Policy-Based Forwarding in Palo Alto Networks Firewalls

Overview

Policy-Based Forwarding (PBF) allows administrators to override the default routing behavior of the firewall by directing traffic to specific egress interfaces based on defined criteria. This is particularly useful in scenarios involving multiple ISPs, traffic segregation, or enforcing specific routing policies that differ from the routing table's decisions.

Interaction with Static Routes

When both PBF and static routes are configured:

This hierarchy allows for granular control over specific traffic flows while maintaining general routing behavior for other traffic.

Primary and Backup ISP Scenario

In environments with dual ISPs, PBF can be employed to direct traffic through the primary ISP. If the primary path becomes unavailable, the firewall can fail over to the secondary ISP using either:

Path monitoring can be configured to monitor the health of the primary path and trigger failover mechanisms when necessary.

Path Monitoring Failover Criteria

Path monitoring in PBF uses ICMP pings to a specified IP address to verify path availability. Key parameters include:

Upon detecting a path failure, actions can be configured as:

These actions ensure minimal disruption and maintain traffic flow during path failures.

Match Criteria for PBF Rules

PBF rules can match traffic based on various attributes:

By defining these criteria, administrators can create precise forwarding policies tailored to specific network requirements.

Next Hop Options in Policy-Based Forwarding

When configuring a Policy-Based Forwarding (PBF) rule, the Next Hop determines where the firewall forwards matching packets. The available options are:

These options provide flexibility in directing traffic based on specific network requirements.

Action Options in Policy-Based Forwarding

When configuring a PBF rule, the Action determines how the firewall handles packets that match the rule's criteria. The available actions are:

Selecting the appropriate action ensures that traffic is handled according to your network's design and policy requirements.

Best Practices

Additional Resources