Pan Os Networking Admin
Pan Os Networking Admin
Pan Os Networking Admin
Guide
Version 11.0
docs.paloaltonetworks.com
Contact Information
Corporate Headquarters:
Palo Alto Networks
3000 Tannery Way
Santa Clara, CA 95054
www.paloaltonetworks.com/company/contact-support
Copyright
Palo Alto Networks, Inc.
www.paloaltonetworks.com
© 2022-2023 Palo Alto Networks, Inc. Palo Alto Networks is a registered trademark of Palo
Alto Networks. A list of our trademarks can be found at www.paloaltonetworks.com/company/
trademarks.html. All other marks mentioned herein may be trademarks of their respective companies.
Last Revised
May 11, 2023
PAN-OS® Networking Administrator’s Guide Version 11.0 2 ©2023 Palo Alto Networks, Inc.
Table of Contents
Networking........................................................................................................ 11
Networking Introduction......................................................................................................... 12
Configure Interfaces........................................................................................15
Tap Interfaces.............................................................................................................................16
Virtual Wire Interfaces.............................................................................................................18
Layer 2 and Layer 3 Packets over a Virtual Wire.................................................. 19
Port Speeds of Virtual Wire Interfaces.................................................................... 20
LLDP over a Virtual Wire............................................................................................ 20
Aggregated Interfaces for a Virtual Wire................................................................ 20
Virtual Wire Support of High Availability................................................................20
Zone Protection for a Virtual Wire Interface......................................................... 21
VLAN-Tagged Traffic.................................................................................................... 21
Virtual Wire Subinterfaces.......................................................................................... 21
Configure Virtual Wires............................................................................................... 24
Layer 2 Interfaces..................................................................................................................... 26
Layer 2 Interfaces with No VLANs........................................................................... 26
Layer 2 Interfaces with VLANs.................................................................................. 27
Configure a Layer 2 Interface.....................................................................................28
Configure a Layer 2 Interface, Subinterface, and VLAN...................................... 28
Manage Per-VLAN Spanning Tree (PVST+) BPDU Rewrite................................ 29
Layer 3 Interfaces..................................................................................................................... 33
Configure Layer 3 Interfaces...................................................................................... 33
Manage IPv6 Hosts Using NDP.................................................................................43
Configure a PPPoE Client on a Subinterface..................................................................... 49
Configure an Aggregate Interface Group............................................................................54
Configure Bonjour Reflector for Network Segmentation............................................... 58
Use Interface Management Profiles to Restrict Access...................................................61
Virtual Routers..................................................................................................63
Virtual Router Overview......................................................................................................... 64
Configure Virtual Routers....................................................................................................... 65
Service Routes.................................................................................................. 67
Service Routes Overview........................................................................................................ 68
Configure Service Routes........................................................................................................69
Static Routes..................................................................................................... 71
Static Route Overview.............................................................................................................72
PAN-OS® Networking Administrator’s Guide Version 11.0 3 ©2023 Palo Alto Networks, Inc.
Table of Contents
RIP........................................................................................................................ 81
RIP Overview..............................................................................................................................82
Configure RIP............................................................................................................................. 83
OSPF....................................................................................................................85
OSPF Concepts..........................................................................................................................86
OSPFv3.............................................................................................................................86
OSPF Neighbors.............................................................................................................87
OSPF Areas..................................................................................................................... 87
OSPF Router Types.......................................................................................................87
Configure OSPF......................................................................................................................... 89
Configure OSPFv3.................................................................................................................... 92
Configure OSPF Graceful Restart......................................................................................... 96
Confirm OSPF Operation........................................................................................................ 97
View the Routing Table............................................................................................... 97
Confirm OSPF Adjacencies......................................................................................... 97
Confirm that OSPF Connections are Established.................................................. 97
BGP...................................................................................................................... 99
BGP Overview......................................................................................................................... 100
MP-BGP.....................................................................................................................................101
Configure BGP.........................................................................................................................103
Configure a BGP Peer with MP-BGP for IPv4 or IPv6 Unicast................................... 110
Configure a BGP Peer with MP-BGP for IPv4 Multicast.............................................. 113
BGP Confederations...............................................................................................................115
IP Multicast..................................................................................................... 121
IGMP.......................................................................................................................................... 122
PIM............................................................................................................................................. 124
Shortest-Path Tree (SPT) and Shared Tree...........................................................126
PIM Assert Mechanism..............................................................................................128
Reverse-Path Forwarding..........................................................................................128
Configure IP Multicast...........................................................................................................130
View IP Multicast Information.............................................................................................138
Route Redistribution.....................................................................................141
Route Redistribution Overview...........................................................................................142
Configure Route Redistribution...........................................................................................143
PAN-OS® Networking Administrator’s Guide Version 11.0 4 ©2023 Palo Alto Networks, Inc.
Table of Contents
GRE Tunnels....................................................................................................147
GRE Tunnel Overview........................................................................................................... 148
Create a GRE Tunnel............................................................................................................. 150
DHCP................................................................................................................ 153
DHCP Overview......................................................................................................................154
Firewall as a DHCP Server and Client...............................................................................155
Firewall as a DHCPv6 Client............................................................................................... 156
DHCP Messages......................................................................................................................159
DHCP Addressing................................................................................................................... 161
DHCP Address Allocation Methods....................................................................... 161
DHCP Leases................................................................................................................161
DHCP Options.........................................................................................................................163
Predefined DHCP Options........................................................................................163
Multiple Values for a DHCP Option.......................................................................164
DHCP Options 43, 55, and 60 and Other Customized Options...................... 164
Configure an Interface as a DHCP Server........................................................................166
Configure an Interface as a DHCPv4 Client.................................................................... 170
Configure an Interface as a DHCPv6 Client with Prefix Delegation.......................... 172
Configure the Management Interface as a DHCP Client..............................................187
Configure an Interface as a DHCP Relay Agent............................................................. 190
Monitor and Troubleshoot DHCP...................................................................................... 191
View DHCP Server Information.............................................................................. 191
Clear DHCP Leases.....................................................................................................191
View DHCP Client Information............................................................................... 192
Gather Debug Output about DHCP.......................................................................192
DNS................................................................................................................... 193
DNS Overview.........................................................................................................................194
DNS Proxy Object.................................................................................................................. 196
DNS Server Profile................................................................................................................. 197
Multi-Tenant DNS Deployments........................................................................................ 198
Configure a DNS Proxy Object........................................................................................... 200
Configure a DNS Server Profile.......................................................................................... 203
Configure a Web Proxy........................................................................................................ 204
Configure Explicit Proxy............................................................................................ 205
Configure Transparent Proxy................................................................................... 213
Configure Authentication for Explicit Web Proxy...............................................219
Use Case 1: Firewall Requires DNS Resolution.............................................................. 232
Use Case 2: ISP Tenant Uses DNS Proxy to Handle DNS Resolution for Security
Policies, Reporting, and Services within its Virtual System.......................................... 234
PAN-OS® Networking Administrator’s Guide Version 11.0 5 ©2023 Palo Alto Networks, Inc.
Table of Contents
Use Case 3: Firewall Acts as DNS Proxy Between Client and Server........................237
DNS Proxy Rule and FQDN Matching.............................................................................. 239
DDNS................................................................................................................ 243
Dynamic DNS Overview....................................................................................................... 244
Configure Dynamic DNS for Firewall Interfaces.............................................................247
NAT................................................................................................................... 251
NAT Policy Rules.................................................................................................................... 252
NAT Policy Overview.................................................................................................252
NAT Address Pools Identified as Address Objects............................................. 253
Proxy ARP for NAT Address Pools.........................................................................253
Source NAT and Destination NAT..................................................................................... 255
Source NAT...................................................................................................................255
Destination NAT..........................................................................................................257
Destination NAT with DNS Rewrite Use Cases.................................................. 259
NAT Rule Capacities.............................................................................................................. 265
Dynamic IP and Port NAT Oversubscription................................................................... 266
Dataplane NAT Memory Statistics..................................................................................... 267
Configure NAT.........................................................................................................................268
Translate Internal Client IP Addresses to Your Public IP Address (Source DIPP
NAT)................................................................................................................................269
Enable Clients on the Internal Network to Access your Public Servers
(Destination U-Turn NAT).........................................................................................270
Enable Bi-Directional Address Translation for Your Public-Facing Servers
(Static Source NAT).................................................................................................... 271
Configure Destination NAT with DNS Rewrite................................................... 272
Configure Destination NAT Using Dynamic IP Addresses................................ 273
Modify the Oversubscription Rate for DIPP NAT...............................................275
Reserve Dynamic IP NAT Addresses..................................................................... 275
Disable NAT for a Specific Host or Interface.......................................................277
NAT Configuration Examples...............................................................................................278
Destination NAT Example—One-to-One Mapping............................................. 278
Destination NAT with Port Translation Example................................................ 279
Destination NAT Example—One-to-Many Mapping...........................................280
Source and Destination NAT Example...................................................................280
Virtual Wire Source NAT Example......................................................................... 282
Virtual Wire Static NAT Example............................................................................283
Virtual Wire Destination NAT Example.................................................................283
NPTv6............................................................................................................... 285
NPTv6 Overview.....................................................................................................................286
PAN-OS® Networking Administrator’s Guide Version 11.0 6 ©2023 Palo Alto Networks, Inc.
Table of Contents
NAT64.............................................................................................................. 297
NAT64 Overview.................................................................................................................... 298
IPv4-Embedded IPv6 Address............................................................................................. 299
DNS64 Server.......................................................................................................................... 300
Path MTU Discovery..............................................................................................................301
IPv6-Initiated Communication............................................................................................. 302
Configure NAT64 for IPv6-Initiated Communication.................................................... 304
Configure NAT64 for IPv4-Initiated Communication.................................................... 307
Configure NAT64 for IPv4-Initiated Communication with Port Translation............ 310
ECMP................................................................................................................ 313
ECMP Load-Balancing Algorithms......................................................................................314
Configure ECMP on a Virtual Router................................................................................ 316
Enable ECMP for Multiple BGP Autonomous Systems.................................................319
Verify ECMP.............................................................................................................................320
LLDP..................................................................................................................321
LLDP Overview....................................................................................................................... 322
Supported TLVs in LLDP...................................................................................................... 323
LLDP Syslog Messages and SNMP Traps......................................................................... 325
Configure LLDP....................................................................................................................... 326
View LLDP Settings and Status...........................................................................................328
Clear LLDP Statistics..............................................................................................................330
BFD....................................................................................................................331
BFD Overview......................................................................................................................... 332
BFD Model, Interface, and Client Support............................................................333
Non-Supported RFC Components of BFD........................................................... 333
PAN-OS® Networking Administrator’s Guide Version 11.0 7 ©2023 Palo Alto Networks, Inc.
Table of Contents
PAN-OS® Networking Administrator’s Guide Version 11.0 8 ©2023 Palo Alto Networks, Inc.
Table of Contents
PoE.....................................................................................................................541
PoE Overview.......................................................................................................................... 542
Configure PoE..........................................................................................................................543
PAN-OS® Networking Administrator’s Guide Version 11.0 9 ©2023 Palo Alto Networks, Inc.
Table of Contents
PAN-OS® Networking Administrator’s Guide Version 11.0 10 ©2023 Palo Alto Networks, Inc.
Networking
All Palo Alto Networks® next-generation firewalls provide a flexible networking
architecture that includes support for dynamic routing, switching, and VPN
connectivity, and enables you to deploy the firewall into nearly any networking
environment.
11
Networking
Networking Introduction
Networking is the fundamental building block of the firewalls because they must be able to
receive data, process it, and forward it. When configuring the Ethernet ports on your firewall, you
can choose from tap, virtual wire, Layer2, Layer 3, or AE interface deployments. In addition, to
allow you to integrate into a variety of network segments, you can configure different types of
interfaces on different ports.
®
To begin networking, you should first access the Getting Started topic in the PAN-OS
Administrator's Guide. There you learn about segmenting your network and you Configure
Interfaces and Zones; that initial task illustrates how to configure Layer 3 interfaces to connect to
the internet, your internal network, and your data center applications.
This PAN-OS Networking Administrator's Guide elaborates on that information with topics
on how to configure tap, virtual wire, Layer 2, Layer 3, and AE interfaces. After your network
interfaces have been configured, you can Export Configuration Table Data as a PDF or CSV for
internal review or audits.
This guide also explains how the firewall supports multiple virtual routers to obtain Layer 3 routes
to other subnets and to maintain separate sets of routes. The remaining chapters describe static
routes, dynamic routing protocols, and the major features that support networking on the firewall.
You may decide to enable Advanced Routing. The Advanced Routing Engine uses logical
routers instead of virtual routers.
• Configure Interfaces
• Virtual Routers
• Service Routes
• Static Routes
• RIP
• OSPF
• BGP
• IP Multicast
• Route Redistribution
• GRE Tunnels
• DHCP
• DNS
• DDNS
• NAT
• NPTv6
• NAT64
• ECMP
• LLDP
PAN-OS® Networking Administrator’s Guide Version 11.0 12 ©2023 Palo Alto Networks, Inc.
Networking
• BFD
• Session Settings and Timeouts
• Tunnel Content Inspection
• Network Packet Broker
• PoE
PAN-OS® Networking Administrator’s Guide Version 11.0 13 ©2023 Palo Alto Networks, Inc.
Networking
PAN-OS® Networking Administrator’s Guide Version 11.0 14 ©2023 Palo Alto Networks, Inc.
Configure Interfaces
®
A Palo Alto Networks next-generation firewall can operate in multiple deployments
at once because the deployments occur at the interface level. For example, you can
configure some interfaces for Layer 3 interfaces to integrate the firewall into your
dynamic routing environment, while configuring other interfaces to integrate into your
Layer 2 switching network.
The following topics describe each type of interface deployment and how to configure
it, how to configure Bonjour Reflector, and how to use interface management profiles.
15
Configure Interfaces
Tap Interfaces
A network tap is a device that provides a way to access data flowing across a computer network.
Tap mode deployment allows you to passively monitor traffic flows across a network by way of a
switch SPAN or mirror port.
The SPAN or mirror port permits the copying of traffic from other ports on the switch. By
dedicating an interface on the firewall as a tap mode interface and connecting it with a switch
SPAN port, the switch SPAN port provides the firewall with the mirrored traffic. This provides
application visibility within the network without being in the flow of network traffic.
By deploying the firewall in tap mode, you can get visibility into what applications are running on
your network without having to make any changes to your network design. In addition, when in
tap mode, the firewall can also identify threats on your network. Keep in mind, however, because
the traffic is not running through the firewall when in tap mode it cannot take any action on the
traffic, such as blocking traffic with threats or applying QoS traffic control.
To configure a tap interface and begin monitoring the applications and threats on your network:
STEP 1 | Decide which port you want to use as your tap interface and connect it to a switch
configured with SPAN/RSPAN or port mirroring.
You will send your network traffic from the SPAN destination port through the firewall so you
can have visibility into the applications and threats on your network.
STEP 2 | From the firewall web interface, configure the interface you want to use as your network
tap.
1. Select Network > Interfaces and select the interface that corresponds to the port you
just cabled.
2. Select Tap as the Interface Type.
3. On the Config tab, expand the Security Zone and select New Zone.
4. In the Zone dialog, enter a Name for new zone, for example TapZone, and then click OK.
STEP 4 | Create Security Profiles to scan your network traffic for threats:
1. Select Objects > Security Profiles.
2. For each security profile type, Add a new profile and set the action to alert.
Because the firewall is not inline with the traffic you cannot use any block or reset
actions. By setting the action to alert, you will be able to see any threats the firewall
detects in the logs and ACC.
PAN-OS® Networking Administrator’s Guide Version 11.0 16 ©2023 Palo Alto Networks, Inc.
Configure Interfaces
STEP 5 | Create a security policy rule to allow the traffic through the tap interface.
When creating a security policy rule for tap mode, both the source zone and destination zone
must be the same.
1. Select Policies > Security and click Add.
2. In the Source tab, set the Source Zone to the TapZone you just created.
3. In the Destination tab, set the Destination Zone to the TapZone also.
4. Set the all of the rule match criteria (Applications, User, Service, Address) to any.
5. In the Actions tab, set the Action Setting to Allow.
6. Set Profile Type to Profiles and select each of the security profiles you created to alert
you of threats.
7. Verify that Log at Session End is enabled.
8. Click OK.
9. Place the rule at the top of your rulebase.
STEP 6 | (Supported firewalls only) If the interface corresponds to a PoE (Power over Ethernet) port
on the firewall, you can optionally configure PoE.
STEP 8 | Monitor the firewall logs (Monitor > Logs) and the ACC for insight into the applications and
threats on your network.
PAN-OS® Networking Administrator’s Guide Version 11.0 17 ©2023 Palo Alto Networks, Inc.
Configure Interfaces
Each virtual wire interface is directly connected to a Layer 2 or Layer 3 networking device or host.
The virtual wire interfaces have no Layer 2 or Layer 3 addresses. When one of the virtual wire
interfaces receives a frame or packet, it ignores any Layer 2 or Layer 3 addresses for switching or
routing purposes, but applies your security or NAT policy rules before passing an allowed frame or
packet over the virtual wire to the second interface and on to the network device connected to it.
You wouldn’t use a virtual wire deployment for interfaces that need to support switching, VPN
tunnels, or routing because they require a Layer 2 or Layer 3 address. A virtual wire interface
doesn’t use an interface management profile, which controls services such as HTTP and ping and
therefore requires the interface have an IP address.
PAN-OS® Networking Administrator’s Guide Version 11.0 18 ©2023 Palo Alto Networks, Inc.
Configure Interfaces
All firewalls shipped from the factory have two Ethernet ports (ports 1 and 2) preconfigured as
virtual wire interfaces, and these interfaces allow all untagged traffic.
If you’re using security group tags (SGTs) in a Cisco TrustSec network, it’s a best practice
to deploy inline firewalls in either Layer 2 or virtual wire mode. Firewalls in Layer 2 or
virtual wire mode can inspect and provide threat prevention for the tagged traffic.
If you don’t intend to use the preconfigured virtual wire, you must delete that
configuration to prevent it from interfering with other settings you configure on the
firewall. See Set Up Network Access for External Services.
PAN-OS® Networking Administrator’s Guide Version 11.0 19 ©2023 Palo Alto Networks, Inc.
Configure Interfaces
If you enable multicast firewalling for a virtual wire object and apply it to a virtual wire interface,
the firewall inspects multicast traffic and forwards it or not, based on security policy rules. If you
don’t enable multicast firewalling, the firewall simply forwards multicast traffic transparently.
Fragmentation on a virtual wire occurs the same as in other interface deployment modes.
In order for aggregate interface groups to function properly, ensure all links belonging to
the same LACP group on the same side of the virtual wire are assigned to the same zone.
PAN-OS® Networking Administrator’s Guide Version 11.0 20 ©2023 Palo Alto Networks, Inc.
Configure Interfaces
VLAN-Tagged Traffic
Virtual wire interfaces by default allow all untagged traffic. You can, however, use a virtual wire to
connect two interfaces and configure either interface to block or allow traffic based on the virtual
LAN (VLAN) tags. VLAN tag 0 indicates untagged traffic.
You can also create multiple subinterfaces, add them into different zones, and then classify traffic
according to a VLAN tag or a combination of a VLAN tag with IP classifiers (address, range, or
subnet) to apply granular policy control for specific VLAN tags or for VLAN tags from a specific
source IP address, range, or subnet.
• Configure two Ethernet interfaces as type virtual wire, and assign these interfaces to a
virtual wire.
• Create subinterfaces on the parent Virtual Wire to separate CustomerA and CustomerB
traffic. Make sure that the VLAN tags defined on each pair of subinterfaces that are
configured as virtual wire(s) are identical. This is essential because a virtual wire does not
switch VLAN tags.
PAN-OS® Networking Administrator’s Guide Version 11.0 21 ©2023 Palo Alto Networks, Inc.
Configure Interfaces
• Create new subinterfaces and define IP classifiers. This task is optional and only required if
you wish to add additional subinterfaces with IP classifiers for further managing traffic from
a customer based on the combination of VLAN tags and a specific source IP address, range
or subnet.
You can also use IP classifiers for managing untagged traffic. To do so, you must create a
sub-interface with the vlan tag “0”, and define subinterface(s) with IP classifiers for managing
untagged traffic using IP classifiers.
IP classification may only be used on the subinterfaces associated with one side of the
virtual wire. The subinterfaces defined on the corresponding side of the virtual wire must
use the same VLAN tag, but must not include an IP classifier.
Virtual Wire Deployment with Subinterfaces (VLAN Tags only) depicts CustomerA and CustomerB
connected to the firewall through one physical interface, ethernet1/1, configured as a Virtual
Wire; it is the ingress interface. A second physical interface, ethernet1/2, is also part of the Virtual
Wire; it is the egress interface that provides access to the internet.
For CustomerA, you also have subinterfaces ethernet1/1.1 (ingress) and ethernet1/2.1 (egress).
For CustomerB, you have the subinterface ethernet1/1.2 (ingress) and ethernet1/2.2 (egress).
When configuring the subinterfaces, you must assign the appropriate VLAN tag and zone in
order to apply policies for each customer. In this example, the policies for CustomerA are created
between Zone1 and Zone2, and policies for CustomerB are created between Zone3 and Zone4.
When traffic enters the firewall from CustomerA or CustomerB, the VLAN tag on the incoming
packet is first matched against the VLAN tag defined on the ingress subinterfaces. In this example,
a single subinterface matches the VLAN tag on the incoming packet, hence that subinterface is
selected. The policies defined for the zone are evaluated and applied before the packet exits from
the corresponding subinterface.
The same VLAN tag must not be defined on the parent virtual wire interface and the
subinterface. Verify that the VLAN tags defined on the Tag Allowed list of the parent
virtual wire interface (Network > Virtual Wires) are not included on a subinterface.
Virtual Wire Deployment with Subinterfaces (VLAN Tags and IP Classifiers) depicts CustomerA
and CustomerB connected to one physical firewall that has two virtual systems (vsys), in addition
to the default virtual system (vsys1). Each virtual system is an independent virtual firewall that
is managed separately for each customer. Each vsys has attached interfaces/subinterfaces and
security zones that are managed independently.
PAN-OS® Networking Administrator’s Guide Version 11.0 22 ©2023 Palo Alto Networks, Inc.
Configure Interfaces
Figure 2: Virtual Wire Deployment with Subinterfaces (VLAN Tags and IP Classifiers)
Vsys1 is set up to use the physical interfaces ethernet1/1 and ethernet1/2 as a virtual wire;
ethernet1/1 is the ingress interface and ethernet1/2 is the egress interface that provides access
to the Internet. This virtual wire is configured to accept all tagged and untagged traffic with the
exception of VLAN tags 100 and 200 that are assigned to the subinterfaces.
CustomerA is managed on vsys2 and CustomerB is managed on vsys3. On vsys2 and vsys3, the
following vwire subinterfaces are created with the appropriate VLAN tags and zones to enforce
policy measures.
PAN-OS® Networking Administrator’s Guide Version 11.0 23 ©2023 Palo Alto Networks, Inc.
Configure Interfaces
When traffic enters the firewall from CustomerA or CustomerB, the VLAN tag on the incoming
packet is first matched against the VLAN tag defined on the ingress subinterfaces. In this case,
for CustomerA, there are multiple subinterfaces that use the same VLAN tag. Hence, the firewall
first narrows the classification to a subinterface based on the source IP address in the packet.
The policies defined for the zone are evaluated and applied before the packet exits from the
corresponding subinterface.
For return-path traffic, the firewall compares the destination IP address as defined in the IP
classifier on the customer-facing subinterface and selects the appropriate virtual wire to route
traffic through the accurate subinterface.
The same VLAN tag must not be defined on the parent virtual wire interface and the
subinterface. Verify that the VLAN tags defined on the Tag Allowed list of the parent
virtual wire interface (Network > Virtual Wires) are not included on a subinterface.
PAN-OS® Networking Administrator’s Guide Version 11.0 24 ©2023 Palo Alto Networks, Inc.
Configure Interfaces
consistent link state, as if there were no firewall between them. If you don’t select this
option, link status is not propagated across the virtual wire.
7. Click OK to save the virtual wire object.
STEP 4 | Configure the second virtual wire interface (ethernet1/4 in this example) by repeating the
preceding steps.
When you select the Virtual Wire object you created, the firewall automatically adds the
second virtual wire interface as Interface2.
STEP 5 | Create a separate security zone for each virtual wire interface.
1. Select Network > Zones and Add a zone.
2. Enter the Name of the zone (such as internet).
3. For Location, select the virtual system where the zone applies.
4. For Type, select Virtual Wire.
5. Add the Interface that belongs to the zone.
6. Click OK.
STEP 6 | (Optional) Create security policy rules to allow Layer 3 traffic to pass through.
To allow Layer 3 traffic across the virtual wire, Create a Security Policy Rule to allow traffic
from the user zone to the internet zone, and another to allow traffic from the internet zone to
the user zone, selecting the applications you want to allow, such as BGP or OSPF.
STEP 8 | (Supported firewalls only) If the interface corresponds to a PoE (Power over Ethernet) port
on the firewall, you can optionally configure PoE.
STEP 10 | (Optional) Configure an LLDP profile and apply it to the virtual wire interfaces (see Configure
LLDP).
STEP 11 | (Optional) Apply non-IP protocol control to the virtual wire zones (Configure Protocol
Protection). Otherwise, all non-IP traffic is forwarded over the virtual wire.
PAN-OS® Networking Administrator’s Guide Version 11.0 25 ©2023 Palo Alto Networks, Inc.
Configure Interfaces
Layer 2 Interfaces
In a Layer 2 deployment, the firewall provides switching between two or more networks. Devices
are connected to a Layer 2 segment; the firewall forwards the frames to the proper port, which
is associated with the MAC address identified in the frame. Configure a Layer 2 Interface when
switching is required.
If you’re using security group tags (SGTs) in a Cisco TrustSec network, it’s a best practice
to deploy inline firewalls in either Layer 2 or virtual wire mode. Firewalls in Layer 2 or
virtual wire mode can inspect and provide threat prevention for the tagged traffic.
The following topics describe the different types of Layer 2 interfaces you can configure for each
type of deployment you need, including details on using virtual LANs (VLANs) for traffic and
policy separation among groups. Another topic describes how the firewall rewrites the inbound
port VLAN ID number in a Cisco per-VLAN spanning tree (PVST+) or Rapid PVST+ bridge protocol
data unit (BPDU).
• Layer 2 Interfaces with No VLANs
• Layer 2 Interfaces with VLANs
• Configure a Layer 2 Interface
• Configure a Layer 2 Interface, Subinterface, and VLAN
• Manage Per-VLAN Spanning Tree (PVST+) BPDU Rewrite
PAN-OS® Networking Administrator’s Guide Version 11.0 26 ©2023 Palo Alto Networks, Inc.
Configure Interfaces
The firewall begins with an empty MAC table. When the host with source address 0A-76-
F2-60-EA-83 sends a frame to the firewall, the firewall doesn’t have destination address
0B-68-2D-05-12-76 in its MAC table, so it doesn’t know which interface to forward the frame
to; it broadcasts the frame to all of its Layer 2 interfaces. The firewall puts source address 0A-76-
F2-60-EA-83 and associated Eth1/1 into its MAC table.
The host at 0C-71-D4-E6-13-44 receives the broadcast, but the destination MAC address is not
its own MAC address, so it drops the frame.
The receiving interface Ethernet 1/2 forwards the frame to its host. When host
0B-68-2D-05-12-76 responds, it uses the destination address 0A-76-F2-60-EA-83, and the
firewall adds to its MAC table Ethernet 1/2 as the interface to reach 0B-68-2D-05-12-76.
PAN-OS® Networking Administrator’s Guide Version 11.0 27 ©2023 Palo Alto Networks, Inc.
Configure Interfaces
In this example, the host at MAC address 0A-76-F2-60-EA-83 sends a frame with VLAN ID 10
to the firewall, which the firewall broadcasts to its other L2 interfaces. Ethernet interface 1/3
accepts the frame because it’s connected to the host with destination 0C-71-D4-E6-13-44 and
its subinterface .1 is assigned VLAN 10. Ethernet interface 1/3 forwards the frame to the Finance
host.
STEP 2 | Commit.
Click OK and Commit.
PAN-OS® Networking Administrator’s Guide Version 11.0 28 ©2023 Palo Alto Networks, Inc.
Configure Interfaces
STEP 1 | Configure a Layer 2 interface and subinterface and assign a VLAN ID.
1. Select Network > Interfaces > Ethernet and select an interface. The Interface Name is
fixed, such as ethernet1/1.
2. For Interface Type, select Layer2.
3. Select the Config tab.
4. For VLAN, leave the setting None.
5. Assign the interface to a Security Zone or create a New Zone.
6. Click OK.
7. With the Ethernet interface highlighted, click Add Subinterface.
8. The Interface Name remains fixed. After the period, enter the subinterface number, in
the range 1 to 9,999.
9. Enter a VLAN Tag ID in the range 1 to 4,094.
10. Assign the subinterface to a Security Zone.
11. Click OK.
STEP 2 | Commit.
Click Commit.
STEP 3 | (Optional) Apply a Zone Protection profile with protocol protection to control non-IP
protocol packets between Layer 2 zones (or between interfaces within a Layer 2 zone).
Configure Protocol Protection.
The Cisco switch must have the loopguard disabled for the PVST+ or Rapid PVST+ BPDU
rewrite to function properly on the firewall.
This feature is supported on Layer 2 Ethernet and Aggregated Ethernet (AE) interfaces only. The
firewall supports a PVID range of 1 to 4,094 with a native VLAN ID of 1 to be compatible with the
Cisco native VLAN implementation.
To support the PVST+ BPDU rewrite feature, PAN-OS supports the concept of a PVST+ native
VLAN. Frames sent to and received from a native VLAN are untagged with a PVID equal to the
native VLAN. All switches and firewalls in the same Layer 2 deployment must have the same
native VLAN for PVST+ to function properly. Although the Cisco native VLAN defaults to vlan1,
the VLAN ID could be a number other than 1.
PAN-OS® Networking Administrator’s Guide Version 11.0 29 ©2023 Palo Alto Networks, Inc.
Configure Interfaces
For example, the firewall is configured with a VLAN object (named VLAN_BRIDGE), which
describes the interfaces and subinterfaces that belong to a switch or broadcast domain. In
this example, the VLAN includes three subinterfaces: ethernet1/21.100 tagged with 100,
ethernet1/22.1000 tagged with 1000, and ethernet1/23.1500 tagged with 1500.
The subinterfaces belonging to VLAN_BRIDGE look like this:
The sequence in which the firewall automatically rewrites the PVST+ BPDU is shown in the
following graphic and explanation:
1. The Cisco switch port belonging to VLAN 100 sends a PVST+ BPDU—with the PVID and
802.1Q VLAN tag set to 100—to the firewall.
2. The firewall interfaces and subinterfaces are configured as a Layer 2 interface type. The ingress
subinterface on the firewall is tagged with VLAN 100, which matches the PVID and VLAN tag
of the incoming BPDU, so the firewall accepts the BPDU. The firewall floods the PVST+ BPDU
to all other interfaces belonging to the same VLAN object (in this example, ethernet1/22.1000
and ethernet1/23.1500). If the VLAN tags did not match, the firewall would instead drop the
BPDU.
3. When the firewall floods the BPDU out through other interfaces (belonging to the same VLAN
object), the firewall rewrites the PVID and any 802.1Q VLAN tags to match the VLAN tag of
the egress interface. In this example, the firewall rewrites the BPDU PVID from 100 to 1000
PAN-OS® Networking Administrator’s Guide Version 11.0 30 ©2023 Palo Alto Networks, Inc.
Configure Interfaces
for one subinterface and from 100 to 1500 for the second subinterface as the BPDU traverses
the Layer 2 bridge on the firewall.
4. Each Cisco switch receives the correct PVID and VLAN tag on the incoming BPDU and
processes the PVST+ packet to detect possible loops in the network.
The following CLI operational commands allow you to manage PVST+ and Rapid PVST+ BPDUs.
Globally disable or re-enable the PVST+ and Rapid PVST+ BPDU rewrite of the PVID (default is
enabled).
set session rewrite-pvst-pvid <yes|no>
Set the native VLAN ID for the firewall (range is 1 to 4,094; default is 1).
If the native VLAN ID on your switch is a value other than 1, you must set the native
VLAN ID on the firewall to that same number; otherwise, the firewall will drop packets
with that VLAN ID. This applies to trunked and non-trunked interfaces.
Verify whether PVST+BPDU rewrite is enabled, view the PVST native VLAN ID, and determine
whether the firewall is dropping all STP BPDU packets.
show vlan all
pvst+ tag rewrite: disabled
pvst native vlan id: 5
drop stp: disabled
total vlans shown: 1
name interface virtual interface
bridge ethernet1/1
ethernet1/2
ethernet1/1.1
ethernet1/2.1
PAN-OS® Networking Administrator’s Guide Version 11.0 31 ©2023 Palo Alto Networks, Inc.
Configure Interfaces
PAN-OS® Networking Administrator’s Guide Version 11.0 32 ©2023 Palo Alto Networks, Inc.
Configure Interfaces
Layer 3 Interfaces
In a Layer 3 deployment, the firewall routes traffic between multiple ports. Before you can
Configure Layer 3 Interfaces, you must configure the virtual router that you want the firewall to
use to route the traffic for each Layer 3 interface.
If you’re using security group tags (SGTs) in a Cisco TrustSec network, it’s a best practice
to deploy inline firewalls in either Layer 2 or virtual wire mode. However, if you need to
use a Layer 3 firewall in a Cisco TrustSec network, you should deploy the Layer 3 firewall
between two SGT exchange protocol (SXP) peers, and configure the firewall to allow
traffic between the SXP peers.
The following topics describe how to configure Layer 3 interfaces, and how to use Neighbor
Discovery Protocol (NDP) to provision IPv6 hosts and view the IPv6 addresses of devices on the
link local network to quickly locate devices.
• Configure Layer 3 Interfaces
• Manage IPv6 Hosts Using NDP
If you’re using IPv6 routes, you can configure the firewall to provide IPv6 Router Advertisements
for DNS Configuration. The firewall provisions IPv6 DNS clients with Recursive DNS Server
(RDNS) addresses and a DNS Search List so that the client can resolve its IPv6 DNS requests.
Thus the firewall is acting like a DHCPv6 server for you.
PAN-OS® Networking Administrator’s Guide Version 11.0 33 ©2023 Palo Alto Networks, Inc.
Configure Interfaces
If you’re using a /31 subnet mask for the Layer 3 interface address, the
interface must be configured with the .1/31 address in order for utilities such
as ping to work properly.
PAN-OS® Networking Administrator’s Guide Version 11.0 34 ©2023 Palo Alto Networks, Inc.
Configure Interfaces
1. Select Network > Interfaces and either Ethernet, VLAN, loopback, or Tunnel.
2. Select the interface to configure.
3. On the IPv4 tab, set Type to PPPoE.
4. On the General tab, select Enable to activate the interface for PPPoE termination.
5. Enter the Username for the point-to-point connection.
6. Enter the Password for the username and Confirm Password.
7. Click OK.
STEP 5 | Configure an Interface as a DHCPv6 Client (with or without prefix delegation) so that it
receives a dynamically-assigned IPv6 address.
PAN-OS® Networking Administrator’s Guide Version 11.0 35 ©2023 Palo Alto Networks, Inc.
Configure Interfaces
the Use interface ID as host portion option when adding an address, the firewall uses
the Interface ID as the host portion of that address.
5. Select Address Assignment and Add the IPv6 Address or select an address group.
6. Select Enable address on interface to enable this IPv6 address on the interface.
7. Select Use interface ID as host portion to use the Interface ID as the host portion of the
IPv6 address.
8. (Optional) Select Anycast to make the IPv6 address (route) an Anycast address (route),
which means multiple locations can advertise the same prefix, and IPv6 sends the
PAN-OS® Networking Administrator’s Guide Version 11.0 36 ©2023 Palo Alto Networks, Inc.
Configure Interfaces
anycast traffic to the node it considers the nearest, based on routing protocol costs and
other factors.
9. (Ethernet interface only) Select Send Router Advertisement (RA) to enable the firewall
to send this address in Router Advertisements, in which case you must also enable the
global Enable Router Advertisement option on the interface (next step).
10. (Ethernet interface only) Enter the Valid Lifetime (sec), in seconds, that the firewall
considers the address valid. The Valid Lifetime must equal or exceed the Preferred
Lifetime (sec) (default is 2,592,000).
11. (Ethernet interface only) Enter the Preferred Lifetime (sec) (in seconds) that the valid
address is preferred, which means the firewall can use it to send and received traffic.
After the Preferred Lifetime expires, the firewall can’t use the address to establish new
connections, but any existing connections are valid until the Valid Lifetime expires
(default is 604,800).
12. (Ethernet interface only) Select On-link if systems that have addresses within the prefix
are reachable without a router.
13. (Ethernet interface only) Select Autonomous if systems can independently create an IP
address by combining the advertised prefix with an Interface ID.
14. Click OK.
PAN-OS® Networking Administrator’s Guide Version 11.0 37 ©2023 Palo Alto Networks, Inc.
Configure Interfaces
information such as the IPv6 address of a neighbor the firewall has discovered, the
corresponding MAC address, User-ID, and status (on a best-case basis).
7. Click OK.
PAN-OS® Networking Administrator’s Guide Version 11.0 38 ©2023 Palo Alto Networks, Inc.
Configure Interfaces
STEP 8 | (Ethernet or VLAN interface using IPv6 address only) Enable the firewall to send IPv6 Router
Advertisements (RAs) from an interface, and optionally tune RA parameters.
6. (Optional) Set Min Interval (sec), the minimum interval, in seconds, between RAs the
firewall sends (range is 3 to 1,350; default is 200). The firewall sends RAs at random
intervals between the minimum and maximum values you set.
7. (Optional) Set Max Interval (sec), the maximum interval, in seconds, between RAs the
firewall sends (range is 4 to 1,800; default is 600). The firewall sends RAs at random
intervals between the minimum and maximum values you set.
8. (Optional) Set Hop Limit to apply to clients for outgoing packets (range is 1 to 255;
default is 64). Enter 0 for no hop limit.
9. (Optional) Set Link MTU, the link maximum transmission unit (MTU) to apply to clients
(range is 1,280 to 1,500; default is unspecified). Select unspecified for no link MTU.
10. (Optional) Set Reachable Time (ms), the reachable time, in milliseconds, that the client
will use to assume a neighbor is reachable after receiving a Reachability Confirmation
PAN-OS® Networking Administrator’s Guide Version 11.0 39 ©2023 Palo Alto Networks, Inc.
Configure Interfaces
message. Select unspecified for no reachable time value (range is 0 to 3,600,000; default
is unspecified).
11. (Optional) Set Retrans Time (ms), the retransmission timer that determines how long the
client will wait, in milliseconds, before retransmitting Neighbor Solicitation messages.
Select unspecified for no retransmission time (range is 0 to 4,294,967,295; default is
unspecified).
12. (Optional) Set Router Lifetime (sec) to specify how long, in seconds, the client will
use the firewall as the default gateway (range is 0 to 9,000; default is 1,800). Zero
specifies that the firewall is not the default gateway. When the lifetime expires, the
client removes the firewall entry from its Default Router List and uses another router as
the default gateway.
13. Set Router Preference, which the client uses to select a preferred router if the network
segment has multiple IPv6 routers. High, Medium (default), or Low is the priority that
the RA advertises indicating the relative priority of firewall virtual router relative to other
routers on the segment.
14. Select Managed Configuration to indicate to the client that addresses are available via
DHCPv6.
15. Select Other Configuration to indicate to the client that other address information (such
as DNS-related settings) is available via DHCPv6.
16. Select Consistency Check to have the firewall verify that RAs sent from other routers
are advertising consistent information on the link. The firewall logs any inconsistencies.
17. Click OK.
PAN-OS® Networking Administrator’s Guide Version 11.0 40 ©2023 Palo Alto Networks, Inc.
Configure Interfaces
STEP 9 | (Ethernet or VLAN interface using IPv6 address only) Specify the Recursive DNS Server
addresses and DNS Search List the firewall will advertise in ND Router Advertisements from
this interface.
The RDNS servers and DNS Search List are part of the DNS configuration for the DNS client
so that the client can resolve IPv6 DNS requests.
You must have selected Enable Router Advertisement on the Router Advertisement
tab to make the DNS Support tab available.
4. Include DNS information in Router Advertisement to enable the firewall to send IPv6
DNS information.
5. For DNS Server, Add the IPv6 address of a Recursive DNS Server (adding up to eight
servers). The firewall sends server addresses in an ICMPv6 Router Advertisement in
order from top to bottom.
6. Specify the Lifetime in seconds, which is the maximum length of time the client can use
the specific RDNS Server to resolve domain names.
• The Lifetime range is any value equal to or between the Max Interval (that you
configured on the Router Advertisement tab) and two times that Max Interval. For
PAN-OS® Networking Administrator’s Guide Version 11.0 41 ©2023 Palo Alto Networks, Inc.
Configure Interfaces
example, if your Max Interval is 600 seconds, the Lifetime range is 600 to 1,200
seconds.
• The default Lifetime is 1,200 seconds.
7. Add a Domain Search List (domain name of a maximum of 255 bytes). Add up to eight
entries. The firewall sends domains in an ICMPv6 Router Advertisement in order from
top to bottom.
8. Specify the Lifetime in seconds, which is the maximum length of time the client can use
the list. The Lifetime has the same range and default value as the Server.
9. Click OK.
STEP 10 | (Ethernet or VLAN interface) Specify static ARP entries. Static ARP entries reduce ARP
processing.
1. Select Network > Interfaces and Ethernet or VLAN.
2. Select the interface you are configuring.
3. Select Advanced > ARP Entries.
4. Add an IP Address and its corresponding MAC Address (hardware or media access
control address). For a VLAN interface, you must also select the Interface.
Static ARP entries do not time out. Auto-learned ARP entries in the cache time
out in 1,800 seconds by default; you can customize the ARP cache timeout.
5. Click OK.
STEP 11 | (Ethernet or VLAN interface) Specify static Neighbor Discovery Protocol (NDP) entries. NDP
for IPv6 performs functions similar to those provided by ARP for IPv4.
1. Select Network > Interfaces and Ethernet or VLAN.
2. Select the interface you are configuring.
3. Select Advanced > ND Entries.
4. Add an IPv6 Address and its corresponding MAC Address.
5. Click OK.
PAN-OS® Networking Administrator’s Guide Version 11.0 42 ©2023 Palo Alto Networks, Inc.
Configure Interfaces
STEP 16 | Configure static routes and/or a dynamic routing protocol so that the virtual router or logical
router can route traffic.
STEP 18 | (Supported firewalls only) If the interface corresponds to a PoE (Power over Ethernet) port
on the firewall, you can optionally configure PoE.
The capability of the firewall to send IPv6 RAs for DNS configuration allows the firewall to
perform a role similar to DHCP, and is unrelated to the firewall being a DNS proxy, DNS
client or DNS server.
PAN-OS® Networking Administrator’s Guide Version 11.0 43 ©2023 Palo Alto Networks, Inc.
Configure Interfaces
After you configure the firewall with the addresses of RDNS servers, the firewall provisions
an IPv6 host (the DNS client) with those addresses. The IPv6 host uses one or more of those
addresses to reach an RDNS server. Recursive DNS refers to a series of DNS requests by an
RDNS Server, as shown with three pairs of queries and responses in the following figure. For
example, when a user tries to access www.paloaltonetworks.com, the local browser sees that it
does not have the IP address for that domain name in its cache, nor does the client’s operating
system have it. The client’s operating system launches a DNS query to a Recursive DNS Server
belonging to the local ISP.
An IPv6 Router Advertisement can contain multiple DNS Recursive Server Address options, each
with the same or different lifetimes. A single DNS Recursive DNS Server Address option can
contain multiple Recursive DNS Server addresses as long as the addresses have the same lifetime.
A DNS Search List is a list of domain names (suffixes) that the firewall advertises to a DNS client.
The firewall thus provisions the DNS client to use the suffixes in its unqualified DNS queries. The
DNS client appends the suffixes, one at a time, to an unqualified domain name before it enters
the name into a DNS query, thereby using a fully qualified domain name (FQDN) in the DNS
query. For example, if a user (of the DNS client being configured) tries to submit a DNS query
for the name “quality” without a suffix, the router appends a period and the first DNS suffix from
the DNS Search List to the name and transmits a DNS query. If the first DNS suffix on the list is
“company.com”, the resulting DNS query from the router is for the FQDN “quality.company.com”.
If the DNS query fails, the client appends the second DNS suffix from the list to the unqualified
name and transmits a new DNS query. The client uses the DNS suffixes in order until a DNS
lookup succeeds (ignoring the remaining suffixes) or the router has tried all of the suffixes on the
list.
You configure the firewall with the suffixes that you want to provide to the DNS client router in
an ND DNSSL option; the DNS client receiving the DNS Search List option is provisioned to use
the suffixes in its unqualified DNS queries.
To specify RDNS Servers and a DNS Search List, Configure RDNS Servers and DNS Search List for
IPv6 Router Advertisements.
Configure RDNS Servers and DNS Search List for IPv6 Router Advertisements
Perform this task to configure IPv6 Router Advertisements for DNS Configuration of IPv6 hosts.
PAN-OS® Networking Administrator’s Guide Version 11.0 44 ©2023 Palo Alto Networks, Inc.
Configure Interfaces
STEP 1 | Enable the firewall to send IPv6 Router Advertisements from an interface.
1. Select Network > Interfaces and Ethernet or VLAN.
2. Select the interface to configure.
3. On the IPv6 tab, select Enable IPv6 on the interface.
4. On the Router Advertisement tab, select Enable Router Advertisement.
5. Click OK.
STEP 2 | Specify the Recursive DNS Server addresses and DNS Search List the firewall will advertise
in ND Router Advertisements from this interface.
The RDNS servers and DNS Search List are part of the DNS configuration for the DNS client
so that the client can resolve IPv6 DNS requests.
1. Select Network > Interfaces and Ethernet or VLAN.
2. Select the interface you are configuring.
3. Select IPv6 > DNS Support.
4. Include DNS information in Router Advertisement to enable the firewall to send IPv6
DNS information.
5. For DNS Server, Add the IPv6 address of a Recursive DNS Server. Add up to eight
Recursive DNS servers. The firewall sends server addresses in an ICMPv6 Router
Advertisement in order from top to bottom.
6. Specify the Lifetime in seconds, which is the maximum length of time the client can use
the specific RDNS Server to resolve domain names.
• The Lifetime range is any value equal to or between the Max Interval (that you
configured on the Router Advertisement tab) and two times that Max Interval.
For example, if your Max Interval is 600 seconds, the Lifetime range is 600-1,200
seconds.
• The default Lifetime is 1,200 seconds.
7. For DNS Suffix, Add a DNS Suffix (domain name of a maximum of 255 bytes). Add up
to eight DNS suffixes. The firewall sends suffixes in an ICMPv6 Router Advertisement in
order from top to bottom.
8. Specify the Lifetime in seconds, which is the maximum length of time the client can use
the suffix. The Lifetime has the same range and default value as the Server.
9. Click OK.
NDP Monitoring
Neighbor Discovery Protocol (NDP) for IPv6 (RFC 4861) performs functions similar to ARP
functions for IPv4. The firewall by default runs NDP, which uses ICMPv6 packets to discover and
track the link-layer addresses and status of neighbors on connected links.
Enable NDP Monitoring so you can view the IPv6 addresses of devices on the link local network,
their MAC address, associated username from User-ID (if the user of that device used the
directory service to log in), reachability Status of the address, and Last Reported date and time the
PAN-OS® Networking Administrator’s Guide Version 11.0 45 ©2023 Palo Alto Networks, Inc.
Configure Interfaces
NDP monitor received a Router Advertisement from this IPv6 address. The username is on a best-
case basis; there can be many IPv6 devices on a network with no username, such as printers, fax
machines, servers, etc.
If you want to quickly track a device and user who has violated a security rule, it is very useful to
have the IPv6 address, MAC address and username displayed all in one place. You need the MAC
address that corresponds to the IPv6 address in order to trace the MAC address back to a physical
switch or Access Point.
NDP monitoring is not guaranteed to discover all devices because there could be other
networking devices between the firewall and the client that filter out NDP or Duplicate
Address Detection (DAD) messages. The firewall can monitor only the devices that it
learns about on the interface.
NDP monitoring also monitors Duplicate Address Detection (DAD) packets from clients and
neighbors. You can also monitor IPv6 ND logs to make troubleshooting easier.
NDP monitoring is supported for Ethernet interfaces, subinterfaces, Aggregated Ethernet
interfaces, and VLAN interfaces on all PAN-OS models.
After you enable or disable NDP monitoring, you must Commit before NDP
monitoring can start or stop.
6. Click OK.
PAN-OS® Networking Administrator’s Guide Version 11.0 46 ©2023 Palo Alto Networks, Inc.
Configure Interfaces
STEP 3 | Monitor NDP and DAD packets from clients and neighbors.
1. Select Network > Interfaces and Ethernet or VLAN.
2. For the interface where you enabled NDP monitoring, in the Features column, hover
over the NDP Monitoring icon:
The NDP Monitoring summary for the interface displays the list of IPv6 Prefixes that this
interface will send in the Router Advertisement (RA) if RA is enabled (they are the IPv6
prefixes of the interface itself).
The summary also indicates whether DAD, Router Advertisement, and DNS Support are
enabled; IP addresses of any Recursive DNS Servers configured; and any DNS suffixes
configured on the DNS Search List.
3. Click on the NDP Monitoring icon to display detailed information.
Each row of the detailed NDP Monitoring table for the interface displays the IPv6
address of a neighbor the firewall has discovered, the corresponding MAC address,
corresponding User ID (on a best-case basis), reachability Status of the address, and
Last Reported date and time this NDP Monitor received an RA from this IP address. A
User ID will not display for printers or other non-user-based hosts. If the status of the IP
address is Stale, the neighbor is not known to be reachable, per RFC 4861.
At the bottom right is the count of Total Devices Detected on the link local network.
• Enter an IPv6 address in the filter field to search for an address to display.
• Select the check boxes to display or not display IPv6 addresses.
• Click the numbers, the right or left arrow, or the vertical scroll bar to advance through
many entries.
• Click Clear All NDP Entries to clear the entire table.
PAN-OS® Networking Administrator’s Guide Version 11.0 47 ©2023 Palo Alto Networks, Inc.
Configure Interfaces
PAN-OS® Networking Administrator’s Guide Version 11.0 48 ©2023 Palo Alto Networks, Inc.
Configure Interfaces
PAN-OS® Networking Administrator’s Guide Version 11.0 49 ©2023 Palo Alto Networks, Inc.
Configure Interfaces
The firewall encapsulates northbound traffic (a PPPoE packet) from a host in an 802.1Q frame
and sends it to the opposite end of the PPPoE link, on its way to the ISP network. Likewise, the
firewall decapsulates the southbound traffic from the 802.1Q frame before sending the PPPoE
packet to the host.
STEP 1 | Configure a subinterface as a PPPoE client (termination point).
1. Select Network > Interfaces > Ethernet and highlight a Layer 3 Ethernet interface.
2. Add Subinterface.
3. To the right of the Interface Name and dot, enter the subinterface number; use the
VLAN tag number that your ISP provided. This subinterface number is for reference
purposes; the VLAN tag ID is read from the Tag field.
4. Enter the Tag, which is the VLAN tag number that your ISP provided. The actual VLAN
tag ID is read from this Tag field.
5. Select IPv4.
6. Select the Type of address as PPPoE.
7. Select General and Enable the subinterface.
8. Enter the Username for the authentication you will choose in the next step.
9. Enter the Password and Confirm Password.
PAN-OS® Networking Administrator’s Guide Version 11.0 50 ©2023 Palo Alto Networks, Inc.
Configure Interfaces
PAN-OS® Networking Administrator’s Guide Version 11.0 51 ©2023 Palo Alto Networks, Inc.
Configure Interfaces
selection. For example, a route with a metric of 10 is used before a route with a metric of
100.
6. Enter the name of the Access Concentrator that your ISP provided, if any (string value of
0 to 255 characters). The firewall will connect with this Access Concentrator.
7. Enter the Service that your ISP provided, if any (string value of 0 to 255 characters).
8. If you want the PPPoE client (firewall) to wait for the PPPoE server to initiate a
connection, select Passive. If Passive is not selected, the firewall is allowed to initiate a
connection.
PAN-OS® Networking Administrator’s Guide Version 11.0 52 ©2023 Palo Alto Networks, Inc.
Configure Interfaces
STEP 5 | View information about the PPPoE client. The Local IP Address, Primary DNS, Secondary
DNS, Primary WINS, Secondary WINS, Remote IP Address, Access Concentrator name, and
AC MAC address were received from the PPPoE server.
1. Select Network > Interfaces > Ethernet and in the row of the subinterface that you
configured, select Dynamic-PPPoE.
Alternatively, you can select the subinterface, IPv4, and Show PPPoE Client
Runtime Info.
PAN-OS® Networking Administrator’s Guide Version 11.0 53 ©2023 Palo Alto Networks, Inc.
Configure Interfaces
This procedure describes configuration steps only for the Palo Alto Networks firewall. You
must also configure the aggregate group on the peer device. Refer to the documentation
of that device for instructions.
STEP 2 | For a Layer 3 interface, if you want to configure a static IPv4 address, select IPv4 and refer
to Configure Layer 3 Interfaces for configuring a static IPv4 address.
STEP 3 | For a Layer 3 interface, if you want to configure a static IPv6 address, select IPv6 and refer
to Configure Layer 3 Interfaces for configuring a static IPv6 address.
PAN-OS® Networking Administrator’s Guide Version 11.0 54 ©2023 Palo Alto Networks, Inc.
Configure Interfaces
STEP 4 | For a Layer 3 interface, if you want to configure the interface as a DHCP client to receive
an IPv4 address, select IPv4 and refer to Configure an Interface as a DHCPv4 Client for
configuring a DHCP client.
STEP 5 | For a Layer 3 interface, if you want to configure the interface as a DHCPv6 client to receive
an IPv6 address (with or without prefix delegation), select IPv6 and refer to Configure an
Interface as a DHCPv6 Client for configuring a DHCPv6 client.
As a best practice, set one LACP peer to active and the other to passive. LACP
cannot function if both peers are passive. The firewall cannot detect the mode of
its peer device.
3. Set the Transmission Rate for LACP query and response exchanges to Slow (every 30
seconds—the default) or Fast (every second). Base your selection on how much LACP
processing your network supports and how quickly LACP peers must detect and resolve
interface failures.
4. Select Fast Failover if you want to enable failover to a standby interface in less than
one second. By default, the option is disabled and the firewall uses the IEEE 802.1ax
standard for failover processing, which takes at least three seconds.
As a best practice, use Fast Failover in deployments where you might lose
critical data during the standard failover interval.
5. Enter the Max Ports (number of interfaces) that are active (1 to 8) in the aggregate
group. If the number of interfaces you assign to the group exceeds the Max Ports, the
remaining interfaces will be in standby mode. The firewall uses the LACP Port Priority
of each interface you assign (Step 3) to determine which interfaces are initially active
and to determine the order in which standby interfaces become active upon failover. If
the LACP peers have non-matching port priority values, the values of the peer with the
lower System Priority number (default is 32,768; range is 1 to 65,535) will override the
other peer.
6. (Optional) For active/passive firewalls only, select Enable in HA Passive State if you
want to enable LACP pre-negotiation for the passive firewall. LACP pre-negotiation
PAN-OS® Networking Administrator’s Guide Version 11.0 55 ©2023 Palo Alto Networks, Inc.
Configure Interfaces
enables quicker failover to the passive firewall (for details, see LACP and LLDP Pre-
Negotiation for Active/Passive HA).
If you select this option, you cannot select Same System MAC Address for
Active-Passive HA; pre-negotiation requires unique interface MAC addresses on
each HA firewall.
7. (Optional) For active/passive firewalls only, select Same System MAC Address for
Active-Passive HA and specify a single MAC Address for both HA firewalls. This option
minimizes failover latency if the LACP peers are virtualized (appearing to the network
as a single device). By default, the option is disabled: each firewall in an HA pair has a
unique MAC address.
If the LACP peers are not virtualized, use unique MAC addresses to minimize
failover latency.
As a best practice, set the same link speed and duplex values for every interface
in the group. For non-matching values, the firewall defaults to the higher speed
and full duplex.
5. (Optional) Enter an LACP Port Priority (default is 32,768; range is 1 to 65,535) if you
enabled LACP for the aggregate group. If the number of interfaces you assign exceeds
the Max Ports value of the group, the port priorities determine which interfaces are
active or standby. The interfaces with the lower numeric values (higher priorities) will be
active.
6. Click OK.
STEP 9 | If the firewalls have an active/active configuration and you are aggregating HA3 interfaces,
enable packet forwarding for the aggregate group.
1. Select Device > High Availability > Active/Active Config and edit the Packet Forwarding
section.
2. Select the aggregate group you configured for the HA3 Interface and click OK.
STEP 10 | (Supported firewalls only) If the interface corresponds to a PoE (Power over Ethernet) port
on the firewall, you can optionally configure PoE.
PAN-OS® Networking Administrator’s Guide Version 11.0 56 ©2023 Palo Alto Networks, Inc.
Configure Interfaces
STEP 13 | (PA-7050 and PA-7080 firewalls only) If you have an aggregate interface group that has
interfaces located on different line cards, it is a best practice to enable the firewall so that it
can handle fragmented IP packets it receives on multiple interfaces of the AE group that are
spread over multiple cards. To do so, use the following CLI operational command with the
hash keyword. (The other two keywords are also shown for completeness.)
1. Access the CLI.
2. Use the following operational CLI command: set ae-frag redistribution-
policy <self | fixed sXdpX | hash>
• self—(default) This keyword is for legacy behavior; it does not enable the firewall to
handle fragmented packets received on multiple interfaces of an AE interface group.
• fixed s<slot-number>dp<dataplane-cpu-number>—Replace the slot-number variable
and replace the data-plane-cpu-number variable with the dataplane number of
the dataplane that will handle all IP fragments received by all members of all AE
interfaces. The fixed keyword is intended mainly for troubleshooting purposes and
shouldn’t be used in production.
• hash—Use to enable the firewall to handle fragmented packets it receives on multiple
interfaces of an AE interface group that are located on more than one line card.
