<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic IPsec tunnel Failover between Two PA in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-failover-between-two-pa/m-p/213378#M62077</link>
    <description>I've two Palo Alto firewalls, PA-500 and PA-820.&lt;BR /&gt;My PA-500 is having 2 ISPs, so I've configured Tunnel monitoring as Failover on it. I think I've configured everything at right place on PA-500 which have 2 ISPs.&lt;BR /&gt;I'm not sure with the configuration at other end at PA-820 as my destination subnet is same, how should I configure same destination to go through single ISP PA to Dual ISP PA for tunnel Failover configuration at other end.</description>
    <pubDate>Mon, 07 May 2018 09:19:17 GMT</pubDate>
    <dc:creator>Pune_IT</dc:creator>
    <dc:date>2018-05-07T09:19:17Z</dc:date>
    <item>
      <title>IPsec tunnel Failover between Two PA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-failover-between-two-pa/m-p/213378#M62077</link>
      <description>I've two Palo Alto firewalls, PA-500 and PA-820.&lt;BR /&gt;My PA-500 is having 2 ISPs, so I've configured Tunnel monitoring as Failover on it. I think I've configured everything at right place on PA-500 which have 2 ISPs.&lt;BR /&gt;I'm not sure with the configuration at other end at PA-820 as my destination subnet is same, how should I configure same destination to go through single ISP PA to Dual ISP PA for tunnel Failover configuration at other end.</description>
      <pubDate>Mon, 07 May 2018 09:19:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-failover-between-two-pa/m-p/213378#M62077</guid>
      <dc:creator>Pune_IT</dc:creator>
      <dc:date>2018-05-07T09:19:17Z</dc:date>
    </item>
    <item>
      <title>Re: IPsec tunnel Failover between Two PA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-failover-between-two-pa/m-p/213432#M62085</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;What I do is use OSPF between the two so when the ISP's fail over, and the tunnel changes, the routes are updated. However you could setup a Policy Base Forwarding rule on the 820 and monitor the ISP A interface. I also use /32 addresses with static routes to make sure the systems monitor the proper path.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;/P&gt;</description>
      <pubDate>Mon, 07 May 2018 17:10:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-failover-between-two-pa/m-p/213432#M62085</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2018-05-07T17:10:10Z</dc:date>
    </item>
    <item>
      <title>Re: IPsec tunnel Failover between Two PA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-failover-between-two-pa/m-p/247603#M70438</link>
      <description>&lt;P&gt;I want to do the same thing from the sound of your description.&amp;nbsp; Is there anything special you had to do once you specified you wanted to use failover?&amp;nbsp; Where in the configuration do you configure the failover to point to the secondary vpn tunnel or does it failover to the secondary automatically since there are only two tunnels configured?&lt;/P&gt;</description>
      <pubDate>Fri, 25 Jan 2019 16:11:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-failover-between-two-pa/m-p/247603#M70438</guid>
      <dc:creator>itwebadmin</dc:creator>
      <dc:date>2019-01-25T16:11:22Z</dc:date>
    </item>
    <item>
      <title>Re: IPsec tunnel Failover between Two PA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-failover-between-two-pa/m-p/247604#M70439</link>
      <description>&lt;P&gt;This can be achived with regular static routes.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Static routes have monitoring feature also on them.&lt;/P&gt;</description>
      <pubDate>Fri, 25 Jan 2019 16:21:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-failover-between-two-pa/m-p/247604#M70439</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2019-01-25T16:21:33Z</dc:date>
    </item>
    <item>
      <title>Re: IPsec tunnel Failover between Two PA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-failover-between-two-pa/m-p/247605#M70440</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/15603"&gt;@Raido_Rattameister&lt;/a&gt;&amp;nbsp; I have an ip address assigned to the tunnel interface on each side of the vpn tunnel.&amp;nbsp; Example, tunnel.113 is assigned 1.1.1.1/32 and the other side, tunnel.17 is assigned 1.1.1.2/32.&amp;nbsp; They're also advertising/receiving routes across the tunnel vial ospf.&amp;nbsp; Would the static routes take the place of the ip addresses assigned to the ipsec tunnel ends?&amp;nbsp; I'll read up on the configuration options you mentioned.&amp;nbsp; Thanks!&lt;/P&gt;</description>
      <pubDate>Fri, 25 Jan 2019 16:33:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-failover-between-two-pa/m-p/247605#M70440</guid>
      <dc:creator>itwebadmin</dc:creator>
      <dc:date>2019-01-25T16:33:16Z</dc:date>
    </item>
    <item>
      <title>Re: IPsec tunnel Failover between Two PA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-failover-between-two-pa/m-p/247606#M70441</link>
      <description>&lt;P&gt;I guess you are not using Cloudflare DNS if you use 1.1.1.1 in firewall config &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;A title="https://1.1.1.1/" href="https://1.1.1.1/" target="_blank"&gt;https://1.1.1.1/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you have OSPF configured already then go ahead with that. Not all smaller environments have dynamic routing so static routes could work as well monitoring tunnel failover. That was the reason I mentioned it.&lt;/P&gt;</description>
      <pubDate>Fri, 25 Jan 2019 16:42:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-failover-between-two-pa/m-p/247606#M70441</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2019-01-25T16:42:45Z</dc:date>
    </item>
    <item>
      <title>Re: IPsec tunnel Failover between Two PA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-failover-between-two-pa/m-p/247609#M70442</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;Also if you want to make sure all traffic goes down one tunnel rather than both, you can set the second tunnel interface metric to something like 10000. That way the traffic will prefer the first ISP and if there is a failover event, it'll go down the second.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Fri, 25 Jan 2019 17:45:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-failover-between-two-pa/m-p/247609#M70442</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2019-01-25T17:45:26Z</dc:date>
    </item>
  </channel>
</rss>

