: Advanced Route Engine
Focus
Focus

Advanced Route Engine

Table of Contents
End-of-Life (EoL)

Advanced Route Engine

PAN-OS supports an advanced route engine for BGP and static routing.
PAN-OS
®
provides an advanced route engine that allows the firewall to scale and provide stable, high-performing, and highly available routing functions to large data centers, ISPs, enterprises, and cloud users. The advanced route engine supports only BGP and static routing. The advanced route engine offering is in preview mode for PAN-OS 10.0 and the next few releases as Palo Alto Networks adds more routing protocols and more features within BGP. In PAN-OS 10.0, the advanced route engine supports the basic BGP features. View Features Not Supported on Advanced Route Engine.
Non-supported features are not carried over from the legacy route engine to the advanced route engine (whether BGP features, static route features, or unrelated features). You should not enable the advanced route engine until you know that all the features you require are supported.
Firewalls using the advanced route engine are appropriate for large data centers, enterprises, ISPs, and cloud services. The following models support the advanced route engine:
  • PA-7000 Series firewalls
  • PA-5200 Series firewalls
  • PA-3200 Series firewalls
  • VM-Series firewalls
Although a supported firewall can have a configuration that uses the legacy route engine and a configuration that uses the advanced route engine, only one route engine is in effect at a time. Each time you change the engine that the firewall will use (enable or disable Advanced Routing to access the advanced engine or legacy engine, respectively), you must commit the configuration and reboot the firewall for the change to take effect.
Before you switch to the advanced route engine, make a backup of your current configuration.
Similarly, if you configure Panorama with a template that enables or disables Advanced Routing, after you commit and push the template to devices, you must reboot the devices in the template for the change to take effect.
When configuring Panorama, create device groups and Templates for devices that all use the same Advanced Routing setting (all enabled or all disabled). Panorama won’t push configurations with Advanced Routing enabled to smaller firewalls that don’t support Advanced Routing. For those firewalls, Panorama will push a legacy configuration if one is present.
The advanced route engine supports only one logical router (known as a virtual router on the legacy route engine). The advanced route engine has more convenient menu options and there are more BGP settings that you can easily configure in a profile (authentication, timers, address family, or redistribution profile) that applies to a BGP peer group or peer, for example.
  1. Make a backup of your current configuration before you enable the advanced route engine.
  2. Enable the advanced route engine.
    1. Select
      Device
      Setup
      Management
      and edit the General Settings.
    2. Enable
      Advanced Routing
      .
    3. Before you click OK, make sure you have made a backup of your configuration for the legacy route engine.
    4. Click
      OK
      .
    5. A message about preview mode appears; click
      Yes
      to proceed.
    6. Commit
      .
    7. Select
      Device
      Setup
      Operations
      and
      Reboot Device
      .
  3. Log back into the firewall.
  4. Select
    Network
    .
    Notice the updated menu items, which are more industry-standard and more detailed than the single item (Virtual Routers) on the legacy menu.
    Routing
    includes
    Logical Routers
    and
    Routing Profiles
    , which include
    BGP
    . Logical routers in the advanced route engine are equivalent to virtual routers in the legacy route engine.
  5. Select
    Interfaces
    and configure one or more Layer 3 Interfaces with a static IP address or Configure an Interface as a DHCP Client.
  6. Name the logical router and add interfaces to it.
    1. Select
      Network
      Routing
      Logical Routers
      and
      Add
      the
      Name
      of the logical router.
    2. Add
      a Layer 3
      Interface
      that you defined to the logical router.
    3. Click
      OK
      to save the logical router.
  7. Configure a static route.
    1. Select
      Network
      Routing
      Logical Routers
      and select the logical router.
    2. Select
      Static
      and
      Add
      an
      IP
      or
      IPv6
      static route by
      Name
      .
