<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: PAN site to site VPN to AWS in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/pan-site-to-site-vpn-to-aws/m-p/453328#M101346</link>
    <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/194759"&gt;@SamuelCardoz&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;I don't remember personally use path monitor option under static route definition, but I am almost certain that you can use any destination address, it doesn't have to be from the same directly connect network as the outbound interface. Path monitor is similar to "IP SLA" with over network vendors, the purpose is to send probes to address reachable over that path, it should be up to you to decide how far you will test the path (is it up to next hop, or all the way to the destination). If it does not work with other address, I believe the problem is with IPsec phase2 proxy-id (phase-selectors/encryption domains), which don't match the traffic with that source and destination.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As a second thought...This probably could be AWS limitation - From your screenshot I can see that you are using th 169.254.x.x reserved range for the point-to-point connection between the IPsec peers (probably AWS requires you to use that?). Since path monitor and tunnel monitor will always use the IP addresses assigned on the egress interface, your probes will always be sourced from 169.254.x.x, which I am not sure if it routable in your VPC - there for if you try to monitor anything else in AWS, the return traffic will not be routed back and monitor will fail. But this is purely public cloud limitation &lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Disabling path/tunnel monitor, shouldn't affect your IPsec tunnel. If you think about it, it is a method for the FW to dynamically detect issue with the tunnel and automatically switch to backup path. The only way disabling path/tunnel monitor could cause intermittent issues is if have equal cost routes at any side of the tunnel&lt;/P&gt;
&lt;P&gt;- either the FW is sending traffic through both tunnels&lt;/P&gt;
&lt;P&gt;- or AWS is returning the traffic through both tunnels, causing again asymetric routing&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 15 Dec 2021 08:09:47 GMT</pubDate>
    <dc:creator>aleksandar.astardzhiev</dc:creator>
    <dc:date>2021-12-15T08:09:47Z</dc:date>
    <item>
      <title>PAN site to site VPN to AWS</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pan-site-to-site-vpn-to-aws/m-p/452505#M101257</link>
      <description>&lt;P&gt;We had a site to sit VPN between on premise PAN going to AWS.&lt;BR /&gt;&lt;BR /&gt;The tunnel was established and does not show any downtime but the issue we encounter is that when the Tunnel Monitor IP(169.254.2.x/30) and (169.254.3.x/30) is not pingable/unreachable PAN will remove the route going to AWS in result we are not able to connect to the AWS LAN segment.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As a workaround we need to restart the tunnel and after restart we are able to restore the connection.&lt;BR /&gt;&lt;BR /&gt;-No logs about VPN tunnel down&lt;/P&gt;&lt;P&gt;-On the routed logs it shows that route has been remove it occur 6 to 8 times a day.&lt;/P&gt;&lt;P&gt;-No DPD logs cause downtime&lt;/P&gt;&lt;P&gt;-No issue on rekey&lt;BR /&gt;Sample logs&lt;/P&gt;&lt;P&gt;2021-12-06 10:09:41.324 +0800 MON: status update md(135: 169.254.2.10 =&amp;gt; 169.254.2.9 =&amp;gt; 169.254.2.9) Failed&lt;BR /&gt;2021-12-06 10:09:41.324 +0800 MON: status update monitor(vr GABC_VR: 10.x.x.x &amp;gt; 0.0.0.0) Down&lt;BR /&gt;2021-12-06 10:09:41.325 +0800 MON: status update monitor(vr GABC_VR: 10.x.x.x &amp;gt; 0.0.0.0) Down&lt;BR /&gt;2021-12-06 10:09:41.325 +0800 MON: status update monitor(vr GABC_VR: 10.x.x.x &amp;gt; 0.0.0.0) Down&lt;BR /&gt;2021-12-06 10:13:32.324 +0800 MON: status update md(136: 169.254.3.12 =&amp;gt; 169.254.3.11 =&amp;gt; 169.254.3.11) Failed&lt;BR /&gt;2021-12-06 10:13:32.324 +0800 MON: status update monitor(vr GABC_VR: 10.x.x.x &amp;gt; 0.0.0.0) Down&lt;BR /&gt;2021-12-06 10:13:32.325 +0800 MON: status update monitor(vr GABC_VR: 10.x.x.x &amp;gt; 0.0.0.0) Down&lt;BR /&gt;2021-12-06 10:13:32.325 +0800 MON: status update monitor(vr GABC_VR: 10.x.x.x &amp;gt; 0.0.0.0) Down&lt;BR /&gt;Any idea what is causing on this?&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 10 Dec 2021 01:46:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pan-site-to-site-vpn-to-aws/m-p/452505#M101257</guid>
      <dc:creator>SamuelCardoz</dc:creator>
      <dc:date>2021-12-10T01:46:52Z</dc:date>
    </item>
    <item>
