Configure Route Redistribution and OSPF

Configure route redistribution to make routing information from the firewall available to the external-facing routers attached to your leaf switches. Then configure OSPF on the firewall and assign a router-id, area number, and interface to form adjacencies.

Configure Route Redistribution

  1. Select Network > Virtual Routers and click on the virtual router you created earlier.
  2. Select Redistribution Profile > IPv4 > Add .
  3. Enter a descriptive Name for your redistribution profile.
  4. Enter a priority. Lower value means higher priority. Profiles are evaluated according to priority.
  5. For Redistribute , select Redist .
  6. Check connect and static under General Filters .
  7. Click OK .
Screenshot showing the IPv4 Redistribution Profile configuration window.
Configuring an IPv4 Redistribution Profile to redistribute connected and static routes.

Configure OSPF

  1. Select Network > Virtual Routers and click on the virtual router you created earlier.
  2. Select Router Settings > ECMP and select Enable .
  3. Select OSPF and choose Enable .
  4. Enter the OSPF Router ID .
  5. Under Area , click Add .
  6. Enter the Area ID . This value must match the value you assigned when you created the external routed network on the APIC. On the firewall, this must be entered in dotted decimal form. For example, if you entered an Area ID of 10 in the APIC, the equivalent on the firewall is 0.0.0.10.
  7. Select Interface > Add .
  8. Enter the interface that connects to your external network EPG and click OK .
  9. Select Export Rules > Add .
  10. Select the Redistribution Profile you created above from the Name drop-down and click OK .
  11. Select Allow Redistribute Default Route .
  12. Click OK .
Screenshot showing the OSPF configuration window including Router ID, Area configuration, and Export Rules.
Configuring OSPF settings, including enabling OSPF, setting Router ID, defining an Area, adding an interface, and applying an Export Rule with the previously created Redistribution Profile.

OSPF Route Redistribution Details

OSPF Path Types

OSPF routes to a destination network can be categorized into any of the following four path types:

  1. Intra-Area Path: Path to reach OSPF intra-area routes within the same area denoted by the flag Oi .
  2. Inter-Area Path: Path to reach OSPF inter-area routes in another area denoted by the flag Oo .
  3. External Type 1 Path: Path to reach external destinations outside the OSPF autonomous system denoted by the flag O1 . Ext-Type-1 path metric is the sum of the external route's cost and the cost of the path to reach the AS Boundary Routers (ASBR) advertising the external route.
  4. External Type 2 Path: Path to reach external destinations outside the OSPF autonomous system denoted by the flag O2 . Ext-Type-2 path metric is the cost of the external route and does *not* include the cost of the path to reach the ASBR advertising the external route. This is the default type for redistributed routes.

Using Path Type in Redistribution Profiles

To create a redistribution profile, go to Network > Virtual Router > [VRName] > Redistribution Profile . Click Add and enter the Name and Priority. Under 'OSPF Filters > Path Type', you can select which path types (Intra-Area, Inter-Area, Ext-1, Ext-2) should match this profile.

Screenshot showing Redistribution Profile with OSPF filter options.
Redistribution profile creation window, highlighting the OSPF Filters section where Path Type can be selected.

The screenshot below shows this profile applied under BGP Redistribution Rules ( Network > Virtual Router > [VRName] > BGP > Redist Rules ) to redistribute specific OSPF routes into BGP.

Screenshot showing BGP Redistribution Rules applying an OSPF redistribution profile.
Applying the created OSPF redistribution profile within BGP Redistribution Rules.

Example: Redistributing Inter-Area and Type-1 Routes

The following example shows configuring a redistribution profile to match only inter-area routes (Oo) and type-1 external routes (O1) from OSPF to be redistributed into BGP.

Screenshot showing a Redistribution Profile configured to redistribute Inter-Area and Ext Type-1 routes.
Redistribution profile configured to specifically match Inter-Area and External Type-1 OSPF routes.

After applying this profile, the BGP routing table shows only the routes matching these types (inter-area routes 7.7.7.0/24, 192.168.32.0/24 and type-1 external route 1.1.1.1/32 were redistributed in the original example, though the image doesn't show 1.1.1.1/32 as type-1).

Verify from the CLI:

> show routing route type bgp VIRTUAL ROUTER: default (id 1) ========== destination nexthop metric flags age interface next-AS 7.7.7.0/24 10.66.24.31 A?B 698 87 192.168.32.0/24 10.66.24.31 A?B 698 87 total routes shown: 2 (Note: CLI output adjusted based on image context, original text mentioned 3 routes including 3.3.3.0/24 and 1.1.1.1/32 which aren't shown filtered this way in the image)

OSPF Route Redistribution Details

Using Area Filter

The "Area" filter in a Redistribution Profile is useful when redistributing OSPF routes from an Area Border Router (ABR). You can choose which Area's routes can be redistributed by specifying the Area ID.

Remember to enter the Area ID in dotted decimal format (e.g., Area 1 is 0.0.0.1).

In the example below, Area 1 (0.0.0.1) has routes 7.7.7.0/24 and 192.168.32.0/24. The profile is configured to redistribute only routes from Area 0.0.0.1 into BGP.

Screenshot showing Redistribution Profile configured to filter by OSPF Area ID 0.0.0.1.
Redistribution Profile configured with an Area filter for Area 0.0.0.1.

Now, the BGP routing table shows only the two routes belonging to Area 1 redistributed.