    3. For
      Destination
      , enter the route and netmask (for example, 192.168.2.2/24 for an IPv4 address or 2001:db8:123:1::1/64 for an IPv6 address). If you’re creating a default route, enter the default route (0.0.0.0/0 for an IPv4 address or ::/0 for an IPv6 address). Alternatively, you can create an address object of type IP Netmask.
    4. (
      Optional
      ) For
      Interface
      , specify the outgoing interface for packets to use to go to the next hop. Specify an interface for stricter control over which interface the firewall uses rather than using the interface in the route table for the next hop of this route.
    5. For
      Next Hop
      , select one of the following:
      • IP Address
        —Enter the IP address (for example, 192.168.56.1 or 2001:db8:49e:1::1) when you want to route to a specific next hop. You must
        Enable IPv6 on the interface
        (when you Configure Layer 3 Interfaces) to use an IPv6 next hop address. If you’re creating a default route, for
        Next Hop
        you must select
        IP Address
        and enter the IP address for your internet gateway (for example, 192.168.56.1 or 2001:db8:49e:1::1). Alternatively, you can create an address object of type IP Netmask. The address object must have a netmask of /32 for IPv4 or /128 for IPv6.
      • Discard
        —Select to drop packets that are addressed to this destination.
      • None
        —Select if there is no next hop for the route. For example, a point-to-point connection does not require a next hop because there is only one way for packets to go.
    6. Enter the
      Admin Dist
      (administrative distance) for the route (range is 10 to 240; default is 10).
    7. Enter a
      Metric
      for the route (range is 1 to 65,535; default is 10).
  8. Configure path monitoring for the static route; you can monitor up to 128 static routes.
    1. Select
      Path Monitoring
      and
      Enable
      .
    2. Failure Condition
      determines whether path monitoring for the static route is based on one (any) or all monitored destinations. Select whether
      Any
      or
      All
      of the monitored destinations for the static route must be unreachable by ICMP for the firewall to remove the static route from the RIB and FIB and add the static route that has the next lowest metric (going to the same destination) to the FiB.
      Select
      All
      to avoid the possibility of any single monitored destination signaling a route failure when the destination is simply offline for maintenance, for example.
    3. (
      Optional
      ) Specify the
      Preemptive Hold Time (min)
      , the number of minutes a downed path monitor must remain in Up state before the firewall reinstalls the static route into the RIB; range is 0 to 1,440; default is 2. A setting of 0 (zero) causes the firewall to reinstall the route into the RIB immediately upon the path monitor coming up.
      The path monitor evaluates all of its monitored destinations for the static route and comes up based on the
      Any
      or
      All
      failure condition. If a link goes down or flaps during the hold time, when the link comes back up, the path monitor resumes and the Preemptive Hold Time is reset, causing the timer to restart from zero.
    4. Add
      a path monitoring destination by
      Name
      .
    5. Enable
      the path monitoring destination.
    6. For
      Source IP
      , select the IP address that the firewall uses in the ICMP ping to the monitored destination:
      • If an interface has multiple IP addresses, select one.
      • If you select an interface, the firewall uses the first IP address assigned to the interface by default.
      • If you select
        DHCP (Use DHCP Client address)
        , the firewall uses the address that DHCP assigned to the interface. To see the DHCP address, select
        Network
        Interfaces
        Ethernet
        and in the row for the Ethernet interface, click on
        Dynamic DHCP Client
        . The IP Address displays in the Dynamic IP Interface Status window.
    7. For
      Destination IP
      , enter an IP address or address object to which the firewall will monitor the path. The monitored destination and static route destination must use the same address family (IPv4 or IPv6).
      The destination IP address should belong to a reliable endpoint; you shouldn’t base path monitoring on a device that itself is unstable or unreliable.
    8. (
      Optional
      ) Specify the ICMP
      Ping Interval (sec)
      in seconds to determine how frequently the firewall monitors the path (range is 1 to 60; default is 3).
    9. (
      Optional
      ) Specify the ICMP
      Ping Count
      of packets that don’t return from the destination before the firewall considers the static route down and removes it from the RIB and FIB (range is 3 to 10; default is 5).
