I am very new to the PANOS world so I will apologize in advance if this is obvious, however my search of documentation and knowledebase did not yield anything. I have been looking for a way to administratively shut down sub interfaces. Is this possible? While it's easy enough to shutdown a physical interface by assigning it's link-state we're not seeing a way to do the same for an individual sub-interface.
It's a very useful feature when you are replacing existing equipment for example. The ability to disable a subinteterface would allow you to assign and commit an ip address that would potentially conflict with an existing piece of equipment. When you're ready to cut over you can just disable the interfaces on the old equipment and enable them on the PA firewall. This is why there's a concept of administrative shutdown in the cisco world for example.
You have a valid point, but we do not have that feature as of today on the box. You can contact your Sales Engineer for this enhancement request and he can apply one for you on your behalf. Till then you have to work around it with the steps that I mentioned before.
Has there been any advance on this?
Last message was 2013.
Moreover if I use the work around and set my subinterface into Zone = None, change the VR:
Will the interface still respond to packets?
E.g. ARP, ping etc?
I am replacing old FW with new Palo and I need to be sure even with above measures taken that there will be no effect of duplicating the existing live interface
Thanks for any reply
I'm facing the same situation right now. I want to replace the old FWs with the new Palo Alto FWs. So, I need to disable an exiting sub-interface on the old FWs and enable it on the new FWs. Select "none" for the sub-interface zone or "none" for the virtual router, or both it will take time for me. So, shutdown sub interfaces would make it easy.
Same here - I was going to hot-cut a 3-tier infrastructure into one cluster but I just got told yesterday I need to do it one tier at a time. I guess the zone workaround is about the same amount of but I don't feel comfortable with the zone option. I guess I'm old school, lol.
Edit: What about duplicate IP addresses? Does the zone workaround completely take it out of routing & ARP'ing? Since I'm moving multiple VLANs' gateways from one firewall to another there's the potential for IP address conflicts.
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!