Verify from the CLI:

> show routing route type bgp VIRTUAL ROUTER: default (id 1) ========== destination nexthop metric flags age interface next-AS 7.7.7.0/24 10.66.24.31 A?B 247 31 192.168.32.0/24 10.66.24.31 A?B 247 31 total routes shown: 2

OSPF Route Redistribution Details

Using Tag Filter

'Tag' or 'External Route Tag' is a 32-bit field associated with an external route (Type 5 AS-External-LSA or Type 7 NSSA-External-LSA) advertised by AS Boundary Routers (ASBRs).

Tags are not used by the OSPF protocol itself for routing decisions but provide a mechanism for external route management and filtering during redistribution.

Palo Alto Networks firewalls allow users to specify a tag value when redistributing routes *into* OSPF (under Network > Virtual Router > [VRName] > OSPF > Export Rules ):

Screenshot showing OSPF Export Rule with a field to set an External Route Tag.
Setting an External Route Tag in an OSPF Export Rule when redistributing routes *into* OSPF.

Conversely, when redistributing *from* OSPF into another protocol (like BGP), you can filter based on the tags associated with the external OSPF routes using the Redistribution Profile ( Network > Virtual Router > [VRName] > Redistribution Profile ).

If only specific external routes (identified by their tags) need to be redistributed, specify those tag values in the Redistribution Profile's OSPF Filters section, as shown below. Here, Tag 50.5.5.50 is associated with external route 1.1.1.1/32 and Tag 20.2.2.20 is associated with 2.2.2.2/32.

Screenshot showing a Redistribution Profile configured to filter external OSPF routes based on specific Tags.
Redistribution Profile configured to filter OSPF external routes using specific Tag values.

Now, the BGP routing table shows only these two tagged external routes redistributed.

Verify from the CLI:

> show routing route type bgp VIRTUAL ROUTER: default (id 1) ========== destination nexthop metric flags age interface next-AS 1.1.1.1/32 10.66.24.31 A?B 2008 31 2.2.2.2/32 10.66.24.87 A?B 2008 31 total routes shown: 2
Note: External LSAs (Type 5/7) are not associated with a specific area as they flood throughout the OSPF domain (or NSSA for Type 7). Therefore, when using "Tag" filters, generally avoid specifying "Area" or "Path Type" filters in the *same* profile unless you have a specific scenario where external routes with the *same tag* might exist as both Type 1 and Type 2, and you only want one type.

Example of using Tag and Path Type together (if needed): If 1.1.1.1/32 (Type 1) and 2.2.2.2/32 (Type 2) both use tag 20.2.2.20, you could filter for tag 20.2.2.20 *and* Path Type Ext-1 to only redistribute 1.1.1.1/32.

Screenshot showing Redistribution Profile filtering by both Tag and Path Type Ext-1.
Redistribution Profile filtering by both a specific Tag and Path Type External Type-1.

Verify from the CLI (only Ext-1 route 1.1.1.1/32 is shown):

> show routing route type bgp VIRTUAL ROUTER: default (id 1) ========== destination nexthop metric flags age interface next-AS 1.1.1.1/32 10.66.24.31 A?B 35 31 total routes shown: 1

Combining Filters with Multiple Profiles

In scenarios requiring complex filtering (e.g., redistributing routes from a specific area *plus* specific external routes based on tags), use multiple redistribution profiles with different priorities .

The example below uses two profiles applied to BGP Redist Rules:

Screenshot showing BGP Redistribution Rules using multiple OSPF redistribution profiles.
Applying multiple Redistribution Profiles (one for Area 1, one for external routes) in BGP Redist Rules.

The resulting BGP table shows routes from Area 1 (7.7.7.0/24, 192.168.32.0/24) and the external routes (1.1.1.1/32, 2.2.2.2/32).

Verify from the CLI:

> show routing route type bgp VIRTUAL ROUTER: default (id 1) ========== destination nexthop metric flags age interface next-AS 1.1.1.1/32 10.66.24.31 A?B 1097 31 2.2.2.2/32 10.66.24.87 A?B 1097 31 7.7.7.0/24 10.66.24.31 A?B 1097 31 192.168.32.0/24 10.66.24.31 A?B 1097 31 total routes shown: 4

How to Redistribute GlobalProtect Routes into OSPF

This section outlines the steps to redistribute the IP address pool assigned to GlobalProtect clients into your OSPF routing domain.

Steps

  1. Create a Redistribution Profile for GlobalProtect Routes:
    • Navigate to Network > Virtual Router > [Your VR] > Redistribution Profile .
    • Click Add .
    • Give it a descriptive Name (e.g., `GP-to-OSPF`).
    • Set Priority (e.g., 100).
    • For Action , select Redist .
    • Under General Filters , set Source Type to static . GlobalProtect client IP pools are treated like static routes associated with the tunnel interface for redistribution purposes.
    • Under General Filters , for Interface , select the tunnel interface used for your GlobalProtect gateway.
    • Click OK .
    Screenshot showing the Redistribution Profile configuration for GlobalProtect routes.
    Creating a Redistribution Profile filtering for 'static' routes on the GlobalProtect tunnel interface.
  2. Apply the Redistribution Profile to OSPF Export Rules:
    • Navigate to Network > Virtual Router > [Your VR] > OSPF > Export Rules .
    • Click Add .
    • Select the Redistribution Profile you just created (`GP-to-OSPF`) from the Name drop-down.
    • Choose the desired New Path Type (typically Ext-2 or Ext-1 ).
    • Set a Metric value if desired.
    • Click OK .
    Screenshot showing the OSPF Export Rule applying the GlobalProtect redistribution profile.
    Applying the GlobalProtect Redistribution Profile in the OSPF Export Rules.
  3. Commit the configuration changes.
  4. Validation:

    On a neighboring OSPF router (or another firewall participating in OSPF), check the routing table for the GlobalProtect routes. Use the CLI command:

    > show routing route type ospf
    CLI output showing GlobalProtect routes learned via OSPF on a neighboring device.
    Example CLI output on a peer device showing the redistributed GlobalProtect IP pool learned via OSPF.

