<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: HA path monitoring in virtual wire in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ha-path-monitoring-in-virtual-wire/m-p/15280#M11230</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I had asked permission from &lt;A __default_attr="16048" __jive_macro_name="user" class="jive_macro jive_macro_user" data-objecttype="3" href="https://live.paloaltonetworks.com/"&gt;&lt;/A&gt; to use his thread so I hope he wont mind &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://live.paloaltonetworks.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;. Anyways I have submitted the change request to get the new config tested. If get approvals then I will get the config tested over the weekend. I will let you know the outcome.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 17 Apr 2013 08:24:54 GMT</pubDate>
    <dc:creator>Sly_Cooper</dc:creator>
    <dc:date>2013-04-17T08:24:54Z</dc:date>
    <item>
      <title>HA path monitoring in virtual wire</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ha-path-monitoring-in-virtual-wire/m-p/15264#M11214</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I've seen a couple answers here about using Path Monitoring in Virtual Wire. They say that one must use an IP address within the Virtual Wire subnet as the source address. OK, I get that. What I don't get is how to configure such an address. I don't see a way to add an address to a vwire interface. I've tried creating a loopback with no good result. Also gave vlan a shot, but that didn't look promising either. Thanks for any help.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 07 Apr 2013 23:05:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ha-path-monitoring-in-virtual-wire/m-p/15264#M11214</guid>
      <dc:creator>gmparis</dc:creator>
      <dc:date>2013-04-07T23:05:32Z</dc:date>
    </item>
    <item>
      <title>Re: HA path monitoring in virtual wire</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ha-path-monitoring-in-virtual-wire/m-p/15265#M11215</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Device -&amp;gt; High Availability -&amp;gt; Path Monitoring -&amp;gt; Path Group -&amp;gt; Add Virtual Wire has the option to add Source and Destination address. I am also working on similar monitoring where I would like to monitor device beyond connected device. I am still not sure how the routing would though. I have a case open with support with not much progress.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 08 Apr 2013 08:37:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ha-path-monitoring-in-virtual-wire/m-p/15265#M11215</guid>
      <dc:creator>Sly_Cooper</dc:creator>
      <dc:date>2013-04-08T08:37:42Z</dc:date>
    </item>
    <item>
      <title>Re: HA path monitoring in virtual wire</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ha-path-monitoring-in-virtual-wire/m-p/15266#M11216</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;How about configuring a L3 interface on PA and connecting it to the network providing a reachability to the Monitored Dest.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="font-size: 11px; font-family: Arial, Helvetica, sans-serif; color: #000000; background-color: #ffffff;"&gt;&lt;A _jive_internal="true" class="jiveTT-hover-user jive-username-link active_link" data-avatarid="-1" data-externalid="" data-presence="null" data-userid="13014" data-username="vwaghmar" href="https://live.paloaltonetworks.com/people/vwaghmar" id="jive-1301436761346799334719" style="padding: 0 3px 0 0; font-weight: inherit; font-style: inherit; font-size: 1.1em; font-family: inherit; text-decoration: underline; color: #316989;"&gt;vwaghmar&lt;/A&gt; : &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="font-size: 11px; font-family: Arial, Helvetica, sans-serif; color: #000000; background-color: #ffffff;"&gt;Excerpt from Admin guide : 5.0&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="Bold" style="font-weight: bold; color: #000000; font-family: 'Microsoft Sans Serif'; font-size: 12px;"&gt;Source IP&lt;/SPAN&gt;&lt;SPAN style="color: #000000; font-family: 'Microsoft Sans Serif'; font-size: 12px;"&gt;—For virtual wire and VLAN interfaces, enter the source IP address used in the probe packets sent to the next-hop router (Destination IP address). The local router must be able to route the address to the fire­wall. The source IP address for path groups associated with virtual routers will be automatically configured as the interface IP address that is indi­cated in the route table as the egress interface for the specified destination IP address.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-family: 'Microsoft Sans Serif'; font-size: 12px;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-family: 'Microsoft Sans Serif'; font-size: 12px;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 08 Apr 2013 11:27:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ha-path-monitoring-in-virtual-wire/m-p/15266#M11216</guid>
