<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: AWS Tunnels Down when We make a Failover in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/aws-tunnels-down-when-we-make-a-failover/m-p/1224295#M123716</link>
    <description>&lt;P&gt;So while it is possible to create a localhost server profile to trigger the API, operational commands do not work with Xpath. You need a separate server profile for each s2s VPN you want to "test" to bring it back up with the name of that gateway as a value. It is not ideal. Theoretically, you could script a query via config commands to show all the gateways, create an array, then send an op command to the APIT for each gateway. That way you are not adding or removing server profiles for each s2s.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 20 Mar 2025 12:31:47 GMT</pubDate>
    <dc:creator>Eric_B</dc:creator>
    <dc:date>2025-03-20T12:31:47Z</dc:date>
    <item>
      <title>AWS Tunnels Down when We make a Failover</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/aws-tunnels-down-when-we-make-a-failover/m-p/460133#M102036</link>
      <description>&lt;P&gt;Hello everyone,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have observed that when a failover occurs on an active/passive cluster the IPSEC tunnels to AWS all go down and take a time to recover.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have verified that the traffic goes down and does not communicate for a time of about 5-10 minutes.&lt;/P&gt;&lt;P&gt;Has anyone else seen this problem and do you know how I can fix it?&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;I would also like to comment that the tunnels are 2 by 2 with PBF and failover next hop created to not have problems of asymmetries.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;</description>
      <pubDate>Fri, 21 Jan 2022 10:51:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/aws-tunnels-down-when-we-make-a-failover/m-p/460133#M102036</guid>
      <dc:creator>Alpalo</dc:creator>
      <dc:date>2022-01-21T10:51:01Z</dc:date>
    </item>
    <item>
      <title>Re: AWS Tunnels Down when We make a Failover</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/aws-tunnels-down-when-we-make-a-failover/m-p/463848#M102425</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/192671"&gt;@Alpalo&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Normally HA2 link is used to sync IPSEC SAs from Active to Passive firewall. Can you check if passive firewalls are having IPSEC SAs synced ?&lt;/P&gt;
&lt;P&gt;Also I would recommend you to verify traffic as well as system logs related to the tunnel traffic to see if you are seeing any unwanted logs there.&lt;/P&gt;</description>
      <pubDate>Mon, 07 Feb 2022 14:51:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/aws-tunnels-down-when-we-make-a-failover/m-p/463848#M102425</guid>
      <dc:creator>SutareMayur</dc:creator>
      <dc:date>2022-02-07T14:51:24Z</dc:date>
    </item>
    <item>
      <title>Re: AWS Tunnels Down when We make a Failover</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/aws-tunnels-down-when-we-make-a-failover/m-p/468550#M102859</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;We see the same thing.&lt;/P&gt;&lt;P&gt;If you configure tunnel monitoring - that seems to bring up the tunnel(s) again quickly. But they will disconnect - in our case approx. 60 seconds after failover.&lt;/P&gt;&lt;P&gt;BR,&lt;/P&gt;&lt;P&gt;Morten&lt;/P&gt;</description>
      <pubDate>Fri, 25 Feb 2022 10:26:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/aws-tunnels-down-when-we-make-a-failover/m-p/468550#M102859</guid>
      <dc:creator>MortenAug</dc:creator>
      <dc:date>2022-02-25T10:26:35Z</dc:date>
    </item>
    <item>
      <title>Re: AWS Tunnels Down when We make a Failover</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/aws-tunnels-down-when-we-make-a-failover/m-p/501892#M105272</link>
      <description>&lt;P&gt;I too observe the same behaviour with the same setup as your with the AWS standard 2 tunnels they have you setup. We lose about 60 seconds while they re-establish.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;how would one check if ipsec is being synced properly Sutare ?&lt;/P&gt;</description>
      <pubDate>Wed, 08 Jun 2022 20:28:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/aws-tunnels-down-when-we-make-a-failover/m-p/501892#M105272</guid>
      <dc:creator>abettencourt</dc:creator>
