<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Multiple ISPs with Path Monitoring in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/multiple-isps-with-path-monitoring/m-p/516418#M107239</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/70130"&gt;@aleksandar.astardzhiev&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This is what I figured but wanted to be sure I was not missing something. &amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;Interesting idea about the PBF rule for ISP 2. &amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Does it make more sense to do PBF instead of path monitoring? Wasn’t sure if Palo still recommends PBF&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Also, I was wondering is there a best practice on what IP address to use for the PBF monitor or static route path monitoring? &amp;nbsp; I see some people using the ISPs default gateway. &amp;nbsp;I can see scenario where DG is reachable but an upstream issue with ISP could prevent internet access. &amp;nbsp; I see others using something like 8.8.8.8 but not sure that’s the best idea either&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;any thoughts ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 29 Sep 2022 23:01:50 GMT</pubDate>
    <dc:creator>securehops</dc:creator>
    <dc:date>2022-09-29T23:01:50Z</dc:date>
    <item>
      <title>Multiple ISPs with Path Monitoring</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/multiple-isps-with-path-monitoring/m-p/516293#M107212</link>
      <description>&lt;P&gt;Hi All&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Need a sanity check.&amp;nbsp; When deploying multiple ISPs using path monitoring, instead of policy based forwarding,&amp;nbsp; should the 2nd ISP become unreachable?&amp;nbsp; It makes sense that it does, but it wasn't mentioned in Palo article about it&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Setup would be&lt;/P&gt;
&lt;P&gt;ISP1 (e1/1)&amp;nbsp; 0.0.0.0/0&amp;nbsp; 1.1.1.254&amp;nbsp; priority 10 (with path monitoring)&lt;/P&gt;
&lt;P&gt;ISP2 (e1/4) 0.0.0.0/0 2.2.2.254&amp;nbsp; priority 200&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;VPN tunnels for both ISP1 and ISP2 using tunnel monitor&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;With this config:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ISP1 tunnel is up,&amp;nbsp; e1/1 is pingable from outside&lt;/P&gt;
&lt;P&gt;ISP2 tunnel is down,&amp;nbsp; e1/4 is NOT pingable from outside&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 29 Sep 2022 00:55:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/multiple-isps-with-path-monitoring/m-p/516293#M107212</guid>
      <dc:creator>securehops</dc:creator>
      <dc:date>2022-09-29T00:55:20Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple ISPs with Path Monitoring</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/multiple-isps-with-path-monitoring/m-p/516415#M107238</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/167427"&gt;@securehops&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;If you don't use PBF this behaviour is expected.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Without PBF, firewall will try to establish VPN with source IP assigned on eth1/4, but it will forward the traffic over eth1/1 and ISP1, where most probably traffic will be dropped, since it is sourced from IP that doesn't belong to this ISP.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In this case, ISP2 tunnel should come up, in case of failover - path monitor fail and remove default over ISP1&lt;/P&gt;
&lt;P&gt;and ISP1 tunnel will go down, respectively.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you prefer to have both tunnels IP and ready, you could create a PBF so traffic sourced from eth1/4 to always go over ISP2.&lt;/P&gt;</description>
      <pubDate>Thu, 29 Sep 2022 22:13:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/multiple-isps-with-path-monitoring/m-p/516415#M107238</guid>
      <dc:creator>aleksandar.astardzhiev</dc:creator>
      <dc:date>2022-09-29T22:13:04Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple ISPs with Path Monitoring</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/multiple-isps-with-path-monitoring/m-p/516418#M107239</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/70130"&gt;@aleksandar.astardzhiev&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This is what I figured but wanted to be sure I was not missing something. &amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;Interesting idea about the PBF rule for ISP 2. &amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Does it make more sense to do PBF instead of path monitoring? Wasn’t sure if Palo still recommends PBF&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Also, I was wondering is there a best practice on what IP address to use for the PBF monitor or static route path monitoring? &amp;nbsp; I see some people using the ISPs default gateway. &amp;nbsp;I can see scenario where DG is reachable but an upstream issue with ISP could prevent internet access. &amp;nbsp; I see others using something like 8.8.8.8 but not sure that’s the best idea either&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;any thoughts ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 29 Sep 2022 23:01:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/multiple-isps-with-path-monitoring/m-p/516418#M107239</guid>
      <dc:creator>securehops</dc:creator>
      <dc:date>2022-09-29T23:01:50Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple ISPs with Path Monitoring</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/multiple-isps-with-path-monitoring/m-p/516513#M107262</link>
      <description>&lt;P&gt;Hey &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/167427"&gt;@securehops&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;I personally always try to avoid PBF, primarily because ofter engineers forget to check it during pacy troubleshooting.&lt;/P&gt;
&lt;P&gt;However the truet it PBF could be very helpful in some situations.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I would say:&lt;/P&gt;
&lt;P&gt;- If you need simple failover between two ISP absolutely go for path monitor on static route&lt;/P&gt;
&lt;P&gt;- But in addition to the failover you need faster recovery for the IPsec tunnel you will need PBF to keep the second tunnel ready to take over.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Don't forget to you either case you will need tunnel-monitor or PBF with path-monitor for the routing over the tunnel. Once primary tunnel goes down, you need to switch the route to second tunnel. You could again create PBF that will monitor the path over the tunnel and when down, to switch to second. This was the prefered way for IPsec failover way-way back. May preferable way is to use tunnel-monitor, so firewall will "disable" the static route pointing to tunnel1 and falback to route pointing to second tunnel.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regarding the monitored host...I am not the best person to define best practises. I have had few cases where path-monitor was required and in all cases we used 8.8.8.8 and it was fine.&lt;/P&gt;</description>
      <pubDate>Fri, 30 Sep 2022 21:23:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/multiple-isps-with-path-monitoring/m-p/516513#M107262</guid>
      <dc:creator>aleksandar.astardzhiev</dc:creator>
      <dc:date>2022-09-30T21:23:08Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple ISPs with Path Monitoring</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/multiple-isps-with-path-monitoring/m-p/519972#M107791</link>
      <description>&lt;P&gt;Hello&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is there a way to enable preemption? Meaning if my primary ISP is back can I switch back to the primary tunnel automaically?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank You&lt;/P&gt;</description>
      <pubDate>Wed, 02 Nov 2022 08:32:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/multiple-isps-with-path-monitoring/m-p/519972#M107791</guid>
      <dc:creator>murali438</dc:creator>
      <dc:date>2022-11-02T08:32:52Z</dc:date>
    </item>
  </channel>
</rss>

