<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: PAN Dual ISP Failver Best Practices in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/pan-dual-isp-failver-best-practices/m-p/27437#M19999</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yeah we can alll LOL at the smtp issue after the fact. &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://live.paloaltonetworks.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And it's not even like this was some lowly business class DSL service. It's enterprise grade fiber. (50 down/up). &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In our area, we have a cable modem provider that still ties the connection to the first MAC address. When I switch them to a new firewall and tell them they have to reboot the modem.. I feel barbaric. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 12 Aug 2014 13:56:33 GMT</pubDate>
    <dc:creator>SDorsey</dc:creator>
    <dc:date>2014-08-12T13:56:33Z</dc:date>
    <item>
      <title>PAN Dual ISP Failver Best Practices</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pan-dual-isp-failver-best-practices/m-p/27426#M19988</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have setup dozens of PANs with multiple ISPs and failover but have some questions in regards to best practices..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. Is PBF the only way to handle failover? If not, can the same be achieved via HA Link/path monitoring or is that specifically for device/firewall failover? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2. This is mostly in regards to what is processed first in the firewall. If you setup two ISPs, are there any issues with putting them in the same zone so you can manage them as a single zone from a security perspective? My question mostly revolves around NAT. If you have two NAT policies which match Internal to External but the policies have two different source NAT IPs.. will the firewall look at the PBF table, see which interface it is going to go out of, then apply the appropriate NAT policy? Or do you have to put the ISPs in separate zones? &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 09 Aug 2014 17:49:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pan-dual-isp-failver-best-practices/m-p/27426#M19988</guid>
      <dc:creator>SDorsey</dc:creator>
      <dc:date>2014-08-09T17:49:13Z</dc:date>
    </item>
    <item>
      <title>Re: PAN Dual ISP Failver Best Practices</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pan-dual-isp-failver-best-practices/m-p/27427#M19989</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Well nevermind on question two. I tested it and no for sure you can NAT just fine with all ISPs being on same zone.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 09 Aug 2014 18:43:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pan-dual-isp-failver-best-practices/m-p/27427#M19989</guid>
      <dc:creator>SDorsey</dc:creator>
      <dc:date>2014-08-09T18:43:24Z</dc:date>
    </item>
    <item>
      <title>Re: PAN Dual ISP Failver Best Practices</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pan-dual-isp-failver-best-practices/m-p/27428#M19990</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Is it possible that if you have say dual ISPs and you are hosting a publicly accessible web server.. that it be accessible on the public IP of either ISP at any given time?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The current setups have it where it is only accessible on the active ISP line due to the PBF rules.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 09 Aug 2014 20:45:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pan-dual-isp-failver-best-practices/m-p/27428#M19990</guid>
      <dc:creator>SDorsey</dc:creator>
      <dc:date>2014-08-09T20:45:13Z</dc:date>
    </item>
    <item>
      <title>Re: PAN Dual ISP Failver Best Practices</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pan-dual-isp-failver-best-practices/m-p/27429#M19991</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If you want to access publicly hosted web-server through both Public IP&amp;nbsp; addresses, how your DNS server will resolve one URL into 2 different IPs..?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 11 Aug 2014 04:49:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pan-dual-isp-failver-best-practices/m-p/27429#M19991</guid>
      <dc:creator>HULK</dc:creator>
      <dc:date>2014-08-11T04:49:47Z</dc:date>
    </item>
    <item>
      <title>Re: PAN Dual ISP Failver Best Practices</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pan-dual-isp-failver-best-practices/m-p/27430#M19992</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yeah I understand DNS can only have a single A record mapping to an IP at a time. I'm not sure I have a practical use-case scenario for what I'm asking.. just curious if it is possible from a routing perspective in the PAN.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 11 Aug 2014 12:26:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pan-dual-isp-failver-best-practices/m-p/27430#M19992</guid>
      <dc:creator>SDorsey</dc:creator>
      <dc:date>2014-08-11T12:26:00Z</dc:date>
    </item>
    <item>
      <title>Re: PAN Dual ISP Failver Best Practices</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pan-dual-isp-failver-best-practices/m-p/27431#M19993</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I had a client that had a similar requirement.&amp;nbsp; They have 2 ISPs with NAT separate for each.&amp;nbsp; They had a couple of DNATs and wanted to use Global Protect as well.&amp;nbsp; The fun part was that they wanted failover setup but they wanted both WAN links available at the same time.&amp;nbsp; The plan was to manually change DNS when there was a failure but once it was back online they didn't have to make the DNS change right away.&amp;nbsp; So DNATs &amp;amp; GP would always operate.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What I had to do was to put both WAN interfaces into separate VRs.&amp;nbsp; Since I was doing failover as well, I also had to setup PBF.&amp;nbsp; It was the only way I could keep routing synchronous.&amp;nbsp; When I tried to create PBFs to do it they just wouldn't honor the rule and if traffic came in on 1 WAN link while the failover PBF was in place routing became circular.&amp;nbsp; I also had to setup routing across VRs to make traffic flow properly and ran into performance issues.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 11 Aug 2014 23:56:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pan-dual-isp-failver-best-practices/m-p/27431#M19993</guid>