    10. Click
      OK
      to save the path monitor destination.
    11. Click
      OK
      twice to save the static route.
  9. Configure general BGP routing options.
    1. Select
      Network
      Routing
      Logical Routers
      and select the logical router.
    2. Select
      BGP
      General
      and
      Enable
      BGP.
    3. Assign a
      Router ID
      to BGP for the logical router, which is typically an IPv4 address to ensure the Router ID is unique.
    4. Assign the
      Local AS
      (autonomous system) to which the logical router belongs based on the Router ID (range for a 2-byte or 4-byte AS number is 1 to 4,294,967,295).
    5. Enable
      ECMP Multiple AS Support
      if you configured ECMP and you want to run ECMP over multiple BGP autonomous systems.
    6. Enforce First AS
      (enabled by default) to cause the firewall to drop an incoming Update message from an EBGP peer that does not list the EBGP peer’s own AS number as the first AS number in the AS_PATH attribute.
    7. Fast Failover
      of EBGP is enabled by default. You can disable EBGP fast failover if it causes the firewall to unnecessarily withdraw BGP routes.
    8. Specify the
      Default Local Preference
      that can be used to determine preferences among different paths; range is 0 to 4,294,967,295; default is 100.
    9. Enable Graceful Restart
      and configure the following timers:
      • Stale Route Time
        —Specify the length of time, in seconds, that a route can stay in the stale state (range is 1 to 3,600; default is 120).
      • Max Peer Restart Time
        —Specify the maximum length of time, in seconds, that the local device accepts as a grace period restart time for peer devices (range is 1 to 3,600; default is 120).
    10. For Path Selection, enable
      Always Compare MED
      to choose paths from neighbors in different autonomous systems; default is disabled. The Multi-Exit Discriminator (MED) is an external metric that lets neighbors know about the preferred path into an AS. A lower value is preferred over a higher value.
    11. Enable the
      Deterministic MED Comparison
      to choose between routes that are advertised by IBGP peers (BGP peers in the same AS). Default is enabled.
    12. Click
      OK
      to save general BGP settings.
  10. Configure a BGP peer group.
    1. Select
      Network
      Routing
      Logical Routers
      and select the logical router.
    2. Select
      BGP
      Peer Group
      and
      Add
      a peer group by
      Name
      .
    3. Enable
      the peer group.
    4. Specify the peer group
      Type
      as
      IBGP
      (Internal BGP—peering within an AS) or
      EBGP
      (External BGP—peering between two autonomous systems).
    5. For
      AFI IP Unicast
      , select or create an
      AFI Profile
      (Create a BGP Address Family Identifier profile) to apply the settings in the profile to the peer group. The default is
      None
      .
    6. For
      AFI IPv6 Unicast
      , select or create an
      AFI Profile
      (Create a BGP Address Family Identifier profile) to apply the settings in the profile to the peer group. The default is
      None
      .
    7. Configure Connection Options:
      • Select or create a
        Timer Profile
        (Timers Profile) to apply to the peer group; default is
        None
        .
      • For
        Multi Hop
        , set the time-to-live (TTL) value in the IP header; range is 1 to 255; default is 0. For EBGP, the default value of 0 means 1. For IBGP, the default value of 0 means 255.
      • Select or create an
        Auth Profile
        (BGP Auth Profile) to authenticate BGP peer communications; default is
        None
        .
  11. Add a BGP peer to the peer group.
    1. Add
      a peer by
      Name
      and
      Enable
      the peer.
    2. Enter the
      Peer AS
      (autonomous system) to which the peer belongs; range is 1 to 4,294,967,295.
    3. Select
      Addressing
      .
    4. Select
      Inherit AFI/SAFI config from peer-group
      or select or create an
      AFI IP Unicast
      profile or an
      AFI IPv6 Unicast
      profile (Create a BGP Address Family Identifier profile).
    5. For Local Address, select the Layer 3
      Interface
      for which you are configuring BGP.
