- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
11-10-2023 09:03 AM
We have Palo Alto firewall with three Internet links. One is a leased line and other two are ADSL links. I have configured ECMP on the two ADSL lines to load balance traffic on the two ADSL links. Global Protect is configured on the leased line. I have configured default route to all the three internet links in the firewall. I have configured the default route for leased line with AD and metric to be lower than that of the ADSL links, then the global protect works fine, however the ADSL links do not appear in the FIB and thereby traffic does not go through the ADSL links. If the default route for the ADSL links are configured with AD and metric lower than that of leased line, the ADSL links appear in the FIB and loadbalancing of traffic over ADSL links work fine, however the global protect does not work as the default route for leased line is not added to FIB.
Any suggestions so that the load balancing is done on the ADSL links and global protect works fine?
11-10-2023 10:17 AM
What is your ideal goal? Which links you want to use for Internet and which not?
11-10-2023 10:48 AM
Hi Raido,
leased line for global protect
Two adsl links for user internet
Thanks
11-10-2023 11:20 AM
Virtual router can only route based on destination IP.
Set up ADSL links with same AD and metric.
ECMP will load balance outgoing traffic over those links.
For GlobalProtect set up PBF
Policies > Policy Based Forwarding
Source zone - GlobalProtect
Destination IP - "Not RFC1918 IP"
Next hop - Leased line ISP IP
PBF policies are checked before virtual router.
If any of PBF policies match then traffic will be routed accordingly and virtual router won't be checked.
11-10-2023 11:57 AM
Hi Raido,
I have tried this pbr rule but it didn’t work:
source - leased line interface
destination - any
next hop - gateway of leased line isp
Isn’t it the same?
Thanks,
11-10-2023 01:40 PM
No it is not the same because GlobalProtect traffic is not coming from leased line interface but it is arriving into Palo from GlobalProtect zone.
Tunnel interface that is configured in GlobalProtect gateway config has dedicated zone assigned or are you using genera INSIDE zone for that?
11-10-2023 07:27 PM
Hi Raido,
In my case, the global protect agent is not getting connected
Thanks,
11-10-2023 07:47 PM - edited 11-10-2023 07:48 PM
Probably because replies to incoming GlobalProtect connection attempts get response back from ADSL interface due routing preference.
No good solution.
I guess best is to set up dedicated virtual router for leased line.
11-12-2023 04:28 PM - edited 11-12-2023 04:30 PM
Hi @Dijesh ,
Enable Symmetric Return for ECMP and GP should work fine. https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-web-interface-help/network/network-virtual-route...
Your scenario is the reason the Symmetric Return option is there. We want the GP return packets to always go out the same interface they came in and not be load balanced.
Thanks,
Tom
11-12-2023 07:35 PM
Symmetric return overrides ECMP load balancing algorithm but it does not override fact that 0.0.0.0/0 route towards leased line does not exist in the forwarding table.
Default route towards leased line can't have same ad/metric because then outgoing traffic would also start using it.
Symmetric return would help only if all 3 ISP links (leased line and 2x ADSL) would have same AD and metric.
As goal is to load balance outgoing traffic out over both ADSL links (and not leased line) only feasible option is to place leased line interface into it's own virtual router.
Theoretically you could try to change load balance algorithm to "Weighted Round Robin", add all 3 ISP interfaces into the list, set both ADSL link weights to 255 and leased line weight to 1.
In this case only tiny amount of sessions would take outgoing path over leased line but it would not be completely zero. Benefit would be that all ISP links stay in same virtual router.
11-12-2023 07:44 PM
Hi Raido,
Thanks for your suggestions. Assigning the leased line to a separate virtual router fixed the issue.
Thanks,
11-13-2023 02:15 AM - edited 11-13-2023 02:18 AM
Hi @Raido_Rattameister ,
Thanks for clarifying the design. I missed that part.
Hi @Dijesh ,
We are glad it is working! Please mark @Raido_Rattameister reply as the solution.
Tom
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!