<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: PA220 PANOS 8.0.7 Dual ISP in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/pa220-panos-8-0-7-dual-isp/m-p/197747#M58767</link>
    <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/7608"&gt;@reaper&lt;/a&gt;&amp;nbsp;hope your all good&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Did you manage to setup the route path monitoring lab?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do you think it's okay to monitor both default routes?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also I have setup tunnel monitoring.....I read you can configure this even if the tunnel is to a NON PA Device. Is this recommend? Anyway to truly test that the configured tunnel monitoring is doing as its meant to do?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Side note would you path monitor the tunnel routes if the tunnel monitoring is working.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Another side note is there any issues with path monitoring any of my routes. As surely if the route fails path monitoring then it just gets remove from the RIB and FIB&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 30 Jan 2018 23:50:23 GMT</pubDate>
    <dc:creator>Nick.Spender</dc:creator>
    <dc:date>2018-01-30T23:50:23Z</dc:date>
    <item>
      <title>PA220 PANOS 8.0.7 Dual ISP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa220-panos-8-0-7-dual-isp/m-p/197271#M58658</link>
      <description>&lt;P&gt;Hello Everyone&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I know there is a fair amount of information on this topic but I have a few issues/questions&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have a&amp;nbsp;PA220 with PANOS 8,0,7. My questions are relating to dual ISP connectivity. I would like to setup my PA with a backup ISP connection. I do have IPsec tunnels. But I am allowing for the second tunnel to negotiate when the backup ISP comes up. So both tunnels don't have to be "up and ready"&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have read the following article which is based on 2 VRs with PBFs to push traffic to the primary ISP with monitoring. When monitoring fails it will "failover" to use the second ISP&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/Configuration-Articles/How-to-Configure-a-Palo-Alto-Networks-Firewall-with-Dual-ISPs/ta-p/59774" target="_blank"&gt;https://live.paloaltonetworks.com/t5/Configuration-Articles/How-to-Configure-a-Palo-Alto-Networks-Firewall-with-Dual-ISPs/ta-p/59774&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have also read the following article which I believe is now available in PANOS 8. This configuration use 2 default routes. The first 1 will have a lower metric. Let's say 10 with monitoring enabled and the second default route has a higher metric let's say 50.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.paloaltonetworks.com/documentation/80/pan-os/pan-os/networking/static-routes/static-route-removal-based-on-path-monitoring.html" target="_blank"&gt;https://www.paloaltonetworks.com/documentation/80/pan-os/pan-os/networking/static-routes/static-route-removal-based-on-path-monitoring.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Basically can I achieve dual ISP with tunnels available on both untrusted ISP connections with the second article (default routes and path monitoring) Again I don't mind the short amount of time for tunnel negotiate. It's a branch office PA and I don't really want to configure 2 VRs.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you, really appreciate any help on this&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 28 Jan 2018 22:55:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa220-panos-8-0-7-dual-isp/m-p/197271#M58658</guid>
      <dc:creator>Nick.Spender</dc:creator>
      <dc:date>2018-01-28T22:55:04Z</dc:date>
    </item>
    <item>
      <title>Re: PA220 PANOS 8.0.7 Dual ISP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa220-panos-8-0-7-dual-isp/m-p/197324#M58664</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/82008"&gt;@Nick.Spender&lt;/a&gt;!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;yes, this should work&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The first article highlights a scenario that guarantees minimum downtime because both your tunnels are up. If a short downtime is not a big concern you can simply use the static route removal in PAN-OS 8.0&lt;/P&gt;</description>
      <pubDate>Mon, 29 Jan 2018 09:27:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa220-panos-8-0-7-dual-isp/m-p/197324#M58664</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2018-01-29T09:27:50Z</dc:date>
    </item>
    <item>