      <title>Re: PAN site to site VPN to AWS</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pan-site-to-site-vpn-to-aws/m-p/452592#M101273</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;Is there traffic constantly flowing over the tunnels? Do you have a policy that prefers one tunnel over the others? When i find tunnel issues to AWS, its always AWS because like you, I cant find anything wrong on the PAN side and you cant see what is happening on the AWS side :(.&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Fri, 10 Dec 2021 20:30:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pan-site-to-site-vpn-to-aws/m-p/452592#M101273</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2021-12-10T20:30:38Z</dc:date>
    </item>
    <item>
      <title>Re: PAN site to site VPN to AWS</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pan-site-to-site-vpn-to-aws/m-p/452706#M101292</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/194759"&gt;@SamuelCardoz&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;As&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/27580"&gt;@OtakarKlier&lt;/a&gt;&amp;nbsp;already mentioned, this is almost certainly something on the AWS side of things. When your tunnel monitoring fails, do you have any other monitoring configured to resources on the other side of the tunnel? Essentially, it's always helpful to see if something else is seeing the outage at the same time that your firewall is, or if its only after the firewall takes the tunnel down following the tunnel monitoring failure.&lt;/P&gt;
&lt;P&gt;Additionally when your talking about an AWS tunnel I actually don't like using the tunnel interfaces for monitoring. I'll have the PAN monitor a resource in AWS instead.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 12 Dec 2021 07:08:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pan-site-to-site-vpn-to-aws/m-p/452706#M101292</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2021-12-12T07:08:20Z</dc:date>
    </item>
    <item>
      <title>Re: PAN site to site VPN to AWS</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pan-site-to-site-vpn-to-aws/m-p/452744#M101296</link>
      <description>&lt;P&gt;Hello Otakarklier&lt;BR /&gt;&lt;BR /&gt;Thanks for the reply And to answer your query it has no traffic passing to the tunnel once the two monitor IP is not reachable since the route going to the VPN tunnel has been remove.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;To add more info AWS provided as two tunnel to configure on our end that's why we have two monitor IP's.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Mon, 13 Dec 2021 01:04:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pan-site-to-site-vpn-to-aws/m-p/452744#M101296</guid>
      <dc:creator>SamuelCardoz</dc:creator>
      <dc:date>2021-12-13T01:04:30Z</dc:date>
    </item>
    <item>
      <title>Re: PAN site to site VPN to AWS</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pan-site-to-site-vpn-to-aws/m-p/452749#M101297</link>
      <description>&lt;P&gt;Hello BPry&lt;BR /&gt;&lt;BR /&gt;Thanks for the response. We did not see any tunnel down the only thing is that when the two monitor IP is not reachable the route will be remove from the routing table and the result is we could not reach the network segment on AWS.&lt;BR /&gt;Is it possible to change the monitor IP's to an IP address when in the AWS LAN segment like a EC2 server or a workstation?&lt;BR /&gt;&lt;BR /&gt;Is there a way on PAN that if ever the monitor IP is down it will not remove the route on the routing table? or it is the default settings on PAN that we could not change?&lt;BR /&gt;&lt;BR /&gt;May i know if what is the possible action i take to test and would result to resolve the issue.&lt;BR /&gt;&lt;BR /&gt;Thanks&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 13 Dec 2021 01:09:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pan-site-to-site-vpn-to-aws/m-p/452749#M101297</guid>
      <dc:creator>SamuelCardoz</dc:creator>
      <dc:date>2021-12-13T01:09:48Z</dc:date>
    </item>
    <item>
      <title>Re: PAN site to site VPN to AWS</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pan-site-to-site-vpn-to-aws/m-p/452801#M101301</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/194759"&gt;@SamuelCardoz&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;- Yes, you can configure any IP address for tunnel monitor, as long as it is reachable through the tunnel. In most cases it is preferable to use IP address assigned to network device, as this will assure that it is always up (so the tunnel will not go down if the end host is shutdown or during maintenance. But again it is completely up to you to decide which IP to use&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;- The whole purpose of the tunnel monitor is to "disable" the static route from the routing table, so the firewall can fallback to alternative path, if this tunnel is down. So if you want firewall to &lt;U&gt;not remove &lt;/U&gt;the route from routing table if the tunnel is down, you should simply disable the tunnel monitor. But if you do that, firewall will not have a way to failover between the tunnels to AWS&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 13 Dec 2021 10:26:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pan-site-to-site-vpn-to-aws/m-p/452801#M101301</guid>
