<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to configure PaloAlto to Fail-over to another ISP on a remote location in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-configure-paloalto-to-fail-over-to-another-isp-on-a/m-p/2397#M1780</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello &lt;STRONG style="font-size: 12px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;&lt;A _jive_internal="true" class="jiveTT-hover-user jive-username-link" data-avatarid="1252" data-externalid="" data-presence="null" data-userid="28150" data-username="ErwinBuena" href="https://live.paloaltonetworks.com/people/ErwinBuena" style="padding: 0 3px 0 0; font-weight: inherit; font-style: inherit; font-size: 1.1em; font-family: inherit; color: #006595;"&gt;ErwinBuena&lt;/A&gt;&lt;/STRONG&gt;,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Few related doc as mentioned below, it may help you &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;( &lt;/SPAN&gt;configuration steps) in this scenario. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/docs/DOC-1562"&gt;Configuring Policy Based Forwarding (PBF) &lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/docs/DOC-4500"&gt;Setup&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/docs/DOC-6036"&gt;How to Configure Dual ISP Network with GlobalProtect VPN using 1 Virtual Router and Policy Based Forwarding&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 14 Jul 2014 16:56:01 GMT</pubDate>
    <dc:creator>HULK</dc:creator>
    <dc:date>2014-07-14T16:56:01Z</dc:date>
    <item>
      <title>How to configure PaloAlto to Fail-over to another ISP on a remote location</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-configure-paloalto-to-fail-over-to-another-isp-on-a/m-p/2395#M1778</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm new in using PaloAlto Firewall. We have to sites that have it's own dedicated ISP connections and I've been task to configure the PAN firewall to route the Internet connections to another ISP if the main internet connections encounter a connectivity problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HQ1 RT1-------PAN FW--------Internet RTR------------------ISP1&lt;/P&gt;&lt;P&gt;|&lt;/P&gt;&lt;P&gt;|&lt;/P&gt;&lt;P&gt;|&amp;nbsp; -&amp;gt; Connections between HQ1 and HQ2 is via internal MPLS and they're on different location&lt;/P&gt;&lt;P&gt;|&lt;/P&gt;&lt;P&gt;|&lt;/P&gt;&lt;P&gt;HQ2 RT2-------PAN FW--------Internet RTR------------------ISP2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is it possible to configure VPN Tunnel between the two PA FW and used PBF?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any feedback are highly appreciated&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers,&lt;/P&gt;&lt;P&gt;Erwin&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 14 Jul 2014 05:41:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-configure-paloalto-to-fail-over-to-another-isp-on-a/m-p/2395#M1778</guid>
      <dc:creator>ErwinBuena</dc:creator>
      <dc:date>2014-07-14T05:41:36Z</dc:date>
    </item>
    <item>
      <title>Re: How to configure PaloAlto to Fail-over to another ISP on a remote location</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-configure-paloalto-to-fail-over-to-another-isp-on-a/m-p/2396#M1779</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Erwin,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the document that explains how to configure PAN for dual ISP failovers:&lt;/P&gt;&lt;P&gt;&lt;A _jive_internal="true" data-containerid="2027" data-containertype="14" data-objectid="1357" data-objecttype="102" href="https://live.paloaltonetworks.com/docs/DOC-1357"&gt;Dual ISP Branch Office Configuration&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In short, you would: &lt;/P&gt;&lt;P&gt;1. Configure a PBF policy on PAN FW in HQ1, to route Internet traffic via ISP1 and enable monitoring in PBF.&lt;/P&gt;&lt;P&gt;2. Configure an IPSEC tunnel between PAN FW1 and PAN FW2&lt;/P&gt;&lt;P&gt;3. Configure a static route in the routing table of PAN FW in HQ1 to route Internet traffic using tunnel as an exiting interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks and regards,&lt;/P&gt;&lt;P&gt;Kunal Adak&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 14 Jul 2014 13:37:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-configure-paloalto-to-fail-over-to-another-isp-on-a/m-p/2396#M1779</guid>
      <dc:creator>kadak</dc:creator>
      <dc:date>2014-07-14T13:37:35Z</dc:date>
    </item>
    <item>
