Routing Tab
Table of Contents
10.0 (EoL)
Expand all | Collapse all
-
- Objects > Addresses
- Objects > Address Groups
- Objects > Regions
- Objects > Dynamic User Groups
- Objects > Application Groups
- Objects > Application Filters
- Objects > Services
- Objects > Service Groups
- Objects > Devices
- Objects > External Dynamic Lists
- Objects > Custom Objects > Spyware/Vulnerability
- Objects > Custom Objects > URL Category
- Objects > Security Profiles > Antivirus
- Objects > Security Profiles > Anti-Spyware Profile
- Objects > Security Profiles > Vulnerability Protection
- Objects > Security Profiles > File Blocking
- Objects > Security Profiles > WildFire Analysis
- Objects > Security Profiles > Data Filtering
- Objects > Security Profiles > DoS Protection
- Objects > Security Profiles > Mobile Network Protection
- Objects > Security Profiles > SCTP Protection
- Objects > Security Profile Groups
- Objects > Log Forwarding
- Objects > Authentication
- Objects > Decryption > Forwarding Profile
- Objects > Schedules
-
-
- Firewall Interfaces Overview
- Common Building Blocks for Firewall Interfaces
- Common Building Blocks for PA-7000 Series Firewall Interfaces
- Tap Interface
- HA Interface
- Virtual Wire Interface
- Virtual Wire Subinterface
- PA-7000 Series Layer 2 Interface
- PA-7000 Series Layer 2 Subinterface
- PA-7000 Series Layer 3 Interface
- Layer 3 Interface
- Layer 3 Subinterface
- Log Card Interface
- Log Card Subinterface
- Decrypt Mirror Interface
- Aggregate Ethernet (AE) Interface Group
- Aggregate Ethernet (AE) Interface
- Network > Interfaces > VLAN
- Network > Interfaces > Loopback
- Network > Interfaces > Tunnel
- Network > Interfaces > SD-WAN
- Network > VLANs
- Network > Virtual Wires
-
- Network > Network Profiles > GlobalProtect IPSec Crypto
- Network > Network Profiles > IPSec Crypto
- Network > Network Profiles > IKE Crypto
- Network > Network Profiles > Monitor
- Network > Network Profiles > Interface Mgmt
- Network > Network Profiles > QoS
- Network > Network Profiles > LLDP Profile
- Network > Network Profiles > SD-WAN Interface Profile
-
-
- Device > Setup
- Device > Setup > Management
- Device > Setup > Interfaces
- Device > Setup > Telemetry
- Device > Setup > Content-ID
- Device > Setup > WildFire
- Device > Setup > DLP
- Device > Log Forwarding Card
- Device > Config Audit
- Device > Administrators
- Device > Admin Roles
- Device > Access Domain
- Device > Authentication Sequence
- Device > Device Quarantine
-
- Security Policy Match
- QoS Policy Match
- Authentication Policy Match
- Decryption/SSL Policy Match
- NAT Policy Match
- Policy Based Forwarding Policy Match
- DoS Policy Match
- Routing
- Test Wildfire
- Threat Vault
- Ping
- Trace Route
- Log Collector Connectivity
- External Dynamic List
- Update Server
- Test Cloud Logging Service Status
- Test Cloud GP Service Status
- Device > Virtual Systems
- Device > Shared Gateways
- Device > Certificate Management
- Device > Certificate Management > Certificate Profile
- Device > Certificate Management > OCSP Responder
- Device > Certificate Management > SSL/TLS Service Profile
- Device > Certificate Management > SCEP
- Device > Certificate Management > SSL Decryption Exclusion
- Device > Certificate Management > SSH Service Profile
- Device > Response Pages
- Device > Server Profiles
- Device > Server Profiles > SNMP Trap
- Device > Server Profiles > Syslog
- Device > Server Profiles > Email
- Device > Server Profiles > HTTP
- Device > Server Profiles > NetFlow
- Device > Server Profiles > RADIUS
- Device > Server Profiles > TACACS+
- Device > Server Profiles > LDAP
- Device > Server Profiles > Kerberos
- Device > Server Profiles > SAML Identity Provider
- Device > Server Profiles > DNS
- Device > Server Profiles > Multi Factor Authentication
- Device > Local User Database > Users
- Device > Local User Database > User Groups
- Device > Scheduled Log Export
- Device > Software
- Device > Dynamic Updates