    Ensure that the firewall policies allow traffic between the internal network and the GlobalProtect client IP pool, and that the OSPF neighbor relationship is correctly established.

How to Redistribute Static and Connected Routes into OSPF

This document describes how to redistribute existing static routes and directly connected interface subnets into the OSPF routing process on the Palo Alto Networks firewall, making them available to OSPF neighbors.

Steps

  1. Ensure Static Route(s) Exist (If Applicable):
    • Navigate to Network > Virtual Routers > [Your VR] > Static Routes .
    • Add any necessary static routes if they don't already exist.
    Screenshot showing the Static Routes configuration window.
    Example of Static Route configuration within a Virtual Router.
  2. Create a Redistribution Profile:
    • Navigate to Network > Virtual Routers > [Your VR] > Redistribution Profile .
    • Click Add .
    • Screenshot showing the list of Redistribution Profiles.
      Navigating to the Redistribution Profile section.
      Screenshot highlighting the Add button for Redistribution Profiles.
      Adding a new Redistribution Profile.
    • Enter a profile Name (e.g., `Static-Conn-to-OSPF`).
    • Enter a Priority value (e.g., 100).
    • Enable the Redist option for Action .
    • Under the General Filters tab, check both static and connected for Source Type . This tells the profile to match both types of routes.
    • Screenshot of Redistribution Profile configured for static and connected routes.
      Configuring the Redistribution Profile to match 'static' and 'connected' Source Types.
    • Click OK .
    • Screenshot showing the saved Redistribution Profile.
      The saved Redistribution Profile in the list.
  3. Apply the Profile via an OSPF Export Rule:
    • Navigate to Network > Virtual Routers > [Your VR] > OSPF > Export Rules .
    • Click Add .
    • Screenshot navigating to OSPF Export Rules.
      Navigating to OSPF Export Rules.
    • Select the Redistribution Profile you created (`Static-Conn-to-OSPF`) from the Name drop-down.
    • Choose the desired New Path Type ( Ext-1 or Ext-2 ). Ext-2 is the default for redistributed routes.
    • Set a Metric value if needed.
    • Screenshot showing the OSPF Export Rule configuration window.
      Applying the Redistribution Profile in an OSPF Export Rule.
    • Click OK .
  4. Commit the changes.

After committing, any existing or newly added static routes and directly connected interface subnets associated with this virtual router will be automatically redistributed into OSPF according to the profile and export rule settings.

How to Redistribute Connected Interfaces (Routes) Not Participating in OSPF

This document describes how to advertise the subnets of connected interfaces that are *not* directly participating in the OSPF process (i.e., not listed under OSPF > Area > [Area ID] > Interface ) into the OSPF domain.

Overview

Sometimes, you might have interfaces configured on the firewall (e.g., connecting to internal LANs or other network segments) whose subnets need to be known by OSPF neighbors, but you don't want those specific interfaces to actively form OSPF adjacencies. You can achieve this by redistributing their 'connected' routes.

Steps

  1. Navigate to Network > Virtual Routers > [Your VR] .
    Screenshot showing the list of Virtual Routers.
    Selecting the Virtual Router.
  2. Ensure OSPF is enabled and configured with a Router ID and at least one Area/Interface that *is* participating in OSPF.
    Screenshot showing basic OSPF configuration enabled.
    Basic OSPF Router Settings.
    Screenshot showing OSPF Area configuration.
    OSPF Area Configuration (showing an Area ID is defined).
    Screenshot showing at least one interface configured within an OSPF Area.
    At least one interface actively participating in OSPF within the Area.
  3. Create a Redistribution Profile:
    • Go to the Redistribution Profiles tab within the Virtual Router configuration.
    • Screenshot navigating to Redistribution Profiles tab.
      Navigating to Redistribution Profiles.
    • Click Add .
    • Enter a profile Name (e.g., `Non-OSPF-Conn-to-OSPF`).
    • Enter a Priority value.
    • Enable the Redist option for Action .
    • Under the General Filters tab:
      • Check connected for Source Type .
      • Crucially, select the specific interface(s) whose connected routes you want to advertise under the Interface selection list. Do *not* select the interface(s) already participating in OSPF here unless you intend to redistribute their connected routes explicitly (which OSPF usually handles automatically via Router/Network LSAs).
    • Screenshot showing Redistribution Profile for specific connected interfaces.
      Configuring the Redistribution Profile to match 'connected' Source Type and selecting the specific non-OSPF interface(s) to redistribute.
    • Click OK .
  4. Apply the Profile via an OSPF Export Rule:
    • Navigate to the OSPF > Export Rules tab.
    • Screenshot navigating to OSPF Export Rules.
      Navigating to OSPF Export Rules.
    • Click Add .
    • Select the Redistribution Profile you created (`Non-OSPF-Conn-to-OSPF`) from the Name drop-down.
    • Choose the New Path Type (e.g., Ext-2).
    • Set a Metric if desired.
    • Screenshot showing the OSPF Export Rule applying the non-OSPF connected profile.
      Applying the specific Redistribution Profile in an OSPF Export Rule.
    • Click OK .
  5. Commit the changes.

