<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Active/Passive PA with Dual ISP in eBGP and private owned /24 ASN in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/active-passive-pa-with-dual-isp-in-ebgp-and-private-owned-24-asn/m-p/453932#M101402</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Looking for some guidance on our setup. I am looking to establish pure ISP failover without having to take action on my / my team's side. Presently when there is an outage, we need to do manual intervention to get connectivity back up.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here is an overview of our network, internet facing.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ISP A (/30) -&amp;gt; Cisco ASR Router 1 (I control) (/24 ASN eBGP established to ISP A) WAN Interface -&amp;gt; ASR Router (LAN Interface - Public IP in same /24) -&amp;gt; DMZ Switch Stack (VLAN 5 - WAN Facing)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ISP B (/30) -&amp;gt; Cisco ASR Router 2 (I control) (/24 ASN eBGP established to ISP B) WAN Interface -&amp;gt; ASR Router (LAN Interface - Public IP in same /24) -&amp;gt; DMZ Switch Stack (VLAN 5 - WAN Facing)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ISP A = 1Gb&lt;/P&gt;&lt;P&gt;ISP B = 500Mb&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cisco Router 1 - No prepend, default route to ISP carrier&lt;/P&gt;&lt;P&gt;Cisco Router 2 - Prepend, default route to ISP carrier + ip route x.x.x.x /24 null0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;*** (I have found if I take away the prepend and null0 loopback, packets going out cannot route back in)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;PA 3020 x2 (Active/Passive) (E1/1) -&amp;gt; DMZ Switch Stack (VLAN 5)&lt;/P&gt;&lt;P&gt;E1/1 - WAN IP in the same /24 block above&lt;/P&gt;&lt;P&gt;NAT from the PA is dynamic-ip-and-port with the E1/1 Interface IP from untrust to trust zone&lt;/P&gt;&lt;P&gt;No PBF but x1 VR in default route, with traffic going to Cisco Router 1 LAN IP for next hop&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- I have tried putting in route monitoring in the VR default route to the Cisco Router 2 LAN IP, removing the prepend on Cisco Router 2 and null route and internet stops working from behind the PA.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When ISP A goes down, we need to remove the prepend and remove the null route, change the route manually on PA and clear NAT sessions. Not ideal ...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can anyone offer any suggestions or thoughts on how to improve the setup? Changing setup, connections, hardware, etc... is all open and fine.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 17 Dec 2021 13:26:05 GMT</pubDate>
    <dc:creator>system2</dc:creator>
    <dc:date>2021-12-17T13:26:05Z</dc:date>
    <item>
      <title>Active/Passive PA with Dual ISP in eBGP and private owned /24 ASN</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/active-passive-pa-with-dual-isp-in-ebgp-and-private-owned-24-asn/m-p/453932#M101402</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Looking for some guidance on our setup. I am looking to establish pure ISP failover without having to take action on my / my team's side. Presently when there is an outage, we need to do manual intervention to get connectivity back up.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here is an overview of our network, internet facing.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ISP A (/30) -&amp;gt; Cisco ASR Router 1 (I control) (/24 ASN eBGP established to ISP A) WAN Interface -&amp;gt; ASR Router (LAN Interface - Public IP in same /24) -&amp;gt; DMZ Switch Stack (VLAN 5 - WAN Facing)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ISP B (/30) -&amp;gt; Cisco ASR Router 2 (I control) (/24 ASN eBGP established to ISP B) WAN Interface -&amp;gt; ASR Router (LAN Interface - Public IP in same /24) -&amp;gt; DMZ Switch Stack (VLAN 5 - WAN Facing)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ISP A = 1Gb&lt;/P&gt;&lt;P&gt;ISP B = 500Mb&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cisco Router 1 - No prepend, default route to ISP carrier&lt;/P&gt;&lt;P&gt;Cisco Router 2 - Prepend, default route to ISP carrier + ip route x.x.x.x /24 null0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;*** (I have found if I take away the prepend and null0 loopback, packets going out cannot route back in)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;PA 3020 x2 (Active/Passive) (E1/1) -&amp;gt; DMZ Switch Stack (VLAN 5)&lt;/P&gt;&lt;P&gt;E1/1 - WAN IP in the same /24 block above&lt;/P&gt;&lt;P&gt;NAT from the PA is dynamic-ip-and-port with the E1/1 Interface IP from untrust to trust zone&lt;/P&gt;&lt;P&gt;No PBF but x1 VR in default route, with traffic going to Cisco Router 1 LAN IP for next hop&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- I have tried putting in route monitoring in the VR default route to the Cisco Router 2 LAN IP, removing the prepend on Cisco Router 2 and null route and internet stops working from behind the PA.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When ISP A goes down, we need to remove the prepend and remove the null route, change the route manually on PA and clear NAT sessions. Not ideal ...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can anyone offer any suggestions or thoughts on how to improve the setup? Changing setup, connections, hardware, etc... is all open and fine.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 17 Dec 2021 13:26:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/active-passive-pa-with-dual-isp-in-ebgp-and-private-owned-24-asn/m-p/453932#M101402</guid>
      <dc:creator>system2</dc:creator>
      <dc:date>2021-12-17T13:26:05Z</dc:date>
    </item>
    <item>
      <title>Re: Active/Passive PA with Dual ISP in eBGP and private owned /24 ASN</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/active-passive-pa-with-dual-isp-in-ebgp-and-private-owned-24-asn/m-p/485556#M104537</link>
      <description>&lt;P&gt;Hi,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My approach would be slightly different than yours.&lt;/P&gt;&lt;P&gt;1) Seperate Vlans for each ISP.&lt;/P&gt;&lt;P&gt;2) Separate physical int on the palo for each ISP.&lt;/P&gt;&lt;P&gt;3) Two default routes with different metrics one for each ISP.&lt;/P&gt;&lt;P&gt;4) Enable Path monitoring for a static route.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;See&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/10-0/pan-os-admin/networking/static-routes/static-route-removal-based-on-path-monitoring" target="_blank"&gt;https://docs.paloaltonetworks.com/pan-os/10-0/pan-os-admin/networking/static-routes/static-route-removal-based-on-path-monitoring&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 07 May 2022 08:44:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/active-passive-pa-with-dual-isp-in-ebgp-and-private-owned-24-asn/m-p/485556#M104537</guid>
      <dc:creator>Y-alwaysMe</dc:creator>
      <dc:date>2022-05-07T08:44:12Z</dc:date>
    </item>
  </channel>
</rss>

