<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Prioritizing an BGP route over other BGP routes for IPSec tunnel traffic redirection in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/prioritizing-an-bgp-route-over-other-bgp-routes-for-ipsec-tunnel/m-p/520529#M107861</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;A class="" href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/70130" target="_self" aria-label="View Profile of Astardzhiev"&gt;&lt;SPAN class=""&gt;Astardzhiev,&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Thank you for the detailed explanation. I got a similar issue, we are&amp;nbsp;&lt;SPAN&gt;&amp;nbsp;cisco router connecting to a circuit&amp;nbsp;running BGP&amp;nbsp;routing to AWS primary patch,&amp;nbsp; circuit as primary, on secondary backup path is a redundant&amp;nbsp;pair of Palo firewalls configure with an IPsec tunnel. I want to configure BGP failover, so that if the circuit fails, BGP peering&amp;nbsp;will route traffic to our&amp;nbsp;Palo firewalls, bring up the IPsec&amp;nbsp;tunnels. Would that be a simialar design that you mentioned above?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Thanks,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Lcox&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 07 Nov 2022 21:37:50 GMT</pubDate>
    <dc:creator>lcox</dc:creator>
    <dc:date>2022-11-07T21:37:50Z</dc:date>
    <item>
      <title>Prioritizing an BGP route over other BGP routes for IPSec tunnel traffic redirection</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/prioritizing-an-bgp-route-over-other-bgp-routes-for-ipsec-tunnel/m-p/397270#M91469</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have an physical Firewall on our premise. We have Three ISP and single virtual router with ECMP enabled(Balanced Round Robin)in it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Recently we had configured Two pairs of IPsec tunnels(Pair one -Tunnel 1 and Tunnel2// Pair 2 - tunnel 3 and tunnel 4) to communicate to AWS Peer(Only one Subnet on AWS 10.x.x.x/24) using the BGP Method for successful failover.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ISP 1 --&amp;gt;Tunnel 1, Tunnel 2&lt;/P&gt;&lt;P&gt;ISP 2--&amp;gt;Tunnel 3 and Tunnel 4&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As we had already enabled the ECMP Balanced round robin method the traffic is currently passing through tunnel 2 and tunnel 4&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now we need the traffic to pass through only tunnel 1 and the traffic should pass through other tunnels only if the tunnel 1 fails. All the tunnels are configured under BGP.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance!!!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My guess is do we have some metrics mechanism which will influence the Tunnel through which the traffic will be egressed.&lt;/P&gt;&lt;P&gt;&lt;LI-MESSAGE title="BGP Routing Question" uid="259069" url="https://live.paloaltonetworks.com/t5/general-topics/bgp-routing-question/m-p/259069#U259069" discussion_style_icon_css="lia-mention-container-editor-message lia-img-icon-forum-thread lia-fa-icon lia-fa-forum lia-fa-thread lia-fa"&gt;&lt;/LI-MESSAGE&gt;&amp;nbsp;&lt;LI-MESSAGE title="IPSec Tunnel Creation" uid="307748" url="https://live.paloaltonetworks.com/t5/quickplay-solutions-articles/ipsec-tunnel-creation/m-p/307748#U307748" discussion_style_icon_css="lia-mention-container-editor-message lia-img-icon-tkb-thread lia-fa-icon lia-fa-tkb lia-fa-thread lia-fa"&gt;&lt;/LI-MESSAGE&gt;&amp;nbsp;&lt;LI-MESSAGE title="BGP Peer Configuration" uid="308334" url="https://live.paloaltonetworks.com/t5/quickplay-solutions-articles/bgp-peer-configuration/m-p/308334#U308334" discussion_style_icon_css="lia-mention-container-editor-message lia-img-icon-tkb-thread lia-fa-icon lia-fa-tkb lia-fa-thread lia-fa"&gt;&lt;/LI-MESSAGE&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 12 Apr 2021 16:50:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/prioritizing-an-bgp-route-over-other-bgp-routes-for-ipsec-tunnel/m-p/397270#M91469</guid>
      <dc:creator>tamilvanan</dc:creator>
      <dc:date>2021-04-12T16:50:56Z</dc:date>
    </item>
    <item>
      <title>Re: Prioritizing an BGP route over other BGP routes for IPSec tunnel traffic redirection</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/prioritizing-an-bgp-route-over-other-bgp-routes-for-ipsec-tunnel/m-p/397639#M91490</link>
      <description>&lt;BLOCKQUOTE&gt;
&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;Yes you can use the PBF rule to get traffic down one tunnel rather than the other. Please make sure to use the monitor:&lt;/P&gt;