      <title>Re: How to configure PaloAlto to Fail-over to another ISP on a remote location</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-configure-paloalto-to-fail-over-to-another-isp-on-a/m-p/2397#M1780</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello &lt;STRONG style="font-size: 12px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;&lt;A _jive_internal="true" class="jiveTT-hover-user jive-username-link" data-avatarid="1252" data-externalid="" data-presence="null" data-userid="28150" data-username="ErwinBuena" href="https://live.paloaltonetworks.com/people/ErwinBuena" style="padding: 0 3px 0 0; font-weight: inherit; font-style: inherit; font-size: 1.1em; font-family: inherit; color: #006595;"&gt;ErwinBuena&lt;/A&gt;&lt;/STRONG&gt;,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Few related doc as mentioned below, it may help you &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;( &lt;/SPAN&gt;configuration steps) in this scenario. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/docs/DOC-1562"&gt;Configuring Policy Based Forwarding (PBF) &lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/docs/DOC-4500"&gt;Setup&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/docs/DOC-6036"&gt;How to Configure Dual ISP Network with GlobalProtect VPN using 1 Virtual Router and Policy Based Forwarding&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 14 Jul 2014 16:56:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-configure-paloalto-to-fail-over-to-another-isp-on-a/m-p/2397#M1780</guid>
      <dc:creator>HULK</dc:creator>
      <dc:date>2014-07-14T16:56:01Z</dc:date>
    </item>
    <item>
      <title>Re: How to configure PaloAlto to Fail-over to another ISP on a remote location</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-configure-paloalto-to-fail-over-to-another-isp-on-a/m-p/2398#M1781</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If I understand correctly, you want to use ISP1 from HQ2 if ISP2 fails.&amp;nbsp; And use ISP2 from HQ1 if ISP1 fails.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If that is correct, then you do not need vpn in the mix at all.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You would follow the Dual ISP branch instructions on both PA. &lt;/P&gt;&lt;UL&gt;&lt;LI&gt;The PBF primary is your local ISP.&amp;nbsp; &lt;/LI&gt;&lt;LI&gt;The new lower priority default route would be your MPLS router.&lt;/LI&gt;&lt;LI&gt;You would also need to check your internet nat rule at both sites:&lt;/LI&gt;&lt;LI&gt;PA at HQ1 would need a nat rule to the internet covering HQ2 private addresses&lt;/LI&gt;&lt;LI&gt;PA at HQ2 would need a nat rule to the internet covering HQ1 private addresses&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/docs/DOC-1357"&gt;Dual ISP Branch Office Configuration&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 14 Jul 2014 21:31:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-configure-paloalto-to-fail-over-to-another-isp-on-a/m-p/2398#M1781</guid>
      <dc:creator>pulukas</dc:creator>
      <dc:date>2014-07-14T21:31:01Z</dc:date>
    </item>
    <item>
      <title>Re: How to configure PaloAlto to Fail-over to another ISP on a remote location</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-configure-paloalto-to-fail-over-to-another-isp-on-a/m-p/2399#M1782</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Steven&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Configuration would be more complicated if I do the fail over functionality on HQ RTR that will look like this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;For each sites (HQ1/2 RTR) it has a default static route towards PAN Internet Firewall. Using PBF to revert the default static on PAN and back to HQ RTR would be an issue. Do you have any recommendation to address this issue?&lt;/LI&gt;&lt;LI&gt;Other solution that I'm thinking is to use IP SLA on HQ Router to track Internet Edge connections and then let the routes dynamically learned the routes since those default static routes has been re-distributed to MPLS routing table to fail-over to another ISP. I'm hesitant to this since it will require more work as compared to building up VPN tunnel between the two PAN router.&lt;/LI&gt;&lt;LI&gt;In terms of the NAT rules, it covers the private IP address for each sites. Each sites has it's own public IP address for NAT translation for each of the system for inbound traffic&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Thanks to Kadak and Hulk for your update as well.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers,&lt;/P&gt;&lt;P&gt;Erwin&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 14 Jul 2014 23:37:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-configure-paloalto-to-fail-over-to-another-isp-on-a/m-p/2399#M1782</guid>
      <dc:creator>ErwinBuena</dc:creator>
