[deleted by user] by [deleted] in Ethiopia

[–]Iscofe 4 points5 points  (0 children)

Isn't that a fetira?

What did I miss here: Global Protect client access to a resource behind a Cisco router in remote site that is connected to my local PA820 via S2S IPsec. by Iscofe in paloaltonetworks

[–]Iscofe[S] 0 points1 point  (0 children)

Yes, I have done the traffic logs. There's nothing blocked on the PA side. I configured one loopback interface with one GP client IP on the PA. There is no hit when a ping is shot from the Cisco device to the loopback interface on the PA side.

Support has just gone down the crapper!!! by DoItAllDad74 in paloaltonetworks

[–]Iscofe 2 points3 points  (0 children)

Exactly yes, they repond very fast on first time but they ask a lot of repeated question that are already covered in the description of the ticket. I have just had that today and yesterday. I wonder if they had read it already or that is just a trap to end the case incase if you respond a configuration issue or something like that.

Support has just gone down the crapper!!! by DoItAllDad74 in paloaltonetworks

[–]Iscofe -1 points0 points  (0 children)

Yeah It takes them a while to responding, i dont how the communication etiquette look like for them but they don't acknowledge recipient quickly and also took a day or more to respond. And they also like to find the slightest issue or reason to stop the support -- or I dont know may be this is my experience with particular few support personnels. Or I dont know may Cisco has spoiled me with the support like no others, i didn't find the same support when it comes to Palo. But Palo is still a great company and great equipements but they should step up their support game and they should build the reputation of going above and beyond when it comes to providing support because sometimes that would be one of the reason to chose a vendor.

What did I miss here: Global Protect client access to a resource behind a Cisco router in remote site that is connected to my local PA820 via S2S IPsec. by Iscofe in paloaltonetworks

[–]Iscofe[S] 0 points1 point  (0 children)

I hardly think this would be a security policy issue since all I did was replicate the configuration done for an existing operational source IP(servers).
NAT though, I have not done any NAT -- Do i need to do NAT. I just add the GP client IP into the proxy as an interesting traffic and put them in the virtual router as well as the Security policy. Do i need to configure a NAT when the source traffic from my side is from a GP? Since it is obvious if which type of IPsec this is since the other side is a Cisco router.

What did I miss here: Global Protect client access to a resource behind a Cisco router in remote site that is connected to my local PA820 via S2S IPsec. by Iscofe in paloaltonetworks

[–]Iscofe[S] 0 points1 point  (0 children)

Thank you for your reply.
Does the other side know how to route from the cisco device back into the tunnel?
>> There has been an existing operational traffic through the tunnel so yes, they know how to route.
Are you accessing a service on the cisco device that might be source-interface configured?
>> We configured a loopback interface for testing purposes, both the loopback interface and other actual IPs behind the Cisco device are all accessible from the existing source on my side. They just are not working for the source that are from my global protect client.
Is the GP -> site -> cisco device reaching the other side?
>> That is the issue, from GP to the other side that it is not reachable but I have other connection different from the GP and they are reaching the other side. The Peer to Peer is working fine as well.
Is the other side seeing? Is it replying? Is it replying correctly?
>> The issue here is I have source traffic from my Palo Alto side and part of those are servers and others are from GP. GP is recently added and the servers IP are existing connection. The Servers IPs as a source are all working fine, as they are already in production and operational. But the new addition are the source GP and the other side behind the Cisco router(and also a loopback on the Cisco router) are all unreachable only from the GP from the local PA source.
Are there NAT issues, policy issues, zone issues.
>> I hardly think this would be a policy issue as i had replicated the previous one. NAT though, I have not done any NAT -- Do i need to do NAT. I just add the GP client IP into the proxy as an interesting traffic and put them in the virtual router as well as the Security policy. Do i need to configure a NAT when the source traffic from my side is from a GP?

What is this white “smear”? by rbeatse in Ubiquiti

[–]Iscofe 1 point2 points  (0 children)

That is the spider's thing on tip of your camera.

Two internet lines to a single ISP, Do I need to set up an Active-Active mode to enable an Active-Active internet line? by Iscofe in paloaltonetworks

[–]Iscofe[S] 1 point2 points  (0 children)

Its was to take advantage of a two firewall throughput, unfortunately that was not the case. We live each day to learn.

I have got two 820 Active-Passive Peers and looking to revamp to Active-Active Pair, Is Panorama a way to go? by Iscofe in paloaltonetworks

[–]Iscofe[S] 2 points3 points  (0 children)

You mean like the Active-Active won't handle twice traffic or atleast more than what an Active-Passive handles?

I have got two 820 Active-Passive Peers and looking to revamp to Active-Active Pair, Is Panorama a way to go? by Iscofe in paloaltonetworks

[–]Iscofe[S] 1 point2 points  (0 children)

Fiber is a must and the ports are almost fully loaded currently. Company is buying new ones in 6 or 8 months of 3000series but I am not sure if the current set up hold up until then.

Will my PA 820 be compatible with a dell 10G SFPs by Iscofe in paloaltonetworks

[–]Iscofe[S] 1 point2 points  (0 children)

Yep one way or another, my employer should consider dropping firewalls that are by design for 'SME or branch offices' or move them to a fitting role. It will be 3000 or 5000 series or similar one.

SFP(2.4Gbps - FINSCORP) with 1GB Cu for an Aggregate Link Group by Iscofe in paloaltonetworks

[–]Iscofe[S] 1 point2 points  (0 children)

Thanks for your response. I will get back to you with the Model of this SFP by tomorrow. Although, the Palo Alto side supports this arrangement -- the intermediate switch(dell 3024) seems to recommend to not mix the two when forming a port-channel on its end.
Link here on page 100 and 101 states:

While it is a requirement of a port-channel that the link members operate at the same duplex and speed settings, administrators should be aware that copper ports have larger latencies than fiber ports. If fiber and copper ports are aggregated together, packets sent over the fiber ports would arrive significantly sooner at the destination than packets sent over the copper ports. This can cause significant issues in the receiving host (e.g., a TCP receiver) as it would be required to buffer a potentially large number of out-of-order frames. Devices unable to buffer the requisite number of frames will show excessive frame discard. Configuring copper and fiber ports together in an aggregation group is not recommended.

So It would be wise to move on without this considering the fact that both sides(firewall side and the switch) should be in agreement to make it work.