      <dc:creator>UhMayYeah</dc:creator>
      <dc:date>2013-04-08T11:27:44Z</dc:date>
    </item>
    <item>
      <title>Re: HA path monitoring in virtual wire</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ha-path-monitoring-in-virtual-wire/m-p/15267#M11217</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;A __default_attr="11199" __jive_macro_name="user" class="jive_macro jive_macro_user" data-objecttype="3" href="https://live.paloaltonetworks.com/"&gt;&lt;/A&gt;: L3 interface configuration is what suggested by our SE. The support talked about having src and dst ip in the subnet. That doesn't make any sense when you want to monitor devices beyond connected one. Have you tried this by yourself? Unfortunately I don't have an environment to play with and before touching the production devices, I wanted to make sure that I can plan ready for configuration and testing. I am running 4.x code. Do I need to have a combination of virtual wire and virtual router in the path monitoring config? Can you provide me more details? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is what my scenario is (apologies @gmparis for hijacking thread). Internet -&amp;gt; Internet router -&amp;gt; public switch -&amp;gt; Untrust firewall -&amp;gt; Untrust PAN -&amp;gt; Trust PAN -&amp;gt; DMZ switch. I can monitor dmz switch and trust interface of firewall using link monitoring and is working fine. I want to monitor the untrust firewall to pub switch connectivity. Here is what I understood.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Connect new interface on PAN to dmz switch&lt;/P&gt;&lt;P&gt;- Configure L3 interface with trust side subnet of firewall&lt;/P&gt;&lt;P&gt;- Configure path monitoring with newly added interface? How do I add destination ip? I dont see any option to use single interface under path monitoring.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 08 Apr 2013 11:49:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ha-path-monitoring-in-virtual-wire/m-p/15267#M11217</guid>
      <dc:creator>Sly_Cooper</dc:creator>
      <dc:date>2013-04-08T11:49:14Z</dc:date>
    </item>
    <item>
      <title>Re: HA path monitoring in virtual wire</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ha-path-monitoring-in-virtual-wire/m-p/15268#M11218</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No problem about the hijacking, @vwaghmar. Thanks for answering my question. I was trying to test the path monitoring using ping before configuring it into HA. That apparently can't be made to work, but isn't necessary. Just putting the source address into the vwire path monitoring config is all that's needed. I was making it harder than it had to be.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Good luck with your layer-3 issue.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 08 Apr 2013 12:46:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ha-path-monitoring-in-virtual-wire/m-p/15268#M11218</guid>
      <dc:creator>gmparis</dc:creator>
      <dc:date>2013-04-08T12:46:46Z</dc:date>
    </item>
    <item>
      <title>Re: HA path monitoring in virtual wire</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ha-path-monitoring-in-virtual-wire/m-p/15269#M11219</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;A __default_attr="16048" __jive_macro_name="user" class="jive_macro jive_macro_user" href="https://live.paloaltonetworks.com/"&gt;&lt;/A&gt; - Glad to know that it helped. I hope I will get answer for my questio as well. I am waiting for suggestions from &lt;A __default_attr="11199" __jive_macro_name="user" class="jive_macro jive_macro_user" href="https://live.paloaltonetworks.com/"&gt;&lt;/A&gt; for my testing. Till then I would continue to use your thread &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://live.paloaltonetworks.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 09 Apr 2013 13:04:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ha-path-monitoring-in-virtual-wire/m-p/15269#M11219</guid>
      <dc:creator>Sly_Cooper</dc:creator>
      <dc:date>2013-04-09T13:04:44Z</dc:date>
    </item>
    <item>