      Interfaces configured with a static IP address and interfaces configured as a DHCP client are available to select. If you select an interface where DHCP assigns the address, the
      IP
      address will indicate
      None
      . DHCP will later assign an IP address to the interface; you can see the address when you view
      More Runtime Stats
      for the logical router.
    6. If the interface has more than one IP address, enter the
      IP
      address and netmask you want to use.
    7. For Peer Address, enter the
      IP
      address of the peer.
    8. Select
      Connection Options
      ; these options override the same option you have set for the peer group to which the peer belongs.
      • Select or create a
        Timer Profile
        . Alternatively, select
        inherit (Inherit from Peer-Group)
        or
        None
        , both of which cause the peer to use the profile specified for the peer group.
      • For
        Multi Hop
        , select
        inherit (Inherit from Peer-Group)
        or
        None
        , both of which cause the peer to use the value configured for the peer group.
      • Select or create an
        Auth Profile
        . Alternatively, select
        inherit (Inherit from Peer-Group)
        or
        None
        , both of which cause the peer to use the profile specified for the peer group.
    9. Select
      Advanced
      and
      Enable Sender Side Loop Detection
      (default is enabled). Causes the firewall to check the AS_PATH attribute of a route in its FIB before it sends the route in an update, to ensure that the peer AS number is not on the AS_PATH list. If it is, the firewall removes it to prevent a loop.
    10. Click
      OK
      to save the peer.
  12. Click
    OK
    to save the BGP peer group.
  13. Redistribute routes to BGP peer routers.
    1. Select
      Network
      Routing
      Logical Routers
      and select the logical router.
    2. Select
      BGP
      BGP Redistribution
      .
    3. Select
      Redistribution Rules
      to redistribute routes (that match the Redistribution profile) to the BGP peers of the logical router.
    4. Select
      Network
      to advertise routes based on a network address.
      • Select
        IPv4
        or
        IPv6
        and
        Add
        a corresponding
        Network
        address; subnets with matching network addresses are advertised to BGP peers of the logical router.
      • Select
        Unicast
        to install the matching routes into the unicast routing table of all BGP peers.
    5. Click
      OK
      to save the BGP redistribution settings.
  14. Create a BGP Authentication profile to apply to a BGP peer group or peer.
    1. Select
      Network
      Routing
      Routing Profiles
      BGP
      .
    2. Add
      a BGP Authentication Profile by
      Name
      (a maximum of 31 characters).
    3. Enter the
      Secret
      and
      Confirm Secret
      . The Secret is used as a key in MD5 authentication.
    4. Click
      OK
      .
  15. Create a BGP Timers profile to apply to a BGP peer group or peer.
    1. Select
      Network
      Routing
      Routing Profiles
      BGP
      .
    2. Add
      a BGP Timers Profile by
      Name
      (a maximum of 31 characters).
    3. Set the
      Keep Alive Interval (sec)
      —the interval, in seconds, after which routes from the peer are suppressed according to the Hold Time setting (range is 0 to 1,200; default is 30).
    4. Set the
      Hold Time (sec)
      —the length of time, in seconds, that may elapse between successive Keepalive or Update messages from the peer before the peer connection is closed (range is 3 to 3,600; default is 90).
    5. Set the
      Minimum Route Advertise Interval (sec)
      —the minimum amount of time, in seconds, between two successive Update messages that a BGP speaker (the firewall) sends to a BGP peer that advertise routes or withdrawal of routes (range is 1 to 600; default is 30).
    6. Click
      OK
      .
  16. Create a BGP Address Family Identifier (AFI) profile to apply to a BGP peer group or peer.
    1. Select
      Network
      Routing
      Routing Profiles
      BGP
      .
    2. Add
      an AFI Profile by
      Name
      (a maximum of 31 characters).
    3. Select
      IPv4
      or
      IPv6
      AFI to specify the type of profile.
