<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Active/Passive connection with Cisco Stack switches in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/active-passive-connection-with-cisco-stack-switches/m-p/513232#M316</link>
    <description>&lt;P&gt;Hello&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I would like to have confirmation. I need to connect my Palo Alto cluster firewall (active/passive) to a Cisco stack (with 2 members).&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If I want a fully redundancy, I need to create, on a each firewall, an aggregate with 2 interfaces and each interface is connected on a port on each Cisco member ? Are you agree with my schema bellow ?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="JeromeC_0-1661760904358.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/43403iE2D65F8E5A6DB088/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="JeromeC_0-1661760904358.png" alt="JeromeC_0-1661760904358.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;BR&lt;/P&gt;
&lt;P&gt;Jerome&lt;/P&gt;</description>
    <pubDate>Mon, 29 Aug 2022 08:15:31 GMT</pubDate>
    <dc:creator>JeromeC</dc:creator>
    <dc:date>2022-08-29T08:15:31Z</dc:date>
    <item>
      <title>Active/Passive connection with Cisco Stack switches</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/active-passive-connection-with-cisco-stack-switches/m-p/513232#M316</link>
      <description>&lt;P&gt;Hello&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I would like to have confirmation. I need to connect my Palo Alto cluster firewall (active/passive) to a Cisco stack (with 2 members).&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If I want a fully redundancy, I need to create, on a each firewall, an aggregate with 2 interfaces and each interface is connected on a port on each Cisco member ? Are you agree with my schema bellow ?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="JeromeC_0-1661760904358.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/43403iE2D65F8E5A6DB088/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="JeromeC_0-1661760904358.png" alt="JeromeC_0-1661760904358.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;BR&lt;/P&gt;
&lt;P&gt;Jerome&lt;/P&gt;</description>
      <pubDate>Mon, 29 Aug 2022 08:15:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/active-passive-connection-with-cisco-stack-switches/m-p/513232#M316</guid>
      <dc:creator>JeromeC</dc:creator>
      <dc:date>2022-08-29T08:15:31Z</dc:date>
    </item>
    <item>
      <title>Re: Active/Passive connection with Cisco Stack switches</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/active-passive-connection-with-cisco-stack-switches/m-p/513233#M317</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/229503"&gt;@JeromeC&lt;/a&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;this connection design is functional. Cisco switches in stack act like a single switch, so on switch side it is cross stack ether channel and Palo Alto Firewall will see its AE as if it is connected to a single switch.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Kind Regards&lt;/P&gt;
&lt;P&gt;Pavel&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 29 Aug 2022 08:30:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/active-passive-connection-with-cisco-stack-switches/m-p/513233#M317</guid>
      <dc:creator>PavelK</dc:creator>
      <dc:date>2022-08-29T08:30:56Z</dc:date>
    </item>
    <item>
      <title>Re: Active/Passive connection with Cisco Stack switches</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/active-passive-connection-with-cisco-stack-switches/m-p/513234#M318</link>
      <description>&lt;P&gt;Hello&lt;/P&gt;
&lt;P&gt;I'm not sure to understand. It's not necessary to have one physical connection from active FW to each Cisco member to keep the communication up even if the Cisco member where the phiscal cable is connected is down ? Even in this case, the communication between firewall and equipments connected on the stack will continue to be OK ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;BR&lt;/P&gt;</description>
      <pubDate>Mon, 29 Aug 2022 08:37:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/active-passive-connection-with-cisco-stack-switches/m-p/513234#M318</guid>
      <dc:creator>JeromeC</dc:creator>
      <dc:date>2022-08-29T08:37:21Z</dc:date>
    </item>
    <item>
      <title>Re: Active/Passive connection with Cisco Stack switches</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/active-passive-connection-with-cisco-stack-switches/m-p/513283#M320</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;Yes this should work for you. Just could cause a delay in failing over since the MAC of the Firewall changes but the IP doesnt.&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Mon, 29 Aug 2022 19:18:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/active-passive-connection-with-cisco-stack-switches/m-p/513283#M320</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2022-08-29T19:18:25Z</dc:date>
    </item>
    <item>
      <title>Re: Active/Passive connection with Cisco Stack switches</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/active-passive-connection-with-cisco-stack-switches/m-p/513319#M326</link>
      <description>&lt;P&gt;Yes, I have used this topology frequently when setting up new firewalls. On the firewall you will want to set up a link monitoring group and set failover to happen only when both links to the switches fail.&lt;/P&gt;</description>
      <pubDate>Mon, 29 Aug 2022 22:47:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/active-passive-connection-with-cisco-stack-switches/m-p/513319#M326</guid>
      <dc:creator>tcasw86</dc:creator>
      <dc:date>2022-08-29T22:47:56Z</dc:date>
    </item>
    <item>
      <title>Re: Active/Passive connection with Cisco Stack switches</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/active-passive-connection-with-cisco-stack-switches/m-p/590587#M3357</link>
      <description>&lt;P&gt;Hi, thanks for the info&lt;BR /&gt;So if I have A/P palo alto setup. each firewall with single down connection to core switch cluster. do I need a link monitoring group or a port channel from each firewall to each core switch for that or a single link would do since AP firewall and core switches are acting as one&amp;gt;?&lt;/P&gt;</description>
      <pubDate>Thu, 27 Jun 2024 08:34:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/active-passive-connection-with-cisco-stack-switches/m-p/590587#M3357</guid>
      <dc:creator>Zaid89</dc:creator>
      <dc:date>2024-06-27T08:34:02Z</dc:date>
    </item>
  </channel>
</rss>