The connected subnets of the interfaces specified in the redistribution profile will now be advertised as OSPF external routes (Type 1 or Type 2 based on your export rule configuration).

Filter Specific Static Route from Being Advertised to OSPF

This article explains how to prevent specific static routes from being advertised into OSPF while still allowing the redistribution of other static routes. This method is particularly useful when a firewall has many static routes, and only a few need exclusion.

Details

The technique relies on using two Redistribution Profiles with different priorities applied via OSPF Export Rules.

Because profiles are evaluated in order of priority (lowest number first), the "No Redist" rule for the specific route will be matched first, preventing its redistribution. Other static routes won't match the first rule and will fall through to the second rule, allowing their redistribution.

Scenario

Firewall PA-1 is connected to PA-2 via OSPF. PA-1 has multiple static routes configured:

Screenshot showing multiple static routes configured on PA-1.
Static routes configured on firewall PA-1.

Initially, a single redistribution profile (`Redist-Static`, Priority 5, Action: Redist) is used, causing all static routes to be advertised:

Screenshot of the initial redistribution profile allowing all static routes.
Initial Redistribution Profile redistributing all static routes (Priority 5).
Screenshot of the initial OSPF export rule using the Redist-Static profile.
OSPF Export Rule applying the initial `Redist-Static` profile.

Validation on PA-2 shows all static routes are learned via OSPF:

CLI output on PA-2 showing all static routes learned via OSPF.
Validation on PA-2 showing all static routes (1.1.1.0/24, 2.2.2.0/24, 3.3.3.0/24, 4.4.4.0/24) learned.

Filtering Configuration

Goal: Prevent the redistribution of only the 4.4.4.0/24 static route.

  1. Create a "No Redist" Profile (Higher Priority):
    • Name: `Filter-Static`
    • Priority: 1 (Lower number = higher priority)
    • Action: No Redist
    • General Filters: Source Type = static
    • Destination Prefix Filter: Add 4.4.4.0/24
    Screenshot of the 'No Redist' redistribution profile filtering 4.4.4.0/24.
    Creating the `Filter-Static` profile (Priority 1, Action: No Redist) specifically matching 4.4.4.0/24.
  2. Keep the "Redist" Profile (Lower Priority):
    • Name: `Redist-Static`
    • Priority: 5 (Higher number = lower priority)
    • Action: Redist
    • General Filters: Source Type = static
    • (No specific destination prefix filter needed here, it acts as a catch-all for static routes not matched by the higher priority profile).
    Screenshot showing both Redistribution Profiles: Filter-Static (Prio 1) and Redist-Static (Prio 5).
    Both Redistribution Profiles: `Filter-Static` (Priority 1, No Redist for 4.4.4.0/24) and `Redist-Static` (Priority 5, Redist for other static routes).
  3. Apply Both Profiles in OSPF Export Rules:
    • Add *both* `Filter-Static` and `Redist-Static` profiles to the OSPF Export Rules list. The firewall evaluates them based on their internal priority (1 then 5).
    Screenshot showing both profiles applied in OSPF Export Rules.
    Applying both Redistribution Profiles in the OSPF Export Rules.
  4. Commit the changes.

Validation

Check the routing table on the neighbor (PA-2). The route 4.4.4.0/24 should no longer be present, while the other static routes remain.

CLI output on PA-2 showing 4.4.4.0/24 is filtered, others remain.
Validation on PA-2 showing 4.4.4.0/24 is successfully filtered, while 1.1.1.0/24, 2.2.2.0/24, and 3.3.3.0/24 are still learned via OSPF.

How to Advertise a Default Route via OSPF Not-So-Stubby-Area (NSSA)

This procedure describes how to configure a Palo Alto Networks firewall acting as an Area Border Router (ABR) or Autonomous System Boundary Router (ASBR) connected to a Not-So-Stubby Area (NSSA) to originate and advertise a default route (0.0.0.0/0) into that NSSA.

NSSA areas allow external routes (typically redistributed from other protocols) to enter the OSPF domain via Type-7 LSAs, which are then translated to Type-5 LSAs by the NSSA ABR for propagation into the backbone area. NSSAs can also receive a default route originated by the NSSA ABR.