PAN-OS® Networking Administrator’s Guide Version 11.0 57 ©2023 Palo Alto Networks, Inc.
Configure Interfaces
Bonjour traffic forwarding is supported for the PA-220, PA-400, PA-800, and PA-3200
series.
When you enable this option, the firewall redirects Bonjour traffic to the L3 and AE interfaces
and subinterfaces where you enable this option. You must enable this option on all supported
interfaces that you want to manage Bonjour traffic; for example, if you want a specific L3
interface to forward Bonjour traffic to an AE interface, you must enable this option on both
interfaces. You can enable this option on up to 16 interfaces.
To prevent loops, the firewall modifies the source MAC address to the firewall’s egress
interface MAC address. To help prevent flooding attacks, if the firewall receives more than
the number of packets per second specified in the following table, the firewall drops the
packets to protect the firewall and the network.
PA-220 100
PA-400 N/A
PA-800 200
PA-3200 500
PAN-OS® Networking Administrator’s Guide Version 11.0 58 ©2023 Palo Alto Networks, Inc.
Configure Interfaces
STEP 3 | Select IPv4 then select the Enable Bonjour Reflector option.
STEP 5 | Repeat steps 1—4 for all L3 or AE interfaces and subinterfaces where you want to forward
Bonjour traffic.
STEP 7 | Confirm that the Features column for the interface or interfaces where you enable the
Bonjour Reflector option displays Bonjour Reflector:yes ( ).
STEP 8 | Use the show bonjour interface CLI command to display all interfaces where the
firewall forwards Bonjour traffic and a list of counters. rx represents the total number of
Bonjour packets the interface receives, tx represents the total number of Bonjour packets
the interface transmits, and drop represents the number of packets the interface drops.
name rx tx drop
PAN-OS® Networking Administrator’s Guide Version 11.0 59 ©2023 Palo Alto Networks, Inc.
Configure Interfaces
----------------------------------------------------------
ethernet1/4 1 1 0
ethernet1/7 0 0 0
ethernet1/7.10 0 0 0
ethernet1/7.20 4 4 0
ae15 0 0 0
ae16 0 0 0
ae16.30 0 2 0
ae16.40 0 0 0
PAN-OS® Networking Administrator’s Guide Version 11.0 60 ©2023 Palo Alto Networks, Inc.
Configure Interfaces
The management (MGT) interface does not require an Interface Management profile. You
restrict protocols, services, and IP addresses for the MGT interface when you perform
initial configuration of the firewall. In case the MGT interface goes down, allowing
management access over another interface enables you to continue managing the firewall.
Don’t enable HTTP or Telnet because those protocols transmit in cleartext and
therefore aren’t secure.
3. Select the services that the interface permits for management traffic:
• Response Pages—Use to enable response pages for:
• Captive Portal—To serve Captive Portal response pages, the firewall leaves ports
open on Layer 3 interfaces: 6081 for Captive Portal in transparent mode and 6082
PAN-OS® Networking Administrator’s Guide Version 11.0 61 ©2023 Palo Alto Networks, Inc.
Configure Interfaces
for Captive Portal in redirect mode. For details, see Authentication Policy and
Authentication Portal.
• URL Admin Override—For details, see Allow Password Access to Certain Sites.
• User-ID—Use to Redistribute Data and Authentication Timestamps.
• User-ID Syslog Listener-SSL or User-ID Syslog Listener-UDP—Use to Configure
User-ID to Monitor Syslog Senders for User Mapping over SSL or UDP.
4. (Optional) Add the Permitted IP Addresses that can access the interface. If you don’t add
entries to the list, the interface has no IP address restrictions.
5. Click OK.
PAN-OS® Networking Administrator’s Guide Version 11.0 62 ©2023 Palo Alto Networks, Inc.
Virtual Routers
Learn about how a virtual router on the firewall participates in Layer 3 routing and
configure a virtual router.
63
Virtual Routers
PAN-OS® Networking Administrator’s Guide Version 11.0 64 ©2023 Palo Alto Networks, Inc.
Virtual Routers
See ECMP if you want to leverage having multiple equal-cost paths for forwarding.
PAN-OS® Networking Administrator’s Guide Version 11.0 65 ©2023 Palo Alto Networks, Inc.
Virtual Routers
PAN-OS® Networking Administrator’s Guide Version 11.0 66 ©2023 Palo Alto Networks, Inc.
Service Routes
Learn about how the firewall uses service routes to send requests to external services
and configure service routes.
67
Service Routes
PAN-OS® Networking Administrator’s Guide Version 11.0 68 ©2023 Palo Alto Networks, Inc.
Service Routes
To easily use the same source address for multiple services, select the
checkbox for the services, click Set Selected Routes, and proceed to the
next step.
• To limit the list for Source Address, select a Source Interface; then select a Source
Address (from that interface) as the service route. An Address Object can also be
referenced as a Source Address if it is already configured on the selected interface.
Selecting Any Source Interface makes all IP addresses on all interfaces available in
the Source Address list from which you select an address. Selecting Use default
causes the firewall to use the management interface for the service route, unless
the packet destination IP address matches the configured Destination IP address,
in which case the source IP address is set to the Source Address configured for the
PAN-OS® Networking Administrator’s Guide Version 11.0 69 ©2023 Palo Alto Networks, Inc.
Service Routes
Destination. Selecting MGT causes the firewall to use the MGT interface for the
service route, regardless of any destination service route.
The Service Route Source Address does not inherit configuration changes
from the referenced interface and vice versa. Modification of an Interface
IP Address to a different IP address or Address Object will not update a
corresponding Service Route Source Address. This may lead to commit
failure and require you to update the Service Route(s) to a valid Source
Address value.
• Click OK to save the setting.
• Repeat this step if you want to specify both an IPv4 and IPv6 address for a service.
• For a destination service route:
• Select Destination and Add a Destination IP address. In this case, if a packet
arrives with a destination IP address that matches this configured Destination
address, then the source IP address of the packet will be set to the Source Address
configured in the next step.
• To limit the list for Source Address, select a Source Interface; then select a Source
Address (from that interface) as the service route. Selecting Any Source Interface
makes all IP addresses on all interfaces available in the Source Address list from
which you select an address. Selecting MGT causes the firewall to use the MGT
interface for the service route.
• Click OK to save the setting.
3. Repeat the prior steps for each service route you want to customize.
4. Click OK to save the service route configuration.
STEP 2 | Commit.
PAN-OS® Networking Administrator’s Guide Version 11.0 70 ©2023 Palo Alto Networks, Inc.
Static Routes
Static routes are typically used in conjunction with dynamic routing protocols. You
might configure a static route for a location that a dynamic routing protocol can’t
reach. Static routes require manual configuration on every router in the network,
rather than the firewall entering dynamic routes in its route tables; even though
static routes require that configuration on all routers, they may be desirable in small
networks rather than configuring a routing protocol.
71
Static Routes
PAN-OS® Networking Administrator’s Guide Version 11.0 72 ©2023 Palo Alto Networks, Inc.
Static Routes
Path monitoring doesn’t apply to static routes configured between virtual routers.
In the following figure, the firewall is connected to two ISPs for route redundancy to the internet.
The primary default route 0.0.0.0 (metric 10) uses Next Hop 192.0.2.10; the secondary default
route 0.0.0.0 (metric 50) uses Next Hop 198.51.100.1. The customer premises equipment (CPE)
for ISP A keeps the primary physical link active, even after internet connectivity goes down. With
the link artificially active, the firewall can’t detect that the link is down and that it should replace
the failed route with the secondary route in its RIB.
To avoid silently discarding traffic to a failed link, configure path monitoring of 192.0.2.20,
192.0.2.30, and 192.0.2.40 and if all (or any) of the paths to these destinations fail, the firewall
presumes the path to Next Hop 192.0.2.10 is also down, removes the static route 0.0.0.0 (that
uses Next Hop 192.0.2.10) from its RIB, and replaces it with the secondary route to the same
destination 0.0.0.0 (that uses Next Hop 198.51.100.1), which also accesses the internet.
PAN-OS® Networking Administrator’s Guide Version 11.0 73 ©2023 Palo Alto Networks, Inc.
Static Routes
When you Configure a Static Route, one of the required fields is the Next Hop toward that
destination. The type of next hop you configure determines the action the firewall takes during
path monitoring, as follows:
IP Address The firewall uses the source IP address and egress interface of the static
route as the source address and egress interface in the ICMP ping. It uses
the configured Destination IP address of the monitored destination as the
ping’s destination address. It uses the static route’s next hop address as
the ping’s next hop address.
Next VR The firewall uses the source IP address of the static route as the source
address in the ICMP ping. The egress interface is based on the lookup
result from the next hop’s virtual router. The configured Destination IP
address of the monitored destination is the ping’s destination address.
None The firewall uses the destination IP address of the path monitor as the
next hop and sends the ICMP ping to the interface specified in the static
route.
PAN-OS® Networking Administrator’s Guide Version 11.0 74 ©2023 Palo Alto Networks, Inc.
Static Routes
When path monitoring for a static or default route fails, the firewall logs a critical event (path-
monitor-failure). When the static or default route recovers, the firewall logs another critical event
(path-monitor-recovery).
Firewalls synchronize path monitoring configurations for an active/passive HA deployment, but
the firewall blocks egress ICMP ping packets on a passive HA peer because it is not actively
processing traffic. The firewall doesn’t synchronize path monitoring configurations for active/
active HA deployments.
PAN-OS® Networking Administrator’s Guide Version 11.0 75 ©2023 Palo Alto Networks, Inc.
Static Routes
PAN-OS® Networking Administrator’s Guide Version 11.0 76 ©2023 Palo Alto Networks, Inc.
Static Routes
Alternatively, you can create an address object of type IP Netmask. The address
object must have a netmask of /32 for IPv4 or /128 for IPv6.
• Next VR—Select this option and then select a virtual router if you want to route
internally to a different virtual router on the firewall.
• FQDN—Enter an FQDN or select an address object that uses an FQDN, or create a
new address object of type FQDN.
If you use an FQDN as a static route next hop, that FQDN must resolve to an
IP address that belongs to the same subnet as the interface you configured
for the static route; otherwise, the firewall rejects the resolution and the
FQDN remains unresolved.
The firewall uses only one IP address (from each IPv4 or IPv6 family type)
from the DNS resolution of the FQDN. If the DNS resolution returns more
than one address, the firewall uses the preferred IP address that matches
the IP family type (IPv4 or IPv6) configured for the next hop. The preferred
IP address is the first address the DNS server returns in its initial response.
The firewall retains this address as preferred as long as the address appears
in subsequent responses, regardless of its order.
• Discard—Select to drop packets that are addressed to this destination.
• None—Select if there is no next hop for the route. For example, a point-to-point
connection does not require a next hop because there is only one way for packets to
go.
8. Enter an Admin Distance for the route to override the default administrative distance set
for static routes for this virtual router (range is 10 to 240; default is 10).
9. Enter a Metric for the route (range is 1 to 65,535).
STEP 3 | (Optional) If your firewall model supports BFD, you can apply a BFD Profile to the static
route so that if the static route fails, the firewall removes the route from the RIB and FIB and
uses an alternative route. Default is None.
PAN-OS® Networking Administrator’s Guide Version 11.0 77 ©2023 Palo Alto Networks, Inc.
Static Routes
STEP 3 | Determine whether path monitoring for the static route is based on one or all monitored
destinations, and set the preemptive hold time.
1. Select a Failure Condition, whether Any or All of the monitored destinations for the
static route must be unreachable by ICMP for the firewall to remove the static route
PAN-OS® Networking Administrator’s Guide Version 11.0 78 ©2023 Palo Alto Networks, Inc.
Static Routes
from the RIB and FIB and add the static route that has the next lowest metric going to
the same destination to the FIB.
Select All to avoid the possibility of any single monitored destination signaling a
route failure when the destination is simply offline for maintenance, for example.
2. (Optional) Specify the Preemptive Hold Time (min), which is the number of minutes a
downed path monitor must remain in Up state before the firewall reinstalls the static
route into the RIB. The path monitor evaluates all of its monitored destinations for the
static route and comes up based on the Any or All failure condition. If a link goes down
or flaps during the hold time, when the link comes back up, the path monitor can come
back up; the timer restarts when the path monitor returns to Up state.
A Preemptive Hold Time of zero causes the firewall to reinstall the route into the RIB
immediately upon the path monitor coming up. Range is 0-1,440; default is 2.
3. Click OK.
STEP 4 | Commit.
Click Commit.
PAN-OS® Networking Administrator’s Guide Version 11.0 79 ©2023 Palo Alto Networks, Inc.
Static Routes
STEP 6 | View the RIB and FIB to verify that the static route is removed.
1. Select Network > Virtual Routers and in the row of the virtual router you are interested
in, select More Runtime Stats.
2. From the Routing tab, select Route Table (RIB) and then the Forwarding Table (FIB) to
view each, respectively.
3. Select Unicast or Multicast to view the appropriate route table.
4. For Display Address Family, select IPv4 and IPv6, IPv4 Only, or IPv6 Only.
5. (Optional) In the filter field, enter the route you are searching for and select the arrow, or
use the scroll bar to move through pages of routes.
6. See if the route is removed or present.
7. Select Refresh periodically to see the latest state of the path monitoring (health check).
To view the events logged for path monitoring, select Monitor > Logs > System.
View the entry for path-monitor-failure, which indicates path monitoring for
a static route destination failed, so the route was removed. View the entry for
path-monitor-recovery, which indicates path monitoring for the static route
destination recovered, so the route was restored.
PAN-OS® Networking Administrator’s Guide Version 11.0 80 ©2023 Palo Alto Networks, Inc.
RIP
Consider whether RIP is an appropriate routing protocol for your network and if so,
configure RIP.
81
RIP
RIP Overview
Routing Information Protocol (RIP) is an interior gateway protocol (IGP) that was designed for
small IP networks. RIP relies on hop count to determine routes; the best routes have the fewest
number of hops. RIP is based on UDP and uses port 520 for route updates. By limiting routes to a
maximum of 15 hops, the protocol helps prevent the development of routing loops, but also limits
the supported network size. Before you configure RIP, consider that if more than 15 hops are
required, traffic is not routed. RIP also can take longer to converge than OSPF and other routing
protocols.
The firewall supports RIP v2.
PAN-OS® Networking Administrator’s Guide Version 11.0 82 ©2023 Palo Alto Networks, Inc.
RIP
Configure RIP
Perform the following procedure to configure RIP.
STEP 1 | Configure general virtual router settings.
PAN-OS® Networking Administrator’s Guide Version 11.0 83 ©2023 Palo Alto Networks, Inc.
RIP
PAN-OS® Networking Administrator’s Guide Version 11.0 84 ©2023 Palo Alto Networks, Inc.
OSPF
Open Shortest Path First (OSPF) is an interior gateway protocol (IGP) that is most
often used to dynamically manage network routes in large enterprise networks. It
determines routes dynamically by obtaining information from other routers and
advertising routes to other routers by way of Link State Advertisements (LSAs).
The information gathered from the LSAs is used to construct a topology map of the
network. This topology map is shared across routers in the network and used to
populate the IP routing table with available routes.
Changes in the network topology are detected dynamically and used to generate a
new topology map within seconds. A shortest path tree is computed of each route.
Metrics associated with each routing interface are used to calculate the best route.
These can include distance, network throughput, link availability etc. Additionally,
these metrics can be configured statically to direct the outcome of the OSPF topology
map.
®
The Palo Alto Networks implementation of OSPF fully supports the following RFCs:
The following topics provide more information about the OSPF and procedures for
configuring OSPF on the firewall:
85
OSPF
OSPF Concepts
OSPF determines routes dynamically by obtaining information from other routers and advertising
routes to other routers by way of Link State Advertisements (LSAs). The router keeps information
about the links between it and the destination and can make highly efficient routing decisions.
A cost is assigned to each router interface, and the best routes are determined to be those with
the lowest costs, when summed over all the encountered outbound router interfaces and the
interface receiving the LSA.
Hierarchical techniques are used to limit the number of routes that must be advertised and
the associated LSAs. Because OSPF dynamically processes a considerable amount of route
information, it has greater processor and memory requirements than does RIP.
The following topics introduce the OSPF concepts you must understand in order to configure the
firewall to participate in an OSPF network:
• OSPFv3
• OSPF Neighbors
• OSPF Areas
• OSPF Router Types
OSPFv3
OSPFv3 provides support for the OSPF routing protocol within an IPv6 network. As such, it
provides support for IPv6 addresses and prefixes. It retains most of the structure and functions in
OSPFv2 (for IPv4) with some minor changes. The following are some of the additions and changes
to OSPFv3:
• Support for multiple instances per link—With OSPFv3, you can run multiple instances of the
OSPF protocol over a single link. This is accomplished by assigning an OSPFv3 instance ID
number. An interface that is assigned to an instance ID drops packets that contain a different
ID.
• Protocol Processing Per-link—OSPFv3 operates per-link instead of per-IP-subnet as on
OSPFv2.
• Changes to Addressing—IPv6 addresses are not present in OSPFv3 packets, except for LSA
payloads within link state update packets. Neighboring routers are identified by the Router ID.
• Authentication Changes—OSPFv3 doesn't include any authentication capabilities. Configuring
OSPFv3 on a firewall requires an authentication profile that specifies Encapsulating Security
Payload (ESP) or IPv6 Authentication Header (AH).The re-keying procedure specified in RFC
4552 is not supported in this release.
• Support for multiple instances per-link—Each instance corresponds to an instance ID
contained in the OSPFv3 packet header.
• New LSA Types—OSPFv3 supports two new LSA types: Link LSA and Intra Area Prefix LSA.
All additional changes are described in detail in RFC 5340.
PAN-OS® Networking Administrator’s Guide Version 11.0 86 ©2023 Palo Alto Networks, Inc.
OSPF
OSPF Neighbors
Two OSPF-enabled routers connected by a common network and in the same OSPF area that
form a relationship are OSPF neighbors. The connection between these routers can be through
a common broadcast domain or by a point-to-point connection. This connection is made through
the exchange of hello OSPF protocol packets. These neighbor relationships are used to exchange
routing updates between routers.
OSPF Areas
OSPF operates within a single autonomous system (AS). Networks within this single AS, however,
can be divided into a number of areas. By default, Area 0 is created. Area 0 can either function
alone or act as the OSPF backbone for a larger number of areas. Each OSPF area is named using
a 32-bit identifier which in most cases is written in the same dotted-decimal notation as an IP4
address. For example, Area 0 is usually written as 0.0.0.0.
The topology of an area is maintained in its own link state database and is hidden from other
areas, which reduces the amount of traffic routing required by OSPF. The topology is then shared
in a summarized form between areas by a connecting router.
Backbone Area The backbone area (Area 0) is the core of an OSPF network. All
other areas are connected to it and all traffic between areas must
traverse it. All routing between areas is distributed through the
backbone area. While all other OSPF areas must connect to the
backbone area, this connection doesn’t need to be direct and can
be made through a virtual link.
Normal OSPF Area In a normal OSPF area there are no restrictions; the area can carry
all types of routes.
Stub OSPF Area A stub area does not receive routes from other autonomous
systems. Routing from the stub area is performed through the
default route to the backbone area.
NSSA Area The Not So Stubby Area (NSSA) is a type of stub area that can
import external routes, with some limited exceptions.
PAN-OS® Networking Administrator’s Guide Version 11.0 87 ©2023 Palo Alto Networks, Inc.
OSPF
• Backbone Router—A backbone router is a router that runs OSPF and has at least one interface
connected to the OSPF backbone area. Since ABRs are always connected to the backbone,
they are always classified as backbone routers.
• Autonomous System Boundary Router (ASBR)—An ASBR is a router that attaches to more
than one routing protocol and exchanges routing information between them.
PAN-OS® Networking Administrator’s Guide Version 11.0 88 ©2023 Palo Alto Networks, Inc.
OSPF
Configure OSPF
After you understand OSPF Concepts, perform the following procedure to configure OSPF.
STEP 1 | Configure general virtual router settings.
PAN-OS® Networking Administrator’s Guide Version 11.0 89 ©2023 Palo Alto Networks, Inc.
OSPF
PAN-OS® Networking Administrator’s Guide Version 11.0 90 ©2023 Palo Alto Networks, Inc.
OSPF
PAN-OS® Networking Administrator’s Guide Version 11.0 91 ©2023 Palo Alto Networks, Inc.
OSPF
Configure OSPFv3
OSPF supports both IPv4 and IPv6. You must use OSPFv3 if you are using IPv6.
STEP 1 | Configure general virtual router settings.
PAN-OS® Networking Administrator’s Guide Version 11.0 92 ©2023 Palo Alto Networks, Inc.
OSPF
PAN-OS® Networking Administrator’s Guide Version 11.0 93 ©2023 Palo Alto Networks, Inc.
OSPF
the OSPF area will behave as a Totally Stubby Area (TSA) and the ABR will not
propagate any summary LSAs.
• Advertise Default Route—Default route LSAs will be included in advertisements to
the stub area along with a configured metric value in the configured range 1-255.
• NSSA (Not-So-Stubby Area)—The firewall can leave the area only by routes other
than OSPF routes. If selected, configure Accept Summary and Advertise Default
Route as described for Stub. If you select this option, configure the following:
• Type—Select either Ext 1 or Ext 2 route type to advertise the default LSA.
• Ext Ranges—Add ranges of external routes that you want to enable or suppress
advertising for.
PAN-OS® Networking Administrator’s Guide Version 11.0 94 ©2023 Palo Alto Networks, Inc.
OSPF
SPF calculation. Lower values enable faster OSPF re-convergence. Routers peering with
the firewall should use the same delay value to optimize convergence times.
3. Specify a value for the LSA Interval (sec) timer, which is the minimum time (in seconds)
between transmissions of two instances of the same LSA (same router, same type, same
LSA ID). This is equivalent to MinLSInterval in RFC 2328. Lower values can be used to
reduce re-convergence times when topology changes occur.
4. (Optional) Configure OSPF Graceful Restart.
5. Click OK.
PAN-OS® Networking Administrator’s Guide Version 11.0 95 ©2023 Palo Alto Networks, Inc.
OSPF
STEP 3 | Verify that the following are selected (they are enabled by default):
• Enable Graceful Restart
• Enable Helper Mode
• Enable Strict LSA Checking
These should remain selected unless required by your topology.
PAN-OS® Networking Administrator’s Guide Version 11.0 96 ©2023 Palo Alto Networks, Inc.
OSPF
STEP 2 | Select Routing > Route Table and examine the Flags column of the routing table for routes
that were learned by OSPF.
STEP 2 | Select OSPF > Neighbor and examine the Status column to determine if OSPF adjacencies
have been established.
STEP 2 | Select OSPF > Neighbor and examine the Status column to determine if OSPF adjacencies
have been established (are full).
PAN-OS® Networking Administrator’s Guide Version 11.0 97 ©2023 Palo Alto Networks, Inc.
OSPF
PAN-OS® Networking Administrator’s Guide Version 11.0 98 ©2023 Palo Alto Networks, Inc.
BGP
Border Gateway Protocol (BGP) is the primary Internet routing protocol. BGP
determines network reachability based on IP prefixes that are available within
autonomous systems (AS), where an AS is a set of IP prefixes that a network provider
has designated to be part of a single routing policy.
99
BGP
BGP Overview
BGP functions between autonomous systems (exterior BGP or eBGP) or within an AS (interior
BGP or iBGP) to exchange routing and reachability information with BGP speakers. The firewall
provides a complete BGP implementation, which includes the following features:
• Specification of one BGP routing instance per virtual router.
• BGP settings per virtual router, which include basic parameters such as local router ID and local
AS, and advanced options such as path selection, route reflector, BGP Confederations, route
flap dampening, and graceful restart.
• Peer group and neighbor settings, which include neighbor address and remote AS, and
advanced options such as neighbor attributes and connections.
• Route policies to control route import, export and advertisement; prefix-based filtering; and
address aggregation.
• IGP-BGP interaction to inject routes to BGP using redistribution profiles.
• Authentication profiles, which specify the MD5 authentication key for BGP connections.
Authentication helps prevent route leaking and successful DoS attacks.
• Multiprotocol BGP (MP-BGP) to allow BGP peers to carry IPv6 unicast routes and IPv4
multicast routes in Update packets, and to allow the firewall and a BGP peer to communicate
with each other using IPv6 addresses.
• BGP supports a maximum of 255 AS numbers in an AS_PATH list for a prefix.
PAN-OS® Networking Administrator’s Guide Version 11.0 100 ©2023 Palo Alto Networks, Inc.
BGP
MP-BGP
BGP supports IPv4 unicast prefixes, but a BGP network that uses IPv4 multicast routes or IPv6
unicast prefixes needs multiprotocol BGP (MP-BGP) in order to exchange routes of address
types other than IPv4 unicast. MP-BGP allows BGP peers to carry IPv4 multicast routes and IPv6
unicast routes in Update packets, in addition to the IPv4 unicast routes that BGP peers can carry
without MP-BGP enabled.
In this way, MP-BGP provides IPv6 connectivity to your BGP networks that use either native
IPv6 or dual stack IPv4 and IPv6. Service providers can offer IPv6 service to their customers,
and enterprises can use IPv6 service from service providers. The firewall and a BGP peer can
communicate with each other using IPv6 addresses.
In order for BGP to support multiple network-layer protocols (other than BGP for IPv4),
Multiprotocol Extensions for BGP-4 (RFC 4760) use Network Layer Reachability Information
(NLRI) in a Multiprotocol Reachable NLRI attribute that the firewall sends and receives in BGP
Update packets. That attribute contains information about the destination prefix, including these
two identifiers:
• The Address Family Identifier (AFI), as defined by the IANA in Address Family Numbers,
indicates that the destination prefix is an IPv4 or IPv6 address. (PAN-OS supports IPv4 and
IPv6 AFIs.)
• The Subsequent Address Family Identifier (SAFI) in PAN-OS indicates that the destination
prefix is a unicast or multicast address (if the AFI is IPv4), or that the destination prefix is a
unicast address (if the AFI is IPv6). PAN-OS does not support IPv6 multicast.
If you enable MP-BGP for IPv4 multicast or if you configure a multicast static route, the firewall
supports separate unicast and multicast route tables for static routes. You might want to separate
the unicast and multicast traffic going to the same destination. The multicast traffic can take a
different path from unicast traffic because, for example, your multicast traffic is critical, so you
need it to be more efficient by having it take fewer hops or undergo less latency.
You can also exercise more control over how BGP functions by configuring BGP to use routes
from only the unicast or multicast route table (or both) when BGP imports or exports routes,
sends conditional advertisements, or performs route redistribution or route aggregation.
You can decide to use a dedicated multicast RIB (route table) by enabling MP-BGP and selecting
the Address Family of IPv4 and Subsequent Address Family of multicast or by installing an IPv4
static route in the multicast route table. After you do either of those methods to use the multicast
RIB, the firewall uses the multicast RIB for all multicast routing and reverse path forwarding (RPF).
If you prefer to use the unicast RIB for all routing (unicast and multicast), you should not enable
the multicast RIB by either method.
In the following figure, a static route to 192.168.10.0/24 is installed in the unicast route table,
and its next hop is 198.51.100.2. However, multicast traffic can take a different path to a private
MPLS cloud; the same static route is installed in the multicast route table with a different next hop
(198.51.100.4) so that its path is different.
PAN-OS® Networking Administrator’s Guide Version 11.0 101 ©2023 Palo Alto Networks, Inc.
BGP
Using separate unicast and multicast route tables gives you more flexibility and control when you
configure these BGP functions:
• Install an IPv4 static route into the unicast or multicast route table, or both, as described in the
preceding example. (You can install an IPv6 static route into the unicast route table only).
• Create an Import rule so that any prefixes that match the criteria are imported into the unicast
or multicast route table, or both.
• Create an Export rule so that prefixes that match the criteria are exported (sent to a peer) from
the unicast or multicast route table, or both.
• Configure a conditional advertisement with a Non Exist filter so that the firewall searches the
unicast or multicast route table (or both) to ensure the route doesn’t exist in that table, and so
the firewall advertises a different route.
• Configure a conditional advertisement with an Advertise filter so that the firewall advertises
routes matching the criteria from the unicast or multicast route table, or both.
• Redistribute a route that appears in the unicast or multicast route table, or both.
• Configure route aggregation with an advertise filter so that aggregated routes to be advertised
come from the unicast or multicast route table, or both.
• Conversely, configure route aggregation with a suppress filter so that aggregated routes that
should be suppressed (not advertised) come from the unicast or multicast route table, or both.
When you configure a peer with MP-BGP using an Address Family of IPv6, you can use IPv6
addresses in the Address Prefix and Next Hop fields of an Import rule, Export rule, Conditional
Advertisement (Advertise Filter and Non Exist Filter), and Aggregate rule (Advertise Filter,
Suppress Filter, and Aggregate Route Attribute).
PAN-OS® Networking Administrator’s Guide Version 11.0 102 ©2023 Palo Alto Networks, Inc.
BGP
Configure BGP
Perform the following task to configure BGP.
STEP 1 | Configure general virtual router settings.
STEP 2 | Enable BGP for the virtual router, assign a router ID, and assign the virtual router to an AS.
1. Select Network > Virtual Routers and select a virtual router.
2. Select BGP.
3. Enable BGP for this virtual router.
4. Assign a Router ID to BGP for the virtual router, which is typically an IPv4 address to
ensure the Router ID is unique.
5. Assign the AS Number—the number of the AS to which the virtual router belongs based
on the router ID (range is 1 to 4,294,967,295).
6. Click OK.
Runtime stats display BGP 4-byte AS numbers using asplain notation according
to RFC 5396.
8. Enable or disable each of the following settings for Path Selection:
• Always Compare MED—Enable this comparison to choose paths from neighbors in
different autonomous systems.
• Deterministic MED Comparison—Enable this comparison to choose between routes
that are advertised by IBGP peers (BGP peers in the same autonomous system).
9. For Auth Profiles, Add an authentication profile:
• Profile Name—Enter a name to identify the profile.
• Secret/Confirm Secret—Enter and confirm a passphrase for BGP peer
communications. The Secret is used as a key in MD5 authentication.
10. Click OK twice.
PAN-OS® Networking Administrator’s Guide Version 11.0 103 ©2023 Palo Alto Networks, Inc.
BGP
PAN-OS® Networking Administrator’s Guide Version 11.0 104 ©2023 Palo Alto Networks, Inc.
BGP
STEP 6 | Configure a BGP peer that belongs to the peer group and specify its addressing.
1. Select Network > Virtual Routers and select a virtual router.
2. Select BGP > Peer Group and select the peer group you created.
3. For Peer, Add a peer by Name.
4. Enable the peer.
5. Enter the Peer AS to which the peer belongs.
6. Select Addressing.
7. For Local Address, select the Interface for which you are configuring BGP. If the
interface has more than one IP address, enter the IP address for that interface to be the
BGP peer.
8. For Peer Address, select either IP and enter the IP address or select or create an address
object, or select FQDN and enter the FQDN or address object that is type FQDN.
The firewall uses only one IP address (from each IPv4 or IPv6 family type) from
the DNS resolution of the FQDN. If the DNS resolution returns more than one
address, the firewall uses the preferred IP address that matches the IP family
type (IPv4 or IPv6) configured for the BGP peer. The preferred IP address is the
first address the DNS server returns in its initial response. The firewall retains
this address as preferred as long as the address appears in subsequent responses
regardless of its order.
9. Click OK.
PAN-OS® Networking Administrator’s Guide Version 11.0 105 ©2023 Palo Alto Networks, Inc.
BGP
PAN-OS® Networking Administrator’s Guide Version 11.0 106 ©2023 Palo Alto Networks, Inc.
BGP
STEP 8 | Configure the BGP peer with settings for route reflector client, peering type, maximum
prefixes, and Bidirectional Forwarding Detection (BFD).
1. Select Network > Virtual Routers and select a virtual router.
2. Select BGP > Peer Group and select the peer group you created.
3. Select the Peer you configured.
4. Select Advanced.
5. For Reflector Client, select one of the following:
• non-client (default)—Peer is not a route reflector client.
• client—Peer is a route reflector client.
• meshed-client
6. For Peering Type, select one of the following:
• Bilateral—The two BGP peers establish a peer connection.
• Unspecified (default).
7. For Max Prefixes, enter the maximum number of IP prefixes to import from the peer
(range is 1 to 100,000) or select unlimited.
8. To enable BFD for the peer (and thereby override the BFD setting for BGP, as long as
BFD is not disabled for BGP at the virtual router level), select one of the following:
• default—Peer uses only default BFD settings.
• Inherit-vr-global-setting (default)—Peer inherits the BFD profile that you selected
globally for BGP for the virtual router.
• A BFD profile you configured—See Create a BFD Profile.
9. Click OK.
PAN-OS® Networking Administrator’s Guide Version 11.0 107 ©2023 Palo Alto Networks, Inc.
BGP
subnets for route filtering. The MED option is an external metric that lets neighbors
know about the preferred path into an AS. A lower value is preferred over a higher value.
5. Select Action and define the action that should occur (allow or deny) based on the
filtering options defined in the Match tab. If you select Deny, you don’t need to define
any additional options. If you select Allow, then define the other attributes.
6. Click OK.
7. Select Export and define export attributes, which are similar to the Import settings but
are used to control route information that is exported from the firewall to neighbors. The
name of the Export rule can be a maximum of 31 characters.
STEP 10 | Configure conditional advertising, which allows you to control what route to advertise in the
event that a different route is not available in the local BGP routing table (LocRIB), indicating
a peering or reachability failure.
This is useful in cases where you want to try to force routes to one AS over another, such as
when you have links to the internet through multiple ISPs and you want traffic to be routed to
one provider instead of the other except when there is a loss of connectivity to the preferred
provider.
1. Select Conditional Adv and Add a Policy name.
2. Enable the conditional advertisement.
3. In the Used By section, Add the peer groups that will use the conditional advertisement
policy.
4. Select Non Exist Filter and define the network prefixes of the preferred route. This
specifies the route that you want to advertise when it is available in the local BGP
routing table. If a prefix is going to be advertised and matches a Non Exist filter, the
advertisement will be suppressed.
5. Select Advertise Filters and define the prefixes of the route in the Local-RIB routing
table that should be advertised in the event that the route in the non-exist filter is
unavailable in the local routing table. If a prefix is going to be advertised and does not
match a Non Exist filter, the advertisement will occur.
6. Click OK.
PAN-OS® Networking Administrator’s Guide Version 11.0 108 ©2023 Palo Alto Networks, Inc.
BGP
PAN-OS® Networking Administrator’s Guide Version 11.0 109 ©2023 Palo Alto Networks, Inc.
BGP
PAN-OS® Networking Administrator’s Guide Version 11.0 110 ©2023 Palo Alto Networks, Inc.
BGP
STEP 2 | (Optional) Create a static route and install it in the unicast route table because you want the
route to be used only for unicast purposes.
1. Select Network > Virtual Routers and select the virtual router you are configuring.
2. Select Static Routes, select IPv4 or IPv6, and Add a route.
3. Enter a Name for the static route.
4. Enter the IPv4 or IPv6 Destination prefix and netmask, depending on whether you chose
IPv4 or IPv6.
5. Select the egress Interface.
6. Select the Next Hop as IPv6 Address (or IP Address if you chose IPv4) and enter the
address of the next hop to which you want to direct unicast traffic for this static route.
7. Enter an Admin Distance.
8. Enter a Metric.
9. For Route Table, select Unicast.
10. Click OK.
PAN-OS® Networking Administrator’s Guide Version 11.0 111 ©2023 Palo Alto Networks, Inc.
BGP
2. View the BGP RIB Out table, which shows the routes that the firewall sends to BGP
neighbors.
1. Select Network > Virtual Routers.
2. In the row for the virtual router, click More Runtime Stats.
3. Select BGP > RIB Out.
4. For Route Table, select Unicast or Multicast to display only those routes.
5. For Display Address Family, select IPv4 Only, IPv6 Only, or IPv4 and IPv6 to display
only routes for that address family.
PAN-OS® Networking Administrator’s Guide Version 11.0 112 ©2023 Palo Alto Networks, Inc.
BGP
STEP 2 | (Optional) Create an IPv4 static route and install it in the multicast route table only.
You would do this to direct multicast traffic for a BGP peer to a specific next hop, as shown in
the topology in MP-BGP.
1. Select Network > Virtual Routers and select the virtual router you are configuring.
2. Select Static Routes > IPv4 and Add a Name for the route.
3. Enter the IPv4 Destination prefix and netmask.
4. Select the egress Interface.
5. Select the Next Hop as IP Address and enter the IP address of the next hop to which
you want to direct multicast traffic for this static route.
6. Enter an Admin Distance.
7. Enter a Metric.
8. For Route Table, select Multicast.
9. Click OK.
PAN-OS® Networking Administrator’s Guide Version 11.0 113 ©2023 Palo Alto Networks, Inc.
BGP
STEP 5 | To view the Forwarding table, BGP Local RIB, or BGP RIB Out table, see Configure a BGP
Peer with MP-BGP for IPv4 or IPv6 Unicast.
PAN-OS® Networking Administrator’s Guide Version 11.0 114 ©2023 Palo Alto Networks, Inc.
BGP
BGP Confederations
BGP confederations provide a way to divide an autonomous system (AS) into two or more sub-
autonomous systems (sub-AS) to reduce the burden that the full mesh requirement for IBGP
causes. The firewalls (or other routing devices) within a sub-AS must still have a full iBGP mesh
with the other firewalls in the same sub-AS. You need BGP peering between sub-autonomous
systems for full connectivity within the main AS. The firewalls peering with each other within a
sub-AS form an IBGP confederation peering. The firewall in one sub-AS peering with a firewall in
a different sub-AS form an EBGP confederation peering. Two firewalls from different autonomous
systems that connect are EBGP peers.
PAN-OS® Networking Administrator’s Guide Version 11.0 115 ©2023 Palo Alto Networks, Inc.
BGP
PAN-OS® Networking Administrator’s Guide Version 11.0 116 ©2023 Palo Alto Networks, Inc.
BGP
• AS—25
• Peering Type—EBGP
• Peer AS—24
After the firewall is configured to peer with R1, R2, and R5, its peers are visible on the Peer Group
tab:
PAN-OS® Networking Administrator’s Guide Version 11.0 117 ©2023 Palo Alto Networks, Inc.
BGP
To verify that the routes from the firewall to the peers are established, on the virtual router’s
screen, select More Runtime Stats and select the Peer tab.
PAN-OS® Networking Administrator’s Guide Version 11.0 118 ©2023 Palo Alto Networks, Inc.
BGP
Select the Local RIB tab to view information about the routes stored in the Routing Information
Base (RIB).
PAN-OS® Networking Administrator’s Guide Version 11.0 119 ©2023 Palo Alto Networks, Inc.
BGP
PAN-OS® Networking Administrator’s Guide Version 11.0 120 ©2023 Palo Alto Networks, Inc.
IP Multicast
IP multicast is a set of protocols that network appliances use to send multicast IP
datagrams to a group of interested receivers using one transmission rather than
unicasting the traffic to multiple receivers, thereby saving bandwidth. IP multicast
is suitable for communication from one source (or many sources) to many receivers,
such as audio or video streaming, IPTV, video conferencing, and distribution of other
communication, such as news and financial data.
A multicast address identifies a group of receivers that want to receive the traffic
going to that address. You should not use the multicast addresses reserved for
special uses, such as the range 224.0.0.0 through 224.0.0.255 or 239.0.0.0 through
239.255.255.255. Multicast traffic uses UDP, which does not resend missed packets.
Palo Alto Networks® firewalls support IP multicast and Protocol Independent
Multicast (PIM) on a Layer 3 interface that you configure for a virtual router on the
firewall.
For multicast routing, the Layer 3 interface type can be Ethernet, Aggregate Ethernet
(AE), VLAN, loopback, or tunnel. Interface groups allow you to configure more than
one firewall interface at a time with the same Internet Group Management Protocol
(IGMP) and PIM parameters, and with the same group permissions (multicast groups
allowed to accept traffic from any source or from only a specific source). An interface
can belong to only one interface group.
The firewall supports IPv4 multicast—it does not support IPv6 multicast. The firewall
also does not support PIM Dense Mode (PIM-DM), IGMP proxy, IGMP static joins,
Anycast RP, GRE, or multicast configurations on a Layer 2 or virtual wire interface
type. However, a virtual wire interface can pass multicast packets. Also, a Layer 2
interface can switch Layer 3 IPv4 multicast packets between different VLANs and the
firewall will retag the VLAN ID using the VLAN ID of the egress interface.
You must enable multicast for a virtual router and enable PIM for an ingress and an
egress interface in order for the interfaces to receive or forward multicast packets. In
addition to PIM, you must also enable IGMP on egress interfaces that face receivers.
You must configure a Security policy rule to allow IP multicast traffic to a predefined
Layer 3 destination zone named multicast or to any destination zone.
> IGMP
> PIM
> Configure IP Multicast
> View IP Multicast Information
121
IP Multicast
IGMP
Internet Group Management Protocol (IGMP) is an IPv4 protocol that a multicast receiver uses
to communicate with an interface on a Palo Alto Networks® firewall and that the firewall uses
to track the membership of multicast groups. When a host wants to receive multicast traffic, its
implementation of IGMP sends an IGMP Membership report message and the receiving router, in
turn, sends a PIM Join message to the multicast group address of the group that the host wants to
join. An IGMP-enabled router on the same physical network (such as an Ethernet segment) then
uses PIM to communicate with other PIM-enabled routers to determine a path from the source to
interested receivers.
Enable IGMP only on interfaces that face a multicast receiver. The receivers can be only one Layer
3 hop away from the virtual router. IGMP messages are Layer 2 messages that have a TTL value
of one and, therefore, cannot go outside the LAN.
When you Configure IP Multicast, specify whether an interface uses IGMP Version 1, IGMP
Version 2, or IGMP Version 3. You can enforce the IP Router Alert option, RFC 2113, so that
incoming IGMP packets that use IGMPv2 or IGMPv3 have the IP Router Alert option.
By default, an interface accepts IGMP Membership reports for all multicast groups. You can
configure multicast group permissions to control the groups for which the virtual router accepts
Membership reports from any source (Any-Source Multicast, or ASM), which is basically PIM
Sparse Mode (PIM-SM). You can also specify the groups for which the virtual router accepts
Membership reports from a specific source (PIM Source-Specific Multicast [PIM-SSM]). If you
specify permissions for either ASM or SSM groups, the virtual router denies Membership reports
from other groups. The interface must use IGMPv3 to pass PIM-SSM traffic.
You can specify the maximum number of sources and the maximum number of multicast groups
that IGMP can process simultaneously for an interface.
The virtual router multicasts an IGMP Query at regular intervals to all receivers of a multicast
group. A receiver responds to an IGMP Query with an IGMP Membership report that confirms the
receiver still wants to receive multicast traffic for that group. The virtual router maintains a table
of the multicast groups that have receivers; the virtual router forwards a multicast packet out the
interface to the next hop only if there is still a receiver down that multicast distribution tree that
is joined to the group. The virtual router does not track exactly which receivers are joined to a
group. Only one router on a subnet responds to IGMP Queries and that is the IGMP Querier—the
router with the lowest IP address.
You can configure an interface with an IGMP Query interval and the amount of time allowed for
a receiver to respond to a query (the Max Query Response Time). When a virtual router receives
an IGMP Leave message from a receiver to leave a group, the virtual router checks that the
interface that received the Leave message is not configured with the Immediate Leave option.
In the absence of the Immediate Leave option, the virtual router sends a Query to determine
whether there are still receiver members for the group. The Last Member Query Interval specifies
how many seconds are allowed for any remaining receivers for that group to respond and confirm
that they still want multicast traffic for that group.
An interface supports the IGMP robustness variable, which you can adjust so that the firewall
then tunes the Group Membership Interval, Other Querier Present Interval, Startup Query Count,
and Last Member Query Count. A higher robustness variable can accommodate a subnet that is
likely to drop packets.
PAN-OS® Networking Administrator’s Guide Version 11.0 122 ©2023 Palo Alto Networks, Inc.
IP Multicast
View IP Multicast Information to see IGMP-enabled interfaces, the IGMP version, Querier
address, robustness setting, limits on the number of multicast groups and sources, and whether
the interface is configured for Immediate Leave. You can also see the multicast groups to which
interfaces belong and other IGMP membership information.
PAN-OS® Networking Administrator’s Guide Version 11.0 123 ©2023 Palo Alto Networks, Inc.
IP Multicast
PIM
IP multicast uses the Protocol Independent Multicast (PIM) routing protocol between routers to
determine the path on the distribution tree that multicast packets take from the source to the
receivers (multicast group members). Both virtual routers (on a legacy routing engine) and logical
routers (on an Advanced Routing Engine) support PIM.
A Palo Alto Networks® firewall supports PIM Sparse Mode (PIM-SM) (RFC 4601), PIM Any-
Source Multicast (ASM) (sometimes referred to as PIM Sparse Mode), and PIM Source-Specific
Multicast (SSM). In PIM-SM, the source does not forward multicast traffic until a receiver (user)
belonging to a multicast group requests that the source send the traffic. When a host wants to
receive multicast traffic, its implementation of IGMP sends an IGMP Membership report message,
and the receiving router then sends a PIM Join message to the multicast group address of the
group it wants to join.
• In ASM, the receiver uses IGMP to request traffic for a multicast group address; any source
could have originated that traffic. Consequently, the receiver doesn’t necessarily know the
senders, and the receiver could receive multicast traffic in which it has no interest.
• In SSM (RFC 4607), the receiver uses IGMP to request traffic from one or more specific
sources to a multicast group address. The receiver knows the IP address of the senders and
receives only the multicast traffic it wants. SSM requires IGMPv3. The default SSM address
space (232.0.0.0/8) can be overridden by adjusting the source specific address space. Group
permissions also need to be adjusted.
When you Configure IP Multicast on a Palo Alto Networks firewall, you must enable PIM for an
interface to forward multicast traffic, even on receiver-facing interfaces. This is unlike IGMP,
which you enable only on receiver-facing interfaces.
ASM requires a rendezvous point (RP), which is a router located at the juncture or root of a shared
distribution tree. The RP for a multicast domain serves as a single point to which all multicast
group members send their Join messages. This behavior reduces the likelihood of a routing loop
that would otherwise occur if group members sent their Join messages to multiple routers. (SSM
doesn’t need an RP because source-specific multicast uses a shortest-path tree and therefore has
no need for an RP.)
In an ASM environment, there are two ways that the virtual router determines which router is the
RP for a multicast group:
• Static RP-to-Group Mapping—configures the virtual router on the firewall to act as RP for
multicast groups. You configure a local RP, either by configuring a static RP address or by
specifying that the local RP is a candidate RP and the RP is chosen dynamically (based on
lowest priority value). You can also statically configure one or more external RPs for different
group address ranges not covered by the local RP, which helps you load-balance multicast
traffic so that one RP is not overloaded.
PAN-OS® Networking Administrator’s Guide Version 11.0 124 ©2023 Palo Alto Networks, Inc.
IP Multicast
• Bootstrap Router (BSR)—(RFC 5059)—defines the role of a BSR. First, candidates for BSR
advertise their priority to each other and then the candidate with the largest priority is elected
BSR, as shown in the following figure:
Next, the BSR discovers RPs when candidate RPs periodically unicast a BSR message to the
BSR containing their IP address and the multicast group range for which they will act as RP.
You can configure the local virtual router to be a candidate RP, in which case the virtual router
announces its RP candidacy for a specific multicast group or groups. The BSR sends out RP
information to the other RPs in the PIM domain.
When you configure PIM for an interface, you can select BSR Border when the interface on
the firewall is at an enterprise boundary facing away from the enterprise network. The BSR
Border setting prevents the firewall from sending RP candidacy BSR messages outside the
LAN. In the following illustration, BSR Border is enabled for the interface facing the LAN and
that interface has the highest priority. If the virtual router has both a static RP and a dynamic
RP (learned from the BSR), you can specify whether the static RP should override the learned
RP for a group when you configure the local, static RP.
In order for PIM Sparse Mode to notify the RP that it has traffic to send down a shared tree, the
RP must be aware of the source. The host notifies the RP that it is sending traffic to a multicast
PAN-OS® Networking Administrator’s Guide Version 11.0 125 ©2023 Palo Alto Networks, Inc.
IP Multicast
group address when the designated router (DR) encapsulates the first packet from the host in
a PIM Register message and unicasts the packet to the RP on its local network. The DR also
forwards Prune messages from a receiver to the RP. The RP maintains the list of IP addresses
of sources that are sending to a multicast group and the RP can forward multicast packets from
sources.
Why do the routers in a PIM domain need a DR? When a router sends a PIM Join message to
a switch, two routers could receive it and forward it to the same RP, causing redundant traffic
and wasting bandwidth. To prevent unnecessary traffic, the PIM routers elect a DR (the router
with the highest IP address), and only the DR forwards the Join message to the RP. Alternatively,
you can assign a DR priority to an interface group, which takes precedence over IP address
comparisons. As a reminder, the DR is forwarding (unicasting) PIM messages; it is not multicasting
IP multicast packets.
You can specify the IP addresses of PIM neighbors (routers) that the interface group will allow
to peer with the virtual router. By default, all PIM-enabled routers can be PIM neighbors, but
the option to limit neighbors provides a step toward securing the virtual router in your PIM
environment.
• Shortest Path Tree (SPT) and Shared Tree
• PIM Assert Mechanism
• Reverse-Path Forwarding
PAN-OS® Networking Administrator’s Guide Version 11.0 126 ©2023 Palo Alto Networks, Inc.
IP Multicast
G); for example, (192.168.1.1, 225.9.2.6). The following figure illustrates three shortest-path
trees from the source to three receivers.
• A shared tree—A path rooted at the RP, not at the multicast source. A shared tree is also
known as an RP tree or RPT. Routers forward multicast packets from various sources to the
RP and the RP forwards the packets down the shared tree. A shared tree is annotated as (*, G),
using a wildcard as the source because all sources belonging to the multicast group share the
same distribution tree from the RP. An example shared tree annotation is (*, 226.3.1.5). The
following figure illustrates a shared tree from the root at the RP to the receivers.
Source-Specific Multicast (SSM) uses source tree distribution. When you Configure IP Multicast
to use Any Source Multicast (ASM), you can specify which distribution tree the virtual router on
your Palo Alto Networks® firewall uses to deliver multicast packets to a group by setting an SPT
threshold for the group:
• By default the virtual router switches multicast routing from shared tree to SPT when it
receives the first multicast packet for a group or prefix (the SPT Threshold is set to 0).
PAN-OS® Networking Administrator’s Guide Version 11.0 127 ©2023 Palo Alto Networks, Inc.
IP Multicast
• You can configure the virtual router to switch to SPT when the total number of kilobits in
packets arriving for the specified multicast group or prefix at any interface over any length of
time reaches a configured number.
• You can configure the virtual router to never switch to SPT for the group or prefix (it continues
to use shared tree).
SPT requires more memory, so choose your setting based on your multicast traffic level to the
group. If the virtual router switches to SPT, then packets will arrive from the source (rather than
the RP) and the virtual router sends a Prune message to the RP. The source sends subsequent
multicast packets for that group down the shortest-path tree.
Reverse-Path Forwarding
PIM uses reverse-path forwarding (RPF) to prevent multicast routing loops by leveraging the
unicast routing table on the virtual router. When the virtual router receives a multicast packet,
it looks up the source of the multicast packet in its unicast routing table to see if the outgoing
interface associated with that source IP address is the interface on which that packet arrived. If
the interfaces match, the virtual router duplicates the packet and forwards it out the interfaces
toward the multicast receivers in the group. If the interfaces don’t match, the virtual router drops
the packet. The unicast routing table is based on the underlying static routes or the interior
gateway protocol (IGP) your network uses, such as OSPF.
PIM also uses RPF to build a shortest-path tree to a source, one PIM router hop at a time. The
virtual router has the address of the multicast source, so the virtual router selects as its next
hop back to the source the upstream PIM neighbor that the virtual router would use to forward
unicast packets to the source. The next hop router does the same thing.
PAN-OS® Networking Administrator’s Guide Version 11.0 128 ©2023 Palo Alto Networks, Inc.
IP Multicast
After RPF succeeds and the virtual router has a route entry in its multicast routing information
base (mRIB), the virtual router maintains source-based tree entries (S,G) and shared tree entries
(*,G) in its multicast forwarding information base (multicast forwarding table or mFIB). Each entry
includes the source IP address, multicast group, incoming interface (RPF interface) and outgoing
interface list. There can be multiple outgoing interfaces for an entry because the shortest path
tree can branch at the router, and the router must forward the packet out multiple interfaces to
reach receivers of the group that are located down different paths. When the virtual router uses
the mFIB to forward a multicast packet, it matches an (S,G) entry before it attempts to match a
(*,G) entry.
If you are advertising multicast source prefixes into BGP (you configured MP-BGP with the IPv4
Address Family and the multicast Subsequent Address Family), then the firewall always performs
the RPF check on the BGP routes that the firewall received under the multicast Subsequent
Address Family.
View IP Multicast Information to see how to view the mFIB and mRIB entries. Keep in mind that
the multicast route table (mRIB) is a separate table from the unicast route table (RIB).
PAN-OS® Networking Administrator’s Guide Version 11.0 129 ©2023 Palo Alto Networks, Inc.
IP Multicast
Configure IP Multicast
Configure interfaces on a virtual router of a Palo Alto Networks® firewall to receive and forward
IP Multicast packets. You must enable IP multicast for the virtual router, configure Protocol
Independent Multicast (PIM) on the ingress and egress interfaces, and configure Internet Group
Management Protocol (IGMP) on receiver-facing interfaces.
STEP 1 | Enable IP multicast for a virtual router.
1. Select Network > Virtual Routers and select a virtual router.
2. Select Multicast and Enable IP multicast.
PAN-OS® Networking Administrator’s Guide Version 11.0 130 ©2023 Palo Alto Networks, Inc.
IP Multicast
STEP 2 | (ASM only) If the multicast domain in which the virtual router is located uses Any-Source
Multicast (ASM), identify and configure the local and remote rendezvous points (RPs) for
multicast groups.
1. Select Rendezvous Point.
2. Select a Local RP Type, which determines how the RP is chosen (the options are Static,
Candidate, or None):
• Static—Establishes a static mapping of an RP to multicast groups. Configuring a static
RP requires you to explicitly configure the same RP on other PIM routers in the PIM
domain.
• Select the RP Interface. Valid interface types are Layer3, virtual wire, loopback,
VLAN, Aggregate Ethernet (AE), and tunnel.
• Select the RP Address. The IP addresses of the RP interface you selected populate
the list.
• Select Override learned RP for the same group so that this static RP serves as RP
instead of the RP elected for the groups in the Group List.
• Add one or more multicast Groups for which the RP acts as the RP.
PAN-OS® Networking Administrator’s Guide Version 11.0 131 ©2023 Palo Alto Networks, Inc.
IP Multicast
which one acts as RP for the specified groups; the firewall selects the candidate RP
with the lowest priority value (range is 0 to 255; default is 192).
• (Optional) Change the Advertisement Interval (sec) (range is 1 to 26,214; default is
60).
• Enter a Group List of multicast groups that communicate with the RP.
• None—Select if this virtual router is not an RP.
3. Add a Remote Rendezvous Point and enter the IP Address of that remote (external) RP.
4. Add the multicast Group Addresses for which the specified remote RP address acts as
RP.
5. Select Override learned RP for the same group so that the external RP you configured
statically serves as RP instead of an RP that is dynamically learned (elected) for the
groups in the Group Addresses list.
6. Click OK.
STEP 3 | Specify a group of interfaces that share a multicast configuration (IGMP, PIM, and group
permissions).
1. On the Interfaces tab, Add a Name for the interface group.
2. Enter a Description.
3. Add an Interface and select one or more Layer 3 interfaces that belong to the interface
group.
STEP 4 | (Optional) Configure multicast group permissions for the interface group. By default, the
interface group accepts IGMP membership reports and PIM join messages from all groups.
1. Select Group Permissions.
2. To configure Any-Source Multicast (ASM) groups for this interface group, in the
Any Source window, Add a Name to identify a multicast group that accepts IGMP
membership reports and PIM join messages from any source.
3. Enter the multicast Group address or group address and /prefix that can receive
multicast packets from any source on these interfaces.
4. Select Included to include the ASM Group address in the interface group (default). De-
select Included to easily exclude an ASM group from the interface group, such as during
testing.
5. Add additional multicast Groups (for the interface group) that want to receive multicast
packets from any source.
6. To configure Source-Specific Multicast (SSM) groups in this interface group, in the
Source Specific window, Add a Name to identify a multicast group and source address
PAN-OS® Networking Administrator’s Guide Version 11.0 132 ©2023 Palo Alto Networks, Inc.
IP Multicast
pair. Don’t use a name that you used for Any Source multicast. (You must use IGMPv3 to
configure SSM.)
7. Enter the multicast Group address or group address and /prefix of the group that wants
to receive multicast packets from the specified source only (and can receive the packets
on these interfaces).
A Source Specific group for which you specify permissions is a group that the
virtual router must treat as source-specific. Configure Source Specific Address
Space (Step 9) that includes the source-specific groups for which you configured
permission.
8. Enter the Source IP address from which this multicast group can receive multicast
packets.
9. Select Included to include the SSM Group and source address pair in the interface group
(default). De-select Included to easily exclude the pair from the interface group, such as
during testing.
10. Add additional multicast Groups (for the interface group) that receive multicast packets
from a specific source only.
STEP 5 | Configure IGMP for the interface group if an interface faces multicast receivers, which must
use IGMP to join a group.
1. On the IGMP tab, Enable IGMP (default).
2. Specify IGMP parameters for interfaces in the interface group:
• IGMP Version—1, 2, or 3 (default).
• Enforce Router-Alert IP Option (disabled by default)—Select this option if you require
incoming IGMP packets that use IGMPv2 or IGMPv3 to have the IP Router Alert
Option, RFC 2113.
• Robustness—A variable that the firewall uses to tune the Group Membership Interval,
Other Querier Present Interval, Startup Query Count, and Last Member Query Count
PAN-OS® Networking Administrator’s Guide Version 11.0 133 ©2023 Palo Alto Networks, Inc.
IP Multicast
(range is 1 to 7; default is 2). Increase the value if the subnet on which this firewall is
located is prone to losing packets.