    4. Advertise all paths to a peer
      —Advertise all routes in the BGP routing information base (RIB) for the logical router.
    5. Advertise the best path per neighboring AS
      to ensure that BGP advertises the best path for each neighboring AS, and not a generic path for all autonomous systems. Disable this if you want to advertise the same path to all autonomous systems.
    6. Allow AS in
      :
      • Origin
        —Accept routes even if the firewall’s own AS is present in the AS_PATH.
      • Occurrence
        —Number of times the firewall’s own AS can be in the AS_PATH.
      • None
        —(default setting) No action taken.
    7. Override ASNs in outbound updates if AS-Path equals Remote-AS
      —This setting is helpful if you have multiple sites belonging to the same AS number (AS 64512, for example) and there is another AS between them. A router between the two sites receives an Update advertising a route that can access AS 64512. To avoid the second site dropping the Update because it is also in AS 64512, the intermediate router replaces AS 64512 with its own AS number (ASN), AS 64522, for example.
    8. Originate Default Route
      —Advertise a default route or not. Disable if you want to advertise only routes to specific destinations.
    9. Num_prefixes
      —Maximum number of prefixes to accept (learn) from the peer.
    10. Threshold
      —Percentage of the maximum number of prefixes. The prefixes are added to the BGP local RIB. If the peer advertises more than the threshold, the firewall takes the specified action (Warning Only or Restart). Range is 1 to 100.
    11. Action
      Warning Only
      message in logs or
      Restart
      the BGP peer connection after the maximum number of prefixes is exceeded.
    12. Select the
      Next Hop
      :
      • Self
        —Causes the firewall to change the Next Hop address (in Updates it receives) to its own IP address in the Update before sending it on. This is helpful when the firewall is communicating with an EBGP router (in another AS) and with an IBGP router (in its own AS). For example, suppose the Next Hop address in a BGP Update that arrives at AS 64512 is the IP address of the egress interface of Router 2 where the Update egressed AS 64518. The Update indicates that to reach networks that Router 2 is advertising, use the Next Hop address of Router 2. However, if the firewall sends that Update to an iBGP neighbor in AS 64512, the unchanged Next Hop of Router 2 is outside AS 64512 and the iBGP neighbor does not have a route to it. When you select
        Self
        , the firewall changes the Next Hop to its own IP address so that an iBGP neighbor can use that Next Hop to reach the firewall, which in turn can reach the eBGP router.
      • Self Force
      • None
        —(default setting) No Next Hop.
    13. To have BGP remove private AS numbers from the AS_PATH attribute in Updates that the firewall sends to a peer in another AS, in
      Remove Private AS
      , select one of the following:
      • All
        —Remove all private AS numbers.
      • Replace AS
        —Replace all private AS numbers with the firewall’s AS number.
      • None
        —(default setting) No action taken.
    14. Enable
      Route Reflector Client
      to make the BGP peers a Route Reflector client in an IBGP network.
    15. For
      Send Community
      , select the type of BGP community attribute to send in outbound Update packets:
      • All
        —Send all communities.
      • Both
        —Send standard and extended communities.
      • Extended
        —Send extended communities (RFC 4360).
      • Large
        —Send large communities (RFC 8092).
      • Standard
        —Send standard communities (RFC 1997).
      • None
        —(default setting) Do not send any communities.
    16. Click
      OK
      .
  17. Create a BGP Redistribution Profile to redistribute static or connected routes (that match the profile) to the BGP peers of the logical router.
    1. Select
      Network
      Routing
      Routing Profiles
      BGP
      .
    2. Add
      a BGP Redistribution Profile by
      Name
      (a maximum of 31 characters).
    3. Select
      IPv4
      or
      IPv6
      AFI to indicate the type of Redistribution profile.
    4. Select
      Static
      and
      Enable
      to redistribute IPv4 or IPv6 static routes (that match the AFI you selected) into the BGP routing information base (RIB) of the BGP peers of the logical router.