Procedure

  1. Configure the Area as NSSA:
    • Navigate to Network > Virtual Router > [Your VR] > OSPF > Areas .
    • Click Add or modify the existing Area ID that connects to the NSSA routers.
    • Enter the Area ID (e.g., 0.0.0.1).
    • Select the Type as NSSA .
    • (Optional) Configure other NSSA options like 'Accept Summary' or 'Default Route Cost' if needed.
    • Screenshot showing OSPF Area configuration window.
      Navigating to OSPF Area configuration.
      Screenshot highlighting the NSSA Area Type selection.
      Selecting 'NSSA' as the Area Type.
    • Go to the Interface tab within the Area configuration and ensure the interface connecting to the NSSA network is added.
    • Click OK .
  2. Configure OSPF Export Rule to Originate Default Route:
    • Navigate to Network > Virtual Router > [Your VR] > OSPF > Export Rules .
    • Click Add . You might use an existing redistribution profile or create one, but the key setting is within the OSPF configuration itself, not necessarily the profile for *originating* a default into NSSA. However, the easiest way is often to enable the global option.
    • Go back to the main OSPF configuration tab ( Network > Virtual Router > [Your VR] > OSPF ).
    • Check the box Allow Redistribute Default Route . This option, when checked on an ABR/ASBR connected to an NSSA or Stub area, instructs the firewall to originate a default route into that area if a default route exists in the firewall's routing table or if redistribution policies allow it.
    • Screenshot of OSPF configuration highlighting 'Allow Redistribute Default Route'.
      Enabling 'Allow Redistribute Default Route' in the main OSPF configuration settings.
    • (Optional) If you need more control (e.g., only originate if a specific condition is met), you might need a more complex setup involving redistribution profiles and potentially static routes, but the global checkbox is the simplest method for standard default route origination into NSSA/Stub areas.
  3. Commit the changes.

The firewall will now advertise a Type-7 LSA for the default route into the NSSA, which routers within that NSSA can use to reach destinations outside the OSPF domain.

Remember that NSSA routers will see this as a Type-7 LSA (O N1 or O N2). The NSSA ABR will translate this to a Type-5 LSA (O E1 or O E2) for advertisement into other non-stub areas.

How to Suppress OSPF Routes (Inter-Area Summarization)

This document describes how to prevent specific OSPF network ranges learned in one area from being advertised into another area (specifically, into the backbone area or other non-backbone areas) by an Area Border Router (ABR). This is effectively inter-area route summarization and suppression .

As of the documentation source, only inter-area routes (Type-3 LSAs / Summary LSAs) can be suppressed using this method. Suppressing routes learned *within* the same area (intra-area routes, Type-1/Type-2 LSAs) is not supported via this feature.

Resolution

By default, an ABR advertises all routes learned from one area into other connected areas as Type-3 Summary LSAs. To suppress specific ranges:

  1. Navigate to Network > Virtual Routers > [Your VR] .
  2. Go to the OSPF > Areas tab.
  3. Screenshot navigating to OSPF Areas tab.
    Navigating to the OSPF Areas configuration tab.
  4. Select the Area ID from which the routes originate (the area whose routes you want to prevent from being advertised *elsewhere*). This is the ingress area for the suppression configuration.
  5. Go to the Range tab within that Area's configuration.
  6. Click Add .
  7. Specify the network Address and Netmask that you want to suppress from being advertised *out* of this area into others.
  8. Select Suppress for the Action .
  9. Screenshot showing the OSPF Area Range configuration for suppressing routes.
    Configuring an Area Range with the 'Suppress' action for network 10.9.32.0/21.
  10. Click OK and Commit the configuration.

Example Scenario

Topology: Upstream Device "A" (Area 0.0.0.1) --- (Area 0.0.0.1) Firewall "B" (ABR) (Area 0.0.0.0) --- Downstream Device "C" (Area 0.0.0.0).

Goal: Prevent specific routes learned from Device A in Area 0.0.0.1 from being advertised by Firewall B into Area 0.0.0.0 (to Device C).

Configuration: On Firewall B, edit Area 0.0.0.1 , go to the Range tab, and add the network range(s) to be suppressed with the Action "Suppress".

Troubleshooting & Notes

Can Next-Generation Firewall Virtual Routers Configure OSPF AS-External LSA (Type-5) Summarization?

A common OSPF feature on Autonomous System Boundary Routers (ASBRs) is the ability to summarize external routes (learned from other protocols like BGP or static routes) before redistributing them into OSPF as a single Type-5 LSA, rather than individual Type-5 LSAs for each external route.

Answer: As of the knowledge available in the source document, Palo Alto Networks Next-Generation Firewall virtual routers do not have a direct feature for OSPF AS-External LSA (Type-5) summarization during redistribution. They will typically redistribute each external route individually based on the redistribution profile.

Workaround

A workaround can be implemented using static routes and redistribution filtering to achieve a similar outcome:

Scenario

Goal: Redistribute multiple connected interfaces (e.g., 192.168.0.0/24, 192.168.1.0/24, 192.168.2.0/24, 192.168.3.0/24) as a single summarized external route (192.168.0.0/22) into OSPF.

Diagram showing the desired Type-5 summarization scenario.
Test environment aiming for Type-5 summarization.

Initial state (without workaround): Each connected route is redistributed as a separate Type-5 LSA.

Initial Virtual Router configuration.
Initial Virtual Router setup (details omitted for brevity, assume standard OSPF and redistribution of connected).
admin@Lab98-13-PA-820> show routing protocol ospf lsdb ... (output shows individual Type-5 LSAs for 192.168.0.0/24, 192.168.1.0/24, etc.) ... VR Area ID Orig RTR ID LS ID LSA Type Seq Number CheckSum Age Size 1 100.0.0.2 192.168.0.0/24 type-5 (External) 0x80000001 0x0000245E 60 1 100.0.0.2 192.168.1.0/24 type-5 (External) 0x80000001 0x00001968 60 1 100.0.0.2 192.168.2.0/24 type-5 (External) 0x80000001 0x00000E72 60 1 100.0.0.2 192.168.3.0/24 type-5 (External) 0x80000001 0x0000037C 60