• Max Sources—Maximum number of sources that IGMP can process simultaneously
for an interface (range is 1 to 65,535; default is unlimited).
• Max Groups—Maximum number of groups that IGMP can process simultaneously for
an interface (range is 1 to 65,535; default is unlimited).
• Query Interval—Number of seconds between IGMP membership Query messages
that the virtual router sends to a receiver to determine whether the receiver still
wants to receive the multicast packets for a group (range is 1 to 31,744; default is
125).
• Max Query Response Time (sec)—Maximum number of seconds allowed for a
receiver to respond to an IGMP membership Query message before the virtual router
determines that the receiver no longer wants to receive multicast packets for the
group (range is 0 to 3,174.4; default is 10).
• Last Member Query Interval (sec)—Number of seconds allowed for a receiver to
respond to a Group-Specific Query that the virtual router sends after a receiver sends
a Leave Group message (range is 0.1 to 3,174.4; default is 1).
• Immediate Leave (disabled by default)—When there is only one member in a multicast
group and the virtual router receives an IGMP Leave message for that group, the
Immediate Leave setting causes the virtual router to remove that group and outgoing
interface from the multicast routing information base (mRIB) and multicast forwarding
information base (mFIB) immediately, rather than waiting for the Last Member Query
Interval to expire. The Immediate Leave setting saves network resources. You cannot
select Immediate Leave if the interface group uses IGMPv1.
STEP 6 | Configure PIM Sparse Mode (PIM-SM) for the interface group.
1. On the PIM tab, Enable PIM (enabled by default).
2. Specify PIM parameters for the interface group:
• Assert Interval—Number of seconds between PIM Assert messages that the virtual
router sends to other PIM routers on the multiaccess network when they are electing
a PIM forwarder (range is 0 to 65,534; default is 177).
• Hello Interval—Number of seconds between PIM Hello messages that the virtual
router sends to its PIM neighbors from each interface in the interface group (range is
0 to 18,000; default is 30).
• Join Prune Interval—Number of seconds between PIM Join messages (and between
PIM Prune messages) that the virtual router sends upstream toward a multicast
source (range is 1 to 18,000; default is 60).
• DR Priority—Designated Router (DR) priority that controls which router in a
multiaccess network forwards PIM Join and Prune messages to the RP (range is 0
PAN-OS® Networking Administrator’s Guide Version 11.0 134 ©2023 Palo Alto Networks, Inc.
IP Multicast
STEP 8 | (Optional) Change the Shortest-Path Tree (SPT) threshold, as described in Shortest-Path Tree
(SPT) and Shared Tree.
1. Select SPT Threshold and Add a Multicast Group/Prefix, the multicast group or prefix
for which you are specifying the distribution tree.
2. Specify the Threshold (kb)—The point at which routing to the specified multicast group
or prefix switches from shared tree (sourced from the RP) to SPT distribution:
• 0 (switch on first data packet) (default)—The virtual router switches from shared tree
to SPT for the group or prefix when the virtual router receives the first data packet
for the group or prefix.
• never (do not switch to spt)—The virtual router continues to use the shared tree to
forward packets to the group or prefix.
• Enter the total number of kilobits from multicast packets that can arrive for the
multicast group or prefix at any interface and over any time period, upon which the
virtual router changes to SPT distribution for that multicast group or prefix.
STEP 9 | Identify the multicast groups or groups and prefixes that accept multicast packets only from
a specific source.
1. Select Source Specific Address Space and Add the Name for the space.
2. Enter the multicast Group address with prefix length to identify the address space
that receives multicast packets from a specific source. If the virtual router receives a
multicast packet for an SSM group but the group is not covered by a Source Specific
Address Space, the virtual router drops the packet.
3. Select Included to include the source-specific address space as a multicast group address
range from which the virtual router will accept multicast packets that originated from an
PAN-OS® Networking Administrator’s Guide Version 11.0 135 ©2023 Palo Alto Networks, Inc.
IP Multicast
allowed specific source. De-select Included to easily exclude a group address space for
testing.
4. Add other source-specific address spaces to include all those groups for which you
specified SSM group permission.
STEP 10 | (Optional) Change the length of time that a multicast route remains in the mRIB after the
session ends between a multicast group and a source.
1. Select the Advanced tab.
2. Specify the Multicast Route Age Out Time (sec) (range is 210 to 7,200; default is 210).
STEP 12 | Create a Security policy rule to allow multicast traffic to the destination zone.
1. Create a Security Policy Rule and on the Destination tab, select multicast or any for
the Destination Zone. The multicast zone is a predefined Layer 3 zone that matches all
multicast traffic. The Destination Address can be a multicast group address.
2. Configure the rest of the Security policy rule.
STEP 13 | (Optional) Enable buffering of multicast packets before a route is set up.
1. Select Device > Setup > Session and edit Session Settings.
2. Enable Multicast Route Setup Buffering (disabled by default). The firewall can preserve
the first packet(s) from a multicast flow if an entry for the corresponding multicast group
does not yet exist in the multicast forwarding table (mFIB). The Buffer Size controls
how many packets the firewall buffers from a flow. After the route is installed in the
mFIB, the firewall automatically forwards the buffered first packet(s) to the receiver.
(You need to enable multicast route setup buffering only if your content servers are
PAN-OS® Networking Administrator’s Guide Version 11.0 136 ©2023 Palo Alto Networks, Inc.
IP Multicast
directly connected to the firewall and your multicast application cannot withstand the
first packet of the flow being dropped.)
3. (Optional) Change the Buffer Size. Buffer size is the number of packets per multicast
flow that the firewall can buffer until the mFIB entry is set up (range is 1 to 2,000;
default is 1,000). The firewall can buffer a maximum of 5,000 packets total (for all flows).
4. Click OK.
STEP 15 | View IP Multicast Information to view mRIB and mFIB entries, IGMP interface settings,
IGMP group memberships, PIM ASM and SSM modes, group mappings to RPs, DR addresses,
PIM settings, PIM neighbors, and more.
STEP 16 | If you Configure a Static Route for multicast traffic, you can install the route only in the
multicast routing table (not the unicast routing table) so that the route is used for multicast
traffic only.
STEP 17 | If you enable IP multicast, it is not necessary to Configure BGP with MP-BGP for IPv4
Multicast unless you have a logical multicast topology separate from a logical unicast
topology. You configure MP-BGP extensions with the IPv4 address family and multicast
subsequent address family only when you want to advertise multicast source prefixes into
BGP under multicast subsequent address family.
PAN-OS® Networking Administrator’s Guide Version 11.0 137 ©2023 Palo Alto Networks, Inc.
IP Multicast
Select Network > Virtual Routers and in the row for the virtual router you configured, click
More Runtime Stats.
1. Select Routing > Route Table and then the Multicast radio button to display only
multicast routes (destination IP multicast group, the next hop toward that group, and
outgoing interface). This information comes from the mRIB.
2. Select Multicast > FIB to view multicast route information from the mFIB: multicast
groups to which the virtual router belongs, the corresponding source, incoming
interfaces, and outgoing interfaces toward the receivers.
3. Select Multicast > IGMP > Interface to view IGMP-enabled interfaces, the associated
IGMP version, IP address of the IGMP Querier, Querier up time and expiry time, the
PAN-OS® Networking Administrator’s Guide Version 11.0 138 ©2023 Palo Alto Networks, Inc.
IP Multicast
robustness setting, limits on numbers of multicast groups and sources, and whether the
interface is configured for immediate leave.
4. Select Multicast > IGMP > Membership to see IGMP-enabled interfaces and the
multicast groups to which they belong, the source, and other IGMP information.
5. Select Multicast > PIM > Group Mapping to view multicast groups mapped to an RP, the
origin of the RP mapping, the PIM mode for the group (ASM or SSM), and whether the
PAN-OS® Networking Administrator’s Guide Version 11.0 139 ©2023 Palo Alto Networks, Inc.
IP Multicast
group is inactive. Groups in SSM mode don’t use an RP, so the RP address displayed is
0.0.0.0. The default SSM group is 232.0.0.0/8.
6. Select Multicast > PIM > Interface to view the IP address of the DR for an interface; the
DR priority; the Hello, Join/Prune, and Assert intervals; and whether the interface is a
bootstrap router (BSR).
7. Select Multicast > PIM > Neighbor to view information about routers that are PIM
neighbors to the virtual router.
PAN-OS® Networking Administrator’s Guide Version 11.0 140 ©2023 Palo Alto Networks, Inc.
Route Redistribution
Learn about and configure route redistribution to increase accessibility of network
traffic.
141
Route Redistribution
PAN-OS® Networking Administrator’s Guide Version 11.0 142 ©2023 Palo Alto Networks, Inc.
Route Redistribution
PAN-OS® Networking Administrator’s Guide Version 11.0 143 ©2023 Palo Alto Networks, Inc.
Route Redistribution
STEP 2 | (Optional—When General Filter includes ospf or ospfv3) Create an OSPF filter to further
specify which OSPF or OSPFv3 routes to redistribute.
1. Select Network > Virtual Routers and select the virtual router.
2. Select Redistribution Profile and IPv4 or IPv6 and select the profile you created.
3. Select OSPF Filter.
4. For Path Type, select one or more of the following types of OSPF path to redistribute:
ext-1, ext-2, inter-area, or intra-area.
5. To specify an Area from which to redistribute OSPF or OSPFv3 routes, Add an area in IP
address format.
6. To specify a Tag, Add a tag in IP address format.
7. Click OK.
STEP 3 | (Optional—When General Filter includes bgp) Create a BGP filter to further specify which
BGP routes to redistribute.
1. Select Network > Virtual Routers and select the virtual router.
2. Select Redistribution Profile and IPv4 or IPv6 and select the profile you created.
3. Select BGP Filter.
4. For Community, Add to select from the list of communities, such as well-known
communities: local-as, no-advertise, no-export, or nopeer. You can also enter a 32-bit
value in decimal or hexadecimal or in AS:VAL format, where AS and VAL are each in the
range 0 to 65,535. Enter a maximum of 10 entries.
5. For Extended Community, Add an extended community as a 64-bit value in hexadecimal
or in TYPE:AS:VAL or TYPE:IP:VAL format. TYPE is 16 bits; AS or IP is 16 bits; VAL is 32
bits. Enter a maximum of five entries.
6. Click OK.
PAN-OS® Networking Administrator’s Guide Version 11.0 144 ©2023 Palo Alto Networks, Inc.
Route Redistribution
STEP 4 | Select the protocol into which you are redistributing routes, and set the attributes for those
routes.
This task illustrates redistributing routes into BGP.
1. Select Network > Virtual Routers and select the virtual router.
2. Select BGP > Redist Rules.
3. Select Allow Redistribute Default Route to allow the firewall to redistribute the default
route.
4. Click Add.
5. Select Address Family Type: IPv4 or IPv6 to specify in which route table the
redistributed routes will be put.
6. Select the Name of the Redistribution profile you created, which selects the routes to
redistribute.
7. Enable the redistribution rule.
8. (Optional) Enter any of the following values, which the firewall applies to the routes
being redistributed:
• Metric in the range 1 to 65,535.
• Set Origin—Origin of the route: igp, egp, or incomplete.
• Set MED—MED value in the range 0 to 4,294,967,295.
• Set Local Preference—Local preference value in the range 0 to 4,294,967,295.
• Set AS Path Limit—Maximum number of autonomous systems in the AS_PATH in the
range 1 to 255.
• Set Community—Select or enter a 32-bit value in decimal or hexadecimal, or enter a
value in AS:VAL format, where AS and VAL are each in the range 0 to 65,525. Enter a
maximum of 10 entries.
• Set Extended Community—Select or enter an extended community as a 64-bit value
in hexadecimal or in TYPE:AS:VAL or TYPE:IP:VAL format. TYPE is 16 bits; AS or IP is
16 bits; VAL is 32 bits. Enter a maximum of five entries.
9. Click OK.
PAN-OS® Networking Administrator’s Guide Version 11.0 145 ©2023 Palo Alto Networks, Inc.
Route Redistribution
PAN-OS® Networking Administrator’s Guide Version 11.0 146 ©2023 Palo Alto Networks, Inc.
GRE Tunnels
The Generic Routing Encapsulation (GRE) tunnel protocol is a carrier protocol that
encapsulates a payload protocol. The GRE packet itself is encapsulated in a transport
protocol (IPv4 or IPv6).
147
GRE Tunnels
For better performance and to avoid single points of failure, split multiple connections to
the firewall among multiple GRE tunnels rather than use a single tunnel. Each GRE tunnel
needs a tunnel interface.
When the firewall allows a packet to pass (based on a policy match) and the packet egresses to
a GRE tunnel interface, the firewall adds GRE encapsulation; it doesn’t generate a session. The
firewall does not perform a Security policy rule lookup for the GRE-encapsulated traffic, so you
don’t need a Security policy rule for the GRE traffic that the firewall encapsulates. However,
when the firewall receives GRE traffic, it generates a session and applies all policies to the GRE IP
header in addition to the encapsulated traffic. The firewall treats the received GRE packet like any
other packet. Therefore:
• If the firewall receives the GRE packet on an interface that has the same zone as the tunnel
interface associated with the GRE tunnel (for example, tunnel.1), the source zone is the same
as the destination zone. By default, traffic is allowed within a zone (intrazone traffic), so the
ingress GRE traffic is allowed by default.
• However, if you configured your own intrazone Security policy rule to deny such traffic, you
must explicitly allow GRE traffic.
PAN-OS® Networking Administrator’s Guide Version 11.0 148 ©2023 Palo Alto Networks, Inc.
GRE Tunnels
• Likewise, if the zone of the tunnel interface associated with the GRE tunnel (for example,
tunnel.1) is a different zone from that of the ingress interface, you must configure a Security
policy rule to allow the GRE traffic.
Because the firewall encapsulates the tunneled packet in a GRE packet, the additional 24 bytes
of GRE header automatically result in a smaller Maximum Segment Size (MSS) in the maximum
transmission unit (MTU). If you don’t change the IPv4 MSS Adjustment Size for the interface,
the firewall reduces the MTU by 64 bytes by default (40 bytes of IP header + 24 bytes of GRE
header). This means if the default MTU is 1,500 bytes, the MSS will be 1,436 bytes (1,500 - 40 -
24 = 1,436). If you configure an MSS Adjustment Size of 300 bytes, for example, the MSS will be
only 1,176 bytes (1,500 - 300 - 24 = 1,176).
The firewall does not support routing a GRE or IPSec tunnel to a GRE tunnel, but you can route a
GRE tunnel to an IPSec tunnel. Additionally:
• A GRE tunnel does not support QoS.
• The firewall does not support a single interface acting as both a GRE tunnel endpoint and a
decryption broker.
• GRE tunneling does not support NAT between GRE tunnel endpoints.
If you need to connect to another vendor’s network, we recommend you set up an IPSec
tunnel, not a GRE tunnel; you should use a GRE tunnel only if that is the only point-to-
point tunnel mechanism that the vendor supports. You can also enable GRE over IPSec
if the remote endpoint requires that (Add GRE Encapsulation). Add GRE encapsulation
in cases where the remote endpoint requires traffic to be encapsulated within a GRE
tunnel before IPSec encrypts the traffic. For example, some implementations require
multicast traffic to be encapsulated before IPSec encrypts it. If this is a requirement for
your environment and the GRE tunnel and IPSec tunnel share the same IP address, Add
GRE Encapsulation when you set up the IPSec tunnel.
If you aren’t planning to terminate a GRE tunnel on the firewall, but you want the ability
to inspect and control traffic passing through the firewall inside a GRE tunnel, don’t create
a GRE tunnel. Instead, perform Tunnel Content Inspection of GRE traffic. With tunnel
content inspection, you are inspecting and enforcing policy on GRE traffic passing through
the firewall, not creating a point-to-point, logical link for the purpose of directing traffic.
PAN-OS® Networking Administrator’s Guide Version 11.0 149 ©2023 Palo Alto Networks, Inc.
GRE Tunnels
6. Assign an IP address to the tunnel interface. (You must assign an IP address if you want
to route to this tunnel or monitor the tunnel endpoint.) Select IPv4 or IPv6 or configure
both.
This address and the corresponding address of the tunnel interface of the peer
should be on the same subnet because it is a point-to-point, logical link.
• (IPv4 only) On the IPv4 tab, Add an IPv4 address, select an address object, or click
New Address and specify the Type of address and enter it. For example, enter
192.168.2.1.
• (IPv6 only) On the IPv6 tab, Enable IPv6 on the interface.
1. For Interface ID, select EUI-64 (default 64-bit Extended Unique Identifier).
2. Add a new Address, select an IPv6 address object, or click New Address and
specify an address Name. Enable address on interface and click OK.
3. Select Type of address and enter the IPv6 address or FQDN and click OK to save
the new address.
4. Select Enable address on interface and click OK.
7. Click OK.
PAN-OS® Networking Administrator’s Guide Version 11.0 150 ©2023 Palo Alto Networks, Inc.
GRE Tunnels
STEP 2 | Create a GRE tunnel to force packets to traverse a specific point-to-point path.
1. Select Network > GRE Tunnels and Add a tunnel by Name.
2. Select the Interface to use as the local GRE tunnel endpoint (source interface), which is
an Ethernet interface or subinterface, an Aggregate Ethernet (AE) interface, a loopback
interface, or a VLAN interface.
3. Select the Local Address to be IP and select the IP address of the interface you just
selected.
4. Enter the Peer Address, which is the IP address of the opposite endpoint of the GRE
tunnel.
5. Select the Tunnel Interface that you created in Step 1. (This identifies the tunnel when it
is the egress Interface for routing.)
6. Enter the TTL for the IP packet encapsulated in the GRE packet (range is 1 to 255;
default is 64).
7. Select Copy ToS Header to copy the Type of Service (ToS) field from the inner IP
header to the outer IP header of the encapsulated packets to preserve the original ToS
information. Select this option if your network uses QoS and depends on the ToS bits for
enforcing QoS policies.
STEP 3 | (Best Practice) Enable the Keep Alive function for the GRE tunnel.
If Keep Alive is enabled, by default it takes three unreturned keepalive packets (Retries)
at 10-second intervals for the GRE tunnel to go down and it takes five Hold Timer
intervals at 10-second intervals for the GRE tunnel to come back up.
1. Select Keep Alive to enable the keepalive function for the GRE tunnel (default is
disabled).
2. (Optional) Set the Interval (sec) (in seconds) between keepalive packets that the local
end of the GRE tunnel sends to the tunnel peer. This is also the interval that, when
multiplied by the Hold Timer, is the length of time that the firewall must see successful
keepalive packets before the GRE tunnel comes back up (range is 1 to 50; default
is 10). Setting an interval too small will cause many keepalive packets that might be
unnecessary in your environment and will require extra bandwidth and processing.
Setting an interval too large can delay failover because error conditions might not be
identified immediately.
3. (Optional) Enter the Retry setting, which is the number of intervals that keepalive
packets are not returned before the firewall considers the tunnel peer down (range is 1
PAN-OS® Networking Administrator’s Guide Version 11.0 151 ©2023 Palo Alto Networks, Inc.
GRE Tunnels
to 255; default is 3). When the tunnel is down, the firewall removes routes associated
with the tunnel from the forwarding table. Configuring a retry setting helps avoid taking
measures on a tunnel that is not really down.
4. (Optional) Set the Hold Timer, which is the number of Intervals that keepalive packets
are successful, after which the firewall re-establishes communication with the tunnel
peer (range is 1 to 64; default is 5).
STEP 5 | Configure a routing protocol or static route to route traffic to the destination by way of the
GRE tunnel. For example, Configure a Static Route to the network of the destination server
and specify the egress Interface to be the local tunnel endpoint (tunnel.1). Configure the
Next Hop to be the IP address of the tunnel at the opposite end. For example, 192.168.2.3.
STEP 7 | Configure the opposite end of the tunnel with its public IP address, its local and peer IP
addresses (that correspond to the peer and local IP addresses, respectively, of the GRE
tunnel on the firewall), and its routing protocol or static route.
STEP 8 | Verify that the firewall can communicate with the tunnel peer over the GRE tunnel.
1. Access the CLI.
2. > ping source 192.168.2.1 host 192.168.2.3
PAN-OS® Networking Administrator’s Guide Version 11.0 152 ©2023 Palo Alto Networks, Inc.
DHCP
This section describes Dynamic Host Configuration Protocol (DHCP) and the tasks
®
required to configure an interface on a Palo Alto Networks firewall to act as a DHCP
server, client, or relay agent. By assigning these roles to different interfaces, the
firewall can perform multiple roles.
> DHCP Overview > Configure an Interface as a DHCP
> Firewall as a DHCP Server and Client Server
153
DHCP
DHCP Overview
DHCP is a standardized protocol defined in RFC 2131, Dynamic Host Configuration Protocol.
DHCP has two main purposes: to provide TCP/IP and link-layer configuration parameters and to
provide network addresses to dynamically configured hosts on a TCP/IP network.
DHCP uses a client-server model of communication. This model consists of three roles that the
device can fulfill: DHCP client, DHCP server, and DHCP relay agent.
• A device acting as a DHCP client (host) can request an IP address and other configuration
settings from a DHCP server. Users on client devices save configuration time and effort,
and need not know the network’s addressing plan or other resources and options they are
inheriting from the DHCP server.
• A device acting as a DHCP server can service clients. By using any of three DHCP Addressing
mechanisms, the network administrator saves configuration time and has the benefit of reusing
a limited number of IP addresses when a client no longer needs network connectivity. The
server can deliver IP addressing and many DHCP options to many clients.
• A device acting as a DHCP relay agent transmits DHCP messages between DHCP clients and
servers.
DHCP uses User Datagram Protocol (UDP), RFC 768, as its transport protocol. DHCP messages
that a client sends to a server are sent to well-known port 67 (UDP—Bootstrap Protocol and
DHCP). DHCP Messages that a server sends to a client are sent to port 68.
®
An interface on a Palo Alto Networks firewall can perform the role of a DHCP server, client,
or relay agent. The interface of a DHCP server or relay agent must be a Layer 3 Ethernet,
Aggregated Ethernet, or Layer 3 VLAN interface. You configure the firewall interfaces with the
appropriate settings for any combination of roles. The behavior of each role is summarized in
Firewall as a DHCP Server and Client.
The firewall can also function as a DHCPv6 client, with or without prefix delegation.
The firewall supports DHCPv4 Server and DHCPv6 Relay.
The Palo Alto Networks implementation of DHCP server supports IPv4 addresses only. Its DHCP
relay implementation supports IPv4 and IPv6. DHCP client supports IPv4 and IPv6 addresses.
DHCP client is not supported in High Availability active/active mode.
PAN-OS® Networking Administrator’s Guide Version 11.0 154 ©2023 Palo Alto Networks, Inc.
DHCP
PAN-OS® Networking Administrator’s Guide Version 11.0 155 ©2023 Palo Alto Networks, Inc.
DHCP
DHCPv6 functions differently from DHCPv4 in that the firewall does not receive complete
IPv6 addresses to assign to hosts. The firewall does not know the full IPv6 addresses of the
hosts.
The following example topology has a firewall, a DHCPv6 server north of the firewall, and hosts
on two LANs south of the firewall.
PAN-OS® Networking Administrator’s Guide Version 11.0 156 ©2023 Palo Alto Networks, Inc.
DHCP
The firewall interface that faces the delegating router is a Stateless Address Autoconfiguration
(SLAAC) client. The firewall interface that faces the host is a SLAAC server; the host is a SLAAC
client. The DHCPv6 client allocates a /64 prefix from the prefix pool to the inherited interface.
The firewall configures an IPv6 address on an inherited interface using SLAAC and sends RAs with
the prefix to autoconfigure the host interfaces using SLAAC.
RFC 8415 defines an Identity Association (IA) as a collection of leases assigned to a client. The
DHCPv6 server provides:
• IA_NA (Identity Association for Non-temporary Addresses) and IA_TA (Identity Association for
Temporary Addresses) for the firewall to assign to interfaces that face the delegating router
and ISP.
• IA_PD (Identity Association for delegated prefixes) for the firewall to assign to a prefix pool;
firewall interfaces that face the hosts inherit the prefix. The firewall selects a prefix from the
pool and distributes it hosts via RA. Hosts receive the prefix and construct their own IPv6
address.
When you configure the firewall interface that is facing the ISP, you configure the interface type
to be DHCPv6 Client. The firewall requests a Non-Temporary address or a Temporary address (or
both) for its interface. The firewall supports only one DHCPv6 server per interface. You can have
more than one interface, each facing a different ISP so that if a connection to one ISP goes down,
you have access to another ISP.
You configure prefix delegation on the interface that is facing the ISP because this is the interface
that faces the DHCPv6 server, which provides the prefix. If you have more than one interface
facing an ISP, use the Preference to control which ISP provides the delegated prefix to hosts.
PAN-OS® Networking Administrator’s Guide Version 11.0 157 ©2023 Palo Alto Networks, Inc.
DHCP
If the firewall is the end consumer of IPv6 traffic and does not have a connected LAN, the
firewall can simply be a DHCPv6 client and no prefix delegation is necessary.
If you enabled Advanced Routing, the Layer 3 interface you configure is assigned to a logical
router.
PAN-OS® Networking Administrator’s Guide Version 11.0 158 ©2023 Palo Alto Networks, Inc.
DHCP
DHCP Messages
DHCP uses eight standard message types, which are identified by an option type number in
the DHCP message. For example, when a client wants to find a DHCP server, it broadcasts a
DHCPDISCOVER message on its local physical subnetwork. If there is no DHCP server on its
subnet and if DHCP Helper or DHCP Relay is configured properly, the message is forwarded to
DHCP servers on a different physical subnet. Otherwise, the message will go no further than
the subnet on which it originated. One or more DHCP servers will respond with a DHCPOFFER
message that contains an available network address and other configuration parameters.
When the client needs an IP address, it sends a DHCPREQUEST to one or more servers. Of
course if the client is requesting an IP address, it doesn’t have one yet, so RFC 2131 requires that
the broadcast message the client sends out have a source address of 0 in its IP header.
When a client requests configuration parameters from a server, it might receive responses from
more than one server. Once a client has received its IP address, it is said that the client has at least
an IP address and possibly other configuration parameters bound to it. DHCP servers manage such
binding of configuration parameters to clients.
The following table lists the DHCP messages.
PAN-OS® Networking Administrator’s Guide Version 11.0 159 ©2023 Palo Alto Networks, Inc.
DHCP
DHCPRELEASE Client to server message giving up the user of the network address
and canceling the remaining time on the lease.
PAN-OS® Networking Administrator’s Guide Version 11.0 160 ©2023 Palo Alto Networks, Inc.
DHCP
DHCP Addressing
• DHCP Address Allocation Methods
• DHCP Leases
DHCP Leases
A lease is defined as the time period for which a DHCP server allocates a network address to a
client. The lease might be extended (renewed) upon subsequent requests. If the client no longer
needs the address, it can release the address back to the server before the lease is up. The server
is then free to assign that address to a different client if it has run out of unassigned addresses.
PAN-OS® Networking Administrator’s Guide Version 11.0 161 ©2023 Palo Alto Networks, Inc.
DHCP
The lease period configured for a DHCP server applies to all of the addresses that a single
DHCP server (interface) dynamically assigns to its clients. That is, all of that interface’s addresses
assigned dynamically are of Unlimited duration or have the same Timeout value. A different
DHCP server configured on the firewall may have a different lease term for its clients. A Reserved
Address is a static address allocation and is not subject to the lease terms.
Per the DHCP standard, RFC 2131, a DHCP client does not wait for its lease to expire, because it
risks getting a new address assigned to it. Instead, when a DHCP client reaches the halfway point
of its lease period, it attempts to extend its lease so that it retains the same IP address. Thus, the
lease duration is like a sliding window.
Typically if an IP address was assigned to a device, the device was subsequently taken off the
network and its lease was not extended, the DHCP server will let that lease run out. Because the
client is gone from the network and no longer needs the address, the lease duration in the server
is reached and the lease is in “Expired” state.
The firewall has a hold timer that prevents the expired IP address from being reassigned
immediately. This behavior temporarily reserves the address for the device in case it comes back
onto the network. But if the address pool runs out of addresses, the server re-allocates this
expired address before the hold timer expires. Expired addresses are cleared automatically as the
systems needs more addresses or when the hold timer releases them.
In the CLI, use the show dhcp server lease operational command to view lease information
about the allocated IP addresses. If you don’t want to wait for expired leases to be released
automatically, you can use the clear dhcp lease interface <interface> expired-
only command to clear expired leases, making those addresses available in the pool again. You
can use the clear dhcp lease interface <interface> ip <ip_address> command
to release a particular IP address. Use the clear dhcp lease interface <interface>
mac <mac_address> command to release a particular MAC address.
PAN-OS® Networking Administrator’s Guide Version 11.0 162 ©2023 Palo Alto Networks, Inc.
DHCP
DHCP Options
The history of DHCP and DHCP options traces back to the Bootstrap Protocol (BOOTP). BOOTP
was used by a host to configure itself dynamically during its booting procedure. A host could
receive an IP address and a file from which to download a boot program from a server, along with
the server’s address and the address of an Internet gateway.
Included in the BOOTP packet was a vendor information field, which could contain a number of
tagged fields containing various types of information, such as the subnet mask, the BOOTP file
size, and many other values. RFC 1497 describes the BOOTP Vendor Information Extensions.
DHCP replaces BOOTP; BOOTP is not supported on the firewall.
These extensions eventually expanded with the use of DHCP and DHCP host configuration
parameters, also known as options. Similar to vendor extensions, DHCP options are tagged data
items that provide information to a DHCP client. The options are sent in a variable-length field at
the end of a DHCP message. For example, the DHCP Message Type is option 53, and a value of 1
indicates the DHCPDISCOVER message. DHCP options are defined in RFC 2132, DHCP Options
and BOOTP Vendor Extensions.
A DHCP client can negotiate with the server, limiting the server to send only those options that
the client requests.
• Predefined DHCP Options
• Multiple Values for a DHCP Option
• DHCP Options 43, 55, and 60 and Other Customized Options
51 Lease duration
3 Gateway
PAN-OS® Networking Administrator’s Guide Version 11.0 163 ©2023 Palo Alto Networks, Inc.
DHCP
15 DNS suffix
As mentioned, you can also configure vendor-specific and customized options, which support
a wide variety of office equipment, such as IP phones and wireless infrastructure devices. Each
option code supports multiple values, which can be IP address, ASCII, or hexadecimal format.
With the firewall enhanced DCHP option support, branch offices do not need to purchase and
manage their own DHCP servers in order to provide vendor-specific and customized options to
DHCP clients.
PAN-OS® Networking Administrator’s Guide Version 11.0 164 ©2023 Palo Alto Networks, Inc.
DHCP
43 Vendor Specific Sent from server to client. Vendor-specific information that the
Information DHCP server has been configured to offer to the client. The
information is sent to the client only if the server has a Vendor
Class Identifier (VCI) in its table that matches the VCI in the
client’s DHCPREQUEST.
An Option 43 packet can contain multiple vendor-specific
pieces of information. It can also include encapsulated, vendor-
specific extensions of data.
60 Vendor Class Sent from client to server. Vendor type and configuration
Identifier (VCI) of a DHCP client. The DHCP client sends option code 60
in a DHCPREQUEST to the DHCP server. When the server
receives option 60, it sees the VCI, finds the matching VCI
in its own table, and then it returns option 43 with the value
(that corresponds to the VCI), thereby relaying vendor-specific
information to the correct client. Both the client and server
have knowledge of the VCI.
You can send custom, vendor-specific option codes that are not defined in RFC 2132. The option
codes can be in the range 1-254 and of fixed or variable length.
Custom DHCP options are not validated by the DHCP Server; you must ensure that you
enter correct values for the options you create.
For ASCII and hexadecimal DHCP option types, the option value can be a maximum of 255 octets.
PAN-OS® Networking Administrator’s Guide Version 11.0 165 ©2023 Palo Alto Networks, Inc.
DHCP
If the ping receives a response, that means a different device already has that
address, so it is not available. The server assigns the next address from the pool
instead. This behavior is similar to Optimistic Duplicate Address Detection
(DAD)forIPv6,RFC 4429.
After you set options and return to the DHCP server tab, the Probe IP column
for the interface indicates if Ping IP when allocating new IP was selected.
PAN-OS® Networking Administrator’s Guide Version 11.0 166 ©2023 Palo Alto Networks, Inc.
DHCP
STEP 2 | Configure the predefined DHCP Options that the server sends to its clients.
• In the Options section, select a Lease type:
• Unlimited causes the server to dynamically choose IP addresses from the IP Pools and
assign them permanently to clients.
• Timeout determines how long the lease will last. Enter the number of Days and Hours, and
optionally the number of Minutes.
• Inheritance Source—Leave None or select a source DHCP client interface or PPPoE client
interface to propagate various server settings into the DHCP server. If you specify an
Inheritance Source, select one or more options below that you want inherited from this
source.
Specifying an inheritance source allows the firewall to quickly add DHCP options from the
upstream server received by the DHCP client. It also keeps the client options updated if the
source changes an option. For example, if the source replaces its NTP server (which had been
identified as the Primary NTP server), the client will automatically inherit the new address as
its Primary NTP server.
When inheriting DHCP option(s) that contain multiple IP addresses, the firewall uses
only the first IP address contained in the option to conserve cache memory. If you
require multiple IP addresses for a single option, configure the DHCP options directly
on that firewall rather than configure inheritance.
• Check inheritance source status—If you selected an Inheritance Source, clicking this link
opens the Dynamic IP Interface Status window, which displays the options that were
inherited from the DHCP client.
• Gateway—IP address of the network gateway (an interface on the firewall) that is used to
reach any device not on the same LAN as this DHCP server.
• Subnet Mask—Network mask used with the addresses in the IP Pools.
For the following fields, click the down arrow and select None, or inherited, or enter a remote
server’s IP address that your DHCP server will send to clients for accessing that service. If you
select inherited, the DHCP server inherits the values from the source DHCP client specified as
the Inheritance Source.
• Primary DNS, Secondary DNS—IP address of the preferred and alternate Domain Name
System (DNS) servers.
• Primary WINS, Secondary WINS—IP address of the preferred and alternate Windows
Internet Naming Service (WINS) servers.
• Primary NIS, Secondary NIS—IP address of the preferred and alternate Network
Information Service (NIS) servers.
• Primary NTP, Secondary NTP—IP address of the available Network Time Protocol servers.
• POP3 Server—IP address of Post Office Protocol (POP3) server.
• SMTP Server—IP address of a Simple Mail Transfer Protocol (SMTP) server.
• DNS Suffix—Suffix for the client to use locally when an unqualified hostname is entered
that it cannot resolve.
PAN-OS® Networking Administrator’s Guide Version 11.0 167 ©2023 Palo Alto Networks, Inc.
DHCP
STEP 3 | (Optional) Configure a vendor-specific or custom DHCP option that the DHCP server sends
to its clients.
1. In the Custom DHCP Options section, Add a descriptive Name to identify the DHCP
option.
2. Enter the Option Code you want to configure the server to offer (range is 1-254). (See
RFC 2132 for option codes.)
3. If the Option Code is 43, the Vendor Class Identifier field appears. Enter a VCI, which is
a string or hexadecimal value (with 0x prefix) used as a match against a value that comes
from the client Request containing option 60. The server looks up the incoming VCI in its
table, finds it, and returns Option 43 and the corresponding option value.
4. Inherit from DHCP server inheritance source—Select it only if you specified an
Inheritance Source for the DHCP Server predefined options and you want the vendor-
specific and custom options also to be inherited from this source.
5. Check inheritance source status—If you selected an Inheritance Source, clicking this link
opens Dynamic IP Interface Status, which displays the options that were inherited from
the DHCP client.
6. If you did not select Inherit from DHCP server inheritance source, select an Option
Type: IP Address, ASCII, or Hexadecimal. Hexadecimal values must start with the 0x
prefix.
7. Enter the Option Value you want the DHCP server to offer for that Option Code. You
can enter multiple values on separate lines.
8. Click OK.
PAN-OS® Networking Administrator’s Guide Version 11.0 168 ©2023 Palo Alto Networks, Inc.
DHCP
STEP 5 | Identify the stateful pool of IP addresses from which the DHCP server chooses an address
and assigns it to a DHCP client.
If you are not the network administrator for your network, ask the network
administrator for a valid pool of IP addresses from the network plan that can be
designated to be assigned by your DHCP server.
1. In the IP Pools field, Add the range of IP addresses from which this server assigns an
address to a client. Enter an IP subnet and subnet mask (for example, 192.168.1.0/24) or
a range of IP addresses (for example, 192.168.1.10-192.168.1.20).
• An IP Pool or a Reserved Address is mandatory for dynamic IP address assignment.
• An IP Pool is optional for static IP address assignment as long as the static IP
addresses that you assign fall into the subnet that the firewall interface services.
2. (Optional) Repeat this step to specify another IP address pool.
STEP 6 | (Optional) Specify an IP address from the IP pools that will not be assigned dynamically. If
you also specify a MAC Address, the Reserved Address is assigned to that device when the
device requests an IP address through DHCP.
PAN-OS® Networking Administrator’s Guide Version 11.0 169 ©2023 Palo Alto Networks, Inc.
DHCP
PAN-OS® Networking Administrator’s Guide Version 11.0 170 ©2023 Palo Alto Networks, Inc.
DHCP
characters, including uppercase and lowercase letters, numbers, period (.), hyphen (-), and
underscore (_).
7. (Optional) Enter a Default Route Metric (priority level) for the route between the firewall
and the DHCP server (range is 1 to 65,535; default is 10). A route with a lower number
has higher priority during route selection. For example, a route with a metric of 10 is
used before a route with a metric of 100.
The Default Route Metric for the route between the firewall and the DHCP
server is 10 by default. If the static default route 0.0.0.0/0 uses the DHCP
interface as its egress interface, that route’s default Metric is also 10. Therefore,
there are two routes with a metric of 10 and the firewall can randomly choose
one of the routes one time and the other route another time.
Suppose you enable the option to Automatically create default route pointing
to default gateway provided by server, select a virtual router, add a static
route for a Layer 3 interface, change the Metric (which defaults to 10) to a
value greater than 10 (for this example, 100) and Commit your changes. In
the route table, the route’s metric will not indicate 100. Instead, it will indicate
the default value of 10, as expected, because 10 takes precedence over the
configured value of 100. However, if you change the static route’s Metric to a
value less than 10 (such as 6), the route in the route table is updated to indicate
the configured metric of 6.
8. (Optional) Enable the option to Show DHCP Client Runtime Info to see all of the settings
the client inherited from its DHCP server.
STEP 3 | (Optional) See which interfaces on the firewall are configured as DHCP clients.
1. Select Network > Interfaces > Ethernet and check the IP Address to see which
interfaces indicate DHCP Client.
2. Select Network > Interfaces > VLAN and check the IP Address to see which interfaces
indicate DHCP Client.
PAN-OS® Networking Administrator’s Guide Version 11.0 171 ©2023 Palo Alto Networks, Inc.
DHCP
STEP 4 | For Interface ID, enter the EUI-64 (default 64-bit Extended Unique Identifier) in
hexadecimal format (for example, 00:26:08:FF:FE:DE:4E:29). If you leave this field blank, the
firewall uses the EUI-64 generated from the MAC address of the physical interface.
PAN-OS® Networking Administrator’s Guide Version 11.0 172 ©2023 Palo Alto Networks, Inc.
DHCP
STEP 5 | Configure the interface that faces the ISP to be a DHCPv6 client and request its leased,
temporary IPv6 address and/or non-temporary IPv6 address.
1. For Type, select DHCPv6 Client.
2. Select Address Assignment and Accept Router Advertised Route to allow the DHCPv6
Client to accept the Router Advertisement.
3. Enter a Default Route Metric for the route from the interface to the ISP; range is 1 to
65,535; default is 10.
4. Select Preference of the DHCPv6 client interface (low, medium or high) so that, in
the event you have two interfaces (each connected to a different ISP for redundancy),
you can assign the interface to one ISP a higher preference than the interface to the
other ISP. The ISP connected to the preferred interface will be the ISP that provides
the delegated prefix to send to a host-facing interface. If the interfaces have the same
PAN-OS® Networking Administrator’s Guide Version 11.0 173 ©2023 Palo Alto Networks, Inc.
DHCP
preference, both ISPs provide a delegated prefix and the host decides which prefix to
use.
5. Select DHCPv6 Options and Enable IPv6 Address.
6. In the Request Address Type area, select Non-Temporary Address (default setting). This
address type has a longer lifespan.
7. Select Temporary Address for a greater level of security because the address is intended
to be used for a short period of time.
PAN-OS® Networking Administrator’s Guide Version 11.0 174 ©2023 Palo Alto Networks, Inc.
DHCP
interface). Enabling prefix delegation on this interface controls which ISP provides the
prefix.
The delegated prefix is used on the host-facing interface, and its IPv6 address
is constructed with the MAC address and EUI-64 input. In our example, the
inherited interface receives the inherited prefix displayed in the step to view
DHCPv6 information.
10. Select DHCP Prefix Length Hint to enable the firewall to send a preferred DHCPv6
prefix length to the DHCPv6 server.
11. Enter the preferred DHCP Prefix Length (bits) in the range from 48 to 64, which is
sent as the hint to the DHCPv6 server. The DHCPv6 server has the discretion to send
whatever prefix length it chooses.
Requesting a prefix length of 48, for example, leaves 16 bits remaining for
subnets (64-48), which indicates you require many subdivisions of that prefix
to delegate. On the other hand, requesting a prefix length of 63 leaves 1 bit for
delegating only two subnets. Of the 128 bits, there are still 64 more bits for host
address.
The interface can receive a /48 prefix, but delegate a /64 prefix, for example,
which means the firewall is subdividing the prefix it delegates.
12. Enter a Prefix Pool Name for the pool where the firewall stores the received prefix. The
name must be unique and contain a maximum of 63 alphanumeric characters, hyphens,
periods, and underscores.
Use a prefix pool name that reflects the ISP for easy recognition.
PAN-OS® Networking Administrator’s Guide Version 11.0 175 ©2023 Palo Alto Networks, Inc.
DHCP
PAN-OS® Networking Administrator’s Guide Version 11.0 176 ©2023 Palo Alto Networks, Inc.
DHCP
Recursive Name Server to resolve domain names. The Lifetime range is 4 to 3,600;
default is 1,200.
PAN-OS® Networking Administrator’s Guide Version 11.0 177 ©2023 Palo Alto Networks, Inc.
DHCP
STEP 9 | Configure a host-facing interface to inherit the IPv6 prefix and advertise allocated /64
prefixes from the pool to the hosts.
1. Select Network > Interfaces > Ethernet or select Network > Interfaces > Ethernet and
select an AE interface, or select Network > Interfaces > VLAN.
2. Select a Layer 3 interface.
3. Select IPv6.
4. Enable IPv6 on the interface.
5. For Type, select Inherited.
6. Select Address Assignment and Add an address by entering a Name. The name can be a
maximum of 63 alphanumeric characters, hyphens, periods, and underscores.
PAN-OS® Networking Administrator’s Guide Version 11.0 178 ©2023 Palo Alto Networks, Inc.
DHCP
• ULA—Unique Local Address is a private address in the address range fc00::/7 for
connectivity within a private network. Select ULA if there is no DHCPv6 server. The
DHCPv6 server has the discretion to send whatever prefix length it chooses.
If you received a /64 prefix from the DHCPv6 server, do not select Dynamic
with Identifier.
If you are applying Dynamic with Identifier to more than one address, assign
the lowest Identifier value to the first address, and a higher Identifier value to
each subsequent address you configure.
11. (ULA only) Enter an Address.
12. (ULA only) Select Use interface ID as host portion to use the interface ID as the host
portion of the IPv6 address.
13. (ULA only) Select Anycast to make the IPv6 address an Anycast address, which means
multiple locations can advertise the same prefix, and IPv6 sends the Anycast traffic to
the node it considers the nearest, based on routing protocol costs and other factors.
14. Select Send Router Advertisement to send RAs from the inherited interface to the LAN
hosts.
15. If you chose ULA, enter a Valid Lifetime and Preferred Lifetime.
16. Select On-Link if systems that have addresses within the prefix are reachable without a
router.
17. Select Autonomous if systems can independently create an IPv6 address by combining
the advertised prefix with an Interface ID.
18. Click OK to save address assignment.
PAN-OS® Networking Administrator’s Guide Version 11.0 179 ©2023 Palo Alto Networks, Inc.
DHCP
2. Enable Duplicate Address Detection (DAD) if you want such detection (enabled by
default).
3. If you selected Enable Duplicate Address Detection, specify the number of DAD
Attempts within the neighbor solicitation (NS) interval before the attempt to identify
neighbors fails; range is 1 to 10; default is 1.
4. Enter the Reachable Time (sec) that the client will use to assume a neighbor is reachable
after receiving a Reachability Confirmation message; range is 10 to 36,000; default is 30.
5. Enter the NS Interval (sec), which is the length of time between Neighbor Solicitation
requests; range is 1 to 3,600; default is 1.
6. Enable NDP Monitoring to enable Neighbor Discovery Protocol monitoring. When
enabled, you can select the NDP icon ( in the Features column) and view
information such as the IPv6 address of a neighbor the firewall has discovered, the
corresponding MAC address, User-ID, and status (on a best-case basis).
PAN-OS® Networking Administrator’s Guide Version 11.0 180 ©2023 Palo Alto Networks, Inc.
DHCP
STEP 11 | For Inherited interface, configure Router Advertisement so that this interface can send
RAs to the hosts advertising the prefix that the hosts can use to construct their own IPv6
address.
1. Select Router Advertisement and Enable Router Advertisement so this interface can
reply to Router Solicitations from the hosts by sending RAs to hosts (default is enabled).
The following 11 fields all pertain to the RA.
2. Set the Min Interval (sec), the minimum interval, in seconds, between RAs the firewall
sends (range is 3 to 1,350; default is 200). The firewall sends RAs at random intervals
between the minimum and maximum values you set.
3. Set Max Interval (sec), the maximum interval, in seconds between RAs the firewall sends
(range is 4 to 1,800; default is 600). The firewall sends RAs at random intervals between
the minimum and maximum values you set.
4. Set Hop Limit to apply to clients for outgoing packets (range is 1 to 255; default is 64).
Select unspecified to use the system default.
5. Set Link MTU, the link maximum transmission unit (MTU) to apply to clients (range is
1,280 to 9,216; default is unspecified, which means the system default.
6. Set Reachable Time (ms), in milliseconds, that the client will use to assume a neighbor is
reachable after receiving a Reachability Confirmation message (range is 0 to 3,600,000;
default is unspecified).
7. Set Retrans Timer (ms), the retransmission timer that determines how long the client
will wait, in milliseconds, before retransmitting Neighbor Solicitation messages.
Select unspecified for no retransmission time (range is 0 to 4,294,967,295; default is
unspecified).
8. Set Lifetime (sec) to specify how long, in seconds, the client will use the firewall as the
default gateway (range is 0 to 9,000; default is 1,800). Zero specifies that the firewall is
not the default gateway. When the lifetime expires, the client removes the firewall entry
from its Default Router List and uses another router as the default gateway.
9. Set Router Preference in case there are two or more inherited interfaces on different
routers sending RAs to a host. High, Medium, or Low is the priority that the RA
PAN-OS® Networking Administrator’s Guide Version 11.0 181 ©2023 Palo Alto Networks, Inc.
DHCP
advertises indicating the relative priority and the host uses the prefix from the higher
prioritized router.
10. Select Managed Configuration to indicate to the client that addresses are available via
DHCPv6.
11. Select Other Configuration to indicate to the client that other address information (such
as DNS-related settings) is available via DHCPv6.
12. Select Consistency Check to have the firewall verify that RAs sent from other routers
are advertising consistent information on the link. The firewall logs any inconsistencies.
• Manual—To manually configure the DNS Recursive Name Server. Add an IPv6
address of the Server, for example, 2001:4860:4860:0:0:0:8888. Enter a Lifetime
for the server; the range is any value equal to or between the Max Interval (that
PAN-OS® Networking Administrator’s Guide Version 11.0 182 ©2023 Palo Alto Networks, Inc.
DHCP
you configured on the Router Advertisement tab) and two times that Max Interval.
Default is 1200 seconds.
STEP 14 | Commit.
PAN-OS® Networking Administrator’s Guide Version 11.0 183 ©2023 Palo Alto Networks, Inc.
DHCP
Alternatively, you could select the interface and then select Show DHCPv6
Client Runtime Info.
3. View the information.
• In the following example, the middle section shows that the interface facing the ISP
received a Non-Temporary address and a Temporary address for itself. The Remaining
Lease Time applies to both addresses.
• The Prefix Delegation section shows that the interface also received a Prefix that the
host-facing Inherited interface can advertise in RAs to the hosts.
4. Select Show Prefix Pool Assignment to view for each host-facing Inherited Interface:
the Inherited Prefix (prefix that the interface is distributing to hosts), the Assigned IPv6
PAN-OS® Networking Administrator’s Guide Version 11.0 184 ©2023 Palo Alto Networks, Inc.
DHCP
Address of the inherited interface itself (based on the prefix and constructed from the
MAC address), the Router Preference, and the State of the interface.
The DHCPv6 Client requested a prefix length of /48 from the server and
received it, but then divided that prefix into /64 prefixes and delegated them to
the Inherited interfaces. The inherited interfaces advertise the /64 prefixes to
the hosts.
5. Select Show Prefix Pools to see the prefix pools created.
PAN-OS® Networking Administrator’s Guide Version 11.0 185 ©2023 Palo Alto Networks, Inc.
DHCP
STEP 16 | Renew a DHCPv6 lease with the DHCPv6 server (regardless of the lease term) if you want to
renew sooner than the automatic renewal that the firewall requests.
1. Select Network > Interfaces > Ethernet or VLAN or AE Group.
2. In the row of your configured interface, select the Dynamic-DHCP Client link in the IP
Address column.
3. Select Renew from the DHCPv6 Client Runtime Info screen.
STEP 17 | Release the following DHCP options that came from the DHCPv6 server if you no longer
need the options before the lifetime expires.
• Prefix
• IPv6 Address (Non-Temporary)
• IPv6 Address (Temporary)
• Remaining Lease Time
• Gateway
• DNS Server
• DNS Suffix
A release frees the IP address, which drops your network connection and renders the
firewall unmanageable if no other interface is configured for management access.
PAN-OS® Networking Administrator’s Guide Version 11.0 186 ©2023 Palo Alto Networks, Inc.
DHCP
If you configure the management interface as a DHCP client, the following restrictions apply:
• You cannot use the management interface in an HA configuration for control link (HA1 or HA1
backup), data link (HA2 or HA2 backup), or packet forwarding (HA3) communication.
• You cannot select MGT as the Source Interface when you customize service routes (Device >
Setup > Services > Service Route Configuration > Customize). However, you can select Use
default to route the packets via the management interface.
• You cannot use the dynamic IP address of the management interface to connect to a Hardware
Security Module (HSM). The IP address on the HSM client firewall must be a static IP address
because HSM authenticates the firewall using the IP address, and operations on HSM would
stop working if the IP address were to change during runtime.
A prerequisite for this task is that the management interface must be able to reach a DHCP
server.
PAN-OS® Networking Administrator’s Guide Version 11.0 187 ©2023 Palo Alto Networks, Inc.
DHCP
STEP 1 | Configure the Management interface as a DHCP client so that it can receive its IP address
(IPv4), netmask (IPv4), and default gateway from a DHCP server.
Optionally, you can also send the hostname and client identifier of the management interface
to the DHCP server if the orchestration system you use accepts this information.
1. Select Device > Setup > Management and edit Management Interface Settings.
2. For IP Type, select DHCP Client.
3. (Optional) Select one or both options for the firewall to send to the DHCP server in
DHCP Discover or Request messages:
• Send Hostname—Sends the Hostname (as defined in Device > Setup > Management)
as part of DHCP Option 12.
• Send Client ID—Sends the client identifier as part of DHCP Option 61. A client
identifier uniquely identifies a DHCP client, and the DHCP Server uses it to index its
configuration parameter database.
4. Click OK.
STEP 2 | (Optional) Configure the firewall to accept the host name and domain from the DHCP server.
1. Select Device > Setup > Management and edit General Settings.
2. Select one or both options:
• Accept DHCP server provided Hostname—Allows the firewall to accept the
hostname from the DHCP server (if valid). When enabled, the hostname from the
DHCP server overwrites any existing Hostname specified in Device > Setup >
Management. Don’t select this option if you want to manually configure a hostname.
• Accept DHCP server provided Domain—Allows the firewall to accept the domain
from the DHCP Server. The domain (DNS suffix) from the DHCP Server overwrites
any existing Domain specified in Device > Setup > Management. Don’t select this
option if you want to manually configure a domain.
3. Click OK.
STEP 5 | (Optional) Renew the DHCP lease with the DHCP server, regardless of the lease term.
This option is convenient if you are testing or troubleshooting network issues.
1. Select Device > Setup > Management and edit Management Interface Settings.
2. Click Show DHCP Client Runtime Info.
3. Click Renew.
PAN-OS® Networking Administrator’s Guide Version 11.0 188 ©2023 Palo Alto Networks, Inc.
DHCP
STEP 6 | (Optional) Release the following DHCP options that came from the DHCP server:
• IP Address
• Netmask
• Default Gateway
• DNS Server (primary and secondary)
• NTP Server (primary and secondary)
• Domain (DNS Suffix)
A release frees the IP address, which drops your network connection and renders the
firewall unmanageable if no other interface is configured for management access.
PAN-OS® Networking Administrator’s Guide Version 11.0 189 ©2023 Palo Alto Networks, Inc.
DHCP
STEP 2 | Specify the IP address of each DHCP server with which the DHCP relay agent will
communicate.
1. In the Interface field, select the interface you want to be the DHCP relay agent.
2. Select either IPv4 or IPv6, indicating the type of DHCP server address you will specify.
3. If you checked IPv4, in the DHCP Server IP Address field, Add the address of the DHCP
server to and from which you will relay DHCP messages.
4. If you checked IPv6, in the DHCP Server IPv6 Address field, Add the address of the
DHCP server to and from which you will relay DHCP messages. If you specify a multicast
address, also specify an outgoing Interface.
5. (Optional) Repeat the prior three steps to enter a maximum of eight DHCP server
addresses per IP address family.
PAN-OS® Networking Administrator’s Guide Version 11.0 190 ©2023 Palo Alto Networks, Inc.
DHCP
View DHCP pool statistics, IP address the DHCP server assigned, MAC address, state and
duration of lease, and lease start time.
interface: "ethernet1/2"
Allocated IPs: 1, Total number of IPs in pool: 5. 20.0000% used
ip mac state duration
lease_time
192.168.3.11 f0:2f:af:42:70:cf committed 0 Wed Jul
2 08:10:56 2014
admin@PA-220>
PAN-OS® Networking Administrator’s Guide Version 11.0 191 ©2023 Palo Alto Networks, Inc.
DHCP
Release expired DHCP Leases of an interface (server), such as ethernet1/2, before the hold
timer releases them automatically. Those addresses will be available in the IP pool again.
PAN-OS® Networking Administrator’s Guide Version 11.0 192 ©2023 Palo Alto Networks, Inc.
DNS
Domain Name System (DNS) is a protocol that translates (resolves) a user-friendly
domain name, such as www.paloaltonetworks.com, to an IP address so that users can
access computers, websites, services, or other resources on the internet or private
networks.
> DNS Overview > Configure a Web Proxy
> DNS Proxy Object > Use Case 1: Firewall Requires DNS
> DNS Server Profile Resolution
> Multi-Tenant DNS Deployments > Use Case 2: ISP Tenant Uses DNS
Proxy to Handle DNS Resolution
> Configure a DNS Proxy Object for Security Policies, Reporting, and
> Configure a DNS Server Profile Services within its Virtual System
> Use Case 3: Firewall Acts as DNS
Proxy Between Client and Server
> DNS Proxy Rule and FQDN
Matching
193
DNS
DNS Overview
DNS performs a crucial role in enabling user access to network resources so that users need not
remember IP addresses and individual computers need not store a huge volume of domain names
mapped to IP addresses. DNS employs a client/server model; a DNS server resolves a query for a
DNS client by looking up the domain in its cache and if necessary sending queries to other servers
until it can respond to the client with the corresponding IP address.
The DNS structure of domain names is hierarchical; the top-level domain (TLD) in a domain name
can be a generic TLD (gTLD): com, edu, gov, int, mil, net, or org (gov and mil are for the United
States only) or a country code (ccTLD), such as au (Australia) or us (United States). ccTLDs are
generally reserved for countries and dependent territories.
A fully qualified domain name (FQDN) includes at a minimum a host name, a second-level domain,
and a TLD to completely specify the location of the host in the DNS structure. For example,
www.paloaltonetworks.com is an FQDN.
®
Wherever a Palo Alto Networks firewall uses an FQDN in the user interface or CLI, the firewall
®
must resolve that FQDN using DNS. Depending on where the FQDN query originates, the
firewall determines which DNS settings to use to resolve the query.
A DNS record of an FQDN includes a time-to-live (TTL) value, and by default the firewall
refreshes each FQDN in its cache based on that individual TTL provided the DNS server, as long
as the TTL is greater than or equal to the Minimum FQDN Refresh Time you configure on the
firewall, or the default setting of 30 seconds if you don’t configure a minimum. Refreshing an
FQDN based on its TTL value is especially helpful for securing access to cloud platform services,
which often require frequent FQDN refreshes to ensure highly available services. For example,
cloud environments that support autoscaling depend on FQDN resolutions for dynamically
scaling services up and down, and fast resolutions of FQDNs are critical in such time-sensitive
environments.
By configuring a minimum FQDN refresh time, you limit how small a TTL value the firewall
honors. If your IP addresses don’t change very often you may want to set a higher Minimum
FQDN Refresh Time so that the firewall doesn’t refresh entries unnecessarily. The firewall uses
the higher of the DNS TTL time and the configured Minimum FQDN Refresh Time.
For example, two FQDNs have the following TTL values. The Minimum FQDN Refresh Time
overrides smaller (faster) TTL values.
FQDN A 20 26
FQDN B 30 30
The FQDN refresh timer starts when the firewall receives a DNS response from the DNS server
or DNS proxy object that is resolving the FQDN.
Additionally, you can set a stale timeout to configure how long the firewall continues to use stale
(expired) FQDN resolutions in the event of an unreachable DNS Server. At the end of the stale
PAN-OS® Networking Administrator’s Guide Version 11.0 194 ©2023 Palo Alto Networks, Inc.
