<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: &amp;quot;LAN&amp;quot; Interface Failover configuration - Primary: dedicated Line, Secondary: VPN in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/quot-lan-quot-interface-failover-configuration-primary-dedicated/m-p/77454#M42603</link>
    <description>&lt;P&gt;Hi there,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;i've tried the configuration, but looks like tunnel interfaces or zones can not be used for symmetric return. Any other idea? If you think it's useful I can post the screnshots of my configuration&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;TABLE cellpadding="3" cellspacing="0" width="100%"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P class="entry-desc"&gt;vsys1&lt;BR /&gt; Error: pbf rule 'LTE-LAN': Source cannot be zone if nexthop list is specified.&lt;BR /&gt; Error: pbf rule 'LTE-LAN': Fail to parse symmetric return.&lt;BR /&gt; Error: Failed to parse pbf policy&lt;BR /&gt; (Module: device)&lt;BR /&gt; Commit failed&lt;BR /&gt; &lt;BR /&gt; Warnings&lt;BR /&gt; &lt;BR /&gt; Error: pbf rule 'LTE-inet': Source interface cannot be tunnel interface when nexthop address list is configured.&lt;BR /&gt; Error: pbf rule 'LTE-inet': Fail to parse symmetric return.&lt;BR /&gt; Error: Failed to parse pbf policy&lt;BR /&gt; (Module: device)&lt;BR /&gt; Commit failed&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;</description>
    <pubDate>Tue, 03 May 2016 19:25:49 GMT</pubDate>
    <dc:creator>sd@censhare.com</dc:creator>
    <dc:date>2016-05-03T19:25:49Z</dc:date>
    <item>
      <title>"LAN" Interface Failover configuration - Primary: dedicated Line, Secondary: VPN</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/quot-lan-quot-interface-failover-configuration-primary-dedicated/m-p/76862#M42447</link>
      <description>&lt;P&gt;Hi there,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;maybe it's not that complicated but I didn't find a post for this scenario:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The LAN of our Clients are in Location1&lt;/P&gt;
&lt;P&gt;(~ 200 km)&lt;/P&gt;
&lt;P&gt;The LAN of our Servers are in Location2&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Location1 and 2 are using the same firewall which is stored in Location 2 because Location 1 has a dedicated line to Location 2.&lt;/P&gt;
&lt;P&gt;The Primary connection between Location1 and 2 is via a direct connection through the backbone from our ISP - with private IPv4 Addresses. The Firewall is not involved in the LAN traffic between the locations, just for the internet access.&lt;/P&gt;
&lt;P&gt;Everything in this case is fine, but&lt;/P&gt;
&lt;P&gt;the secondary connection between Location1 and 2 is via a LTE Router. I've established a Site2Site VPN between the LTE Router and our PaloAlto Firewall incl a tunnel monitor to make sure the connection is always online. In this case the Firewall is involved in the "LAN" and internet traffic.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I do not know how to configure a failover for the case that the primary connection is broken and everything is going through the LTE Site2Site VPN connection.&lt;/P&gt;
&lt;P&gt;I´ve tested the basic functionallity of the LTE connection with routes with a lower metric than the primary but that was only to make sure that the LTE is basically working -&amp;gt; has nothing to to with autmatic failover.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;My Problem is that the environment is already productive and I only have a 60 minutes maintenance window per week and that's not that easy to find the perfect solution in this short time ( it's a PA-500 &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt; could take a looot of time to commit)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Cheers,&lt;/P&gt;
&lt;P&gt;Stephan&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 22 Apr 2016 07:27:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/quot-lan-quot-interface-failover-configuration-primary-dedicated/m-p/76862#M42447</guid>
      <dc:creator>sd@censhare.com</dc:creator>
      <dc:date>2016-04-22T07:27:42Z</dc:date>
    </item>
    <item>
      <title>Re: "LAN" Interface Failover configuration - Primary: dedicated Line, Secondary: VPN</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/quot-lan-quot-interface-failover-configuration-primary-dedicated/m-p/76874#M42454</link>
      <description>&lt;P&gt;can the LTE perform source NAT ? that could fix your issue easily&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;alternatively you could try setting up policy based forwarding with symmetric return path to have packets put into the VPN if they came out of it&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2016-04-22_11-17-18.png"&gt;&lt;img src="https://live.paloaltonetworks.com/skins/images/5DE745A4213343D2E26844B0146B285E/responsive_peak/images/image_not_found.png" alt="2016-04-22_11-17-18.png" /&gt;&lt;/span&gt;﻿&lt;/P&gt;</description>
