<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Request Advice – BGP Failover Route-Based IPsec VPN With WatchGuard (WG) in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/request-advice-bgp-failover-route-based-ipsec-vpn-with/m-p/1242101#M6466</link>
    <description>&lt;P data-start="421" data-end="433"&gt;Hi Everyone,&lt;/P&gt;
&lt;P data-start="435" data-end="727"&gt;I’m looking for guidance on the best-practice way to set up &lt;STRONG data-start="495" data-end="542"&gt;redundant route-based VPN tunnels using BGP&lt;/STRONG&gt; between a &lt;STRONG data-start="553" data-end="583"&gt;Palo Alto firewall (PA-VM)&lt;/STRONG&gt; and a &lt;STRONG data-start="590" data-end="613"&gt;WatchGuard firewall&lt;/STRONG&gt;. The goal is to implement &lt;STRONG data-start="640" data-end="670"&gt;primary/secondary failover&lt;/STRONG&gt; with dynamic routing instead of static proxy-ID tunnels.&lt;/P&gt;
&lt;H3 data-start="729" data-end="751"&gt;&lt;STRONG data-start="733" data-end="751"&gt;&amp;nbsp;Environment&lt;/STRONG&gt;&lt;/H3&gt;
&lt;UL data-start="752" data-end="1348"&gt;
&lt;LI data-start="752" data-end="792"&gt;
&lt;P data-start="754" data-end="792"&gt;&lt;STRONG data-start="754" data-end="768"&gt;Palo Alto:&lt;/STRONG&gt; PAN-OS 10.x VM-Series&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-start="793" data-end="844"&gt;
&lt;P data-start="795" data-end="844"&gt;&lt;STRONG data-start="795" data-end="810"&gt;WatchGuard:&lt;/STRONG&gt; Firebox running latest firmware&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-start="845" data-end="1102"&gt;
&lt;P data-start="847" data-end="862"&gt;&lt;STRONG data-start="847" data-end="860"&gt;Topology:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL data-start="865" data-end="1102"&gt;
&lt;LI data-start="865" data-end="908"&gt;
&lt;P data-start="867" data-end="908"&gt;Two IPsec tunnels (Primary + Secondary)&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-start="911" data-end="970"&gt;
&lt;P data-start="913" data-end="970"&gt;Each terminates on different external IPs on both sides&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-start="973" data-end="1037"&gt;
&lt;P data-start="975" data-end="1037"&gt;Using &lt;STRONG data-start="981" data-end="1000"&gt;Route-Based VPN&lt;/STRONG&gt; on Palo Alto (tunnel.x interfaces)&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-start="1040" data-end="1102"&gt;
&lt;P data-start="1042" data-end="1102"&gt;Using &lt;STRONG data-start="1048" data-end="1086"&gt;Tunnel Interfaces / VTI-equivalent&lt;/STRONG&gt; on WatchGuard&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI data-start="1103" data-end="1348"&gt;
&lt;P data-start="1105" data-end="1116"&gt;&lt;STRONG data-start="1105" data-end="1114"&gt;Goal:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL data-start="1119" data-end="1348"&gt;
&lt;LI data-start="1119" data-end="1153"&gt;
&lt;P data-start="1121" data-end="1153"&gt;Run &lt;STRONG data-start="1125" data-end="1132"&gt;BGP&lt;/STRONG&gt; between PA &amp;lt;--&amp;gt; WG&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-start="1156" data-end="1237"&gt;
&lt;P data-start="1158" data-end="1237"&gt;Advertise internal subnets&amp;nbsp;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-start="1240" data-end="1301"&gt;
&lt;P data-start="1242" data-end="1301"&gt;Achieve seamless failover when one IPsec tunnel goes down&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-start="1304" data-end="1348"&gt;
&lt;P data-start="1306" data-end="1348"&gt;Avoid static proxy IDs and manual failover&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3 data-start="1350" data-end="1375"&gt;&lt;STRONG data-start="1354" data-end="1375"&gt;Current Status&lt;/STRONG&gt;&lt;/H3&gt;
&lt;UL data-start="1376" data-end="1618"&gt;
&lt;LI data-start="1376" data-end="1458"&gt;
&lt;P data-start="1378" data-end="1458"&gt;I can bring up an IPsec SA on each tunnel individually using static proxy IDs.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-start="1459" data-end="1516"&gt;
&lt;P data-start="1461" data-end="1516"&gt;Route-based tunnel (without proxy IDs) also comes up.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-start="1517" data-end="1618"&gt;
&lt;P data-start="1519" data-end="1618"&gt;However, traffic flow between the subnets is inconsistent unless proxy IDs are manually configured.&lt;BR /&gt;&lt;BR /&gt;Please advise if you have any specific article to configure this setup on PA VM and Watchguard Model M670&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;HR data-start="3495" data-end="3498" /&gt;
&lt;P data-start="3500" data-end="3634"&gt;Thanks in advance for any guidance. I want to ensure this design is implemented cleanly and follows best&lt;/P&gt;</description>
    <pubDate>Tue, 18 Nov 2025 22:23:31 GMT</pubDate>
    <dc:creator>PATECHENG</dc:creator>
    <dc:date>2025-11-18T22:23:31Z</dc:date>
    <item>
