<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Using IPSEC tunnel as redundant link to a destination in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/using-ipsec-tunnel-as-redundant-link-to-a-destination/m-p/76225#M42217</link>
    <description>&lt;P&gt;yopu can set up a end to end IPSec&amp;nbsp;tunnel on your secondary link and then have a pbf rule that directs all traffic to your primary link with a monitoring profile that disabled the pbf if the monitor fails, then have a static route (or a second pbf rule) direct traffic into the IPSec tunnel&lt;/P&gt;</description>
    <pubDate>Tue, 12 Apr 2016 10:25:56 GMT</pubDate>
    <dc:creator>reaper</dc:creator>
    <dc:date>2016-04-12T10:25:56Z</dc:date>
    <item>
      <title>Using IPSEC tunnel as redundant link to a destination</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/using-ipsec-tunnel-as-redundant-link-to-a-destination/m-p/76201#M42210</link>
      <description>&lt;P&gt;Hello PAN Live Community,&lt;/P&gt;
&lt;P&gt;I'm looking at having a redundant link to a given set of destination (servers) over an IPSEC tunnel when primary WAN link goes down.&lt;/P&gt;
&lt;P&gt;What is the best way to do this ?&lt;/P&gt;
&lt;P&gt;PBF ?&lt;/P&gt;</description>
      <pubDate>Mon, 11 Apr 2016 23:26:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/using-ipsec-tunnel-as-redundant-link-to-a-destination/m-p/76201#M42210</guid>
      <dc:creator>mpgioia</dc:creator>
      <dc:date>2016-04-11T23:26:17Z</dc:date>
    </item>
    <item>
      <title>Re: Using IPSEC tunnel as redundant link to a destination</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/using-ipsec-tunnel-as-redundant-link-to-a-destination/m-p/76223#M42215</link>
      <description>&lt;P&gt;Ok, something is confusing: you have non-IPSEC connection to destination on primary WAN link and when that one goes down you want IPSEC connection to that destination on secondary WAN link? So backup connection&amp;nbsp;will be more secure than primary connection?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;But yes, PBF rules are for such scenarios. Or in case with tunnel interfaces you can also use tunnel monitor functionality.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Apr 2016 09:24:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/using-ipsec-tunnel-as-redundant-link-to-a-destination/m-p/76223#M42215</guid>
      <dc:creator>santonic</dc:creator>
      <dc:date>2016-04-12T09:24:52Z</dc:date>
    </item>
    <item>
      <title>Re: Using IPSEC tunnel as redundant link to a destination</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/using-ipsec-tunnel-as-redundant-link-to-a-destination/m-p/76225#M42217</link>
      <description>&lt;P&gt;yopu can set up a end to end IPSec&amp;nbsp;tunnel on your secondary link and then have a pbf rule that directs all traffic to your primary link with a monitoring profile that disabled the pbf if the monitor fails, then have a static route (or a second pbf rule) direct traffic into the IPSec tunnel&lt;/P&gt;</description>
      <pubDate>Tue, 12 Apr 2016 10:25:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/using-ipsec-tunnel-as-redundant-link-to-a-destination/m-p/76225#M42217</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2016-04-12T10:25:56Z</dc:date>
    </item>
    <item>
      <title>Re: Using IPSEC tunnel as redundant link to a destination</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/using-ipsec-tunnel-as-redundant-link-to-a-destination/m-p/76233#M42220</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/10238"&gt;@santonic&lt;/a&gt; wrote:&lt;BR /&gt;
&lt;P&gt;Ok, something is confusing: you have non-IPSEC connection to destination on primary WAN link and when that one goes down you want IPSEC connection to that destination on secondary WAN link? So backup connection&amp;nbsp;will be more secure than primary connection?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;But yes, PBF rules are for such scenarios. Or in case with tunnel interfaces you can also use tunnel monitor functionality.&lt;/P&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;IPSEC tunnel to that destination over &lt;U&gt;&lt;STRONG&gt;Internet&lt;/STRONG&gt;&lt;/U&gt; for backup.. not WAN link.&lt;/P&gt;
&lt;P&gt;So it's for connectivity sake.. not security sake.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Apr 2016 12:28:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/using-ipsec-tunnel-as-redundant-link-to-a-destination/m-p/76233#M42220</guid>
      <dc:creator>mpgioia</dc:creator>
      <dc:date>2016-04-12T12:28:14Z</dc:date>
    </item>
    <item>
      <title>Re: Using IPSEC tunnel as redundant link to a destination</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/using-ipsec-tunnel-as-redundant-link-to-a-destination/m-p/76234#M42221</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/7608"&gt;@reaper&lt;/a&gt; wrote:&lt;BR /&gt;
