<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Palo Alto Dual ISP, ECMP enables the external interfaces and enables IPSEC VPN tunnels in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-dual-isp-ecmp-enables-the-external-interfaces-and/m-p/519739#M107756</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;When I setup multiple ISP's, I always give one preference. This way I know how things are routed and can easily be notified if one of the links goes down. Here are my replies to your questions:&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Doubt 1: You shouldnt as long as you have your routing setup correctly. I have done this many times before, this is because the ISP's use different IP's on your firewall, etc.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Doubt 2: You can, however I have run into too many routing issues. I always give one of the paths a weight to ensure I know which path the traffic is taking, etc.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Doubt 3:&amp;nbsp;Either one should work just fine. I tend to use Policy Based Forwarding since the PAN takes this routing information prior to looking at the Virtual Router. (just my preference)&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Hope these help out and feel free to post additional questions.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Regards,&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 31 Oct 2022 19:46:39 GMT</pubDate>
    <dc:creator>OtakarKlier</dc:creator>
    <dc:date>2022-10-31T19:46:39Z</dc:date>
    <item>
      <title>Palo Alto Dual ISP, ECMP enables the external interfaces and enables IPSEC VPN tunnels</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-dual-isp-ecmp-enables-the-external-interfaces-and/m-p/519497#M107715</link>
      <description>&lt;P&gt;Palo Alto Dual ISP, ECMP enables the external interfaces and enables IPSEC VPN tunnels.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Good afternoon, as always, thanks for the collaboration and support.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;A few doubts, We currently have an PA configured with ECMP, for outbound to the Internet, with two different ISPs. We plan to configure a Site to Site VPN, with each of the ISP.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Here are the doubts, so that you can give me your opinions and suggestions:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Doubt 1: Will I have any problem when I configure the two IPSEC tunnels, with the dual ISPs ( With ECMP previously enabled ), with the IKE/ESP type traffic ? will it generate any conflict or problem with the stability of each IPSEC Tunnel ? The PA will not have problems with this type of traffic, from its Interfaces, with their respective public IPs, with their respective ISPs and Peers?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Doubt 2: If I configure, already thinking and focused on the routes, with the tunnel interfaces that are used to declare the routes of each ISP, to reach the same destination, is it feasible to use ECMP for the tunnel interfaces ( tunnel.20 and tunnel.21 ) ? to send the traffic in a balanced way ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Doubt 3: Thinking about a Dual Fail Over scenario, not balancing, but fail over, which is better? To use routes with Path Monitoring ( At route level, in the Virtual Router VR, not at HA level ) and so in case of failure the other route becomes valid in the FIB ? Or use PBF ? If I use PBF, I am forced that the Tunnels have IP in each end to be able to monitor the other peer, right? because for example, for the case of Path Monitoring, using an IP of the range and that this allowed in the encryption domain is enough for me to sense the IP at the level of Path Monitoring Route, but with PBF, I am forced that the other end also has an IP in its tunnel interface. What is the recommendation or the best way ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am not talking about Dual fail over type, that one responds and in case of failure, the other responds, but an ECMP type balancing for vpn ipsec site to site traffic. This is for Doubt 2.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you very much for your time, I remain attentive to your comments.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Best regards&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 28 Oct 2022 18:05:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-dual-isp-ecmp-enables-the-external-interfaces-and/m-p/519497#M107715</guid>
      <dc:creator>Metgatz</dc:creator>
      <dc:date>2022-10-28T18:05:41Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto Dual ISP, ECMP enables the external interfaces and enables IPSEC VPN tunnels</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-dual-isp-ecmp-enables-the-external-interfaces-and/m-p/519739#M107756</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;When I setup multiple ISP's, I always give one preference. This way I know how things are routed and can easily be notified if one of the links goes down. Here are my replies to your questions:&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Doubt 1: You shouldnt as long as you have your routing setup correctly. I have done this many times before, this is because the ISP's use different IP's on your firewall, etc.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Doubt 2: You can, however I have run into too many routing issues. I always give one of the paths a weight to ensure I know which path the traffic is taking, etc.