<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ECMP,  interface, zone and security policy question in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ecmp-interface-zone-and-security-policy-question/m-p/576572#M115709</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/1308488747"&gt;@Songphon-Gzy&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;if you're looking for the tunnel failover, you can use monitoring profile to failover traffic to the backup tunnel interface.&lt;/P&gt;
&lt;P&gt;There are two ways to configure it -&lt;/P&gt;
&lt;P&gt;1. Use of monitor profile and attach it to IPSEC tunnel&lt;/P&gt;
&lt;P&gt;2. Use of monitoring on static routes. In this case, you will have two routes to same tunnel destinations with different metric. Primary route will have monitoring enabled. If monitor fails, primary route will be removed from forwarding table and secondary route will be used.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In both cases, you need to monitor the one of the server for ICMP requests. If response to that server fails, monitoring will be down, and required actions will be in place.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Below reference articles will give you more idea about this.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000POO0CAO" target="_blank"&gt;Dual ISP VPN site to site Tunnel Failover with Static Route Pat... - Knowledge Base - Palo Alto Networks&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/network-security/ipsec-vpn/administration/set-up-tunnel-monitoring/define-a-tunnel-monitoring-profile" target="_blank"&gt;Define a Tunnel Monitoring Profile (paloaltonetworks.com)&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClFiCAK" target="_blank"&gt;How to Configure a Palo Alto Networks Firewall with Dual ISPs a... - Knowledge Base - Palo Alto Networks&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hope it helps!&lt;/P&gt;</description>
    <pubDate>Thu, 08 Feb 2024 07:34:38 GMT</pubDate>
    <dc:creator>SutareMayur</dc:creator>
    <dc:date>2024-02-08T07:34:38Z</dc:date>
    <item>
      <title>ECMP,  interface, zone and security policy question</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ecmp-interface-zone-and-security-policy-question/m-p/576570#M115708</link>
      <description>&lt;P&gt;Hi guys&lt;/P&gt;
&lt;P&gt;I am quite new to Palo Alto NGFW. We have on-prem PA-32xx on 11.0.3.&lt;/P&gt;
&lt;P&gt;I am having trouble with static route ECMP for redundant IPSEC tunnels to AWS.&lt;/P&gt;
&lt;P&gt;Previous guy configure both tunnel in different zone (lets say AWS1 zone and AWS2 zone) and then configure bunch of PBFs.&lt;/P&gt;
&lt;P&gt;Then when the return path is changed, traffic will get dropped and I need to change PBF to another tunnel instead.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Are there anyway to made ECMP work with security policy? (or how to make both tunnels work in this scenario without manual with PBF)&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;I am thinking of putting 2 tunnel interfaces into same zone. I don't know if that is enough or another configure is needed.&lt;/P&gt;
&lt;P&gt;I try to search for guide but so far mostly talking about networking aspect, not the policy and zone stuff.&lt;/P&gt;</description>
      <pubDate>Thu, 08 Feb 2024 07:07:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ecmp-interface-zone-and-security-policy-question/m-p/576570#M115708</guid>
      <dc:creator>Songphon-Gzy</dc:creator>
      <dc:date>2024-02-08T07:07:41Z</dc:date>
    </item>
    <item>
      <title>Re: ECMP,  interface, zone and security policy question</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ecmp-interface-zone-and-security-policy-question/m-p/576572#M115709</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/1308488747"&gt;@Songphon-Gzy&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;if you're looking for the tunnel failover, you can use monitoring profile to failover traffic to the backup tunnel interface.&lt;/P&gt;
&lt;P&gt;There are two ways to configure it -&lt;/P&gt;
&lt;P&gt;1. Use of monitor profile and attach it to IPSEC tunnel&lt;/P&gt;
&lt;P&gt;2. Use of monitoring on static routes. In this case, you will have two routes to same tunnel destinations with different metric. Primary route will have monitoring enabled. If monitor fails, primary route will be removed from forwarding table and secondary route will be used.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In both cases, you need to monitor the one of the server for ICMP requests. If response to that server fails, monitoring will be down, and required actions will be in place.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Below reference articles will give you more idea about this.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000POO0CAO" target="_blank"&gt;Dual ISP VPN site to site Tunnel Failover with Static Route Pat... - Knowledge Base - Palo Alto Networks&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/network-security/ipsec-vpn/administration/set-up-tunnel-monitoring/define-a-tunnel-monitoring-profile" target="_blank"&gt;Define a Tunnel Monitoring Profile (paloaltonetworks.com)&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClFiCAK" target="_blank"&gt;How to Configure a Palo Alto Networks Firewall with Dual ISPs a... - Knowledge Base - Palo Alto Networks&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hope it helps!&lt;/P&gt;</description>
      <pubDate>Thu, 08 Feb 2024 07:34:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ecmp-interface-zone-and-security-policy-question/m-p/576572#M115709</guid>
      <dc:creator>SutareMayur</dc:creator>
      <dc:date>2024-02-08T07:34:38Z</dc:date>
    </item>
    <item>
      <title>Re: ECMP,  interface, zone and security policy question</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ecmp-interface-zone-and-security-policy-question/m-p/576691#M115738</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;For your policy based routing, make sure the Monitor is enabled as well as Enforce Symmetric return. The for the secondary tunnel, just add a static route in the virtual router. The Policy base forward rules take effect prior to the virtual router so the policy when enabled will always be preferred. If it goes down due to the monitor, the PAN will disable the policy and the static route takes over.&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Thu, 08 Feb 2024 21:12:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ecmp-interface-zone-and-security-policy-question/m-p/576691#M115738</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2024-02-08T21:12:53Z</dc:date>
    </item>
  </channel>
</rss>