      <pubDate>Fri, 22 Apr 2016 09:27:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/quot-lan-quot-interface-failover-configuration-primary-dedicated/m-p/76874#M42454</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2016-04-22T09:27:07Z</dc:date>
    </item>
    <item>
      <title>Re: "LAN" Interface Failover configuration - Primary: dedicated Line, Secondary: VPN</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/quot-lan-quot-interface-failover-configuration-primary-dedicated/m-p/76880#M42456</link>
      <description>&lt;P&gt;Hi reaper, thanks for your answer.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I do not have access to the LTE router but I can ask our ISP to do it but I am not sure if get your point.&lt;/P&gt;
&lt;P&gt;You mean that clients in the LTE Site2site got a different IP address than in the normal network and then I can configure different routes for that IP, right? I think that's not thaaaat easy because we have different networks in Location 1&lt;/P&gt;
&lt;P&gt;Management, DHCP, VoiP, dedicated customer network and the DHCP Server (dhcp relay configuration) for those networks is stored in Location 2.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I think I like your second solution more &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;If I understand you right I need the following setup&lt;/P&gt;
&lt;P&gt;For Primary:&lt;/P&gt;
&lt;P&gt;Like before, just entries in my routing table&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For secondary:&lt;/P&gt;
&lt;P&gt;PBF Rule1 for LAN:&lt;/P&gt;
&lt;P&gt;Source: Tunnel from LTE&lt;/P&gt;
&lt;P&gt;Destination: LAN on Location2&lt;/P&gt;
&lt;P&gt;Forwarding: Egress Interface = LAN Interface of the Firewall, Next Hop Address List = IP of the source Tunnel from LTE&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;PBF Rule2 for Internet:&lt;/P&gt;
&lt;P&gt;Source: Tunnel from LTE&lt;/P&gt;
&lt;P&gt;Destination: Everything&lt;/P&gt;
&lt;P&gt;Forwarding: Egress Interface = External Interface of the Firewall, Next Hop Address List = IP of the source Tunnel from LTE&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 22 Apr 2016 09:51:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/quot-lan-quot-interface-failover-configuration-primary-dedicated/m-p/76880#M42456</guid>
      <dc:creator>sd@censhare.com</dc:creator>
      <dc:date>2016-04-22T09:51:09Z</dc:date>
    </item>
    <item>
      <title>Re: "LAN" Interface Failover configuration - Primary: dedicated Line, Secondary: VPN</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/quot-lan-quot-interface-failover-configuration-primary-dedicated/m-p/76885#M42459</link>
      <description>&lt;P&gt;if the LTE performs source nat, the PaloAlto will see a whole different IP range when the backup is used, making routing as simple as adding a static route&lt;/P&gt;
&lt;P&gt;the source nat would simply contain a state table with a mapping to the different networks, it could be a many to one, or a many to one equally sized continuous subnet, or some other implementation... the LTE would be responsible for maintaining a state table and the amount of source networks should not matter&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;but indeed, this is either a quick and dirty fix OR will require some thought and might be a little complex if you want to do it properly&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;...&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;yes, those rules will make sure that IF something comes out of the tunnel, returning traffic is then not matched/processed by routing but pbf stuffs it all back into the tunnel as part of the symmetric return&lt;/P&gt;</description>
      <pubDate>Fri, 22 Apr 2016 11:17:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/quot-lan-quot-interface-failover-configuration-primary-dedicated/m-p/76885#M42459</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2016-04-22T11:17:30Z</dc:date>
    </item>
    <item>
      <title>Re: "LAN" Interface Failover configuration - Primary: dedicated Line, Secondary: VPN</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/quot-lan-quot-interface-failover-configuration-primary-dedicated/m-p/76888#M42460</link>
      <description>&lt;P&gt;okay, I will try it with the PBF rules next week and update this post.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Stephan&lt;/P&gt;</description>
      <pubDate>Fri, 22 Apr 2016 11:38:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/quot-lan-quot-interface-failover-configuration-primary-dedicated/m-p/76888#M42460</guid>
      <dc:creator>sd@censhare.com</dc:creator>
      <dc:date>2016-04-22T11:38:46Z</dc:date>
    </item>
    <item>