      <dc:date>2022-06-08T20:28:09Z</dc:date>
    </item>
    <item>
      <title>Re: AWS Tunnels Down when We make a Failover</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/aws-tunnels-down-when-we-make-a-failover/m-p/502653#M105347</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/149465"&gt;@abettencourt&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;To check if IPsec SA were synced just login to the passive member and confirm you see established SAs.&lt;/P&gt;</description>
      <pubDate>Fri, 10 Jun 2022 14:00:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/aws-tunnels-down-when-we-make-a-failover/m-p/502653#M105347</guid>
      <dc:creator>aleksandar.astardzhiev</dc:creator>
      <dc:date>2022-06-10T14:00:42Z</dc:date>
    </item>
    <item>
      <title>Re: AWS Tunnels Down when We make a Failover</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/aws-tunnels-down-when-we-make-a-failover/m-p/502670#M105352</link>
      <description>&lt;P&gt;yes they are all synced ipsec, but no ike obviously.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;this is the same for AWS and non-AWs tunnels, however only the AWS tunnels go down during these failovers.&lt;/P&gt;</description>
      <pubDate>Fri, 10 Jun 2022 15:09:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/aws-tunnels-down-when-we-make-a-failover/m-p/502670#M105352</guid>
      <dc:creator>abettencourt</dc:creator>
      <dc:date>2022-06-10T15:09:38Z</dc:date>
    </item>
    <item>
      <title>Re: AWS Tunnels Down when We make a Failover</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/aws-tunnels-down-when-we-make-a-failover/m-p/510677#M106245</link>
      <description>&lt;P&gt;Not sure if you found a solution to this...&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As stated here in the KB article:&lt;BR /&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClVGCA0" target="_blank" rel="nofollow noopener noreferrer"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClVGCA0&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;My interpretation of reading that means if the tunnel goes down (or presumably being initially set up) it will only be negotiated by interesting traffic, so you have several options to keep that interesting traffic:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Tunnel monitor using your tunnel interface, the route to the peer will be via the tunnel hence it is interesting traffic (icmp between tunnel peers on the same /30 subnet).
&lt;OL&gt;
&lt;LI&gt;On a side note i'd use "path monitoring" instead of PBF if you have two static routes to the same destination. E.g. 10.1.0.0/24 via tunnel 1, 10.1.0.0/24 via tunnel 2. Just put the prefferred metric on 10 and the other 20 and be sure to path monitor on both routes.&lt;/LI&gt;
&lt;/OL&gt;
&lt;/LI&gt;
&lt;LI&gt;If you have a monitoring tool such as Solarwinds ping something on the remote end, even if it is just to a dummy host, this will be icmp to the remote end.&lt;/LI&gt;
&lt;LI&gt;Set up a lambda function to be triggered when the tunnel is down. It will then run the "test" commands on the PA:
&lt;OL&gt;
&lt;LI&gt;&lt;FONT face="courier new,courier"&gt;test vpn ike-sa gateway &amp;lt;gateway_name&amp;gt;&lt;/FONT&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;FONT face="courier new,courier"&gt;test vpn ipsec-sa tunnel &amp;lt;tunnel_name&amp;gt;&lt;/FONT&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/10-2/pan-os-admin/vpns/set-up-site-to-site-vpn/test-vpn-connectivity" target="_blank"&gt;https://docs.paloaltonetworks.com/pan-os/10-2/pan-os-admin/vpns/set-up-site-to-site-vpn/test-vpn-connectivity&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 03 Aug 2022 09:20:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/aws-tunnels-down-when-we-make-a-failover/m-p/510677#M106245</guid>
      <dc:creator>NathanielM</dc:creator>
      <dc:date>2022-08-03T09:20:17Z</dc:date>
    </item>
    <item>
      <title>Re: AWS Tunnels Down when We make a Failover</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/aws-tunnels-down-when-we-make-a-failover/m-p/529916#M109367</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/149465"&gt;@abettencourt&lt;/a&gt; , &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/192671"&gt;@Alpalo&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It is almost an year when this was posted, have you found a solution?&lt;/P&gt;