      <title>Re: HA path monitoring in virtual wire</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ha-path-monitoring-in-virtual-wire/m-p/15270#M11220</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi all&lt;/P&gt;&lt;P&gt;I'll join this thread cause this is exactly what I'm looking for.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="vwire-ha.jpg" class="jive-image-thumbnail jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/6281_vwire-ha.jpg" width="450" /&gt;&lt;/P&gt;&lt;P&gt;I need to monitor HSRP address of routers because If outside interface goes down on cisco ASA, ASAs will switchover and PANs not.&lt;/P&gt;&lt;P&gt;Do I realy need to create seperate L3 interface just for this purpose? If yes I think that it will be easier to create L3 interfaces on PAN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regards&lt;/P&gt;&lt;P&gt;Przemek&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Apr 2013 09:03:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ha-path-monitoring-in-virtual-wire/m-p/15270#M11220</guid>
      <dc:creator>pkonitz</dc:creator>
      <dc:date>2013-04-16T09:03:42Z</dc:date>
    </item>
    <item>
      <title>Re: HA path monitoring in virtual wire</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ha-path-monitoring-in-virtual-wire/m-p/15271#M11221</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;A __default_attr="20444" __jive_macro_name="user" class="jive_macro jive_macro_user active_link" data-objecttype="3"&gt;&lt;/A&gt; - Looks like we are in the same boat&lt;SPAN __jive_emoticon_name="wink"&gt;&lt;/SPAN&gt;. The ASA failover does not trigger PA failover. Creating a separate L3 interface for monitoring is what suggested by our SE. Here is what I had tried over the last weekend but did not get satisfactory results due to ASA issues in our environment.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Connect an interface from PAN to LAN switch&lt;/P&gt;&lt;P&gt;- Configure interface in L3 mode. I am assuming that PAN trust/inside is connected to a L3 switch having default gateway as ASA&lt;/P&gt;&lt;P&gt;- Configure new zone&lt;/P&gt;&lt;P&gt;- Configure new virtual router. I preferred to create new as the purpose was to use it purely for HA path monitoring. My PAN anyways configured in vWire mode&lt;/P&gt;&lt;P&gt;- Ping destination using src ping on PAN. Please note that somehow I was not able to ping ASA untrust from inside/trust. I am not sure if that is the feature in ASA but I did not have time to work on it. If you know how then please let me know. ASA egress IP is reachable from public&lt;/P&gt;&lt;P&gt;- Configure path monitoring with type as "virtual router". Configure destination address and select the virtual router with proper routing&lt;/P&gt;&lt;P&gt;- Check path monitoring status from cli # show high-availability path-monitoring&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; pan(active)&amp;gt; show high-availability path-monitoring &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt; &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;--------------------------------------------------------------------------------&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;total paths monitored :&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;interval to send ICMP probe packets :&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 200 ms&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;last N probes to determine path availability :&amp;nbsp; 10&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;hold time to send probe packets :&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 60000 ms&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;nbsp; (after device becomes active)&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;--------------------------------------------------------------------------------&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;name/type&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; destination&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; succ/total rtt min/max/avg (ms)&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;--------------------------------------------------------------------------------&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;ha-monitor-vrouter/virtual-router &amp;lt;destination ip&amp;gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10/10&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.80/1.04/0.88&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;--------------------------------------------------------------------------------&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My failover scenario worked fine after shutting down the ASA untrust link. I however had issues later when Active PAN become Primary again. I will be trying the same thing with Juniper firewalls again over coming weekend. If you manage to test in the meanwhile then please share the results.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Apr 2013 10:46:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ha-path-monitoring-in-virtual-wire/m-p/15271#M11221</guid>
