Manage: Policy Based Forwarding
Focus
Focus
Strata Cloud Manager

Manage: Policy Based Forwarding

Table of Contents

Manage: Policy Based Forwarding

Policy Based Forwarding allows you to override the routing table and is commonly used to specify an alternate path for security or performance purposes.
Where Can I Use This?What Do I Need?
  • Prisma Access (Managed by Panorama or Strata Cloud Manager)
  • NGFW, including those funded by Software NGFW Credits
Each of these licenses include access to Strata Cloud Manager:
→ The features and capabilities available to you in Strata Cloud Manager depend on which license(s) you are using.
Policy Based Forwarding rules allow traffic to take an alternative path from the next hop specified in the route table, and are typically used to specify an egress interface for security or performance reasons.
Go to ManageConfigurationNGFW and Prisma AccessNetwork PoliciesPolicy Based Forwarding.
Use a Policy Based Forwarding rule to direct traffic to a specific egress interface and override the default path for the traffic. Before you create a Policy Based Forwarding rule, make sure you understand that the set of IPv4 addresses is treated as a subset of the set of IPv6 addresses.
Use the following sections to configure a policy based forwarding rule:
  • Source
    • ZonesAdd source zones.
    • InterfaceAdd source interfaces.
    • AddressesAdd source addresses, address groups, or regions and specify the settings.
    • UsersAdd the users and user groups to whom the policy applies.
  • Destination
    • AddressesAdd source addresses, address groups, or regions and specify the settings.
  • Application and Services
    • Application Entities—Select the applications you would like to route through alternative paths.
      A Policy Based Forwarding rule may be applied before the firewall has enough information to determine the application. Therefore, application-specific rules are not recommended for use with Policy Based Forwarding. Whenever possible, use a service object.
      You cannot use custom applications, application filters, or application groups in Policy Based Forwarding rules.
    • Service Entities—Select the services and service groups you would like to route through alternative paths.
  • Forwarding
    • Action—You can set the Action to take when matching a packet by choosing from:
      • Forward—Directs the packet to the specified Egress Interface.
      • Discard—Drops the packet.
      • No PBF—Excludes packets that match the criteria for source, destination, application, or service defined in the rule. Matching packets use the route table instead of PBF.
    • Egress Interface—Select the network information for where you want to forward the traffic that matches your Policy Based Forwarding rule.
    • Next Hop
      • IP Address—Enter an IP address or select an address object of type IP Netmask to which to forward matching packets.
      • FQDN—Enter an FQDN (or select or create an address object of type FQDN) to which to forward matching packets.
      • None—No next hop mean the destination IP address of the packet is used as the next hop. Forwarding fails if the destination IP address is not in the same subnet as the egress interface.
    • Monitor—Enable monitoring to verify connectivity to a target IP address or to the Next Hop IP address if no IP address is specified.