<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: 2xISPs and 2 VPN tunnels - tunnel failover issue in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/2xisps-and-2-vpn-tunnels-tunnel-failover-issue/m-p/574957#M115527</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/27580"&gt;@OtakarKlier&lt;/a&gt;&amp;nbsp;from our side and from remote side they do terminate on a very same device. We just have two tunnels going over 2 ISPs for a redundancy purposes.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 30 Jan 2024 17:08:53 GMT</pubDate>
    <dc:creator>Andreikin</dc:creator>
    <dc:date>2024-01-30T17:08:53Z</dc:date>
    <item>
      <title>2xISPs and 2 VPN tunnels - tunnel failover issue</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/2xisps-and-2-vpn-tunnels-tunnel-failover-issue/m-p/574663#M115492</link>
      <description>&lt;P&gt;Hello Team,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am running into an issue with our setup. We have single PA460 box connected to 2 ISPs same time, i.e. Ethernet1/3 is to ISP1 and Ethernet1/4 to ISP2. We are running 2 default routes setup like this with ECMP enabled, so traffic is been load-balanced betwen 2&lt;/P&gt;
&lt;P&gt;ISPs with a hash based on source. We also have 'strict source path' option enabled in ECMP settings. Both default routes have monitor enabled, so if for example Google DNS IP is not reachable over this ISP, it will be removed from routing table. On top of that we are running 2 VPN tunnels from this box, each of those using one of the physical interface IP address bellow as source. Both VPN tunnels are been terminated on the same remote Public IP.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-left" image-alt="default_routes.jpg" style="width: 617px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/56903i341ED1A0F465C1FC/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="default_routes.jpg" alt="default_routes.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;When 2 ISPs are running normally and traffic is going through those, with 'strict source path' option we have VPN tunnel traffic bound to the same VPN tunnels they are sourced from. So encrypted traffic for VPN1 is always going out through Etherent1/3 and encrypted traffic for VPN2 is going through Ethernet1/4.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;But, for example, if ISP1 is DOWN, we see that default route through ISP1 via Ethernet1/3 is down and removed from routing table, which is expected. What we did not expect is we see in traffic captures that Palo appliance is trying to bring up VPN1 through Ethernet1/4, while still using public IP of Ethernet1/3. That VPN is not obviously coming up as public IP of Ethernet1/3 is not reachable externally any longer, but an actual behavior is concerning and in few corner cases might lead to a weird case that VPN1 will be established using Ethernet1/4 as egress interface. I've tried to use VPN monitoring profile with 'wait-recover' option, but it seems to lead to the same issue.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is there any hints or pointers you can give me in this situation and how to avoid it?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 28 Jan 2024 18:34:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/2xisps-and-2-vpn-tunnels-tunnel-failover-issue/m-p/574663#M115492</guid>
      <dc:creator>Andreikin</dc:creator>
      <dc:date>2024-01-28T18:34:30Z</dc:date>
    </item>
    <item>
      <title>Re: 2xISPs and 2 VPN tunnels - tunnel failover issue</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/2xisps-and-2-vpn-tunnels-tunnel-failover-issue/m-p/574956#M115526</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;Do the VPN tunnels terminate at the same endpoint device, on the other end?&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Tue, 30 Jan 2024 17:03:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/2xisps-and-2-vpn-tunnels-tunnel-failover-issue/m-p/574956#M115526</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2024-01-30T17:03:57Z</dc:date>
    </item>
    <item>
      <title>Re: 2xISPs and 2 VPN tunnels - tunnel failover issue</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/2xisps-and-2-vpn-tunnels-tunnel-failover-issue/m-p/574957#M115527</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/27580"&gt;@OtakarKlier&lt;/a&gt;&amp;nbsp;from our side and from remote side they do terminate on a very same device. We just have two tunnels going over 2 ISPs for a redundancy purposes.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 30 Jan 2024 17:08:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/2xisps-and-2-vpn-tunnels-tunnel-failover-issue/m-p/574957#M115527</guid>
