router vRTR-INET-Core:
12-19-2021 03:49 PM
Thank you for reply @DavidyPalo
Since you can ping Switch from Firewall and it is directly connected link, there should be no issue with routing. Have you checked Firewall's Traffic log to confirm ICMP arrives Firewall? Unless you have custom rule, this should hit by default: intrazone-default rule. Make sure that logging is enabled under: Actions > Log Setting > Log at session end, otherwise you will not see any logs hitting this rule.
Note: I can see that you have not configured Interface for static route. It is not mandatory if you have next hop, however if you want to make sure that next hop is reachable over certain interface you can hardcode it.
Kind Regards
Pavel
12-19-2021 06:36 PM
Hi PaveIK, where to enable Traffic Log?
under: Actions > Log Setting > Log , it cannot be found.
12-19-2021 07:19 PM
Thank you for reply @DavidyPalo
it is under security rule:
Kind Regards
Pavel
12-19-2021 08:14 PM
Why my PA show read-only? I did not setup Panorama
12-19-2021 08:21 PM
Hello @DavidyPalo
could you click on green gear icon and press override?
then you will be able to edit and commit the change.
Kind Regards
Pavel
12-19-2021 09:04 PM
Make sure Ping is allowed to PA interface under Network and Interface MGMT.
Regards
12-20-2021 01:27 PM
Thank you for feedback @DavidyPalo
I am sorry, I would like to confirm one point. In your first post you mentioned: "The Virtual router and Security zone and Management profile Ping are configured." Since you mentioned it ping is working after creating new management profile, does it mean ping was not allowed in your previous management profile or it was not applied to interface from the beginning?
Regarding overriding, the intrazone-default rule, could you please click on in intrazone-default and navigate to the bottom of the page and click on overrride button?
Thank you and Regards
Pavel
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!