<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Policy-Based IPsec VPN Failover in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/policy-based-ipsec-vpn-failover/m-p/562995#M114036</link>
    <description>&lt;P&gt;, static routes are setup. i'll check and configure that. How would I go about setting traffic to go thru both tunnels&lt;/P&gt;</description>
    <pubDate>Tue, 24 Oct 2023 20:31:28 GMT</pubDate>
    <dc:creator>UmarKhan</dc:creator>
    <dc:date>2023-10-24T20:31:28Z</dc:date>
    <item>
      <title>Policy-Based IPsec VPN Failover</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/policy-based-ipsec-vpn-failover/m-p/509889#M106136</link>
      <description>&lt;P&gt;Hello everyone,&lt;/P&gt;
&lt;P&gt;I have a case, where we have configured two site-to-site VPN connections to our partner's primary and backup datacenters. Both tunnels are policy-based IPsec VPNs with Proxy-IDs configured and both use the same local/remote inner IP addresses. This is a single ISP/single virtual router environment.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For example this is a sample config of two Proxy-IDs in one tunnel:&lt;/P&gt;
&lt;UL class="lia-list-style-type-disc"&gt;
&lt;LI&gt;172.16.2.2 (real private IP) NATed to 172.29.2.2 used as local and 200.0.0.2 remote.&lt;/LI&gt;
&lt;LI&gt;172.16.2.3 (real private IP) NATed to 172.29.2.3 used as local and 200.0.0.3 remote.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Now exact same proxy ID configuration is present in second tunnel as well. My question is, how do we make &lt;STRONG&gt;tunnel1&lt;/STRONG&gt;&amp;nbsp;preferred egress point for outgoing packet flow and how do we implement failover to &lt;STRONG&gt;tunnel2&lt;/STRONG&gt;, in case &lt;STRONG&gt;tunnel1:proxyid&lt;/STRONG&gt; sub-tunnels go down?&lt;/P&gt;
&lt;P&gt;I can't use any routing solutions or tunnel monitor as it's a policy-based VPN. There are no routes regarding those remote networks and also tunnels have no IP addresses configured for themselves.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;ADD: Maybe there is&amp;nbsp;a mechanism in PAN-OS similar to &lt;EM&gt;reverse-route&lt;/EM&gt; in IOS, that can inject routes based on proxy IDs? That could solve the problem with variable AD or metric per route injection.&lt;/P&gt;</description>
      <pubDate>Tue, 26 Jul 2022 09:17:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/policy-based-ipsec-vpn-failover/m-p/509889#M106136</guid>
      <dc:creator>Flang3r</dc:creator>
      <dc:date>2022-07-26T09:17:15Z</dc:date>
    </item>
    <item>
      <title>Re: Policy-Based IPsec VPN Failover</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/policy-based-ipsec-vpn-failover/m-p/510071#M106163</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;I would use metrics on the routes. Make the less preferred route metric 10000. This way the traffic will follow the preferred tunnel unless its down then take the less preferred tunnel.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Wed, 27 Jul 2022 17:57:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/policy-based-ipsec-vpn-failover/m-p/510071#M106163</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2022-07-27T17:57:52Z</dc:date>
    </item>
    <item>
      <title>Re: Policy-Based IPsec VPN Failover</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/policy-based-ipsec-vpn-failover/m-p/510259#M106181</link>
      <description>&lt;P&gt;Thank you for the reply. Currently I have no routes associated with these connections. That's why I was wondering if there is anything like &lt;EM&gt;reverse-route&lt;/EM&gt; from Cisco world, to inject static routes from P2 selectors (ACLs in that case) that can be manipulated with metrics etc. If not, what is the correct way to apply a static route over policy-based tunnel in PAN-OS? As tunnel itself has no IP address, I assume egress interface should be used as a next hop. Each configured Proxy ID is represented as a sub-tunnel with naming of &lt;STRONG&gt;IPsec_Tunnel_Name:ProxyID_Name&lt;/STRONG&gt;, that is not visible in PAN-OS web management. Can static routes be pointed to just an "outer" IPsec tunnel name?&lt;/P&gt;</description>
      <pubDate>Fri, 29 Jul 2022 07:43:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/policy-based-ipsec-vpn-failover/m-p/510259#M106181</guid>
      <dc:creator>Flang3r</dc:creator>
      <dc:date>2022-07-29T07:43:46Z</dc:date>
    </item>
    <item>
      <title>Re: Policy-Based IPsec VPN Failover</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/policy-based-ipsec-vpn-failover/m-p/510276#M106183</link>
      <description>&lt;P&gt;You must redirect IPSec traffic throught to tunnel with staticly or PBF metod. Static routing with different metrics should be work.&lt;/P&gt;
&lt;P&gt;But if you want to use PBF with &lt;SPAN&gt;tunnel monitor profile which monitoring remote Phase-2 site IP, you should use&amp;nbsp;different zone between IPSec tunnels.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Check this kb for dual redundant IPSec,&lt;/P&gt;