Workaround Steps

  1. Create a Dummy Loopback Interface:
    • Create a loopback interface (e.g., loopback.1) and assign it an IP address (e.g., 1.1.1.1/32). This interface doesn't need to participate in OSPF directly but serves as a valid next-hop target for the static summary route.
    Screenshot configuring a loopback interface.
    Configuring a loopback interface (e.g., loopback.1 with IP 1.1.1.1).
    Screenshot adding loopback to the Virtual Router.
    Adding the loopback interface to the Virtual Router.
  2. Create a Static Summary Route:
    • Create a static route for the desired summary prefix (e.g., 192.168.0.0/22).
    • Set the next hop to the loopback interface created in step 1 (e.g., loopback.1).
    • Assign a high administrative distance/metric (e.g., Metric 100) to this static route. This ensures that the more specific connected routes are preferred for local routing decisions on the firewall itself, preventing routing loops. The static route primarily exists for redistribution.
    Screenshot creating the static summary route pointing to the loopback.
    Creating the static summary route (192.168.0.0/22) pointing to loopback.1 with a high metric (100).
  3. Modify Redistribution Profile:
    • Edit the Redistribution Profile used in your OSPF Export Rule.
    • Remove "connected" from the Source Type filter.
    • Add "static" to the Source Type filter.
    • Under Destination Prefixes, add the specific summary static route (192.168.0.0/22) to ensure *only* this static route is matched by the profile.
    Screenshot modifying the redistribution profile to match only the static summary route.
    Modifying the Redistribution Profile to match only the specific static summary route (192.168.0.0/22).
  4. Verify OSPF Export Rule:
    • Ensure the OSPF Export Rule is still using the modified Redistribution Profile.
    Screenshot verifying the OSPF Export Rule uses the modified profile.
    Verifying the OSPF Export Rule applies the correct (modified) Redistribution Profile.
  5. Commit the changes.

Validation

Check the OSPF LSDB and routing table on the neighboring OSPF router. Only the summarized Type-5 LSA (192.168.0.0/22) should be present, originating from the firewall (ASBR).

admin@Lab98-13-PA-820> show routing protocol ospf lsdb ... VR Area ID Orig RTR ID LS ID LSA Type Seq Number CheckSum Age Size 1 100.0.0.2 192.168.0.0/22 type-5 (External) 0x80000002 0x00001371 447 ... total LSAs shown: X (Only the summary Type-5 LSA should be present from this ASBR) admin@Lab98-13-PA-820> show routing route ... (On the neighbor router) ... VIRTUAL ROUTER: OSPF-Router1 (id 1) ========== destination nexthop metric flags age interface next-AS ... 192.168.0.0/22 100.0.0.2 11 A O1 519 ethernet1/5 ... total routes shown: Y (Should include the summary route)

This workaround effectively achieves Type-5 summarization by manipulating redistribution to only advertise a pre-configured static summary route instead of the individual connected routes.

OSPFv3 Introduction

OSPFv3 provides support for the OSPF routing protocol within an IPv6 network . As such, it provides support for IPv6 addresses and prefixes. It retains most of the structure and functions of OSPFv2 (for IPv4) with some key changes.

Key Differences and Features of OSPFv3:

All detailed changes are described in RFC 5340.

Key takeaways for exams: OSPFv3 is for IPv6, uses Router IDs, relies on IPSec for auth, operates per-link, and has new LSA types (Link and Intra-Area Prefix).

Create OSPFv3 Routing Profiles

When using the Advanced Routing Engine, OSPFv3 requires several types of profiles to be created before configuring the main OSPFv3 settings. These profiles define timers, authentication methods, and redistribution rules.

Profile Types

Configuration Steps

1. Create an OSPFv3 Global Timer Profile

  1. Select Network > Routing > Routing Profiles > OSPFv3 .
  2. Click Add under OSPFv3 Global Timer Profile .
  3. Enter a Name .
  4. Configure Timers:
    • LSA min-arrival: Smallest interval between SPF recalculations (Default: 5s).
    • SPF Throttle - Initial delay: Delay after topology change before SPF runs (Default: 5s).
    • SPF Throttle - Initial hold time: Min time between first two SPF runs (Default: 5s). Hold time doubles subsequently.
    • SPF Throttle - Maximum hold time: Max time between consecutive SPF runs (Default: 5s).
  5. Screenshot of OSPFv3 Global Timer Profile configuration window.
    OSPFv3 Global Timer Profile configuration.
  6. Click OK .

2. Create an OSPFv3 Interface Authentication Profile

  1. Select Network > Routing > Routing Profiles > OSPFv3 .
  2. Click Add under OSPFv3 Auth Profile .
  3. Enter a Name .
  4. Enter the SPI (Security Policy Index) - must match neighbor.
  5. Select Protocol : ESP (recommended) or AH .
  6. Select Authentication Type (e.g., SHA1, SHA256, MD5, None).
  7. Enter and Confirm the Authentication Key (Hex format).
  8. Screenshot of OSPFv3 Authentication Profile configuration window.
    OSPFv3 Authentication Profile configuration (using ESP).
  9. If using ESP, select Encryption Algorithm (e.g., 3des, aes-128-cbc).
  10. If using ESP, Enter and Confirm the Encryption Key (Hex format, length depends on algorithm).
  11. Click OK .