      <dc:creator>Sly_Cooper</dc:creator>
      <dc:date>2013-04-16T10:46:10Z</dc:date>
    </item>
    <item>
      <title>Re: HA path monitoring in virtual wire</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ha-path-monitoring-in-virtual-wire/m-p/15272#M11222</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;thx vwaghmar for your answer.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;as I remember you can't ping outside interface of ASA from inside &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://live.paloaltonetworks.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&amp;nbsp; so don't bother. Maybe if you change "management-interface" for outside (which is not recomended) but it is not easily done casue managemnt-interface can't be the one with the lowest "security-level".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Unfortunately I dont have 2 ASAs in my lab to test all interesting parts.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My first question is whether PAN tranfers traffic in vwire when it is in passive mode? It is fundamental question cause &lt;BR /&gt;If the answer is yes then it is no use of creating L3 interface for path monitoring cause its default gateway (L3 switch or inside interface of ASA) is always available regardless which ASA is acitve or standby.&lt;/P&gt;&lt;P&gt;When ASAs do switchover the secondary one starts using the IP address of the previous primary one (which is default gateway for internal networks and L3 interface of PAN).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;OK I've found the info that traffic handling links on the passive device are in "down" state. Of course it wouldn't make sanse the other way but I had to ask &lt;img id="smileywink" class="emoticon emoticon-smileywink" src="https://live.paloaltonetworks.com/i/smilies/16x16_smiley-wink.png" alt="Smiley Wink" title="Smiley Wink" /&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As I said I can't test it in a full environment but I have to do it in production &lt;img id="smileywink" class="emoticon emoticon-smileywink" src="https://live.paloaltonetworks.com/i/smilies/16x16_smiley-wink.png" alt="Smiley Wink" title="Smiley Wink" /&gt; GREAT is it not?&lt;/P&gt;&lt;P&gt;What about your case you've mentioned earlier? is it closed with the solution presented? or still have hope for some trick? idea?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regards&lt;/P&gt;&lt;P&gt;Przemek&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Apr 2013 11:19:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ha-path-monitoring-in-virtual-wire/m-p/15272#M11222</guid>
      <dc:creator>pkonitz</dc:creator>
      <dc:date>2013-04-16T11:19:27Z</dc:date>
    </item>
    <item>
      <title>Re: HA path monitoring in virtual wire</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ha-path-monitoring-in-virtual-wire/m-p/15273#M11223</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;A __default_attr="20444" __jive_macro_name="user" class="jive_macro jive_macro_user" data-objecttype="3" href="https://live.paloaltonetworks.com/"&gt;&lt;/A&gt; - Anyways we are getting rid of ASA with PAN so I am not bothered any more &lt;img id="smileywink" class="emoticon emoticon-smileywink" src="https://live.paloaltonetworks.com/i/smilies/16x16_smiley-wink.png" alt="Smiley Wink" title="Smiley Wink" /&gt;. I wanted to simulate it for other environment.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Passive PAN in vwire mode will have all its interfaces shut/down. Are you seeing the interfaces UP? Also the traffic will eventually flow from the vwire to reach ASA or gateway so the path monitor will have no data on the passive PAN. Check the output below from passive PAN. There is a possibility that the active PAN will be able to reach the destination ip from the standby ASA (when Active). I did not get time to check about it. I will check with our SE.