      <dc:creator>Andreikin</dc:creator>
      <dc:date>2024-01-30T17:08:53Z</dc:date>
    </item>
    <item>
      <title>Re: 2xISPs and 2 VPN tunnels - tunnel failover issue</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/2xisps-and-2-vpn-tunnels-tunnel-failover-issue/m-p/574960#M115528</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;I'm gonna guess that this is because of the default routes and IPSec tunnel config. The tunnel is trying to use the IP of the down interface via the up interface. Cant think of a way to prevent the IPSec tunnel with IP of the down interface to not use the up interface etc. I dont run ECMP so cant say I've run into this. I usually just use OSPF routing for the tunnels and for the ISP use Policy Based Forwarding to prefer one over the other, so just failover.&lt;/P&gt;
&lt;P&gt;Hopefully someone else can jump in and share their thoughts.&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/7608"&gt;@reaper&lt;/a&gt;&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/70130"&gt;@aleksandar.astardzhiev&lt;/a&gt;&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/77347"&gt;@TomYoung&lt;/a&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 30 Jan 2024 17:19:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/2xisps-and-2-vpn-tunnels-tunnel-failover-issue/m-p/574960#M115528</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2024-01-30T17:19:58Z</dc:date>
    </item>
    <item>
      <title>Re: 2xISPs and 2 VPN tunnels - tunnel failover issue</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/2xisps-and-2-vpn-tunnels-tunnel-failover-issue/m-p/574964#M115529</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/27580"&gt;@OtakarKlier&lt;/a&gt;&amp;nbsp;yes, that happens indeed because of the fact, that 'strict source path' thingie only works when you have ECMP in effect, which is when you have at least 2 routes to the same destination and same metric. When one of the ISPs is down, than 'strict source path' is no longer in effect I guess.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;But to your answer, can you elaborate what are you using PBF for? AFAIK you can only force traffic THROUGH firewall to be affected by PBF and not traffic source/destined to it.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 30 Jan 2024 17:24:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/2xisps-and-2-vpn-tunnels-tunnel-failover-issue/m-p/574964#M115529</guid>
      <dc:creator>Andreikin</dc:creator>
      <dc:date>2024-01-30T17:24:46Z</dc:date>
    </item>
    <item>
      <title>Re: 2xISPs and 2 VPN tunnels - tunnel failover issue</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/2xisps-and-2-vpn-tunnels-tunnel-failover-issue/m-p/574968#M115530</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;Policy based forwarding take effect prior to the virtual router. So in my scenario I use Policy Based forwarding to send 'default' traffic via the preferred ISP with a Monitor so if the interface/path goes down the PDF policy is disabled and then traffic follows the virtual router and that 'default' path is ISP B.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hope that makes sense.&lt;/P&gt;</description>
      <pubDate>Tue, 30 Jan 2024 17:33:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/2xisps-and-2-vpn-tunnels-tunnel-failover-issue/m-p/574968#M115530</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2024-01-30T17:33:47Z</dc:date>
    </item>
    <item>
      <title>Re: 2xISPs and 2 VPN tunnels - tunnel failover issue</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/2xisps-and-2-vpn-tunnels-tunnel-failover-issue/m-p/574971#M115531</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/27580"&gt;@OtakarKlier&lt;/a&gt;&amp;nbsp;yes, that's the difference - I am trying to do something with traffic sourced from one of the interfaces of firewall, while PBF for such scenario will not work unfortunately&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 30 Jan 2024 17:40:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/2xisps-and-2-vpn-tunnels-tunnel-failover-issue/m-p/574971#M115531</guid>
      <dc:creator>Andreikin</dc:creator>
      <dc:date>2024-01-30T17:40:33Z</dc:date>
    </item>
    <item>