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Doubt 3:&amp;nbsp;Either one should work just fine. I tend to use Policy Based Forwarding since the PAN takes this routing information prior to looking at the Virtual Router. (just my preference)&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Hope these help out and feel free to post additional questions.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Regards,&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 31 Oct 2022 19:46:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-dual-isp-ecmp-enables-the-external-interfaces-and/m-p/519739#M107756</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2022-10-31T19:46:39Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto Dual ISP, ECMP enables the external interfaces and enables IPSEC VPN tunnels</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-dual-isp-ecmp-enables-the-external-interfaces-and/m-p/519790#M107763</link>
      <description>&lt;P&gt;Hello &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/27580"&gt;@OtakarKlier&lt;/a&gt;&amp;nbsp;, thank you very much for your time, your collaboration and your answers.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Some doubts, regarding point or doubt number 2, if it is being given a weight, for example, prefer traffic with a greater weight, example weight tunnel.20, "200" (Best link Bandwidth and stability), tunnel.21 "50" (lower bandwidth and less stability), in that case you will always be giving more weight to one connection than the other, based on the balancing algorithms, but if you have so many problems with balancing and load balancing and routing, in that case it does not contribute much or not at all useful to use EMCP for this type of scenario (VPN IPSEC DUAL load balancing)? In that case it would be better to just use type Fail Over with PBF or with static route path monitoring??&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;I also understand that the other important considerations are that the other peer, the other end, with its two tunnels (regardless of the Firewall manufacturer) should also have something like ECMP or similar, since if at the routing level, the other peer, always has preference for only one of its tunnels, some asymmetric traffic could occur, or ruotung problems. Since the other end does not understand that it can reach the networks behind Palo Alto, only from one of its interfaces or only from one of the tunnels, El PAlo Alto, it will send by ECMP, through one tunnel and another, and the other end, but it does not have something like ECMP, it will forward or use the return route or the return traffic, it will always be through one of its tunnels, this referring to the peer, to the other end.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Then you have to consider that in both firewalls, both in Palo Alto, and at the other end (the vendor whatever it may be), since Palo Alto could be sending traffic through a tunnel or tunnel interface of one of the IPSEC tunnels , and the other responds the same traffic and/or return route, it goes through the other tunnel, where the other firewall of the peer, from the other end, points out its preference metric to reach the networks that are behind the high pole and that knows through the ipsec tunnel, I understand that in that case we could have that type of problem, right, of symmetrical traffic? Are my considerations correct? Should asymmetric traffic be allowed in Palo Alto and at the other end?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you very much for your time, for your collaboration.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I remain attentive to your comments&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Best regards&lt;/P&gt;</description>
      <pubDate>Tue, 01 Nov 2022 03:42:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-dual-isp-ecmp-enables-the-external-interfaces-and/m-p/519790#M107763</guid>
      <dc:creator>Metgatz</dc:creator>
      <dc:date>2022-11-01T03:42:06Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto Dual ISP, ECMP enables the external interfaces and enables IPSEC VPN tunnels</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-dual-isp-ecmp-enables-the-external-interfaces-and/m-p/520065#M107802</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;Here are my thoughts on your questions:&lt;/P&gt;
&lt;P&gt;ECMP/weights = Correct ECMP should not be used if using weights to prefer one route/path over another.&lt;/P&gt;
&lt;P&gt;Better to use PBF? = if preferring a route, yes you can.&lt;/P&gt;
&lt;P&gt;The other device = Correct, the other device would need to be also setup to use PBF or something similar to ensure traffic goes back down the correct path. I prefer OSPF in this case and use route weights here. That way the other device will learn the routes and weights, etc.&lt;/P&gt;
&lt;P&gt;Asymmetric traffic = I would make sure you dont have this scenario as it will not work. Best to go with weighted routes, etc.&lt;/P&gt;
&lt;P&gt;Check out my reply to this post and see if it makes a bit more sense.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/general-topics/multi-site-dual-isp-with-redundant-vpn-connections-pbf-vs/m-p/205258#M60288" target="_blank"&gt;https://live.paloaltonetworks.com/t5/general-topics/multi-site-dual-isp-with-redundant-vpn-connections-pbf-vs/m-p/205258#M60288&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hope this makes sense.&lt;/P&gt;</description>