      <title>Request Advice – BGP Failover Route-Based IPsec VPN With WatchGuard (WG)</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/request-advice-bgp-failover-route-based-ipsec-vpn-with/m-p/1242101#M6466</link>
      <description>&lt;P data-start="421" data-end="433"&gt;Hi Everyone,&lt;/P&gt;
&lt;P data-start="435" data-end="727"&gt;I’m looking for guidance on the best-practice way to set up &lt;STRONG data-start="495" data-end="542"&gt;redundant route-based VPN tunnels using BGP&lt;/STRONG&gt; between a &lt;STRONG data-start="553" data-end="583"&gt;Palo Alto firewall (PA-VM)&lt;/STRONG&gt; and a &lt;STRONG data-start="590" data-end="613"&gt;WatchGuard firewall&lt;/STRONG&gt;. The goal is to implement &lt;STRONG data-start="640" data-end="670"&gt;primary/secondary failover&lt;/STRONG&gt; with dynamic routing instead of static proxy-ID tunnels.&lt;/P&gt;
&lt;H3 data-start="729" data-end="751"&gt;&lt;STRONG data-start="733" data-end="751"&gt;&amp;nbsp;Environment&lt;/STRONG&gt;&lt;/H3&gt;
&lt;UL data-start="752" data-end="1348"&gt;
&lt;LI data-start="752" data-end="792"&gt;
&lt;P data-start="754" data-end="792"&gt;&lt;STRONG data-start="754" data-end="768"&gt;Palo Alto:&lt;/STRONG&gt; PAN-OS 10.x VM-Series&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-start="793" data-end="844"&gt;
&lt;P data-start="795" data-end="844"&gt;&lt;STRONG data-start="795" data-end="810"&gt;WatchGuard:&lt;/STRONG&gt; Firebox running latest firmware&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-start="845" data-end="1102"&gt;
&lt;P data-start="847" data-end="862"&gt;&lt;STRONG data-start="847" data-end="860"&gt;Topology:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL data-start="865" data-end="1102"&gt;
&lt;LI data-start="865" data-end="908"&gt;
&lt;P data-start="867" data-end="908"&gt;Two IPsec tunnels (Primary + Secondary)&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-start="911" data-end="970"&gt;
&lt;P data-start="913" data-end="970"&gt;Each terminates on different external IPs on both sides&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-start="973" data-end="1037"&gt;
&lt;P data-start="975" data-end="1037"&gt;Using &lt;STRONG data-start="981" data-end="1000"&gt;Route-Based VPN&lt;/STRONG&gt; on Palo Alto (tunnel.x interfaces)&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-start="1040" data-end="1102"&gt;
&lt;P data-start="1042" data-end="1102"&gt;Using &lt;STRONG data-start="1048" data-end="1086"&gt;Tunnel Interfaces / VTI-equivalent&lt;/STRONG&gt; on WatchGuard&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI data-start="1103" data-end="1348"&gt;
&lt;P data-start="1105" data-end="1116"&gt;&lt;STRONG data-start="1105" data-end="1114"&gt;Goal:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL data-start="1119" data-end="1348"&gt;
&lt;LI data-start="1119" data-end="1153"&gt;
&lt;P data-start="1121" data-end="1153"&gt;Run &lt;STRONG data-start="1125" data-end="1132"&gt;BGP&lt;/STRONG&gt; between PA &amp;lt;--&amp;gt; WG&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-start="1156" data-end="1237"&gt;
&lt;P data-start="1158" data-end="1237"&gt;Advertise internal subnets&amp;nbsp;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-start="1240" data-end="1301"&gt;
&lt;P data-start="1242" data-end="1301"&gt;Achieve seamless failover when one IPsec tunnel goes down&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-start="1304" data-end="1348"&gt;
&lt;P data-start="1306" data-end="1348"&gt;Avoid static proxy IDs and manual failover&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3 data-start="1350" data-end="1375"&gt;&lt;STRONG data-start="1354" data-end="1375"&gt;Current Status&lt;/STRONG&gt;&lt;/H3&gt;
&lt;UL data-start="1376" data-end="1618"&gt;
&lt;LI data-start="1376" data-end="1458"&gt;
&lt;P data-start="1378" data-end="1458"&gt;I can bring up an IPsec SA on each tunnel individually using static proxy IDs.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-start="1459" data-end="1516"&gt;
&lt;P data-start="1461" data-end="1516"&gt;Route-based tunnel (without proxy IDs) also comes up.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-start="1517" data-end="1618"&gt;
&lt;P data-start="1519" data-end="1618"&gt;However, traffic flow between the subnets is inconsistent unless proxy IDs are manually configured.&lt;BR /&gt;&lt;BR /&gt;Please advise if you have any specific article to configure this setup on PA VM and Watchguard Model M670&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;HR data-start="3495" data-end="3498" /&gt;
&lt;P data-start="3500" data-end="3634"&gt;Thanks in advance for any guidance. I want to ensure this design is implemented cleanly and follows best&lt;/P&gt;</description>
      <pubDate>Tue, 18 Nov 2025 22:23:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/request-advice-bgp-failover-route-based-ipsec-vpn-with/m-p/1242101#M6466</guid>
      <dc:creator>PATECHENG</dc:creator>
      <dc:date>2025-11-18T22:23:31Z</dc:date>
    </item>
  </channel>
</rss>

