<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Dual ISPs VPN failover across both in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/dual-isps-vpn-failover-across-both/m-p/512311#M106452</link>
    <description>&lt;P&gt;Trying to provide some tunnel redundancy to some of our AWS environments.&amp;nbsp; I have 2 ISPs both with an interface/static IPs on my HA PANs. ISP-A is my default with a default route to the internet pointing to its next hop.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;ISP- A Eth1/8 9.9.9.9/24 ZONE-A&lt;/P&gt;
&lt;P&gt;ISP-B Eth1/7 10.10.10.10/24 ZONE-B&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Currently have all my VPN tunnels across ISP-A and want to bring up some tunnels across ISP-B.&amp;nbsp; I created the IKE gateways and attached them to Eth1/7 ISP-B but in the logs I see the VPN traffic being dropped because its sending the traffic from Eth1/7 to Eth1/8 which is wrong, it should just go from Eth1/7 to the internet.&amp;nbsp; I am missing something but not sure what.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Do both public interfaces need to be in the same ZONE?&amp;nbsp; That is the only thing I can really see that maybe causing it.&amp;nbsp; We have 2 static routes pointing out each ISP with the metric on the ISP-B higher than ISP-A so it prefers that route.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;How do I force specific VPN tunnel traffic out of the secondary interface?&amp;nbsp; I thought just trying the gateways to that interface would suffice but it doesn't appear to be the case.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Do I need static routes pointing to ISP-B for each tunnel endpoint at AWS?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 18 Aug 2022 18:59:42 GMT</pubDate>
    <dc:creator>drewdown</dc:creator>
    <dc:date>2022-08-18T18:59:42Z</dc:date>
    <item>
      <title>Dual ISPs VPN failover across both</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dual-isps-vpn-failover-across-both/m-p/512311#M106452</link>
      <description>&lt;P&gt;Trying to provide some tunnel redundancy to some of our AWS environments.&amp;nbsp; I have 2 ISPs both with an interface/static IPs on my HA PANs. ISP-A is my default with a default route to the internet pointing to its next hop.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;ISP- A Eth1/8 9.9.9.9/24 ZONE-A&lt;/P&gt;
&lt;P&gt;ISP-B Eth1/7 10.10.10.10/24 ZONE-B&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Currently have all my VPN tunnels across ISP-A and want to bring up some tunnels across ISP-B.&amp;nbsp; I created the IKE gateways and attached them to Eth1/7 ISP-B but in the logs I see the VPN traffic being dropped because its sending the traffic from Eth1/7 to Eth1/8 which is wrong, it should just go from Eth1/7 to the internet.&amp;nbsp; I am missing something but not sure what.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Do both public interfaces need to be in the same ZONE?&amp;nbsp; That is the only thing I can really see that maybe causing it.&amp;nbsp; We have 2 static routes pointing out each ISP with the metric on the ISP-B higher than ISP-A so it prefers that route.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;How do I force specific VPN tunnel traffic out of the secondary interface?&amp;nbsp; I thought just trying the gateways to that interface would suffice but it doesn't appear to be the case.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Do I need static routes pointing to ISP-B for each tunnel endpoint at AWS?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 18 Aug 2022 18:59:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dual-isps-vpn-failover-across-both/m-p/512311#M106452</guid>
      <dc:creator>drewdown</dc:creator>
      <dc:date>2022-08-18T18:59:42Z</dc:date>
    </item>
    <item>
      <title>Re: Dual ISPs VPN failover across both</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dual-isps-vpn-failover-across-both/m-p/512399#M106476</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;First the zone question. Basically its your preference, zones are there to provide logical separation so that security policies can/will be applied to the traffic.&lt;/P&gt;
&lt;P&gt;Second the VPN tunnels: What I did was create the tunnels to AWS. Then I created Policy Based Forwarding rules to force the traffic down one tunnel and have the tunnel removed if it fails.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="OtakarKlier_0-1660933962842.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/43224iF754147FC36045E4/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="OtakarKlier_0-1660933962842.png" alt="OtakarKlier_0-1660933962842.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;This way I dont have traffic dropped due to asymmetric return. AWS is all policy based routing so it gets goofy under the hood. This is why I chose the PBF rules instead of dynamic routing etc.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hope that makes sense.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 19 Aug 2022 18:34:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dual-isps-vpn-failover-across-both/m-p/512399#M106476</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2022-08-19T18:34:10Z</dc:date>
    </item>
    <item>
      <title>Re: Dual ISPs VPN failover across both</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dual-isps-vpn-failover-across-both/m-p/512545#M106504</link>
      <description>&lt;P&gt;I don't mess with PBF at all anymore as it was more work than it's worth.&amp;nbsp; For redundancy to the internet we utilize 2 static routes (1 with a higher cost) and path monitoring.&amp;nbsp; That eliminates the need for PBF and having to make sure all the right subnets are configured and all that noise.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As far as VPN failover I got it working by simply adding static routes pointing to the secondary AWS tunnel IPs via the secondary circuit and run BGP across all of it.&amp;nbsp; Works great.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 22 Aug 2022 14:22:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dual-isps-vpn-failover-across-both/m-p/512545#M106504</guid>
      <dc:creator>drewdown</dc:creator>
      <dc:date>2022-08-22T14:22:15Z</dc:date>
    </item>
  </channel>
</rss>