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;pan(passive)&amp;gt; show high-availability path-monitoring &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--------------------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;path monitoring statistics unavailable due to inactive device state&lt;/P&gt;&lt;P&gt;total paths monitored :&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1&lt;/P&gt;&lt;P&gt;interval to send ICMP probe packets :&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 200 ms&lt;/P&gt;&lt;P&gt;last N probes to determine path availability :&amp;nbsp; 10&lt;/P&gt;&lt;P&gt;hold time to send probe packets :&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 60000 ms&lt;/P&gt;&lt;P&gt;&amp;nbsp; (after device becomes active)&lt;/P&gt;&lt;P&gt;--------------------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;name/type&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; destination&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; succ/total rtt min/max/avg (ms)&lt;/P&gt;&lt;P&gt;--------------------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;ha-monitor-vrouter/virtual-router &amp;lt;dst monitored ip&amp;gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; N/A&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; N/A&lt;/P&gt;&lt;P&gt;-------------------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I tested it in production as well as I have running setup with this limitation :smileygrin:. I am going to try next with Juniper firewall which has the option to assign separate management ip address apart from the floating one to an interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As per support, it is not possible to monitor destination which is one hop away/routed. The L3 interface on PAN will have to be in the same subnet as dst address.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Apr 2013 11:35:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ha-path-monitoring-in-virtual-wire/m-p/15273#M11223</guid>
      <dc:creator>Sly_Cooper</dc:creator>
      <dc:date>2013-04-16T11:35:21Z</dc:date>
    </item>
    <item>
      <title>Re: HA path monitoring in virtual wire</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ha-path-monitoring-in-virtual-wire/m-p/15274#M11224</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This is my first experience with PAN so sorry for silly questions &lt;img id="smileywink" class="emoticon emoticon-smileywink" src="https://live.paloaltonetworks.com/i/smilies/16x16_smiley-wink.png" alt="Smiley Wink" title="Smiley Wink" /&gt; &lt;/P&gt;&lt;P&gt;I see the interfaces Down on passive generaly becasue they are not connected to standby ASA (I don't have 2nd one in my lab &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://live.paloaltonetworks.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt; )&lt;/P&gt;&lt;P&gt;However I've just seen there is an option for default bahaviour.&lt;/P&gt;&lt;P&gt;&lt;IMG alt="ScreenShot006.bmp" class="jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/6287_ScreenShot006.bmp" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I didn't get the thing about support.&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;
&lt;P&gt;"L3 interface must be on the same subnet as dst address?"&lt;/P&gt;
&lt;/PRE&gt;&lt;P&gt;According to docs (at least for 5.0) it can be done.&lt;/P&gt;&lt;P&gt;You also wrote:&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;
&lt;P&gt;I however had issues later when Active PAN become Primary again&lt;/P&gt;
&lt;/PRE&gt;&lt;P&gt;What kind of issues? Did you enable Preemptive option? I think It should be disabled in this scenario as PAN need to follow ASAs. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For now I think I will need to redesign everything and make PAN in L3 mode cause I even have problems with creating vwire subinterfaces and putting them in deferent zones. &lt;/P&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://live.paloaltonetworks.com/thread/7403"&gt;https://live.paloaltonetworks.com/thread/7403&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Sorry for changing the subject. Do you have similar environment?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Apr 2013 12:11:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ha-path-monitoring-in-virtual-wire/m-p/15274#M11224</guid>
      <dc:creator>pkonitz</dc:creator>
      <dc:date>2013-04-16T12:11:10Z</dc:date>
    </item>
    <item>
      <title>Re: HA path monitoring in virtual wire</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ha-path-monitoring-in-virtual-wire/m-p/15275#M11225</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;As far as I know or seen, PAN in vWire HA deployment will have ports shut on Passive device. I think I had checked/tried that initially and had same results. May be it is something different for L3 mode. My environment is vWire mode only.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;
&lt;P&gt;I didn't get the thing about support.&lt;/P&gt;
&lt;BLOCKQUOTE class="jive-quote"&gt;