DNS
timeout period, if the DNS server is still unreachable, the stale FQDN entries become unresolved
(the firewall removes stale FQDN entries).
The following firewall tasks are related to DNS:
• Configure your firewall with at least one DNS server so it can resolve hostnames. Configure
primary and secondary DNS servers or a DNS Proxy object that specifies such servers, as
shown in Use Case 1: Firewall Requires DNS Resolution.
• Customize how the firewall handles DNS resolution initiated by Security policy rules, reporting,
and management services (such as email, Kerberos, SNMP, syslog, and more) for each virtual
system, as shown in Use Case 2: ISP Tenant Uses DNS Proxy to Handle DNS Resolution for
Security Policies, Reporting, and Services within its Virtual System.
• Configure the firewall to act as a DNS server for a client, as shown in Use Case 3: Firewall Acts
as DNS Proxy Between Client and Server.
• Configure an Anti-Spyware profile to Use DNS Queries to Identify Infected Hosts on the
Network.
• Enable Evasion Signatures and then enable evasion signatures for threat prevention.
• Configure an Interface as a DHCP Server. This enables the firewall to act as a DHCP Server
and sends DNS information to its DHCP clients so the provisioned DHCP clients can reach
their respective DNS servers.
PAN-OS® Networking Administrator’s Guide Version 11.0 195 ©2023 Palo Alto Networks, Inc.
DNS
When configuring multiple tenants (ISP subscribers) with DNS services, each tenant
should have its own DNS proxy defined, which keeps the tenant’s DNS service separate
from other tenants’ services.
In the proxy object, you specify the interfaces for which the firewall is acting as DNS proxy. The
DNS proxy for the interface does not use the service route; responses to the DNS requests are
always sent to the interface assigned to the virtual router where the DNS request arrived.
When you Configure a DNS Proxy Object, you can supply the DNS proxy with static FQDN-to-
address mappings. You can also create DNS proxy rules that control to which DNS server the
domain name queries (that match the proxy rules) are directed. You can configure a maximum of
256 DNS proxy objects on a firewall. You must enable Cache and Cache EDNS Responses (under
Network > DNS Proxy > Advanced) if this DNS proxy object is assigned to Device > Setup >
Services > DNS or Device > Virtual Systems > vsys > General > DNS Proxy. Furthermore, if this
DNS proxy object has DNS proxy rules configured, those rules also need to have cache enabled
(Turn on caching of domains resolved by this mapping).
When the firewall receives an FQDN query (and the domain name is not in the DNS proxy cache),
the firewall compares the domain name from the FQDN query to the domain names in DNS Proxy
rules of the DNS Proxy object. If you specify multiple domain names in a single DNS Proxy rule, a
query that matches any one of the domain names in the rule means the query matches the rule.
DNS Proxy Rule and FQDN Matching describes how the firewall determines whether an FQDN
matches a domain name in a DNS proxy rule. A DNS query that matches a rule is sent to the
primary DNS server configured for the proxy object to be resolved.
PAN-OS® Networking Administrator’s Guide Version 11.0 196 ©2023 Palo Alto Networks, Inc.
DNS
PAN-OS® Networking Administrator’s Guide Version 11.0 197 ©2023 Palo Alto Networks, Inc.
DNS
PAN-OS® Networking Administrator’s Guide Version 11.0 198 ©2023 Palo Alto Networks, Inc.
DNS
PAN-OS® Networking Administrator’s Guide Version 11.0 199 ©2023 Palo Alto Networks, Inc.
DNS
When the firewall is enabled to act as a DNS proxy, evasion signatures that detected
crafted HTTP or TLS requests can alert to instances where a client connects to a domain
other than the domains specified in the original DNS query. As a best practice, Enable
Evasion Signatures after configuring DNS proxy to trigger an alert if crafted requests are
detected.
PAN-OS® Networking Administrator’s Guide Version 11.0 200 ©2023 Palo Alto Networks, Inc.
DNS
sent to one of the following servers to be resolved (depending on what you configured in
the prior step):
• The Primary or Secondary DNS Server directly specified for this proxy object.
• The Primary or Secondary DNS Server specified in the DNS Server profile for this
proxy object.
DNS Proxy Rule and FQDN Matching describes how the firewall matches domain names
in an FQDN to a DNS proxy rule. If no match is found, default DNS servers resolve the
query.
4. Do one of the following, depending on what you set the Location to:
• If you chose a virtual system, select a DNS Server profile.
• If you chose Shared, enter a Primary and optionally a Secondary address.
5. Click OK.
STEP 3 | (Optional) Supply the DNS Proxy with static FQDN-to-address entries. Static DNS entries
allow the firewall to resolve the FQDN to an IP address without sending a query to the DNS
server.
1. On the Static Entries tab, Add a Name.
2. Enter the Fully Qualified Domain Name (FQDN).
3. For Address, Add the IP address to which the FQDN should be mapped.
You can provide additional IP addresses for an entry. The firewall will provide all of the
IP addresses in its DNS response and the client chooses which address to use.
4. Click OK.
STEP 4 | Enable caching and configure other advanced settings for the DNS Proxy.
1. On the Advanced tab, select TCP Queries to enable DNS queries using TCP.
• Max Pending Requests—Enter the maximum number of concurrent, pending TCP
DNS requests that the firewall will support (range is 64-256; default is 64).
2. For UDP Queries Retries, enter:
• Interval (sec)—The length of time (in seconds) after which another request is sent if no
response has been received (range is 1 to 30; default is 2).
• Attempts—The maximum number of UDP query attempts (excluding the first attempt)
after which the next DNS server is queried (range is 1 to 30; default is 5.)
3. Select Cache to enable the firewall to cache FQDN-to-address mappings that it learns.
You must enable Cache (enabled by default) if this DNS proxy object is used for queries
that the firewall generates (that is, under Device > Setup > Services > DNS, or under
Device > Virtual Systems and you select a virtual system and General > DNS Proxy.
• Select Enable TTL to limit the length of time the firewall caches DNS resolution
entries for the proxy object. Disabled by default.
• Enter Time to Live (sec), the number of seconds after which all cached entries for
the proxy object are removed. After the entries are removed, new DNS requests
PAN-OS® Networking Administrator’s Guide Version 11.0 201 ©2023 Palo Alto Networks, Inc.
DNS
must be resolved and cached again. Range is 60-86,400. There is no default TTL;
entries remain until the firewall runs out of cache memory.
• Cache EDNS Responses—You must enable this setting if this DNS proxy object is
used for queries that the firewall generates (that is, under Device > Setup > Services
> DNS, or under Device > Virtual Systems and you select a virtual system and
General > DNS Proxy.
PAN-OS® Networking Administrator’s Guide Version 11.0 202 ©2023 Palo Alto Networks, Inc.
DNS
Keep in mind that if you specify an FQDN instead of an IP address, the DNS for
that FQDN is resolved in Device > Virtual Systems > DNS Proxy.
5. Specify the IP address of the Secondary DNS server, or leave as inherited if you chose
an Inheritance Source.
STEP 2 | Configure the service route that the firewall automatically uses, based on whether the target
DNS Server has an IP address family type of IPv4 or IPv6.
1. Click Service Route IPv4 to enable the subsequent interface and IPv4 address to be used
as the service route, if the target DNS address is an IPv4 address.
2. Specify the Source Interface to select the DNS server’s source IP address that the
service route will use. The firewall determines which virtual router is assigned that
interface, and then does a route lookup in the virtual router routing table to reach the
destination network (based on the Primary DNS address).
3. Specify the IPv4 Source Address from which packets going to the DNS server are
sourced.
4. Click Service Route IPv6 to enable the subsequent interface and IPv6 address to be used
as the service route, if the target DNS address is an IPv6 address.
5. Specify the Source Interface to select the DNS server’s source IP address that the
service route will use. The firewall determines which virtual router is assigned that
interface, and then does a route lookup in the virtual router routing table to reach the
destination network (based on the Primary DNS address).
6. Specify the IPv6 Source Address from which packets going to the DNS server are
sourced.
7. Click OK.
PAN-OS® Networking Administrator’s Guide Version 11.0 203 ©2023 Palo Alto Networks, Inc.
DNS
To learn how to configure a web proxy, select the type of proxy you want to configure:
• Configure Explicit Proxy
• Configure Transparent Proxy
• Configure Authentication for Explicit Web Proxy
PAN-OS® Networking Administrator’s Guide Version 11.0 204 ©2023 Palo Alto Networks, Inc.
DNS
PAN-OS® Networking Administrator’s Guide Version 11.0 205 ©2023 Palo Alto Networks, Inc.
DNS
STEP 1 | (VM Series only) If you have not already done so, activate the license for web proxy.
You must activate the web proxy license for the PA-1400 Series, PA-3400 Series,
and VM-Series. Learn how to activate your subscription licenses for the PA-1400
Series and PA-3400 Series or activate the web proxy license for the VM-Series in the
following step.
If the license key retrieval is not successful, restart the firewall and repeat this
step before proceeding.
PAN-OS® Networking Administrator’s Guide Version 11.0 206 ©2023 Palo Alto Networks, Inc.
DNS
As a best practice, use Layer 3 (L3) for the three interfaces the web proxy uses and
configure a separate zone for each interface within the same virtual routers and the
same virtual systems.
Be sure to carefully copy the IP address for this interface and save it in a secure
location because you must enter it as the Proxy IP address when you configure
the web proxy.
2. Configure an interface for the outgoing traffic to the internet.
3. Configure a loopback interface for the proxy.
You must configure both a primary and a secondary DNS server for web proxy.
STEP 4 | To enable decryption for MITM detection, create a self-signed root CA certificate or import a
certificate signed by your enterprise certificate authority (CA). For more information, refer to
the best practices for administrative access.
STEP 5 | Ensure you have completed the pre-deployment steps for the authentication method you
want to configure.
• Configure Kerberos Authentication
• Configure SAML Authentication
• Configure Cloud Identity Engine Authentication
PAN-OS® Networking Administrator’s Guide Version 11.0 207 ©2023 Palo Alto Networks, Inc.
DNS
STEP 6 | If you have a DNS security subscription, integrate the web proxy firewall with Explicit Proxy
to sinkhole any requests that match the DNS security categories that you specify.
1. Select Panorama > Cloud Services > Configuration > On-Prem Proxy.
2. Edit the settings then select the Device Group you want the web proxy firewall to use or
Add a new device group.
To integrate the web proxy firewall with Prisma Access, you must configure the
web proxy firewall in a separate device group that contains no other firewalls
or virtual systems. If the firewall is already a member of a device group, create
a child device group as a sub-group and move the firewall to the child device
group.
3. (Optional) Select Block Settings to Add a Blocked Domain or any domains that are
Exempted Domains because they are sinkholed due to matching one or more of the
DNS Security categories.
PAN-OS® Networking Administrator’s Guide Version 11.0 208 ©2023 Palo Alto Networks, Inc.
DNS
4. (Optional) Select whether you want to Log any requests made to blocked domains.
5. Click OK.
PAN-OS® Networking Administrator’s Guide Version 11.0 209 ©2023 Palo Alto Networks, Inc.
DNS
If the only available option is None, verify that you have an active license for the
web proxy feature.
4. Specify the Connect Timeout to define (in seconds) how long the proxy waits for a
response from the web server. If there is no response after the specified amount of time
has elapsed, the proxy closes the connection.
5. Select the Listening Interface that contains the firewall where you want to enable the
web proxy.
6. Select the Upstream Interface that contains the interface with the web proxy that
reroutes the traffic to the server.
If you are using a loopback interface, specify that interface as the Upstream
Interface.
PAN-OS® Networking Administrator’s Guide Version 11.0 210 ©2023 Palo Alto Networks, Inc.
DNS
PAN-OS® Networking Administrator’s Guide Version 11.0 211 ©2023 Palo Alto Networks, Inc.
DNS
STEP 8 | Configure the necessary security policy rules to decrypt traffic and reroute applicable traffic
to the proxy.
You will need to create the following types of rules:
• Source NAT (if applicable)
• Decryption
• Security
1. Configure a decryption policy to decrypt the traffic so it can be rerouted if necessary.
To avoid decrypting traffic twice, select the zone that contains the upstream
interface as the source zone for the decryption policy.
2. (Optional but recommended) Select Objects > Decryption Profile and select Block
sessions on SNI mismatch with Server Certificate (SAN/CN) to automatically deny any
sessions where the Server Name Indication (SNI) does not match the server certificate.
PAN-OS® Networking Administrator’s Guide Version 11.0 212 ©2023 Palo Alto Networks, Inc.
DNS
PAN-OS® Networking Administrator’s Guide Version 11.0 213 ©2023 Palo Alto Networks, Inc.
DNS
STEP 1 | (VM Series only) If you have not already done so, activate the license for web proxy.
This step is required for the PA-1400, PA-3400, and VM Series. The following steps
are for the VM series; for the PA-1400 and PA-3400, follow the steps to activate
subscription licenses.
PAN-OS® Networking Administrator’s Guide Version 11.0 214 ©2023 Palo Alto Networks, Inc.
DNS
If the license key retrieval is not successful, restart the firewall and repeat this
step before proceeding.
As a best practice, use Layer 3 (L3) for all interfaces and configure a separate zone for
each interface within the same virtual routers and the same virtual systems.
All incoming traffic is routed through this interface to the proxy. Be sure to
carefully copy the IP address for this interface and save it in a secure location
because you must enter it as the Proxy IP address when you configure the web
proxy.
You must configure both a primary and a secondary DNS server for web proxy.
STEP 4 | To enable decryption for MITM detection, create a self-signed root CA certificate or import a
certificate signed by your enterprise certificate authority (CA). For more information, refer to
the best practices for administrative access.
PAN-OS® Networking Administrator’s Guide Version 11.0 215 ©2023 Palo Alto Networks, Inc.
DNS
If the only available option is None, verify that you have an active license for the
web proxy feature.
4. Specify the Connect Timeout to define (in seconds) how long the proxy waits for a TCP
response from the web server. If there is no response after the specified amount of time
has elapsed, the proxy closes the connection.
5. Select the Upstream Interface.
The upstream interface must be a loopback interface that is not associated with
any other subnets.
6. Specify the IP address of the loopback interface as the Proxy IP.
Enter the IP address of the interface you configured in Step 2.c.
7. Specify the DNS Proxy object you created in Step 3.a.
PAN-OS® Networking Administrator’s Guide Version 11.0 216 ©2023 Palo Alto Networks, Inc.
DNS
You must configure the DNAT policy rule exactly as described in the following steps for
the firewall to successfully use the web proxy to route traffic. Be sure to configure the
DNAT policy rule so that it precedes the source network address translation (SNAT)
policy rule.
3. Select Original Packet and Add a trusted zone as the Source Zone and the Destination
Zone as the interface that contains the web proxy.
PAN-OS® Networking Administrator’s Guide Version 11.0 217 ©2023 Palo Alto Networks, Inc.
DNS
4. Select Translated Packet and verify that Translation Type for Source Address
Translation is None.
5. Select Dynamic IP (with session distribution) as the Translation Type for the Destination
Address Translation.
6. Enter the IP address of the web proxy as the Translated Address.
Enter the same IP address as the Proxy IP address specified in Step 2.c.
7. Enter 8080 as the Translated Port.
8. Select a Session Distribution Method (for example, Round Robin).
The session distribution method is not applicable for web proxy.
9. Click OK and Commit the changes.
PAN-OS® Networking Administrator’s Guide Version 11.0 218 ©2023 Palo Alto Networks, Inc.
DNS
STEP 7 | Configure a security policy to allow and route the proxy traffic.
1. Configure a source network address translation (SNAT) policy rule after the DNAT rule.
2. Configure a decryption policy to decrypt traffic.
Select the zone that contains the proxy interface as the source zone.
3. (Optional but recommended) Select Objects > Decryption Profile and select Block
sessions on SNI mismatch with Server Certificate (SAN/CN) to automatically deny any
sessions where the Server Name Indication (SNI) does not match the server certificate.
4. Configure policy rules to allow access to the DNS proxy servers for both the client and
the proxy.
5. Configure a policy rule to allow traffic from the client to the proxy.
6. Configure a policy rule to allow traffic from the proxy to the internet.
PAN-OS® Networking Administrator’s Guide Version 11.0 219 ©2023 Palo Alto Networks, Inc.
DNS
STEP 2 | Register the service principal name (SPN) for the proxy FQDN and create a keytab file for
the Kerberos single sign-on (SSO).
The Kerberos keytab principal name must match the hostname that resolves to the proxy
interface IP address.
STEP 3 | On the firewall, create a server profile for the Kerberos server.
STEP 4 | Configure an authentication profile to use Kerberos and import the keytab to the
authentication profile.
STEP 5 | (Optional but recommended) If you use Panorama to manage your firewalls, configure a log
forwarding profile to forward logs to Cortex Data Lake (CDL), Panorama, or both.
By default, the firewall does not forward logs to CDL or Panorama. Forwarding the
logs ensures that the complete authentication log information is available to assist in
troubleshooting any potential authentication issues.
As a best practice, if you are using Panorama to manage the web proxy firewall,
configure any objects the proxy uses in a shared Panorama location and configure the
web proxy firewall in a separate device group that contains no other firewalls or virtual
systems. If the firewall is already a member of a device group, create a child device
group as a sub-group and move the firewall to the child device group.
If you experience issues with the browser challenge when using the Chrome browser,
we recommend using an alternate browser.
STEP 6 | In the Explicit Proxy Configuration (Network > Proxy > Explicit Proxy Configuration), select
Kerberos Single Sign On as the Authentication service type.
PAN-OS® Networking Administrator’s Guide Version 11.0 220 ©2023 Palo Alto Networks, Inc.
DNS
STEP 7 | (Optional but recommended) If you are using a decryption policy for the traffic, select Strip
ALPN to remove the value in the Application-Layer Protocol Negotiation (ALPN).
SAML authentication for explicit web proxy requires Panorama and the Cloud Services
plugin version 3.2.1 (and later versions).
To simplify configuration for SAML-based authentication for the explicit web proxy, the firewall
or Panorama automatically generates the following rules to allow the necessary traffic. If you are
using Panorama, you must select an individual firewall to view the rules.
PAN-OS® Networking Administrator’s Guide Version 11.0 221 ©2023 Palo Alto Networks, Inc.
DNS
• SWG-allow-vpc-dns-rule — Allows traffic from the zone where the web proxy upstream
interface is located to the primary and secondary DNS server addresses for the web proxy.
PAN-OS® Networking Administrator’s Guide Version 11.0 222 ©2023 Palo Alto Networks, Inc.
DNS
PAN-OS® Networking Administrator’s Guide Version 11.0 223 ©2023 Palo Alto Networks, Inc.
DNS
STEP 1 | If you have not already done so, configure Explicit Proxy for mobile users.
This is a typical authentication method for on-premises web proxy authentication and Prisma
Access Explicit Proxy, which requires a license. Prisma Access Explicit Proxy settings for cookie
and timeout values apply to an explicit web proxy configuration as well. You must commit the
changes and push them to the relevant firewalls before continuing.
STEP 2 | If you have not already done so, configure a SAML Authentication profile.
PAN-OS® Networking Administrator’s Guide Version 11.0 224 ©2023 Palo Alto Networks, Inc.
DNS
STEP 3 | (Required for XAU only) If the downstream proxy sends the XAU header, configure a trusted
source address for the downstream proxy.
1. Select Device > User Identification > Trusted Source Address.
2. Edit the settings for the trusted source address to change the status to Enabled.
3. Add any address objects you want to allow X-Authenticated User (XAU).
Explicit web proxy requires an IP address object for the trusted source address.
4. Click OK.
STEP 4 | In the Explicit Proxy Configuration (Network > Proxy > Explicit Proxy Configuration), select
SAML/CAS as the Authentication service type.
STEP 5 | (Optional but recommended) If you are using a decryption policy for the traffic, select Strip
ALPN to remove the value in the Application-Layer Protocol Negotiation (ALPN).
PAN-OS® Networking Administrator’s Guide Version 11.0 225 ©2023 Palo Alto Networks, Inc.
DNS
STEP 6 | Complete the remaining steps to configure the Configure a Web Proxy.
PAN-OS® Networking Administrator’s Guide Version 11.0 226 ©2023 Palo Alto Networks, Inc.
DNS
• SWG-allow-vpc-dns-rule — Allows traffic from the zone where the web proxy upstream
interface is located to the primary and secondary DNS server addresses for the web proxy.
PAN-OS® Networking Administrator’s Guide Version 11.0 227 ©2023 Palo Alto Networks, Inc.
DNS
PAN-OS® Networking Administrator’s Guide Version 11.0 228 ©2023 Palo Alto Networks, Inc.
DNS
STEP 1 | If you have not already done so, configure Explicit Proxy for mobile users.
You must commit the changes and push them to the relevant firewalls before continuing.
STEP 2 | If you have not already done so, configure authentication using the Cloud Identity Engine
and configure a Cloud Identity Engine authentication profile.
PAN-OS® Networking Administrator’s Guide Version 11.0 229 ©2023 Palo Alto Networks, Inc.
DNS
STEP 3 | (Required for XAU only) If the downstream proxy sends the XAU header, configure a trusted
source address for the downstream proxy.
1. Select Device > User Identification > Trusted Source Address.
2. Edit the settings for the trusted source address to change the status to Enabled.
3. Add any address objects you want to allow X-Authenticated User (XAU).
Explicit web proxy requires an IP address object for the trusted source address.
4. Click OK.
STEP 4 | In the Explicit Proxy Configuration (Network > Proxy > Explicit Proxy Configuration), select
SAML/CAS as the Authentication service type.
STEP 5 | (Optional but recommended) Select Strip ALPN to remove the value in the Application-Layer
Protocol Negotiation (ALPN).
PAN-OS® Networking Administrator’s Guide Version 11.0 230 ©2023 Palo Alto Networks, Inc.
DNS
STEP 6 | Complete the remaining steps to configure the Configure a Web Proxy.
PAN-OS® Networking Administrator’s Guide Version 11.0 231 ©2023 Palo Alto Networks, Inc.
DNS
STEP 1 | Configure the primary and secondary DNS servers you want the firewall to use for DNS
resolutions.
You must manually configure at least one DNS server on the firewall or it won’t be able
to resolve hostnames; the firewall cannot use DNS server settings from another source,
such as an ISP.
1. Edit the Services settings (Device > Setup > Services > Global for firewalls that support
multiple virtual systems; Device > Setup > Services for those that don’t).
2. On the Services tab, for DNS, select Servers and enter the Primary DNS Server address
and Secondary DNS Server address.
3. Proceed to Step 3.
PAN-OS® Networking Administrator’s Guide Version 11.0 232 ©2023 Palo Alto Networks, Inc.
DNS
STEP 2 | Alternatively, you can configure a DNS Proxy Object if you want to configure advanced DNS
functions such as split DNS, DNS proxy overrides, DNS proxy rules, static entries, or DNS
inheritance.
1. Edit the Services settings (Device > Setup > Services > Global for firewalls that support
multiple virtual systems; Device > Setup > Services for those that don’t).
2. On the Services tab, for DNS, select DNS Proxy Object.
3. From the DNS Proxy list, select the DNS proxy that you want to use to configure global
DNS services, or select DNS Proxy to configure a new DNS proxy object as follows:
1. Enable and then enter a Name for the DNS proxy object.
2. On firewalls that support multiple virtual systems, for Location, select Shared for
global, firewall-wide DNS proxy services.
Shared DNS proxy objects don’t use DNS server profiles because they don’t
require a specific service route belonging to a tenant virtual system.
3. Enter the Primary DNS server IP address. Optionally enter a Secondary DNS server IP
address.
4. Select the Advanced tab. Ensure that Cache is enabled and Cache EDNS Responses is
enabled (both are enabled by default).
5. Click OK to save the DNS Proxy object.
STEP 3 | (Optional) Set a Minimum FQDN Refresh Time (sec) to limit how frequently the firewall
refreshes FQDN cache entries.
By default, the firewall refreshes each FQDN in its cache based on the individual TTL for the
FQDN in a DNS record, as long as the TTL is greater than or equal to this minimum FQDN
refresh setting (or as long as the TTL is greater than or equal to the default setting of 30
seconds if you don’t configure a minimum FQDN refresh time). To set a minimum FQDN
refresh time, enter a value in seconds (range is 0 to 14,400; default is 30). A setting of 0 means
the firewall refreshes FQDNs based on the TTL value in the DNS records; the firewall doesn’t
enforce a minimum FQDN refresh time. The firewall uses the higher of the DNS TTL time and
the minimum FQDN refresh time.
If the TTL for the FQDN in DNS is short, but your FQDN resolutions don’t change
as frequently as the TTL timeframe so don’t need a faster refresh, you should set a
Minimum FQDN Refresh Time to avoid making FQDN refresh attempts more often
than necessary.
STEP 4 | (Optional) Specify an FQDN Stale Entry Timeout (min), which is the number of minutes that
the firewall continues to use stale FQDN resolutions in the event of an unreachable DNS
server (range is 0 to 10,080; default is 1,440).
A setting of 0 means the firewall does not continue to use a stale FQDN entry.
Make sure the FQDN stale entry timeout is short enough not to allow incorrect traffic
forwarding (which can pose a security risk), but long enough to allow traffic continuity
without causing an unplanned network outage.
PAN-OS® Networking Administrator’s Guide Version 11.0 233 ©2023 Palo Alto Networks, Inc.
DNS
Each tenant has its own server profiles for Security policy rules, reporting, and management
services (such as email, Kerberos, SNMP, syslog, and more) defined in its own networks.
For the DNS resolutions initiated by these services, each virtual system is configured with its
own DNS Proxy Object to allow each tenant to customize how DNS resolution is handled within
its virtual system. Any service with a Location will use the DNS Proxy object configured for
the virtual system to determine the primary (or secondary) DNS server to resolve FQDNs, as
illustrated in the following figure.
PAN-OS® Networking Administrator’s Guide Version 11.0 234 ©2023 Palo Alto Networks, Inc.
DNS
STEP 1 | For each virtual system, specify the DNS Proxy to use.
1. Select Device > Virtual Systems and Add the ID of the virtual system (range is 1-255),
and an optional Name, in this example, Corp1 Corporation.
2. On the General tab, choose a DNS Proxy or create a new one. In this example, Corp1
DNS Proxy is selected as the proxy for Corp1 Corporation’s virtual system.
3. For Interfaces, click Add. In this example, Ethernet1/20 is dedicated to this tenant.
4. For Virtual Routers, click Add. A virtual router named Corp1 VR is assigned to the virtual
system in order to separate routing functions.
5. Click OK.
PAN-OS® Networking Administrator’s Guide Version 11.0 235 ©2023 Palo Alto Networks, Inc.
DNS
STEP 2 | Configure a DNS Proxy and a server profile to support DNS resolution for a virtual system.
1. Select Network > DNS Proxy and click Add.
2. Click Enable and enter a Name for the DNS Proxy.
3. For Location, select the virtual system of the tenant, in this example, Corp1 Corporation
(vsys6). (You could choose the Shared DNS Proxy resource instead.)
4. For Server Profile, choose or create a profile to customize DNS servers to use for DNS
resolutions for this tenant’s security policy, reporting, and server profile services.
If the profile is not already configured, in the Server Profile field, click DNS Server
Profile to Configure a DNS Server Profile.
The DNS server profile identifies the IP addresses of the primary and secondary DNS
server to use for management DNS resolutions for this virtual system.
5. Also for this server profile, optionally configure a Service Route IPv4 and/or a Service
Route IPv6 to instruct the firewall which Source Interface to use in its DNS requests. If
that interface has more than one IP address, configure the Source Address also.
6. Select the Advanced tab. Ensure that Cache is enabled and Cache EDNS Responses is
enabled (both are enabled by default). This is required if the DNS proxy object is used
under Device > Virtual Systems > vsys > General > DNS Proxy.
7. Click OK.
8. Click OK and Commit.
Optional advanced features such as split DNS can be configured using DNS
Proxy Rules. A separate DNS server profile can be used to redirect DNS
resolutions matching the Domain Name in a DNS Proxy Rule to another set of
DNS servers, if required. Use Case 3 illustrates split DNS.
If you use two separate DNS server profiles in the same DNS Proxy object, one for the
DNS Proxy and one for the DNS proxy rule, the following behaviors occur:
• If a service route is defined in the DNS server profile used by the DNS Proxy, it takes
precedence and is used.
• If a service route is defined in the DNS server profile used in the DNS proxy rules,
it is not used. If the service route differs from the one defined in the DNS server
profile used by the DNS Proxy, the following warning message is displayed during the
Commit process:
Warning: The DNS service route defined in the DNS proxy object
is different from the DNS proxy rule’s service route. Using
the DNS proxy object’s service route.
• If no service route is defined in any DNS server profile, the global service route is
used if needed.
PAN-OS® Networking Administrator’s Guide Version 11.0 236 ©2023 Palo Alto Networks, Inc.
DNS
This scenario happens to use split DNS, a configuration where DNS Proxy rules are configured
to redirect DNS requests to a set of DNS servers based on a domain name match. If there is no
match, the server profile determines the DNS servers to which to send the request, hence the
two, split DNS resolution methods.
For dataplane DNS resolutions, the source IP address from the DNS proxy in PAN-OS
to the outside DNS server would be the address of the proxy (the destination IP of the
original request). Any service routes defined in the DNS Server Profile are not used. For
example, if the request is from host 172.16.1.1 to the DNS proxy at 192.168.1.1, then
the request to the DNS server (at 10.10.10.10) would use a source of 192.168.1.1 and a
destination of 10.10.10.10.
STEP 2 | Click Enable and enter a Name for the DNS Proxy.
STEP 3 | For Location, select the virtual system of the tenant, in this example, Corp1 Corporation
(vsys6).
STEP 4 | For Interface, select the interface that will receive the DNS requests from the tenant’s hosts,
in this example, Ethernet1/20.
STEP 5 | Choose or create a Server Profile to customize DNS servers to resolve DNS requests for this
tenant.
STEP 6 | On the DNS Proxy Rules tab, Add a Name for the rule.
STEP 8 | Add one or more Domain Name(s), one entry per row. DNS Proxy Rule and FQDN Matching
describes how the firewall matches FQDNs to domain names in a DNS proxy rule.
STEP 9 | For DNS Server profile, select a profile. The firewall compares the domain name in the DNS
request to the domain name(s) defined in the DNS Proxy Rules. If there is a match, the DNS
Server profile defined in the rule is used to determine the DNS server.
PAN-OS® Networking Administrator’s Guide Version 11.0 237 ©2023 Palo Alto Networks, Inc.
DNS
STEP 10 | In this example, if the domain in the request matches myweb.corp1.com, the DNS server
defined in the myweb DNS Server Profile is used. If there is no match, the DNS server
defined in the Server Profile (Corp1 DNS Server Profile) is used.
PAN-OS® Networking Administrator’s Guide Version 11.0 238 ©2023 Palo Alto Networks, Inc.
DNS
The firewall first tokenizes the FQDNs *.boat.fish.com consists of four tokens: [*]
and the domain names in the DNS [boat][fish][com]
proxy rules. In a domain name, a string
delimited by a period (.) is a token.
Rule: www.boat.*
FQDN: www.boat.com — Match
FQDN: www.boat.fish.com — Match
PAN-OS® Networking Administrator’s Guide Version 11.0 239 ©2023 Palo Alto Networks, Inc.
DNS
PAN-OS® Networking Administrator’s Guide Version 11.0 240 ©2023 Palo Alto Networks, Inc.
DNS
PAN-OS® Networking Administrator’s Guide Version 11.0 241 ©2023 Palo Alto Networks, Inc.
DNS
Best Practices for Creating DNS Proxy Rules to Avoid Ambiguity and Unexpected Results
PAN-OS® Networking Administrator’s Guide Version 11.0 242 ©2023 Palo Alto Networks, Inc.
DDNS
Learn about how Dynamic DNS (DDNS) service updates the mappings of domain
names to IP addresses to provide accurate IP addresses to DNS clients.
243
DDNS
For high availability (HA) configurations, make sure that content versions on the HA
firewall peers (active/passive or active/active) are in sync because the firewall maintains
the DDNS configuration based on the current Palo Alto Networks content release version.
Palo Alto Networks can change or deprecate existing DDNS services through a content
release. Additionally, a DDNS service provider can change the services it provides. A
mismatch in content release versions between the HA peers can cause issues with their
ability to use the DDNS service.
The firewall does not support DDNS over an interface that is a Point-to-Point Protocol
over Ethernet (PPPoE) termination point.
In the following example, the firewall is a DDNS client of a DDNS service provider. Initially, the
DHCP server assigns IP address 10.1.1.1 to the Ethernet 1/2 interface. A destination NAT policy
translates the public-facing 10.1.1.1 to the real address of Server A (192.168.10.1) behind the
firewall.
PAN-OS® Networking Administrator’s Guide Version 11.0 244 ©2023 Palo Alto Networks, Inc.
DDNS
1. When a user attempts to contact www.serverA.companyx.com, the user queries its local DNS
server for the IP address. The www.serverA.companyx.com (set, for example, as a CNAME to
your duckdns.org record: serverA.companyx.duckdns.org) is a domain belonging to the DDNS
provider (DuckDNS in this example). The DNS server checks for the record with the DDNS
provider to resolve the query.
2. The DNS server responds to the user with 10.1.1.1, which is the IP address for
www.serverA.companyx.com.
3. The user packet with destination 10.1.1.1 goes to firewall interface Ethernet 1/2.
4. In this example, the firewall performs destination NAT and translates 10.1.1.1 to 192.168.11.0
before sending the packet to the destination.
After some time passes, DHCP assigns a new IP address to the firewall interface, which triggers a
DDNS update, as follows:
PAN-OS® Networking Administrator’s Guide Version 11.0 245 ©2023 Palo Alto Networks, Inc.
DDNS
If your firewall is configured for HA active/passive mode, be aware that the firewall sends
DDNS updates to the DDNS service while the two HA firewall states are converging. After
the HA states converge, DDNS is disabled on the passive firewall. For example, when two
HA firewalls first boot up, they both send DDNS updates until they establish whether
they are in HA active or passive mode. During this interval, you still see DDNS updates
in system logs. After the HA states converge and each firewall notifies its clients that it is
active or passive, the passive firewall no longer sends DDNS updates. (In HA active/active
mode, each firewall has an independent DDNS configuration and doesn’t synchronize the
DDNS configuration.)
PAN-OS® Networking Administrator’s Guide Version 11.0 246 ©2023 Palo Alto Networks, Inc.
DDNS
Make sure this hostname matches the hostname you registered with your
DDNS service. You should enter an FQDN for the hostname; the firewall
doesn’t validate the hostname except to confirm that the syntax uses only valid
characters allowed by DNS for a domain name.
6. Select IPv4 and select one or more IPv4 addresses assigned to the interface or Add an
IPv4 address to associate with the hostname (for example, 10.1.1.1). You can select only
as many IPv4 addresses as the DDNS service allows. All selected IPv4 addresses are
registered with the DDNS service. Select at least one IPv4 or one IPv6 address.
7. Select IPv6 and select one or more IPv6 addresses assigned to the interface or Add
an IPv6 address to associate with the hostname. You can select only as many IPv6
addresses as the DDNS service allows. All selected IPv6 addresses are registered with
the DDNS service. Select at least one IPv4 or one IPv6 address.
8. Select or create a new certificate profile (Certificate Profile) using the imported SSL
certificate from the DDNS service to verify the SSL certificate of the DDNS service
PAN-OS® Networking Administrator’s Guide Version 11.0 247 ©2023 Palo Alto Networks, Inc.
DDNS
when the firewall first connects to a DDNS service to register an IP address and at every
update. When the firewall connects to the DDNS service to send updates, the DDNS
service presents the firewall with an SSL certificate signed by the certificate authority
(CA) so that the firewall can authenticate the DDNS service.
9. Select the Vendor (and version number) you are using for DDNS service.
®
Palo Alto Networks may change the supported DDNS service providers via a
content update.
In the Vendor field, the Palo Alto Network DDNS selection is a reserved DDNS
service for Palo Alto Networks features such as SD-WAN and ZTP, and shouldn’t
be selected for this current task. If you mistakenly select Palo Alto Networks
DDNS when the corresponding supporting feature isn’t enabled, an error
message will appear.
10. The vendor choice determines the vendor-specific Name and Value fields below the
Vendor field. Some Value fields are read-only to notify you of the parameters the
firewall uses to connect to the DDNS service. Configure the remaining Value fields, such
as a password that the DDNS service provides to you and a timeout that the firewall
uses if it doesn’t receive an update from the DDNS service.
11. Click OK.
STEP 2 | (Optional) If you want the firewall to communicate with the DDNS service using an interface
other than the management interface, configure a service route for DDNS (Set Up Network
Access for External Services).
PAN-OS® Networking Administrator’s Guide Version 11.0 248 ©2023 Palo Alto Networks, Inc.
DDNS
PAN-OS® Networking Administrator’s Guide Version 11.0 249 ©2023 Palo Alto Networks, Inc.
DDNS
PAN-OS® Networking Administrator’s Guide Version 11.0 250 ©2023 Palo Alto Networks, Inc.
NAT
This section describes Network Address Translation (NAT) and how to configure the
firewall for NAT. NAT allows you to translate private, non-routable IPv4 addresses to
one or more globally-routable IPv4 addresses, thereby conserving an organization’s
routable IP addresses. NAT allows you to not disclose the real IP addresses of hosts
that need access to public addresses and to manage traffic by performing port
forwarding. You can use NAT to solve network design challenges, enabling networks
with identical IP subnets to communicate with each other. The firewall supports NAT
on Layer 3 and virtual wire interfaces.
The NAT64 option translates between IPv6 and IPv4 addresses, providing
connectivity between networks using disparate IP addressing schemes, and therefore
a migration path to IPv6 addressing. IPv6-to-IPv6 Network Prefix Translation (NPTv6)
translates one IPv6 prefix to another IPv6 prefix. PAN-OS supports all of these
functions.
If you use private IP addresses within your internal networks, you must use NAT to
translate the private addresses to public addresses that can be routed on external
networks. In PAN-OS, you create NAT policy rules that instruct the firewall which
packet addresses and ports need translation and what the translated addresses and
ports are.
251
NAT
PAN-OS® Networking Administrator’s Guide Version 11.0 252 ©2023 Palo Alto Networks, Inc.
NAT
Security policies differ from NAT rules because security policies examine post-NAT zones to
determine whether the packet is allowed or not. Because the very nature of NAT is to modify
source or destination IP addresses, which can result in modifying the packet’s outgoing interface
and zone, security policies are enforced on the post-NAT zone.
A SIP call sometimes experiences one-way audio when going through the firewall because
the call manager sends a SIP message on behalf of the phone to set up the connection.
When the message from the call manager reaches the firewall, the SIP ALG must put the
IP address of the phone through NAT. If the call manager and the phones are not in the
same security zone, the NAT lookup of the IP address of the phone is done using the call
manager zone. The NAT policy should take this into consideration.
No-NAT rules are configured to allow exclusion of IP addresses defined within the range of NAT
rules defined later in the NAT policy. To define a no-NAT policy, specify all of the match criteria
and select No Source Translation in the source translation column.
You can verify the NAT rules processed by selecting Device > Troubleshooting and testing the
traffic matches for the NAT rule. For example:
Because both NAT rules and security policy rules use address objects, it is a best practice
to distinguish between them by naming an address object used for NAT with a prefix, such
as “NAT-name.”
PAN-OS® Networking Administrator’s Guide Version 11.0 253 ©2023 Palo Alto Networks, Inc.
NAT
The firewall performs source NAT for a client, translating the source address 10.1.1.1 to the
address in the NAT pool, 192.168.2.2. The translated packet is sent on to a router.
For the return traffic, the router does not know how to reach 192.168.2.2 (because that IP
address is just an address in the NAT address pool), so it sends an ARP request packet to the
firewall.
• If the address pool (192.168.2.2) is in the same subnet as the egress/ingress interface IP
address (192.168.2.3/24), the firewall can send a proxy ARP reply to the router, indicating the
Layer 2 MAC address of the IP address, as shown in the figure above.
• If the address pool (192.168.2.2) is not a subnet of an interface on the firewall, the firewall
will not send a proxy ARP reply to the router. This means that the router must be configured
with the necessary route to know where to send packets destined for 192.168.2.2, in order to
ensure the return traffic is routed back to the firewall, as shown in the figure below.
PAN-OS® Networking Administrator’s Guide Version 11.0 254 ©2023 Palo Alto Networks, Inc.
NAT
Source NAT
Source NAT is typically used by internal users to access the Internet; the source address is
translated and thereby kept private. There are three types of source NAT:
• Static IP—Allows the 1-to-1, static translation of a source IP address, but leaves the source
port unchanged. A common scenario for a static IP translation is an internal server that must be
available to the Internet.
• Dynamic IP—Allows the one-to-one, dynamic translation of a source IP address only (no port
number) to the next available address in the NAT address pool. The size of the NAT pool
should be equal to the number of internal hosts that require address translations. By default,
if the source address pool is larger than the NAT address pool and eventually all of the NAT
addresses are allocated, new connections that need address translation are dropped. To
override this default behavior, use Advanced (Dynamic IP/Port Fallback) to enable use of DIPP
addresses when necessary. In either event, as sessions terminate and the addresses in the pool
become available, they can be allocated to translate new connections.
Dynamic IP NAT supports the option for you to Reserve Dynamic IP NAT Addresses.
• Dynamic IP and Port (DIPP)—Allows multiple hosts to have their source IP addresses translated
to the same public IP address with different port numbers. The dynamic translation is to the
next available address in the NAT address pool, which you configure as a Translated Address
pool be to an IP address, range of addresses, a subnet, or a combination of these.
As an alternative to using the next address in the NAT address pool, DIPP allows you to specify
the address of the Interface itself. The advantage of specifying the interface in the NAT rule is
that the NAT rule will be automatically updated to use any address subsequently acquired by
the interface. DIPP is sometimes referred to as interface-based NAT or network address port
translation (NAPT).
DIPP has a default NAT oversubscription rate, which is the number of times that the same
translated IP address and port pair can be used concurrently. For more information, see
PAN-OS® Networking Administrator’s Guide Version 11.0 255 ©2023 Palo Alto Networks, Inc.
NAT
Dynamic IP and Port NAT Oversubscription and Modify the Oversubscription Rate for DIPP
NAT.
(Affects only PA-7000 Series firewalls that do not use second-generation PA-7050-
SMC-B or PA-7080-SMC-B Switch Management Cards) When you use Point-to-Point
Tunnel Protocol (PPTP) with DIPP NAT, the firewall is limited to using a translated IP
address-and-port pair for only one connection; the firewall does not support DIPP NAT.
The workaround is to upgrade the PA-7000 Series firewall to a second-generation
SMC-B card.
Persistent NAT for DIPP is available on all firewalls. VoIP, video, cloud-based video
conferencing, audio conferencing, and other applications often use DIPP and may require the
Session Traversal Utilities for NAT (STUN) protocol. DIPP NAT uses symmetric NAT, which
may have compatibility issues with applications that use STUN. To alleviate these issues,
persistent NAT for DIPP provides additional support for connectivity with such applications.
When persistent NAT for DIPP is enabled, the binding of a private source IP address/port pair
to a specific public (translated) source IP address/port pair persists for subsequent sessions
that arrive having that same original source IP address/port pair. The following example shows
three sessions:
In this example, original source IP address/port 10.1.1.5:2966 is bound to the translated source
IP address/port 192.168.1.6:1077 in Session 1. That binding is persistent in Session 2 and
Session 3, which have the same original source IP address/port, but different destination
PAN-OS® Networking Administrator’s Guide Version 11.0 256 ©2023 Palo Alto Networks, Inc.
NAT
addresses. The persistence of the binding ends after all of the sessions for that source IP
address/port pair have ended.
In Session 1 of the example, the Destination port is 3478, the default STUN port.
When persistent NAT for DIPP is enabled, it applies to all NAT and NAT64 rules subsequently
configured; it is a global setting. Management plane or dataplane logs will indicate NAT DIPP/
STUN support has been enabled.
The persistent NAT for DIPP setting (enabled or disabled) survives across firewall reboots.
Destination NAT
Destination NAT is performed on incoming packets when the firewall translates a destination
address to a different destination address; for example, it translates a public destination address
to a private destination address. Destination NAT also offers the option to perform port
forwarding or port translation.
Destination NAT allows static and dynamic translation:
• Static IP—You can configure a one-to-one, static translation in several formats. You can specify
that the original packet have a single destination IP address, a range of IP addresses, or an IP
netmask, as long as the translated packet is in the same format and specifies the same number
of IP addresses. The firewall statically translates an original destination address to the same
translated destination address each time. That is, if there is more than one destination address,
the firewall translates the first destination address configured for the original packet to the first
destination address configured for the translated packet, and translates the second original
destination address configured to the second translated destination address configured, and so
on, always using the same translation.
If you use destination NAT to translate a static IPv4 address, you might also use DNS services
on one side of the firewall to resolve FQDNs for a client on the other side. When the DNS
response containing the IPv4 address traverses the firewall, the DNS server provides an
internal IP address to an external device, or vice versa. Beginning with PAN-OS 9.0.2 and
in later 9.0 releases, you can configure the firewall to rewrite the IP address in the DNS
response (that matches the rule) so that the client receives the appropriate address to reach
the destination service. The applicable DNS rewrite use case determines how you configure
such a rewrite.
• Dynamic IP (with session distribution)—Destination NAT allows you to translate the original
destination address to a destination host or server that has a dynamic IP address, meaning an
address object that uses an FQDN, which can return multiple addresses from DNS. Dynamic IP
(with session distribution) supports IPv4 addresses only. Destination NAT using a dynamic IP
address is especially helpful in cloud deployments that use dynamic IP addressing.
If the translated destination address resolves to more than one address, the firewall distributes
incoming NAT sessions among the multiple addresses to provide improved session distribution.
Distribution is based on one of several methods: round-robin (the default method), source
PAN-OS® Networking Administrator’s Guide Version 11.0 257 ©2023 Palo Alto Networks, Inc.
NAT
IP hash, IP modulo, IP hash, or least sessions. If a DNS server returns more than 32 IPv4
addresses for an FQDN, the firewall uses the first 32 addresses in the packet.
If the translated address is an address object of type FQDN that resolves to only IPv6
addresses, the destination NAT policy rule considers the FQDN as unresolved.
Using Dynamic IP (with session distribution) allows you to translate multiple pre-NAT
destination IP addresses M to multiple post-NAT destination IP addresses N. A many-to-many
translation means there can be M x N destination NAT translations using a single NAT rule.
The following are common examples of destination NAT translations that the firewall allows:
PAN-OS® Networking Administrator’s Guide Version 11.0 258 ©2023 Palo Alto Networks, Inc.
NAT
One common use for destination NAT is to configure several NAT rules that map a single public
destination address to several private destination host addresses assigned to servers or services.
In this case, the destination port numbers are used to identify the destination hosts. For example:
• Port Forwarding—Can translate a public destination address and port number to a private
destination address but keeps the same port number.
• Port Translation—Can translate a public destination address and port number to a private
destination address and a different port number, thus keeping the actual port number private.
The port translation is configured by entering a Translated Port on the Translated Packet tab
in the NAT policy rule. See the Destination NAT with Port Translation Example.
PAN-OS® Networking Administrator’s Guide Version 11.0 259 ©2023 Palo Alto Networks, Inc.
NAT
to reach the destination service. A single NAT policy rule causes the firewall to perform NAT on
packets that match the rule, and also causes the firewall to perform NAT on IP addresses in DNS
responses that match the original destination address or translated destination address in the rule.
DNS rewrite occurs at the global level; the firewall maps the Destination Address on the Original
Packet tab to the Destination Address on the Translated Packet tab. All other fields on the
Original Packet tab are ignored. When a DNS response packet arrives, the firewall checks whether
the response contains any A Record that matches one of the mapped destination addresses,
based on the direction, as follows.
You must specify how the firewall performs NAT on the IP address in the DNS response relative
to the NAT rule: reverse or forward:
• reverse—If the DNS response matches the Translated Destination Address in the rule, translate
the DNS response using the reverse translation that the rule uses. For example, if the rule
translates IP address 1.1.1.10 to 192.168.1.10, the firewall rewrites a DNS response of
192.168.1.10 to 1.1.1.10.
• forward—If the DNS response matches the Original Destination Address in the rule, translate
the DNS response using the same translation the rule uses. For example, if the rule translates
IP address 1.1.1.10 to 192.168.1.10, the firewall rewrites a DNS response of 1.1.1.10 to
192.168.1.10.
If you have an overlapping NAT rule with DNS Rewrite disabled, and a NAT rule below it
that has DNS Rewrite enabled and is included in the overlap, the firewall rewrites the DNS
response according to the overlapped NAT rule (in either reverse or forward setting). The
rewrite takes precedence and the order of the NAT rules is ignored.
PAN-OS® Networking Administrator’s Guide Version 11.0 260 ©2023 Palo Alto Networks, Inc.
NAT
Use case 1 summary: DNS client and destination server are on opposite sides of the firewall. The
DNS server provides an address that matches the translated destination address in the NAT rule,
so translate the DNS response using the reverse translation of the NAT rule.
Use case 2 illustrates the DNS client on the internal side of the firewall, while the DNS server
and the ultimate destination server are both on the public side. This case requires DNS rewrite
in the reverse direction. The DNS client queries for the IP address of red.com. Based on the NAT
rule, the firewall translates the query (originally going to internal address 192.168.2.1) to the
public address 1.1.2.1. The DNS server responds that red.com has IP address 1.1.2.10. The rule
includes Enable DNS Rewrite - reverse and the DNS response of 1.1.2.10 matches the destination
Translated Address of 1.1.2.0/24 in the rule, so the firewall translates the DNS response using
the reverse translation that the rule uses. The rule says translate 192.168.2.0/24 to 1.1.2.0/24,
so the firewall rewrites the DNS response 1.1.2.10 to 192.168.2.10. The DNS client receives
the response and sends to 192.168.2.10, which the rule translates to 1.1.2.10 to reach server
red.com.
Use case 2 summary is the same as Use case 1 summary: DNS client and destination server are
on opposite sides of the firewall. The DNS server provides an address that matches the translated
destination address in the NAT rule, so translate the DNS response using the reverse translation
of the NAT rule.
PAN-OS® Networking Administrator’s Guide Version 11.0 261 ©2023 Palo Alto Networks, Inc.
NAT
PAN-OS® Networking Administrator’s Guide Version 11.0 262 ©2023 Palo Alto Networks, Inc.
NAT
Use case 4 illustrates the DNS client and the ultimate destination server both on the public side
of the firewall, while the DNS server is on the internal side. This case requires DNS Rewrite in
the forward direction. The DNS client queries for the IP address of red.com. Based on Rule 2,
the firewall translates the query (originally going to public destination 1.1.2.1) to 192.168.2.1.
The DNS server responds that red.com has IP address 192.168.2.10. Rule 1 includes Enable
DNS Rewrite - forward and the DNS response of 192.168.2.10 matches the original destination
address of 192.168.2.0/24 in Rule 1, so the firewall translates the DNS response using the same
translation the rule uses. Rule 1 says translate 192.168.2.0/24 to 1.1.2.0/24, so the firewall
rewrites DNS response 192.168.2.10 to 1.1.2.10. The DNS client receives the response and sends
to 1.1.2.10 to reach server red.com.
Use case 4 summary is the same as Use case 3 summary: DNS client and destination server are
on the same side of the firewall. The DNS server provides an address that matches the original
destination address in the NAT rule, so translate the DNS response using the same (forward)
translation as the NAT rule.
PAN-OS® Networking Administrator’s Guide Version 11.0 263 ©2023 Palo Alto Networks, Inc.
NAT
PAN-OS® Networking Administrator’s Guide Version 11.0 264 ©2023 Palo Alto Networks, Inc.
NAT
PAN-OS® Networking Administrator’s Guide Version 11.0 265 ©2023 Palo Alto Networks, Inc.
NAT
PAN-OS® Networking Administrator’s Guide Version 11.0 266 ©2023 Palo Alto Networks, Inc.
NAT
For NAT pool statistics for a virtual system, the show running ippool command has columns
indicating the memory size used per NAT rule and the oversubscription ratio used (for DIPP rules).
The following is sample output for the command.
A field in the output of the show running nat-rule-ippool rule command shows the
memory (bytes) used per NAT rule. The following is sample output for the command, with the
memory usage for the rule encircled.
PAN-OS® Networking Administrator’s Guide Version 11.0 267 ©2023 Palo Alto Networks, Inc.
NAT
Configure NAT
Perform the following tasks to configure various aspects of NAT. In addition to the examples
below, there are examples in the section NAT Configuration Examples.
• Translate Internal Client IP Addresses to Your Public IP Address (Source DIPP NAT)
• Enable Clients on the Internal Network to Access your Public Servers (Destination U-Turn
NAT)
• Enable Bi-Directional Address Translation for Your Public-Facing Servers (Static Source NAT)
• Configure Destination NAT with DNS Rewrite
• Configure Destination NAT Using Dynamic IP Addresses
• Modify the Oversubscription Rate for DIPP NAT
• Reserve Dynamic IP NAT Addresses
• Disable NAT for a Specific Host or Interface
The first three NAT examples in this section are based on the following topology:
Based on this topology, there are three NAT policies we need to create as follows:
• To enable the clients on the internal network to access resources on the Internet, the internal
192.168.1.0 addresses will need to be translated to publicly routable addresses. In this case,
we will configure source NAT (the purple enclosure and arrow above), using the egress
interface address, 203.0.113.100, as the source address in all packets that leave the firewall
PAN-OS® Networking Administrator’s Guide Version 11.0 268 ©2023 Palo Alto Networks, Inc.
NAT
from the internal zone. See Translate Internal Client IP Addresses to Your Public IP Address
(Source DIPP NAT) for instructions.
• To enable clients on the internal network to access the public web server in the DMZ zone,
we must configure a NAT rule that redirects the packet from the external network, where the
original routing table lookup will determine it should go based on the destination address of
203.0.113.11 within the packet, to the actual address of the web server on the DMZ network
of 10.1.1.11. To do this you must create a NAT rule from the trust zone (where the source
address in the packet is) to the untrust zone (where the original destination address is) to
translate the destination address to an address in the DMZ zone. This type of destination NAT
is called U-Turn NAT (the yellow enclosure and arrow above). See Enable Clients on the Internal
Network to Access your Public Servers (Destination U-Turn NAT) for instructions.
• To enable the web server—which has both a private IP address on the DMZ network and a
public-facing address for access by external users—to both send and receive requests, the
firewall must translate the incoming packets from the public IP address to the private IP
address and the outgoing packets from the private IP address to the public IP address. On the
firewall, you can accomplish this with a single bi-directional static source NAT policy (the green
enclosure and arrow above). See Enable Bi-Directional Address Translation for Your Public-
Facing Servers (Static Source NAT).
Although you do not have to use address objects in your policies, it is a best
practice because it simplifies administration by allowing you to make updates
in one place rather than having to update every policy where the address is
referenced.
PAN-OS® Networking Administrator’s Guide Version 11.0 269 ©2023 Palo Alto Networks, Inc.
NAT
PAN-OS® Networking Administrator’s Guide Version 11.0 270 ©2023 Palo Alto Networks, Inc.
NAT
receives requests from users on the trust zone, you must create a destination NAT rule that will
enable the firewall to send the request to the egress interface for the DMZ zone as follows.
STEP 1 | Create an address object for the web server.
1. Select Objects > Addresses and Add a Name and optional Description for the address
object.
2. For Type, select IP Netmask and enter the public IP address of the web server,
203.0.113.11 in this example.
You can switch the address object type from IP Netmask to FQDN by clicking Resolve,
and when the FQDN appears, click Use this FQDN. Alternatively, for Type, select FQDN
and enter the FQDN to use for the address object. If you enter an FQDN and click
Resolve, the IP address to which the FQDN resolves appears in the field. To switch the
address object Type from an FQDN to an IP Netmask using this IP address, click Use
this address and the Type will switch to IP Netmask with the IP address appearing in the
field.
3. Click OK.
PAN-OS® Networking Administrator’s Guide Version 11.0 271 ©2023 Palo Alto Networks, Inc.
NAT
However, a public-facing server must be able to both send and receive packets. You need
a reciprocal policy that translates the public address (the destination IP address in incoming
packets from Internet users) into the private address so that the firewall can route the packet
to your DMZ network. You create a bi-directional static NAT rule, as described in the following
procedure. Bi-directional translation is an option for static NAT only.
STEP 1 | Create an address object for the web server’s internal IP address.
1. Select Objects > Addresses and Add a Name and optional Description for the object.
2. Select IP Netmask from the Type list and enter the IP address of the web server on the
DMZ network, 10.1.1.11 in this example.
3. Click OK.
If you did not already create an address object for the public address of your
web server, you should create that object now.
STEP 3 | Commit.
Click Commit.
You cannot enable Bi-directional source address translation in the same NAT rule where
you enable DNS rewrite.
PAN-OS® Networking Administrator’s Guide Version 11.0 272 ©2023 Palo Alto Networks, Inc.
NAT
STEP 1 | Create a destination NAT policy rule that specifies the firewall perform static translation
of IPv4 addresses that match the rule, and also specifies the firewall rewrite IP addresses
in DNS responses when that IPv4 address (from the A Record) matches the original or
translated destination address in the NAT rule.
1. Select Policies > NAT and Add a NAT policy rule.
2. (Optional) On the General tab, enter a descriptive Name for the rule.
3. For NAT Type, select ipv4.
4. On the Original Packet tab, Add a Destination Address.
You will also have to select a Source Zone or Any source zone, but DNS rewrite
occurs at the global level; only the Destination Address on the Original Packet
tab is matched. DNS Rewrite ignores all other fields on the Original Packet tab.
5. On the Translated Packet tab, for Destination Address Translation, select Translation
Type to be Static IP.
6. Select a Translated Address or enter a new address.
7. Enable DNS Rewrite and select a Direction:
• Select reverse (default) when the IP address in the DNS response requires the
opposite translation that the NAT rule specifies. If the DNS response matches the
Translated Destination Address in the rule, translate the DNS response using the
reverse translation that the rule uses. For example, if the rule translates IP address
1.1.1.10 to 192.168.1.10, the firewall rewrites a DNS response of 192.168.1.10 to
1.1.1.10.