&lt;P&gt;yopu can set up a end to end IPSec&amp;nbsp;tunnel on your secondary link and then have a pbf rule that directs all traffic to your primary link with a monitoring profile that disabled the pbf if the monitor fails, then have a static route (or a second pbf rule) direct traffic into the IPSec tunnel&lt;/P&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If I disable the pbf when primary/WAN link goes down (via monitor configuration), won't the IPSEC site-to-site then immediately take over (without any configuration/traffic engineering such employing another pbf or static route) as that route will be the only available/remaining in the routing table for the given destination networks ?&lt;/P&gt;</description>
      <pubDate>Tue, 12 Apr 2016 12:30:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/using-ipsec-tunnel-as-redundant-link-to-a-destination/m-p/76234#M42221</guid>
      <dc:creator>mpgioia</dc:creator>
      <dc:date>2016-04-12T12:30:59Z</dc:date>
    </item>
    <item>
      <title>Re: Using IPSEC tunnel as redundant link to a destination</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/using-ipsec-tunnel-as-redundant-link-to-a-destination/m-p/76243#M42228</link>
      <description>&lt;P&gt;Yes, once the PBF rule will be disabled&amp;nbsp;when the primary link goes down, static route will take over immediately. But you need to have such&amp;nbsp;static route for directing desired traffic into correct tunnel interface.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Apr 2016 13:19:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/using-ipsec-tunnel-as-redundant-link-to-a-destination/m-p/76243#M42228</guid>
      <dc:creator>santonic</dc:creator>
      <dc:date>2016-04-12T13:19:34Z</dc:date>
    </item>
    <item>
      <title>Re: Using IPSEC tunnel as redundant link to a destination</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/using-ipsec-tunnel-as-redundant-link-to-a-destination/m-p/76245#M42229</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/10238"&gt;@santonic&lt;/a&gt; wrote:&lt;BR /&gt;
&lt;P&gt;Yes, once the PBF rule will be disabled&amp;nbsp;when the primary link goes down, static route will take over immediately. But you need to have such&amp;nbsp;static route for directing desired traffic into correct tunnel interface.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;Makes sense.. Thanks so much !&lt;/P&gt;</description>
      <pubDate>Tue, 12 Apr 2016 13:39:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/using-ipsec-tunnel-as-redundant-link-to-a-destination/m-p/76245#M42229</guid>
      <dc:creator>mpgioia</dc:creator>
      <dc:date>2016-04-12T13:39:13Z</dc:date>
    </item>
    <item>
      <title>Re: Using IPSEC tunnel as redundant link to a destination</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/using-ipsec-tunnel-as-redundant-link-to-a-destination/m-p/76248#M42232</link>
      <description>&lt;P&gt;Or... even easier.. not do a PBF.. and just do a floating static (influence administrative distance) over the IPSec site-to-site... ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Apr 2016 13:43:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/using-ipsec-tunnel-as-redundant-link-to-a-destination/m-p/76248#M42232</guid>
      <dc:creator>mpgioia</dc:creator>
      <dc:date>2016-04-12T13:43:39Z</dc:date>
    </item>
    <item>
      <title>Re: Using IPSEC tunnel as redundant link to a destination</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/using-ipsec-tunnel-as-redundant-link-to-a-destination/m-p/76301#M42254</link>
      <description>&lt;P&gt;Yes, bu what will make primary route be deleted? You can lose connectivity but interface status remains up.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 13 Apr 2016 06:09:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/using-ipsec-tunnel-as-redundant-link-to-a-destination/m-p/76301#M42254</guid>
      <dc:creator>santonic</dc:creator>
      <dc:date>2016-04-13T06:09:00Z</dc:date>
    </item>
    <item>
      <title>Re: Using IPSEC tunnel as redundant link to a destination</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/using-ipsec-tunnel-as-redundant-link-to-a-destination/m-p/76302#M42255</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/10238"&gt;@santonic&lt;/a&gt; wrote:&lt;BR /&gt;
&lt;P&gt;Yes, bu what will make primary route be deleted? You can lose connectivity but interface status remains up.&amp;nbsp;&lt;/P&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;Understood.. given the fault scenario and permutations/combinations of fault.&lt;/P&gt;
&lt;P&gt;Floating static alone might be enough.. and in other scenario's monitoring on a PBF might be needed.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have enough to build my traffic engineering anyhow.. Thanks all.&lt;/P&gt;</description>
      <pubDate>Wed, 13 Apr 2016 06:18:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/using-ipsec-tunnel-as-redundant-link-to-a-destination/m-p/76302#M42255</guid>
      <dc:creator>mpgioia</dc:creator>
      <dc:date>2016-04-13T06:18:33Z</dc:date>
    </item>
  </channel>
</rss>