      <dc:creator>aleksandar.astardzhiev</dc:creator>
      <dc:date>2021-12-13T10:26:07Z</dc:date>
    </item>
    <item>
      <title>Re: PAN site to site VPN to AWS</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pan-site-to-site-vpn-to-aws/m-p/452945#M101313</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;What I do is use policy based forwarding to send all traffic down one tunnel and then use the other tunnel as backup. If no traffic is flowing over it, then this could be why it goes down periodically. I would say even a simple dead peer detection policy so the PAN sends a ping down the tunnel now and then should keep it up.&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Mon, 13 Dec 2021 21:11:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pan-site-to-site-vpn-to-aws/m-p/452945#M101313</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2021-12-13T21:11:24Z</dc:date>
    </item>
    <item>
      <title>Re: PAN site to site VPN to AWS</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pan-site-to-site-vpn-to-aws/m-p/453292#M101342</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/70130"&gt;@aleksandar.astardzhiev&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The tunnel monitoring i mentioned is this under Path monitoring because on Path monitoring i could not change to any IP except the IP address that is on /30.&lt;BR /&gt;Please see picture below if this tunnel monitoring is down it will remove the route in the routing table.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="SamuelCardoz_0-1639537938830.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/38154i74250C2E4FB575B0/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="SamuelCardoz_0-1639537938830.png" alt="SamuelCardoz_0-1639537938830.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;I tried to disable this one/remove it show intermittent connection on the VPN tunnel.&lt;BR /&gt;&lt;BR /&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Wed, 15 Dec 2021 03:15:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pan-site-to-site-vpn-to-aws/m-p/453292#M101342</guid>
      <dc:creator>SamuelCardoz</dc:creator>
      <dc:date>2021-12-15T03:15:09Z</dc:date>
    </item>
    <item>
      <title>Re: PAN site to site VPN to AWS</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pan-site-to-site-vpn-to-aws/m-p/453328#M101346</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/194759"&gt;@SamuelCardoz&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;I don't remember personally use path monitor option under static route definition, but I am almost certain that you can use any destination address, it doesn't have to be from the same directly connect network as the outbound interface. Path monitor is similar to "IP SLA" with over network vendors, the purpose is to send probes to address reachable over that path, it should be up to you to decide how far you will test the path (is it up to next hop, or all the way to the destination). If it does not work with other address, I believe the problem is with IPsec phase2 proxy-id (phase-selectors/encryption domains), which don't match the traffic with that source and destination.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As a second thought...This probably could be AWS limitation - From your screenshot I can see that you are using th 169.254.x.x reserved range for the point-to-point connection between the IPsec peers (probably AWS requires you to use that?). Since path monitor and tunnel monitor will always use the IP addresses assigned on the egress interface, your probes will always be sourced from 169.254.x.x, which I am not sure if it routable in your VPC - there for if you try to monitor anything else in AWS, the return traffic will not be routed back and monitor will fail. But this is purely public cloud limitation &lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Disabling path/tunnel monitor, shouldn't affect your IPsec tunnel. If you think about it, it is a method for the FW to dynamically detect issue with the tunnel and automatically switch to backup path. The only way disabling path/tunnel monitor could cause intermittent issues is if have equal cost routes at any side of the tunnel&lt;/P&gt;
&lt;P&gt;- either the FW is sending traffic through both tunnels&lt;/P&gt;
&lt;P&gt;- or AWS is returning the traffic through both tunnels, causing again asymetric routing&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 15 Dec 2021 08:09:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pan-site-to-site-vpn-to-aws/m-p/453328#M101346</guid>
      <dc:creator>aleksandar.astardzhiev</dc:creator>
      <dc:date>2021-12-15T08:09:47Z</dc:date>
    </item>
  </channel>
</rss>