      <dc:date>2014-07-14T23:37:03Z</dc:date>
    </item>
    <item>
      <title>Re: How to configure PaloAlto to Fail-over to another ISP on a remote location</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-configure-paloalto-to-fail-over-to-another-isp-on-a/m-p/2400#M1783</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I see the issue where the dualing default routes would cause in my original scenario.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In a vpn between the PA the following would occur.&amp;nbsp; This may not be any simpler than your MPLS fail-over solution.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;The vpn would build on the internal interfaces since the ISP for one side is down.&lt;BR /&gt;The ingress of traffic will be on the same interface as the vpn gateway.&amp;nbsp; I don't know if that will work or not.&amp;nbsp; Typically we see ingress on one interface and gateway on another.&amp;nbsp; This would need to be lab tested.&lt;/LI&gt;&lt;LI&gt;The PA default route for the down ISP goes into the tunnel&lt;BR /&gt;This could potentially still use the technique previously mentioned with PBR and a default route to the tunnel interface.&lt;/LI&gt;&lt;LI&gt;On the PA with good ISP - return traffic to the other site needs to go into the vpn instead of the MPLS or the tunnel will be asymmetrical and fail&lt;BR /&gt;This gets trickier to work out.&amp;nbsp; The current MPLS path will be available when this occurs and must be available to build the tunnel.&amp;nbsp; So we cannot use the PBR method to switch.&lt;BR /&gt;Another option might be to nat the outbound source when sending into the tunnel so the tunnel traffic has a unique return address not routed on the MPLS.&amp;nbsp; You would then just need one for each side.&lt;/LI&gt;&lt;LI&gt;NAT for internet access&lt;BR /&gt;Once the traffic travels the tunnel from dead site to live site.&amp;nbsp; You will need a nat rule on the live site to public nat the traffic from the tunnel going out to the internet as these source addresses won't be covered in the current configuration.&lt;/LI&gt;&lt;/OL&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 Jul 2014 01:38:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-configure-paloalto-to-fail-over-to-another-isp-on-a/m-p/2400#M1783</guid>
      <dc:creator>pulukas</dc:creator>
      <dc:date>2014-07-15T01:38:26Z</dc:date>
    </item>
    <item>
      <title>Re: How to configure PaloAlto to Fail-over to another ISP on a remote location</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-configure-paloalto-to-fail-over-to-another-isp-on-a/m-p/2401#M1784</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Steven,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;See my update below &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;OL style="list-style-type: decimal;"&gt;&lt;LI&gt;&lt;SPAN style="color: #666666; font-family: 'Helvetica','sans-serif'; font-size: 10.5pt; mso-fareast-font-family: 'Times New Roman';"&gt;The vpn would build on the internal interfaces since the ISP for one side is down.&lt;BR /&gt; - You’re correct, I’m planning to build the tunnel via the Internal Interface on PAN Firewall&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="color: #666666; font-family: 'Helvetica','sans-serif'; font-size: 10.5pt; mso-fareast-font-family: 'Times New Roman';"&gt;The PA default route for the down ISP goes into the tunnel&lt;BR /&gt; - I’m planning to used PBF together with the built-in monitor to track the site ISP connections and once it is down, default route will be routed to VPN Tunnel. Do I need to create two PBF for this scenario?&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="color: #666666; font-family: 'Helvetica','sans-serif'; font-size: 10.5pt; mso-fareast-font-family: 'Times New Roman';"&gt;On the PA with good ISP - return traffic to the other site needs to go into the vpn instead of the MPLS or the tunnel will be asymmetrical and fail&lt;BR /&gt; - If I enable “Enforce Symmetric Return in PFB Rule? Does it reduce the complexity that you mention?&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="color: #666666; font-family: 'Helvetica','sans-serif'; font-size: 10.5pt; mso-fareast-font-family: 'Times New Roman';"&gt;NAT for internet access&lt;BR /&gt; - Yes, I’ll do dynamic NAT translation for all traffic coming out of the VPN tunnel. Possible issue that I’m anticipating are the NAT translation for the public IP’s owned by ISP that having an issue. Any thoughts on this?