<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Automatic failover between on premsise tunnels and AWS VPC Tunnels in VM-Series in the Public Cloud</title>
    <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/automatic-failover-between-on-premsise-tunnels-and-aws-vpc/m-p/286569#M671</link>
    <description>&lt;P&gt;Already we are using BGP routing protcol on Palo alto.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do you want to use ospf Routing on both Palo and ASA&lt;/P&gt;&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/27580"&gt;@OtakarKlier&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;On the ASA you have to use a SLA. Check out these articles. The PAN is OK with multiple tunnels, just use a dynamic routing protocl between the two devices so the routes update and the PAN sends traffic down the correct tunnel. You can also use static rout monitoring or Policy Based routing. I prefer to use OSPF for simplicity.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://learningnetwork.cisco.com/blogs/vip-perspectives/2018/07/27/cisco-asa-site-to-site-vpn-failover" target="_blank" rel="noopener"&gt;https://learningnetwork.cisco.com/blogs/vip-perspectives/2018/07/27/cisco-asa-site-to-site-vpn-failover&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.cisco.com/t5/vpn-and-anyconnect/cisco-asa-dual-isp-vpn-redundancy/td-p/1723979" target="_blank" rel="noopener"&gt;https://community.cisco.com/t5/vpn-and-anyconnect/cisco-asa-dual-isp-vpn-redundancy/td-p/1723979&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 04 Sep 2019 14:06:14 GMT</pubDate>
    <dc:creator>MUmanath</dc:creator>
    <dc:date>2019-09-04T14:06:14Z</dc:date>
    <item>
      <title>Automatic failover between on premsise tunnels and AWS VPC Tunnels</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/automatic-failover-between-on-premsise-tunnels-and-aws-vpc/m-p/284894#M663</link>
      <description>&lt;P&gt;Team,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;i have scenarion to have automatic failover between tunnles build on aws direct connect&amp;nbsp; and tunnels on Cisco ASA firewall onpremise.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please let me know your suggestions.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 24 Aug 2019 15:42:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/automatic-failover-between-on-premsise-tunnels-and-aws-vpc/m-p/284894#M663</guid>
      <dc:creator>MUmanath</dc:creator>
      <dc:date>2019-08-24T15:42:53Z</dc:date>
    </item>
    <item>
      <title>Re: Automatic failover between on premsise tunnels and AWS VPC Tunnels</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/automatic-failover-between-on-premsise-tunnels-and-aws-vpc/m-p/285632#M669</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;On the ASA you have to use a SLA. Check out these articles. The PAN is OK with multiple tunnels, just use a dynamic routing protocl between the two devices so the routes update and the PAN sends traffic down the correct tunnel. You can also use static rout monitoring or Policy Based routing. I prefer to use OSPF for simplicity.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://learningnetwork.cisco.com/blogs/vip-perspectives/2018/07/27/cisco-asa-site-to-site-vpn-failover" target="_blank"&gt;https://learningnetwork.cisco.com/blogs/vip-perspectives/2018/07/27/cisco-asa-site-to-site-vpn-failover&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.cisco.com/t5/vpn-and-anyconnect/cisco-asa-dual-isp-vpn-redundancy/td-p/1723979" target="_blank"&gt;https://community.cisco.com/t5/vpn-and-anyconnect/cisco-asa-dual-isp-vpn-redundancy/td-p/1723979&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Wed, 28 Aug 2019 20:43:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/automatic-failover-between-on-premsise-tunnels-and-aws-vpc/m-p/285632#M669</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2019-08-28T20:43:53Z</dc:date>
    </item>
    <item>
      <title>Re: Automatic failover between on premsise tunnels and AWS VPC Tunnels</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/automatic-failover-between-on-premsise-tunnels-and-aws-vpc/m-p/286569#M671</link>
      <description>&lt;P&gt;Already we are using BGP routing protcol on Palo alto.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do you want to use ospf Routing on both Palo and ASA&lt;/P&gt;&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/27580"&gt;@OtakarKlier&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;On the ASA you have to use a SLA. Check out these articles. The PAN is OK with multiple tunnels, just use a dynamic routing protocl between the two devices so the routes update and the PAN sends traffic down the correct tunnel. You can also use static rout monitoring or Policy Based routing. I prefer to use OSPF for simplicity.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://learningnetwork.cisco.com/blogs/vip-perspectives/2018/07/27/cisco-asa-site-to-site-vpn-failover" target="_blank" rel="noopener"&gt;https://learningnetwork.cisco.com/blogs/vip-perspectives/2018/07/27/cisco-asa-site-to-site-vpn-failover&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.cisco.com/t5/vpn-and-anyconnect/cisco-asa-dual-isp-vpn-redundancy/td-p/1723979" target="_blank" rel="noopener"&gt;https://community.cisco.com/t5/vpn-and-anyconnect/cisco-asa-dual-isp-vpn-redundancy/td-p/1723979&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 04 Sep 2019 14:06:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/automatic-failover-between-on-premsise-tunnels-and-aws-vpc/m-p/286569#M671</guid>
      <dc:creator>MUmanath</dc:creator>
      <dc:date>2019-09-04T14:06:14Z</dc:date>
    </item>
  </channel>
</rss>