&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000POO0CAO" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000POO0CAO&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 29 Jul 2022 09:45:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/policy-based-ipsec-vpn-failover/m-p/510276#M106183</guid>
      <dc:creator>YEmreSeven</dc:creator>
      <dc:date>2022-07-29T09:45:37Z</dc:date>
    </item>
    <item>
      <title>Re: Policy-Based IPsec VPN Failover</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/policy-based-ipsec-vpn-failover/m-p/510317#M106189</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;You will need routes to send traffic down the tunnel.&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Fri, 29 Jul 2022 18:32:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/policy-based-ipsec-vpn-failover/m-p/510317#M106189</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2022-07-29T18:32:07Z</dc:date>
    </item>
    <item>
      <title>Re: Policy-Based IPsec VPN Failover</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/policy-based-ipsec-vpn-failover/m-p/510549#M106217</link>
      <description>&lt;P&gt;Thank you for your input.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I've added static routes and traffic flows correctly. Looks like once static route points to tunnel interface associated with policy based IPsec tunnel, then traffic correctly flows through appropriate proxy ID sub-tunnels based on destination prefix. ICMP is successful and packet encaps/decaps increase accordingly.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;However my problem with failover still persists.&amp;nbsp;If primary IPsec tunnel goes down, static routes are not withdrawn from routing table and traffic effectively gets blackholed. Since "outer" associated tunnel has no IP address, I'm unable to configure tunnel monitoring or path monitoring for static routes. There is no source IP address available to source ICMP from.&lt;/P&gt;</description>
      <pubDate>Tue, 02 Aug 2022 10:14:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/policy-based-ipsec-vpn-failover/m-p/510549#M106217</guid>
      <dc:creator>Flang3r</dc:creator>
      <dc:date>2022-08-02T10:14:28Z</dc:date>
    </item>
    <item>
      <title>Re: Policy-Based IPsec VPN Failover</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/policy-based-ipsec-vpn-failover/m-p/562300#M113893</link>
      <description>&lt;P&gt;I am also facing this exact issue. were you able to resolve it?&lt;/P&gt;</description>
      <pubDate>Wed, 18 Oct 2023 17:50:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/policy-based-ipsec-vpn-failover/m-p/562300#M113893</guid>
      <dc:creator>UmarKhan</dc:creator>
      <dc:date>2023-10-18T17:50:42Z</dc:date>
    </item>
    <item>
      <title>Re: Policy-Based IPsec VPN Failover</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/policy-based-ipsec-vpn-failover/m-p/562302#M113894</link>
      <description>&lt;P&gt;&lt;SPAN&gt;I am also facing this exact issue. were you able to resolve it?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 18 Oct 2023 17:51:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/policy-based-ipsec-vpn-failover/m-p/562302#M113894</guid>
      <dc:creator>UmarKhan</dc:creator>
      <dc:date>2023-10-18T17:51:00Z</dc:date>
    </item>
    <item>
      <title>Re: Policy-Based IPsec VPN Failover</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/policy-based-ipsec-vpn-failover/m-p/562670#M113965</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;Have you tried to use policy based forwarding or weighted routes?&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Sun, 22 Oct 2023 16:57:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/policy-based-ipsec-vpn-failover/m-p/562670#M113965</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2023-10-22T16:57:26Z</dc:date>
    </item>
    <item>
      <title>Re: Policy-Based IPsec VPN Failover</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/policy-based-ipsec-vpn-failover/m-p/562989#M114030</link>
      <description>&lt;P&gt;We just setup the same sort of thing on two IPSEC tunnels into Azure and used TUNNEL MONITOR after assigning IP addresses to the tunnels so we could evaluate their state. Is there any reason you can't put IP addresses on the tunnel? (I should add when we had one IPSEC tunnel we did NOT the IP addresses assigned or tunnel monitor in use so this was needed.)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Additonal routes for the tunnels were also necessary and as others mentioned with the metric higher on one than another tunnel.&lt;/P&gt;</description>
      <pubDate>Tue, 24 Oct 2023 20:13:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/policy-based-ipsec-vpn-failover/m-p/562989#M114030</guid>
      <dc:creator>TonyDeHart</dc:creator>