• Select forward when the IP address in the DNS response requires the same
translation that the NAT rule specifies. If the DNS response matches the Original
Destination Address in the rule, translate the DNS response using the same
translation the rule uses. For example, if the rule translates IP address 1.1.1.10 to
192.168.1.10, the firewall rewrites a DNS response of 1.1.1.10 to 192.168.1.10.
8. Click OK.
PAN-OS® Networking Administrator’s Guide Version 11.0 273 ©2023 Palo Alto Networks, Inc.
NAT
to resolve to different IP addresses at different times, making destination NAT easier to use
because the updates are dynamic.
STEP 1 | Create an address object using the FQDN of the server to which you want to translate the
address.
1. Select Objects > Addresses and Add an address object by Name, such as post-NAT-
Internal-ELB.
2. Select FQDN as the Type and enter the FQDN. In this example, the FQDN is
ielb.appweb.com.
3. Click OK.
PAN-OS® Networking Administrator’s Guide Version 11.0 274 ©2023 Palo Alto Networks, Inc.
NAT
modulo operation; the result determines to which IP address the firewall assigns new
sessions.
• IP Hash—Assigns new sessions based on hash of source and destination IP addresses.
• Least Sessions—Assigns new sessions to the IP address with the fewest concurrent
sessions. If you have many short-lived sessions, Least Sessions provides you with a
more balanced distribution of sessions.
The firewall does not remove duplicate IP addresses from the list of destination
IP addresses before it distributes sessions among the multiple IP addresses.
The firewall distributes sessions to the duplicate addresses in the same way
it distributes sessions to non-duplicate addresses. (Duplicate addresses in the
translation pool can occur, for example, if the translated address is an address
group of address objects, and one address object is an FQDN that resolves to
an IP address, while another address object is a range that includes the same IP
address.)
7. Click OK.
STEP 4 | (Optional) You can configure the frequency at which the firewall refreshes an FQDN (Use
Case 1: Firewall Requires DNS Resolution).
The Platform Default setting applies the default oversubscription setting for the
model. If you want no oversubscription, select 1x.
3. Click OK and Commit the change.
PAN-OS® Networking Administrator’s Guide Version 11.0 275 ©2023 Palo Alto Networks, Inc.
NAT
that specific source IP are expired. The reservation timer for each source IP address begins
after all sessions that use that source IP address translation expire. Dynamic IP NAT is a one-
to-one translation; one source IP address translates to one translated IP address that is chosen
dynamically from those addresses available in the configured pool. Therefore, a translated IP
address that is reserved is not available for any other source IP address until the reservation
expires because a new session has not started. The timer is reset each time a new session for a
source IP/translated IP mapping begins, after a period when no sessions were active.
By default, no addresses are reserved. You can reserve Dynamic IP NAT addresses for the firewall
or for a virtual system.
For example, suppose there is a Dynamic IP NAT pool of 30 addresses and there are 20
translations in progress when the nat reserve-time is set to 28800 seconds (8 hours).
Those 20 translations are now reserved, so that when the last session (of any application) that
uses each source IP/translated IP mapping expires, the translated IP address is reserved for
only that source IP address for 8 hours, in case that source IP address needs translation again.
Additionally, as the 10 remaining translated addresses are allocated, they each are reserved for
their source IP address, each with a timer that begins when the last session for that source IP
address expires.
In this manner, each source IP address can be repeatedly translated to its same NAT address
from the pool; another host will not be assigned a reserved translated IP address from the
pool, even if there are no active sessions for that translated address.
Suppose a source IP/translated IP mapping has all of its sessions expire, and the reservation
timer of 8 hours begins. After a new session for that translation begins, the timer stops, and
PAN-OS® Networking Administrator’s Guide Version 11.0 276 ©2023 Palo Alto Networks, Inc.
NAT
the sessions continue until they all end, at which point the reservation timer starts again,
reserving the translated address.
The reservation timer remain in effect on the Dynamic IP NAT pool until you disable it by
entering the set setting nat reserve-ip no command or you change the nat
reserve-time to a different value.
The CLI commands for reservations do not affect Dynamic IP and Port (DIPP) or Static IP NAT
pools.
NAT rules are processed in order from the top to the bottom, so place the NAT
exemption policy before other NAT policies to ensure it is processed before an address
translation occurs for the sources you want to exempt.
PAN-OS® Networking Administrator’s Guide Version 11.0 277 ©2023 Palo Alto Networks, Inc.
NAT
Before configuring the NAT rules, consider the sequence of events for this scenario.
Host 192.0.2.250 sends an ARP request for the address 192.0.2.100 (the public address of the
destination server).
The firewall receives the ARP request packet for destination 192.0.2.100 on the Ethernet1/1
interface and processes the request. The firewall responds to the ARP request with its own
MAC address because of the destination NAT rule configured.
The NAT rules are evaluated for a match. For the destination IP address to be translated, a
destination NAT rule from zone Untrust-L3 to zone Untrust-L3 must be created to translate
the destination IP of 192.0.2.100 to 10.1.1.100.
After determining the translated address, the firewall performs a route lookup for destination
10.1.1.100 to determine the egress interface. In this example, the egress interface is
Ethernet1/2 in zone DMZ.
PAN-OS® Networking Administrator’s Guide Version 11.0 278 ©2023 Palo Alto Networks, Inc.
NAT
The firewall performs a security policy lookup to see if the traffic is permitted from zone
Untrust-L3 to DMZ.
The direction of the policy matches the ingress zone and the zone where the server is
physically located.
The security policy refers to the IP address in the original packet, which has a
destination address of 192.0.2.100.
The firewall forwards the packet to the server out egress interface Ethernet1/2. The
destination address is changed to 10.1.1.100 as the packet leaves the firewall.
For this example, address objects are configured for webserver-private (10.1.1.100) and
Webserver-public (192.0.2.100). The configured NAT rule would look like this:
The direction of the NAT rules is based on the result of route lookup.
The configured security policy to provide access to the server from the Untrust-L3 zone would
look like this:
The following NAT and security rules must be configured on the firewall:
Use the show session all CLI command to verify the translation.
PAN-OS® Networking Administrator’s Guide Version 11.0 279 ©2023 Palo Alto Networks, Inc.
NAT
All HTTP traffic is sent to host 10.1.1.100 and SSH traffic is sent to server 10.1.1.101. The
following address objects are required:
• Address object for the one pre-translated IP address of the server
• Address object for the real IP address of the SSH server
• Address object for the real IP address of the web server
The corresponding address objects are created:
• Servers-public: 192.0.2.100
• SSH-server: 10.1.1.101
• webserver-private: 10.1.1.100
The NAT rules would look like this:
PAN-OS® Networking Administrator’s Guide Version 11.0 280 ©2023 Palo Alto Networks, Inc.
NAT
• Destination NAT—The destination addresses in the packets from the clients to the server
are translated from the server’s public address (80.80.80.80) to the server’s private address
(10.2.133.15).
To verify the translations, use the CLI command show session all filter destination
80.80.80.80. A client address 192.168.1.11 and its port number are translated to 10.16.1.103
and a port number. The destination address 80.80.80.80 is translated to 10.2.133.15.
PAN-OS® Networking Administrator’s Guide Version 11.0 281 ©2023 Palo Alto Networks, Inc.
NAT
Route on R1:
172.16.1.0/24 198.51.100.2
Route on R2:
192.0.2.0/24 198.51.100.1
Now the firewall is deployed in virtual wire mode between the two Layer 3 devices. A NAT
IP address pool with range 198.51.100.9 to 198.51.100.14 is configured on the firewall. All
communications from clients in subnet 192.0.2.0/24 accessing servers in network 172.16.1.0/24
will arrive at R2 with a translated source address in the range 198.51.100.9 to 198.51.100.14. The
response from servers will be directed to these addresses.
PAN-OS® Networking Administrator’s Guide Version 11.0 282 ©2023 Palo Alto Networks, Inc.
NAT
In order for source NAT to work, you must configure proper routing on R2, so that packets
destined for other addresses are not dropped. The routing table below shows the modified
routing table on R2; the route ensures traffic to the destinations 198.51.100.9-198.51.100.14
(that is, hosts on subnet 198.51.100.8/29) will be sent back through the firewall to R1.
Route on R2:
198.51.100.8/29 198.51.100.1
Route on R2:
198.51.100.100/32 198.51.100.1
Route on R2:
PAN-OS® Networking Administrator’s Guide Version 11.0 283 ©2023 Palo Alto Networks, Inc.
NAT
198.51.100.100/32 198.51.100.1
PAN-OS® Networking Administrator’s Guide Version 11.0 284 ©2023 Palo Alto Networks, Inc.
NPTv6
IPv6-to-IPv6 Network Prefix Translation (NPTv6) performs a stateless, static
translation of one IPv6 prefix to another IPv6 prefix (port numbers are not changed).
There are four primary benefits of NPTv6:
> You can prevent the asymmetrical routing problems that result from Provider
Independent addresses being advertised from multiple datacenters.
> NPTv6 allows more specific routes to be advertised so that return traffic arrives at
the same firewall that transmitted the traffic.
> Private and public addresses are independent; you can change one without
affecting the other.
> You have the ability to translate Unique Local Addresses to globally routable
addresses.
This topic builds on a basic understanding of NAT. You should be sure you are familiar
with NAT concepts before configuring NPTv6.
285
NPTv6
NPTv6 Overview
This section describes IPv6-to-IPv6 Network Prefix Translation (NPTv6) and how to configure it.
®
NPTv6 is defined in RFC 6296. Palo Alto Networks does not implement all functionality defined
in the RFC, but is compliant with the RFC in the functionality it has implemented.
NPTv6 performs stateless translation of one IPv6 prefix to another IPv6 prefix. It is stateless,
meaning that it does not keep track of ports or sessions on the addresses translated. NPTv6
differs from NAT66, which is stateful. Palo Alto Networks supports NPTv6 RFC 6296 prefix
translation; it does not support NAT66.
With the limited addresses in the IPv4 space, NAT was required to translate private, non-routable
IPv4 addresses to one or more globally-routable IPv4 addresses. For organizations using IPv6
addressing, there is no need to translate IPv6 addresses to IPv6 addresses due to the abundance
of IPv6 addresses. However, there are Reasons to Use NPTv6 to translate IPv6 prefixes at the
firewall.
It is important to understand that NPTv6 does not provide security. It general, stateless
network address translation does not provide any security; it provides an address
translation function. NPTv6 does not hide or translate port numbers. You must set up
firewall security policies correctly in each direction to ensure that traffic is controlled as
you intended.
NPTv6 translates the prefix portion of an IPv6 address but not the host portion or the application
port numbers. The host portion is simply copied, and therefore remains the same on either side of
the firewall. The host portion also remains visible within the packet header.
NPTv6 is supported on the following firewall models (NPTv6 with hardware lookup but packets
go through the CPU):
• PA-7000 Series firewalls
• PA-5200 Series firewalls
• PA-3200 Series firewalls
• PA-800 firewall
• PA-220 firewall
VM-Series firewalls support NPTv6, but with no ability to have hardware perform a session
lookup.
• Unique Local Addresses
• Reasons to Use NPTv6
PAN-OS® Networking Administrator’s Guide Version 11.0 286 ©2023 Palo Alto Networks, Inc.
NPTv6
®
sites. Palo Alto Networks does not recommend that you assign ULAs, but a firewall configured
with NPTv6 will translate prefixes sent to it, including ULAs.
PAN-OS® Networking Administrator’s Guide Version 11.0 287 ©2023 Palo Alto Networks, Inc.
NPTv6
It is important to understand that NPTv6 does not provide security. While you are planning your
NPTv6 NAT policies, remember also to configure security policies in each direction.
A NAT or NPTv6 policy rule cannot have both the Source Address and the Translated Address set
to Any.
In an environment where you want IPv6 prefix translation, three firewall features work together:
NPTv6 NAT policies, security policies, and NDP Proxy.
The firewall does not translate the following:
• Addresses that the firewall has in its Neighbor Discovery (ND) cache.
• The subnet 0xFFFF (in accordance with RFC 6296, Appendix B).
• IP multicast addresses.
• IPv6 addresses with a prefix length of /31 or shorter.
• Link-local addresses. If the firewall is operating in virtual wire mode, there are no IP addresses
to translate, and the firewall does not translate link-local addresses.
• Addresses for TCP sessions that authenticate peers using the TCP Authentication Option (RFC
5925).
When using NPTv6, performance for fast path traffic is impacted because NPTv6 is performed in
the slow path.
NPTv6 will work with IPSec IPv6 only if the firewall is originating and terminating the tunnel.
Transit IPSec traffic would fail because the source and/or destination IPv6 address would be
modified. A NAT traversal technique that encapsulates the packet would allow IPSec IPv6 to work
with NPTv6.
PAN-OS® Networking Administrator’s Guide Version 11.0 288 ©2023 Palo Alto Networks, Inc.
NPTv6
• Checksum-Neutral Mapping
• Bi-Directional Translation
• NPTv6 Applied to a Specific Service
Checksum-Neutral Mapping
The NPTv6 mapping translations that the firewall performs are checksum-neutral, meaning that
“... they result in IP headers that will generate the same IPv6 pseudo-header checksum when the
checksum is calculated using the standard Internet checksum algorithm [RFC 1071].” See RFC
6296, Section 2.6, for more information about checksum-neutral mapping.
If you are using NPTv6 to perform destination NAT, you can provide the internal IPv6 address and
the external prefix/prefix length of the firewall interface in the syntax of the test nptv6 CLI
command. The CLI responds with the checksum-neutral, public IPv6 address to use in your NPTv6
configuration to reach that destination.
Bi-Directional Translation
When you Create an NPTv6 Policy, the Bi-directional option in the Translated Packet tab
provides a convenient way for you to have the firewall create a corresponding NAT or NPTv6
translation in the opposite direction of the translation you configured. By default, Bi-directional
translation is disabled.
If you enable Bi-directional translation, it is very important to make sure you have security
policies in place to control the traffic in both directions. Without such policies, the Bi-
directional feature will allow packets to be automatically translated in both directions,
which you might not want.
PAN-OS® Networking Administrator’s Guide Version 11.0 289 ©2023 Palo Alto Networks, Inc.
NPTv6
NDP Proxy
Neighbor Discovery Protocol (NDP) for IPv6 performs functions similar to those provided by
Address Resolution Protocol (ARP) for IPv4. RFC 4861 defines Neighbor Discovery for IP version
6 (IPv6). Hosts, routers, and firewalls use NDP to determine the link-layer addresses of neighbors
on connected links, to keep track of which neighbors are reachable, and to update neighbors’ link-
layer addresses that have changed. Peers advertise their own MAC address and IPv6 address, and
they also solicit addresses from peers.
NDP also supports the concept of proxy, when a node has a neighboring device that is able to
forward packets on behalf of the node. The device (firewall) performs the role of NDP Proxy.
®
Palo Alto Networks firewalls support NDP and NDP Proxy on their interfaces. When you
configure the firewall to act as an NDP Proxy for addresses, it allows the firewall to send
Neighbor Discovery (ND) advertisements and respond to ND solicitations from peers that are
asking for MAC addresses of IPv6 prefixes assigned to devices behind the firewall. You can also
configure addresses for which the firewall will not respond to proxy requests (negated addresses).
In fact, NDP is enabled by default, and you need to configure NDP Proxy when you configure
NPTv6, for the following reasons:
• The stateless nature of NPTv6 requires a way to instruct the firewall to respond to ND packets
sent to specified NDP Proxy addresses, and to not respond to negated NDP Proxy addresses.
It is recommended that you negate your neighbors’ addresses in the NDP Proxy
configuration, because NDP Proxy indicates the firewall will reach those addresses
behind the firewall, but the neighbors are not behind the firewall.
• NDP causes the firewall to save the MAC addresses and IPv6 addresses of neighbors in its ND
cache. (Refer to the figure in NPTv6 and NDP Proxy Example.) The firewall does not perform
NPTv6 translation for addresses that it finds in its ND cache because doing so could introduce
a conflict. If the host portion of an address in the cache happens to overlap with the host
portion of a neighbor’s address, and the prefix in the cache is translated to the same prefix as
that of the neighbor (because the egress interface on the firewall belongs to the same subnet
as the neighbor), then you would have a translated address that is exactly the same as the
legitimate IPv6 address of the neighbor, and a conflict occurs. (If an attempt to perform NPTv6
translation occurs on an address in the ND cache, an informational syslog message logs the
event: NPTv6 Translation Failed.)
When an interface with NDP Proxy enabled receives an ND solicitation requesting a MAC address
for an IPv6 address, the following sequence occurs:
The firewall searches the ND cache to ensure the IPv6 address from the solicitation is not
there. If the address is there, the firewall ignores the ND solicitation.
If the source IPv6 address is 0, that means the packet is a Duplicate Address Detection packet,
and the firewall ignores the ND solicitation.
The firewall does a Longest Prefix Match search of the NDP Proxy addresses and finds the
best match to the address in the solicitation. If the Negate field for the match is checked (in the
NDP Proxy list), the firewall drops the ND solicitation.
Only if the Longest Prefix Match search matches, and that matched address is not negated,
will the NDP Proxy respond to the ND solicitation. The firewall responds with an ND packet,
PAN-OS® Networking Administrator’s Guide Version 11.0 290 ©2023 Palo Alto Networks, Inc.
NPTv6
providing its own MAC address as the MAC address of the next hop toward the queried
destination.
In order to successfully support NDP, the firewall does not perform NDP Proxy for the following:
• Duplicate Address Detection (DAD).
• Addresses in the ND cache (because such addresses do not belong to the firewall; they belong
to discovered neighbors).
PAN-OS® Networking Administrator’s Guide Version 11.0 291 ©2023 Palo Alto Networks, Inc.
NPTv6
PAN-OS® Networking Administrator’s Guide Version 11.0 292 ©2023 Palo Alto Networks, Inc.
NPTv6
PAN-OS® Networking Administrator’s Guide Version 11.0 293 ©2023 Palo Alto Networks, Inc.
NPTv6
STEP 2 | Specify the match criteria for incoming packets; packets that match all of the criteria are
subject to the NPTv6 translation.
Zones are required for both types of translation.
1. On the Original Packet tab, for Source Zone, leave Any or Add the source zone to which
the policy applies.
2. Enter the Destination Zone to which the policy applies.
3. (Optional) Select a Destination Interface.
4. (Optional) Select a Service to restrict what type of packets are translated.
5. If you are doing source translation, enter a Source Address or select Any. The address
could be an address object. The following constraints apply to Source Address and
Destination Address:
• Prefixes of Source Address and Destination Address for the Original Packet and
Translated Packet must be in the format xxxx:xxxx::/yy, although leading zeros in the
prefix can be dropped.
• The IPv6 address cannot have an interface identifier (host) portion defined.
• The range of supported prefix lengths is /32 to /64.
• The Source Address and Destination Address cannot both be set to Any.
6. If you are doing source translation, you can optionally enter a Destination Address.
If you are doing destination translation, the Destination Address is required. The
destination address (an address object is allowed) must be a netmask, not just an IPv6
address and not a range. The prefix length must be a value from /32 to /64, inclusive.
For example, 2001:db8::/32.
PAN-OS® Networking Administrator’s Guide Version 11.0 294 ©2023 Palo Alto Networks, Inc.
NPTv6
If the address is a subnet, the NDP Proxy will respond to all addresses in the
subnet, so you should list the neighbors in that subnet with Negate selected, as
described in the next step.
4. (Optional) Enter one or more addresses for which you do not want NDP Proxy enabled,
and select Negate. For example, from an IP address range or prefix range configured in
the prior step, you could negate a smaller subset of addresses. It is recommended that
you negate the addresses of the neighbors of the firewall.
PAN-OS® Networking Administrator’s Guide Version 11.0 295 ©2023 Palo Alto Networks, Inc.
NPTv6
PAN-OS® Networking Administrator’s Guide Version 11.0 296 ©2023 Palo Alto Networks, Inc.
NAT64
NAT64 provides a way to transition to IPv6 while you still need to communicate with
IPv4 networks. When you need to communicate from an IPv6-only network to an
IPv4 network, you use NAT64 to translate source and destination addresses from IPv6
to IPv4 and vice versa. NAT64 allows IPv6 clients to access IPv4 servers and allows
IPv4 clients to access IPv6 servers. You should understand NAT before configuring
NAT64.
297
NAT64
NAT64 Overview
®
You can configure two types of NAT64 translation on a Palo Alto Networks firewall; each one is
doing a bidirectional translation between the two IP address families:
• The firewall supports stateful NAT64 for IPv6-Initiated Communication, which maps multiple
IPv6 addresses to one IPv4 address, thus preserving IPv4 addresses. (It does not support
stateless NAT64, which maps one IPv6 address to one IPv4 address and therefore does not
preserve IPv4 addresses.) Configure NAT64 for IPv6-Initiated Communication.
• The firewall supports IPv4-initiated communication with a static binding that maps an
IPv4 address and port number to an IPv6 address. Configure NAT64 for IPv4-Initiated
Communication. It also supports port rewrite, which preserves even more IPv4 addresses by
translating an IPv4 address and port number to an IPv6 address with multiple port numbers.
Configure NAT64 for IPv4-Initiated Communication with Port Translation.
A single IPv4 address can be used for NAT44 and NAT64; you don’t reserve a pool of IPv4
addresses for NAT64 only.
NAT64 operates on Layer 3 interfaces, subinterfaces, and tunnel interfaces. To use NAT64 on a
Palo Alto Networks firewall for IPv6-initiated communication, you must have a third-party DNS64
Server or a solution in place to separate the DNS query function from the NAT function. The
DNS64 server translates between your IPv6 host and an IPv4 DNS server by encoding the IPv4
address it receives from a public DNS server into an IPv6 address for the IPv6 host.
Palo Alto Networks supports the following NAT64 features:
• Persistent NAT for DIPP
• Hairpinning (NAT U-Turn); additionally, NAT64 prevents hairpinning loop attacks by dropping
all incoming IPv6 packets that have a source prefix of 64::/n.
• Translation of TCP/UDP/ICMP packets per RFC 6146 and the firewall makes a best effort to
translate other protocols that don’t use an application-level gateway (ALG). For example, the
firewall can translate a GRE packet. This translation has the same limitation as NAT44: if you
don’t have an ALG for a protocol that can use a separate control and data channel, the firewall
might not understand the return traffic flow.
• Translation between IPv4 and IPv6 of the ICMP length attribute of the original datagram field,
per RFC 4884.
PAN-OS® Networking Administrator’s Guide Version 11.0 298 ©2023 Palo Alto Networks, Inc.
NAT64
The firewall supports translation for /32, /40, /48, /56, /64, and /96 subnets using these prefixes.
A single firewall supports multiple prefixes; each NAT64 rule uses one prefix. The prefix can be
the Well-Known Prefix (64:FF9B::/96) or a Network-Specific Prefix (NSP) that is unique to the
organization that controls the address translator (the DNS64 device). An NSP is usually a network
within the organization’s IPv6 prefix. The DNS64 device typically sets the u field and suffix to
zeros; the firewall ignores those fields.
PAN-OS® Networking Administrator’s Guide Version 11.0 299 ©2023 Palo Alto Networks, Inc.
NAT64
DNS64 Server
If you need to use a DNS and you want to perform NAT64 translation using IPv6-Initiated
Communication, you must use a third-party DNS64 server or other DNS64 solution that is set
up with the Well-Known Prefix or your NSP. When an IPv6 host attempts to access an IPv4 host
or domain on the internet, the DNS64 server queries an authoritative DNS server for the IPv4
address mapped to that host name. The DNS server returns an Address record (A record) to the
DNS64 server containing the IPv4 address for the host name.
The DNS64 server in turn converts the IPv4 address to hexadecimal and encodes it into the
appropriate octets of the IPv6 prefix it is set up to use (the Well-Known Prefix or your NSP) based
on the prefix length, which results in an IPv4-Embedded IPv6 Address. The DNS64 server sends
an AAAA record to the IPv6 host that maps the IPv4-embedded IPv6 address to the IPv4 host
name.
PAN-OS® Networking Administrator’s Guide Version 11.0 300 ©2023 Palo Alto Networks, Inc.
NAT64
PAN-OS® Networking Administrator’s Guide Version 11.0 301 ©2023 Palo Alto Networks, Inc.
NAT64
IPv6-Initiated Communication
IPv6-initiated communication to the firewall is similar to source NAT for an IPv4 topology.
Configure NAT64 for IPv6-Initiated Communication when your IPv6 host needs to communicate
with an IPv4 server.
In the NAT64 policy rule, configure the original source to be an IPv6 host address or Any.
Configure the destination IPv6 address as either the Well-Known Prefix or the NSP that the
DNS64 server uses. (You do not configure the full IPv6 destination address in the rule.)
If you need to use a DNS, you need to use a DNS64 Server to convert an IPv4 DNS “A” result
into an “AAAA” result merged with the NAT64 prefix. If you don’t use a DNS, you need to create
the address using the IPv4 destination address and the NAT64 prefix configured on the firewall,
following RFC 6052 rules.
For environments that use a DNS, the example topology below illustrates communication with the
DNS64 server. The DNS64 server must be set up to use the Well-Known Prefix 64:FF9B::/96 or
your Network-Specific Prefix, which must comply with RFC 6052 (/32, /40,/48,/56,/64, or /96).
On the translated side of the firewall, the translation type must be Dynamic IP and Port in order
to implement stateful NAT64. You configure the source translated address to be the IPv4 address
of the egress interface on the firewall. You do not configure the destination translation field; the
firewall translates the address by first finding the prefix length in the original destination address
of the rule and then based on the prefix, extracting the encoded IPv4 address from the original
destination IPv6 address in the incoming packet.
Before the firewall looks at the NAT64 rule, the firewall must do a route lookup to find the
destination security zone for an incoming packet. You must ensure that the NAT64 prefix can
be reached through the destination zone assignment because the NAT64 prefix should not be
routable by the firewall. The firewall would likely assign the NAT64 prefix to the default route
or drop the NAT64 prefix because there is no route for it. The firewall will not find a destination
zone because the NAT64 prefix is not in its routing table, associated with an egress interface and
zone.
You must also configure a tunnel interface (with no termination point). You apply the NAT64
prefix to the tunnel and apply the appropriate zone to ensure that IPv6 traffic with the NAT64
prefix is assigned to the proper destination zone. The tunnel also has the advantage of dropping
IPv6 traffic with the NAT64 prefix if the traffic does not match the NAT64 rule. Your configured
routing protocol on the firewall looks up the IPv6 prefix in its routing table to find the destination
zone and then looks at the NAT64 rule.
The following figure illustrates the role of the DNS64 server in the name resolution process. In
this example, the DNS64 server is configured to use Well-Known Prefix 64:FF9B::/96.
1. A user at the IPv6 host enters the URL www.abc.com, which generates a name server lookup
(nslookup) to the DNS64 server.
2. The DNS64 Server sends an nslookup to the public DNS server for www.abc.com, requesting
its IPv4 address.
3. The DNS server returns an A record that provides the IPv4 address to the DNS64 server.
4. The DNS64 server sends an AAAA record to the IPv6 user, converting the IPv4 dotted
decimal address 198.51.100.1 into C633:6401 hexadecimal and embedding it into its own IPv6
PAN-OS® Networking Administrator’s Guide Version 11.0 302 ©2023 Palo Alto Networks, Inc.
NAT64
prefix, 64:FF9B::/96. [198 = C6 hex; 51 = 33 hex; 100 = 64 hex; 1 = 01 hex.] The result is IPv4-
Embedded IPv6 Address 64:FF9B::C633:6401.
Keep in mind that in a /96 prefix, the IPv4 address is the last four octets encoded in the IPv6
address. If the DNS64 server uses a /32, /40, /48, /56 or /64 prefix, the IPv4 address is encoded
as shown in RFC 6052.
Upon the transparent name resolution, the IPv6 host sends a packet to the firewall containing
its IPv6 source address and destination IPv6 address 64:FF9B::C633:6401 as determined by the
DNS64 server. The firewall performs the NAT64 translation based on your NAT64 rule.
PAN-OS® Networking Administrator’s Guide Version 11.0 303 ©2023 Palo Alto Networks, Inc.
NAT64
STEP 2 | Create an address object for the IPv6 destination address (pre-translation).
1. Select Objects > Addresses and click Add.
2. Enter a Name for the object, for example, nat64-IPv4 Server.
3. For Type, select IP Netmask and enter the IPv6 prefix with a netmask that is compliant
with RFC 6052 (/32, /40, /48, /56, /64, or /96). This is either the Well-Known Prefix or
your Network-Specific Prefix that is configured on the DNS64 Server.
For this example, enter 64:FF9B::/96.
The source and destination must have the same netmask (prefix length).
(You don’t enter a full destination address because, based on the prefix length, the
firewall extracts the encoded IPv4 address from the original destination IPv6 address in
the incoming packet. In this example, the prefix in the incoming packet is encoded with
C633:6401 in hexadecimal, which is the IPv4 destination address 198.51.100.1.)
4. Click OK.
STEP 3 | (Optional) Create an address object for the IPv6 source address (pre-translation).
1. Select Objects > Addresses and click Add.
2. Enter a Name for the object.
3. For Type, select IP Netmask and enter the address of the IPv6 host, in this example,
2001:DB8::5/96.
4. Click OK.
STEP 4 | (Optional) Create an address object for the IPv4 source address (translated).
1. Select Objects > Addresses and click Add.
2. Enter a Name for the object.
3. For Type, select IP Netmask and enter the IPv4 address of the firewall’s egress interface,
in this example, 192.0.2.1.
4. Click OK.
PAN-OS® Networking Administrator’s Guide Version 11.0 304 ©2023 Palo Alto Networks, Inc.
NAT64
PAN-OS® Networking Administrator’s Guide Version 11.0 305 ©2023 Palo Alto Networks, Inc.
NAT64
STEP 8 | Configure a tunnel interface to emulate a loopback interface with a netmask other than 128.
1. Select Network > Interfaces > Tunnel and Add a tunnel.
2. For Interface Name, enter a numeric suffix, such as .2.
3. On the Config tab, select the Virtual Router where you are configuring NAT64.
4. For Security Zone, select the destination zone associated with the IPv4 server
destination (Trust zone).
5. On the IPv6 tab, select Enable IPv6 on the interface.
6. Click Add and for the Address, select New Address.
7. Enter a Name for the address.
8. (Optional) Enter a Description for the tunnel address.
9. For Type, select IP Netmask and enter your IPv6 prefix and prefix length, in this
example, 64:FF9B::/96.
10. Click OK.
11. Select Enable address on interface and click OK.
12. Click OK.
13. Click OK to save the tunnel.
STEP 9 | Create a security policy to allow NAT traffic from the trust zone.
1. Select Policies > Security and Add a rule Name.
2. Select Source and Add a Source Zone; select Trust.
3. For Source Address, select Any.
4. Select Destination and Add a Destination Zone; select Untrust.
5. For Application, select Any.
6. For Actions, select Allow.
7. Click OK.
PAN-OS® Networking Administrator’s Guide Version 11.0 306 ©2023 Palo Alto Networks, Inc.
NAT64
STEP 2 | (Optional) When an IPv4 packet has its DF bit set to zero (and because IPv6 does not
fragment packets), ensure the translated IPv6 packet does not exceed the path MTU for the
destination IPv6 network.
1. Select Device > Setup > Session and edit Session Settings.
2. For NAT64 IPv6 Minimum Network MTU, enter the smallest number of bytes into
which the firewall will fragment IPv4 packets for translation to IPv6 (range is 1280-9216,
default is 1280).
If you don’t want the firewall to fragment an IPv4 packet prior to translation,
set the MTU to 9216. If the translated IPv6 packet still exceeds this value, the
firewall drops the packet and issues an ICMP packet indicating destination
unreachable - fragmentation needed.
3. Click OK.
STEP 3 | Create an address object for the IPv4 destination address (pre-translation).
1. Select Objects > Addresses and click Add.
2. Enter a Name for the object, for example, nat64_ip4server.
3. For Type, select IP Netmask and enter the IPv4 address of the firewall interface in the
Untrust zone. The address must use no netmask or a netmask of /32 only. This example
uses 198.51.19.1/32.
4. Click OK.
PAN-OS® Networking Administrator’s Guide Version 11.0 307 ©2023 Palo Alto Networks, Inc.
NAT64
STEP 4 | Create an address object for the IPv6 source address (translated).
1. Select Objects > Addresses and click Add.
2. Enter a Name for the object, for example, nat64_ip6source.
3. For Type, select IP Netmask and enter the NAT64 IPv6 address with a netmask that is
compliant with RFC 6052 (/32, /40, /48, /56, /64, or /96).
For this example, enter 64:FF9B::/96.
(The firewall encodes the prefix with the IPv4 source address 192.1.2.8, which is
C001:0208 in hexadecimal.)
4. Click OK.
STEP 5 | Create an address object for the IPv6 destination address (translated).
1. Select Objects > Addresses and click Add.
2. Enter a Name for the object, for example, nat64_server_2.
3. For Type, select IP Netmask and enter the IPv6 address of the IPv6 server (destination).
The address must use no netmask or a netmask of /128 only. This example uses
2001:DB8::2/128.
4. Click OK.
PAN-OS® Networking Administrator’s Guide Version 11.0 308 ©2023 Palo Alto Networks, Inc.
NAT64
STEP 9 | Create a security policy to allow the NAT traffic from the Untrust zone.
1. Select Policies > Security and Add a rule Name.
2. Select Source and Add a Source Zone; select Untrust.
3. For Source Address, select Any.
4. Select Destination and Add a Destination Zone; select DMZ.
5. For Actions, select Allow.
6. Click OK.
PAN-OS® Networking Administrator’s Guide Version 11.0 309 ©2023 Palo Alto Networks, Inc.
NAT64
STEP 2 | (Optional) When an IPv4 packet has its DF bit set to zero (and because IPv6 does not
fragment packets), ensure the translated IPv6 packet does not exceed the path MTU for the
destination IPv6 network.
1. Select Device > Setup > Session and edit Session Settings.
2. For NAT64 IPv6 Minimum Network MTU, enter the smallest number of byes into which
the firewall will fragment IPv4 packets for translation to IPv6 (range is 1280-9216,
default is 1280).
If you don’t want the firewall to fragment an IPv4 packet prior to translation,
set the MTU to 9216. If the translated IPv6 packet still exceeds this value, the
firewall drops the packet and issues an ICMP packet indicating destination
unreachable - fragmentation needed.
3. Click OK.
STEP 3 | Create an address object for the IPv4 destination address (pre-translation).
1. Select Objects > Addresses and click Add.
2. Enter a Name for the object, for example, nat64_ip4server.
3. For Type, select IP Netmask and enter the IPv4 address and netmask of the firewall
interface in the Untrust zone. This example uses 198.51.19.1/24.
4. Click OK.
PAN-OS® Networking Administrator’s Guide Version 11.0 310 ©2023 Palo Alto Networks, Inc.
NAT64
STEP 4 | Create an address object for the IPv6 source address (translated).
1. Select Objects > Addresses and click Add.
2. Enter a Name for the object, for example, nat64_ip6source.
3. For Type, select IP Netmask and enter the NAT64 IPv6 address with a netmask that is
compliant with RFC 6052 (/32, /40, /48, /56, /64, or /96).
For this example, enter 64:FF9B::/96.
(The firewall encodes the prefix with the IPv4 source address 192.1.2.8, which is
C001:0208 in hexadecimal.)
4. Click OK.
STEP 5 | Create an address object for the IPv6 destination address (translated).
1. Select Objects > Addresses and click Add.
2. Enter a Name for the object, for example, nat64_server_2.
3. For Type, select IP Netmask and enter the IPv6 address of the IPv6 server (destination).
This example uses 2001:DB8::2/64.
The source and destination must have the same netmask (prefix length).
4. Click OK.
STEP 7 | Specify the original source and destination information, and create a service to limit the
translation to a single ingress port number.
1. For the Original Packet, Add the Source Zone, likely an untrust zone.
2. Select the Destination Zone, likely a trust or DMZ zone.
3. For Service, select New Service.
4. Enter a Name for the Service, such as Port_8080.
5. Select TCP as the Protocol.
6. For Destination Port, enter 8080.
7. Click OK to save the Service.
8. For Source Address, select Anyor Add the address object for the IPv4 host.
9. For Destination Address, Add the address object for the IPv4 destination, in this
example, nat64_ip4server.
PAN-OS® Networking Administrator’s Guide Version 11.0 311 ©2023 Palo Alto Networks, Inc.
NAT64
STEP 9 | Create a security policy to allow the NAT traffic from the Untrust zone.
1. Select Policies > Security and Add a rule Name.
2. Select Source and Add a Source Zone; select Untrust.
3. For Source Address, select Any.
4. Select Destination and Add a Destination Zone; select DMZ.
5. For Actions, select Allow.
6. Click OK.
PAN-OS® Networking Administrator’s Guide Version 11.0 312 ©2023 Palo Alto Networks, Inc.
ECMP
Equal Cost Multiple Path (ECMP) processing is a networking feature that enables
the firewall to use up to four equal-cost routes to the same destination. Without this
feature, if there are multiple equal-cost routes to the same destination, the virtual
router chooses one of those routes from the routing table and adds it to its forwarding
table; it will not use any of the other routes unless there is an outage in the chosen
route.
Enabling ECMP functionality on a virtual router allows the firewall to have up to four
equal-cost paths to a destination in its forwarding table, allowing the firewall to:
> Load balance flows (sessions) to the same destination over multiple equal-cost
links.
> Efficiently use all available bandwidth on links to the same destination rather than
leave some links unused.
> Dynamically shift traffic to another ECMP member to the same destination if a link
fails, rather than having to wait for the routing protocol or RIB table to elect an
alternative path/route. This can help reduce downtime when links fail.
®
ECMP is supported on all Palo Alto Networks firewall models, with hardware
forwarding support on the PA-7000 Series, PA-5200 Series, and PA-3200 Series. VM-
Series firewalls support ECMP through software only. Performance is affected for
sessions that cannot be hardware offloaded.
ECMP is supported on Layer 3, Layer 3 subinterface, VLAN, tunnel, and Aggregated
Ethernet interfaces.
ECMP can be configured for static routes and any of the dynamic routing protocols
the firewall supports.
ECMP affects the route table capacity because the capacity is based on the number
of paths, so an ECMP route with four paths will consume four entries of route table
capacity. ECMP implementation might slightly decrease the route table capacity
because more memory is being used by session-based tags to map traffic flows to
particular interfaces.
Virtual router-to-virtual router routing using static routes does not support ECMP.
For information about ECMP path selection when an HA peer fails, see ECMP in
Active/Active HA Mode.
The following sections describe ECMP and how to configure it.
313
ECMP
Enabling, disabling, or changing ECMP on an existing virtual router causes the system to
restart the virtual router, which might cause existing sessions to be terminated.
PAN-OS® Networking Administrator’s Guide Version 11.0 314 ©2023 Palo Alto Networks, Inc.
ECMP
provides greater bandwidth and therefore can handle a greater load than the ethernet1/1 link.
Therefore, to ensure that the load-balancing functionality takes into account link capacity and
speed, you might assign ethernet1/8 a weight of 200 and ethernet1/1 a weight of 100. The
2:1 weight ratio causes the virtual router to send twice as many sessions to ethernet1/8 as it
sends to ethernet1/1. However, because the ECMP protocol is inherently session-based, when
using the Weighted Round Robin algorithm, the firewall will be able to load balance across the
ECMP links only on a best-effort basis.
Keep in mind that ECMP weights are assigned to interfaces to determine load balancing (to
influence which equal-cost path is chosen), not for route selection (a route choice from routes
that could have different costs).
PAN-OS® Networking Administrator’s Guide Version 11.0 315 ©2023 Palo Alto Networks, Inc.
ECMP
STEP 3 | Enable Strict Source Path to ensure that IKE and IPSec traffic originating at the firewall
egresses the physical interface to which the source IP address of the IPSec tunnel belongs.
When you enable ECMP, IKE and IPSec traffic originating at the firewall by default egresses an
interface that an ECMP load-balancing method determines. Alternatively, you can ensure that
IKE and IPSec traffic originating at the firewall always egresses the physical interface to which
the source IP address of the IPSec tunnel belongs, by enabling Strict Source Path. You would
enable this function when the firewall has more than one ISP providing equal-cost paths to the
same destination. ISPs typically perform a reverse Path Forwarding (RPF) check (or a different
check to prevent IP address spoofing) to confirm that traffic is egressing the same interface
on which it arrived. Because ECMP would choose an egress interface based on the configured
ECMP method (instead of choosing the source interface as the egress interface), that wouldn’t
be what the ISP expects and the ISP could block legitimate return traffic. In this case, enable
Strict Source Path so that the firewall uses the egress interface that is the interface to which
the source IP address of the IPSec tunnel belongs, the RPF check succeeds, and the ISP allows
the return traffic.
STEP 4 | Specify the maximum number of equal-cost paths (to a destination network) that can be
copied from the Routing Information Base (RIB) to the Forwarding Information Base (FIB).
For Max Path allowed, enter 2, 3, or 4. Default: 2.
PAN-OS® Networking Administrator’s Guide Version 11.0 316 ©2023 Palo Alto Networks, Inc.
ECMP
STEP 5 | Select the load-balancing algorithm for the virtual router. For more information on load-
balancing methods and how they differ, see ECMP Load-Balancing Algorithms.
For Load Balance, select one of the following options from the Method list:
• IP Modulo (default)—Uses a hash of the source and destination IP addresses in the packet
header to determine which ECMP route to use.
• IP Hash—There are two IP hash methods that determine which ECMP route to use (select
hash options in Step 5):
• Use a hash of the source address (available in PAN-OS 8.0.3 and later releases).
• Use a hash of the source and destination IP addresses (the default IP hash method).
• Balanced Round Robin—Uses round robin among the ECMP paths and re-balances paths
when the number of paths changes.
• Weighted Round Robin—Uses round robin and a relative weight to select from among
ECMP paths. Specify the weights in Step 6 below.
If you select Use Source Address Only, you shouldn’t push the configuration
from Panorama to firewalls running PAN-OS 8.0.2, 8.0.1, or 8.0.0.
2. Select Use Source/Destination Ports if you want to use source or destination port
numbers in the IP Hash calculation.
Enabling this option along with Use Source Address Only will randomize path
selection even for sessions belonging to the same source IP address.
3. Enter a Hash Seed value (an integer with a maximum of nine digits). Specify a Hash Seed
value to further randomize load balancing. Specifying a hash seed value is useful if you
have a large number of sessions with the same tuple information.
STEP 7 | (Weighted Round Robin only) Define a weight for each interface in the ECMP group.
If you selected Weighted Round Robin as the Method, define a weight for each of the
interfaces that are the egress points for traffic to be routed to the same destinations (that is,
PAN-OS® Networking Administrator’s Guide Version 11.0 317 ©2023 Palo Alto Networks, Inc.
ECMP
interfaces that are part of an ECMP group, such as the interfaces that provide redundant links
to your ISP or interfaces to the core business applications on your corporate network).
The higher the weight, the more often that equal-cost path will be selected for a new session.
Give higher speed links a higher weight than a slower links so that more of the ECMP
traffic goes over the faster link.
This message displays only if you are modifying an existing virtual router with
ECMP.
PAN-OS® Networking Administrator’s Guide Version 11.0 318 ©2023 Palo Alto Networks, Inc.
ECMP
In the following figure, two ECMP paths to a destination go through two firewalls belonging to
two different ISPs in different BGP autonomous systems.
STEP 2 | For BGP routing, enable ECMP over multiple autonomous systems.
1. Select Network > Virtual Routers and select the virtual router on which to enable ECMP
for multiple BGP autonomous systems.
2. Select BGP > Advanced and select ECMP Multiple AS Support.
PAN-OS® Networking Administrator’s Guide Version 11.0 319 ©2023 Palo Alto Networks, Inc.
ECMP
Verify ECMP
A virtual router configured for ECMP indicates in the Forwarding Information Base (FIB) table
which routes are ECMP routes. An ECMP flag (E) for a route indicates that it is participating in
ECMP for the egress interface to the next hop for that route. To verify ECMP, use the following
procedure to look at the FIB and confirm that some routes are equal-cost multiple paths.
STEP 1 | Select Network > Virtual Routers.
STEP 2 | In the row of the virtual router for which you enabled ECMP, click More Runtime Stats.
In the table, multiple routes to the same Destination (out a different Interface) have
the E flag. An asterisk (*) denotes the preferred path for the ECMP group.
PAN-OS® Networking Administrator’s Guide Version 11.0 320 ©2023 Palo Alto Networks, Inc.
LLDP
®
Palo Alto Networks firewalls support Link Layer Discovery Protocol (LLDP), which
functions at the link layer to discover neighboring devices and their capabilities. LLDP
allows the firewall and other network devices to send and receive LLDP data units
(LLDPDUs) to and from neighbors. The receiving device stores the information in
a MIB, which the Simple Network Management Protocol (SNMP) can access. LLDP
makes troubleshooting easier, especially for virtual wire deployments where the
firewall would typically go undetected by a ping or traceroute.
321
LLDP
LLDP Overview
Link Layer Discovery Protocol (LLDP) operates at Layer 2 of the OSI model, using MAC
addresses. An LLDPDU is a sequence of type-length-value (TLV) elements encapsulated in an
Ethernet frame. The IEEE 802.1AB standard defines three MAC addresses for LLDPDUs: 01-80-
C2-00-00-0E, 01-80-C2-00-00-03, and 01-80-C2-00-00-00.
®
The Palo Alto Networks firewall supports only one MAC address for transmitting and receiving
LLDP data units: 01-80-C2-00-00-0E. When transmitting, the firewall uses 01-80-C2-00-00-0E
as the destination MAC address. When receiving, the firewall processes datagrams with 01-80-
C2-00-00-0E as the destination MAC address. If the firewall receives either of the other two MAC
addresses for LLDPDUs on its interfaces, the firewall takes the same forwarding action it took
prior to this feature, as follows:
• If the interface type is vwire, the firewall forwards the datagram to the other port.
• If the interface type is L2, the firewall floods the datagram to the rest of the VLAN.
• If the interface type is L3, the firewall drops the datagrams.
Panorama and the WildFire appliance are not supported.
Interface types that do not support LLDP are tap, high availability (HA), Decrypt Mirror, virtual
wire/vlan/L3 subinterfaces, and PA-7000 Series Log Processing Card (LPC) interfaces.
An LLDP Ethernet frame has the following format:
Within the LLDP Ethernet frame, the TLV structure has the following format:
PAN-OS® Networking Administrator’s Guide Version 11.0 322 ©2023 Palo Alto Networks, Inc.
LLDP
Chassis ID 1 Identifies the firewall chassis. Each firewall must have exactly one
TLV unique Chassis ID. The Chassis ID subtype is 4 (MAC address) on
®
Palo Alto Networks models will use the MAC address of Eth0 to
ensure uniqueness.
Port ID TLV 2 Identifies the port from which the LLDPDU is sent. Each firewall
uses one Port ID for each LLDPDU message transmitted. The
Port ID subtype is 5 (interface name) and uniquely identifies the
transmitting port. The firewall uses the interface’s ifname as the
Port ID.
End of 0 Indicates the end of the TLVs in the LLDP Ethernet frame.
LLDPDU TLV
The following table lists the optional TLVs that the Palo Alto Networks firewall supports:
PAN-OS® Networking Administrator’s Guide Version 11.0 323 ©2023 Palo Alto Networks, Inc.
LLDP
PAN-OS® Networking Administrator’s Guide Version 11.0 324 ©2023 Palo Alto Networks, Inc.
LLDP
PAN-OS® Networking Administrator’s Guide Version 11.0 325 ©2023 Palo Alto Networks, Inc.
LLDP
Configure LLDP
To configure LLDP and create an LLDP profile, you must be a superuser or device administrator
(deviceadmin). A firewall interface supports a maximum of five LLDP peers.
STEP 1 | Enable LLDP on the firewall.
Select Network > LLDP and edit the LLDP General section; select Enable.
PAN-OS® Networking Administrator’s Guide Version 11.0 326 ©2023 Palo Alto Networks, Inc.
LLDP
management IP address is configured, the system uses the MAC address of the
transmitting interface as the management address TLV.
7. Select IPv4 or IPv6, and in the adjacent field, select an IP address from the list (which
lists the addresses configured on the selected interface), or enter an address.
8. Click OK.
9. Up to four management addresses are allowed. If you specify more than one
Management Address, they will be sent in the order they are specified, starting at the
top of the list. To change the order of the addresses, select an address and use the Move
Up or Move Down buttons.
10. Click OK.
PAN-OS® Networking Administrator’s Guide Version 11.0 327 ©2023 Palo Alto Networks, Inc.
LLDP
PAN-OS® Networking Administrator’s Guide Version 11.0 328 ©2023 Palo Alto Networks, Inc.
LLDP
STEP 3 | View summary LLDP information for each neighbor seen on an interface.
1. Select the Peers tab.
2. (Optional) Enter a filter to restrict the information being displayed.
Local Interface—Interface on the firewall that detected the neighboring device.
Remote Chassis ID—Chassis ID of the peer. The MAC address will be used.
Port ID—Port ID of the peer.
Name—Name of peer.
More info—Provides the following remote peer details, which are based on the
Mandatory and Optional TLVs:
• Chassis Type: MAC address.
• MAC Address: MAC address of the peer.
• System Name: Name of the peer.
• System Description: Description of the peer.
• Port Description: Port description of the peer.
• Port Type: Interface name.
• Port ID: The firewall uses the interface’s ifname.
• System Capabilities: Capabilities of the system. O=Other, P=Repeater, B=Bridge,
W=Wireless-LAN, R=Router, T=Telephone
• Enabled Capabilities: Capabilities enabled on the peer.
• Management Address: Management address of the peer.
PAN-OS® Networking Administrator’s Guide Version 11.0 329 ©2023 Palo Alto Networks, Inc.
LLDP
PAN-OS® Networking Administrator’s Guide Version 11.0 330 ©2023 Palo Alto Networks, Inc.
BFD
The firewall supports Bidirectional Forwarding Detection (BFD) (RFC 5880), a protocol
that recognizes a failure in the bidirectional path between two routing peers. BFD
failure detection is extremely fast, providing for a faster failover than can be achieved
by link monitoring or frequent dynamic routing health checks, such as Hello packets
or heartbeats. Mission-critical data centers and networks that require high availability
and extremely fast failover need the extremely fast failure detection that BFD
provides.
331
BFD
BFD Overview
When you enable BFD, BFD establishes a session from one endpoint (the firewall) to its BFD peer
at the endpoint of a link using a three-way handshake. Control packets perform the handshake
and negotiate the parameters configured in the BFD profile, including the minimum intervals at
which the peers can send and receive control packets. BFD control packets for both IPv4 and IPv6
are transmitted over UDP port 3784. BFD control packets for multihop support are transmitted
over UDP port 4784. BFD control packets transmitted over either port are encapsulated in the
UDP packets.
®
After the BFD session is established, the Palo Alto Networks implementation of BFD operates
in asynchronous mode, meaning both endpoints send each other control packets (which function
like Hello packets) at the negotiated interval. If a peer does not receive a control packet within
the detection time (calculated as the negotiated transmit interval multiplied by a Detection Time
Multiplier), the peer considers the session down. (The firewall does not support demand mode, in
which control packets are sent only if necessary rather than periodically.)
When you enable BFD for a static route and a BFD session between the firewall and the BFD
peer fails, the firewall removes the failed route from the RIB and FIB tables and allows an
alternate path with a lower priority to take over. When you enable BFD for a routing protocol,
BFD notifies the routing protocol to switch to an alternate path to the peer. Thus, the firewall and
BFD peer reconverge on a new path.
A BFD profile allows you to Configure BFD settings and apply them to one or more routing
protocols or static routes on the firewall. If you enable BFD without configuring a profile, the
firewall uses its default BFD profile (with all of the default settings). You cannot change the
default BFD profile.
When an interface is running multiple protocols that use different BFD profiles, BFD uses the
profile having the lowest Desired Minimum Tx Interval. See BFD for Dynamic Routing Protocols.
Active/passive HA peers synchronize BFD configurations and sessions; active/active HA peers do
not.
BFD is standardized in RFC 5880. PAN-OS does not support all components of RFC 5880; see
Non-Supported RFC Components of BFD.
PAN-OS also supports RFC 5881, www.rfc-editor.org/rfc/rfc5881.txt. In this case, BFD tracks a
single hop between two systems that use IPv4 or IPv6, so the two systems are directly connected
to each other. BFD also tracks multiple hops from peers connected by BGP. PAN-OS follows BFD
encapsulation as described in RFC 5883, www.rfc-editor.org/rfc/rfc5883.txt. However, PAN-OS
does not support authentication.
• BFD Model, Interface, and Client Support
• Non-Supported RFC Components of BFD
• BFD for Static Routes
• BFD for Dynamic Routing Protocols
PAN-OS® Networking Administrator’s Guide Version 11.0 332 ©2023 Palo Alto Networks, Inc.
BFD
PAN-OS® Networking Administrator’s Guide Version 11.0 333 ©2023 Palo Alto Networks, Inc.
BFD
When you enable BFD for OSPFv2 or OSPFv3 broadcast interfaces, OSPF establishes a BFD
session only with its Designated Router (DR) and Backup Designated Router (BDR). On point-to-
point interfaces, OSPF establishes a BFD session with the direct neighbor. On point-to-multipoint
interfaces, OSPF establishes a BFD session with each peer.
The firewall does not support BFD on an OSPF or OSPFv3 virtual link.
Each routing protocol can have independent BFD sessions on an interface. Alternatively, two or
more routing protocols (BGP, OSPF, and RIP) can share a common BFD session for an interface.
When you enable BFD for multiple protocols on the same interface, and the source IP address
and destination IP address for the protocols are also the same, the protocols share a single BFD
session, thus reducing both dataplane overhead (CPU) and traffic load on the interface. If you
configure different BFD profiles for these protocols, only one BFD profile is used: the one that
has the lowest Desired Minimum Tx Interval. If the profiles have the same Desired Minimum Tx
Interval, the profile used by the first created session takes effect. In the case where a static route
and OSPF share the same session, because a static session is created right after a commit, while
OSPF waits until an adjacency is up, the profile of the static route takes effect.
The benefit of using a single BFD session in these cases is that this behavior uses resources more
efficiently. The firewall can use the saved resources to support more BFD sessions on different
interfaces or support BFD for different source IP and destination IP address pairs.
IPv4 and IPv6 on the same interface always create different BFD sessions, even though they can
use the same BFD profile.
If you implement both BFD for BGP and HA path monitoring, Palo Alto Networks
recommends you not implement BGP Graceful Restart. When the BFD peer’s interface
fails and path monitoring fails, BFD can remove the affected routes from the routing table
and synchronize this change to the passive HA firewall before Graceful Restart can take
effect. If you decide to implement BFD for BGP, Graceful Restart for BGP, and HA path
monitoring, you should configure BFD with a larger Desired Minimum Tx Interval and
larger Detection Time Multiplier than the default values.
PAN-OS® Networking Administrator’s Guide Version 11.0 334 ©2023 Palo Alto Networks, Inc.
BFD
Configure BFD
After you read the BFD Overview, which includes firewall models and interfaces supported,
perform the following before configuring BFD:
• Configure one or more virtual routers.
• Configure one or more Static Routes if you are applying BFD to static routes.
• Configure a routing protocol (BGP, OSPF, OSPFv3, or RIP) if you are applying BFD to a routing
protocol.
If you change a setting in a BFD profile that an existing BFD session is using and
you commit the change, before the firewall deletes that BFD session and recreates
it with the new setting, the firewall sends a BFD packet with the local state set to
admin down. The peer device may or may not flap the routing protocol or static
route, depending on the peer’s implementation of RFC 5882, Section 3.2.
1. Select Network > Network Profiles > BFD Profile and Add a Name for the BFD
profile. The name is case-sensitive and must be unique on the firewall. Use only letters,
numbers, spaces, hyphens, and underscores.
2. Select the Mode in which BFD operates:
• Active—BFD initiates sending control packets to peer (default). At least one of the
BFD peers must be Active; both can be Active.
• Passive—BFD waits for peer to send control packets and responds as required.
If you have multiple routing protocols that use different BFD profiles on the
same interface, configure the BFD profiles with the same Desired Minimum Tx
Interval.
2. Enter the Required Minimum Rx Interval (ms). This is the minimum interval, in
milliseconds, at which BFD can receive BFD control packets. Minimum on PA-7000
PAN-OS® Networking Administrator’s Guide Version 11.0 335 ©2023 Palo Alto Networks, Inc.
BFD
and PA-5200 Series firewalls is 50; minimum on VM-Series firewall is 200. Maximum is
2,000; default is 1,000.
When configuring a BFD profile, take into consideration that the firewall is a session-
based device typically at the edge of a network or data center and may have slower
links than a dedicated router. Therefore, the firewall likely needs a longer interval and
a higher multiplier than the fastest settings allowed. A detection time that is too short
can cause false failure detections when the issue is really just traffic congestion.
STEP 5 | (Optional—For a BGP IPv4 implementation only) Configure hop-related settings for the BFD
profile.
1. Select Multihop to enable BFD over BGP multihop.
2. Enter the Minimum Rx TTL.This is the minimum Time-to-Live value (number of hops)
BFD will accept (receive) in a BFD control packet when BGP supports multihop BFD.
(Range is 1-254; there is no default).
The firewall drops the packet if it receives a smaller TTL than its configured Minimum Rx
TTL. For example, if the peer is 5 hops away, and the peer transmits a BFD packet with
a TTL of 100 to the firewall, and if the Minimum Rx TTL for the firewall is set to 96 or
higher, the firewall drops the packet.
PAN-OS® Networking Administrator’s Guide Version 11.0 336 ©2023 Palo Alto Networks, Inc.
BFD
Selecting None (Disable BFD) disables BFD for this static route.
8. Click OK.
A BFD column on the IPv4 or IPv6 tab indicates the BFD profile configured for the static
route.
PAN-OS® Networking Administrator’s Guide Version 11.0 337 ©2023 Palo Alto Networks, Inc.
BFD
STEP 8 | (Optional) Enable BFD for all BGP interfaces or for a single BGP peer.
If you enable or disable BFD globally, all interfaces running BGP will be taken down
and brought back up with the BFD function. This can disrupt all BGP traffic. When
you enable BFD on the interface, the firewall stops the BGP connection to the peer to
program BFD on the interface. The peer device sees the BGP connection drop, which
can result in a reconvergence. Enable BFD for BGP interfaces during an off-peak time
when a reconvergence will not impact production traffic.
