<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic AWS IPSec tunnel active/active HA with BGP in VM-Series in the Public Cloud</title>
    <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-ipsec-tunnel-active-active-ha-with-bgp/m-p/521925#M1746</link>
    <description>&lt;P&gt;Looking for some help here. &amp;nbsp;I have an ongoing case with support concerning AWS tunnel issues. &amp;nbsp;My production FWs are active/active but not in sync. &amp;nbsp;Just always been that way, it's the way I inherited it. &amp;nbsp;I have 4 tunnels to AWS (2 on each FW) BGP all works fine but if I reboot one FW when it comes back it blows up all the tunnels. &amp;nbsp;So support says I need to have the FWs in sync and then build them with a floating IP on each side and that will fix all my issues. &amp;nbsp;So in my lab I have the same setup, got the FWs in sync but the documentation to build this is pretty much nonexistent. &amp;nbsp;Support gave me a doc from 2011 which has about a page on the topic and doesn't mention dynamic routing at all. &amp;nbsp;&lt;/P&gt;
&lt;P&gt;So my first question is anyone doing this? &amp;nbsp;&lt;/P&gt;
&lt;P&gt;From there my questions are a bit more all over the place. &amp;nbsp;First the document says a tunnel interface on each device needs to be defined with a unique IP. &amp;nbsp;Do you add the /30 network AWS gives you for each side and then create a floating IP for the BGP peer in your VR? &amp;nbsp;I have tried to build this a few different ways and can't get it to work. &amp;nbsp;The best I have had was 2 of the 4 tunnels up and none of the BGP to come up. &amp;nbsp;Meanwhile the tunnels I build the other way are all still up so with BGP peers working (just don't reboot). &amp;nbsp;&lt;/P&gt;
&lt;P&gt;With them in sync it is strange what gets synced and what doesn't and then what will break the sync and need to be forced or fixed to get them back in sync. &amp;nbsp;Do you build all this from one side and just change the priority of the floating IP to the other device if you want some of the tunnels to live on the other FW? &amp;nbsp;Do you replicated everything to the other FW if it doesn't get synched? &amp;nbsp;Sorry like I said I am all over the place at the end of a frustrating day.&lt;/P&gt;
&lt;P&gt;Thanks for any help.&lt;/P&gt;</description>
    <pubDate>Mon, 21 Nov 2022 22:05:59 GMT</pubDate>
    <dc:creator>jdemares</dc:creator>
    <dc:date>2022-11-21T22:05:59Z</dc:date>
    <item>
      <title>AWS IPSec tunnel active/active HA with BGP</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-ipsec-tunnel-active-active-ha-with-bgp/m-p/521925#M1746</link>
      <description>&lt;P&gt;Looking for some help here. &amp;nbsp;I have an ongoing case with support concerning AWS tunnel issues. &amp;nbsp;My production FWs are active/active but not in sync. &amp;nbsp;Just always been that way, it's the way I inherited it. &amp;nbsp;I have 4 tunnels to AWS (2 on each FW) BGP all works fine but if I reboot one FW when it comes back it blows up all the tunnels. &amp;nbsp;So support says I need to have the FWs in sync and then build them with a floating IP on each side and that will fix all my issues. &amp;nbsp;So in my lab I have the same setup, got the FWs in sync but the documentation to build this is pretty much nonexistent. &amp;nbsp;Support gave me a doc from 2011 which has about a page on the topic and doesn't mention dynamic routing at all. &amp;nbsp;&lt;/P&gt;
&lt;P&gt;So my first question is anyone doing this? &amp;nbsp;&lt;/P&gt;
&lt;P&gt;From there my questions are a bit more all over the place. &amp;nbsp;First the document says a tunnel interface on each device needs to be defined with a unique IP. &amp;nbsp;Do you add the /30 network AWS gives you for each side and then create a floating IP for the BGP peer in your VR? &amp;nbsp;I have tried to build this a few different ways and can't get it to work. &amp;nbsp;The best I have had was 2 of the 4 tunnels up and none of the BGP to come up. &amp;nbsp;Meanwhile the tunnels I build the other way are all still up so with BGP peers working (just don't reboot). &amp;nbsp;&lt;/P&gt;
&lt;P&gt;With them in sync it is strange what gets synced and what doesn't and then what will break the sync and need to be forced or fixed to get them back in sync. &amp;nbsp;Do you build all this from one side and just change the priority of the floating IP to the other device if you want some of the tunnels to live on the other FW? &amp;nbsp;Do you replicated everything to the other FW if it doesn't get synched? &amp;nbsp;Sorry like I said I am all over the place at the end of a frustrating day.&lt;/P&gt;
&lt;P&gt;Thanks for any help.&lt;/P&gt;</description>
      <pubDate>Mon, 21 Nov 2022 22:05:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-ipsec-tunnel-active-active-ha-with-bgp/m-p/521925#M1746</guid>
      <dc:creator>jdemares</dc:creator>
      <dc:date>2022-11-21T22:05:59Z</dc:date>
    </item>
    <item>
      <title>Re: AWS IPSec tunnel active/active HA with BGP</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-ipsec-tunnel-active-active-ha-with-bgp/m-p/1232215#M2377</link>
      <description>&lt;P&gt;hi&amp;nbsp;jdemares&lt;/P&gt;
&lt;P&gt;this is 3 years ago post but have you figured the way already?&lt;/P&gt;
&lt;P&gt;I am using A/A configuration for our firewall as well.,&lt;/P&gt;
&lt;P&gt;I guess the super mystery is that traditional single firewall+ concentrator, are everything you do in one box is okay for Active Active&lt;/P&gt;
&lt;P&gt;as you mentioned you have 4 VPN tunnels - I assumed your company set up 2 "site-to-site VPN connections" on AWS, as 1 VPN connection in AWS, they actually created 2 VPN tunnels from difference AWS IP TO On-Prem single IP address End Point.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;so assumed the situation like this you should setup&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Tunnel 1 - using floating IP bias on Device 0&lt;/P&gt;
&lt;P&gt;Tunnel 2 - using floating IP bias on Device 0&lt;/P&gt;
&lt;P&gt;Tunnel 3 - using floating IP bias on Device 1&lt;/P&gt;
&lt;P&gt;Tunnel 4 - using floating IP bias on Device 1&lt;BR /&gt;&lt;BR /&gt;as this is tunnel, it will sync both side&lt;BR /&gt;Then Tunnel 1,2 will IKE up on Device 0&lt;/P&gt;
&lt;P&gt;Then Tunnel 3,4 will IKE up on Device 1&lt;BR /&gt;For the routing perspective, assuming you are using BGP, and you need to know the fact that Palo wont Sync the VR setting on both router&lt;BR /&gt;You may need to setup 4 pair on EACH firewall, so what ever of time you will have 2 BGP peer up on single firewall.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I hope that is the right answer what you and other people looking for&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 20 Jun 2025 11:02:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-ipsec-tunnel-active-active-ha-with-bgp/m-p/1232215#M2377</guid>
      <dc:creator>vitol-pkf</dc:creator>
      <dc:date>2025-06-20T11:02:33Z</dc:date>
    </item>
  </channel>
</rss>