&lt;/SPAN&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN style="color: #666666; font-family: 'Helvetica','sans-serif'; font-size: 10.5pt; mso-fareast-font-family: 'Times New Roman';"&gt;It’s looks like it’s getting complicated than the original plan that I thought. Do you think it make since to do it this way or I need to look at another solutions.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;SPAN style="color: #666666; font-family: 'Helvetica','sans-serif'; font-size: 10.5pt; mso-fareast-font-family: 'Times New Roman';"&gt;Your feedback are highly appreciated and help me a lot to think out of the box for the solution that I’m planning.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #666666; font-family: 'Helvetica','sans-serif'; font-size: 10.5pt; mso-fareast-font-family: 'Times New Roman';"&gt;Cheers,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #666666; font-family: 'Helvetica','sans-serif'; font-size: 10.5pt; mso-fareast-font-family: 'Times New Roman';"&gt;Erwin&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 Jul 2014 02:18:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-configure-paloalto-to-fail-over-to-another-isp-on-a/m-p/2401#M1784</guid>
      <dc:creator>ErwinBuena</dc:creator>
      <dc:date>2014-07-15T02:18:15Z</dc:date>
    </item>
    <item>
      <title>Re: How to configure PaloAlto to Fail-over to another ISP on a remote location</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-configure-paloalto-to-fail-over-to-another-isp-on-a/m-p/2402#M1785</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;More thoughts:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;OL style="list-style-type: decimal;"&gt;&lt;LI&gt;&lt;SPAN style="color: #666666; font-family: 'Helvetica','sans-serif'; font-size: 10.5pt;"&gt;The vpn would build on the internal interfaces since the ISP for one side is down.&lt;BR /&gt; - You’re correct, I’m planning to build the tunnel via the Internal Interface on PAN Firewall&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="color: #666666; font-family: 'Helvetica','sans-serif'; font-size: 10.5pt;"&gt;The PA default route for the down ISP goes into the tunnel&lt;BR /&gt; - I’m planning to used PBF together with the built-in monitor to track the site ISP connections and once it is down, default route will be routed to VPN Tunnel. Do I need to create two PBF for this scenario?&lt;BR /&gt;There is only one PBF and one default route in this scenario on each device.&amp;nbsp; this is what is outlined in the tech note.&lt;BR /&gt;&lt;/SPAN&gt;&lt;A _jive_internal="true" data-containerid="2027" data-containertype="14" data-objectid="1357" data-objecttype="102" href="https://live.paloaltonetworks.com/docs/DOC-1357"&gt;Dual ISP Branch Office Configuration&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="color: #666666; font-family: 'Helvetica','sans-serif'; font-size: 10.5pt;"&gt;On the PA with good ISP - return traffic to the other site needs to go into the vpn instead of the MPLS or the tunnel will be asymmetrical and fail&lt;BR /&gt; - If I enable “Enforce Symmetric Return in PFB Rule? Does it reduce the complexity that you mention?&lt;BR /&gt;&lt;/SPAN&gt;The use of PBF is really not an option here due to the way the process works.&amp;nbsp; Instead I think you would nat the tunnel traffic providing a unique route on each site just for tunnel usage.&amp;nbsp; See this tech note.&lt;BR /&gt;&lt;A href="https://live.paloaltonetworks.com/docs/DOC-1594"&gt;Configuring route based IPSec with overlapping networks&lt;/A&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;/P&gt;&lt;OL style="list-style-type: decimal;"&gt;&lt;LI&gt;&lt;SPAN style="color: #666666; font-family: 'Helvetica','sans-serif'; font-size: 10.5pt;"&gt;NAT for internet access&lt;BR /&gt; - Yes, I’ll do dynamic NAT translation for all traffic coming out of the VPN tunnel. Possible issue that I’m anticipating are the NAT translation for the public IP’s owned by ISP that having an issue. Any thoughts on this?&lt;BR /&gt;&lt;/SPAN&gt;I don't see how you can use the down ISP space as this will not return to the up ISP location.&amp;nbsp; You will have to allocate and use nat space on the working ISP for this purpose.&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This could potentially work.&amp;nbsp; With the issue I mentioned on point 1 previously needing to be tested.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Whether this is easier than the MPLS routing solution I'm not in a position to judge.&amp;nbsp; Both seem invovled.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 15 Jul 2014 02:45:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-configure-paloalto-to-fail-over-to-another-isp-on-a/m-p/2402#M1785</guid>
      <dc:creator>pulukas</dc:creator>
      <dc:date>2014-07-15T02:45:55Z</dc:date>
    </item>
  </channel>
</rss>