If you implement both BFD for BGP and HA path monitoring, Palo Alto Networks
recommends you not implement BGP Graceful Restart. When the BFD peer’s interface
fails and path monitoring fails, BFD can remove the affected routes from the routing
table and synchronize this change to the passive HA firewall before Graceful Restart
can take effect. If you decide to implement BFD for BGP, Graceful Restart for BGP,
and HA path monitoring, you should configure BFD with a larger Desired Minimum Tx
Interval and larger Detection Time Multiplier than the default values.
1. Select Network > Virtual Routers and select the virtual router where BGP is configured.
2. Select the BGP tab.
3. (Optional) To apply BFD to all BGP interfaces on the virtual router, in the BFD list, select
one of the following and click OK:
• default—Uses only default settings.
• A BFD profile you configured—See Create a BFD profile.
• New BFD Profile—Allows you to Create a BFD profile.
Selecting None (Disable BFD) disables BFD for all BGP interfaces on the virtual
router; you cannot enable BFD for a single BGP interface.
4. (Optional) To enable BFD for a single BGP peer interface (thereby overriding the BFD
setting for BGP as long as it is not disabled), perform the following tasks:
1. Select the Peer Group tab.
2. Select a peer group.
3. Select a peer.
4. In the BFD list, select one of the following:
default—Uses only default settings.
Inherit-vr-global-setting (default)—The BGP peer inherits the BFD profile that you
selected globally for BGP for the virtual router.
A BFD profile you configured—See Create a BFD profile.
5. Click OK.
6. Click OK.
A BFD column on the BGP - Peer Group/Peer list indicates the BFD profile configured for the
interface.
PAN-OS® Networking Administrator’s Guide Version 11.0 338 ©2023 Palo Alto Networks, Inc.
BFD
STEP 9 | (Optional) Enable BFD for OSPF or OSPFv3 globally or for an OSPF interface.
1. Select Network > Virtual Routers and select the virtual router where OSPF or OSPFv3 is
configured.
2. Select the OSPF or OSPFv3 tab.
3. (Optional) In the BFD list, select one of the following to enable BFD for all OSPF or
OSPFv3 interfaces and click OK:
• default—Uses only default settings.
• A BFD profile you configured—See Create a BFD profile.
• New BFD Profile—Allows you to Create a BFD profile.
Selecting None (Disable BFD) disables BFD for all OSPF interfaces on the
virtual router; you cannot enable BFD for a single OSPF interface.
4. (Optional) To enable BFD on a single OSPF peer interface (and thereby override the BFD
setting for OSPF, as long as it is not disabled), perform the following tasks:
1. Select the Areas tab and select an area.
2. On the Interface tab, select an interface.
3. In the BFD list, select one of the following to configure BFD for the specified OSPF
peer:
default—Uses only default settings.
Inherit-vr-global-setting (default)—OSPF peer inherits the BFD setting for OSPF or
OSPFv3 for the virtual router.
A BFD profile you configured—See Create a BFD profile.
Selecting Disable BFD disables BFD for the OSPF or OSPFv3 interface.
4. Click OK.
5. Click OK.
A BFD column on the OSPF Interface tab indicates the BFD profile configured for the
interface.
PAN-OS® Networking Administrator’s Guide Version 11.0 339 ©2023 Palo Alto Networks, Inc.
BFD
STEP 10 | (Optional) Enable BFD for RIP globally or for a single RIP interface.
1. Select Network > Virtual Routers and select the virtual router where RIP is configured.
2. Select the RIP tab.
3. (Optional) In the BFD list, select one of the following to enable BFD for all RIP interfaces
on the virtual router and click OK:
• default—Uses only default settings.
• A BFD profile you configured—See Create a BFD profile.
• New BFD Profile—Allows you to Create a BFD profile.
Selecting None (Disable BFD) disables BFD for all RIP interfaces on the
virtual router; you cannot enable BFD for a single RIP interface.
4. (Optional) To enable BFD for a single RIP interface (and thereby override the BFD
setting for RIP, as long as it is not disabled), perform the following tasks:
1. Select the Interfaces tab and select an interface.
2. In the BFD list, select one of the following:
default—Uses only default settings).
Inherit-vr-global-setting (default)—RIP interface inherits the BFD profile that you
selected for RIP globally for the virtual router.
A BFD profile you configured—See Create a BFD profile.
Selecting None (Disable BFD) disables BFD for the RIP interface.
3. Click OK.
5. Click OK.
The BFD column on the Interface tab indicates the BFD profile configured for the interface.
PAN-OS® Networking Administrator’s Guide Version 11.0 340 ©2023 Palo Alto Networks, Inc.
BFD
STEP 13 | Monitor BFD profiles referenced by a routing configuration; monitor BFD statistics, status,
and state.
Use the following CLI operational commands:
• show routing bfd active-profile [<name>]
• show routing bfd details [interface<name>][local-ip<ip>][multihop]
[peer-ip <ip>][session-id][virtual-router<name>]
• show routing bfd drop-counters session-id <session-id>
• show counter global | match bfd
PAN-OS® Networking Administrator’s Guide Version 11.0 341 ©2023 Palo Alto Networks, Inc.
BFD
Protocol STATIC(IPV4) Static route (IP address family of static route) and/
OSPF or dynamic routing protocol that is running BFD on
the interface.
BFD Profile default *(This Name of BFD profile applied to the interface.
BFD session
Because the sample interface has both a static route
has multiple
and OSPF running BFD with different profiles, the
BFD profiles.
firewall uses the profile with the lowest Desired
Lowest ‘Desired
Minimum Tx Interval. In this example, the profile
Minimum Tx
used is the default profile.
Interval (ms)’ is
used to select
the effective
profile.)
State (local/remote) up/up BFD states of the local and remote BFD peers.
Possible states are admin down, down, init, and up.
Up Time 2h 36m 21s Length of time BFD has been up (hours, minutes,
419ms seconds, and milliseconds).
Discriminator (local/ 1391591427/1 Discriminators for local and remote BFD peers.
remote)
Demand Mode Disabled PAN-OS does not support BFD Demand Mode, so it
is always in Disabled state.
PAN-OS® Networking Administrator’s Guide Version 11.0 342 ©2023 Palo Alto Networks, Inc.
BFD
Local Diag Code 0 (No Diagnostic codes indicating the reason for the local
Diagnostic) system’s last change in state:
0—No Diagnostic
1—Control Detection Time Expired
2—Echo Function Failed
3—Neighbor Signaled Session Down
4—Forwarding Plane Reset
5—Path Down
6—Concatenated Path Down
7—Administratively Down
8—Reverse Concatenated Path Down
Last Received 0 (No Diagnostic code last received from BFD peer.
Remote Diag Code Diagnostic)
Transmit Hold Time 0ms Hold time (in milliseconds) after a link comes up
before BFD transmits BFD control packets. A hold
time of 0ms means to transmit immediately. Range
is 0-120000ms.
Received Min Rx 1000ms Minimum Rx interval received from the peer; the
Interval interval at which the BFD peer can receive control
packets. Maximum is 2000ms.
Negotiated Transmit 1000ms Transmit interval (in milliseconds) that the BFD
Interval peers have agreed to send BFD control packets to
each other. Maximum is 2000ms.
PAN-OS® Networking Administrator’s Guide Version 11.0 343 ©2023 Palo Alto Networks, Inc.
BFD
Tx Control Packets 9383 (420ms Number of BFD control packets transmitted (and
(last) ago) length of time since BFD transmitted the most
recent control packet).
Rx Control Packets 9384 (407ms Number of BFD control packets received (and
(last) ago) length of time since BFD received the most recent
control packet).
Agent Data Plane Slot 1 - DP 0 On PA-7000 Series firewalls, the dataplane CPU
that is assigned to handle packets for this BFD
session.
Diagnostic Code 0 (No Diagnostic code of last packet causing state change.
Diagnostic)
PAN-OS® Networking Administrator’s Guide Version 11.0 344 ©2023 Palo Alto Networks, Inc.
BFD
Required Min Echo 0ms PAN-OS does not support the BFD Echo function,
Rx Interval so this will always be 0ms.
PAN-OS® Networking Administrator’s Guide Version 11.0 345 ©2023 Palo Alto Networks, Inc.
BFD
PAN-OS® Networking Administrator’s Guide Version 11.0 346 ©2023 Palo Alto Networks, Inc.
Session Settings and Timeouts
This section describes the global settings that affect TCP, UDP, and ICMPv6
sessions, in addition to IPv6, NAT64, NAT oversubscription, jumbo frame size, MTU,
accelerated aging, and Captive Portal authentication. There is also a setting (Rematch
Sessions) that allows you to apply newly configured security policies to sessions that
are already in progress.
The first few topics below provide brief summaries of the Transport Layer of the OSI
model, TCP, UDP, and ICMP. For more information about the protocols, refer to their
respective RFCs. The remaining topics describe the session timeouts and settings.
347
Session Settings and Timeouts
PAN-OS® Networking Administrator’s Guide Version 11.0 348 ©2023 Palo Alto Networks, Inc.
Session Settings and Timeouts
TCP
Transmission Control Protocol (TCP) (RFC 793) is one of the main protocols in the Internet
Protocol (IP) suite, and is so prevalent that it is frequently referenced together with IP as TCP/
IP. TCP is considered a reliable transport protocol because it provides error-checking while
transmitting and receiving segments, acknowledges segments received, and reorders segments
that arrive in the wrong order. TCP also requests and provides retransmission of segments that
were dropped. TCP is stateful and connection-oriented, meaning a connection between the
sender and receiver is established for the duration of the session. TCP provides flow control of
packets, so it can handle congestion over networks.
TCP performs a handshake during session setup to initiate and acknowledge a session. After
the data is transferred, the session is closed in an orderly manner, where each side transmits
a FIN packet and acknowledges it with an ACK packet. The handshake that initiates the TCP
session is often a three-way handshake (an exchange of three messages) between the initiator
and the listener, or it could be a variation, such as a four-way or five-way split handshake or a
simultaneous open. The TCP Split Handshake Drop explains how to Prevent TCP Split Handshake
Session Establishment.
Applications that use TCP as their transport protocol include Hypertext Transfer Protocol (HTTP),
HTTP Secure (HTTPS), File Transfer Protocol (FTP), Simple Mail Transfer Protocol (SMTP), Telnet,
Post Office Protocol version 3 (POP3), Internet Message Access Protocol (IMAP), and Secure Shell
(SSH).
The following topics describe details of the PAN-OS implementation of TCP.
• TCP Half Closed and TCP Time Wait Timers
• Unverified RST Timer
• TCP Split Handshake Drop
• Maximum Segment Size (MSS)
You can configure packet-based attack protection and thereby drop IP, TCP, and IPv6 packets
with undesirable characteristics or strip undesirable options from packets before allowing them
into the zone. You can also configure flood protection, specifying the rate of SYN connections
per second (not matching an existing session) that trigger an alarm, cause the firewall to randomly
drop SYN packets or use SYN cookies, and cause the firewall to drop SYN packets that exceed the
maximum rate.
PAN-OS® Networking Administrator’s Guide Version 11.0 349 ©2023 Palo Alto Networks, Inc.
Session Settings and Timeouts
The following figure illustrates when the firewall’s two timers are triggered during the TCP
connection termination procedure.
The TCP Time Wait timer should be set to a value less than the TCP Half Closed timer for the
following reasons:
• The longer time allowed after the first FIN is seen gives the opposite side of the connection
time to fully close the session.
• The shorter Time Wait time is because there is no need for the session to remain open for a
long time after the second FIN or a RST is seen. A shorter Time Wait time frees up resources
sooner, yet still allows time for the firewall to see the final ACK and possible retransmission of
other datagrams.
If you configure a TCP Time Wait timer to a value greater than the TCP Half Closed timer, the
commit will be accepted, but in practice the TCP Time Wait timer will not exceed the TCP Half
Closed value.
The timers can be set globally or per application. The global settings are used for all applications
by default. If you configure TCP wait timers at the application level, they override the global
settings.
PAN-OS® Networking Administrator’s Guide Version 11.0 350 ©2023 Palo Alto Networks, Inc.
Session Settings and Timeouts
The Unverified RST timer provides an additional security measure, explained in the second bullet
below.
A RST packet will have one of three possible outcomes:
• A RST packet that falls outside the TCP window is dropped.
• A RST packet that falls inside the TCP window but does not have the exact expected sequence
number is unverified and subject to the Unverified RST timer setting. This behavior helps
prevent denial of service (DoS) attacks where the attack tries to disrupt existing sessions by
sending random RST packets to the firewall.
• A RST packet that falls within the TCP window and has the exact expected sequence number is
subject to the TCP Time Wait timer setting.
The Split Handshake option is configured for a Zone Protection profile that is assigned to a zone.
An interface that is a member of the zone drops any synchronization (SYN) packets sent from the
PAN-OS® Networking Administrator’s Guide Version 11.0 351 ©2023 Palo Alto Networks, Inc.
Session Settings and Timeouts
server, preventing the following variations of handshakes. The letter A in the figure indicates the
session initiator and B indicates the listener. Each numbered segment of the handshake has an
arrow indicating the direction of the segment from the sender to the receiver, and each segment
indicates the control bit(s) setting.
If the DF (don’t fragment) bit is set for a packet, it is especially helpful to have a larger MSS
adjustment size and smaller MSS so that longer headers do not result in a packet length that
exceeds the allowed MTU. If the DF bit were set and the MTU were exceeded, the larger packets
would be dropped.
You can configure the firewall globally to fragment IPv4 packets that exceed the egress
interface MTU, even when the DF bit is set in the packet. Enable this for Layer 3 physical
interfaces and IPSec tunnel interfaces using the CLI command debug dataplane set
ip4-df-ignore yes. Restore the firewall to the default behavior by using the CLI
command debug dataplane set ipv4-df-ignore no.
The firewall supports a configurable MSS adjustment size for IPv4 and IPv6 addresses on the
following Layer 3 interface types: Ethernet, subinterfaces, Aggregated Ethernet (AE), VLAN, and
loopback. The IPv6 MSS adjustment size applies only if IPv6 is enabled on the interface.
PAN-OS® Networking Administrator’s Guide Version 11.0 352 ©2023 Palo Alto Networks, Inc.
Session Settings and Timeouts
If IPv4 and IPv6 are enabled on an interface and the MSS Adjustment Size differs between
the two IP address formats, the proper MSS value corresponding to the IP type is used for
TCP traffic.
For IPv4 and IPv6 addresses, the firewall accommodates larger-than-expected TCP header
lengths. In the case where a TCP packet has a larger header length than you planned for, the
firewall chooses as the MSS adjustment size the larger of the following two values:
• The configured MSS adjustment size
• The sum of the length of the TCP header (20) + the length of IP headers in the TCP SYN
This behavior means that the firewall overrides the configured MSS adjustment size if necessary.
For example, if you configure an MSS adjustment size of 42, you expect the MSS to equal 1458
(the default MTU size minus the adjustment size [1500 - 42]). However, the TCP packet has 4
extra bytes of IP options in the header, so the MSS adjustment size (20+20+4) equals 44, which is
larger than the configured MSS adjustment size of 42. The resulting MSS is 1500-44=1456 bytes,
smaller than you expected.
To configure the MSS adjustment size, see Configure Session Settings.
PAN-OS® Networking Administrator’s Guide Version 11.0 353 ©2023 Palo Alto Networks, Inc.
Session Settings and Timeouts
UDP
User Datagram Protocol (UDP) (RFC 768) is another main protocol of the IP suite, and is an
alternative to TCP. UDP is stateless and connectionless in that there is no handshake to set up
a session, and no connection between the sender and receiver; the packets may take different
routes to get to a single destination. UDP is considered an unreliable protocol because it does not
provide acknowledgments, error-checking, retransmission, or reordering of datagrams. Without
the overhead required to provide those features, UDP has reduced latency and is faster than
TCP. UDP is referred to as a best-effort protocol because there is no mechanism or guarantee to
ensure that the data will arrive at its destination.
A UDP datagram is encapsulated in an IP packet. Although UDP uses a checksum for data
integrity, it performs no error checking at the network interface level. Error checking is assumed
to be unnecessary or is performed by the application rather than UDP itself. UDP has no
mechanism to handle flow control of packets.
UDP is often used for applications that require faster speeds and time-sensitive, real-time
delivery, such as Voice over IP (VoIP), streaming audio and video, and online games. UDP is
transaction-oriented, so it is also used for applications that respond to small queries from many
clients, such as Domain Name System (DNS) and Trivial File Transfer Protocol (TFTP).
You can use Zone Protection Profiles on the firewall to configure flood protection and thereby
specify the rate of UDP connections per second (not matching an existing session) that trigger
an alarm, trigger the firewall to randomly drop UDP packets, and cause the firewall to drop UDP
packets that exceed the maximum rate. (Although UDP is connectionless, the firewall tracks UDP
datagrams in IP packets on a session basis; therefore if the UDP packet doesn’t match an existing
session, it is considered a new session and it counts as a connection toward the thresholds.)
PAN-OS® Networking Administrator’s Guide Version 11.0 354 ©2023 Palo Alto Networks, Inc.
Session Settings and Timeouts
ICMP
Internet Control Message Protocol (ICMP) (RFC 792) is another one of the main protocols of
the Internet Protocol suite; it operates at the Network layer of the OSI model. ICMP is used for
diagnostic and control purposes, to send error messages about IP operations, or messages about
requested services or the reachability of a host or router. Network utilities such as traceroute and
ping are implemented by using various ICMP messages.
ICMP is a connectionless protocol that does not open or maintain actual sessions. However, the
ICMP messages between two devices can be considered a session.
®
Palo Alto Networks firewalls support ICMPv4 and ICMPv6. You can control ICMPv4 and
ICMPv6 packets in several ways:
• Create Security Policy Rules Based on ICMP and ICMPv6 Packets and select the icmp or ipv6-
icmp application in the rule.
• Control ICMPv6 Rate Limiting when you Configure Session Settings.
• Configure Flood Protection, specifying the rate of ICMP or ICMPv6 connections per second
(not matching an existing session) that trigger an alarm, trigger the firewall to randomly drop
ICMP or ICMPv6 packets, and cause the firewall to drop ICMP or ICMPv6 packets that exceed
the maximum rate.
• Configure Packet-Based Attack Protectionpacket based attack protection:
• For ICMP, you can drop certain types of packets or suppress the sending of certain packets.
• For ICMPv6 packets (Types 1, 2, 3, 4, and 137), you can specify that the firewall use the
ICMP session key to match a security policy rule, which determines whether the ICMPv6
packet is allowed or not. (The firewall uses the security policy rule, overriding the default
behavior of using the embedded packet to determine a session match.) When the firewall
drops ICMPv6 packets that match a security policy rule, the firewall logs the details in
Traffic logs.
PAN-OS® Networking Administrator’s Guide Version 11.0 355 ©2023 Palo Alto Networks, Inc.
Session Settings and Timeouts
recognizes as an icmp or ipv6-icmp session), the firewall forwards or drops the packet based
on the security policy rule action. Security policy counters and traffic logs reflect the actions.
If no security policy rule matches the packet, the firewall applies its default security policy
rules, which allow intrazone traffic and block interzone traffic (logging is disabled by default for
these rules).
Although you can override the default rules to enable logging or change the default
action, we don’t recommend you change the default behavior for a specific case
because it will impact all traffic that those default rules affect. Instead, create security
policy rules to control and log ICMP or ICMPv6 packets explicitly.
There are two ways to create explicit security policy rules to handle ICMP or ICMPv6 packets
that are not error or redirect packets:
• Create a security policy rule to allow (or deny) all ICMP or ICMPv6 packets—In the security
policy rule, specify the application icmp or ipv6-icmp; the firewall allows (or denies) all
IP packets matching the ICMP protocol number (1) or ICMPv6 protocol number (58),
respectively, through the firewall.
• Create a custom application and a security policy rule to allow (or deny) packets from or
to that application—This more granular approach allows you to Control Specific ICMP or
ICMPv6 Types and Codes.
PAN-OS® Networking Administrator’s Guide Version 11.0 356 ©2023 Palo Alto Networks, Inc.
Session Settings and Timeouts
STEP 2 | Create a Security policy rule that allows or denies the custom application you created.
Create a Security Policy Rule. On the Application tab, specify the name of the custom
application you just created.
PAN-OS® Networking Administrator’s Guide Version 11.0 357 ©2023 Palo Alto Networks, Inc.
Session Settings and Timeouts
If you change the TCP or UDP timers at the application level, these timers for predefined
applications and shared custom applications will be implemented across all virtual
systems. If you need an application’s timers to be different for a virtual system, you
must create a custom application, assign it unique timers, and then assign the custom
application to a unique virtual system.
Perform the following task if you need to change default values of the global session timeout
settings for TCP, UDP, ICMP, Captive Portal authentication, or other types of sessions. All values
are in seconds.
The defaults are optimal values. However, you can modify these according to your
network needs. Setting a value too low could cause sensitivity to minor network delays
and could result in a failure to establish connections with the firewall. Setting a value too
high could delay failure detection.
PAN-OS® Networking Administrator’s Guide Version 11.0 358 ©2023 Palo Alto Networks, Inc.
Session Settings and Timeouts
PAN-OS® Networking Administrator’s Guide Version 11.0 359 ©2023 Palo Alto Networks, Inc.
Session Settings and Timeouts
PAN-OS® Networking Administrator’s Guide Version 11.0 360 ©2023 Palo Alto Networks, Inc.
Session Settings and Timeouts
STEP 2 | Specify whether to apply newly configured Security policy rules to sessions that are in
progress.
Select Rematch all sessions on config policy change to apply newly configured Security policy
rules to sessions that are already in progress. This capability is enabled by default. If you clear
this check box, any policy rule changes you make apply only to sessions initiated after you
commit the policy change.
For example, if a Telnet session started while an associated policy rule was configured that
allowed Telnet, and you subsequently committed a policy change to deny Telnet, the firewall
applies the revised policy to the current session and blocks it.
Jumbo Frames can take up to five times more memory compared to normal
packets and can reduce the number of available packet-buffers by 20%. This
reduces the queue sizes dedicated for out of order, application identification,
and other such packet processing tasks. As of PAN-OS 8.1, if you enable
the jumbo frame global MTU configuration and reboot your firewall, packet
buffers are then redistributed to process jumbo frames more efficiently.
If you enable jumbo frames and you have interfaces where the MTU is not specifically
configured, those interfaces will automatically inherit the jumbo frame size. Therefore,
PAN-OS® Networking Administrator’s Guide Version 11.0 361 ©2023 Palo Alto Networks, Inc.
Session Settings and Timeouts
before you enable jumbo frames, if you have any interface that you do not want to have
jumbo frames, you must set the MTU for that interface to 1500 bytes or another value.
If you import (Device > Setup > Operations > Import) and load a configuration
that has Jumbo Frame enabled, and then commit to a firewall that does not
already have Jumbo Frame enabled, the Enable Jumbo Frame setting is not
committed to the configuration. You should first Enable Jumbo Frame, reboot,
and then import, load and commit the configuration.
PAN-OS® Networking Administrator’s Guide Version 11.0 362 ©2023 Palo Alto Networks, Inc.
Session Settings and Timeouts
Alert events are recorded in the system log. Events for dropped traffic, discarded
sessions, and blocked IP address are recorded in the threat log.
• Block Hold Time (sec): The amount of time a RED-mitigated session is allowed to
continue before it is discarded. By default, the block hold time is 60 seconds. The
range is 0 to 65,535 seconds. If the value is set to 0, the firewall does not discard
sessions based on packet buffer protection.
• Block Duration (sec): This setting defines how long a session is discarded or an
IP address is blocked. The default is 3,600 seconds with a range of 0 seconds to
15,999,999 seconds. If this value is set to 0, the firewall does not discard sessions or
block IP addresses based on packet buffer protection.
You can also tune the duration, in seconds, for which a multicast route remains
in the routing table on the firewall after the session ends by configuring the
multicast settings on the virtual router that handles your virtual router (set the
Multicast Route Age Out Time (sec) on the Multicast > Advanced tab in the
virtual router configuration.
PAN-OS® Networking Administrator’s Guide Version 11.0 363 ©2023 Palo Alto Networks, Inc.
Session Settings and Timeouts
STEP 10 | Tune the Maximum Segment Size (MSS) adjustment size settings for a Layer 3 interface.
1. Select Network > Interfaces, select Ethernet, VLAN, or Loopback, and select a Layer 3
interface.
2. Select Advanced > Other Info.
3. Select Adjust TCP MSS and enter a value for one or both of the following:
• IPv4 MSS Adjustment Size (range is 40 to 300 bytes; default is 40 bytes).
• IPv6 MSS Adjustment Size (range is 60 to 300 bytes; default is 60 bytes).
4. Click OK.
STEP 12 | Reboot the firewall after changing the jumbo frame configuration.
1. Select Device > Setup > Operations.
2. Click Reboot Device.
PAN-OS® Networking Administrator’s Guide Version 11.0 364 ©2023 Palo Alto Networks, Inc.
Session Settings and Timeouts
PA-5220 firewall 1
PA-5250 firewall 2
PA-5260 and 3
PA-5280 firewalls
PA-5450 firewall Depends on the number of installed Data Processing Cards (DPCs).
The following topics provide information about the available session distribution policies, how to
change an active policy, and how to view session distribution statistics.
• Session Distribution Policy Descriptions
• Change the Session Distribution Policy and View Statistics
PAN-OS® Networking Administrator’s Guide Version 11.0 365 ©2023 Palo Alto Networks, Inc.
Session Settings and Timeouts
Ingress-slot (default on PA-7000 (PA-7000 Series firewalls only) New sessions are assigned
Series firewalls) to a DP on the same NPC on which the first packet of
the session arrived. The selection of the DP is based on
the session-load algorithm but, in this case, sessions are
limited to the DPs on the ingress NPC.
Depending on the traffic and network topology, this
policy generally decreases the odds that traffic will need
to traverse the switch fabric.
Use this policy to reduce latency if both ingress and
egress are on the same NPC. If the firewall has a mix of
NPCs (PA-7000 20G and PA-7000 20GXM for example),
this policy can isolate the increased capacity to the
corresponding NPCs and help to isolate the impact of
NPC failures.
Round-robin (default on PA-5200 The firewall selects the dataplane processor based on
Series firewalls) a round-robin algorithm between active dataplanes so
that input, output, and security processing functions are
shared among all dataplanes.
Use this policy in low to medium demand environments
where a simple and predictable load balancing algorithm
will suffice.
In high demand environments, we recommend that you
use the session-load algorithm.
PAN-OS® Networking Administrator’s Guide Version 11.0 366 ©2023 Palo Alto Networks, Inc.
Session Settings and Timeouts
Task Command
Show the active Use the show session distribution policy command to
session distribution view the active session distribution policy.
policy.
The following output is from a PA-7080 firewall with four NPCs
installed in slots 2, 10, 11, and 12 with the ingress-slot distribution
policy enabled:
PAN-OS® Networking Administrator’s Guide Version 11.0 367 ©2023 Palo Alto Networks, Inc.
Session Settings and Timeouts
Task Command
PAN-OS® Networking Administrator’s Guide Version 11.0 368 ©2023 Palo Alto Networks, Inc.
Session Settings and Timeouts
PAN-OS® Networking Administrator’s Guide Version 11.0 369 ©2023 Palo Alto Networks, Inc.
Session Settings and Timeouts
PAN-OS® Networking Administrator’s Guide Version 11.0 370 ©2023 Palo Alto Networks, Inc.
Tunnel Content Inspection
The firewall can inspect the traffic content of cleartext tunnel protocols without
terminating the tunnel:
Tunnel content inspection is for cleartext tunnels, not for VPN or LSVPN tunnels, which carry
encrypted traffic.
You can use tunnel content inspection to enforce Security, DoS Protection, and QoS
policies on traffic in these types of tunnels and traffic nested within another cleartext
tunnel (for example, a Null Encrypted IPSec tunnel inside a GRE tunnel). You can view
tunnel inspection logs and tunnel activity in the ACC to verify that tunneled traffic
complies with your corporate security and usage policies.
All firewall models support tunnel content inspection for GRE, non-encrypted IPSec,
and VXLAN protocols. Only firewalls that support GTP security support GTP-U tunnel
content inspection—see the PAN-OS Releases by Model that Support GTP and SCTP
Security in the Compatibility Matrix.
By default, supported firewalls perform tunnel acceleration to improve performance
and throughput for traffic going through GRE tunnels, VXLAN tunnels, and GTP-
U tunnels. Tunnel acceleration provides hardware offloading to reduce the time it
takes to perform flow lookups and allows the tunnel traffic to be distributed more
efficiently based on the inner traffic. However, you can Disable Tunnel Acceleration to
troubleshoot.
371
Tunnel Content Inspection
The preceding figure illustrates the two levels of tunnel inspection the firewall can perform. When
a firewall configured with Tunnel Inspection policy rules receives a packet:
PAN-OS® Networking Administrator’s Guide Version 11.0 372 ©2023 Palo Alto Networks, Inc.
Tunnel Content Inspection
• The firewall first performs a Security policy check to determine whether the tunnel protocol
(Application) in the packet is permitted or denied. (IPv4 and IPv6 packets are supported
protocols inside the tunnel.)
• If the Security policy allows the packet, the firewall matches the packet to a Tunnel Inspection
policy rule based on source zone, source address, source user, destination zone, and
destination address. The Tunnel Inspection policy rule determines the tunnel protocols that
the firewall inspects, the maximum level of encapsulation allowed (a single tunnel or a tunnel
within a tunnel), whether to allow packets containing a tunnel protocol that doesn’t pass strict
header inspection per RFC 2780, and whether to allow packets containing unknown protocols.
• If the packet passes the Tunnel Inspection policy rule’s match criteria, the firewall inspects the
inner content, which is subject to your Security policy (required) and optional policies you can
specify. (The supported policy types for the original session are listed in the following table).
• If the firewall instead finds another tunnel, the firewall recursively parses the packet for the
second header and is now at level two of encapsulation, so the second tunnel inspection policy
rule, which matches a tunnel zone, must allow a maximum tunnel inspection level of two levels
for the firewall to continue processing the packet.
• If your rule allows two levels of inspection, the firewall performs a Security policy check on
this inner tunnel and then the Tunnel Inspection policy check. The tunnel protocol you use
in an inner tunnel can differ from the tunnel protocol you use in the outer tunnel.
• If your rule doesn’t allow two levels of inspection, the firewall bases its action on whether
you configured it to drop packets that have more levels of encapsulation than the maximum
tunnel inspection level you configured.
By default, the content encapsulated in a tunnel belongs to the same security zone as the tunnel,
and is subject to the Security policy rules that protect that zone. However, you can configure a
tunnel zone, which gives you the flexibility to configure Security policy rules for inside content that
differ from the Security policy rules for the tunnel. If you use a different tunnel inspection policy
for the tunnel zone, it must always have a maximum tunnel inspection level of two levels because
by definition the firewall is looking at the second level of encapsulation.
The firewall doesn’t support a Tunnel Inspection policy rule that matches traffic for a tunnel that
terminates on the firewall; the firewall discards packets that match the inner tunnel session. For
example, when an IPSec tunnel terminates on the firewall, don’t create a Tunnel Inspection policy
rule that matches the tunnel you terminate. The firewall already inspects the inner tunnel traffic
so no Tunnel Inspection policy rule is needed.
Although tunnel content inspection works on shared gateways and on virtual system-
to-virtual system communications, you can’t assign tunnel zones to shared gateways or
virtual system-to-virtual system communications; they are subject to the same Security
policy rules as the zones to which they belong.
Both the inner tunnel sessions and the outer tunnel sessions count toward the maximum session
capacity for the firewall model.
The following table indicates with a check mark which types of policy you can apply to an outer
tunnel session, an inner tunnel session, and the inside, original session:
PAN-OS® Networking Administrator’s Guide Version 11.0 373 ©2023 Palo Alto Networks, Inc.
Tunnel Content Inspection
App-Override
VXLAN Only
DoS Protection
NAT
Policy-Based Forwarding
(PBF) and Symmetric Return
QoS
Security (required)
User-ID
Zone Protection
VXLAN is different than other protocols. The firewall can use either of two different sets of
session keys to create outer tunnel sessions for VXLAN.
• VXLAN UDP Session—A six-tuple key (zone, source IP, destination IP, protocol, source port,
and destination port) creates a VXLAN UDP Session.
• VNI Session—A five-tuple key that incorporates the tunnel ID (the VXLAN Network Identifier,
or VNI) and uses zone, source IP, destination IP, protocol, and tunnel ID (VNI) to create a VNI
Session.
You can View Inspected Tunnel Activity on the ACC or View Tunnel Information in Logs. To
facilitate quick viewing, configure a Monitor tag so you can monitor tunnel activity and filter log
results by that tag.
The ACC tunnel activity provides data in various views. For the Tunnel ID Usage, Tunnel Monitor
Tag, and Tunnel Application Usage, the data for bytes, sessions, threats, content, and URLs come
from the Traffic Summary database. For the Tunnel User, Tunneled Source IP and Tunneled
Destination IP Activity, data for bytes and sessions come from Traffic Summary database, data for
threats come from the Threat Summary, data for URLs come from the URL Summary, and data for
contents come from the Data database, which is a subset of the Threat logs.
If you enable NetFlow on the interface, NetFlow will capture statistics for the outer tunnel only,
to avoid double-counting (counting bytes of both outer and inner flows).
For the Tunnel Inspection policy rule and tunnel zone capacities for your firewall model, see the
Product Selection tool.
PAN-OS® Networking Administrator’s Guide Version 11.0 374 ©2023 Palo Alto Networks, Inc.
Tunnel Content Inspection
The following figure illustrates a corporation that runs multiple divisions and uses different
Security policies and a Tunnel Inspection policy. A Central IT team provides connectivity between
regions. A tunnel connects Site A to Site C; another tunnel connects Site A to Site D. Central
IT places a firewall in the path of each tunnel; the firewall in the tunnel between Sites A and
C performs tunnel inspection; the firewall in the tunnel between Sites A and D has no tunnel
inspection policy because the traffic is very sensitive.
PAN-OS® Networking Administrator’s Guide Version 11.0 375 ©2023 Palo Alto Networks, Inc.
Tunnel Content Inspection
The firewall can create tunnel inspection logs at the start of a session, at the end of a
session, or both. When you specify Actions for the Security policy rule, select Log at
Session Start for long-lived tunnel sessions, such as GRE sessions.
STEP 3 | Specify the criteria that determine the source of packets to which the tunnel inspection
policy rule applies.
1. Select the Source tab.
2. Add a Source Zone from the list of zones (default is Any).
3. (Optional) Add a Source Address. You can enter an IPv4 or IPv6 address, an address
group, or a Geo Region address object (Any).
4. (Optional) Select Negate to choose any addresses except those you specify.
5. (Optional) Add a Source User (default is any). Known-user is a user who has
authenticated; an Unknown user has not authenticated.
STEP 4 | Specify the criteria that determine the destination of packets to which the tunnel inspection
policy rule applies.
1. Select the Destination tab.
2. Add a Destination Zone from the list of zones (default is Any).
3. (Optional) Add a Destination Address. You can enter an IPv4 or IPv6 address, an address
group, or a Geo Region address object (default is Any).
You can also configure a new address or address group.
4. (Optional) Select Negate to choose any addresses except those you specify.
PAN-OS® Networking Administrator’s Guide Version 11.0 376 ©2023 Palo Alto Networks, Inc.
Tunnel Content Inspection
STEP 5 | Specify the tunnel protocols that the firewall will inspect for this rule.
1. Select the Inspection tab.
2. Add one or more tunnel Protocols that you want the firewall to inspect:
• GRE—Firewall inspects packets that use Generic Route Encapsulation (GRE) in the
tunnel.
• GTP-U—Firewall inspects packets that use General Packet Radio Service (GPRS)
Tunneling Protocol for User Data (GTP-U) in the tunnel.
• Non-encrypted IPSec—Firewall inspects packets that use non-encrypted IPSec (Null
Encrypted IPSec or transport mode AH IPSec) in the tunnel.
• VXLAN—Firewall inspects packets that use the Virtual Extensible Local Area Network
(VXLAN) tunneling protocol in the tunnel.
STEP 6 | Specify how many levels of encapsulation the firewall inspects and the conditions under
which the firewall drops a packet.
1. Select Inspect Options.
2. Select the Maximum Tunnel Inspection Levels that the firewall will inspect:
• One Level (default)—Firewall inspects content that is in the outer tunnel only.
For VXLAN, the firewall inspects a VXLAN payload to find the encapsulated content
or applications within the tunnel. You must select One Level because VXLAN
inspection only occurs on the outer tunnel.
• Two Levels (Tunnel In Tunnel)—Firewall inspects content that is in the outer tunnel
and content that is in the inner tunnel.
3. Select any, all, or none of the following to specify whether the firewall drops a packet
under each condition:
• Drop packet if over maximum tunnel inspection level—Firewall drops a packet that
contains more levels of encapsulation than are configured for Maximum Tunnel
Inspection Levels.
• Drop packet if tunnel protocol fails strict header check—Firewall drops a packet that
contains a tunnel protocol that uses a header that is non-compliant with the RFC for
the protocol. Non-compliant headers can indicate suspicious packets. This option
causes the firewall to verify GRE headers against RFC 2890.
PAN-OS® Networking Administrator’s Guide Version 11.0 377 ©2023 Palo Alto Networks, Inc.
Tunnel Content Inspection
cloud environments. Enable Return scanned VXLAN tunnel to source to return the
encapsulated packet to the originating VXLAN tunnel endpoint (VTEP). This option
is only supported on Layer 3, Layer 3 subinterface, aggregate interface Layer 3, and
VLAN.
4. Click OK.
PAN-OS® Networking Administrator’s Guide Version 11.0 378 ©2023 Palo Alto Networks, Inc.
Tunnel Content Inspection
STEP 8 | (Optional) Create a tunnel source zone and tunnel destination zone for tunnel content and
configure a Security policy rule for each zone.
The best practice is to create tunnel zones for your tunnel traffic. Thus, the firewall
creates separate sessions for tunneled and non-tunneled packets that have the same
five-tuple (source IP address and port, destination IP address and port, and protocol).
Assigning tunnel zones to tunnel traffic on a PA-5200 Series firewall causes the
firewall to do tunnel inspection in software; tunnel inspection is not offloaded to
hardware.
1. If you want tunnel content to be subject to Security policy rules that are different from
the Security policy rules for the zone of the outer tunnel (configured earlier), select
Network > Zones and Add a Name for the Tunnel Source Zone.
2. For Location, select the virtual system.
3. For Type, select Tunnel.
4. Click OK.
5. Repeat these substeps to create the Tunnel Destination Zone.
6. Configure a Security policy rule for the Tunnel Source Zone.
Because you might not know the originator of the tunnel traffic or the direction
of the traffic flow and you don’t want to inadvertently prohibit traffic for
an application through the tunnel, specify both tunnel zones as the Source
Zone and both tunnel zones as the Destination Zone in your Security policy
rule, or select Any for both the source and destination zones; then specify the
Applications.
7. Configure a Security policy rule for the Tunnel Destination Zone. The tip in the previous
step for configuring a Security policy rule for the Tunnel Source Zone applies to the
Tunnel Destination Zone, as well.
STEP 9 | (Optional) Specify the Tunnel Source Zone and Tunnel Destination Zone for the inner
content.
1. Specify the Tunnel Source Zone and Tunnel Destination Zone (that you just added) for
the inner content. Select Policies > Tunnel Inspection and on the General tab, select the
Name of the tunnel inspection policy rule you created.
2. Select Inspection.
3. Select Security Options.
4. Enable Security Options (disabled by default) to cause the inner content source
to belong to the Tunnel Source Zone you specify and to cause the inner content
destination to belong to the Tunnel Destination Zone you specify.
If you don’t Enable Security Options, the inner content source belongs to the same
source zone as the outer tunnel source and the inner content destination belongs to the
same destination zone as the outer tunnel destination, which means they are subject to
the same Security policy rules that apply to those outer zones.
5. For Tunnel Source Zone, select the appropriate tunnel zone you created in the previous
step so that the policies associated with that zone apply to the tunnel source zone.
PAN-OS® Networking Administrator’s Guide Version 11.0 379 ©2023 Palo Alto Networks, Inc.
Tunnel Content Inspection
Otherwise, by default, the inner content will use the same source zone that is used in the
outer tunnel and the policies of the outer tunnel source zone apply to the inner content
source zone, as well.
6. For Tunnel Destination Zone, select the appropriate tunnel zone you created in
the previous step so that the policies associated with that zone apply to the tunnel
destination zone. Otherwise, by default, the inner content will use the same destination
zone that is used in the outer tunnel and the policies of the outer tunnel destination zone
apply to the inner content destination zone, as well.
If you configure a Tunnel Source Zone and Tunnel Destination Zone for the
tunnel inspection policy rule, you should configure a specific Source Zone (in
Step 3) and a specific Destination Zone (in Step 4) in the match criteria of the
tunnel inspection policy rule, instead of specifying a Source Zone of Any and a
Destination Zone of Any. This tip ensures the direction of zone reassignment
corresponds appropriately to the parent zones.
STEP 10 | Set monitoring options for traffic that matches a tunnel inspection policy rule.
1. Select Policies > Tunnel Inspection and select the tunnel inspection policy rule you
created.
2. Select Inspection > Monitor Options.
3. Enter a Monitor Name to group similar traffic together for purposes of logging and
reporting.
4. Enter a Monitor Tag (number) to group similar traffic together for logging and reporting
(range is 1 to 16,777,215). The tag number is globally defined.
This field does not apply to the VXLAN protocol. VXLAN logs automatically use
the VNI ID from the VXLAN header.
If you tag tunnel traffic, you can later filter on the Monitor Tag in the tunnel
inspection log and use the ACC to view tunnel activity based on Monitor Tag.
5. Override Security Rule Log Setting to enable logging and log forwarding options for
sessions that meet the selected tunnel inspection policy rule. If you don’t select this
setting, tunnel log generation and log forwarding are determined by the log settings for
the Security policy rule that applies to the tunnel traffic. You can override log forwarding
settings in Security policy rules that control traffic logs by configuring tunnel inspection
log settings to store tunnel logs separately from traffic logs. The tunnel inspection logs
PAN-OS® Networking Administrator’s Guide Version 11.0 380 ©2023 Palo Alto Networks, Inc.
Tunnel Content Inspection
store the outer tunnel (GRE, non-encrypted IPSec, VXLAN, or GTP-U) sessions and the
traffic logs store the inner traffic flows.
6. Select Log at Session Start to log traffic at the start of a session.
The best practice for Tunnel logs is to log both at session start and session end
because tunnels can stay up for long periods of time. For example, GRE tunnels
can come up when the router boots and never terminate until the router is
rebooted. If you don’t log at session start, you will never see in the ACC that
there is an active GRE tunnel.
7. Select Log at Session End to log traffic at the end of a session.
8. Select a Log Forwarding profile that determines where the firewall forwards tunnel logs
for sessions that meet the tunnel inspection rule. Alternatively, you can create a new Log
Forwarding profile if you Configure Log Forwarding.
9. Click OK.
STEP 11 | (Optional, VXLAN Only) Configure a VXLAN ID (VNI). By default, all VXLAN network
interfaces (VNIs) are inspected. If you configure one or more VXLAN IDs, the policy inspects
only those VNIs.
Only the VXLAN protocol uses the Tunnel ID tab to specify the VNI.
PAN-OS® Networking Administrator’s Guide Version 11.0 381 ©2023 Palo Alto Networks, Inc.
Tunnel Content Inspection
STEP 12 | (Optional) If you enabled Rematch Sessions (Device > Setup > Session), ensure the firewall
doesn’t drop existing sessions when you create or revise a tunnel inspection policy by
disabling Reject Non-SYN TCP for the zones that control your tunnel Security policy rules.
The firewall displays the following warning when you:
• Create a tunnel inspection policy rule.
• Edit a tunnel inspection policy rule by adding a Protocol or by increasing the Maximum
Tunnel Inspection Levels from One Level to Two Levels.
• Enable Security Options in the Security Options tab by either adding new zones or
changing one zone to another zone.
Warning: Enabling tunnel inspection policies on existing tunnel sessions will cause
existing TCP sessions inside the tunnel to be treated as non-syn-tcp flows. To ensure
existing sessions are not dropped when the tunnel inspection policy is enabled, set
the Reject Non-SYN TCP setting for the zone(s) to no using a Zone Protection profile
and apply it to the zones that control the tunnel’s security policies. Once the existing
sessions have been recognized by the firewall, you can re-enable the Reject Non-SYN
TCP setting by setting it to yes or global.
1. Select Network > Network Profiles > Zone Protection and Add a profile.
2. Enter a Name for the profile.
3. Select Packet Based Attack Protection > TCP Drop.
4. For Reject Non-SYN TCP, select no.
5. Click OK.
6. Select Network > Zones and select the zone that controls your tunnel Security policy
rules.
7. For Zone Protection Profile, select the Zone Protection profile you just created.
8. Click OK.
9. Repeat the previous three substeps (12.f, 12.g, and 12.h) to apply the Zone Protection
profile to additional zones that control your tunnel Security policy rules.
10. After the firewall has recognized the existing sessions, you can re-enable Reject Non-
SYN TCP by setting it to yes or global.
PAN-OS® Networking Administrator’s Guide Version 11.0 382 ©2023 Palo Alto Networks, Inc.
Tunnel Content Inspection
STEP 3 | Select a Time period to view, such as Last 24 Hrs or Last 30 Days.
STEP 4 | For Global Filters, click the + or - buttons to use ACC Filters on tunnel activity.
STEP 5 | View inspected tunnel activity; you can display and sort data in each window by bytes,
sessions, threats, content, or URLs. Each window displays a different aspect of tunnel data in
graph and table format:
• Tunnel ID Usage—Each tunnel protocol lists the Tunnel IDs of tunnels using that protocol.
Tables provide totals of Bytes, Sessions, Threats, Content, and URLs for the protocol. Hover
over the tunnel ID to get a breakdown per tunnel ID.
• Tunnel Monitor Tag—Each tunnel protocol lists tunnel monitor tags of tunnels using that
tag. Tables provide totals of Bytes, Sessions, Threats, Content, and URLs for the tag and for
the protocol. Hover over the tunnel monitor tag to get a breakdown per tag.
• Tunneled Application Usage—Application categories graphically display types of
applications grouped into media, general interest, collaboration, and networking, and color-
coded by their risk. The Application tables also include a count of users per application.
• Tunneled User Activity—Displays a graph of bytes sent and bytes received, for example,
along an x-axis of date and time. Hover over a point on the graph to view data at that point.
The Source User and Destination User table provides data per user.
• Tunneled Source IP Activity—Displays graphs and tables of bytes, sessions, and threats, for
example, from an Attacker at an IP address. Hover over a point on the graph to view data at
that point.
• Tunneled Destination IP Activity—Displays graphs and tables based on destination IP
addresses. View threats per Victim at an IP address, for example. Hover over a point on the
graph to view data at that point.
PAN-OS® Networking Administrator’s Guide Version 11.0 383 ©2023 Palo Alto Networks, Inc.
Tunnel Content Inspection
PAN-OS® Networking Administrator’s Guide Version 11.0 384 ©2023 Palo Alto Networks, Inc.
Tunnel Content Inspection
STEP 2 | For Database, select the Traffic, Threat, URL, Data Filtering, or WildFire Submissions log.
STEP 3 | For Available Columns, select Flags and Monitor Tag, along with other data you want in the
report.
You can also Generate Custom Reports.
PAN-OS® Networking Administrator’s Guide Version 11.0 385 ©2023 Palo Alto Networks, Inc.
Tunnel Content Inspection
GTP-U
Criteria that must be met before GTP tunnel acceleration is enabled:
1. Generic tunnel acceleration is enabled under Device > Setup > Management (in General
Settings, Tunnel Acceleration is checked).
2. GTP Security is enabled under Device > Setup > Management (in General Settings, GTP
Security is checked).
3. No Tunnel Inspection policy rule with GTP-U protocol is enabled.
4. After you commit the configuration, you must reboot to load the GTP-U parser program.
Criteria for identifying GTP-U packets in hardware:
1. UDP destination port is 2152.
2. GTP.version is 1 and GTP.protocol_type is 1.
How tunnel acceleration alters the flow ID:
• If GTP-U packet passes both identification criteria, the firewall sets the following in flow key:
• Encoding bit: 1
• UDP destination port: tunnel endpoint identifier (TEID)
• Source address: 0
• Otherwise, the packet is processed as a normal UDP packet.
Benefits of GTP-U Tunnel Acceleration
If GTP-U acceleration is enabled, the main benefit occurs if there is a lot of tunneled traffic that
can be offloaded. A large percentage of GTP traffic is sourced from mobile devices and is mostly
web traffic, which won’t be offloaded when the inner payload is inspected.
The GTP Security feature is fully functional without acceleration and the performance benefit is
tied to the amount of inner payload traffic that can be offloaded by the hardware. For example,
anything that would normally get marked as L7 complete will be offloaded and handled solely
in hardware as an inner application inside of GTP.
GRE
Criterion for tunnel acceleration taking effect with GRE:
• Generic tunnel acceleration is enabled under Device > Setup > Management (in General
Settings, Tunnel Acceleration is checked).
PAN-OS® Networking Administrator’s Guide Version 11.0 386 ©2023 Palo Alto Networks, Inc.
Tunnel Content Inspection
VXLAN
Criterion for tunnel acceleration taking effect with VXLAN:
• Generic tunnel acceleration is enabled under Device > Setup > Management (in General
Settings, Tunnel Acceleration is checked).
Criterion for identifying VXLAN packets in hardware:
• UDP destination port is 4789.
What is changed:
• UDP destination port is changed to VXLAN network identifier (VNI) value from VXLAN header.
• Encoding is changed to 2.
Benefits of VXLAN Tunnel Acceleration
• Generic: Fewer session resources consumed because we need only the VNI session and not
the outer VXLAN UDP session. For VXLAN, we will parse the VXLAN header to extract the
VNI and use the VNI to derive a unique flow ID for each VNI within a VXLAN tunnel.
• With TCI: VXLAN passthrough traffic will see approximately 30% increase in performance
in flow handling with tunnel acceleration compared to the same traffic without tunnel
acceleration.
• Without TCI: Even without TCI, we will see approximately 10% improvement in performance
in flow handling with tunnel acceleration compared to the same traffic without tunnel
acceleration. The different flow ID could cause flows to be placed on different dataplanes and
thus cause a difference in how the load of a single VXLAN tunnel is distributed for the various
VNIs that would be passed in the tunnel. Unless there are VXLAN flows with several VNIs, the
performance impact will be mostly negligible.
PAN-OS® Networking Administrator’s Guide Version 11.0 387 ©2023 Palo Alto Networks, Inc.
Tunnel Content Inspection
There is no performance impact for GRE traffic when disabling tunnel acceleration if no
tunnel content inspection (TCI) policies are being used.
STEP 1 | Select Device > Setup > Management and edit General Settings.
STEP 4 | Commit.
PAN-OS® Networking Administrator’s Guide Version 11.0 388 ©2023 Palo Alto Networks, Inc.
Network Packet Broker
Network Packet Broker filters and forwards network traffic to an external security
chain of one or more third-party security appliances. Network Packet Broker replaces
the Decryption Broker feature introduced in PAN-OS 8.1 and expands its capabilities
to include forwarding non-decrypted TLS traffic and non-TLS traffic (cleartext) as well
as decrypted TLS traffic. The ability to handle all types of traffic is especially valuable
in very high security environments such as financial and government institutions.
Network Packet Broker is supported for PA-7000 Series, PA-5400 Series, PA-5200
Series, PA-3400 Series, PA-3200 Series, PA-1400 Series devices and VM-300 and
VM-700 models. It requires SSL Forward Proxy decryption to be enabled, where the
firewall is established as a trusted third party (or man-in-the-middle) to session traffic.
A firewall interface cannot be both a decryption broker and a GRE tunnel endpoint.
389
Network Packet Broker
You must reboot the firewall to make the license take effect and update the user
interface regardless of whether the firewall is a standalone firewall, part of an HA
pair, or if you push Network Packet Broker licenses to firewalls from Panorama.
• PAN-OS translates any existing Decryption Broker Forwarding profiles (Profiles >
Decryption > Forwarding Profile) into Packet Broker profiles.
• PAN-OS translates any existing Decryption Policy rules for forwarding traffic to security
chains into Network Packet Broker policy rules.
• PAN-OS removes the Decryption Broker profile from the user interface and replaces it with
the Packet Broker profile (Profiles > Packet Broker), and also adds the Network Packet
Broker policy (Policies > Network Packet Broker).
• When you downgrade to PAN-OS 10.0 from PAN-OS 10.1:
• PAN-OS translates any existing Packet Broker profiles into Decryption Broker Forwarding
profiles.
• PAN-OS removes the Network Packet Broker rulebase and prints a warning message. You
must reconfigure the Network Packet Broker policy rules as Decryption policy rules for
Decryption Forwarding.
• The license name remains Network Packet Broker (the license name changes from
Decryption Broker to Network Packet Broker in all PAN-OS versions after a reboot
and does not affect the operation of Decryption Broker). However, the functionality is
Decryption Broker functionality, not Network Packet Broker functionality.
• PAN-OS removes the Network Packet Broker profile from the user interface and replaces it
with the Decryption Forwarding profile, and also removes the Network Packet Broker policy
PAN-OS® Networking Administrator’s Guide Version 11.0 390 ©2023 Palo Alto Networks, Inc.
Network Packet Broker
from the user interface (there is no replacement; you use Decryption Policy rules to forward
only decrypted Forward Proxy traffic to security chains).
Requirements for using Network Packet Broker:
• You must install a free Packet Broker license on the firewall. Without the free license, you can’t
access the Packet Broker policy and profile in the interface.
• The firewall must have at least two available layer 3 Ethernet interfaces to use as a dedicated
pair of packet broker forwarding interfaces.
• You can configure multiple pairs of dedicated Network Packet Broker forwarding interfaces
to connect to different security chains.
• For each security chain, the pair of dedicated Network Packet Broker interfaces must be in
the same security zone.
Security policy must allow traffic between each paired set of Network Packet Broker
interfaces. The intrazone-default Security policy rule allows traffic within the same
zone by default. However, if you have a “deny all” policy rule earlier in the policy
rulebase, then you must create an explicit allow rule to allow the Network Packet
Broker traffic.
• The pair of dedicated interfaces connect to the first and last devices in a security chain.
Network Packet Broker supports routed layer 3 security chains and Transparent Bridge
Layer 1 security chains. For routed layer 3 chains, one pair of packet broker forwarding
interfaces can connect to multiple layer 3 security chains using a properly configured
switch, router, or other device to perform the required layer 3 routing between the
firewall and the security chains.
• Dedicated Network Packet Broker forwarding interfaces cannot use dynamic routing protocols.
• None of the devices in the security chain can modify the source or destination IP address,
source or destination port, or protocol of the original session because the firewall would not be
able to match the modified session to the original session and therefore would drop the traffic.
• You must enable the firewall to Allow forwarding of decrypted content (Device > Setup >
Content-ID).
Network Packet Broker supports:
• Decrypted TLS, non-decrypted TLS, and non-TLS traffic.
• SSL Forward Proxy, SSL Inbound Inspection, and encrypted SSH traffic.
• Routed layer 3 security chains.
• Transparent Bridge layer 1 security chains.
You can configure both routed layer 3 and layer 1 Transparent Bridge security chains
on the same firewall but you must use different pairs of forwarding interfaces for each
type.
PAN-OS® Networking Administrator’s Guide Version 11.0 391 ©2023 Palo Alto Networks, Inc.
Network Packet Broker
• Unidirectional traffic flow through the chain: all traffic to the chain egresses the firewall on
one dedicated interface and returns to the firewall on another dedicated interface, so all traffic
flows in the same direction through the pair of dedicated Network Packet Broker interfaces.
Network Packet Broker does not support multicast, broadcast, or decrypted SSH traffic.
PAN-OS® Networking Administrator’s Guide Version 11.0 392 ©2023 Palo Alto Networks, Inc.
Network Packet Broker
PAN-OS® Networking Administrator’s Guide Version 11.0 393 ©2023 Palo Alto Networks, Inc.
Network Packet Broker
For non-decrypted TLS and non-TLS traffic, the firewall installs the application in the App-ID
cache on the first session, so the firewall treats the traffic as specified in the Network Packet
Broker policy and profile.
For decrypted TLS traffic, on the first session for an application, Network Packet Broker doesn’t
know that the session is being decrypted and sees “ssl” as the application. The underlying specific
application is not yet known or installed in the App-ID cache, so the broker lookup fails and the
traffic bypasses the security chain. The traffic is still subject to any threat inspection configured
on the Security policy allow rule. When the firewall decrypts the traffic, the firewall learns the
specific application and installs it in the App-ID cache. For the second and subsequent decrypted
sessions for the same application, Network Packet Broker lookups succeed because the specific
application is now in the App-ID cache, and the firewall forwards traffic to the security chain as
expected.
PAN-OS® Networking Administrator’s Guide Version 11.0 394 ©2023 Palo Alto Networks, Inc.
Network Packet Broker
You can push the Network Packet Broker license from Panorama to managed
firewalls. You must reboot the firewalls to make the license take effect and update
the user interface.
3. Enable the App-ID cache for Network Packet Broker.
1. The App-ID cache is disabled by default. Enable it using the configuration mode CLI
command:
Verify the settings show that Application cache is set to yes and Use cache for
appid is set to yes:
PAN-OS® Networking Administrator’s Guide Version 11.0 395 ©2023 Palo Alto Networks, Inc.
Network Packet Broker
4. Enable the firewall to Allow forwarding of decrypted content (Device > Setup > Content-ID).
5. Identify the traffic that you want to forward to one or multiple security chains.
6. Identify the topology for each security chain and determine whether to use layer 1 Transparent
Bridge forwarding or routed layer 3 forwarding, which determines what type of security chain
you configure on the firewall. Considerations include:
• Whether you want to load-balance traffic across multiple chains (use a routed layer 3
security chain to distribute sessions across multiple chains through a router, switch, or other
routing device), use a single chain, or use different security chains for different types of
traffic. For multiple layer 1 Transparent Bridge chains, you need a pair of dedicated firewall
interfaces for each security chain because the layer 1 connection is not routed.