      <dc:date>2023-10-24T20:13:58Z</dc:date>
    </item>
    <item>
      <title>Re: Policy-Based IPsec VPN Failover</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/policy-based-ipsec-vpn-failover/m-p/562990#M114031</link>
      <description>&lt;P&gt;I do have tunnel interface ip assigned. When I do 2 static routes, A with higher metric and B with lower, when A fails, it doesn't automatically go to B and still tries to send traffic via A&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 24 Oct 2023 20:16:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/policy-based-ipsec-vpn-failover/m-p/562990#M114031</guid>
      <dc:creator>UmarKhan</dc:creator>
      <dc:date>2023-10-24T20:16:35Z</dc:date>
    </item>
    <item>
      <title>Re: Policy-Based IPsec VPN Failover</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/policy-based-ipsec-vpn-failover/m-p/562992#M114033</link>
      <description>&lt;P&gt;Do you have tunnel monitoring on? I think that might be the behavior without it where it may not know NOT to send the tunnel traffic that direction on the downed link.&lt;/P&gt;</description>
      <pubDate>Tue, 24 Oct 2023 20:20:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/policy-based-ipsec-vpn-failover/m-p/562992#M114033</guid>
      <dc:creator>TonyDeHart</dc:creator>
      <dc:date>2023-10-24T20:20:36Z</dc:date>
    </item>
    <item>
      <title>Re: Policy-Based IPsec VPN Failover</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/policy-based-ipsec-vpn-failover/m-p/562993#M114034</link>
      <description>&lt;P&gt;I did have tunnel monitoring, but when I connect it to the tunnel, I see tunnel interface status go down&lt;/P&gt;</description>
      <pubDate>Tue, 24 Oct 2023 20:21:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/policy-based-ipsec-vpn-failover/m-p/562993#M114034</guid>
      <dc:creator>UmarKhan</dc:creator>
      <dc:date>2023-10-24T20:21:40Z</dc:date>
    </item>
    <item>
      <title>Re: Policy-Based IPsec VPN Failover</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/policy-based-ipsec-vpn-failover/m-p/562994#M114035</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;How are your routes setup, static? If yes, do you have 'Path Monitoring' enabled and setup? This is what would remove the route from the routing table, not the tunnel monitor, etc.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Failure Condition&lt;BR /&gt;Select the condition under which the firewall considers the monitored path down and thus the static route down:&lt;BR /&gt;&lt;BR /&gt;&lt;EM&gt;Any—If any one of the monitored destinations for the static route is unreachable by ICMP, the firewall removes the static route from the RIB and FIB and adds the dynamic or static route that has the next lowest metric going to the same destination to the FIB.&lt;/EM&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;EM&gt;All—If all of the monitored destinations for the static route are unreachable by ICMP, the firewall removes the static route from the RIB and FIB and adds the dynamic or static route that has the next lowest metric going to the same destination to the FIB.&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Select All to avoid the possibility of a single monitored destination signaling a static route failure when that monitored destination is simply offline for maintenance, for example.&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Tue, 24 Oct 2023 20:24:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/policy-based-ipsec-vpn-failover/m-p/562994#M114035</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2023-10-24T20:24:59Z</dc:date>
    </item>
    <item>
      <title>Re: Policy-Based IPsec VPN Failover</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/policy-based-ipsec-vpn-failover/m-p/562995#M114036</link>
      <description>&lt;P&gt;, static routes are setup. i'll check and configure that. How would I go about setting traffic to go thru both tunnels&lt;/P&gt;</description>
      <pubDate>Tue, 24 Oct 2023 20:31:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/policy-based-ipsec-vpn-failover/m-p/562995#M114036</guid>
      <dc:creator>UmarKhan</dc:creator>
      <dc:date>2023-10-24T20:31:28Z</dc:date>
    </item>
    <item>
      <title>Re: Policy-Based IPsec VPN Failover</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/policy-based-ipsec-vpn-failover/m-p/562998#M114037</link>
      <description>&lt;P&gt;I use path monitoring on our ISP connectivity but for the record I do NOT have path monitoring for our IPSEC tunnel connections just the tunnel monitors. In testing, it fails over w/o any trouble.&lt;/P&gt;</description>
      <pubDate>Tue, 24 Oct 2023 20:35:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/policy-based-ipsec-vpn-failover/m-p/562998#M114037</guid>
      <dc:creator>TonyDeHart</dc:creator>
      <dc:date>2023-10-24T20:35:58Z</dc:date>
    </item>
  </channel>
</rss>