- Device > Licenses
- Device > Support
- Device > Policy Recommendation
-
- Network > GlobalProtect > MDM
- Network > GlobalProtect > Clientless Apps
- Network > GlobalProtect > Clientless App Groups
- Objects > GlobalProtect > HIP Profiles
-
- Use the Panorama Web Interface
- Context Switch
- Panorama Commit Operations
- Defining Policies on Panorama
- Log Storage Partitions for a Panorama Virtual Appliance in Legacy Mode
- Panorama > Setup > Interfaces
- Panorama > High Availability
- Panorama > Administrators
- Panorama > Admin Roles
- Panorama > Access Domains
- Panorama > Device Groups
- Panorama > Plugins
- Panorama > Log Ingestion Profile
- Panorama > Log Settings
- Panorama > Server Profiles > SCP
- Panorama > Scheduled Config Export
End-of-Life (EoL)
Routing Tab
The following table describes the virtual router’s runtime
stats for the Route
Table, Forwarding
Table, and the Static
Route Monitoring table.
Runtime Stat | Description |
---|---|
Route Table | |
Route Table | Select Unicast or Multicast to
display either the unicast or multicast route table. |
Display Address Family | Select IPv4 Only, IPv6
Only, or IPv4 and IPv6 (default)
to control which group of addresses to display in the table. |
Destination | IPv4 address and netmask or IPv6 address
and prefix length of networks the virtual router can reach. |
Next Hop | IP address of the device at the next hop
toward the Destination network. A next hop of 0.0.0.0 indicates
the default route. |
Metric | Metric for the route. When a routing protocol
has more than one route to the same destination network, it prefers
the route with the lowest metric value. Each routing protocol uses
a different type of metric; for example, RIP uses hop count. |
Weight | Weight for the route. For example, when
BGP has more than one route to the same destination, it will prefer
the route with the highest weight. |
Flags |
|
Age | Age of the route entry in the routing table.
Static routes have no age. |
Interface | Egress interface of the virtual router that
will be used to reach the next hop. |
Refresh | Click to refresh the runtime stats in the
table. |
Forwarding Table The
firewall chooses the best route—from the route table (RIB) toward
a destination network—to place in the FIB. | |
Display Address Family | Select IPv4 Only, IPv6
Only, or IPv4 and IPv6 (default)
to control which route table to display. |
Destination | Best IPv4 address and netmask or IPv6 address
and prefix length to a network the virtual router can reach, selected
from the Route Table. |
Next Hop | IP address of the device at the next hop
toward the Destination network. A next hop of 0.0.0.0 indicates
the default route. |
Flags |
|
Interface | Egress interface the virtual router will
use to reach the next hop. |
MTU | Maximum transmission unit (MTU); maximum
number of bytes that the firewall will transmit in a single TCP
packet to this destination. |
Refresh | Click to refresh the runtime stats in the
table. |
Static Route Monitoring | |
Destination | IPv4 address and netmask or IPv6 address
and prefix length of a network the virtual router can reach. |
Next Hop | IP address of the device at the next hop
toward the Destination network. A next hop of 0.0.0.0 indicates
the default route. |
Metric | Metric for the route. When there is more
than one static route to the same destination network, the firewall
prefers the route with the lowest metric value. |
Weight | Weight for the route. |
Flags |
|
Interface | Egress interface of the virtual router that
will be used to reach the next hop. |
Path Monitoring (Fail On) | If path monitoring is enabled for this static
route, Fail On indicates:
If static route path
monitoring is disabled, Fail On indicates Disabled. |
Status | Status of the static route based on ICMP
pings to the monitored destinations: Up, Down,
or path monitoring for the static route is Disabled. |
Refresh | Refreshes the runtime stats in the table. |