Concept Guide

Next, create a policy-based routing access control list (ACL) and apply that ACL to all the roles that need
redirection. Best practices is to define a default rule at the end of the policy-based routing ACL that redirects all
non-corporate traffic to the PAN firewalls in the predefined next-hop list.
If you use the predefined nexthop list pan-gp-ipsec-map-list in your policy-based routing ACL, multiple
branch controllers can use the same ACL configuration.
(host) (config)# ip access-list route my_PBR_policy
(host) (config-route-my_PBR_policy)# any network 192.0.2.0 255.255.255.0 any forward
(host) (config-route-my_PBR_policy)# any any any route nexthop-list pan-gp-ipsec-map-list
Related Commands
Modification
ip nexthop-list
Define a nexthop list for policy-based routing.
pan active-profile
This command selects an active Palo Alto Network (PAN)profile from a set of
profiles.
pan profile
This command configures a Palo Alto Networks (PAN) profile to allow a
controller to communicate with a PANfirewall.
show pan-gp
This command displays Palo Alto Networks portal or gateway settings on a
branch or local controller.
show pan-options
This command displays configured options to integrate a branch with a Palo
Alto Networks (PAN) firewall.
uplink
Manage and configure the uplink network connection.
Command History
Modification
ArubaOS 6.4.3.0 Command introduced.
Command Information
Platforms Licensing Command Mode
All platforms Base operating system Config mode on master or local
controllers
Dell Networking W-Series ArubaOS 6.5.x | Reference Guide pan-options | 657