- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
02-10-2019 11:31 PM
Hello.
In ECMP settings there is Strict Source Path option to enable. But I can't find any descriptin about this option anywhere. Anyone knows what exactly does this option do?
02-12-2019 05:53 AM
This has been bugging me since it was posted. I was finally able to do enough digging and found the answer.
Strict Source Path is a feature of the ECMP specification, rather than a feature unique to Palo Alto Networks. There are 2 types of source routing with ECMP, loose and strict.
Check the following RFC, section 3.1. The subsections are titled "Loose Source and Record Route" and "Strict Source and Record Route".
https://tools.ietf.org/rfc/rfc791.txt
Both require options in the IP header. Loose (type=131) is by far the most common, but some environments will need strict (type=137).
02-12-2019 05:53 AM
This has been bugging me since it was posted. I was finally able to do enough digging and found the answer.
Strict Source Path is a feature of the ECMP specification, rather than a feature unique to Palo Alto Networks. There are 2 types of source routing with ECMP, loose and strict.
Check the following RFC, section 3.1. The subsections are titled "Loose Source and Record Route" and "Strict Source and Record Route".
https://tools.ietf.org/rfc/rfc791.txt
Both require options in the IP header. Loose (type=131) is by far the most common, but some environments will need strict (type=137).
02-12-2019 06:09 AM
Hi @gwesson,
Thanks, i also had this query.
It may be not relevent here, but appreciate if you can clarify me in this option, I can see 'symmetric return' under ECMP option, is this a alternative option for symmetric return in dual ISP failover/ECMP scenario ?. i have seen in dual ISP scenarios, poeple were using PBF for symmetric return enforcement.
So if i have web services running inside and ECMP is enabled in dual ISP scenario, i just need to enable this option instead of doing PBF and select ' symmetric return' ?
02-12-2019 06:19 AM
@Abdul_Razaq they're related, but do different things in their own context. The PBF option is when you could have asymmetric routes, whereas in ECMP it overrides the inherent load balancing that ECMP provides. Both of the following are pulled from the inline help on the firewall from their respective sections:
Symmetric return in ECMP
Select Symmetric Return to cause return packets to egress out the same interface on which the associated ingress packets arrived. That is, the firewall will use the ingress interface on which to send return packets, rather than use the ECMP interface, so the Symmetric Return setting overrides load balancing. This behavior occurs only for traffic flows from the server to the client.
Symmetric return in PBF
08-08-2019 11:13 AM - edited 08-08-2019 03:46 PM
"strict source path" means no ECMP. It applies to firewall originated IKE/IPsec traffic. Traffic will be sent out over the tunnel based on which tunnel the source address belong to. It has nothing to do with real "source routing". It does not affect transit traffic. Similar to "symetric return" it is an exception of ECMP hashing.
11-21-2019 07:53 PM
Strict Source Path - I still to this day have no idea what this option is for, what it does or doesn't do, and when to and not to use it. Not a lot of documentation on it from Palo themselves.
12-15-2019 10:50 AM
are we sure this is correct?
"strict source path" means no ECMP. It applies to firewall originated IKE/IPsec traffic. Traffic will be sent out over the tunnel based on which tunnel the source address belong to. It has nothing to do with real "source routing". It does not affect transit traffic. Similar to "symetric return" it is an exception of ECMP hashing.
I see different behavior . Where traffic is from source is still doing route lookup to send traffic out.
Thanks
12-16-2019 09:50 AM
There seems some rework after my last comments. However, the behavior should not changed. Have you checked the new release notes?
02-07-2024 11:30 AM
For everyone potentially still looking and wondering, I found this in Palo 10.1 documentation:
Strict Source Path
|
By default, IKE and IPSec traffic originating at the firewall egresses an interface that the ECMP load-balancing method determines. Select
Strict Source Path
to ensure that IKE and IPSec traffic originating at the firewall always egresses the physical interface to which the source IP address of the IPSec tunnel belongs. Enable Strict Source Path when the firewall has more than one ISP providing equal-cost paths to the same destination. The ISPs typically perform a Reverse Path Forwarding (RPF) check (or a different check to prevent IP address spoofing) to confirm that the traffic is egressing the same interface on which it arrived. Because ECMP by default chooses an egress interface based on the configured ECMP method (instead of choosing the source interface as the egress interface), that will not be what the ISP expects and the ISP can block legitimate return traffic. In this use case, enable
Strict Source Path
so that the firewall uses the egress interface that is the interface to which the source IP address of the IPSec tunnel belongs. |
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!