3. Create an OSPFv3 Interface Timer Profile

  1. Select Network > Routing > Routing Profiles > OSPFv3 .
  2. Click Add under OSPFv3 Interface Timer Profile .
  3. Enter a Name .
  4. Configure Timers:
    • Hello Interval: Frequency of Hello packets (Default: 10s).
    • Dead Count: Number of missed Hellos before neighbor declared down (Default: 4). Actual Dead Interval = Hello Interval * Dead Count .
    • Retransmit Interval: Time waiting for LSA ACK before retransmit (Default: 5s).
    • Transmit Delay: Delay before sending LSA out interface (Default: 1s).
    • Graceful Restart Hello Delay (sec): Duration firewall sends Grace LSAs instead of Hellos during HA failover (Default: 10s). Ensure Dead Interval is significantly longer (e.g., >= 4x) than this delay to prevent adjacency drops during graceful restart.
  5. Screenshot of OSPFv3 Interface Timer Profile configuration window.
    OSPFv3 Interface Timer Profile configuration.
  6. Click OK .

4. Create an OSPFv3 Redistribution Profile

  1. Select Network > Routing > Routing Profiles > OSPFv3 .
  2. Click Add under OSPFv3 Redistribution Profile .
  3. Enter a Name .
  4. Configure sections for the route types you want to redistribute ( IPv6 Static , Connected , BGP AFI IPv6 , IPv6 Default Route ):
    • Enable the section.
    • Set default Metric and Metric Type (Type 1 or Type 2).
    • (Optional) Apply a Redistribute Route-Map for fine-grained control over which specific routes are redistributed and potentially modify their attributes (metric, type) upon redistribution. Settings in the Route Map override defaults set in the profile.
    • For IPv6 Default Route :
      • Always: If checked, originate default even if no default exists locally (use with caution).
  5. Screenshot of OSPFv3 Redistribution Profile configuration window.
    OSPFv3 Redistribution Profile configuration options for various route sources.
  6. Click OK .

These profiles are created first and then referenced when you configure the main OSPFv3 settings under Network > Virtual Routers > [Your VR] > OSPFv3 .

How to Troubleshoot Flapping OSPF Neighbor Adjacency

An OSPF neighbor adjacency that repeatedly goes up and down ("flaps") indicates instability in the network or issues on the participating routers. Here’s a systematic approach to identify the cause:

1. Check Underlying Reachability and Configuration

2. Check Firewall Resource Utilization

Resource exhaustion on the firewall can lead to delayed processing of OSPF packets (Hellos, LSAs), causing dead timers to expire and adjacencies to flap.

3. Check OSPF Logs for Specific Errors

Examine the routing process logs for explicit error messages related to the flapping neighbor.

> less mp-log routed.log # Search for neighbor IP or specific errors within the log # OR use grep for specific patterns: > grep pattern "neighbor 10.1.1.2" mp-log routed.log > grep pattern "mismatched" mp-log routed.log > grep pattern "duplicate" mp-log routed.log

Look for errors like:

4. Advanced Troubleshooting

How to Troubleshoot OSPF Adjacency Stuck in INIT, EXSTART, EXCHANGE, or LOADING States

OSPF neighbors go through several states before reaching the FULL state. If the adjacency gets stuck in an intermediate state, it indicates a problem preventing the process from completing.

graph LR subgraph Adjacency Formation Down --> Init{"INIT"}; Init --> TwoWay{"2-WAY"}; TwoWay --> ExStart{"EXSTART"}; ExStart --> Exchange{"EXCHANGE"}; Exchange --> Loading{"LOADING"}; Loading --> Full{"FULL"}; end Down -- "Hello Received w/o Self RID" --> Init; Init -- "Hello Received w/ Self RID" --> TwoWay; TwoWay -- "DR/BDR Election (if needed) & Master/Slave Decided" --> ExStart; ExStart -- "DBD Packets Exchanged (Headers OK, MTU Match)" --> Exchange; Exchange -- "LSA Request List Built" --> Loading; Loading -- "All LSAs Received & Acked" --> Full; %% Potential Failure Points Init -- "Hello Not Received by Peer" --> Init; TwoWay -- "DR/BDR Issue / Unicast Blocked" --> TwoWay; ExStart -- "MTU Mismatch / Master/Slave Issue" --> ExStart; Exchange -- "DBD Corruption / Unicast Blocked / MTU Issue" --> Exchange; Loading -- "LSA Update Failure / Unicast Blocked / MTU Issue" --> Loading; style Init fill:#f9f,stroke:#333,stroke-width:2px; style TwoWay fill:#ccf,stroke:#333,stroke-width:2px; style ExStart fill:#ffc,stroke:#333,stroke-width:2px; style Exchange fill:#ffc,stroke:#333,stroke-width:2px; style Loading fill:#ffc,stroke:#333,stroke-width:2px; style Full fill:#cfc,stroke:#333,stroke-width:2px; style Down fill:#fcc,stroke:#333,stroke-width:2px;

Flowchart illustrating OSPF neighbor states and potential failure points.

Troubleshooting Steps by State:

Stuck in DOWN / No Neighbor Seen

Stuck in INIT

Stuck in 2-WAY

Stuck in EXSTART

Stuck in EXCHANGE or LOADING

FULL State

This is the desired state where routers are fully adjacent, LSDBs are synchronized, and SPF calculations are performed.

What Happens When Graceful Restart Occurs in OSPF?

OSPF Graceful Restart (RFC 3623) is a mechanism designed to minimize routing disruption when an OSPF router undergoes a planned or unplanned restart (like a software process restart or HA failover) without disrupting its forwarding plane.