    5. Configure the
      Metric
      to apply to the static routes being redistributed into BGP (range is 1 to 65,535).
    6. Select
      Connected
      and
      Enable
      to redistribute locally connected IPv4 or IPv6 routes (that match the AFI you selected) into the BGP RIB of the BGP peers.
    7. Configure the
      Metric
      to apply to the connected routes being redistributed into BGP (range is 1 to 65,535).
    8. Click
      OK
      .
  18. (
    On a firewall supporting multiple virtual systems
    ) Assign the logical router to a virtual system.
    1. Select
      Device
      Virtual Systems
      and select a virtual system and
      General
      .
    2. Add
      one or more
      Logical Routers
      .
    3. Click
      OK
      .
  19. (
    Optional
    ) Create an Admin Role Profile to control granular access to logical routers, static routes, BGP, and BGP routing profiles.
    1. Select
      Device
      Admin Roles
      and
      Add
      an Admin Role Profile by
      Name
      .
    2. Select
      Web UI
      .
    3. Enable
      ,
      Disable
      , or select
      Read Only
      for the following options:
      Network
      ,
      Routing
      ,
      Logical Routers
      ,
      Routing Profiles
      , and
      BGP
      (default is Enable).
    4. Click
      OK
      .
    5. Assign the role to an administrator. Configure a Firewall Administrator Account.
  20. (
    Optional
    ) Configure HA path monitoring based on the combined (or independent) path monitoring of a virtual wire, a VLAN, and a logical router.
    HA failover based on path monitoring is based on the failure condition set for Path Monitoring as a whole, which includes Virtual Wire path monitoring, VLAN path monitoring, and Logical Router path monitoring if they are all Enabled. Disable path monitoring for a virtual wire, VLAN, or logical router to exclude one or two of them from the HA failover determination based on path monitoring.
    1. Select
      Device
      High Availability
      Link and Path Monitoring
      .
    2. Edit
      Path Monitoring
      and select
      Enabled
      to enable HA path monitoring based on the combined or independent Virtual Wire Path monitoring, VLAN Path monitoring, and Logical Router Path monitoring.
    3. Select the
      Failure Condition
      :
      • Any
        —(default) Firewall triggers an HA failover when path monitoring for a virtual wire or a VLAN or a logical router fails.
      • All
        —Firewall triggers an HA failover when path monitoring for a virtual wire and a VLAN and a logical router fails (whichever of the three are enabled).
    4. Click
      OK
      .
    5. To include path monitoring of a logical router in the HA failover determination, in the Path Group section,
      Add Logical Router Path
      .
    6. Select the
      Name
      of the logical router for which you are configuring path monitoring.
      The source IP address for pings for a Logical Router path group will be automatically configured as the interface IP address that is indicated in the route table as the egress interface for the specified destination IP address.
    7. Select
      Enabled
      to enable path monitoring for the logical router.
    8. Select the
      Failure Condition
      for a logical router:
      • Any
        —(default) Firewall determines a logical router has failed when a ping failure in any destination IP group occurs.
      • All
        —Firewall determines a logical router has failed when a ping failure in all destination IP groups occurs.
      HA failover based on path monitoring is based on the Failure Condition set for Path Monitoring as a whole, which includes Virtual Wire path monitoring, VLAN path monitoring, and Logical Router path monitoring if they are all Enabled. Disable path monitoring for a virtual wire, VLAN, or logical router to exclude one or two of them from the HA failover determination based on path monitoring.
    9. Specify the
      Ping Interval
      —the interval between ICMP ping messages that the firewall sends to the destination IP address; range is 200 to 60,000ms; default is 200.
    10. Specify the
      Ping Count
      —the number of failed pings before declaring a failure; range is 3 to 10; default is 10.
    11. Add
      a
      Destination IP Group
      and give the group a helpful name.
    12. Add
      the
      Destination IP
      addresses to ping.
    13. Select
      Enabled
      to enable monitoring for the destination IP group.