• Whether to use unidirectional or bidirectional traffic flow through the security chain.
7. Decide which pairs of firewall interfaces to use as dedicated Network Packet Broker
forwarding interfaces.
• For layer 1 Transparent Bridge chains, you need a pair of dedicated firewall interfaces
for each layer 1 security chain. You can configure policy rules to send specific traffic to
different security chains.
• For routed layer 3 chains, one dedicated pair of firewall interfaces can load balance traffic
among multiple layer 3 security chains through a switch, router, or other routing-capable
device.
• For routed layer 3 chains, you can use multiple pairs of dedicated firewall interfaces to send
specific traffic to different security chains using different policy rules.
Security policy must allow traffic between each paired set of Network Packet Broker
interfaces. The intrazone-default Security policy rule allows traffic within the same
zone by default. However, if you have a “deny all” policy rule earlier in the policy
rulebase, then you must create an explicit allow rule to allow the Network Packet
Broker traffic.
PAN-OS® Networking Administrator’s Guide Version 11.0 396 ©2023 Palo Alto Networks, Inc.
Network Packet Broker
Layer 1 Transparent Bridge security chains cannot failover to another security chain
because they are not routed.
PAN-OS® Networking Administrator’s Guide Version 11.0 397 ©2023 Palo Alto Networks, Inc.
Network Packet Broker
STEP 1 | Enable two Layer 3 Ethernet interfaces as Network Packet Broker forwarding interfaces.
1. Select Network > Interfaces > Ethernet.
2. Select an unused Ethernet interface to use as one of the two Network Packet Broker
forwarding interfaces.
3. Set the Interface Type to Layer3.
4. On the Config tab, select a zone to assign the interface to.
You must configure both of the security chain interfaces in the same zone.
Security policy must allow traffic between each paired set of Network Packet
Broker interfaces. The intrazone-default Security policy rule allows traffic within
the same zone by default. However, if you have a “deny all” policy rule earlier in the
policy rulebase, then you must create an explicit allow rule to allow the Network
Packet Broker traffic.
5. On the Config tab, as a best practice, use or create a dedicated Virtual Router to assign
the interface to. Using a dedicated Virtual Router ensures that the Network Packet Broker
interface traffic remains separate from other traffic.
6. Select Advanced and then select Network Packet Broker to enable the interface.
PAN-OS® Networking Administrator’s Guide Version 11.0 398 ©2023 Palo Alto Networks, Inc.
Network Packet Broker
STEP 2 | Configure a Packet Broker profile to control how to forward the traffic to the layer 1
Transparent Bridge security chain.
1. Select Objects > Packet Broker Profile and Add a new profile or modify an existing profile.
2. Give the profile a Name and Description so that you easily identify its purpose.
3. On the General tab:
• Select Transparent Bridge (Layer 1) as the Security Chain Type.
• Enable IPv6 if the traffic is IPv6 traffic.
• Select the Flow Direction.
To use one firewall interface to forward both the c2s and s2c session flows to the
security chain and use the other firewall interface to receive both session flows back
from the security chain, select Unidirectional.
To use Interface #1 to forward the c2s flow to the security chain and receive the s2c
flow from the security chain, and use Interface #2 to forward the s2c flow to the security
chain and receive the c2s flow from the security chain, select Bidirectional.
• Specify the Network Packet Broker forwarding interface pair in Interface #1 and
Interface #2. Both interfaces must already be enabled for Network Packet Broker (see
Prepare to Deploy Network Packet Broker) to be available for use. Be careful to pay
PAN-OS® Networking Administrator’s Guide Version 11.0 399 ©2023 Palo Alto Networks, Inc.
Network Packet Broker
attention to the directionality of flow when you configure which interface is Interface #1
and which interface is Interface #2.
PAN-OS® Networking Administrator’s Guide Version 11.0 400 ©2023 Palo Alto Networks, Inc.
Network Packet Broker
Condition, the firewall would still consider the connection to be healthy because two of
the health metrics are still OK.
STEP 3 | Configure a Packet Broker policy to define the traffic to forward to the layer 1 Transparent
Bridge security chain.
1. Select Policies > Network Packet Broker and Add a new policy rule or modify an existing
policy rule.
2. On the General tab, give the policy rule a Name and Description so that you easily identify
its purpose, add an Audit Comment, and apply tags if you use them.
3. On the Source tab, identify the source zones, IP addresses, users, and devices of the traffic
that you want the rule to forward to the security chain.
4. On the Destination tab, identify the destination zones, IP addresses, and devices of the
traffic that you want the rule to forward to the security chain.
5. On the Application/Service/Traffic tab, identify the applications and services you want the
rule to forward to the security chain. Unless the rule control applications that you expect to
use non-standard ports such as internal custom applications, the best practice is to set the
Service to Application Default so that applications that exhibit evasive behavior by using
non-standard ports are blocked.
For the Traffic Type, select all of the types of traffic that you want the rule to forward to
the security chain. Forward TLS(Decrypted) Traffic is the default selection. You can select
any combination of Forward TLS(Decrypted) Traffic, Forward TLS(Non-Decrypted), and
Forward Non-TLS Traffic to forward to the security chain.
6. On the Path Selection tab, select the Packet Broker profile you created in Step 2 or create
a new profile to control how to send the traffic that the policy rule controls to the security
chain.
PAN-OS® Networking Administrator’s Guide Version 11.0 401 ©2023 Palo Alto Networks, Inc.
Network Packet Broker
STEP 4 | Repeat Step 1 through Step 3 to create more layer 1 Transparent Bridge security chains.
For each layer 1 Transparent Bridge security chain:
• The two Ethernet interfaces used as Network Packet Broker forwarding interfaces must be
dedicated to each security chain. Ethernet interfaces used for a Transparent Bridge security
chain cannot be used for any other purpose or carry any other traffic.
• Each pair of Network Packet Broker forwarding interfaces connects to one layer 1
Transparent Bridge security chain.
You can load balance traffic by creating Network Packet Broker policy rules that divide traffic
relatively equally among the Transparent Bridge security chains. You can also use policy rules
to direct specific traffic and types of traffic through specific security chains.
Layer 1 Transparent Bridge security chains cannot failover to another security chain
because they are not routed. Use the Health Monitor tab in the Packet Broker profile
to configure how to handle traffic if a Transparent Bridge security chain fails.
PAN-OS® Networking Administrator’s Guide Version 11.0 402 ©2023 Palo Alto Networks, Inc.
Network Packet Broker
Network Packet Broker cannot forward IPv6 traffic on a routed layer 3 security chain. To
forward IPv6 traffic, use a Transparent Bridge (layer 1) security chain.
PAN-OS® Networking Administrator’s Guide Version 11.0 403 ©2023 Palo Alto Networks, Inc.
Network Packet Broker
STEP 1 | Enable two Layer 3 Ethernet interfaces as Network Packet Broker forwarding interfaces.
1. Select Network > Interfaces > Ethernet.
2. Select an unused Ethernet interface to use as one of the two Network Packet Broker
forwarding interfaces.
3. Set the Interface Type to Layer3.
4. On the Config tab, select a zone to assign the interface to.
You must configure both of the security chain interfaces in the same zone.
Security policy must allow traffic between each paired set of Network Packet
Broker interfaces. The intrazone-default Security policy rule allows traffic within
the same zone by default. However, if you have a “deny all” policy rule earlier in the
policy rulebase, then you must create an explicit allow rule to allow the Network
Packet Broker traffic.
5. On the Config tab, as a best practice, use or create a dedicated Virtual Router to assign
the interface to. Using a dedicated Virtual Router ensures that the Network Packet Broker
interface traffic remains separate from other traffic.
6. Select Advanced and then select Network Packet Broker to enable the interface.
PAN-OS® Networking Administrator’s Guide Version 11.0 404 ©2023 Palo Alto Networks, Inc.
Network Packet Broker
STEP 2 | Configure a Packet Broker profile to control how to forward the traffic to the routed layer 3
security chain.
1. Select Objects > Packet Broker Profile and Add a new profile or modify an existing profile.
2. Give the profile a Name and Description so that you easily identify its purpose.
3. On the General tab:
• Select Routed (Layer 3) as the Security Chain Type.
• Select the Flow Direction.
To use one firewall interface to forward both the c2s and s2c session flows to the
security chain and use the other firewall interface to receive both session flows back
from the security chain, select Unidirectional.
To use Interface #1 to forward the c2s flow to the security chain and receive the s2c
flow from the security chain, and use Interface #2 to forward the s2c flow to the security
chain and receive the c2s flow from the security chain, select Bidirectional.
• Specify the Network Packet Broker forwarding interface pair in Interface #1 and
Interface #2. Both interfaces must already be enabled for Network Packet Broker (see
Step 1) to be available for use. Be careful to pay attention to the directionality of flow
when you configure which interface is Interface #1 and which interface is Interface #2.
Session distribution (load balancing) only applies to new sessions. The firewall
does not rebalance traffic in the middle of a session. The firewall only distributes
sessions to security chains whose status is “up” (active, healthy).
4. On the Security Chains tab, Add the IP addresses of the first and last device in each routed
layer 3 security chain to which you want to connect. You must specify at least one security
chain or the firewall can’t route traffic to a chain and you can’t save the profile.
If you specify multiple routed layer 3 security chains, then you also need to place a correctly
configured router, switch, or similar device between the firewall and the security chains to
PAN-OS® Networking Administrator’s Guide Version 11.0 405 ©2023 Palo Alto Networks, Inc.
Network Packet Broker
perform the proper routing. In addition, specify the Session Distribution Method to load
balance the traffic among the security chains.
PAN-OS® Networking Administrator’s Guide Version 11.0 406 ©2023 Palo Alto Networks, Inc.
Network Packet Broker
and executes the action you specified in On Health Check Failure. If you selected AND
Condition, the firewall would still consider the connection to be healthy because two of
the health metrics are still OK.
STEP 3 | Configure a Packet Broker policy to define the traffic to forward to the routed layer 3
security chain.
1. Select Policies > Network Packet Broker and Add a new policy rule or modify an existing
policy rule.
2. On the General tab, give the policy rule a Name and Description so that you easily identify
its purpose, add an Audit Comment, and apply tags if you use them.
3. On the Source tab, identify the source zones, IP addresses, users, and devices of the traffic
that you want the rule to forward to the security chain.
4. On the Destination tab, identify the destination zones, IP addresses, and devices of the
traffic that you want the rule to forward to the security chain.
5. On the Application/Service/Traffic tab, identify the applications and services you want the
rule to forward to the security chain. Unless the rule control applications that you expect to
use non-standard ports such as internal custom applications, the best practice is to set the
Service to Application Default so that applications that exhibit evasive behavior by using
non-standard ports are blocked.
For the Traffic Type, select all of the types of traffic that you want the rule to forward to
the security chain. Forward TLS(Decrypted) Traffic is the default selection. You can select
PAN-OS® Networking Administrator’s Guide Version 11.0 407 ©2023 Palo Alto Networks, Inc.
Network Packet Broker
6. On the Path Selection tab, select the Packet Broker profile you created in Step 2 or create
a new profile to control how to send the traffic that the policy rule controls to the security
chain.
STEP 4 | If you want to create separate routed layer 3 security chains that use different dedicated
pairs of firewall interfaces, then repeat Step 1 through Step 3 to create more Network
Packet Broker security chains. The two layer 3 Ethernet interfaces used as Network Packet
Broker forwarding interfaces must be dedicated to the security chain and cannot be used for
any other purpose or carry any other traffic.
PAN-OS® Networking Administrator’s Guide Version 11.0 408 ©2023 Palo Alto Networks, Inc.
Network Packet Broker
PAN-OS® Networking Administrator’s Guide Version 11.0 409 ©2023 Palo Alto Networks, Inc.
Network Packet Broker
Decryption Broker used Decryption policy rules to forward only decrypted TLS traffic
to the security chain. The new Network Packet Broker policy rules enable you to select
not only decrypted TLS traffic, but also encrypted TLS traffic and non-TLS traffic.
• A new profile (Objects > Packet Broker Profile) replaces the old Objects > Decryption >
Decryption Broker Profile and enables you to configure exactly how to forward traffic to the
security chain and monitor path and latency health. On the General tab, the names of the
fields where you enter the dedicated firewall Network Packet Broker forwarding interface pair
changed from “Primary Interface” and “Secondary Interface” to Interface #1 and Interface #2,
respectively.
• When you select Policies > Network Packet Broker, you can then select any of the Rule Usage
options in Policy Optimizer to view Network Packet Broker policy usage information. Rule
Usage statistics help you evaluate whether you need to keep unused Network Packet Broker
rules or if you can delete them and tighten up the rulebase to reduce the attack surface.
• Because Network Packet Broker replaced Decryption Broker, Decryption policy no longer
handles brokering traffic to a security chain. For that reason, on the Options tab, the Decrypt
and Forward option is no longer an Action that the policy can take, and the Forwarding Profile
field was also removed because now only Decryption profiles are valid on Decryption policies.
• In Network > Interfaces > Ethernet, when you set the Interface Type to Layer 3 and then
select the Advanced tab, the name of the checkbox to enable the interface as forwarding
interface for Network Packet Broker changed from “Decrypt Forward” to Network Packet
Broker.
• For Device > Admin Roles, on the Web UI tab, there are two changes:
• Under Policies, you can now configure Network Packet Broker admin role permissions.
• Under Objects, the Decryption > Forwarding Profile option is removed and replaced by the
Packet Broker Profile option for admin role permissions.
• On firewalls, for Monitor > Manage Custom Reports, when you select Traffic Log from the
Detailed Logs as the Database, in the Available Columns list, you can now select Forwarded to
Security Chain.
On Panorama, for Monitor > Manage Custom Reports, when you select Panorama Traffic
Log from the Detailed Logs as the Database, in the Available Columns list, you can now select
Forwarded to Security Chain.
• In the Traffic log, the “Decrypt Forward” column is renamed Forwarded to Security Chain. In
the detailed view of the Traffic log, in the Flags section, the checkbox “Decrypt Forwarded” is
renamed to Forwarded to Security Chain.
PAN-OS® Networking Administrator’s Guide Version 11.0 410 ©2023 Palo Alto Networks, Inc.
Network Packet Broker
• The free license for the feature is renamed from “Decryption Broker” to Packet Broker. If you
have the free Decryption Broker license on your firewall, the name changes automatically
when you upgrade to PAN-OS 10.1. The change is only in the name and has no effect on the
feature.
PAN-OS® Networking Administrator’s Guide Version 11.0 411 ©2023 Palo Alto Networks, Inc.
Network Packet Broker
You can use Panorama to push a Packet Broker profile that is attached to a Decryption
policy rule to pre-10.1 firewalls that have Decryption Broker licenses installed. The
Action for the rule (Options tab) must be Decrypt and Forward and you must attach
the Packet Broker profile to the rule (Decryption Profile setting on the Options tab).
Pre-11.0 firewalls use the Packet Broker profile as the Decryption Forwarding profile
for Decryption Broker. The Decryption policy rule determines the traffic to which the
firewall applies the profile.
The traffic that the Decryption policy rule controls must be decrypted SSL traffic
(Decryption Broker doesn’t support encrypted SSL traffic or cleartext traffic).
• When you upgrade from PAN-OS 10.0 to PAN-OS 10.1, only local Decryption policy rules
that are used for Decryption Broker are migrated to Network Packet Broker rules. Decryption
Broker policy rules that were pushed from Panorama to firewalls are migrated automatically
on Panorama but are not migrated automatically on the firewall. Decryption Broker policy
rules configured locally on a firewall are migrated to Network Packet Broker rules on that
firewall only. For rules configured on Panorama, Panorama must do another commit push to
the firewall to synchronize the Decryption Broker rules that were migrated to Network Packet
Broker rules on Panorama.
• When you downgrade from PAN-OS 11.0 to PAN-OS 10.0, Network Packet Broker rules are
removed automatically.
Network Packet Broker also has a few usage limitations:
• If the Network Packet Broker firewall also performs source network address translation (SNAT)
and the traffic is cleartext traffic, then the firewall performs NAT on the traffic and forwards
PAN-OS® Networking Administrator’s Guide Version 11.0 412 ©2023 Palo Alto Networks, Inc.
Network Packet Broker
the traffic to the security chain. The security chain appliances only see NAT addresses, not the
original source addresses:
1. The firewall performs NAT on the client’s traffic.
2. The firewall forwards the traffic to the security chain and any routing must be based on the
NAT address.
3. Because the source address in the packet is now the NAT address, the security chain
appliances only see the NAT address. They do not see the actual client source address.
4. When the security chain returns the traffic to the firewall, the result is that the firewall
doesn’t know who the user is.
You can find out who the source user was for a session by checking the Traffic logs for that
session and correlating the packet with those logs. Traffic logs include both the original source
address, from which you can determine the source user, and the SNAT address.
You can avoid this scenario by performing NAT on a device other than the firewall.
PAN-OS® Networking Administrator’s Guide Version 11.0 413 ©2023 Palo Alto Networks, Inc.
Network Packet Broker
PAN-OS® Networking Administrator’s Guide Version 11.0 414 ©2023 Palo Alto Networks, Inc.
Advanced Routing
®
PAN-OS provides an Advanced Routing Engine that allows the firewall to scale and
provide stable, high-performing, and highly available routing functions to large data
centers, ISPs, enterprises, and cloud users. The Advanced Routing Engine simplifies
operations with a standards-based configuration, which reduces your learning curve
since it is similar to that of other router vendors. Protocol configuration profiles and a
granular filtering profile work across multiple logical routers and virtual systems. Route
redistribution is simplified with a redistribution profile. BGP peer groups and peers can
inherit configuration to make BGP more agile.
The Advanced Routing Engine supports static routes, BGP, MP-BGP, OSPFv2,
OSPFv3, RIPv2, IPv4 multicast routing, BFD, redistribution, route filtering into the RIB,
access lists, prefix lists, and route maps.
Use the Advanced Routing Engine Migration Reference to plan your migration from
the legacy routing engine and to see the differences between the legacy and advanced
routing engines and the exceptions.
The following models support the Advanced Routing Engine:
> PA-7000 Series > VM-Series
> PA-5400 Series > M-700 appliance
> PA-5200 Series > M-600 appliance
> PA-3400 Series > M-500 appliance
> PA-3200 Series > M-300 appliance
> PA-400 Series > M-200 appliance
> CN-Series
Learn about advanced routing profiles and perform the following tasks to configure
advanced routing:
> Enable Advanced Routing > Configure OSPFv3 on an Advanced
> Logical Router Overview Routing Engine
> Create Filters for the Advanced > Configure IPv4 Multicast
Routing Engine > Configure MSDP
> Configure OSPFv2 on an Advanced > Create Multicast Routing Profiles
Routing Engine > Create an IPv4 MRoute
> Create OSPF Routing Profiles
415
Advanced Routing
Before you switch to the Advanced Routing Engine, make a backup of your current
configuration.
Similarly, if you configure Panorama with a template that enables or disables Advanced Routing,
after you commit and push the template to devices, you must reboot the devices in the template
for the change to take effect.
When configuring Panorama, create device groups and Templates for devices that all use
the same Advanced Routing setting (all enabled or all disabled). Panorama won’t push
configurations with Advanced Routing enabled to lower-end firewalls that don’t support
Advanced Routing. For those firewalls, Panorama will push a legacy configuration if one is
present.
The Advanced Routing Engine supports multiple logical routers (known as virtual routers on the
legacy routing engine). The number of logical routers supported depends on the firewall model
and is the same as the number of virtual routers supported on the legacy routing engine. The
Advanced Routing Engine has more convenient menu options and there are many settings that
you can easily configure in a profile (authentication, timers, address family, or redistribution
profile) that you apply to a BGP peer group or peer, for example. There are also many static route,
OSPF, OSPFv3, RIPv2, multicast, and BFD settings on the Advanced Routing Engine.
The Advanced Routing Engine supports RIB filtering, which means you can create a route map to
match static routes or routes received from other routing protocols and thus filter which routes
are installed in the RIB for the logical router. This function is useful on firewalls with a smaller
RIB or FIB capacity; you can still propagate the necessary routing updates without using memory
needed elsewhere.
STEP 1 | Make a backup of your current configuration before you enable Advanced Routing.
PAN-OS® Networking Administrator’s Guide Version 11.0 416 ©2023 Palo Alto Networks, Inc.
Advanced Routing
3. Before you click OK, make sure you have made a backup of your configuration for the
legacy routing engine.
4. Click OK.
5. A warning appears:
Select Yes to have the migration script convert each virtual router to a logical router
and migrate your configuration to the advanced routing engine. (Select Skip to restart
PAN-OS® Networking Administrator’s Guide Version 11.0 417 ©2023 Palo Alto Networks, Inc.
Advanced Routing
the system with an empty configuration. Select Cancel to cancel the process to enable
Advanced Routing.)
6. Click OK to approve the migration.
7. The virtual routers, links to the logical routers, and their color-coded status are listed.
Resolve any issues that require user intervention. Select Continue
9. If this is a new firewall (no existing configuration), Commit and then select Device >
Setup > Operations and Reboot Device. Then log back into the firewall.
For a firewall with a pre-existing configuration, you will commit and reboot after
configuring a logical router.
PAN-OS® Networking Administrator’s Guide Version 11.0 418 ©2023 Palo Alto Networks, Inc.
Advanced Routing
STEP 4 | Select Interfaces and configure one or more Layer 3 interfaces with a static IP address or as
a DHCPv4 client to received a dynamically assigned address.
PAN-OS® Networking Administrator’s Guide Version 11.0 419 ©2023 Palo Alto Networks, Inc.
Advanced Routing
STEP 5 | (Optional) Create an Admin Role Profile to control granular access to logical routers and
routing profiles for an Advanced Routing Engine.
1. Select Device > Admin Roles and Add an Admin Role Profile by Name.
2. Select Web UI.
3. Enable, Disable, or select Read Only the following options: Network, Routing, Logical
Routers, Routing Profiles, BGP, BFD, OSPF, OSPFv3, RIPv2, Filters, and Multicast
(default is Enable).
4. Click OK.
5. Assign the role to an administrator. Configure a Firewall Administrator Account.
PAN-OS® Networking Administrator’s Guide Version 11.0 420 ©2023 Palo Alto Networks, Inc.
Advanced Routing
PAN-OS® Networking Administrator’s Guide Version 11.0 421 ©2023 Palo Alto Networks, Inc.
Advanced Routing
PAN-OS® Networking Administrator’s Guide Version 11.0 422 ©2023 Palo Alto Networks, Inc.
Advanced Routing
STEP 3 | (Optional) Select Administrative Distances to change the global administrative distance
(from the default setting) for various types of routes.
PAN-OS® Networking Administrator’s Guide Version 11.0 423 ©2023 Palo Alto Networks, Inc.
Advanced Routing
STEP 5 | (On a firewall supporting multiple virtual systems) Assign the logical routers to a virtual
system.
1. Select Device > Virtual Systems and select a virtual system and General.
2. Add one or more Logical Routers.
3. Click OK.
STEP 7 | (Optional) Configure ECMP for a logical router by navigating to Network > Routing > Logical
Routers, selecting a logical router, and then General > ECMP. Configure ECMP for a logical
router much as you would for a virtual router on a legacy routing engine.
STEP 9 | For a firewall with a pre-existing configuration, select Device > Setup > Operations and
Reboot Device. Then log back into the firewall.
PAN-OS® Networking Administrator’s Guide Version 11.0 424 ©2023 Palo Alto Networks, Inc.
Advanced Routing
3. To see entries in the Forwarding Information Base (FIB), select Forwarding Table.
4. Select Static Route Monitoring to see the static routes you are monitoring.
5. Select the BGP tab and then Summary to see BGP settings.
6. Select Peer to see BGP peer settings.
7. Select Peer Group to see BGP peer group settings.
8. Select Route and Display Address Family: IPv4 and IPv6, IPv4 Only, or IPv6 Only to see
the attributes of BGP routes.
STEP 11 | Access the CLI to view advanced routing information. The PAN-OS CLI Quick Start lists the
commands in the CLI Cheat Sheet: Networking.
PAN-OS® Networking Administrator’s Guide Version 11.0 425 ©2023 Palo Alto Networks, Inc.
Advanced Routing
PAN-OS® Networking Administrator’s Guide Version 11.0 426 ©2023 Palo Alto Networks, Inc.
Advanced Routing
of type IP Netmask. The address object must have a netmask of /32 for IPv4 or /128
for IPv6.
• Next LR—Select to make the next logical router (in the list of logical routers) the next
hop.
• FQDN—Enter a Fully Qualified Domain Name.
• Discard—Select to drop packets that are addressed to this destination.
• None—Select if there is no next hop for the route. For example, a point-to-point
connection does not require a next hop because there is only one way for packets to
go.
6. Enter the Admin Dist for the static route (range is 10 to 240; default is 10). This value
overrides the Static or Static IPv6 administrative distance specified for the logical router.
7. Enter a Metric for the static route (range is 1 to 65,535; default is 10).
8. (Optional) If you want to use BFD, select a BFD Profile you created, or select the default
profile, or create a BFD profile to apply to the static route; default is None (Disable
BFD).
STEP 3 | (Optional) Configure path monitoring for the static route; you can monitor up to 128 static
routes.
1. Select Path Monitoring to allow configuration of path monitoring (default is disabled).
2. Enable path monitoring (default is disabled).
3. Failure Condition determines whether path monitoring for the static route is based
on one (any) or all monitored destinations. Select whether Any or All of the monitored
destinations for the static route must be unreachable by ICMP for the firewall to remove
PAN-OS® Networking Administrator’s Guide Version 11.0 427 ©2023 Palo Alto Networks, Inc.
Advanced Routing
the static route from the RIB and FIB and add the static route that has the next lowest
metric (going to the same destination) to the FiB.
Select All to avoid the possibility of any single monitored destination signaling a
route failure when the destination is simply offline for maintenance, for example.
4. (Optional) Specify the Preemptive Hold Time (min), the number of minutes a downed
path monitor must remain in Up state before the firewall reinstalls the static route into
the RIB; range is 0 to 1,440; default is 2. A setting of 0 (zero) causes the firewall to
reinstall the route into the RIB immediately upon the path monitor coming up.
The path monitor evaluates all of its monitored destinations for the static route
and comes up based on the Any or All failure condition. If a link goes down or flaps
during the hold time, when the link comes back up, the path monitor resumes and the
Preemptive Hold Time is reset, causing the timer to restart from zero.
5. Add a path monitoring destination by Name.
PAN-OS® Networking Administrator’s Guide Version 11.0 428 ©2023 Palo Alto Networks, Inc.
Advanced Routing
Interfaces > Ethernet and in the row for the Ethernet interface, click on Dynamic
DHCP Client. The IP Address displays in the Dynamic IP Interface Status window.
8. For Destination IP, enter an IP address or address object to which the firewall will
monitor the path. The monitored destination and static route destination must use the
same address family (IPv4 or IPv6).
PAN-OS® Networking Administrator’s Guide Version 11.0 429 ©2023 Palo Alto Networks, Inc.
Advanced Routing
STEP 4 | (Optional) Control the static routes that are placed in the global RIB.
You might configure static routes and redistribute them, but not want them in the protocol’s
local route table or global RIB. You might want to add only specific static routes to the global
RIB.
1. Select Network > Routing > Logical Routers and select a logical router.
2. Select RIB Filter to allow routes into or prevent routes from being added to the global
RIB.
3. To filter IPv4 static routes and connected routes, for Static Route-Map, select a
Redistribution Route Map or create a new one.
4. To filter IPv6 static routes and connected routes, for Static Route-Map, select a
Redistribution Route Map or create a new one.
5. Click OK.
STEP 5 | (Optional) Change the default administrative distances for static IPv4 and static IPv6 routes
within a logical router.
STEP 7 | Access the CLI to view the static route path monitor: show advanced-routing
static-route-path-monitor. The PAN-OS CLI Quick Start lists additional commands in
the CLI Cheat Sheet: Networking.
PAN-OS® Networking Administrator’s Guide Version 11.0 430 ©2023 Palo Alto Networks, Inc.
Advanced Routing
PAN-OS® Networking Administrator’s Guide Version 11.0 431 ©2023 Palo Alto Networks, Inc.
Advanced Routing
3. Assign a Router ID to BGP for the logical router, which is typically an IPv4 address to
ensure the Router ID is unique.
4. Assign the Local AS, which is the number of the AS to which the logical router belongs;
range is 1 to 4,294,967,295.
5. If you want to apply BFD to BGP, for Global BFD Profile select a BFD profile you
created, or select the default profile, or create a new BFD profile; default is None
(Disable BFD).
6. Select Install Route to install learned BGP routes into the global routing table; default is
disabled.
7. Select Fast Failover to have BGP terminate a session with an adjacent peer if the link to
that peer goes down, without waiting for the Hold Time to expire; default is enabled.
8. Select Graceful Shutdown to have BGP lower the preference of eBGP peering links
during a maintenance operation so that BGP can choose and propagate alternative
paths, based on RFC 8326; default is disabled.
9. Select ECMP Multiple AS Support if you configured ECMP and you want to run ECMP
over multiple BGP autonomous systems; default is disabled.
10. Enforce First AS to cause the firewall to drop an incoming Update packet from an eBGP
peer that does not list the eBGP peer’s own AS number as the first AS number in the
AS_PATH attribute; default is enabled.
11. Specify the Default Local Preference that can be used to determine preferences among
different paths; range is 0 to 4,294,967,295; default is 100.
PAN-OS® Networking Administrator’s Guide Version 11.0 432 ©2023 Palo Alto Networks, Inc.
Advanced Routing
PAN-OS® Networking Administrator’s Guide Version 11.0 433 ©2023 Palo Alto Networks, Inc.
Advanced Routing
and dots. A space is not allowed. The name must be unique within the logical router and
across all logical routers.
A BGP Filtering Profile describes how to configure many BGP options for IPv4,
such as import or export BGP routes, accept or prevent routes being added to
the local BGP RIB, conditionally advertise routes, and unsuppress dampened or
summarized routes.
8. To apply IPv6 Filtering Profile options to the peer group, select a BGP Filtering Profile
that you created or create a new BGP Filtering profile; the default is None.
A BGP Filtering Profile describes how to configure many BGP options for IPv6,
such as import or export BGP routes, accept or prevent routes being added to
the local BGP RIB, conditionally advertise routes, and unsuppress dampened or
summarized routes.
PAN-OS® Networking Administrator’s Guide Version 11.0 434 ©2023 Palo Alto Networks, Inc.
Advanced Routing
9. For Connection Options, select an Auth Profile or create a new BGP Authentication
profile to control MD5 authentication between BGP peers in the peer group. Default is
None.
10. Select a Timer Profile or create a new BGP Timer Profile to control various BGP timers
that affect keepalive and update messages that advertise routes. Default is None.
11. Set Multi Hop—the time-to-live (TTL) value in the IP header (range is 0 to 255; default is
0). The default value of 0 means 1 for eBGP. The default value of 0 means 255 for iBGP.
12. Select a Dampening Profile or create a new Dampening Profile to determine how to
penalize a flapping route to suppress it from being used until it stabilizes. Default is
None.
PAN-OS® Networking Administrator’s Guide Version 11.0 435 ©2023 Palo Alto Networks, Inc.
Advanced Routing
alphanumeric characters, underscores, hyphens and dots. A space is not allowed. The
name must be unique within the logical router and across all logical routers.
2. Enable the peer; default is enabled.
3. Select Passive to prevent the peer from initiating a session with its neighbors; default is
disabled.
4. Enter the Peer AS to which the peer belongs; range is 1 to 4,294,967,295.
5. Select Addressing and select whether the peer will Inherit IPv4 and IPv6 AFI and
filtering profiles from the peer group: Yes (default) or No.
6. If you chose Yes, specify the following for the peer:
• For Local Address, select the Interface for which you are configuring BGP. If the
interface has more than one IP address, select the IP Address for that interface to be
the BGP peer.
• For Peer Address, select either IP and select the IP address or select or create an
address object, or select FQDN and enter the FQDN or address object that is type
FQDN.
The firewall uses only one IP address (from each IPv4 or IPv6 address type) from
the DNS resolution of the FQDN. If the DNS resolution returns more than one
address, the firewall uses the preferred IP address that matches the IP family
type (IPv4 or IPv6) configured for the BGP peer. The preferred IP address is the
first address the DNS server returns in its initial response. The firewall retains
this address as preferred as long as the address appears in subsequent responses
regardless of its order.
7. If you chose No for Inherit addressing from the peer group, specify the following for the
peer:
PAN-OS® Networking Administrator’s Guide Version 11.0 436 ©2023 Palo Alto Networks, Inc.
Advanced Routing
• To specify many IPv4 Address Family options for the peer, select an AFI Profile that
you created, select the default profile, select inherit (Inherit from Peer-Group), or
create a new BGP Address Family profile; the default is none (Disable IPv4 AFI).
The AFI Profile allows you to specify that the peer is a Route Reflector client.
The Route Reflector reflects all the advertisements from all its peers to all the
other peers, thus avoiding the need for the iBGP to be fully meshed. If you
declare the peer a Route Reflector client, the BGP process reflects all of the
updates to that peer.
• To specify many IPv6 Address Family options for the peer, select an AFI Profile that
you created, select inherit (Inherit from Peer-Group), or create a new BGP Address
Family profile; the default is none (Disable IPv6 AFI).
The AFI Profile allows you to specify that the peer is a Route Reflector client.
The Route Reflector reflects all the advertisements from all its peers to all the
other peers, thus avoiding the need for the iBGP to be fully meshed. If you
declare the peer a Route Reflector client, the BGP process reflects all of the
updates to that peer.
• To apply IPv4 Filtering Profile options to the peer, select a BGP Filtering Profile that
you created, select inherit (Inherit from Peer-Group), or create a new BGP Filtering
profile; the default is none (Disable IPv4 Filtering).
• To apply IPv6 Filtering Profile options to the peer, select a BGP Filtering Profile that
you created, select inherit (Inherit from Peer-Group), or create a new BGP Filtering
profile; the default is none (Disable IPv6 Filtering).
• For Local Address, select the Interface for which you are configuring BGP. If the
interface has more than one IP Address, select the IP address for that interface to be
the BGP peer.
• For Peer Address, select either IP and select the IP address or select or create an
address object, or select FQDN and enter the FQDN or address object that is type
FQDN.
PAN-OS® Networking Administrator’s Guide Version 11.0 437 ©2023 Palo Alto Networks, Inc.
Advanced Routing
A BGP peer group (or a peer) can have both an IPv4 Address Family profile and
an IPv6 Address Family profile applied to it. All peers belonging to that peer
group will automatically have Addressing set to Inherit No. All peers in the peer
group will also have IPv4 Address Family profile, IPv6 Address Family profile,
IPv4 Filtering Profile, and IPv6 Filtering Profile set to none by default. In order
for routing to function properly, the peering interface must have both an IPv4
address and IPv6 address assigned. You can select inherit (Inherit from Peer-
Group) or override the peer group by selecting a specific profile for the peer. For
example, you can configure a peer to inherit the IPv4 Address Family profile and
inherit the IPv4 Filtering Profile, and select an IPv6 Address Family profile and
IPv6 Filtering Profile to override those profiles from the peer group.
8. Select Connection Options for the peer in order to apply settings that differ from those
of the peer group.
PAN-OS® Networking Administrator’s Guide Version 11.0 438 ©2023 Palo Alto Networks, Inc.
Advanced Routing
9. Select an Auth Profile, inherit (Inherit from Peer-Group) (the default), or create a new
BGP Authentication profile to control MD5 authentication between BGP peers.
10. Select a Timer Profile, inherit (Inherit from Peer-Group) (the default), create a new BGP
Timer Profile, or select the default profile to control various BGP timers that affect
keepalive and update messages that advertise routes.
11. Set Multi Hop, which is the time-to-live (TTL) value in the IP header (range is 0 to 255).
The default setting is inherit (Inherit from Peer-Group).
12. Select a Dampening Profile, inherit (Inherit from Peer-Group) (the default), or create
a new Dampening Profile to determine how to penalize a flapping route to suppress it
from being used until it stabilizes.
13. Select Advanced and Enable Sender Side Loop Detection to have the firewall check the
AS_PATH attribute of a route in its FIB before it sends the route in an Update, to ensure
PAN-OS® Networking Administrator’s Guide Version 11.0 439 ©2023 Palo Alto Networks, Inc.
Advanced Routing
that the peer AS number is not on the AS_PATH list. If it is, the firewall removes the AS
number to prevent a routing loop.
14. To apply a BFD Profile to the peer (which overrides the BFD setting for BGP, as long as
BFD is not disabled for BGP at the logical router level), select one of the following:
• The default profile.
• An existing BFD profile.
• Inherit-lr-global-setting (Inherit Protocol’s Global BFD Profile) (default)—Peer inherits
the BFD profile that you selected globally for BGP for the logical router.
• None (Disable BFD) for the peer.
• Create a new BFD profile.
1. Select Network.
2. Always Advertise Network Route (default is enabled) to always advertise the configured
network routes to BGP peers, regardless of whether they are reachable or not. If this is
PAN-OS® Networking Administrator’s Guide Version 11.0 440 ©2023 Palo Alto Networks, Inc.
Advanced Routing
unchecked, the firewall advertises the network routes only if they are resolved using the
local route table.
3. Select IPv4 or IPv6 to select type of prefix.
4. Add a Network prefix to advertise to neighbors.
5. Select Unicast to advertise this network route in the Unicast Address Family; default is
enabled. If unchecked, the firewall does not advertise the route in the Unicast SAFI.
6. (IPv4 only) Select Multicast to advertise this network route into the Multicast Address
Family. Default is disabled; the firewall does not advertise this network route in the
Multicast SAFI.
7. (IPv4 only) Select Backdoor to prevent BGP from advertising the prefix outside of the AS
and instead to keep the route within the AS. A backdoor is a BGP route that has a higher
administrative distance than an IGP route. Internally, the administrative distance for the
prefix is increased so that the prefix isn’t preferred, but is still available if needed, in the
event of a link failure elsewhere. Default is disabled.
PAN-OS® Networking Administrator’s Guide Version 11.0 441 ©2023 Palo Alto Networks, Inc.
Advanced Routing
STEP 6 | Redistribute static, connected, OSPF, OSPFv3, or RIPv2 routes into BGP.
Within a BGP Redistribution Profile, use the flexibility of route maps to specify
conditions that determine which routes to redistribute and to specify which attributes
to set.
1. Select Redistribution.
2. To redistribute IPv4 routes, for IPv4 Redistribution Profile -- Unicast, select a BGP
Redistribution profile or create a new Redistribution profile; default is None.
3. To redistribute IPv6 routes, for IPv6 Redistribution Profile -- Unicast, select a BGP
Redistribution profile or create a new Redistribution profile; default is None.
STEP 7 | Create an aggregate route policy to summarize routes that BGP learns and then advertises to
peers.
1. Select Aggregate Route and Add an aggregate route policy by Name (maximum of 63
characters). The name must start with an alphanumeric character, underscore (_), hyphen
(-), or dot (.) and can contain alphanumeric characters, underscores, hyphens and dots. A
space is not allowed.
2. Enter a helpful Description of the policy.
3. Enable the policy.
4. Select Summary Only to advertise to neighbors only the Summary Prefix and not the
routes that were summarized; this reduces traffic and avoids increasing the size of the
neighbors’ routing tables unnecessarily (default is disabled). If you want to advertise both
PAN-OS® Networking Administrator’s Guide Version 11.0 442 ©2023 Palo Alto Networks, Inc.
Advanced Routing
the aggregate route and the individual routes that make up the aggregate route, leave
Summary Only unchecked.
Summary Only and Suppress Map are mutually exclusive; you cannot specify
both.
If you want to use Summary Only, but you also want to advertise an individual
route, then you create a BGP Filtering Profile that includes an Unsuppress Map
route map that matches on the individual route.
5. Select AS Set to advertise the prefix with the list of AS numbers that make up the
aggregate route; default is disabled.
6. Select Aggregate Same MED Only to cause route aggregation only if routes have the
same Multi-Exit Discriminator (MED) values; default is enabled.
7. Select the Type of aggregate route: IPv4 or IPv6.
8. Calculate the routes you want to summarize and then enter the Summary Prefix that
spans those routes, by specifying an IP address/netmask or address object.
9. To prevent individual routes from being aggregated (suppress the aggregation), select
a Suppress Map route map or create a new BGP route map whose match criterion
specifies an IPv4 or IPv6 address Access List or Prefix List that includes those routes;
default is None.
Remember that the purpose of the Suppress route map is to prevent certain
routes from being aggregated in an advertisement. Therefore, in the route map
you permit the routes that you want to suppress from being aggregated (you
don’t deny the routes that you want to suppress from being aggregated).
Summary Only and Suppress Map are mutually exclusive; you cannot specify
both.
10. To set attribute information for the Summary Prefix (which has no attributes because
you just created that combination of routes), select an Attribute Map route map or
create a new BGP route map and set the attributes for the Summary Prefix (no match
criteria). If there is no route map (None), the Summary Prefix will have the default
attributes. Default is None.
PAN-OS® Networking Administrator’s Guide Version 11.0 443 ©2023 Palo Alto Networks, Inc.
Advanced Routing
STEP 9 | (Optional) Control BGP routes that are placed in the global RIB.
You might learn routes and redistribute them, but not want them in the protocol’s local route
table or global RIB. You might want to add only specific routes to the global RIB.
1. Select Network > Routing > Logical Routers and select a logical router.
2. Select RIB Filter to allow routes into or prevent routes from being added to the global
RIB.
3. To filter IPv4 BGP routes, in the IPv4 area, for BGP Route-Map, select a Redistribution
Route Map or create a new one.
4. To filter IPv6 BGP routes, in the IPv6 area, for BGP Route-Map, select a Redistribution
Route Map or create a new one.
5. Click OK.
PAN-OS® Networking Administrator’s Guide Version 11.0 444 ©2023 Palo Alto Networks, Inc.
Advanced Routing
PAN-OS® Networking Administrator’s Guide Version 11.0 445 ©2023 Palo Alto Networks, Inc.
Advanced Routing
2. Add a BGP Auth Profile by Name (a maximum of 63 characters) to identify the profile.
The name must start with an alphanumeric character, underscore (_), hyphen (-), or dot (.)
and can contain alphanumeric characters, underscores, hyphens and dots. A space is not
allowed.
3. Enter the Secret and Confirm Secret. The Secret is used as a key in MD5 authentication.
4. Click OK.
3. If the default BGP Timer Profile settings are not what you need, Add a BGP
Timer Profile by Name (a maximum of 63 characters). The name must start with
an alphanumeric character, underscore (_), hyphen (-), or dot (.) and can contain
alphanumeric characters, underscores, hyphens and dots. A space is not allowed.
4. Set the Keep Alive Interval (sec)—the interval, in seconds, at which the BGP speaker
sends Keepalives to the peer (range is 0 to 1,200; default is 30). If no Keepalive is
received from a peer during a Hold Time interval, the BGP peering is closed. Often, the
PAN-OS® Networking Administrator’s Guide Version 11.0 446 ©2023 Palo Alto Networks, Inc.
Advanced Routing
Hold Time is three times the Keep Alive Interval to allow for three missed Keepalives
before BGP peering is brought down.
5. Set the Hold Time (sec)—the length of time, in seconds, that may elapse between
successive Keepalive or Update messages from the peer before the peer connection is
closed (range is 3 to 3,600; default is 90).
6. Set the Reconnect Retry Interval—the number of seconds to wait in Idle state before
retrying to connect to the peer (range is 1 to 3,600; default is 15).
7. Set the Open Delay Time (sec)—the number of seconds of delay between opening the
TCP connection to the peer and sending the first BGP Open message to establish a BGP
connection (range is 0 to 240; default is 0).
8. Set the Minimum Route Advertise Interval (sec)—the minimum amount of time, in
seconds, that must elapse between an advertisement and/or withdrawal of routes to a
particular destination by a BGP speaker to a peer (range is 1 to 600; default is 30).
9. Click OK.
PAN-OS® Networking Administrator’s Guide Version 11.0 447 ©2023 Palo Alto Networks, Inc.
Advanced Routing
STEP 3 | To use MP-BGP, create a BGP Address Family Identifier (AFI) profile of shared attributes.
1. Select Network > Routing > Routing Profiles > BGP.
2. Add a BGP Address Family Profile by Name (a maximum of 63 characters). The name
must start with an alphanumeric character, underscore (_), hyphen (-), or dot (.) and can
contain alphanumeric characters, underscores, hyphens and dots. A space is not allowed.
5. On the unicast tab, Enable SAFI to enable the unicast SAFI for the profile. On the
multicast tab, Enable SAFI to enable the multicast SAFI for the profile. If Enable SAFI is
checked for both unicast and multicast, both SAFI are enabled. At least one SAFI must
be enabled for the BGP profile to be valid.
6. Select Soft reconfiguration of peer with stored routes to cause the firewall to perform
a soft reset of itself after settings of any of its BGP peers are updated. (Enabled by
default.)
7. Advertise all paths to peers— to have BGP advertise all known paths to neighbor in
order to preserve multipath capabilities inside a network.
8. Advertise the bestpath for each neighboring AS to have BGP advertise the best known
paths to neighbors in order to preserve multipath capabilities inside a network. Disable
this if you want to advertise the same path to all autonomous systems.
9. Override ASNs in outbound updates if AS-Path equals Remote-AS—This setting is
helpful if you have multiple sites belonging to the same AS number (AS 64512, for
PAN-OS® Networking Administrator’s Guide Version 11.0 448 ©2023 Palo Alto Networks, Inc.
Advanced Routing
example) and there is another AS between them. A router between the two sites
receives an Update advertising a route that can access AS 64512. To avoid the second
site dropping the Update because it is also in AS 64512, the intermediate router replaces
AS 64512 with its own AS number (ASN), AS 64522, for example.
10. Enable Route Reflector Client to make the BGP peer a Route Reflector client in an IBGP
network.
11. Originate Default Route—Select to generate a default route and place it in the local BGP
RIB.
12. Default Originate Route-Map—Select or create a route map to control the attributes of
the default route.
13. Allow AS in:
• Origin—Accept routes even if the firewall’s own AS is present in the AS_PATH.
• Occurrence—Number of times the firewall’s own AS can be in the AS_PATH.
• None—(default setting) No action taken.
14. Number Prefixes—Maximum number of prefixes to accept (learn) from the peer. Range is
1 to 4,294,967,295; default is 1,000.
15. Threshold—Percentage of the maximum number of prefixes. The prefixes are added to
the BGP local RIB. If the peer advertises more than the threshold, the firewall takes the
specified action (Warning Only or Restart). Range is 1 to 100; default is 100.
16. Action—Warning Only message in system logs or Restart the BGP peer connection after
the maximum number of prefixes is exceeded.
17. Select the Next Hop:
• Self—Causes the firewall to change the Next Hop address (in Updates it receives) to
its own IP address in the Update before sending it on. This is helpful when the firewall
is communicating with an EBGP router (in another AS) and with an IBGP router (in its
own AS). For example, suppose the Next Hop address in a BGP Update that arrives
at AS 64512 is the IP address of the egress interface of Router 2 where the Update
egressed AS 64518. The Update indicates that to reach networks that Router 2 is
advertising, use the Next Hop address of Router 2. However, if the firewall sends
that Update to an iBGP neighbor in AS 64512, the unchanged Next Hop of Router
2 is outside AS 64512 and the iBGP neighbor does not have a route to it. When you
select Self, the firewall changes the Next Hop to its own IP address so that an iBGP
PAN-OS® Networking Administrator’s Guide Version 11.0 449 ©2023 Palo Alto Networks, Inc.
Advanced Routing
neighbor can use that Next Hop to reach the firewall, which in turn can reach the
eBGP router.
• Self Force—Force set the next hop to self for the reflected routes.
• None—(default setting) Keep the original Next Hop in the attribute.
18. To have BGP remove private AS numbers from the AS_PATH attribute in Updates that
the firewall sends to a peer in another AS, in Remove Private AS, select one of the
following:
• All—Remove all private AS numbers.
• Replace AS—Replace all private AS numbers with the firewall’s AS number.
• None—(default setting) No action taken.
19. For Send Community, select the type of BGP community attribute to send in outbound
Update packets:
• All—Send all communities.
• Both—Send standard and extended communities.
• Extended—Send extended communities (RFC 4360).
• Large—Send large communities (RFC 8092).
• Standard—Send standard communities (RFC 1997).
• None—(default setting) Do not send any communities.
20. For ORF List—Advertise the ability of the peer group or peer to send a prefix list and/
or receive a prefix list to implement outbound route filtering (ORF) at the source, and
thereby minimize sending or receiving unwanted prefixes in Updates. Select an ORF
capability setting:
• none—(default setting) The peer group or peer (where this AFI profile is applied) has
no ORF capability.
• both—Advertise that the peer group or peer (where this AFI profile is applied) can
send a prefix list and receive a prefix list to implement ORF.
• receive—Advertise that the peer group or peer (where this AFI profile is applied) can
receive a prefix list to implement ORF. The local peer receives the remote peer’s ORF
capability and prefix list, which it implements as an outbound route filter.
• send—Advertise that the peer group or peer (where this AFI profile is applied)
can send a prefix list to implement ORF. The remote peer (with receive capability)
PAN-OS® Networking Administrator’s Guide Version 11.0 450 ©2023 Palo Alto Networks, Inc.
Advanced Routing
receives the ORF capability and implements the prefix list it received as an outbound
route filter when advertising routes to the sender.
ORF is a solution to two potential problems: a) wasting bandwidth by advertising
unwanted routes and b) filtering route prefixes that perhaps the receiving peer wants.
Implement ORF by doing the following:
1. Specify ORF capability in the Address Family profile.
2. For a peer group or peer that is a sender (send or both capability), create a prefix list
containing the set of prefixes the peer group/peer wants to receive.
3. Create a BGP Filtering profile and in the Inbound Prefix List, select the prefix list you
created.
4. For the BGP peer group, select the Address Family profile you created to apply it to
the peer group. In the case of the sender, also select the Filtering Profile you created
(which indicates the prefix list). If the peer group or peer is an ORF receiver only, it
does not need the Filtering Profile; it needs only the Address Family profile to indicate
ORF receive capability.
21. Click OK.
PAN-OS® Networking Administrator’s Guide Version 11.0 451 ©2023 Palo Alto Networks, Inc.
Advanced Routing
the previous value (500). Successive cuts continue until the stability metric is less than
half of the Reuse Limit, and then the stability metric is removed from the route.
7. Maximum Suppress Time (min)—Enter the maximum number of minutes a route can be
suppressed, regardless of how unstable it has been. Range is 1 to 255; default is 60.
8. Click OK.
STEP 5 | Create a BGP Redistribution Profile to redistribute static, connected, and OSPF routes (that
match the corresponding route map) to BGP.
1. Select Network > Routing > Routing Profiles > BGP.
2. Add a BGP Redistribution Profile by Name (a maximum of 63 characters). The name
must start with an alphanumeric character, underscore (_), hyphen (-), or dot (.) and can
contain alphanumeric characters, underscores, hyphens and dots. A space is not allowed.
3. Select the AFI of routes to redistribute: IPv4 or IPv6.
PAN-OS® Networking Administrator’s Guide Version 11.0 452 ©2023 Palo Alto Networks, Inc.
Advanced Routing
and Metric Value, they are applied to the redistributed route. Otherwise, the Metric
configured on this redistribution profile is applied to the redistributed route.
8. Select Connected to configure connected route redistribution.
9. Enable redistribution of locally connected IPv4 or IPv6 routes (based on the AFI you
selected).
10. Configure the Metric to apply to the connected routes being redistributed into BGP
(range is 1 to 65,535).
11. Select a Route Map to specify the match criteria that determine which connected routes
to redistribute. Default is None. If the route map Set configuration includes a Metric
Action and Metric Value, they are applied to the redistributed route. Otherwise, the
Metric configured on this redistribution profile is applied to the redistributed route.
12. (IPv4 AFI only) Select OSPFv2 to configure OSPFv2 route redistribution.
13. Enable redistribution of OSPFv2 routes.
14. Configure the Metric to apply to the OSPF routes being redistributed into BGP (range is
1 to 65,535).
15. Select a Route-Map to specify the match criteria that determine which OSPF routes to
redistribute. Default is None. If the route map Set configuration includes a Metric Action
and Metric Value, they are applied to the redistributed route. Otherwise, the Metric
configured on this redistribution profile is applied to the redistributed route.
16. (IPv4 AFI only) Select RIPv2 to configure RIPv2 route redistribution.
17. Enable redistribution of RIPv2 routes.
18. Configure the Metric to apply to the RIP routes being redistributed into BGP (range is 1
to 65,535).
19. Select a Route-Map to specify the match criteria that determine which RIP routes to
redistribute. Default is None. If the route map Set configuration includes a Metric Action
and Metric Value, they are applied to the redistributed route. Otherwise, the Metric
configured on this redistribution profile is applied to the redistributed route.
20. (IPv6 AFI only) Select OSPFv3 to configure OSPFv3 route redistribution.
21. Enable redistribution of OSPFv3 routes.
22. Configure the Metric to apply to the OSPFv3 routes being redistributed into BGP (range
is 1 to 65,535).
23. Select a Route-Map to specify the match criteria that determine which OSPFv3 routes
to redistribute. Default is None. If the route map Set configuration includes a Metric
Action and Metric Value, they are applied to the redistributed route. Otherwise, the
Metric configured on this redistribution profile is applied to the redistributed route.
24. Click OK.
PAN-OS® Networking Administrator’s Guide Version 11.0 453 ©2023 Palo Alto Networks, Inc.
Advanced Routing
PAN-OS® Networking Administrator’s Guide Version 11.0 454 ©2023 Palo Alto Networks, Inc.
Advanced Routing
options). For example, you can control route preference by prepending an AS to the AS
Path of a route.
PAN-OS® Networking Administrator’s Guide Version 11.0 455 ©2023 Palo Alto Networks, Inc.
Advanced Routing
suppressed because they met dampening criteria, but you want specific routes to be
advertised (unsuppressed).
17. (IPv4 AFI only) Select Multicast to filter MP-BGP Multicast routes. Select Inherit from
Unicast if you want all filtering from the Unicast SAFI to also apply to the Multicast SAFI.
Otherwise, continue to configure the following filtering fields.
18. For Multicast, Inbound Filter List —Specify an AS Path access list or create a new AS
Path access list to specify that, when receiving routes from peers, only routes with the
same AS Path are imported from the peer group or peer, meaning added to the local
BGP RIB.
19. In the Network Filter area, Inbound—Distribute List—Use an access list (Source Address
only; not Destination Address) to filter BGP routing information that BGP receives.
Mutually exclusive with Inbound Prefix List in a single Filtering Profile.
20. Prefix List—Use a prefix list to filter BGP routing information that BGP receives, based
on a network prefix. Mutually exclusive with Inbound Distribute List in a single Filtering
Profile.
21. Inbound Route Map—Use a route map to have even more control over which routes are
allowed into the local BGP RIB (Match criteria) and to set attributes for the routes (Set
options). For example, you can control route preference by prepending an AS to the AS
Path of a route.
PAN-OS® Networking Administrator’s Guide Version 11.0 456 ©2023 Palo Alto Networks, Inc.
Advanced Routing
PAN-OS® Networking Administrator’s Guide Version 11.0 457 ©2023 Palo Alto Networks, Inc.
Advanced Routing
An access list is not for filtering user traffic or for providing security.
An access list can have multiple rules; routes are evaluated against the rules in sequential
order. When a route matches a rule, the deny or permit action occurs and the route is not
evaluated against subsequent rules.
The aggregated view displays all configured access lists; you can highlight an access list to then
modify or delete it.
PAN-OS® Networking Administrator’s Guide Version 11.0 458 ©2023 Palo Alto Networks, Inc.
Advanced Routing
PAN-OS® Networking Administrator’s Guide Version 11.0 459 ©2023 Palo Alto Networks, Inc.
Advanced Routing
PAN-OS® Networking Administrator’s Guide Version 11.0 460 ©2023 Palo Alto Networks, Inc.
Advanced Routing
Advertise Map. Alternatively, specify that if these conditions do not exist, advertise the
route based on a Non-Exist Advertise Map.
• In a BGP Filtering Profile, set an IPv4 Next Hop to use a public NAT address rather than a
private address.
• In a BGP Filtering Profile, use a BGP route map to unsuppress routes that were suppressed
due to route dampening or aggregation.
• To conditionally filter more specific routes, for a logical router, configure BGP Aggregate
Routes and provide the Suppress Map.
• To set attributes for an aggregate route, for a logical router, configure BGP Aggregate
Routes and provide the Attribute Map.
A filter can have multiple rules; the firewall evaluates packets or routes against the rules in a filter
in order by sequence number (Seq) of the rule. When a packet or route matches a rule, the deny
or permit action occurs and the packet or route is not evaluated against subsequent rules.
All filters except AS Path access lists end with an implicit Deny Any rule. All filters except
for AS Path access lists must have at least one Permit rule; otherwise, all examined
routes/packets are denied. AS Path access lists end with an implicit Permit Any rule.
Select a configured Seq number to open a rule and modify it. Select an Action field in a configured
rule to modify only the Permit or Deny action.
When adding a rule, leave enough unused sequence numbers between rules to allow
future rules to be inserted in the filter. For example, use Seq numbers 10, 20, 30, etc.
STEP 1 | Create an access list to permit or deny IPv4 or IPv6 addresses where this filter is applied.
1. Select Network > Routing > Filters.
2. Add a Filters Access List by Name (maximum of 63 characters). The name must start
with an alphanumeric character, underscore (_), or hyphen (-), and can contain a
combination of alphanumeric characters, underscore, or hyphen. No dot (.) or space is
allowed.
3. Enter a helpful Description.
4. Select the Type of access list: IPv4 or IPv6.
1. For IPv4, Add an IPv4 Entry and enter the Seq number for the rule (range is 1 to
65,535).
2. Select the Action: Deny (the default) or Permit.
3. For Source Address, there are three options: select Address and in the subsequent
Address field, enter an IPv4 address. Enter a Wildcard mask to indicate a range.
A zero (0) in the mask indicates that bit must match the corresponding bit in the
address; a one (1) in the mask indicates a “don’t care” bit. The other options are Any
orNone.
4. For Destination Address, select Address and in the subsequent Address field, enter
an IPv4 address. Enter a Wildcard. A zero (0) in the mask indicates a bit that must
PAN-OS® Networking Administrator’s Guide Version 11.0 461 ©2023 Palo Alto Networks, Inc.