&lt;P&gt;"L3 interface must be on the same subnet as dst address?"&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;/PRE&gt;&lt;P&gt;Honestly it does not make any sense to me as well as path monitoring is supposed to check path IMO. As per the support the src ip (L3 on PAN) should be part of destination subnet. May be it is limitation for vWire based deployment The option suggested was to connect a cable from PAN to the remote subnet and then configure monitoring of destination IP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;
&lt;P&gt;What kind of issues? Did you enable Preemptive option? I think It should be disabled in this scenario as PAN need to follow ASAs.&lt;/P&gt;
&lt;/PRE&gt;&lt;P&gt;We had issues with managing secondary ASA after failover. Hence could not check the status on secondary ASA. After a while, the Active PAN was primary. I suspect that is due to the reason that the destination ip was reachable via Standby ASA (when Active). Yes I have preemptive option enabled. That is a good option to check for. Anyways I plan on checking the untrust IP availability and my affected environment has Juniper. I will configure the destination ip separate on PAN which will be the manage-ip of untrust interface (not floating). The aim is to failover PAN if the untrust link to connected switch dies.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am running 4.x so cant comment about 5.x stuff.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would love to have L3 environment but redesign is not an option for me considering config on the existing firewalls and criticality of the environment. I am however moving to L3 on PAN in some environment. ASA and PAN back to back becomes redundant. In my environment we are doing lot of stuff on PAN than ASA so we will be replacing ASA.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Apr 2013 12:49:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ha-path-monitoring-in-virtual-wire/m-p/15275#M11225</guid>
      <dc:creator>Sly_Cooper</dc:creator>
      <dc:date>2013-04-16T12:49:24Z</dc:date>
    </item>
    <item>
      <title>Re: HA path monitoring in virtual wire</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ha-path-monitoring-in-virtual-wire/m-p/15276#M11226</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I just checked release notes of 5.0.4 and can see the enhancement in HA options.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote" modifiedtitle="true"&gt;
&lt;P data-canvas-width="237.6016000000001" data-font-name="g_font_p1_4" dir="ltr" style="font-size: 16px; font-family: serif;"&gt;• Passive Device Link State Control &lt;/P&gt;
&lt;P data-canvas-width="8" data-font-name="g_font_p0_1" dir="ltr" style="font-size: 16px; font-family: serif;"&gt;–&lt;/P&gt;
&lt;P data-canvas-width="88.70400000000001" data-font-name="g_font_p0_1" dir="ltr" style="font-size: 16px; font-family: serif;"&gt;This enhancement improves failover times in Active/Passive deployments that make use of L2 or virtual wire interfaces by keeping the physical interface link state on the passive device in the link&lt;/P&gt;
&lt;P data-canvas-width="5.328" data-font-name="g_font_p0_1" dir="ltr" style="font-size: 16px; font-family: serif;"&gt;-&lt;/P&gt;
&lt;P data-canvas-width="160.73600000000002" data-font-name="g_font_p0_1" dir="ltr" style="font-size: 16px; font-family: serif;"&gt;up state. This feature already exists for L3 interfaces.&lt;/P&gt;
&lt;/PRE&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Apr 2013 13:02:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ha-path-monitoring-in-virtual-wire/m-p/15276#M11226</guid>
      <dc:creator>Sly_Cooper</dc:creator>
      <dc:date>2013-04-16T13:02:32Z</dc:date>
    </item>
    <item>
      <title>Re: HA path monitoring in virtual wire</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ha-path-monitoring-in-virtual-wire/m-p/15277#M11227</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;PRE class="jive_text_macro jive_macro_quote"&gt;
&lt;P&gt;We had issues with managing secondary ASA after failover. Hence could not check the status on secondary ASA. After a while, the Active PAN was primary. I suspect that is due to the reason that the destination ip was reachable via Standby ASA (when Active). Yes I have preemptive option enabled. That is a good option to check for.&lt;/P&gt;


