<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: VPN Fail Over in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-fail-over/m-p/576610#M115714</link>
    <description>&lt;P&gt;Hi everyone,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Tried the configuration&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/101029"&gt;@Abdul_Razaq&lt;/a&gt;&amp;nbsp; suggested, no luck.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Created two IPSec Tunnels:&amp;nbsp;&lt;/P&gt;
&lt;P&gt;IPSec Tunnel A: local IP x.x.x.x, peer IP y.y.y.y, tunnel interface tunnel.8&lt;/P&gt;
&lt;P&gt;IPSec Tunnel B:&amp;nbsp;local IP x.x.x.x, peer IP z.z.z.z,&amp;nbsp;tunnel interface tunnel.6&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Created tunnel monitor&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ipacek_1-1707395620495.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/57508i6983AF86A92476DA/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="ipacek_1-1707395620495.png" alt="ipacek_1-1707395620495.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;and tried assigning it on the primary IPSec Tunnel A but commit failed stating that:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;IPSec tunnel A enabled tunnel monitoring while binding to tunnel interface tunnel.8 which has no IPV4 address assigned to it yet.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;which is essentially true since there is no IP address assigned to tunnel.8 interface.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Any ideas how to solve this?&lt;/P&gt;</description>
    <pubDate>Thu, 08 Feb 2024 12:42:31 GMT</pubDate>
    <dc:creator>i.pacek</dc:creator>
    <dc:date>2024-02-08T12:42:31Z</dc:date>
    <item>
      <title>VPN Fail Over</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-fail-over/m-p/274270#M75127</link>
      <description>&lt;P&gt;Dear Team,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We Have PA Firewall With Single ISP and Peer End Sophos FW With Dual ISP.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here I need to configure VPN Fail over. What are the step i need done PA side?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Karthikeyan&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 02 Jul 2019 08:15:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-fail-over/m-p/274270#M75127</guid>
      <dc:creator>karthikeyanB</dc:creator>
      <dc:date>2019-07-02T08:15:00Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Fail Over</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-fail-over/m-p/274327#M75129</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/105432"&gt;@karthikeyanB&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You can configure 2 VPN tunnels with each of remote side ISP connecting IP as remote peer. Configure tunnel monitor on primary one then configure two routes to remote LAN through each of the VPN tunnel with lower metric on primary.&lt;/P&gt;&lt;P&gt;Configure proper security policy for both the connections.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So if primary VPN is down, as the tunnel monitor is configured, the route to remote LANwill be removed and new route with higher metric will be in action which will make the secondary tunnel UP.&lt;/P&gt;</description>
      <pubDate>Tue, 02 Jul 2019 13:00:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-fail-over/m-p/274327#M75129</guid>
      <dc:creator>Abdul_Razaq</dc:creator>
      <dc:date>2019-07-02T13:00:14Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Fail Over</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-fail-over/m-p/576610#M115714</link>
      <description>&lt;P&gt;Hi everyone,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Tried the configuration&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/101029"&gt;@Abdul_Razaq&lt;/a&gt;&amp;nbsp; suggested, no luck.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Created two IPSec Tunnels:&amp;nbsp;&lt;/P&gt;
&lt;P&gt;IPSec Tunnel A: local IP x.x.x.x, peer IP y.y.y.y, tunnel interface tunnel.8&lt;/P&gt;
&lt;P&gt;IPSec Tunnel B:&amp;nbsp;local IP x.x.x.x, peer IP z.z.z.z,&amp;nbsp;tunnel interface tunnel.6&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Created tunnel monitor&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ipacek_1-1707395620495.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/57508i6983AF86A92476DA/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="ipacek_1-1707395620495.png" alt="ipacek_1-1707395620495.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;and tried assigning it on the primary IPSec Tunnel A but commit failed stating that:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;IPSec tunnel A enabled tunnel monitoring while binding to tunnel interface tunnel.8 which has no IPV4 address assigned to it yet.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;which is essentially true since there is no IP address assigned to tunnel.8 interface.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Any ideas how to solve this?&lt;/P&gt;</description>