      <title>Re: 2xISPs and 2 VPN tunnels - tunnel failover issue</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/2xisps-and-2-vpn-tunnels-tunnel-failover-issue/m-p/574976#M115532</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;I havent tested is, but I think you can since you can select the source IP (external VPN IP) and then setup the forwarder?&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="OtakarKlier_0-1706636607290.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/56967i72D87D3E1A7B79BE/image-size/medium?v=v2&amp;amp;px=400" role="button" title="OtakarKlier_0-1706636607290.png" alt="OtakarKlier_0-1706636607290.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="OtakarKlier_1-1706636629979.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/56968i764A0416C11DA77D/image-size/medium?v=v2&amp;amp;px=400" role="button" title="OtakarKlier_1-1706636629979.png" alt="OtakarKlier_1-1706636629979.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Just a thought to test?&lt;/P&gt;</description>
      <pubDate>Tue, 30 Jan 2024 17:43:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/2xisps-and-2-vpn-tunnels-tunnel-failover-issue/m-p/574976#M115532</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2024-01-30T17:43:58Z</dc:date>
    </item>
    <item>
      <title>Re: 2xISPs and 2 VPN tunnels - tunnel failover issue</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/2xisps-and-2-vpn-tunnels-tunnel-failover-issue/m-p/574978#M115533</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/27580"&gt;@OtakarKlier&lt;/a&gt;&amp;nbsp;Hi, according to this document it won't work for IPSEC tunnels:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClbDCAS" target="_blank"&gt;Policy-based forwarding doesn't work for traffic sourced from t... - Knowledge Base - Palo Alto Networks&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 30 Jan 2024 17:46:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/2xisps-and-2-vpn-tunnels-tunnel-failover-issue/m-p/574978#M115533</guid>
      <dc:creator>Andreikin</dc:creator>
      <dc:date>2024-01-30T17:46:46Z</dc:date>
    </item>
    <item>
      <title>Re: 2xISPs and 2 VPN tunnels - tunnel failover issue</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/2xisps-and-2-vpn-tunnels-tunnel-failover-issue/m-p/574982#M115534</link>
      <description>&lt;P&gt;Sorry I couldnt be more help.&lt;/P&gt;</description>
      <pubDate>Tue, 30 Jan 2024 17:56:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/2xisps-and-2-vpn-tunnels-tunnel-failover-issue/m-p/574982#M115534</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2024-01-30T17:56:52Z</dc:date>
    </item>
    <item>
      <title>Re: 2xISPs and 2 VPN tunnels - tunnel failover issue</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/2xisps-and-2-vpn-tunnels-tunnel-failover-issue/m-p/575068#M115542</link>
      <description>&lt;P&gt;i think this is expected behavior in this design&lt;/P&gt;
&lt;P&gt;without ECMP the system relies on regular routing to decide which interface packets need to egress out of, so in case of an ISP outage ECMP will no longer be able to 'force' the egress interface&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;in cases where tunnel redundancy is most important, I usually create 2 Virtual routers and attach each ISP to it's own VR. that ensures both tunnels are up and running without any (potential) conflicts&lt;/P&gt;
&lt;P&gt;I can then use PBF and regular routing to control where client traffic is sent and failover where needed&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 31 Jan 2024 09:55:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/2xisps-and-2-vpn-tunnels-tunnel-failover-issue/m-p/575068#M115542</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2024-01-31T09:55:32Z</dc:date>
    </item>
    <item>
      <title>Re: 2xISPs and 2 VPN tunnels - tunnel failover issue</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/2xisps-and-2-vpn-tunnels-tunnel-failover-issue/m-p/577053#M115818</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/27580"&gt;@OtakarKlier&lt;/a&gt; and &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/206623"&gt;@Andreikin&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Sorry for the late reply!&amp;nbsp; The original design is good.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I would create specific security policy rules (both ways) to block traffic from one public IP to egress on the other interface.&amp;nbsp; It sounds like both ISPs are in the same zone, and the traffic is allowed via the intrazone-default rule.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Tom&lt;/P&gt;</description>
      <pubDate>Mon, 12 Feb 2024 19:14:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/2xisps-and-2-vpn-tunnels-tunnel-failover-issue/m-p/577053#M115818</guid>
      <dc:creator>TomYoung</dc:creator>
      <dc:date>2024-02-12T19:14:59Z</dc:date>
    </item>
  </channel>
</rss>