&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think this was your issue - I mean PREEMPTIVE option. As I remember ASA in active/standby mode doesn't behave in a preemptive manner (it can but as I remember only in multicontext mode). So after a while passive PAN regain its connectivity with path monitoring through currently active ASA so it switches again. What is your case?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've just tried this "Passive Device Link State Control" and I changed it&amp;nbsp; to "auto" as picture presented earlier. However this&amp;nbsp; does not mean that ASA hearbeats can keep going !!! Its true that link is green but thats all. So no connectivity to the secondary ASA will be allowed when&amp;nbsp; the PAN box is passive. This make sense in order to avoid the situation when we could evade the active box and its inspection, but it is pain in the a... when sth behind it needs to send its heartbeats &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://live.paloaltonetworks.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Apr 2013 13:23:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ha-path-monitoring-in-virtual-wire/m-p/15277#M11227</guid>
      <dc:creator>pkonitz</dc:creator>
      <dc:date>2013-04-16T13:23:15Z</dc:date>
    </item>
    <item>
      <title>Re: HA path monitoring in virtual wire</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ha-path-monitoring-in-virtual-wire/m-p/15278#M11228</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/u1/20444"&gt;pkonitz&lt;/A&gt;&lt;/P&gt;&lt;P&gt;BTW - Check the release notes of 5.0.4. You can create sub-interfaces in vWire mode. I think this is what you are looking for???&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote" modifiedtitle="true"&gt;
&lt;P data-canvas-width="59.263999999999996" data-font-name="g_font_p1_4" dir="ltr" style="font-size: 16px; font-family: serif;"&gt;Virtual Wire Subinterface &lt;/P&gt;
&lt;P data-canvas-width="8" data-font-name="g_font_p0_1" dir="ltr" style="font-size: 16px; font-family: serif;"&gt;–&lt;/P&gt;
&lt;P data-canvas-width="388.3216000000001" data-font-name="g_font_p0_1" dir="ltr" style="font-size: 16px; font-family: serif;"&gt;You can now create virtual wire subinterfaces in order to &lt;/P&gt;
&lt;P data-canvas-width="4.448" data-font-name="g_font_p0_1" dir="ltr" style="font-size: 16px; font-family: serif;"&gt;classify traffic into different zones and virtual systems. You can classify traffic according to the VLAN tag, or VLAN tag plus IP address (IP address, IP range, or subnet).&lt;/P&gt;
&lt;/PRE&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Apr 2013 14:55:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ha-path-monitoring-in-virtual-wire/m-p/15278#M11228</guid>
      <dc:creator>Sly_Cooper</dc:creator>
      <dc:date>2013-04-16T14:55:43Z</dc:date>
    </item>
    <item>
      <title>Re: HA path monitoring in virtual wire</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ha-path-monitoring-in-virtual-wire/m-p/15279#M11229</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;As I described in this post&lt;/P&gt;&lt;P&gt;&lt;A _jive_internal="true" data-containerid="2004" data-containertype="14" data-objectid="7403" data-objecttype="1" href="https://live.paloaltonetworks.com/thread/7403"&gt;https://live.paloaltonetworks.com/thread/7403&lt;/A&gt;&lt;/P&gt;&lt;P&gt;I've got this release installed, got subinterfaces configured and assigned them to different zones but traffic doesn't flow if the main intarface isn't assigned to zone as well. When it is, subinterfaces inherits this assignment form main interface and even though they're in different one I see in logs that traffic comes from the main zone. So I cant make a different policies per subinterfaces.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for sharing your experience &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://live.paloaltonetworks.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;P&gt;I think we should end this topic cause gmparis will be angry for all the notification he receives&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regards&lt;BR /&gt;Przemek&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 17 Apr 2013 06:38:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ha-path-monitoring-in-virtual-wire/m-p/15279#M11229</guid>
      <dc:creator>pkonitz</dc:creator>
      <dc:date>2013-04-17T06:38:00Z</dc:date>
    </item>
    <item>
      <title>Re: HA path monitoring in virtual wire</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ha-path-monitoring-in-virtual-wire/m-p/15280#M11230</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I had asked permission from &lt;A __default_attr="16048" __jive_macro_name="user" class="jive_macro jive_macro_user" data-objecttype="3" href="https://live.paloaltonetworks.com/"&gt;&lt;/A&gt; to use his thread so I hope he wont mind &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://live.paloaltonetworks.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;. Anyways I have submitted the change request to get the new config tested. If get approvals then I will get the config tested over the weekend. I will let you know the outcome.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 17 Apr 2013 08:24:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ha-path-monitoring-in-virtual-wire/m-p/15280#M11230</guid>