    14. Select the
      Failure Condition
      :
      • Any
        —(default) Firewall considers the destination IP group has failed when a ping failure to any destination IP address in the group occurs.
      • All
        —Firewall considers the destination IP group has failed when a ping failure to all destination IP addresses in the group occurs.
    15. Click
      OK
      to save the destination IP group for the logical router.
    16. Click
      OK
      to save the HA Path Group Logical Router, which can have multiple destination IP groups.
    17. To include path monitoring of a virtual wire in the HA failover determination, in the Path Group section,
      Add Virtual Wire Path
      .
    18. Enter the
      Source IP
      address used in the pings sent to the next-hop router (Destination IP address). The local router must be able to route the address to the firewall.
    19. Configure the remaining settings that determine whether path monitoring indicates a virtual wire has failed; the settings are similar to those for Logical Router Path monitoring in the preceding steps. If you don’t want to monitor paths for a virtual wire, deselect
      Enabled
      or omit any destination IP addresses to monitor.
    20. To include path monitoring of a VLAN in the HA failover determination, in the Path Group section,
      Add VLAN Path
      .
    21. Enter the
      Source IP
      address used in the pings sent to the next-hop router (Destination IP address). The local router must be able to route the address to the firewall.
    22. Configure the remaining settings that determine whether path monitoring indicates a VLAN has failed; the settings are the same as those for logical router path monitoring in the preceding steps. If you don’t want to monitor paths for a VLAN, deselect
      Enabled
      or omit any destination IP addresses to monitor.
  21. Commit
    .
  22. Access the CLI to view advanced routing information.
    1. View BGP peer information:
      >
      show advance-routing bgp peer detail <peer-name>
      >
      show advance-routing bgp peer rib-out afi <ipv4|ipv6|both> <peer-name>
      >
      show advance-routing bgp peer rib-out <peer-name>
      >
      show advance-routing bgp peer status
    2. View BGP peer group information:
      >
      show advance-routing bgp peer-groups
    3. View BGP route information:
      >
      show advance-routing bgp route
      >
      show advance-routing bgp route afi <ipv4|ipv6|both>
    4. View summary BGP information:
      >
      show advance-routing bgp summary
    5. View forwarding information base (FIB) table entries:
      >
      show advance-routing fib
      >
      show advance-routing fib afi <ipv4|ipv6|both>
    6. View routing information base (RIB) entries:
      >
      show advance-routing route
      >
      show advance-routing route afi <ipv4|ipv6|both>
    7. View static route path monitor:
      >
      show advance-routing static-route-path-monitor

Features Not Supported on Advanced Route Engine

The following features or functionality are not supported on the advanced route engine in PAN-OS 10.0.
  • ECMP does not appear on the Route Table.
  • Bidirectional Forwarding Detection (BFD) for static routes or any routing protocol.
  • Static routes do not support a next hop that is an FQDN or a next logical router.
  • OSPF
  • OSPFv3
  • RIP
  • BGP does not support:
    • Reject Default Route
    • Install Route
    • Aggregate MED
    • Graceful Restart—Local Restart Time (sec)
    • Reflector Cluster ID
    • Confederation Member AS
    • Dampening Profiles
    • Reflector Client (non-client, client, meshed-client)
    • Peering Type (Bilateral, Unspecified)
  • BGP peer group does not support:
    • Peer group types IBGP Confed and EBGP Confed
    • Aggregated Confed AS Path
    • Soft Reset with Stored Info
    • Import Next Hop (Original, Use Peer)
    • Export Next Hop (Resolve, Use Self)
  • BGP peer does not support:
    • Peer address that is a Fully Qualified Domain Name (FQDN)
    • Open Delay Time (sec)
    • Idle Hold Time (sec)
    • Incoming Connections—Remote Port and Allow
    • Outgoing Connections—Local Port and Allow
    • Redistribution Rules
    • Import Rules
    • Export Rules
    • Conditional Advertisement Rules
    • Aggregate Rules

Recommended For You