<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: VPN IPSEC secondary peer in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-ipsec-secondary-peer/m-p/478898#M103817</link>
    <description>&lt;P&gt;To make short a long story, I want to know if I can define a Secondary VPN that switches when the Remote Peer IP go down because the Customer want to avoid to monitor a resource inside the VPN.&lt;BR /&gt;(Like on the ASA where we can simply set the secondary peer and it works without any other conf)&lt;/P&gt;</description>
    <pubDate>Thu, 07 Apr 2022 08:44:24 GMT</pubDate>
    <dc:creator>ChristianBolelli</dc:creator>
    <dc:date>2022-04-07T08:44:24Z</dc:date>
    <item>
      <title>VPN IPSEC secondary peer</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-ipsec-secondary-peer/m-p/475769#M103496</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I have a vpn ipsec in production, now I have to add a secondary remote peer.&lt;/P&gt;&lt;P&gt;It's my first time I have to configure a 2nd peer.&lt;/P&gt;&lt;P&gt;If I understood well I can't simply add a seocndary peer to the VPN but I have to configure a new psec but the difference is the static route related the remote network.&lt;/P&gt;&lt;P&gt;Example I should have:&lt;/P&gt;&lt;P&gt;Remote net: 10.1.0.0/24&lt;/P&gt;&lt;P&gt;Route 1 10.1.0.0/24 metric 10 Tunnel.1&lt;/P&gt;&lt;P&gt;Route 2 10.1.0.0/24 metric 20 Tunnel.2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If the primary peer stop responding how I can turn off the Route 1?&lt;/P&gt;&lt;P&gt;The tunnel.1 and .2 don't have an ip and the inside int of the PA it's not included in the local network&lt;BR /&gt;&lt;BR /&gt;Can I add an ip to Tunnel.1 like 192.168.1.1 and nat it with the external IP of the PA and set the Path monitor of the "Route 1" like&lt;BR /&gt;Source:192.168.1.1&lt;BR /&gt;Destination: Primary Peer&lt;BR /&gt;So the Route 1 ping the Primary peer If the peer stop responding the PA remove from the routing table the Route 1 and the Secondary VPN start working because the Route 2 it's the only active.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 25 Mar 2022 14:00:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-ipsec-secondary-peer/m-p/475769#M103496</guid>
      <dc:creator>ChristianBolelli</dc:creator>
      <dc:date>2022-03-25T14:00:53Z</dc:date>
    </item>
    <item>
      <title>Re: VPN IPSEC secondary peer</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-ipsec-secondary-peer/m-p/475781#M103498</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/110051"&gt;@ChristianBolelli&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yes, you need to have separate VPN tunnel with secondary peer IP and&amp;nbsp; you need to assign the IP to the tunnel interface.&amp;nbsp;You just need to make sure that the IP that you are assigning to the tunnel interface should be from your local network which is part of tunnel encryption domain. Basically that source IP should be reachable towards the destination servers over tunnel. If you are doing NAT for the existing tunnel traffic, then you need to do &amp;nbsp;NAT for tunnel interface IP also. This traffic will travel till destination via tunnel.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Once you have this set, you can enable the path monitoring on the &lt;STRONG&gt;tunnel.1&lt;/STRONG&gt; route i.e.&amp;nbsp;&lt;STRONG&gt;Route 1 10.1.0.0/24 metric 10 Tunnel.1&lt;/STRONG&gt; and take one of the ICMP responding server from peer side to add it under path monitoring. Once Primary tunnel fails, configured destination server will stop responding to ICMP and once path monitoring fails, Palo Alto will remove route towards&amp;nbsp;&lt;STRONG&gt;tunnel.1&lt;/STRONG&gt;&amp;nbsp;from &lt;STRONG&gt;FIB&lt;/STRONG&gt;. And traffic will then start sending to the secondary tunnel i.e.&amp;nbsp;&lt;STRONG&gt;tunnel.2&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Here, I have considered that you are trying to configure two tunnels (Primary &amp;amp; Secondary) for same encryption domain from your Palo Alto.&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope it helps!&lt;/P&gt;</description>
      <pubDate>Fri, 25 Mar 2022 14:36:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-ipsec-secondary-peer/m-p/475781#M103498</guid>
      <dc:creator>SutareMayur</dc:creator>
      <dc:date>2022-03-25T14:36:05Z</dc:date>
    </item>
    <item>
      <title>Re: VPN IPSEC secondary peer</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-ipsec-secondary-peer/m-p/475784#M103499</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;so the Path monitor MUST pass through the tunnel? In my example the Tunnel.1 ip shoud be natted with the PA outside interface and reach the&amp;nbsp; public ip of the remote peer. The idea is to monitor the public ip and not and internal resources.&lt;/P&gt;</description>