&lt;P&gt;Last week we did some failover tests, related to other issues and we experience the same issue first hand.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I haven't completely figure it out, but it looks like it is related to how AWS will handle phase2 when phase1 is down.&lt;/P&gt;
&lt;P&gt;As already mentioned HA will sync only phase2, which means in event of failover secondary member will have phase2 to AWS up and will try to use it, but there will be no phase1. Firewall will believe tunnel is up and try to use the phase2 that it "inherit" from primary peer, but I am guessing AWS will reject the traffic, because it is using phase2 for which there is no valid phase1.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It is interesting to note, that when forcing phase1 to negotiate using "test vpn ike-sa gateway .." command, tunnel will start working immediately. In the logs I can see that after phase1 negotiation phase2 is also renewed.&lt;/P&gt;
&lt;P&gt;This KB mention some interesting solution - &lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u000000HAuZCAW&amp;amp;lang=en_US%E2%80%A9&amp;amp;refURL=http%3A%2F%2Fknowledgebase.paloaltonetworks.com%2FKCSArticleDetail" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u000000HAuZCAW&amp;amp;lang=en_US%E2%80%A9&amp;amp;refURL=http%3A%2F%2Fknowledgebase.paloaltonetworks.com%2FKCSArticleDetail&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Here they quickly suggest that you can create log forwarding action with HTTP profile, when failover event is triggered, FW to send API to itself to test phase1, which will bring AWS tunnel back to functional immediately after failover.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am still puzzled what exactly is causing this issue, but something with IKEv2 phase1 liveness check could be the explanation.&lt;/P&gt;
&lt;P&gt;I want to made some more tests with IKEv2 liveness check disabled or with tunnel monitor enabled.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 05 Feb 2023 10:17:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/aws-tunnels-down-when-we-make-a-failover/m-p/529916#M109367</guid>
      <dc:creator>aleksandar.astardzhiev</dc:creator>
      <dc:date>2023-02-05T10:17:38Z</dc:date>
    </item>
    <item>
      <title>Re: AWS Tunnels Down when We make a Failover</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/aws-tunnels-down-when-we-make-a-failover/m-p/532474#M109772</link>
      <description>&lt;P&gt;Hi Astardzhiev!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks so much for the reply.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I never did find a solution to the issue no, so this is very interesting to see. I did however arrive at the same conclusion of the issue though - figured it was the phase1 as you can see the rekeys pop up as soon as it starts ( the traffic continues to flow for a few seconds after failing over before AWS notices phase 1 is different)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Your possible solution seems like its going at the top of my list of things to test however! excited to see a possible workaround for this.&lt;/P&gt;</description>
      <pubDate>Tue, 28 Feb 2023 15:51:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/aws-tunnels-down-when-we-make-a-failover/m-p/532474#M109772</guid>
      <dc:creator>abettencourt</dc:creator>
      <dc:date>2023-02-28T15:51:16Z</dc:date>
    </item>
    <item>
      <title>Re: AWS Tunnels Down when We make a Failover</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/aws-tunnels-down-when-we-make-a-failover/m-p/532479#M109775</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/149465"&gt;@abettencourt&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;I forgot to share my results...&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;TL;DR enabling tunnel monitor monitoring the AWS tunnel IP is working perfect.. &lt;/P&gt;
&lt;P&gt;I was able reproduce the issue with manual failover and every time noticed that although phase2 seems up, traffic is not working. In our case we run BGP and we notice that BGP went down and says down for long time.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As you know AWS establish two separate tunnels. so first I enabled tunnel monitor for one of those tunnel and perform another failover.&lt;/P&gt;
&lt;P&gt;Tunnel monitor failed couple of seconds after the failover, which seems to trigger new&amp;nbsp; tunnel negotiation (at least how I explain it to myself).&lt;/P&gt;