&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="OtakarKlier_0-1618343763393.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/30940i05EF29511FE5CF92/image-size/medium?v=v2&amp;amp;px=400" role="button" title="OtakarKlier_0-1618343763393.png" alt="OtakarKlier_0-1618343763393.png" /&gt;&lt;/span&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;And use an IP address on the other side of the tunnel for the monitor. Remember that PBF takes priority over the default router, so you have to disable this if the tunnel is down otherwise dynamic routing wont switch the traffic to the proper path.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 13 Apr 2021 19:56:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/prioritizing-an-bgp-route-over-other-bgp-routes-for-ipsec-tunnel/m-p/397639#M91490</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2021-04-13T19:56:11Z</dc:date>
    </item>
    <item>
      <title>Re: Prioritizing an BGP route over other BGP routes for IPSec tunnel traffic redirection</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/prioritizing-an-bgp-route-over-other-bgp-routes-for-ipsec-tunnel/m-p/398337#M91514</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/165087"&gt;@tamilvanan&lt;/a&gt; ,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I would disagree with &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/27580"&gt;@OtakarKlier&lt;/a&gt;&amp;nbsp; - you don't need PBF if you already running BGP. Why would you put additional complexity if you already have dynamic routing which you can control in so many ways&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I don't understand what ECMP have to do in this question... I understand you use ECMP for Internet access (your default route), but on top of that we are talking about IPsec tunnels, so the routing to AWS private range as nothing to do with the ECMP (as long as you have any tunnel up &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; ). So I will abstract from this.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now I understand that you are receiving the AWS prefix via BGP from all four tunnels. So all you have to do is to create import policy under the BGP. As I said with BGP you have lots of options to controll what you receive, how you receive it and what you advertise, probably the straight forward would be:&lt;BR /&gt;- Create one import policy for BGP peer over tunnel1&lt;/P&gt;&lt;P&gt;- Since you receive only one prefix, you can leave "match" tab as it is (meaning match any route received from that peer&lt;/P&gt;&lt;P&gt;- On "action" tab put 100 as local preference (for example)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- Create one more import below the previous one for BGP peer over tunnel2, 3 and 4&lt;/P&gt;&lt;P&gt;- Leave match tab as it is&lt;/P&gt;&lt;P&gt;- On "action" tab put 200 for local preference&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This way your firewall will receive same prefix over all four tunnel, but it will prefer the route over tunnel1. If this tunnel fail, BGP peering will also fail and fw will stop receiving the prefix from tunnel1, so it will switch to the other tunnels.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now depending what you actually try to accomplish you may want to split the second import policy and have four different policy for each bgp peer with different local pref for each.&lt;/P&gt;</description>
      <pubDate>Thu, 15 Apr 2021 06:54:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/prioritizing-an-bgp-route-over-other-bgp-routes-for-ipsec-tunnel/m-p/398337#M91514</guid>
      <dc:creator>aleksandar.astardzhiev</dc:creator>
      <dc:date>2021-04-15T06:54:42Z</dc:date>
    </item>
    <item>
      <title>Re: Prioritizing an BGP route over other BGP routes for IPSec tunnel traffic redirection</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/prioritizing-an-bgp-route-over-other-bgp-routes-for-ipsec-tunnel/m-p/520529#M107861</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;A class="" href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/70130" target="_self" aria-label="View Profile of Astardzhiev"&gt;&lt;SPAN class=""&gt;Astardzhiev,&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Thank you for the detailed explanation. I got a similar issue, we are&amp;nbsp;&lt;SPAN&gt;&amp;nbsp;cisco router connecting to a circuit&amp;nbsp;running BGP&amp;nbsp;routing to AWS primary patch,&amp;nbsp; circuit as primary, on secondary backup path is a redundant&amp;nbsp;pair of Palo firewalls configure with an IPsec tunnel. I want to configure BGP failover, so that if the circuit fails, BGP peering&amp;nbsp;will route traffic to our&amp;nbsp;Palo firewalls, bring up the IPsec&amp;nbsp;tunnels. Would that be a simialar design that you mentioned above?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Thanks,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Lcox&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 07 Nov 2022 21:37:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/prioritizing-an-bgp-route-over-other-bgp-routes-for-ipsec-tunnel/m-p/520529#M107861</guid>
      <dc:creator>lcox</dc:creator>
      <dc:date>2022-11-07T21:37:50Z</dc:date>
    </item>
  </channel>
</rss>