Process Overview

  1. Restart Initiation: When the OSPF process restarts (e.g., using debug routing restart or debug software restart process routed , or during HA failover), the restarting router enters graceful restart mode.
  2. Grace-LSA Transmission: The restarting router immediately starts sending Grace-LSAs (Opaque Type-9 LSA with Opaque Type 3) out of its OSPF interfaces. These LSAs signal to neighbors that it's undergoing a graceful restart and specify the Grace Period (how long neighbors should maintain the adjacency and routes through the restarting router).
    Example Grace-LSA Packet Detail:
    Frame XXX: ... LS Update ... LS Type: Opaque LSA, Link-local scope (9) Link State ID Opaque Type: grace-LSA (3) ... Advertising Router: [Restarting Router ID] ... Grace Period: 120 seconds. <<< Indicates duration neighbors should wait ... Restart Reason: Unknown (0) (Or Software Restart, etc.) Restart IP: [Restarting Router Interface IP]
  3. Helper Mode Activation: Graceful Restart capable neighbors receiving the Grace-LSA enter "Helper Mode". They maintain the adjacency with the restarting router and continue advertising routes learned through it , assuming the forwarding plane is still active. They suppress immediate reactions to the OSPF process being down on the restarting router.
  4. Hello Suppression (Restarting Router): During the initial part of the grace period (defined by the Graceful Restart Hello Delay in the OSPFv3 Interface Timer Profile, or a similar internal timer for OSPFv2), the restarting router *stops* sending regular Hello packets while it sends Grace-LSAs.
  5. OSPF Re-establishment: The restarting router attempts to re-establish its OSPF adjacencies and synchronize its LSDB within the Grace Period.
  6. Exit Graceful Restart: Once the restarting router has successfully re-established adjacencies and synchronized, it stops sending Grace-LSAs and resumes normal OSPF operation. Helper routers exit Helper Mode.
  7. Grace Period Expiry: If the restarting router fails to recover within the Grace Period specified in the Grace-LSA, helper neighbors will tear down the adjacency and trigger normal OSPF convergence (SPF runs, LSA flooding).

Impact on BDR Role During Restart

Consider a firewall acting as the Backup Designated Router (BDR) on a segment:

Example Hello Packet After Failed/Long Restart:
Frame YYY: ... Hello Packet ... Designated Router: 192.168.10.1 (Original DR) Backup Designated Router: 192.168.10.2. <<< Changed from 192.168.10.3 (restarting router) ... Active Neighbor: 192.168.10.1 Active Neighbor: 192.168.10.2

Graceful Restart is crucial for minimizing downtime during planned maintenance or HA failovers in OSPF environments. Ensure it's enabled and timers (Grace Period, Hello Delay vs Dead Interval) are appropriately configured.

OSPF Concepts Quiz

Test your understanding of the OSPF concepts covered.

1. When configuring an OSPF Area ID on a Palo Alto Networks firewall that corresponds to Area 10 configured on a Cisco APIC, how should the Area ID be entered on the firewall?

2. Which OSPF external route type calculates its metric based *only* on the cost defined by the ASBR and does *not* add the internal OSPF cost to reach the ASBR? (This is the default type for redistributed routes).

3. How is authentication handled in OSPFv3?

4. When filtering specific static routes using multiple Redistribution Profiles in OSPF Export Rules, how does the firewall decide which profile's action ('Redist' or 'No Redist') to apply?

5. Which OSPF area type allows external routes (Type 5/7 LSAs) to be imported via redistribution but prevents flooding of external routes *from other areas* into it, while still allowing a default route to be originated by the ABR?

6. If an OSPF adjacency gets stuck and repeatedly transitions between 2-WAY and EXSTART states, what is the most common cause?

7. During an OSPF Graceful Restart, what does the restarting router send to its neighbors to indicate it's restarting but they should maintain the adjacency?

8. When redistributing GlobalProtect client IP pool routes into OSPF, what 'Source Type' and 'Interface' should typically be selected in the Redistribution Profile?

9. Does the Palo Alto Networks firewall natively support summarizing multiple external routes (e.g., from static or connected) into a single Type-5 LSA during redistribution into OSPF?

10. How can you prevent routes learned in one OSPF area (e.g., Area 1) from being advertised by the ABR into another area (e.g., Area 0)?

11. In OSPFv3, how are neighboring routers primarily identified in protocol packets (excluding LSA payloads)?

12. Which two *new* LSA types were introduced specifically for OSPFv3?

13. OSPFv3 operates on a _______ basis, whereas OSPFv2 operates on a per-IP-subnet basis.

14. In which OSPF neighbor state has a router received a Hello packet from a neighbor, but has not yet seen its own Router ID listed in that neighbor's Hello packet?

15. What is the primary risk if the OSPF Dead Interval is shorter than or too close to the Graceful Restart Hello Delay during an HA failover or process restart?

16. To redistribute both directly connected interface subnets AND configured static routes into OSPF using a single Redistribution Profile, what should be selected under 'General Filters'?

17. How is the 'Priority' value interpreted when multiple Redistribution Profiles are applied (e.g., in OSPF Export Rules)?

18. What is the primary purpose of the 'Tag' field associated with OSPF external routes (Type 5/7 LSAs)?

19. When using the 'Area Range' feature with the 'Suppress' action to filter inter-area routes, where is this configuration applied?

20. In which OSPF neighbor state are routers actively requesting and receiving specific LSAs from each other based on the information exchanged in DBD packets?

```