      <title>Re: PA220 PANOS 8.0.7 Dual ISP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa220-panos-8-0-7-dual-isp/m-p/197331#M58666</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/7608"&gt;@reaper&lt;/a&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you Reaper.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am testing path monitoring route now.....lets see how it goes&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for all your comments and replies&lt;/P&gt;</description>
      <pubDate>Mon, 29 Jan 2018 10:28:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa220-panos-8-0-7-dual-isp/m-p/197331#M58666</guid>
      <dc:creator>Nick.Spender</dc:creator>
      <dc:date>2018-01-29T10:28:08Z</dc:date>
    </item>
    <item>
      <title>Re: PA220 PANOS 8.0.7 Dual ISP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa220-panos-8-0-7-dual-isp/m-p/197374#M58676</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/7608"&gt;@reaper&lt;/a&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am setting up each above article, currently testing the path monitoring method for static routes. When I fail over the ISP I get a real strange issue. its not tearing down the tunnel connected to 1/1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Untitled1.png" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/13458i473E692AE99C7537/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Untitled1.png" alt="Untitled1.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 29 Jan 2018 14:11:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa220-panos-8-0-7-dual-isp/m-p/197374#M58676</guid>
      <dc:creator>Nick.Spender</dc:creator>
      <dc:date>2018-01-29T14:11:25Z</dc:date>
    </item>
    <item>
      <title>Re: PA220 PANOS 8.0.7 Dual ISP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa220-panos-8-0-7-dual-isp/m-p/197378#M58677</link>
      <description>&lt;P&gt;Did you enable tunnel monitor in the ipsec configuration?&lt;/P&gt;</description>
      <pubDate>Mon, 29 Jan 2018 14:19:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa220-panos-8-0-7-dual-isp/m-p/197378#M58677</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2018-01-29T14:19:26Z</dc:date>
    </item>
    <item>
      <title>Re: PA220 PANOS 8.0.7 Dual ISP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa220-panos-8-0-7-dual-isp/m-p/197380#M58678</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/7608"&gt;@reaper&lt;/a&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;No....As the other side isnt a PA &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 29 Jan 2018 14:20:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa220-panos-8-0-7-dual-isp/m-p/197380#M58678</guid>
      <dc:creator>Nick.Spender</dc:creator>
      <dc:date>2018-01-29T14:20:16Z</dc:date>
    </item>
    <item>
      <title>Re: PA220 PANOS 8.0.7 Dual ISP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa220-panos-8-0-7-dual-isp/m-p/197388#M58681</link>
      <description>&lt;P&gt;ah, that's a problem...&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ok so how about you only create one tunnel locally, since the remote end will remain the same destination IP, and create a dynamic tunnel on the remote end (identification of PANW peer by means of email address or hostname for phase1 instead of it's IP)&lt;/P&gt;
&lt;P&gt;then you could simply fail over the 1 tunnel to the second ISP and your remote peer will simply see a new tunnel com from a different source ip&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 29 Jan 2018 14:31:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa220-panos-8-0-7-dual-isp/m-p/197388#M58681</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2018-01-29T14:31:09Z</dc:date>
    </item>
    <item>
      <title>Re: PA220 PANOS 8.0.7 Dual ISP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa220-panos-8-0-7-dual-isp/m-p/197410#M58685</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/7608"&gt;@reaper&lt;/a&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When you say "&lt;SPAN&gt;hen you could simply fail over the 1 tunnel to the second ISP and your remote peer will simply see a new tunnel com from a different source ip" is that a manual process?&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thanks again &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 29 Jan 2018 14:58:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa220-panos-8-0-7-dual-isp/m-p/197410#M58685</guid>
      <dc:creator>Nick.Spender</dc:creator>
      <dc:date>2018-01-29T14:58:42Z</dc:date>
    </item>
    <item>
      <title>Re: PA220 PANOS 8.0.7 Dual ISP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa220-panos-8-0-7-dual-isp/m-p/197413#M58687</link>
