Enhanced Security Measures in Place:   To ensure a safer experience, we’ve implemented additional, temporary security measures for all users.

recommendation when putting the Palo Alto in a vwire mode.

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
Announcements

recommendation when putting the Palo Alto in a vwire mode.

L3 Networker

Folks,

we have a switch to switch routing protocol running and the requirement is to put a palo alto in a vwire mode on such an environent. Please see the file attached with tis post.

 

Now, the catch to this is the "switch-out" forms neighbours with "switch-01" and "switch-02" and packets going inside one link could come out of the other. I just wanted to ensure that this will not cause any packets drops as long as the zones are correctly configured.

 

also, from a very high level what configuration would be needed? Convert each interface to a vwire? add the zones? add the policies? anything else?

 

 

Thanks!!!

 

 

 

PA Live Community.jpg

8 REPLIES 8

Cyber Elite
Cyber Elite

Does it have to be virtual wire?

What if you configure those 4 Palo interfaces in Layer 2 mode.

Set Ethernet 1 and 3 into one Aggregate Group.

Set Ethernet 4 and 6 into second Aggregate Group.

 

In this case all packets from same communication are correctly matched into correct session in Palo.

Enterprise Architect, Security @ Cloud Carib Ltd
Palo Alto Networks certified from 2011

thanks for the comments mate!!

 

Yes, it has to be virtual wire becuase we do not want to disturb anything in the existing setup. There is already routing protocols running between the switches and we want to retain that.

 

The firewall should maintain the state table from one zone to the other, right?

 

if yes, this should work without any challenges from what I think.

Hey I checked and virtual wire allows multiple interfaces in it also using aggregates.

 

virtual wire.JPG

Enterprise Architect, Security @ Cloud Carib Ltd
Palo Alto Networks certified from 2011

yes, I agree. But in my case the switches are on a single interface. There is no point using the aggregate interfaces. 🙂

 

aggregate interface would be needed if they are also connected to the same switch ...right?

It is not about switch. It is for Palo so that all packets both ways would be combined together into single virtual wire in Palo standpoint so it could correctly perform AppID and threat prevention.

Enterprise Architect, Security @ Cloud Carib Ltd
Palo Alto Networks certified from 2011

ok, understood. However, do you see a potential issue that could occur in the ealier design?

 

The firewall should still be able to keep session information if the packet comes inside over one path and goes out via the other, right?

 

 

When you create Aggregate Ethernet Interface in Palo you leave LACP disabled so switches are not aware that this traffic is merged in firewall.

 

How should firewall otherwise merge packets passing over different interfaces together into same session?

Enterprise Architect, Security @ Cloud Carib Ltd
Palo Alto Networks certified from 2011

Gave this another thought and you would need to test how traffic exits from vw. Might not exit from interface you need.

Do you have single firewall or HA pair.

If HA pair then maybe it can be designed using A/A setup.

Enterprise Architect, Security @ Cloud Carib Ltd
Palo Alto Networks certified from 2011
  • 5183 Views
  • 8 replies
  • 0 Likes
Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!

The LIVEcommunity thanks you for your participation!