      <pubDate>Thu, 08 Feb 2024 12:42:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-fail-over/m-p/576610#M115714</guid>
      <dc:creator>i.pacek</dc:creator>
      <dc:date>2024-02-08T12:42:31Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Fail Over</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-fail-over/m-p/576686#M115736</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;I do this a different way using either Policy Based Routing or OSPF, even static routing will work. Build your two tunnels. Then do one of the following:&lt;/P&gt;
&lt;P&gt;1. Create a Policy Based Forward policy to send the traffic down one tunnel and check the box "Enforce Symetric Return' and Monitor.&lt;/P&gt;
&lt;P&gt;2. Setup OSPF and add a metric to the secondary tunnel of like 10000. then OSPF will direct the traffic the correct path that is up, etc.&lt;/P&gt;
&lt;P&gt;3. User static routes with path monitoring&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Thu, 08 Feb 2024 21:04:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-fail-over/m-p/576686#M115736</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2024-02-08T21:04:11Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Fail Over</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-fail-over/m-p/576696#M115743</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/105432"&gt;@karthikeyanB&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;You give the tunnel interface an IP address. You can just assign a /31 for this and ensure that you have the route and policy in place to allow that address to hit the destination IP that you've setup.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 08 Feb 2024 21:28:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-fail-over/m-p/576696#M115743</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2024-02-08T21:28:27Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Fail Over</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-fail-over/m-p/1233767#M124740</link>
      <description>&lt;P&gt;Hi Sir,&lt;/P&gt;
&lt;P&gt;I have two pbf rules for each tunnel. And I have applied tunnel monitor on both rules. But I am unable to make it work. Though tunnel shows up, traffic stops flowing erratically.&lt;/P&gt;
&lt;P&gt;I'm unsure of the correct configuration to use. Please help me.&lt;/P&gt;</description>
      <pubDate>Thu, 10 Jul 2025 23:07:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-fail-over/m-p/1233767#M124740</guid>
      <dc:creator>msdphi</dc:creator>
      <dc:date>2025-07-10T23:07:45Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Fail Over</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-fail-over/m-p/1233831#M124747</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;Definitely sounds like a routing issue. Do you have&amp;nbsp;&lt;SPAN&gt;&amp;nbsp;"Enforce Symetric Return" enabled?&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Regards,&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 11 Jul 2025 15:03:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-fail-over/m-p/1233831#M124747</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2025-07-11T15:03:27Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Fail Over</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-fail-over/m-p/1233845#M124749</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/105432"&gt;@karthikeyanB&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;
&lt;P&gt;Dear Team,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We Have PA Firewall With Single ISP and Peer End Sophos FW With Dual ISP.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Here I need to configure VPN Fail over. What are the step i need done PA side?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;Karthikeyan&amp;nbsp;&lt;/P&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/105432"&gt;@karthikeyanB&lt;/a&gt;,&lt;BR /&gt;To configure VPN failover on the PA firewall with a single ISP:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;Use Tunnel Monitoring or Static Route Path Monitoring&lt;BR /&gt;- Create two IPSec tunnels (Primary and Secondary) to the Sophos FW. &lt;BR /&gt;- Assign each tunnel a unique tunnel interface (e.g., `tunnel.1`, `tunnel.2`). &lt;BR /&gt;- Enable Tunnel Monitoring on the primary tunnel with action set to Fail Over. &lt;BR /&gt;- Alternatively, configure Static Route Path Monitoring to detect tunnel failure and switch routes.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;Set Static Routes with Metrics&lt;BR /&gt;- Route traffic via `tunnel.1` with lower metric (e.g., 10). &lt;BR /&gt;- Add backup route via `tunnel.2` with higher metric (e.g., 20).&lt;/P&gt;
&lt;P&gt;Ensure both tunnel interfaces are in the same security zone and monitor IPs are reachable through the VPN. &lt;BR /&gt;More details: Palo Alto VPN Failover Guide.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Best Regards,&lt;BR /&gt;James Henry&lt;/P&gt;</description>
      <pubDate>Sat, 12 Jul 2025 04:45:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-fail-over/m-p/1233845#M124749</guid>
      <dc:creator>james698henry</dc:creator>
      <dc:date>2025-07-12T04:45:59Z</dc:date>
    </item>
  </channel>
</rss>