      <title>Re: "LAN" Interface Failover configuration - Primary: dedicated Line, Secondary: VPN</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/quot-lan-quot-interface-failover-configuration-primary-dedicated/m-p/77454#M42603</link>
      <description>&lt;P&gt;Hi there,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;i've tried the configuration, but looks like tunnel interfaces or zones can not be used for symmetric return. Any other idea? If you think it's useful I can post the screnshots of my configuration&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;TABLE cellpadding="3" cellspacing="0" width="100%"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD&gt;
&lt;P class="entry-desc"&gt;vsys1&lt;BR /&gt; Error: pbf rule 'LTE-LAN': Source cannot be zone if nexthop list is specified.&lt;BR /&gt; Error: pbf rule 'LTE-LAN': Fail to parse symmetric return.&lt;BR /&gt; Error: Failed to parse pbf policy&lt;BR /&gt; (Module: device)&lt;BR /&gt; Commit failed&lt;BR /&gt; &lt;BR /&gt; Warnings&lt;BR /&gt; &lt;BR /&gt; Error: pbf rule 'LTE-inet': Source interface cannot be tunnel interface when nexthop address list is configured.&lt;BR /&gt; Error: pbf rule 'LTE-inet': Fail to parse symmetric return.&lt;BR /&gt; Error: Failed to parse pbf policy&lt;BR /&gt; (Module: device)&lt;BR /&gt; Commit failed&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;</description>
      <pubDate>Tue, 03 May 2016 19:25:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/quot-lan-quot-interface-failover-configuration-primary-dedicated/m-p/77454#M42603</guid>
      <dc:creator>sd@censhare.com</dc:creator>
      <dc:date>2016-05-03T19:25:49Z</dc:date>
    </item>
    <item>
      <title>Re: "LAN" Interface Failover configuration - Primary: dedicated Line, Secondary: VPN</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/quot-lan-quot-interface-failover-configuration-primary-dedicated/m-p/77474#M42616</link>
      <description>&lt;P&gt;hm, sorry about that, was not aware this doesn't work on tunnel interfaces&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The other way you could achieve this is by reversing the routing/pbf part: set up&amp;nbsp;PBF&amp;nbsp;rules for&amp;nbsp;all traffic from and to the regular WAN link with symmetric return, then have a static route as fallback to the LTE VPN tunnel&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 04 May 2016 09:09:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/quot-lan-quot-interface-failover-configuration-primary-dedicated/m-p/77474#M42616</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2016-05-04T09:09:43Z</dc:date>
    </item>
    <item>
      <title>Re: "LAN" Interface Failover configuration - Primary: dedicated Line, Secondary: VPN</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/quot-lan-quot-interface-failover-configuration-primary-dedicated/m-p/78055#M42804</link>
      <description>&lt;P&gt;I solved the problem in that way:&lt;/P&gt;
&lt;P&gt;I've merged the primary routing configuration into PBF (withouth symmetric return) with zones as source addresses incl interface monitoring. My secondary connections - LTE - is managed via routing.&lt;/P&gt;
&lt;P&gt;All my traffic will be sent via the PBF policy and in case that the next hop is not reachable the PBF rule will be disabled and my static routing will send the traffic through the VPN tunnel.&lt;/P&gt;
&lt;P&gt;but:&lt;/P&gt;
&lt;P&gt;I still have problems with our IP telephones because they are not working when I switch the configuration to PBF like described above. I tested the basic network functionallity with a host in the telephone network and everythings is fine so it must be related to the SIP application etc. ALG is already disabled. The configuration and routing is nearly the same as for the dhcp network.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Any Idea why the network is working but the IP telephones not?&lt;/P&gt;</description>
      <pubDate>Fri, 13 May 2016 12:58:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/quot-lan-quot-interface-failover-configuration-primary-dedicated/m-p/78055#M42804</guid>
      <dc:creator>sd@censhare.com</dc:creator>
      <dc:date>2016-05-13T12:58:15Z</dc:date>
    </item>
    <item>
      <title>Re: "LAN" Interface Failover configuration - Primary: dedicated Line, Secondary: VPN</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/quot-lan-quot-interface-failover-configuration-primary-dedicated/m-p/78668#M42995</link>
      <description>&lt;P&gt;Mission impossible....I do not get it up and running with STUN....and after ~ 8 hours testing I will delay it to maybe end of the year....=/&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 25 May 2016 16:46:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/quot-lan-quot-interface-failover-configuration-primary-dedicated/m-p/78668#M42995</guid>
      <dc:creator>sd@censhare.com</dc:creator>
      <dc:date>2016-05-25T16:46:13Z</dc:date>
    </item>
  </channel>
</rss>