      <dc:creator>CafNetMatt</dc:creator>
      <dc:date>2014-08-11T23:56:08Z</dc:date>
    </item>
    <item>
      <title>Re: PAN Dual ISP Failver Best Practices</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pan-dual-isp-failver-best-practices/m-p/27432#M19994</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;When you did that, did you put the ISPs in the same or separate zones?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 12 Aug 2014 00:50:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pan-dual-isp-failver-best-practices/m-p/27432#M19994</guid>
      <dc:creator>SDorsey</dc:creator>
      <dc:date>2014-08-12T00:50:56Z</dc:date>
    </item>
    <item>
      <title>Re: PAN Dual ISP Failver Best Practices</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pan-dual-isp-failver-best-practices/m-p/27433#M19995</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The ISPs were put into the same zone.&amp;nbsp; That was about the only nice thing about it.&amp;nbsp; It made applying security policies easier.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 12 Aug 2014 00:55:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pan-dual-isp-failver-best-practices/m-p/27433#M19995</guid>
      <dc:creator>CafNetMatt</dc:creator>
      <dc:date>2014-08-12T00:55:37Z</dc:date>
    </item>
    <item>
      <title>Re: PAN Dual ISP Failver Best Practices</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pan-dual-isp-failver-best-practices/m-p/27434#M19996</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I agree. This is my first implementation with putting both ISPs in the same zone. I seemed to be having mixed results.. specifically with bi-drectional NAT policies. Traffic doesn't seem to match on them correctly. If I however change it from a bi-directional policy to two separate NAT policies (one to NAT in and one to NAT out) for a given server and both public IPs, it starts matching correctly. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 12 Aug 2014 01:04:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pan-dual-isp-failver-best-practices/m-p/27434#M19996</guid>
      <dc:creator>SDorsey</dc:creator>
      <dc:date>2014-08-12T01:04:18Z</dc:date>
    </item>
    <item>
      <title>Re: PAN Dual ISP Failver Best Practices</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pan-dual-isp-failver-best-practices/m-p/27435#M19997</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Jay kay. The nat policies were fine. I thought they were broken because email flow was not working. Turns out, the new fiber ISP in the area blocks all inbound/outbound port 25 by default. Wonderful times.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 12 Aug 2014 02:16:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pan-dual-isp-failver-best-practices/m-p/27435#M19997</guid>
      <dc:creator>SDorsey</dc:creator>
      <dc:date>2014-08-12T02:16:34Z</dc:date>
    </item>
    <item>
      <title>Re: PAN Dual ISP Failver Best Practices</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pan-dual-isp-failver-best-practices/m-p/27436#M19998</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sounds like you answered your own question but here's what I did.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I only have DNATs &amp;amp; SNATs.&amp;nbsp; The DNATs were port translations mainly because 1 was legacy and the other I only had the interface IP to work with.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The performance issues I never had a chance to troubleshoot.&amp;nbsp; The migration was a rush job and I was fitting into several already scheduled projects.&amp;nbsp; By the time I had the time to troubleshoot, the client had work with PAN support to solve the issue.&amp;nbsp; From what I understand, they spent a long time and several calls to figure it out but I never heard what the solution was.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have to LOL on the port 25.&amp;nbsp; I didn't know anyone still blocked 25 anymore on a business class internet connection.&amp;nbsp; Even if it's just a cable modem connection.&amp;nbsp; &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Although, on this particular job, they had a 100Mb cable modem connection and the provider was still tying the connection to the first MAC address it saw.&amp;nbsp; That was fun.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 12 Aug 2014 04:46:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pan-dual-isp-failver-best-practices/m-p/27436#M19998</guid>
      <dc:creator>CafNetMatt</dc:creator>
      <dc:date>2014-08-12T04:46:58Z</dc:date>
    </item>
    <item>
      <title>Re: PAN Dual ISP Failver Best Practices</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pan-dual-isp-failver-best-practices/m-p/27437#M19999</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yeah we can alll LOL at the smtp issue after the fact. &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://live.paloaltonetworks.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And it's not even like this was some lowly business class DSL service. It's enterprise grade fiber. (50 down/up). &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In our area, we have a cable modem provider that still ties the connection to the first MAC address. When I switch them to a new firewall and tell them they have to reboot the modem.. I feel barbaric. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 12 Aug 2014 13:56:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pan-dual-isp-failver-best-practices/m-p/27437#M19999</guid>
      <dc:creator>SDorsey</dc:creator>
      <dc:date>2014-08-12T13:56:33Z</dc:date>
    </item>
  </channel>
</rss>

