<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Active/active ha config in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/active-active-ha-config/m-p/43936#M32253</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In your design, I don't think you need Active/Active but would be better served using a simpler and more standard Active/Passive design.&amp;nbsp; Active/Active use cases are typically one of two:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Asymmetrical routing occurs so both paths need to have active firewalls&lt;/P&gt;&lt;P&gt;There are two alternate paths that need to have active routing protocols peers through the firewall so the interfaces cannot be passive down&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Neither apply in your design needs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Another consideration is your fail over scenarios are more limited if you directly connect the two ISP feeds to the two firewalls.&amp;nbsp; This means each ISP depends on that particular firewall being active and the reverse as well.&amp;nbsp; In other words, a single failure on either ISP or firewall forces a second failure with the directly attached partner.&amp;nbsp; ISP A fails then firewall A also cannot route out to the internet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Better practice would be to create two ISP layer 2 vlans on a switch with three ports each. &lt;/P&gt;&lt;P&gt;Port 1- ISP router&lt;/P&gt;&lt;P&gt;port 2 - firewall A&lt;/P&gt;&lt;P&gt;port 3 - firewall B&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now both firewalls have access to both ISP feeds.&amp;nbsp; Any ISP or firewall can fail and that single failure will only affect that item not any other.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can configure dual ISP on the primary firewall.&amp;nbsp; Then create an Active/Passive pair to cover the failure scenario.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You may find these dual ISP documents helpful.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/docs/DOC-3190"&gt;How to Create Inbound NAT to a Single Server with 2 ISPs&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/docs/DOC-1357"&gt;Dual ISP Branch Office Configuration&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 10 Jul 2014 15:06:28 GMT</pubDate>
    <dc:creator>pulukas</dc:creator>
    <dc:date>2014-07-10T15:06:28Z</dc:date>
    <item>
      <title>Active/active ha config</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/active-active-ha-config/m-p/43934#M32251</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;my req:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;isp 1 4mbps(untrust) -&amp;gt;pa 500a-&amp;gt;(trust)cisco switch l3a-&amp;gt;&lt;/P&gt;&lt;P&gt;isp 2 4mbps(untrust)-&amp;gt;pa 500b-&amp;gt;(trust)cisco&amp;nbsp; switch l3b-&amp;gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; same web servers but using&amp;nbsp; isp 1 &amp;amp;2 public ip's(redundancy purpose) to do static s-nat for web servers &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;external users should use both isp to reach web servers in active/active ha mode-&amp;gt;load share/balance..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;my config doubts:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;trust l3 ips connected to cisco switch should be different..right?&lt;/P&gt;&lt;P&gt;dns servers for both isp's are different..so i changed default 4.2.2.2/8.8.8.8 to isp dns servers..right?&lt;/P&gt;&lt;P&gt;web servers should be exposed to external users-so configured s-nat static and tick bi-directional..right?&lt;/P&gt;&lt;P&gt;Please suggest best and simple practise to this requirement and confirm me whether above steps are right?&lt;/P&gt;&lt;P&gt;how to do ha active/active..please tell me procedure.. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 09 Jul 2014 19:04:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/active-active-ha-config/m-p/43934#M32251</guid>
      <dc:creator>Javith</dc:creator>
      <dc:date>2014-07-09T19:04:33Z</dc:date>
    </item>
    <item>
      <title>Re: Active/active ha config</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/active-active-ha-config/m-p/43935#M32252</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Javith,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;external users should use both isp to reach web servers in active/active ha mode-&amp;gt;load share/balance..&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;For above sentence we donot support load balance.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;trust l3 ips connected to cisco switch should be different..right?---&amp;gt; Yes&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;dns servers for both isp's are different..so i changed default 4.2.2.2/8.8.8.8 to isp dns servers..right?----&amp;gt; optional&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;web servers should be exposed to external users-so configured s-nat static and tick bi-directional..right?----&amp;gt; Yes&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;For better practice on configuring HA Active/Active please follow below document.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/docs/DOC-2541"&gt;Configuring Active/Active HA PAN-OS 4.0&lt;/A&gt;&lt;/P&gt;&lt;P&gt;The above document is similar in PANOS-4.1 and 5.0 as well.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Hari&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 10 Jul 2014 14:23:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/active-active-ha-config/m-p/43935#M32252</guid>
      <dc:creator>hyadavalli</dc:creator>
      <dc:date>2014-07-10T14:23:58Z</dc:date>
    </item>
    <item>
      <title>Re: Active/active ha config</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/active-active-ha-config/m-p/43936#M32253</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In your design, I don't think you need Active/Active but would be better served using a simpler and more standard Active/Passive design.&amp;nbsp; Active/Active use cases are typically one of two:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Asymmetrical routing occurs so both paths need to have active firewalls&lt;/P&gt;&lt;P&gt;There are two alternate paths that need to have active routing protocols peers through the firewall so the interfaces cannot be passive down&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Neither apply in your design needs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Another consideration is your fail over scenarios are more limited if you directly connect the two ISP feeds to the two firewalls.&amp;nbsp; This means each ISP depends on that particular firewall being active and the reverse as well.&amp;nbsp; In other words, a single failure on either ISP or firewall forces a second failure with the directly attached partner.&amp;nbsp; ISP A fails then firewall A also cannot route out to the internet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Better practice would be to create two ISP layer 2 vlans on a switch with three ports each. &lt;/P&gt;&lt;P&gt;Port 1- ISP router&lt;/P&gt;&lt;P&gt;port 2 - firewall A&lt;/P&gt;&lt;P&gt;port 3 - firewall B&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now both firewalls have access to both ISP feeds.&amp;nbsp; Any ISP or firewall can fail and that single failure will only affect that item not any other.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can configure dual ISP on the primary firewall.&amp;nbsp; Then create an Active/Passive pair to cover the failure scenario.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You may find these dual ISP documents helpful.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/docs/DOC-3190"&gt;How to Create Inbound NAT to a Single Server with 2 ISPs&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/docs/DOC-1357"&gt;Dual ISP Branch Office Configuration&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 10 Jul 2014 15:06:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/active-active-ha-config/m-p/43936#M32253</guid>
      <dc:creator>pulukas</dc:creator>
      <dc:date>2014-07-10T15:06:28Z</dc:date>
    </item>
  </channel>
</rss>