      <pubDate>Fri, 25 Mar 2022 14:42:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-ipsec-secondary-peer/m-p/475784#M103499</guid>
      <dc:creator>ChristianBolelli</dc:creator>
      <dc:date>2022-03-25T14:42:48Z</dc:date>
    </item>
    <item>
      <title>Re: VPN IPSEC secondary peer</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-ipsec-secondary-peer/m-p/475797#M103500</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/110051"&gt;@ChristianBolelli&lt;/a&gt;&amp;nbsp;Will your peer allow ICMP traffic on their public IP ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also in addition to this - If they allows and you configure but it won't help you in some scenarios like given below -&lt;/P&gt;&lt;P&gt;Your tunnel having issues like Phase-1 and/or Phase-2 is down. In this case, peer end public IP may respond to ICMP but tunnel resources may become unreachable.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 25 Mar 2022 15:26:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-ipsec-secondary-peer/m-p/475797#M103500</guid>
      <dc:creator>SutareMayur</dc:creator>
      <dc:date>2022-03-25T15:26:04Z</dc:date>
    </item>
    <item>
      <title>Re: VPN IPSEC secondary peer</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-ipsec-secondary-peer/m-p/478598#M103782</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;Yes they allow icmp traffic&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have now a lab. I've set an ip on the Tunnel.1 and a Path monitor as below:&lt;/P&gt;&lt;P&gt;Tunnel.1 192.168.1.1/32&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Static route&lt;/P&gt;&lt;P&gt;Route1&lt;BR /&gt;10.10.10.0/24 interface Tunnel.1&lt;BR /&gt;Path monitor&lt;BR /&gt;Src: 192.168.1.1/32&lt;BR /&gt;Dst: Remote Peer ip&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;On Security rule&lt;BR /&gt;Src:192.168.1.1/32&lt;BR /&gt;dst: Remote-PeerIP&lt;/P&gt;&lt;P&gt;Application: Ping/icmp&lt;BR /&gt;&lt;BR /&gt;Nat&lt;BR /&gt;original source: 192.168.1.1/32&lt;BR /&gt;Original dst:Remote-PeerIP&lt;BR /&gt;Translated src: Dynamic ip and port. with the Palo alto Public IP&lt;/P&gt;&lt;P&gt;Translated dst: original&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;From CLI&lt;/P&gt;&lt;P&gt;ping source 192.168.1.1 host Remote-PeerIP&lt;BR /&gt;Answers as expected and we capture the traffic on test remote ASA and we see the icmp packets coming from Palo Alto public ip.&lt;/P&gt;&lt;P&gt;But on Path monitor tab still in "down" state.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 06 Apr 2022 08:41:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-ipsec-secondary-peer/m-p/478598#M103782</guid>
      <dc:creator>ChristianBolelli</dc:creator>
      <dc:date>2022-04-06T08:41:56Z</dc:date>
    </item>
    <item>
      <title>Re: VPN IPSEC secondary peer</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-ipsec-secondary-peer/m-p/478896#M103816</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I'm trying to understand if it's possible to monitor the Remote Peer IP(Customer request) instead of a resource inside the tunnel IPSEC.&lt;BR /&gt;So the ip assign to Tunnel.1 it not included in the ProxyID because I want to ping the Peer- ip&lt;BR /&gt;Via CLI the ping works:&lt;/P&gt;&lt;P&gt;PA&amp;gt;ping source "Tunnel.1-IP" host "Remote-Peer-IP"&lt;BR /&gt;But with the same data on path monitor it fails.&lt;/P&gt;</description>
      <pubDate>Thu, 07 Apr 2022 08:29:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-ipsec-secondary-peer/m-p/478896#M103816</guid>
      <dc:creator>ChristianBolelli</dc:creator>
      <dc:date>2022-04-07T08:29:04Z</dc:date>
    </item>
    <item>
      <title>Re: VPN IPSEC secondary peer</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-ipsec-secondary-peer/m-p/478898#M103817</link>
      <description>&lt;P&gt;To make short a long story, I want to know if I can define a Secondary VPN that switches when the Remote Peer IP go down because the Customer want to avoid to monitor a resource inside the VPN.&lt;BR /&gt;(Like on the ASA where we can simply set the secondary peer and it works without any other conf)&lt;/P&gt;</description>
      <pubDate>Thu, 07 Apr 2022 08:44:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-ipsec-secondary-peer/m-p/478898#M103817</guid>
      <dc:creator>ChristianBolelli</dc:creator>
      <dc:date>2022-04-07T08:44:24Z</dc:date>
    </item>
    <item>
      <title>Re: VPN IPSEC secondary peer</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-ipsec-secondary-peer/m-p/479035#M103841</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;If you have say OSPF setup on both VPN endpoints, it should see the down link and route around it.&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Thu, 07 Apr 2022 16:41:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-ipsec-secondary-peer/m-p/479035#M103841</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2022-04-07T16:41:55Z</dc:date>
    </item>
  </channel>
</rss>