Advanced Routing
match; a one (1) in the mask indicates a “don’t care’ bit. The other options are Any or
None.
5. Click OK to save the entry.
PAN-OS® Networking Administrator’s Guide Version 11.0 462 ©2023 Palo Alto Networks, Inc.
Advanced Routing
Address is Any or None, you cannot select Exact Match of this address.) The other
options are Any or None.
4. Click OK to save the entry. Optionally add more entries.
PAN-OS® Networking Administrator’s Guide Version 11.0 463 ©2023 Palo Alto Networks, Inc.
Advanced Routing
1. For IPv4, Add an IPv4 Entry, and enter the Seq number for the rule; range is 1 to
65,535.
2. Select the Action: Deny (the default) or Permit.
3. For Prefix, there are three options; default is None. Another option is to select
Network any. The third option is to select Entry and enter an IPv4 Network prefix
with slash and a base prefix length that together specify a network, for example,
192.168.2.0/24. Optionally specify that the prefix length be Greater Than Or Equal
to a number (that is at least as large as the base length you specified; range is 0 to
32). Optionally specify a top limit to the range by specifying Less Than Or Equal to a
PAN-OS® Networking Administrator’s Guide Version 11.0 464 ©2023 Palo Alto Networks, Inc.
Advanced Routing
number (that is at least as high as the base length and at least as high as the Greater
Than Or Equal length if configured; range is 0 to 32).
Comparing a route to the prefix rule (IPv4 or IPv6) is a two-step process: 1) Match the
prefix with the network first. 2) Match the prefix length to the mask range (Greater Than
or Equal to Less Than Or Equal). For example, consider the preflix list rule with Network
192.168.3.0/24, and a prefix length Greater Than or Equal to 26 and Less Than or Equal
to 30. The following table shows routes that are tested and whether they pass or fail the
rule. Routes that pass the rule are subject to the configured action (Deny or Permit).
192.168.3.0/28 Pass: the network and prefix length match the rule.
In the output summary of the rule, LOU is Logical Operator Unit (equal, greater or equal,
less or equal). >= indicates a prefix length greater than or equal to the value; it is the
lowest value of a range of the prefix length. <= indicates a prefix length less than or
equal to the value; it is the highest value of a range of the prefix length.
5. Alternatively, Add an IPv6 Entry and follow the steps similar to those for an IPv4 prefix
rule. The range of the IPv6 prefix length is Greater Than or Equal to 0 to 128 and Less
Than Or Equal to 0 to 128.
For example, consider the prefix list rule with Network 2001:db8:1/48, and a prefix
length Greater Than or Equal to 56 and Less Than or Equal to 64. The following table
shows routes that are tested and whether they pass or fail the rule. Routes that pass the
rule are subject to the configured action (Deny or Permit).
2001:db8:1/64 Pass: the network and prefix length match the rule.
PAN-OS® Networking Administrator’s Guide Version 11.0 465 ©2023 Palo Alto Networks, Inc.
Advanced Routing
Each AS Path access list ends with an implicit Permit Any rule. Use an AS Path
access list to deny autonomous systems.
6. Enter the Aspath Regex (regular expression) in the format regex1:regex2:regex3,
where a colon (:) separates three AS values. Characters allowed are 1234567890_^|[,{}
()]$*+.?-\. For example, .*65000 in a Deny statement excludes prefixes originating from
AS 65000.
7. Click OK to save the entry. Optionally add more entries; a maximum of 64 entries are
allowed in an AS Path access list.
8. Click OK to save the AS Path access list.
PAN-OS® Networking Administrator’s Guide Version 11.0 466 ©2023 Palo Alto Networks, Inc.
Advanced Routing
PAN-OS® Networking Administrator’s Guide Version 11.0 467 ©2023 Palo Alto Networks, Inc.
Advanced Routing
PAN-OS® Networking Administrator’s Guide Version 11.0 468 ©2023 Palo Alto Networks, Inc.
Advanced Routing
will place the prefix in its BGP route table, but won’t advertise the prefix to other
neighbors.
• no-export—Represents well-known community value NO_EXPORT
(0xFFFFFF01).Adding this community to a prefix means the receiving BGP peer
will advertise the prefix only to iBGP neighbors, not neighbors outside the AS.
• no-peer—Represents well-known community value NOPEER (0xFFFFFF04).
• route-filter-v4—Represents well-known community value ROUTE_FILTER_v4
(0xFFFF0003).
• route-filter-v6—Represents well-known community value ROUTE_FILTER_v6
(0xFFFF0005).
• Large—Add a Seq number (range is 1 to 65,535), select the Action: Deny (the
default) or Permit, and Add a large community regular expression (LC REGEX)
entry. Characters allowed in an entry are 1234567890_^|[,{}()]$*+.?-\. Each
community must be in the format regex1:regex2:regex3; for example,
PAN-OS® Networking Administrator’s Guide Version 11.0 469 ©2023 Palo Alto Networks, Inc.
Advanced Routing
5. Click OK to save the entry in the Community List. Optionally add more entries of the
same type (Regular, Large, or Extended).
6. Click OK to save the Community List.
PAN-OS® Networking Administrator’s Guide Version 11.0 470 ©2023 Palo Alto Networks, Inc.
Advanced Routing
PAN-OS® Networking Administrator’s Guide Version 11.0 471 ©2023 Palo Alto Networks, Inc.
Advanced Routing
4. Add a route map and on the Entry tab, assign a Seq number; range is 1 to 65,535.
Assign sequence numbers that are five or more numbers apart so you have
unused numbers for which to insert additional entries in the future.
5. Enter a helpful Description of the entry (rule).
6. For Action, select Deny or Permit.
7. On the Match tab, specify the criteria that determine which routes are subject to the
function that uses this route map. Multiple attributes are logically ANDed, meaning all
criteria must be met.
PAN-OS® Networking Administrator’s Guide Version 11.0 472 ©2023 Palo Alto Networks, Inc.
Advanced Routing
PAN-OS® Networking Administrator’s Guide Version 11.0 473 ©2023 Palo Alto Networks, Inc.
Advanced Routing
configuring. Default is None. At commit, the firewall checks that the interface you
chose belongs to the logical router you are configuring.
• Origin—Select the origin of the route: ebgp, ibgp, or incomplete. Default is none.
• Tag—Enter a tag value that has meaning in your networks, in the range 0 to
4,294,967,295.
• Local Preference—Enter a value in the range 0 to 4,294,967,295.
• Peer—Select a peer name or local (Static or Redistributed routes). Default is none.
8. Select IPv4 or IPv6 to match on various types of addresses. If you select IPv4:
• On the Address tab, select an Access List to specify addresses to match.
• Select a Prefix List to specify addresses to match. It matches the prefix received from
a peer or a prefix redistributed to protocol from another protocol.
If both an access list and prefix list are specified, both requirements must be
met (logical AND).
• On the Next Hop tab, select an Access List to specify next hop addresses to match.
• Select a Prefix List to specify next hop addresses to match.
• On the Route Source tab, select an Access List to specify a source IP address of a
route to match. For example, the access list could permit a distant peer with the
address 192.168.2.2 who is advertising a route to a certain prefix. You can make this
BGP route map match on the route’s source address 192.168.2.2 and then perhaps
PAN-OS® Networking Administrator’s Guide Version 11.0 474 ©2023 Palo Alto Networks, Inc.
Advanced Routing
filter the route based on matching the peer address 192.168.2.2 as the source of the
route, or set a next hop for routes matching that route source.
• Specify a Prefix List to specify one or more source network prefixes to match.
9. If you select IPv6:
• On the Address tab, select an Access List to specify addresses to match.
• Select a Prefix List to specify addresses to match.
• On the Next Hop tab, select an Access List to specify next hop addresses to match.
10. Set any of the following attributes for routes that meet the match criteria:
• Enable BGP atomic aggregate—Mark the route as a less specific route because it
has been aggregated. ATOMIC_AGGREGATE is a well-known discretionary attribute
that alerts BGP speakers along a path that information has been lost due to route
aggregation, and therefore the aggregate path might not be the best path to the
destination. When some router are aggregated by an aggregator, the aggregator
attaches its Router-ID to the aggregated route into the AGGREGATOR-ID attribute
PAN-OS® Networking Administrator’s Guide Version 11.0 475 ©2023 Palo Alto Networks, Inc.
Advanced Routing
PAN-OS® Networking Administrator’s Guide Version 11.0 476 ©2023 Palo Alto Networks, Inc.
Advanced Routing
or multicast address) for next hop. (By default, connected peers prefer a link-local
next hop address over a global next hop address.)
• On the IPv6 tab, select a Source Address to set from the list of all source addresses
from all logical routers or select None. At commit, the firewall checks that the source
address you chose belongs to the logical router you are configuring.
• Select an IPv6 Next-Hop to set: none or peer-address (Use Peer Address).
• In the AS Path window, Add up to four AS paths to Exclude from the AS path of
matching routes, perhaps to remove an AS from a confederation.
• Add up to four AS Paths to Prepend to the AS Path of matching route(s) (to make the
route in an advertisement less desirable).
• In the Regular Community window, select Overwrite Regular Community to
overwrite the regular community.
• Add a Regular Community to add one or more regular communities.
• In the Large Community window, select Overwrite Large Community to overwrite
the large community.
• Add a Large Community to add one or more large communities.
• In the Regular Community window, select Overwrite Regular Community to
overwrite the regular community.
• Add a Regular Community to add one or more regular communities.
• In the Large Community window, select Overwrite Large Community to overwrite
the large community.
• Add a Large Community to add one or more large communities.
11. Click OK to save the route map entry. Optionally add more entries.
12. Click OK to save the BGP route map.
PAN-OS® Networking Administrator’s Guide Version 11.0 477 ©2023 Palo Alto Networks, Inc.
Advanced Routing
PAN-OS® Networking Administrator’s Guide Version 11.0 478 ©2023 Palo Alto Networks, Inc.
Advanced Routing
23. Select the Metric Action for the redistribution rule: you can set the Metric value, add
the specified Metric Value to the matching route’s original Metric value, or subtract the
specified Metric Value from the matching route’s original Metric value; default is None.
Select the add or subtract action to adjust a metric and thus prioritize or deprioritize the
matching route.
For example, you can put the metric of an IGP into BGP by using redistribution. The
metric is dynamic, and you can simply add to its value rather than set it to an absolute
number.
24. Enter a Metric Value to set, add to, or subtract from the metric; range is 0 to
4,294,967,295.
25. Select the Metric Type: Type 1 or Type 2 (because this example uses OSPF as the
destination protocol).
26. Specify a Tag; range is 1 to 4,294,967,295.
27. Click OK to save the rule. Optionally add more rules.
28. Click OK to save the Redistribution route map.
PAN-OS® Networking Administrator’s Guide Version 11.0 479 ©2023 Palo Alto Networks, Inc.
Advanced Routing
PAN-OS® Networking Administrator’s Guide Version 11.0 480 ©2023 Palo Alto Networks, Inc.
Advanced Routing
STEP 3 | Create an OSPF area and specify characteristics based on the type of area.
1. Select Area and Add an area identified by its Area ID in x.x.x.x format. This is the
identifier that each neighbor must accept to be part of the same area.
2. Select the Type tab and for Authentication, select an Authentication profile or create a
new Authentication profile.
3. Select the Type of area:
• Normal—There are no restrictions; the area can carry all types of routes (intra-area
routes, inter-area routes, and external routes).
• Stub—There is no outlet from the area. To reach a destination outside of the area,
traffic must go through an Area Border Router (ABR), which connects to other areas.
• NSSA (Not-So-Stubby-Area)—NSSAs implement stub or totally stubby functionality,
yet contain an autonomous system boundary router (ASBR). Type 7 LSAs generated
by the ASBR are converted to Type 5 by ABRs and flooded to the rest of the OSPF
domain. (The next graphic shows NSSA selected.)
4. (Stub and NSSA areas only) Select no-summary to prevent the area from receiving Type
3 Summary LSAs and thereby reduce traffic in the area.
5. (NSSA area only) Select Default information originate to cause OSPF to originate a
default route.
• Enter a Metric for the default route; range is 1 to 16,777,214; default is 10.
• Select the Metric-Type: Type 1 or Type 2. Type E1 cost is the sum of the external
cost plus the internal cost to reach that route. Type E2 is only the external cost of
PAN-OS® Networking Administrator’s Guide Version 11.0 481 ©2023 Palo Alto Networks, Inc.
Advanced Routing
that route. This can be useful when you want to load-balance the same external
route, for example.
6. Select ABR to filter prefixes going in or out of the area, and then configure the following
filters:
• Select an Import-list or create a new Access List to filter network routes coming from
another router into the area in LSAs, based on IPv4 source address, thus allowing
PAN-OS® Networking Administrator’s Guide Version 11.0 482 ©2023 Palo Alto Networks, Inc.
Advanced Routing
or preventing the routes from being added to the global RIB (leave the destination
address of the access list empty).
• Select an Export-list or create a new Access List to filter network routes that
originated in the area, to allow or prevent the routes from being advertised to other
areas.
• Select an Inbound Filter List or create a new Prefix List to filter network prefixes
coming into the area.
• Select an Outbound Filter List or create a new Prefix List to filter network prefixes
that originated in the area, to prevent the routes from being advertised to other areas.
• If the Type of area is NSSA and ABR is selected, Add an IPv4 Prefix to summarize
a group of external subnets into a single Type-7 LSA, which is then translated to a
Type-5 LSA and advertised to the backbone when you select Advertise.
PAN-OS® Networking Administrator’s Guide Version 11.0 483 ©2023 Palo Alto Networks, Inc.
Advanced Routing
is advertised into the backbone area if that area contains at least one intra-area network
(that is, described with router or network LSA) from this range.
Look at the learned routes in the LSDB for the area and use this Range to
summarize routes, thereby reducing LSA traffic.
2. Enter a Substitute IP address/netmask so that a Type-3 Summary LSA with this IP
address/netmask is announced into the backbone area if the area contains at least one
intra-area network from the IP Address/Netmask specified in the prior step.
PAN-OS® Networking Administrator’s Guide Version 11.0 484 ©2023 Palo Alto Networks, Inc.
Advanced Routing
defines the interface MTU as “The size in bytes of the largest IP datagram that can be
sent out the associated interface, without fragmentation.”
3. Select Passive to allow the network of the interface to be advertised, but no neighbor
relationship is established on that interface; this is useful for leaf interfaces.
PAN-OS® Networking Administrator’s Guide Version 11.0 485 ©2023 Palo Alto Networks, Inc.
Advanced Routing
STEP 6 | If the ABR does not have a physical link to the backbone area, configure a virtual link to a
neighbor ABR within the same area that has a physical link to the backbone area.
1. Select Virtual Link.
2. Add a virtual link by Name.
3. Enable the virtual link.
4. Select the transit Area where the neighbor ABR that has the physical link to the
backbone area is located.
5. Enter the Router ID of the neighbor ABR on the remote end of the virtual link.
6. Select a Timer Profile or create a new Timer Profile to apply to the virtual link. This
OSPF Interface Timer profile overrides the Global Interface Timer applied to OSPF and
the OSPF Interface Timer profile applied to the interface.
7. Select an Authentication profile or create a new Authentication Profile to apply to the
virtual link. This Authentication Profile overrides the Authentication Profile applied to
the Area (on the Type tab) and the Authentication Profile applied to the interface.
8. Click OK.
STEP 8 | Configure OSPF Graceful Restart and RFC 1583 compatibility for OSPFv2.
1. Select Network > Routing > Logical Routers and select the logical router.
2. Select OSPF > Advanced.
3. Select rfc-1583 compatibility to enforce compatibility with RFC 1583, which allows one
best route to an autonomous system boundary router (ASBR) in the OSPF routing table.
PAN-OS® Networking Administrator’s Guide Version 11.0 486 ©2023 Palo Alto Networks, Inc.
Advanced Routing
Default is disabled, which means the OSPF routing table can maintain multiple intra-AS
paths in the routing table, thereby preventing routing loops.
4. Enable Graceful Restart to enable OSPF Graceful Restart for the logical router. Default is
enabled.
5. Enable Helper Mode to enable the logical router to function in Graceful Restart helper
mode. Default is enabled.
6. Enable Strict LSA Checking to cause the helper router to stop performing helper mode
and causes the graceful restart process to stop if a link-state advertisement indicates a
network topology change. Default is enabled.
7. Specify the Grace Period (sec)—the number of seconds within which the logical router
will perform a graceful restart if the firewall goes down or becomes unavailable; range is
5 to 1,800; default is 120.
8. Specify the Max Neighbor Restart Time (sec); range is 5 to 1,800; default is 140.
9. Click OK.
PAN-OS® Networking Administrator’s Guide Version 11.0 487 ©2023 Palo Alto Networks, Inc.
Advanced Routing
STEP 9 | Configure intra-area filtering to determine which OSPFv2 routes are placed in the global RIB.
You might learn OSPFv2 routes and redistribute them, but not want them in the global RIB;
you might want to allow only specific OSPFv2 routes to the global RIB.
1. Select Network > Routing > Logical Routers and select a logical router.
2. Select RIB Filter.
3. To filter IPv4 OSPFv2 routes for the global RIB, in the OSPFv2 Route-Map, select a
Redistribution route map you created or create a new Redistribution Route Map in which
the Source Protocol is OSPF and the Destination Protocol is RIB.
4. Click OK.
STEP 10 | (Optional) Change the default administrative distances for OSPF intra area, inter area, and
external routes within a logical router.
STEP 11 | Commit.
STEP 12 | View advanced routing information for OSPFv2 and the link-state database (LSDB). The
PAN-OS CLI Quick Start lists the commands in the CLI Cheat Sheet: Networking.
PAN-OS® Networking Administrator’s Guide Version 11.0 488 ©2023 Palo Alto Networks, Inc.
Advanced Routing
PAN-OS® Networking Administrator’s Guide Version 11.0 489 ©2023 Palo Alto Networks, Inc.
Advanced Routing
600; default is 5. Lower values enable faster OSPF re-convergence. Routers peering with
the firewall should use the same delay value to optimize convergence times.
5. Enter the Initial hold time (in seconds) between consecutive SPF calculations; range is 0
to 600; default is 5.
6. Enter the Maximum hold time (in seconds), which is the largest value that the hold time
throttles to until remaining steady; range is 0 to 600; default is 5.
7. Click OK.
• If you choose MD5, Add an MD5 key ID (range is 0 to 255) and a Key (a maximum of
16 alphanumeric characters). Select Preferred to prefer an MD5 key over other MD5
keys. During the commit, the firewall goes through the list of keys from the top down
and the Preferred key is moved to the top of the list; the top Preferred key is used. (In
PAN-OS® Networking Administrator’s Guide Version 11.0 490 ©2023 Palo Alto Networks, Inc.
Advanced Routing
other words, if you select more than one Preferred MD5 key, the last one chosen as
Preferred is the Preferred key.)
4. Click OK.
PAN-OS® Networking Administrator’s Guide Version 11.0 491 ©2023 Palo Alto Networks, Inc.
Advanced Routing
3. Enter the Hello Interval, the interval (in seconds) between Hello packets that the firewall
sends out an interface to maintain neighbor relationships; range is 1 to 3600; default is
10.
4. Enter the Dead Count, the number of times the Hello Interval can occur for a neighbor
without OSPF receiving a hello packet from the neighbor, before OSPF considers that
neighbor down; range is 3 to 20; default is 4.
5. Enter the Retransmit Interval, the number of seconds between LSA retransmissions to
adjacent routers; range is 1 to 1800; default is 5.
6. Enter the Transmit Delay, the number of seconds required to transmit a Link State
Update Packet over the interface. Link State Advertisements in the update packet have
their age incremented by this number before they are transmitted; range is 1 to 1800;
default is 1.
7. Enter the Graceful Restart Hello Delay (sec) in seconds, which applies to an OSPF
interface when Active/Passive High Availability is configured. Graceful Restart Hello
Delay is the length of time during which the firewall sends Grace LSA packets at 1-
second intervals. During this time, no hello packets are sent from the restarting firewall.
During the restart, the dead timer (which is the Hello Interval multiplied by the Dead
Count) is also counting down. If the dead timer is too short, the adjacency will go down
during the graceful restart because of the hello delay. Therefore, it is recommended that
the dead timer be at least four times the value of the Graceful Restart Hello Delay. For
example, a Hello Interval of 10 seconds and a Dead Count of 4 yield a dead timer of 40
seconds. If the Graceful Restart Hello Delay is set to 10 seconds, that 10-second delay
of hello packets is comfortably within the 40-second dead timer, so the adjacency will
not time out during a graceful restart. Range is 1 to 10; default is 10.
8. Click OK.
STEP 4 | Create an OSPF Redistribution Profile to specify any combination of IPv4 static routes,
connected routes, BGP IPv4 routes, RIPv2 routes, and default IPv4 route to redistribute to
OSPF.
1. Select Network > Routing > Routing Profiles > OSPF.
2. Add an OSPF Redistribution Profile by Name (a maximum of 63 characters). The name
must start with an alphanumeric character, underscore (_), or hyphen (-), and can contain
PAN-OS® Networking Administrator’s Guide Version 11.0 492 ©2023 Palo Alto Networks, Inc.
Advanced Routing
PAN-OS® Networking Administrator’s Guide Version 11.0 493 ©2023 Palo Alto Networks, Inc.
Advanced Routing
cost of that route. This can be useful when you want to load-balance the same
external route, for example.
• Select a Redistribute Route-Map or create a new Redistribute Route Map whose
match criteria control which connected routes to redistribute into OSPF. Default is
None. If the route map Set configuration includes a Metric Action and Metric Value,
they are applied to the redistributed route. Otherwise, the Metric configured on this
redistribution profile is applied to the redistributed route. Likewise, the Metric Type in
the route map Set configuration takes precedence over the Metric Type configured in
this redistribution profile.
5. Select RIPv2 to allow configuration of this portion of the profile.
• Enable the RIPv2 portion of the profile.
• Specify the Metric to apply to the RIPv2 routes being redistributed into OSPF (range
is 0 to 4,294,967,295).
• Specify the Metric-Type: Type 1 or Type 2 (default).
• Select a Redistribute Route-Map or create a new Redistribute Route Map whose
match criteria control which RIPv2 routes to redistribute into OSPF. Default is None.
If the route map Set configuration includes a Metric Action and Metric Value, they
are applied to the redistributed route. Otherwise, the Metric configured on this
redistribution profile is applied to the redistributed route. Likewise, the Metric Type in
the route map Set configuration takes precedence over the Metric Type configured in
this redistribution profile.
6. Select BGP AFI IPv4 to allow configuration of this portion of the profile.
• Enable the BGP AFI IPv4 portion of the profile.
• Specify the Metric to apply to the BGP routes being redistributed into OSPF (range is
0 to 4,294,967,295).
• Specify the Metric-Type: Type 1 or Type 2 (default).
• Select a Redistribute Route-Map or create a new Redistribute Route Map whose
match criteria control which BGP IPv4 routes to redistribute into OSPF. Default is
None. If the route map Set configuration includes a Metric Action and Metric Value,
they are applied to the redistributed route. Otherwise, the Metric configured on this
redistribution profile is applied to the redistributed route. Likewise, the Metric Type in
the route map Set configuration takes precedence over the Metric Type configured in
this redistribution profile.
7. Select IPv4 Default Route to allow configuration of this portion of the profile.
• Select Always to always redistribute the IPv4 default route to OSPF; default is
enabled.
• Enable the IPv4 Default Route portion of the profile.
• Specify the Metric to apply to the default route being redistributed into OSPF (range
is 0 to 4,294,967,295).
• Specify the Metric-Type: Type 1 or Type 2 (default).
8. Click OK.
STEP 5 | Commit.
PAN-OS® Networking Administrator’s Guide Version 11.0 494 ©2023 Palo Alto Networks, Inc.
Advanced Routing
PAN-OS® Networking Administrator’s Guide Version 11.0 495 ©2023 Palo Alto Networks, Inc.
Advanced Routing
3. Assign a Router ID to OPSFv3 for the logical router, which is typically an IPv4 address
(even though OSPFv3 is for IPv6 addressing), to ensure the Router ID is unique.
4. If you want to apply BFD to OSPFv3, select a BFD Profile you created, or select the
default profile, or create a new BFD Profile to apply to all OSPFv3 interfaces belonging
to the logical router. Default is None (Disable BFD).
5. Select a Global General Timer profile or create a new one to set SPF throttle timers
and to set the minimum interval between arriving instances of the same link-state
advertisement (LSA).
6. Select a Global Interface Timer profile or create a new one to set the hello interval,
retransmit interval, and other settings.
7. Select a Redistribution Profile or create a new one to redistribute IPv6 static routes,
connected routes, IPv6 BGP routes, or the IPv6 default route to OSPFv3.
8. Click OK.
PAN-OS® Networking Administrator’s Guide Version 11.0 496 ©2023 Palo Alto Networks, Inc.
Advanced Routing
STEP 3 | Create an OSPFv3 area and specify characteristics based on the type of area.
1. Select Network > Routing > Logical Routers and select the logical router.
2. Select OSPFv3 > Area and Add an Area by Area ID (an IPv4 address).
3. On the Type tab, select an Authentication profile for the area or create a new one.
4. Specify the Type of area:
• Normal—There are no restrictions; the area can carry all types of routes.
• Stub—There is no outlet from the area. To reach a destination outside of the area,
traffic must go through an Area Border Router (ABR), which connects to other areas
and area 0.
• NSSA (Not So Stubby Area)—Traffic can leave the area directly, but only by using
non-OSPF routes.
5. (Stub and NSSA areas only) Select no-summary to prevent the area from receiving Type
3 Summary LSAs and thereby reduce traffic in the area.
6. (NSSA area only) Select Default information originate to cause OSPFv3 to originate a
default route.
• Enter a Metric for the default route; range is 1 to 16,777,214; default is 10.
• Select the Metric-Type: Type 1 or Type 2. Type E1 cost is the sum of the external
cost plus the internal cost to reach that route. Type E2 is only the external cost of
PAN-OS® Networking Administrator’s Guide Version 11.0 497 ©2023 Palo Alto Networks, Inc.
Advanced Routing
that route. This can be useful when you want to load-balance the same external
route, for example.
If you apply an Import access list and Inbound prefix list, firewall uses an AND
operation (both lists must be met).
11. Select an Outbound Filter List or create a new Prefix List to filter Type-3 summary LSAs
from the area.
If you apply an Export access list and Outbound prefix list, firewall uses an AND
operation (both lists must be met).
12. If the Type of area is NSSA and ABR is selected, Add an IPv6 Prefix to summarize a
group of external subnets into a single Type-7 LSA, which is then translated to a Type-5
LSA and advertised to the backbone when you select Advertise.
PAN-OS® Networking Administrator’s Guide Version 11.0 498 ©2023 Palo Alto Networks, Inc.
Advanced Routing
STEP 4 | Specify the network range that a Type-3 Summary LSA announces to the backbone area if
the area contains at least one intra-area network (that is, described with router or network
LSA) from this range.
1. Select Range and Add an IPv6 Address/Netmask, which summarizes routes for the area.
A Type-3 Summary LSA with routing information that matches the range is announced
into the backbone area if the area contains at least one intra-area network from this
range.
2. Select Advertise to advertise matching subnets in LSAs to the backbone area. If
Advertise is set to No, any matching intra-area prefixes that are present in the area will
not be advertised in the backbone area.
PAN-OS® Networking Administrator’s Guide Version 11.0 499 ©2023 Palo Alto Networks, Inc.
Advanced Routing
3. Select MTU Ignore to ignore maximum transmission unit (MTU) mismatches when trying
to establish an adjacency (default is disabled; MTU match checking occurs).
4. Select Passive to prevent sending OSPF Hello packets out this interface and thus
prevent the logical router from creating an OSPF adjacency with a neighbor; however,
the interface is still included in the link-state database. You can make an interface
passive, for example if it connects to a switch, because you don’t want to send Hello
packets where there is no router.
5. Keep the Instance ID set to 0 because only one instance of OSPFv3 is allowed.
6. Select the Link Type:
• Broadcast—All neighbors that are accessible through the interface are discovered
automatically by multicasting OSPF Hello messages, such as over an Ethernet
interface.
• p2p (point-to-point)—Automatically discover the neighbor.
• p2mp (point-to-multipoint)—Neighbors must be defined manually: Add the Neighbor
IPv6 address for all neighbors that are reachable through this interface and the
PAN-OS® Networking Administrator’s Guide Version 11.0 500 ©2023 Palo Alto Networks, Inc.
Advanced Routing
Priority of each neighbor to be elected the designated router (DR) or backup DR;
range is 0 to 255; default is 1.
7. Enter a Priority for the interface—the priority for the router to be elected as a
designated router (DR) or backup DR (BDR); range is 0 to 255; default is 1. If zero is
configured, the router will not be elected as DR or BDR.
8. Select an OSPFv3 Interface Timer Profile or create a new one to apply to the interface.
This OSPFv3 Interface Timer profile overrides the Global Interface Timer applied to
OSPFv3.
9. Select an OSPFv3 Interface Authentication profile or create a new one to apply to the
interface. This Authentication Profile overrides the Authentication Profile applied to the
Area (on the Type tab).
10. By default, the interface will inherit the BFD profile you applied to the logical router for
OSPFv3 (Inherit-vr-global-setting). Alternatively, select the default profile, select a BFD
Profile you created, create a new one, or select None (Disable BFD) to override the BFD
Profile applied at the OSPFv3 level.
11. Enter an OSPFv3 Cost for the interface, which influences route selection; range is 1 to
65,5535; default is 10. During route selection, a route with a lower cumulative cost (the
added costs of each interface used) is preferred over a route with a higher cumulative
cost.
12. Click OK to save the interface.
PAN-OS® Networking Administrator’s Guide Version 11.0 501 ©2023 Palo Alto Networks, Inc.
Advanced Routing
STEP 6 | If the ABR does not have a physical link to the backbone area, configure a virtual link to a
neighbor ABR within the same area that has a physical link to the backbone area.
The following settings must be defined for area border routers (ABRs) and must be
defined within the backbone area (0.0.0.0).
4. Select the transit Area where the neighbor ABR that has the physical link to the
backbone area is located.
5. Enter the Router ID of the neighbor ABR on the remote end of the virtual link.
6. Select an OSPFv3 Interface Timer Profile or create a new Timer Profile to apply to the
virtual link. This OSPFv3 Interface Timer profile overrides the Global Interface Timer
applied to OSPFv3 and the OSPFv3 Interface Timer profile applied to the interface.
7. Select an OSPF Interface Authentication profile or create a new Authentication Profile
to apply to the virtual link. This Authentication Profile overrides the Authentication
Profile applied to the Area (on the Type tab) and the Authentication Profile applied to
the interface.
8. Click OK.
PAN-OS® Networking Administrator’s Guide Version 11.0 502 ©2023 Palo Alto Networks, Inc.
Advanced Routing
PAN-OS® Networking Administrator’s Guide Version 11.0 503 ©2023 Palo Alto Networks, Inc.
Advanced Routing
STEP 9 | Configure intra-area filtering to determine which OSPFv3 routes are placed in the global RIB.
You might learn OSPFv3 routes and redistribute them, but not want them in the global RIB;
you might want to allow only specific OSPFv3 routes to the global RIB.
1. Select Network > Routing > Logical Routers and select a logical router.
2. Select RIB Filter.
3. To filter IPv6 OSPFv3 routes for the global RIB, for OSPFv3 Route-Map, select a
Redistribution route map you created or create a new Redistribution Route Map in which
the Source Protocol is OSPFv3 and the Destination Protocol is RIB.
4. Click OK.
STEP 10 | (Optional) Change the default administrative distances for OSPFv3 Intra Area, OSPFv3 Inter
Area, and OSPFv3 External Routes that pertain to the logical router.
STEP 11 | Commit.
STEP 12 | View advanced routing information for OSPFv3 and the link-state database (LSDB). The
PAN-OS CLI Quick Start lists the commands in the CLI Cheat Sheet: Networking.
PAN-OS® Networking Administrator’s Guide Version 11.0 504 ©2023 Palo Alto Networks, Inc.
Advanced Routing
PAN-OS® Networking Administrator’s Guide Version 11.0 505 ©2023 Palo Alto Networks, Inc.
Advanced Routing
7. Click OK.
PAN-OS® Networking Administrator’s Guide Version 11.0 506 ©2023 Palo Alto Networks, Inc.
Advanced Routing
PAN-OS® Networking Administrator’s Guide Version 11.0 507 ©2023 Palo Alto Networks, Inc.
Advanced Routing
3. Enter the Hello Interval, the interval (in seconds) at which OSPFv3 sends Hello packets;
range is 1 to 3,600; default is 10.
4. Enter the Dead Count, the number of times the Hello Interval can occur from a neighbor
without OSPFv3 receiving a Hello packet from the neighbor, before OSPFv3 considers
that neighbor down; range is 3 to 20; default is 4.
5. Enter the Retransmit Interval, the number of seconds that OSPFv3 waits to receive
an ACK for an LSA from a neighbor before OSPFv3 retransmits the LSA; range is 1 to
1,800; default is 5.
6. Enter the Transmit Delay, the number of seconds that OSPFv3 delays transmitting an
LSA before sending the LSA out an interface; range is 1 to 1,800; default is 1.
7. Enter the Graceful Restart Hello Delay (sec) in seconds; range is 1 to 10; default is 10.
This setting applies to an OSPFv3 interface when Active/Passive HA is configured.
Graceful Restart Hello Delay is the number of seconds during which the firewall sends
Grace LSA packets at 1-second intervals. During this time, no Hello packets are sent
from the restarting firewall. During the restart, the dead time (which is the Hello Interval
multiplied by the Dead Count) is also counting down. If the dead timer is too short, the
adjacency will go down during the graceful restart because of the hello delay. Therefore
it is recommended that the dead timer be at least four times the value of the Graceful
Restart Hello Delay. For example, a Hello Interval of 10 seconds and a Dead Count
of 4 yield a dead timer of 40 seconds. If the Graceful Restart Hello Delay is set to 10
seconds, that 10-second delay of hello packets is comfortably within the 40-second dead
timer, so the adjacency will not time out during a graceful restart.
8. Click OK.
PAN-OS® Networking Administrator’s Guide Version 11.0 508 ©2023 Palo Alto Networks, Inc.
Advanced Routing
STEP 4 | Create an OSPFv3 Redistribution Profile to specify any combination of IPv6 static routes,
connected routes, IPv6 BGP routes, and default IPv6 route to redistribute to OSPFv3.
1. Select Network > Routing > Routing Profiles > OSPFv3.
2. Add an OSPFv3 Redistribution Profile by Name (maximum of 63 characters). The name
must start with an alphanumeric character, underscore (_), or hyphen (-), and can contain
a combination of alphanumeric characters, underscore, or hyphen. No dot (.) or space is
allowed.
PAN-OS® Networking Administrator’s Guide Version 11.0 509 ©2023 Palo Alto Networks, Inc.
Advanced Routing
redistribution profile is applied to the redistributed route. Likewise, the Metric Type in
the route map Set configuration takes precedence over the Metric Type configured in
this redistribution profile.
5. Select BGP AFI IPv6 to allow configuration of this portion of the profile.
• Enable the BGP AFI IPv6 route redistribution portion of the profile.
• Enter a Metric to apply to the IPv6 BGP routes redistributed to OSPFv3; range is 0 to
4,294,967,295.
• Select a Metric Type: Type 1 or Type 2.
• Select a Redistribute Route-Map or create a new Redistribution Route Map whose
Match criteria control the IPv6 BGP routes to redistribute into OSPFv3. Default is
None. If the route map Set configuration includes a Metric Action and Metric Value,
they are applied to the redistributed route. Otherwise, the Metric configured on this
redistribution profile is applied to the redistributed route. Likewise, the Metric Type in
the route map Set configuration takes precedence over the Metric Type configured in
this redistribution profile.
6. Select IPv6 Default Route to allow configuration of this portion of the profile.
• Select Always to always create and redistribute the default route to OSPFv3, even if
there is no default route on the router; default is enabled. If Always is not set, when
there is no default route on the ABR, the default route is not redistributed.
• Enable the IPv6 Default Route redistribution portion the profile.
• Enter a Metric to apply to the IPv6 default route redistributed to OSPFv3; range is 0
to 4,294,967,295.
• Select a Metric Type: Type 1 or Type 2.
7. Click OK.
STEP 5 | Commit.
PAN-OS® Networking Administrator’s Guide Version 11.0 510 ©2023 Palo Alto Networks, Inc.
Advanced Routing
3. Select advertise default route in RIP to advertise the default route even if it doesn’t exist
in the RIB of the routing engine.
4. If you want to apply BFD to RIPv2, select a BFD Profile you created, or select the
default profile, or create a new BFD Profile. Default is None (Disable BFD).
5. Select a Global General Timer or create a new RIPv2 Global Timer Profile.
6. Select an Auth Profile or create a new RIPv2 Authentication Profile.
7. Select a Redistribution Profile or create a new Redistribution Profile to redistribute IPv4
static routes, connected routes, BGP IPv4 routes, or OSPFv2 routes to RIPv2.
8. Select a Global Inbound Distribute List to control the incoming routes accepted.
9. Select an Global Outbound Distribute List to control the routes advertised to RIP
neighbors.
PAN-OS® Networking Administrator’s Guide Version 11.0 511 ©2023 Palo Alto Networks, Inc.
Advanced Routing
PAN-OS® Networking Administrator’s Guide Version 11.0 512 ©2023 Palo Alto Networks, Inc.
Advanced Routing
STEP 5 | (Optional) Control RIP routes that are placed in the global RIB.
You might learn routes and redistribute them, but not want them in the protocol’s local route
table or global RIB. You might want to add only specific routes to the global RIB.
1. Select Network > Routing > Logical Routers and select a logical router.
2. Select RIB Filter to allow routes into or prevent routes from being added to the global
RIB.
3. To filter RIPv2 routes going to the RIB, in the IPv4 area, for RIP Route-Map, select a
Redistribution Route Map or create a new one.
4. Click OK.
PAN-OS® Networking Administrator’s Guide Version 11.0 513 ©2023 Palo Alto Networks, Inc.
Advanced Routing
3. Specify Update Interval in seconds, which is the length of time between regularly
scheduled Update messages; range is 5 to 2,147,483,647; default is 30.
4. Specify Expire Interval in seconds, which is the length of time that a route can be in the
routing table without being updated; range is 5 to 2,147,483,647; default is 180. After
the Expire Interval is reached, the route is still included in Update messages until the
Delete Interval is reached.
5. Specify Delete Interval in seconds; range is 5 to 2,147,483,647; default is 120. When
an expired route in the routing table reaches the Delete Interval, it is deleted from the
routing table.
6. Click OK.
PAN-OS® Networking Administrator’s Guide Version 11.0 514 ©2023 Palo Alto Networks, Inc.
Advanced Routing
3. Specify the type of authentication: md5 (use RIP MD5 authentication method) or
password (Simple password authentication).
4. For Simple password authentication, enter the Password (a maximum of 16 characters)
and Confirm Password.
6. Click OK.
STEP 3 | Create a RIPv2 Redistribution Profile to specify any combination of IPv4 static routes,
connected routes, BGP IPv4 routes, and OSPFv2 routes to redistribute to RIPv2.
1. Select Network > Routing > Routing Profiles > RIPv2.
2. Add a RIPv2 Redistribution Profile by Name (a maximum of 63 characters). The name
must start with an alphanumeric character, underscore (_), or hyphen (-), and can contain
PAN-OS® Networking Administrator’s Guide Version 11.0 515 ©2023 Palo Alto Networks, Inc.
Advanced Routing
PAN-OS® Networking Administrator’s Guide Version 11.0 516 ©2023 Palo Alto Networks, Inc.
Advanced Routing
they are applied to the redistributed route. Otherwise, the Metric configured on this
redistribution profile is applied to the redistributed route.
7. Click OK.
PAN-OS® Networking Administrator’s Guide Version 11.0 517 ©2023 Palo Alto Networks, Inc.
Advanced Routing
The effectiveness of your BFD implementation depends on various factors, such as traffic
loads, network conditions, how aggressive your BFD settings are, and how busy the
dataplane is.
STEP 1 | Select Network > Routing > Routing Profiles > BFD.
STEP 2 | Add a BFD profile by Name (maximum of 63 characters). The name is case-sensitive and
must be unique on the firewall. Use only letters, numbers, hyphens, and underscores. No dot
(.) or space is allowed.
STEP 4 | Enter the Desired Minimum Tx Interval (ms), the minimum interval, in milliseconds, at which
you want the BFD protocol to send BFD control packets; you are thus negotiating the
transmit interval with the peer. Range for PA-7000 Series, PA-5200 Series, and PA-5450
PAN-OS® Networking Administrator’s Guide Version 11.0 518 ©2023 Palo Alto Networks, Inc.
Advanced Routing
firewall is 50 to 10,000; range for PA-3200 Series is 100 to 10,000; range for VM-Series is
200 to 10,000. Default is 1,000.
If you have multiple routing protocols that use different BFD profiles on the same
interface, configure the BFD profiles with the same Desired Minimum Tx Interval.
On a PA-7000 Series firewall, set the Desired Minimum Tx Interval to 100 or greater;
a value less than 100 is at risk of causing BFD flaps.
STEP 5 | Enter the Required Minimum Rx Interval (ms). This is the minimum interval, in milliseconds,
at which BFD can receive BFD control packets. Range for PA-7000 Series, PA-5200 Series,
and PA-5450 firewall is 50 to 10,000; range for PA-3200 Series is 100 to 10,000; range for
VM-Series is 200 to 10,000. Default is 1,000.
On a PA-7000 Series firewall, set the Desired Minimum Rx Interval to 100 or greater;
a value less than 100 is at risk of causing BFD flaps.
When creating a BFD profile, take into consideration that the firewall is a session-
based device typically at the edge of a network or data center and may have slower
links than a dedicated router. Therefore, the firewall likely needs a longer interval and
a higher multiplier than the fastest settings allowed. A detection time that is too short
can cause false failure detections when the issue is really just traffic congestion.
STEP 7 | Enter the Hold Time (ms), the delay, in milliseconds, after a link comes up before BFD
transmits BFD control packets. Hold Time applies to BFD Active mode only. If BFD receives
BFD control packets during the Hold Time, it ignores them. Range is 0 to 120,000; default is
0, which means no transmit Hold Time is used; BFD sends and receives BFD control packets
immediately after the link is established.
STEP 8 | Enter the Minimum Rx TTL, the minimum Time-to-Live (number of hops) BFD will accept
(receive) in a BFD control packet when BGP supports multihop BFD. Range is 1 to 254; there
is no default.
The firewall drops the packet if it receives a smaller TTL than its configured Minimum Rx TTL.
For example, if the peer is 5 hops away and the peer transmits a BFD packet with a TTL of 100
to the firewall, and if the Minimum Rx TTL for the firewall is set to 96 or higher, the firewall
drops the packet.
PAN-OS® Networking Administrator’s Guide Version 11.0 519 ©2023 Palo Alto Networks, Inc.
Advanced Routing
STEP 2 | Select Network > Routing > Logical Routers and select a logical router.
PAN-OS® Networking Administrator’s Guide Version 11.0 520 ©2023 Palo Alto Networks, Inc.
Advanced Routing
2. Select the RPF lookup mode, which determines where the logical router looks to find
the outgoing interface to reach the source address contained in the multicast packet. If
the outgoing interface stored in the RIB matches the interface on which the multicast
PAN-OS® Networking Administrator’s Guide Version 11.0 521 ©2023 Palo Alto Networks, Inc.
Advanced Routing
packet arrived, the logical router accepts and forwards the packet; otherwise, it drops
the packet.
• mrib-only—Look in multicast RIB only.
• mrib-then-urib—Look in multicast RIB first; if route is not present in multicast RIB,
then look in unicast RIB.
• urib-only—Look in unicast RIB only.
The RPF lookup mode also controls where to do route lookup to select the route to use
for the PIM Join.
3. For the Interface General Timer, select a PIM Interface Timer Profile or create a new
IPv4 PIM Interface Timer profile; default is None.
4. Specify the Route Age Out Time (sec)—the number of seconds that a multicast route
remains in the mRIB after the session ends between a multicast group and a source;
range is 210 to 7,200; default is 210.
5. To configure Source-Specific Multicast (SSM), in Multicast SSM Range select a prefix
list (or create a new one) that specifies the source addresses allowed to deliver multicast
traffic to the receiver; default is None (no prefix list).
6. To configure the Shortest-Path Tree (SPT) threshold for a multicast group or prefix, Add
a Group Address (multicast group or prefix for which you are specifying the distribution
tree) by selecting a Prefix List or creating a new one.
7. Specify the Threshold rate in kilobits per second (kbps); if multicast traffic for the
multicast group/prefix arrives at the logical router faster than this threshold rate, routing
to the specified group/prefix switches from shared tree (sourced from the Rendezvous
Point [RP]) to SPT distribution:
• 0 (switch on first data packet) (default)—The logical router switches from shared tree
to SPT for the group/prefix when the logical router receives the first data packet for
the group/prefix.
• Enter the total number of kilobits per second that can arrive for the multicast
group/prefix at any interface and over any time period, upon which the logical
router switches to SPT distribution for that multicast group or prefix; range is 0 to
4,294,967,295.
• never (do not switch to spt)—The PIM router continues to use the shared tree to
forward packets to the multicast group/prefix.
STEP 5 | Specify PIM group permissions to control which PIM Join messages and Register messages
the logical router accepts, and which multicast traffic the logical router forwards.
1. Select PIM > Group Permissions.
2. To control packets to certain destination multicast groups from certain sources (S,G) to
transit the logical router, for Source Group List, select an Access List that you created
or create a new one. The access list can be an extended access list where the source
PAN-OS® Networking Administrator’s Guide Version 11.0 522 ©2023 Palo Alto Networks, Inc.
Advanced Routing
specifies the multicast source and the destination specifies the multicast group. Default
is None (no access list).
When you modify PIM Group Permissions by removing or changing the Source
Group access list, the new permission does not retroactively clear multicast
routes form the multicast RIB table (mRIB) or multicast FIB table (mFIB) for
existing flows. To change entries for existing flows in the mRIB or mFIB, you
would need to force a Leave or clear mroute entry.
PAN-OS® Networking Administrator’s Guide Version 11.0 523 ©2023 Palo Alto Networks, Inc.
Advanced Routing
a LAN, if DR Priority is configured, the device with the highest priority value is elected
the DR.
4. Send BSM to allow propagation of Bootstrap Messages (enabled by default).
The Advanced Routing Engine cannot act as a BSR, but can send and relay BSM
messages.
5. The Timer Profile for the interface is inherited from the General PIM section unless you
override that by selecting an IPv4 PIM Interface Timer profile; default is None.
6. Specify a Neighbor Filter using an access list you created or create a new access list to
specify the prefixes of devices that are allowed to become or denied from becoming PIM
neighbors of the logical router.
7. Click OK.
PAN-OS® Networking Administrator’s Guide Version 11.0 524 ©2023 Palo Alto Networks, Inc.
Advanced Routing
STEP 7 | (ASM only) Configure a PIM Rendezvous Point (RP) for an Any-Source Multicast (ASM)
environment.
You can configure a Candidate RP and a Static RP; they are not mutually exclusive.
PAN-OS® Networking Administrator’s Guide Version 11.0 525 ©2023 Palo Alto Networks, Inc.
Advanced Routing
• Specify the Priority of the candidate RP; range is 0 to 255; default is 192. A lower
priority value indicates a higher priority.
• Specify the Advertisement Interval, the frequency (in seconds) at which the candidate
RP sends advertisements to other routers; range is 1 to 26,214; default is 60.
• To control the groups that the candidate RP accepts, select a Group List, which is an
IPv4 access list you created, or create a new access list. Default is None (no access
list). If no access list is applied, the logical router starts advertising itself as the RP for
all groups.
PAN-OS® Networking Administrator’s Guide Version 11.0 526 ©2023 Palo Alto Networks, Inc.
Advanced Routing
PAN-OS® Networking Administrator’s Guide Version 11.0 527 ©2023 Palo Alto Networks, Inc.
Advanced Routing
PAN-OS® Networking Administrator’s Guide Version 11.0 528 ©2023 Palo Alto Networks, Inc.
Advanced Routing
STEP 11 | Commit.
PAN-OS® Networking Administrator’s Guide Version 11.0 529 ©2023 Palo Alto Networks, Inc.
Advanced Routing
Configure MSDP
Advanced Routing mode supports Multicast Source Discovery Protocol (MSDP) in PIM Sparse
Mode (PIM-SM). MSDP-enabled firewalls in one domain peer with MDSP-enabled devices in a
different domain or autonomous system. The peers exchange control information and discover
multicast sources outside their own domain. MSDP tracks active sources and shares them with
configured peers. MSDP reduces the complexity of interconnecting multiple PIM-SM domains by
allowing the domains to use an interdomain source tree.
In the sample MSDP topology, the multicast source and receiver are in separate domains. In each
multicast domain is a single RP for a given multicast group. Using MSDP, RP_1 informs RP_2 of
the active sources for which RP_1 acts as Rendezvous Point. RP_2 is able to create the multicast
tree across the domain border.
MSDP uses well-known TCP port 639 for peering. The peer with the higher IP address listens on
port 639; the peer with the lower IP address attempts an active connection to port 639. Before
you configure MSDP, be familiar with RFC 3618. The following task assumes you have IPv4
multicast configured already.
Supported MSDP message types are:
• Source Active (SA)—Contains the IP address of the originating rendezvous point (RP) and one
or more (S,G) pairs being advertised. Can also contain an encapsulated data packet.
• Keepalive—Sent to keep the MSDP session active. If no keepalive or SA message is received
during the holdtime interval, the MSDP session is reset.
• Notification—Sent if an error is detected.
MSDP TCP connections between RP routers require an underlying IP unicast network. BGP IPv4
unicast must participate to confirm the reverse-path forwarding (RPF) check with a peer, thus
keeping loop-free forwarding between domains.
PAN-OS® Networking Administrator’s Guide Version 11.0 530 ©2023 Palo Alto Networks, Inc.
Advanced Routing
You can Create Multicast Routing Profiles before configuration or while in the process of
configuring MSDP.
STEP 1 | Configure a Logical Router.
STEP 2 | Select Network > Routing > Logical Routers and select a logical router.
STEP 5 | Select the Global Timer profile, or select the default profile (this is the default setting), or
create a new timer profile. If you select default, Keep Alive Interval is set to 60, Message
Timeout is set to 75, and Connection Retry Interval is set to 30. If you select None, the
default values apply.
STEP 6 | Select the Global Authentication profile or create a new one. Default is None.
STEP 7 | For the Originator ID, select the Interface that the logical router uses as the RP interface in
Source-Active (SA) messages.
STEP 8 | Select or enter the IP Address (with prefix length) that the logical router uses as the RP
address in SA messages. If no Originator IP address is configured, the logical router uses the
PIM RP address to encapsulate the SA message.
PAN-OS® Networking Administrator’s Guide Version 11.0 531 ©2023 Palo Alto Networks, Inc.
Advanced Routing
STEP 10 | Select Peers and Add a Peer name (maximum of 63 characters). The name must start with an
alphanumeric character, underscore (_), hyphen (-), or dot (.) and can contain a combination
of alphanumeric characters, underscore, or hyphen or dot. No space is allowed.
STEP 11 | Enter the Source Interface used to establish the MSDP connection over TCP with its MSDP
peer.
STEP 14 | Enter the BGP autonomous system number of the Remote AS where the MSDP peer is
located.
STEP 16 | For Max SA, enter the maximum number of Source-Active (SA) entries the SA cache will
accept from this MSDP peer. Range is 0 to 1,024; default is 0 (unlimited). After this maximum
is reached, new SA messages from this peer are dropped.
PAN-OS® Networking Administrator’s Guide Version 11.0 532 ©2023 Palo Alto Networks, Inc.
Advanced Routing
STEP 17 | For Peer Inbound SA Filter, select an access list or create a new access list to filter incoming
SA messages (block unwanted groups) from this peer. Default is None.
The access list can specify source addresses in an (S,G) pair to filter, or destination (group)
addresses in an (S,G) pair to filter, or both.
STEP 18 | For Peer Outbound SA Filter, select an access list or create a new access list to filter
outgoing SA messages (block unwanted groups) being propagated to this peer. Default is
None.
The access list can specify source addresses in an (S,G) to filter, or destination (group)
addresses in an (S,G) to filter, or both.
STEP 20 | Create MSDP authentication and timer profiles if you haven’t done so.
STEP 21 | Commit.
PAN-OS® Networking Administrator’s Guide Version 11.0 533 ©2023 Palo Alto Networks, Inc.
Advanced Routing
PAN-OS® Networking Administrator’s Guide Version 11.0 534 ©2023 Palo Alto Networks, Inc.
Advanced Routing
PAN-OS® Networking Administrator’s Guide Version 11.0 535 ©2023 Palo Alto Networks, Inc.
Advanced Routing
6. Click OK.
PAN-OS® Networking Administrator’s Guide Version 11.0 536 ©2023 Palo Alto Networks, Inc.
Advanced Routing
7. Click OK.
PAN-OS® Networking Administrator’s Guide Version 11.0 537 ©2023 Palo Alto Networks, Inc.
Advanced Routing
PAN-OS® Networking Administrator’s Guide Version 11.0 538 ©2023 Palo Alto Networks, Inc.
Advanced Routing
STEP 2 | Select Network > Routing > Logical Routers and select a logical router.
2. Enter the Destination (IPv4 Address/Mask or address object) of the mroute, which is the
multicast source or subnet to which the firewall performs an RPF check.
3. Select the egress Interface for the unicast route to the multicast source.
4. Enter the IPv4 address (or address object) of the Next Hop router toward the source.
5. Enter a Preference for the route; range is 1 to 255.
6. Click OK.
PAN-OS® Networking Administrator’s Guide Version 11.0 539 ©2023 Palo Alto Networks, Inc.
Advanced Routing
PAN-OS® Networking Administrator’s Guide Version 11.0 540 ©2023 Palo Alto Networks, Inc.
PoE
You can configure Power over Ethernet (PoE) on the interfaces of supported firewalls
to transfer electrical power from the firewall to a connected powered device (PD).
This allows you to meet the power needs of PDs while continuing to transmit data to
them using a single Ethernet cable per physical PoE port.
541
PoE
PoE Overview
This table lists each Palo Alto Networks® Next-Generation firewall with PoE ports as well as the
maximum power they offer, the total allowed power budget, and the interface types they support.
Select Dashboard > Widgets > System > Interfaces to display the current status of each port. PoE
ports are denoted with a lightning bolt icon. Hovering the mouse over a PoE port icon displays
PoE status, allocated power, used power, and other configured details.
Similarly, select Dashboard > Widgets > System > PoE Power Budget to display a donut chart
that confirms the available power on the firewall and helps you decide which PDs to connect to
the PoE ports.
PAN-OS® Networking Administrator’s Guide Version 11.0 542 ©2023 Palo Alto Networks, Inc.
PoE
Configure PoE
The following task describes the procedure for setting up PoE on your firewall.
STEP 1 | Ensure that the device you want to provide power to is connected to the firewall using an
Ethernet cable through a supported PoE port on the firewall.
Using a Cat5 or Cat6 Ethernet cable ensures the most reliable power transfer. A Cat3
cable, for example, will only be able to transfer as much as 20W.
STEP 2 | Select Network > Interfaces > Ethernet and choose the interface you have cabled.
STEP 3 | PoE is active on all PoE ports by default. On the Ethernet Interface window, selecting
Advanced and viewing PoE Settings shows that PoE Enable is already enabled.
You can also use the CLI to enable or disable PoE. After logging in to the firewall
using terminal emulation software, enter configure followed by set network
interface ethernet ethernet1/9 poe poe-enabled {yes | no}
where “ethernet1/9” corresponds to the PoE port you wish to enable or disable.
Before continuing to the next step, determine the maximum amount of power that is
supported by the connected powered device (PD). This value is dependent on the type
and class of the PD.
PAN-OS® Networking Administrator’s Guide Version 11.0 543 ©2023 Palo Alto Networks, Inc.
PoE
STEP 4 | Set the amount of power reserved by the port by entering a value (in Watts) for PoE Rsvd
Pwr. This value must be a number between 0 and the Maximum Reserved Power of the port
as defined in the PoE Overview. A 0 indicates that no power is reserved by that PoE port.
You can also use the CLI to configure PoE reserved power. Enter configure
followed by set network interface ethernet1/9 poe poe-rsvd-pwer
<value> where “ethernet1/9” corresponds to the PoE port you wish to configure and
“<value>” refers to the number of Watts ranging from 0 to the maximum supported by
the interface.
The total PoE Rsvd Pwr of all of your PoE ports should not exceed the Total PoE
Budget Allowed. If you go over the Total PoE Budget Allowed, one or more powered
devices will enter the Den (Power Denied) state until you reallocate the reserved
power.
A PoE port can also enter Den or Dis (Disabled) state based on the current Total
Allocated Power. Total Allocated Power refers to the sum of all PoE ports' Reserved
Power or to the sum of Actual Allocated Power permitted by all PDs. If the total
Reserved Power is less than the total Actual Allocated Power, the PoE port enters the
Dis or Den state.
A PoE port in the Dis or Den state cannot be resolved by disconnecting and
reconnecting the PD. Instead, use one of the following methods to resume sensing
power on the connected PD:
• Disable PoE on the interface by unchecking PoE Enable. Apply the setting and then
go back to the same interface and check PoE Enable.
• Set the affected port link state to auto or up.
• Change the PoE Rsvd Pwr of the affected PoE port to equal or greater than the PD's
power requirement.
If no device is connected to a PoE port, ensure that either PoE Enable is unchecked or
the PoE Rsvd Pwr value is 0 to avoid consuming a portion of the PoE budget.
STEP 7 | Verify the status of the PoE ports by either checking the firewall web interface or the CLI.
1. To verify by the firewall web interface, log in to the firewall and select Dashboard >
Widgets > System > Interfaces. Hover the mouse over the PoE port icons, identified
by a lightning bolt symbol, for specific interface details. Select Dashboard > Widgets >
System > PoE Power Budget for power allocation information. To view status messages
and other PoE information, select Network > Interfaces > PoE.
2. To verify using the CLI, enter show poe or show poe detail.
PAN-OS® Networking Administrator’s Guide Version 11.0 544 ©2023 Palo Alto Networks, Inc.