      <description>&lt;P&gt;That should happen automnatically: your primary default gateway fails so your tunnel will resort to using the second default gateway to try and get to the remote end&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;thinking about this a bit more, maybe I should try reproduction in the lab... (haven't set this scenario up live yet, there may be complications)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;there are a few complicating factors that could ruin the party&lt;/P&gt;</description>
      <pubDate>Mon, 29 Jan 2018 15:23:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa220-panos-8-0-7-dual-isp/m-p/197413#M58687</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2018-01-29T15:23:42Z</dc:date>
    </item>
    <item>
      <title>Re: PA220 PANOS 8.0.7 Dual ISP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa220-panos-8-0-7-dual-isp/m-p/197414#M58688</link>
      <description>&lt;P&gt;I will give it a go&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/7608"&gt;@reaper&lt;/a&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 29 Jan 2018 15:24:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa220-panos-8-0-7-dual-isp/m-p/197414#M58688</guid>
      <dc:creator>Nick.Spender</dc:creator>
      <dc:date>2018-01-29T15:24:44Z</dc:date>
    </item>
    <item>
      <title>Re: PA220 PANOS 8.0.7 Dual ISP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa220-panos-8-0-7-dual-isp/m-p/197415#M58689</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/7608"&gt;@reaper&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;On a side note...Do you think the other article (the 2 VR method) would cause the same issues?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/Configuration-Articles/How-to-Configure-a-Palo-Alto-Networks-Firewall-with-Dual-ISPs/ta-p/59774" target="_blank"&gt;https://live.paloaltonetworks.com/t5/Configuration-Articles/How-to-Configure-a-Palo-Alto-Networks-Firewall-with-Dual-ISPs/ta-p/59774&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 29 Jan 2018 15:27:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa220-panos-8-0-7-dual-isp/m-p/197415#M58689</guid>
      <dc:creator>Nick.Spender</dc:creator>
      <dc:date>2018-01-29T15:27:29Z</dc:date>
    </item>
    <item>
      <title>Re: PA220 PANOS 8.0.7 Dual ISP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa220-panos-8-0-7-dual-isp/m-p/197417#M58690</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/82008"&gt;@Nick.Spender&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;I would just like to point out that you do not need two seperate VR's for this type of scneario. I have done it multiple times with just 1 VR and PBF with static route failover. THe other way is to use a dynamic routing protocol and add route costs to the link you call secondary.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Mon, 29 Jan 2018 15:33:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa220-panos-8-0-7-dual-isp/m-p/197417#M58690</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2018-01-29T15:33:38Z</dc:date>
    </item>
    <item>
      <title>Re: PA220 PANOS 8.0.7 Dual ISP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa220-panos-8-0-7-dual-isp/m-p/197419#M58692</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/27580"&gt;@OtakarKlier&lt;/a&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But what the 2 default routes?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;with 1 VR you cant use 2 default routes unless you use path monitoring for the 0.0.0.0/0 routes?&lt;/P&gt;</description>
      <pubDate>Mon, 29 Jan 2018 15:40:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa220-panos-8-0-7-dual-isp/m-p/197419#M58692</guid>
      <dc:creator>Nick.Spender</dc:creator>
      <dc:date>2018-01-29T15:40:50Z</dc:date>
    </item>
    <item>
      <title>Re: PA220 PANOS 8.0.7 Dual ISP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa220-panos-8-0-7-dual-isp/m-p/197420#M58693</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;There would only be one default route in the VR, e.g. the backup path. The PBF would be the primary route with a monitor and a disable option. Since PBF takes effect before the routing table, unless the PBF is down, the default route will not be used.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope that makes sense.&lt;/P&gt;</description>
      <pubDate>Mon, 29 Jan 2018 15:45:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa220-panos-8-0-7-dual-isp/m-p/197420#M58693</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2018-01-29T15:45:21Z</dc:date>
    </item>
    <item>
