- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
08-12-2013 03:49 PM
Hello everyone,
I decided to post here a question that I hope someone would be able to answer or at least provide some guide to which direction to move.
I have an opportunity to sell Palo Alto appliances to one of our clients and for that I need to show to the client that it is better that their current firewall.
So configuration:
Clients Perimeter Firewall: HA Fortinet 300C
For testing purposes: PA 2050 updated to PAN-OS 5.0.6.
Basic topology information:
Client has a Juniper router connected to WAN link, one cable goes from router to port 1 of Fortinet firewall (outside interface) and port 2 goes to LAN to core/distribution switch.
Assuming that other firewall of Fortinet is passive (it's active/passive cluster), I introduced PA 2050 as virtual wire on port 2 LAN interface of Fortinet Firewall.
The Problem:
After that no traffic is forwarded from LAN interface of Fortinet firewall to outside interface. Tracing packet from network host I can see that it reaches it's default gateway passing Palo Alto virtual wire deployment but goes no further.
I can see traffic traversing from LAN to WAN and even some applications, but speed is extremely slow and that is a prove that Palo Alto received and passes traffic.
My intuition tells me that the problem is somewhere within Fortinet (I cleaned arp cache but it didn't help) but I cannot really understand where could be the problem.
As soon as I connect back cable from Fortinet LAN interface back to core switch, everything is working again good.
Please let me know if anyone has an idea what's happening..
Thanks,
Val
08-12-2013 04:06 PM
Hi Val,
Two things you might want to look at. If they are using VLAN's then make sure that you have tag allowed in the vwire
Below is the description of tag allowed in vwire and a snapshot of where to configure it
Network--->virtual wire---. configured virtual wire
Secondly it would be good to have them in separate zone e.g VW-inside,VW-outside. So the logs can be seen in the traffic logs.
Network--> Zones
Now apply them to the interfaces you have the Vwires configured on
If all the above is done then make sure the security policy is allowed in both direction and no security profile is configured on it.
Once all the above has been verified and you have the traffic flowing then you can tighten up the policies and enable other features.
Also another thing you can consider is clearing the arp on the router or upstream side. If it is a modem or a connection provided i have seen where the arp does not clear out and the traffic does not flow properly on the upstream device. So if it is a small office modem or cable router then you might want to restart that as well to make sure arp is cleared on both Checkpoint and router and PA as well.
Let us know if this helps in convincing him.
Thanks
Numan
08-12-2013 04:24 PM
Hello mbutt,
Thanks for fast response. I do not remember exactly - probably I left Tag Allowed option without a value, could be possible solution due to that Fortinet LAN interface is connected to core switch within VLAN 10.
Definitely not policy issue due to virtual wire interface e0 by default is untrust zone and e1 is trust zone and by policy I allowed traffic untrust from trust and vice versa (I tried to install virtual wire on WAN interface and works fine, can see traffic).
Anyway, I'll try tag allowed option this Wednesday and post results here,
Thanks again,
Val
08-13-2013 12:24 AM
Hi,
Definitly a tag issue. If no tag is specify, only nativ vlan is allowed (vlan 0).
During test, the isisest way is to specify 0-4094 (then allow all vlan).
Hope help
V.
08-13-2013 06:36 AM
Thanks Vince, hope really it is.
Tomorrow at noon time I'll try it at client's side. Will post results here.
Val
08-15-2013 05:54 AM
I configured tagged traffic to pass through virtual wire connection and it didn't work. I have both security policies (inside->outside and vice versa) enabled and see traffic passing through Palo Alto, but still web navigation is extremely slow. I didn't have a chance to restart a router and probably never will due to specific reasons for this client. As a last resort, I offered this client to configure mirror port on his core switch, but it seems like client doesn't want to continue anymore..
Will see today final answer,
Thanks for help,
Val
08-16-2013 12:20 AM
Hi,
Does router and switch have foced speed and duplex ?
Often, slow traffic mean negotiation issue.
Hope help.
V.
08-16-2013 05:24 AM
Well,
it's 1 Gbps link so definitely is Full Duplex and auto-negotiation. I will probably go with mirror port, if client will want to continue. Thanks to all for help.
08-16-2013 05:29 AM
Hi,
Ok then if from a physocal point of vienw it's ok, try to type: show counter global filter delta yes. First time then again 5 second later andcCopy the result.
V.
08-16-2013 06:13 AM
Thanks V,
I will be able to try that only on the week that start of 26 of August. I will not be able to visit that client before.
As soon as it is done - I'll post the results here,
Thanks,
Val
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!