      <dc:creator>Sly_Cooper</dc:creator>
      <dc:date>2013-04-17T08:24:54Z</dc:date>
    </item>
    <item>
      <title>Re: HA path monitoring in virtual wire</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ha-path-monitoring-in-virtual-wire/m-p/15281#M11231</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;A __default_attr="20444" __jive_macro_name="user" class="jive_macro jive_macro_user" href="https://live.paloaltonetworks.com/"&gt;&lt;/A&gt;&amp;nbsp; - FYI&lt;/P&gt;&lt;P&gt;I successfully tested the new configuration and managed to configure path monitoring using additional link (L3) on PAN.&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote" modifiedtitle="true"&gt;
&lt;P&gt;- Connected additional interface from PAN to the internal switch&lt;/P&gt;
&lt;P&gt;- Configured L3 interface as part of the internal switch&lt;/P&gt;
&lt;P&gt;- Configured new zone and virtual router &lt;/P&gt;
&lt;P&gt;- Configured new L3 interface as part of new zone and virtual router. This is mainly to keep the ha monitor link separate. I called it ha-monitor&lt;/P&gt;
&lt;P&gt;- Configured Juniper firewalls with separate manage-ip for the untrust interface&lt;/P&gt;
&lt;P&gt;- Configure Path Monitoring -&amp;gt; Virtual Router and monitored destination as the untrust manage-ip of the firewall&lt;/P&gt;
&lt;P&gt;- Each PAN was configured to poll different manage-ip&amp;nbsp; of the connected Juniper firewalls&lt;/P&gt;
&lt;P&gt;- Removed "Preempt" from HA (Thank you very much for the suggestion&lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://live.paloaltonetworks.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;)&lt;/P&gt;
&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Failover and failback worked fine as expected and was tested by shutting down the firewall untrust port connected to the external switch. The separate manage-ip on Juniper firewalls and removing preempt made it work&lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://live.paloaltonetworks.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;. Now I have link monitoring and path monitoring configured for our environment.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 22 Apr 2013 09:42:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ha-path-monitoring-in-virtual-wire/m-p/15281#M11231</guid>
      <dc:creator>Sly_Cooper</dc:creator>
      <dc:date>2013-04-22T09:42:51Z</dc:date>
    </item>
    <item>
      <title>Re: HA path monitoring in virtual wire</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ha-path-monitoring-in-virtual-wire/m-p/15282#M11232</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi, I've an installation&amp;nbsp; similar to your scheme and I uses PA-3020&amp;nbsp; under&amp;nbsp; ASAs in A/A with 4 vwire. Active Active configuration and full state sync allow you to forget witch ASA is active passing traffic.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 22 Apr 2013 09:51:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ha-path-monitoring-in-virtual-wire/m-p/15282#M11232</guid>
      <dc:creator>NGS_SOC</dc:creator>
      <dc:date>2013-04-22T09:51:24Z</dc:date>
    </item>
    <item>
      <title>Re: HA path monitoring in virtual wire</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ha-path-monitoring-in-virtual-wire/m-p/15283#M11233</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hi,&lt;/P&gt;&lt;P&gt;thx for update &lt;SPAN __jive_emoticon_name="happy"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;nice to hear it worked. &lt;/P&gt;&lt;P&gt;I decided to go to L2 deployment cause in Wwire mode passive unit doesn't pass traffic at all so in my case (cisco ASA) hello packets&amp;nbsp; did not flow so failover on ASA was a bit problematic. However L2 with vlan retagging works as charm, what is more, when ASAs switchover it does't trigger PAN to failover so I see additional benefit in it &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://live.paloaltonetworks.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As NGS said active/active probably would solve all our issues but this is thing I want to avaid cause guys from PaloAlto suggested not going into A/A &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://live.paloaltonetworks.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 22 Apr 2013 10:08:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ha-path-monitoring-in-virtual-wire/m-p/15283#M11233</guid>
      <dc:creator>pkonitz</dc:creator>
      <dc:date>2013-04-22T10:08:39Z</dc:date>
    </item>
  </channel>
</rss>