&lt;P&gt;Since AWS peer is working the new tunnel is established almost immediately.&lt;/P&gt;
&lt;P&gt;Using default valued for tunnel monitor profile (3sec/5 threshold) were enough to keep the BGP peering up.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am still puzzled why this is happening exactly. During my initial setup I explicitly decided to not enable tunnel monitor, because we are using BGP which should achieve the dynamic switch over when tunnels are down..&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 28 Feb 2023 16:18:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/aws-tunnels-down-when-we-make-a-failover/m-p/532479#M109775</guid>
      <dc:creator>aleksandar.astardzhiev</dc:creator>
      <dc:date>2023-02-28T16:18:27Z</dc:date>
    </item>
    <item>
      <title>Re: AWS Tunnels Down when We make a Failover</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/aws-tunnels-down-when-we-make-a-failover/m-p/532967#M109825</link>
      <description>&lt;P&gt;Tunnel goes down due IKE not being synchronized between HA peers. Most likely AWS will bring tunnel down due DPD failure.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u000000HAuZCAW" target="_blank" rel="noopener"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u000000HAuZCAW&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Try:&lt;BR /&gt;&lt;EM&gt;"To being up phase 1 automatically, use the HTTP Log Forwarding feature known as "&lt;STRONG&gt;log to action&lt;/STRONG&gt;".&amp;nbsp;If the firewall sees a HA event in the logs, configure "&lt;STRONG&gt;log to action&lt;/STRONG&gt;" to trigger the command "test vpn ike-sa" to bring up phase 1 automatically in the event of a failover."&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 02 Mar 2023 15:34:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/aws-tunnels-down-when-we-make-a-failover/m-p/532967#M109825</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2023-03-02T15:34:53Z</dc:date>
    </item>
    <item>
      <title>Re: AWS Tunnels Down when We make a Failover</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/aws-tunnels-down-when-we-make-a-failover/m-p/586622#M117072</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Anyone that has an example of the payload to get this type of 'log to action' working?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks a lot!&lt;/P&gt;
&lt;P&gt;Greeting&lt;/P&gt;</description>
      <pubDate>Tue, 14 May 2024 09:41:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/aws-tunnels-down-when-we-make-a-failover/m-p/586622#M117072</guid>
      <dc:creator>wvandriessche</dc:creator>
      <dc:date>2024-05-14T09:41:14Z</dc:date>
    </item>
    <item>
      <title>Re: AWS Tunnels Down when We make a Failover</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/aws-tunnels-down-when-we-make-a-failover/m-p/1221802#M123383</link>
      <description>&lt;P&gt;You can have it detect the failover event and make an API call to itself to rekey the VPNs using XPath with a wildcard or be specific by ike-gatway name. I believe this will do what they were trying to say. I am not sure that I really want to do this in production, but I am going to lab it up and test it out.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 24 Feb 2025 20:26:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/aws-tunnels-down-when-we-make-a-failover/m-p/1221802#M123383</guid>
      <dc:creator>Eric_B</dc:creator>
      <dc:date>2025-02-24T20:26:24Z</dc:date>
    </item>
    <item>
      <title>Re: AWS Tunnels Down when We make a Failover</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/aws-tunnels-down-when-we-make-a-failover/m-p/1224295#M123716</link>
      <description>&lt;P&gt;So while it is possible to create a localhost server profile to trigger the API, operational commands do not work with Xpath. You need a separate server profile for each s2s VPN you want to "test" to bring it back up with the name of that gateway as a value. It is not ideal. Theoretically, you could script a query via config commands to show all the gateways, create an array, then send an op command to the APIT for each gateway. That way you are not adding or removing server profiles for each s2s.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 20 Mar 2025 12:31:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/aws-tunnels-down-when-we-make-a-failover/m-p/1224295#M123716</guid>
      <dc:creator>Eric_B</dc:creator>
      <dc:date>2025-03-20T12:31:47Z</dc:date>
    </item>
  </channel>
</rss>

