i have a scenario where the traffic works fine if it's forwarded by the routing table (and nat is applied)
when i used pbf, it didn't work, checking global counters i found oacket are dropped and the reason is "strict ip" option in the zone protection profile.
I run debug flow basic and got this message :
"source ip address in packet does not belong to interface address, packet dropped"
unchecking this option fixed the issue.
I did little research on this option and found it's releated to malformed packets not spoofing
we have spoofing check enabled but it's not affecting the operation (tried disabling it but everything is same)
So i see strict is making the spoof check but on the return traffic . Is that normal ?!
PAN OS 9.0.9-h1
The s2c traffic is dropping because of Strict IP is failing due to the source IP address is not routable over the exact ingress interface. The firewall decides if the address is routable by checking the routing table to see if a route exists for the server to use that interface.
Disabling Strict IP Address Check would allow the s2c traffic through the firewall, but it also introduces a security risk for that zone as well.
A better solution would be to add a route for the server address to use that interface. This would allow Strick IP Address Check can stay enabled and the routable check to succeed.
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!