ความคิดเห็น •

  • @sandeepjoseph2480
    @sandeepjoseph2480 2 ปีที่แล้ว +2

    A nice explanation of GWLB and integration with PAN firewall, thanks for posting.

    • @networkers5037
      @networkers5037 2 ปีที่แล้ว

      good one. i have been waiting for this. Thank you

  • @aravindviswanathan6884
    @aravindviswanathan6884 9 หลายเดือนก่อน +1

    Wow super great . Thanks a lot mama

  • @rusalkaus3406
    @rusalkaus3406 2 ปีที่แล้ว +3

    Our PAN SE keeps recommending to me to follow the recommended deployment guide but I'm having a hard time accepting this recommendation especially after watching this video. As a result, I just have more issues/questions/concerns. For example, outbound traffic is showing in traffic log on the same "from" and "to" zone. That defeats the whole purpose of using zones!
    Also, why are there IGW's in the App VPC's? Shouldn't there only be one IGW in the VPC that the PAN's resides in?

  • @michaeldanquah9309
    @michaeldanquah9309 15 วันที่ผ่านมา

    The recommendation from Palo is to override the default allow intrazone policy with a deny but you created an allow-all rule that allows everything- not sure why.

  • @manasp7888
    @manasp7888 ปีที่แล้ว

    is there any step by step guide from PANOS ? that refers this lab setup ?pls share the link. Appreciated the excellent tutorial.

  • @SSS_Tech
    @SSS_Tech หลายเดือนก่อน

    Why we created 2 Transit Gateway, cant we create single transit gateway and share via resource share option?

  • @rsc8765
    @rsc8765 2 ปีที่แล้ว +1

    Hello, what routes you have configured in your virtual router?

  • @hallowbeyourname
    @hallowbeyourname ปีที่แล้ว

    Thanks for this video. Is it possible to synchronise configurations in such architecture with two VM-Series? If yes can you share a link which shows that?

  • @VortexRiddle
    @VortexRiddle 3 หลายเดือนก่อน

    Lots of points - like Firewall routes (VR) and Security Hub routes details, Not covered.

  • @IanHayes
    @IanHayes ปีที่แล้ว +1

    Target group for the firewall comes up as unhealthy as you're not putting eth1/1 layer3 interface in a security zone. Also the CIDR for the security subnet needs to be added as an authorized IP for the interface management profile

    • @정무현-v4y
      @정무현-v4y ปีที่แล้ว

      If the ethernet 1/1 interface does not have any zone settings, it is confirmed that the healthcheck packet is dropped even though there is an allow-all policy.
      So, I created an additional zone and applied the ethernet1/1 interface, and then the unhealthy > healthy state.

    • @samuelli2812
      @samuelli2812 6 หลายเดือนก่อน

      @@정무현-v4y Thanks I hope I saw this earlier. I called Palo Alto support and spent 2 hours to find the same thing you mentioned. She missed that from the beginning. At 33:41, the ethernet1/1 is in zone gwlb-zone.

  • @IanHayes
    @IanHayes ปีที่แล้ว +6

    There's some good information here, but the narrator is going waaaay too fast, skips over some critical information, and makes a few showstopper mistakes if one copies what is going onscreen. There are some critical concepts that are glossed over in the narrator's race to the finish, leaving people trying to learn scratching their heads. There are some issues with the firewall configuration, as well as issues with some of the core setup such as subnets created. She also zooms past setting up the routes correctly in the security VPC for the GWLB endpoints. This could have been a very good video but it seems like this was done hastily. Please slow down and take more time going over each step.

  • @piyushgajjar200
    @piyushgajjar200 ปีที่แล้ว

    38:58 you static IP changed !! how can a static IP changes ? is it because an issue you were facing during the setup or anything else.