      <title>Re: PA220 PANOS 8.0.7 Dual ISP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa220-panos-8-0-7-dual-isp/m-p/197422#M58694</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/27580"&gt;@OtakarKlier&lt;/a&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Ah ok but then you run into this issue&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/Management-Articles/Policy-based-forwarding-doesn-t-work-for-traffic-sourced-from/ta-p/58821" target="_blank"&gt;https://live.paloaltonetworks.com/t5/Management-Articles/Policy-based-forwarding-doesn-t-work-for-traffic-sourced-from/ta-p/58821&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 29 Jan 2018 15:47:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa220-panos-8-0-7-dual-isp/m-p/197422#M58694</guid>
      <dc:creator>Nick.Spender</dc:creator>
      <dc:date>2018-01-29T15:47:11Z</dc:date>
    </item>
    <item>
      <title>Re: PA220 PANOS 8.0.7 Dual ISP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa220-panos-8-0-7-dual-isp/m-p/197425#M58695</link>
      <description>&lt;P&gt;Hmm, I currently have a site that has one ISP but connects to two different data centers. I use the PBF to send all ptraffic down one tunnel and it works just fine. I also have a site that has 1 p2p connection and a VPN tunnel to the same data center and the PBF also seems to work just fine. I think the newer code fixed the behavior in the article you mentioned?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Perhaps&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/7608"&gt;@reaper&lt;/a&gt;&amp;nbsp;can verify.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 29 Jan 2018 15:57:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa220-panos-8-0-7-dual-isp/m-p/197425#M58695</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2018-01-29T15:57:43Z</dc:date>
    </item>
    <item>
      <title>Re: PA220 PANOS 8.0.7 Dual ISP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa220-panos-8-0-7-dual-isp/m-p/197445#M58701</link>
      <description>&lt;P&gt;hi guys&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;please keep in mind the ipsec connection is a system sourced connection, so cannot be directed via pbf, but can via static routes, with or without separate VR depending on your needs (if the remote end has 2 ip's you won't need 2 VR necessarily because you can create 2 seperate identity ipsec connections)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;the traffic you put &lt;EM&gt;on&lt;/EM&gt; the tunnels is not system sourced so &lt;EM&gt;can&lt;/EM&gt; be controlled by pbf&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;the 2 vr method is so you can create 2 'live' tunnels to the &lt;EM&gt;same&lt;/EM&gt; endpoint, but as long as you can switch up parameters and add creative static routes, it is not mandatory&lt;/P&gt;</description>
      <pubDate>Mon, 29 Jan 2018 16:40:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa220-panos-8-0-7-dual-isp/m-p/197445#M58701</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2018-01-29T16:40:02Z</dc:date>
    </item>
    <item>
      <title>Re: PA220 PANOS 8.0.7 Dual ISP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa220-panos-8-0-7-dual-isp/m-p/197447#M58702</link>
      <description>&lt;P&gt;OK that makes more sense since my two tunnels are already up and connected. I do have static routes for the public IP endpoints of those tunnels and my PBF's only are for traffic behind the firewalls.&lt;/P&gt;</description>
      <pubDate>Mon, 29 Jan 2018 16:42:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa220-panos-8-0-7-dual-isp/m-p/197447#M58702</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2018-01-29T16:42:08Z</dc:date>
    </item>
    <item>
      <title>Re: PA220 PANOS 8.0.7 Dual ISP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa220-panos-8-0-7-dual-isp/m-p/197451#M58704</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/7608"&gt;@reaper&lt;/a&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hello Yeah that would be good if you could give it a test in your lab.....id like to know the out come.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 29 Jan 2018 17:37:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa220-panos-8-0-7-dual-isp/m-p/197451#M58704</guid>
      <dc:creator>Nick.Spender</dc:creator>
      <dc:date>2018-01-29T17:37:02Z</dc:date>
    </item>
    <item>
      <title>Re: PA220 PANOS 8.0.7 Dual ISP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa220-panos-8-0-7-dual-isp/m-p/197472#M58710</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/7608"&gt;@reaper&lt;/a&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Wouldn't I need 2 tunnels....as 1 is for the ISP 1 and the other is for ISP 2.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you.....&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 29 Jan 2018 20:10:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa220-panos-8-0-7-dual-isp/m-p/197472#M58710</guid>
      <dc:creator>Nick.Spender</dc:creator>
      <dc:date>2018-01-29T20:10:51Z</dc:date>
    </item>
  </channel>
</rss>

