- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
10-15-2015 02:32 AM
Hello,
We need to set up a VLANS in the office with the PA-500 but we don't like to change our address. It's possible to configure a VLANs with MAC address or protocole with PA-500?
Thanks
10-15-2015 02:47 AM
Hello
Did You read this https://live.paloaltonetworks.com/t5/Configuration-Articles/How-to-Configure-L3-Untagged-Subinterfac... ?
>It's possible to configure a VLANs with MAC address or protocole with PA-500?
Could You be more specific?
Regards
Slawek
10-15-2015 04:32 AM
Hi there
To enable vlan tags you should not be required to change IP addressing
assuming you start off with a simple L3 interface (let's say eth1/2) with ip range 192.168.0.0/24 which you want to move into vlan 10 it would suffice to take the following steps to make it work:
repeat the above process for all the vlans you want to split off, tagging each subinterface with the vlan you want to use
10-15-2015 06:19 AM
Hi,
Thank you very much for your response !
@_slv_ Yes, I read this document and want to use the mac address for not change the ip address range in our office.
@reaper Yes , I do this for the IT departments . I follow all this steps and I put the employees in the VLAN10. But for the HR departments I want to use other vlan 11 without change the IP address. It's possible to do the segmentation of the network with the mac address or the protocol ?? . Can you please help me for this
Thank you very much for your cooperation
10-15-2015 06:31 AM
ok, so all your users are located in the same subnet
on a larger platform you could enable Virtual Systems and have the 2 vlans on a different virtual instance. on a PA-500 unfortunately that is not supported, so you will probably need to segment your subnet into smaller parts to have the least impact.
we can't split that up based on MAC or protocol
10-15-2015 06:32 AM
Can you explain more what is your goal?
You can allow or block traffic based on source ip or source user.
Palo can't throw packets into diferent vlans based on soure mac address.
10-15-2015 06:43 AM
Hi,
@reaper Thank you very much for your response !
@Raido_Rattameister : the Goal is to do the segmentation of the network without change the ip address range . I want for exemple to do the segmentation based on MAC address of protocole .
10-15-2015 07:08 AM
Hi,
Its possible: put departments in different vlan's and use vwires between the vlan's to connect them.
10-15-2015 07:09 AM - edited 10-15-2015 07:10 AM
If you really want then you can configure firewall on Layer 2 also with Palo. Then it works as a switch. You have Layer 2 zones and you can create rules between them. All machines can be in same ip range.
In this case no need to change ip addresses.
You never design this from scratch but if environment is place then it can be used as workaround.
Throwing out google search link so you can check if this is something you need.
10-15-2015 07:25 AM
hi,
@Gertjan-HFG can you please explain more what i have doing ?
@Raido_Rattameister the only solution that i find it is to to the segmentation with ip address with subinterfaces and add the necessary tags for the vlan and in the switch i should configure a trunk port . I should in this way change the ip address range 😞
I don't know what should i do to realease my goal ?. how should i use PA-500 in L3 and L2 mode to do the segmentation without changing the ip address range ??
Thank you for all your helps
10-15-2015 07:34 AM
Ideal solution would be to configure vlan's on switch, place diferent workstations to seperate vlans with seperate IP subnets.
If you can't change ip addresses of your machines then you can change interface ses to Layer 2 mode.
Lets say ethernet 1 is internet zone, ethernet 2 is L2-it-department zone and ethernet 3 is L2-finance zone.
Then Palo interfaces 2 and 3 act like switch but you can create firewall rules between them.
There is some more complexity involved (like getting connectivity between L2 and L3 zones to access internet etc) but it is doable.
10-15-2015 07:36 AM
I'm sensing a lack of networking knowledge here ... please correct me if I'm wrong.
Putting clients in VLAN's is usually done closest to the "access" layer of a network (the access switches), not on a routing / firewall level (core).
That does not mean there's no need to use VLAN's on the firewall tho...
Use your firewall for firewalling, that's what it's designed for.
Sure, you can do it like that (different VLAN's in same addressing), but that soon will be a management nightmare that's way to complicated for what it actually only should do.
If there's a business need, I'd rather redesign the network entrely (even if means more work at first)...
10-15-2015 07:52 AM
Yes access switches should be configured to place users into seperate networks.
Those seperate networks come together into firewall (diferent layer 3 zones) and you create fw rules in between.
If you suddenly have to seperate existing network into diferent security zones without changing ip addresses then you can configure some interfaces as Layer 2 mode.
Lets say you configure ethernet2 and ethernet3.
You create 2 L2 zones. Lets say L2-it-departments and L2-finance.
You place ethernet2 into L2-it-department zone and ethernet3 into L2-finance zone.
You attach one switch to ethernet2 and connect all your it department computers to this switch.
You attach second switch to ethernet3 port and connect all your finance computers to that switch.
And then you can create policyes between L2-it-department zone and L2-finance zone.
They both still have same ip range in use.
You also have to have L3 vlan between virtual router and L2 zone so setting it up is a bit complicated but your local palo reseller should be able to help you out with the setup.
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!