      <pubDate>Wed, 02 Nov 2022 20:42:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-dual-isp-ecmp-enables-the-external-interfaces-and/m-p/520065#M107802</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2022-11-02T20:42:07Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto Dual ISP, ECMP enables the external interfaces and enables IPSEC VPN tunnels</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-dual-isp-ecmp-enables-the-external-interfaces-and/m-p/520223#M107822</link>
      <description>&lt;P&gt;Hello &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/27580"&gt;@OtakarKlier&lt;/a&gt;&amp;nbsp;Good afternoon, thank you for your collaboration and your time.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Yes, but now what I was referring to was the scenario of having 2 IPSEC tunnels, with ECMP enabled (IPSEC routes equal to both tunnels: Tunnel.21 and Tunnel.22) for Site-To-Site VPN traffic. so that it is balanced, so that both links, both tunnels are used (No Dual Fail Over, I mean balanced, not that if one link fails it goes through the other, where you could use Router Monitoring or PBF). So based on the above and in a Dual Balanced scenario, not Dual Fail Over, if the Palo Alto firewall with ECMP for the tunnel interfaces, and routes of the same metric, to use both links, the Palo Alto will be sending traffic through a tunnel then through the other tunnel, so to what I mean, to have a fully balanced traffic scenario, it would require that the other peer, the other end, the other firewall, from whatever manufacturer, also have some ECMP mechanism enabled, or balancing or similar, with equal metric routes, as an example if Palo Alto sends traffic through one of its tunnels, and then through the other, if the other end does not have an ECMP type balancing or similar, for the return traffic, the other end will always forward the return traffic through its route with the best metric (thinking that it does not have something like ECMP) and therefore through its route with the tunnel with the best metric and not in a balanced way, in this scenario it could eventually occur asim traffic metric, since the PA will send traffic through both tunnels in a random and/or balanced way, but if the other end does not have something like ECMP, the return traffic will always go through its best metric and therefore always through a tunnel. Now in a full scenario balanced by both ends, both devices must have the ECMP mechanism enabled so that they can send the outgoing or return traffic through both links.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please give your comments regarding what is mentioned in this post.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you in advance for your time and collaboration.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Stay tuned to your comments&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Best regards&lt;/P&gt;</description>
      <pubDate>Thu, 03 Nov 2022 20:37:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-dual-isp-ecmp-enables-the-external-interfaces-and/m-p/520223#M107822</guid>
      <dc:creator>Metgatz</dc:creator>
      <dc:date>2022-11-03T20:37:45Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto Dual ISP, ECMP enables the external interfaces and enables IPSEC VPN tunnels</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-dual-isp-ecmp-enables-the-external-interfaces-and/m-p/1251307#M126225</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/179185"&gt;@Metgatz&lt;/a&gt;&amp;nbsp; - You are right ! This setup works as long as you have ECMP supported and enabled on the peer end as well.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For instance, I have PA firewall terminating dual ISP's and I have equal cost default routes (0.0.0.0/0) pointing to each ISP's. I have enabled ECMP and listed only these physical interfaces to load balance the internet traffic.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Then I am creating a couple of IPSEC tunnels via each ISP and the peer is AWS. I would like to load balance this IPSEC traffic over these two tunnels. I just need to enable ECMP on the AWS to load balance the traffic over both the tunnels. I don't require any extra config on the PA firewall.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We should not list tunnel interfaces in the ECMP but only the physical interfaces. ECMP is enabled globally.&amp;nbsp;Lets say Palo Alto receives two equal cost routes from AWS over both the tunnel using BGP, these two equal cost routes will be installed in the FIB even though tunnel interfaces are not listed in the ECMP. Because ECMP interface list applies only to physical next-hop routes, not tunnel routes. Its recommended to enable strict source path on the PA firewall &amp;amp; symmetric return on both the peers.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So as long as you have equal cost routes pointing to tunnel interfaces, the IPSEC traffic gets load balanced over both the tunnels. The normal internet traffic gets load balanced using the equal cost default routes.&lt;/P&gt;</description>
      <pubDate>Tue, 31 Mar 2026 19:50:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-dual-isp-ecmp-enables-the-external-interfaces-and/m-p/1251307#M126225</guid>
      <dc:creator>VinothIyyappan</dc:creator>
      <dc:date>2026-03-31T19:50:37Z</dc:date>
    </item>
  </channel>
</rss>

