<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: GlobalProtect with Active/Active HA in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-with-active-active-ha/m-p/230470#M66228</link>
    <description>&lt;P&gt;So here's what I ended up doing.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;One portal.&amp;nbsp; It's on a floating IP that floats from firewall to firewall as needed.&lt;/P&gt;&lt;P&gt;Two gateways, one for each firewall.&amp;nbsp; IP is on the interface itself, not floating.&amp;nbsp; Each gateway has its own block of IPs for VPN terminations.&amp;nbsp; Portal is configured to have both gateways with equal priority (let the client decide where to connect).&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So far this is the cleanest and removes the routing problem.&amp;nbsp; The only issue is that failover is not clean for users that are currently connected as the client has to terminate one tunnel and reconnect to the other gateway, but it does work.&lt;/P&gt;</description>
    <pubDate>Tue, 11 Sep 2018 18:24:43 GMT</pubDate>
    <dc:creator>howardtopher</dc:creator>
    <dc:date>2018-09-11T18:24:43Z</dc:date>
    <item>
      <title>GlobalProtect with Active/Active HA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-with-active-active-ha/m-p/229877#M66101</link>
      <description>&lt;P&gt;I'm having a hard time finding much, if any, documentation on this scenario.&amp;nbsp; I've tried a couple ways of doing it and they work, but I'm trying to figure out what the best way to do it while being as redundant as possible.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What I like the best so far is to have the portal and a gateway up on a floating IP so it can bounce from one firewall to the other as needed.&amp;nbsp; However, doing that adds a route to the virtual router on both firewalls for the tunnel (client) addresses.&amp;nbsp; If a client connects and gets terminated to the tunnel interface on firewall 1, accesses a service, and then return traffic comes back into firewall 2, it dies because it thinks the client is on that tunnel interface, when it isn't.&amp;nbsp; Does that make sense?&amp;nbsp; If there was a way to have the tunnel interface also follow the floating IP that would be great.&amp;nbsp; This would only install the route on the firewall that needs it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Another way I thought of doing it is a portal and gateway on firewall 1, and a portal and a gateway on firewall 2.&amp;nbsp; Then in my DNS, the portal DNS record (vpn.domain.com) answers with both portals and the gateway DNS record (gw.domain.com) answers with both gateways.&amp;nbsp; That doubles the configuration that has to be made, but solves the route being installed on both firewalls when clients are only connected to one firewall.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is there a proper way to do this?&lt;/P&gt;</description>
      <pubDate>Fri, 07 Sep 2018 01:45:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-with-active-active-ha/m-p/229877#M66101</guid>
      <dc:creator>howardtopher</dc:creator>
      <dc:date>2018-09-07T01:45:54Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect with Active/Active HA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-with-active-active-ha/m-p/229957#M66112</link>
      <description>&lt;P&gt;can you not just have different ip pools/subnets for each gateway.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;not sure about dual DNS entries as DNS will not offer both addresses, it will round robin between the two.&lt;/P&gt;&lt;P&gt;if gateway 2 goes down then the DNS may still offer GW2.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 07 Sep 2018 12:10:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-with-active-active-ha/m-p/229957#M66112</guid>
      <dc:creator>Mick_Ball</dc:creator>
      <dc:date>2018-09-07T12:10:29Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect with Active/Active HA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-with-active-active-ha/m-p/230028#M66139</link>
      <description>&lt;P&gt;Yes, the DNS will round robin, but the expectation is that if a gateway/portal had gone offline users would still be able to get to the remaining one.&amp;nbsp; There might be a delay as the connection times out and DNS gets hit again,&amp;nbsp; Just a thought, but configuring a double of everything is a big pain.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 07 Sep 2018 17:17:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-with-active-active-ha/m-p/230028#M66139</guid>
      <dc:creator>howardtopher</dc:creator>
      <dc:date>2018-09-07T17:17:47Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect with Active/Active HA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-with-active-active-ha/m-p/230470#M66228</link>
      <description>&lt;P&gt;So here's what I ended up doing.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;One portal.&amp;nbsp; It's on a floating IP that floats from firewall to firewall as needed.&lt;/P&gt;&lt;P&gt;Two gateways, one for each firewall.&amp;nbsp; IP is on the interface itself, not floating.&amp;nbsp; Each gateway has its own block of IPs for VPN terminations.&amp;nbsp; Portal is configured to have both gateways with equal priority (let the client decide where to connect).&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So far this is the cleanest and removes the routing problem.&amp;nbsp; The only issue is that failover is not clean for users that are currently connected as the client has to terminate one tunnel and reconnect to the other gateway, but it does work.&lt;/P&gt;</description>
      <pubDate>Tue, 11 Sep 2018 18:24:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-with-active-active-ha/m-p/230470#M66228</guid>
      <dc:creator>howardtopher</dc:creator>
      <dc:date>2018-09-11T18:24:43Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect with Active/Active HA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-with-active-active-ha/m-p/386286#M90226</link>
      <description>&lt;P&gt;I'd love to see Palo Alto support / moderators monitor threads and add links to official documentation about such topics: Active/active firewall and global protect (and/or panorama). I'd appreciate documentation that provides supported configurations in all possible scenarios including this one.&lt;/P&gt;</description>
      <pubDate>Wed, 17 Feb 2021 06:51:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-with-active-active-ha/m-p/386286#M90226</guid>
      <dc:creator>Klaverblad</dc:creator>
      <dc:date>2021-02-17T06:51:28Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect with Active/Active HA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-with-active-active-ha/m-p/1235733#M124934</link>
      <description>&lt;P&gt;Just to add an update to this post, how we got Global Protect working on a HA Active Active, running PANOS &lt;SPAN&gt;11.1.4-h7&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;One portal (which gets sync'd/shared between two firewalls).&amp;nbsp; It's on a floating IP that floats from firewall to firewall as needed.&lt;/LI&gt;
&lt;LI&gt;The subnet that floating IP is in, is advertised via two static routes, one each on both Active Primary and Active Secondary. For example, if floating IP 192.168.1.20/29 is in 192.168.1.16/29, and the external eBGP neighbor is 10.1.1.10, then&amp;nbsp;next hop for those static routes are to our upstream BGP peers. Active Primary static route has metric 10 and Active Secondary static route has metric of 30. Both static routes are advertised internally via OSPF before being redistributed into BGP.&lt;/LI&gt;
&lt;LI&gt;The floating IP is assigned to loopback.1 interface and loopback.1 interface does not have an IP address assigned to it&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;There are Two gateways, one for each firewall.&amp;nbsp; Gateway IP is on a physical interface itself, on each firewall, they not floating.&amp;nbsp; &lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Each gateway has its own block of IPs for VPN terminations.&amp;nbsp; &lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Portal is configured to have both gateways with equal priority (let the client decide where to connect).&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Source NAT is configured for each Gateway for its own block of IPs for VPN termination, from the VPN Zone to the Inside Zone and from VPN Zone to Outside Zone. Add VPN zone to any another zones that you may have, for access to those Zones&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Add firewall rule/policy that allows access to Portal IP 4501 UDP and 443. Feel free to secure it with additional Application filtering: panos-global-protect, ssl, web-browsing&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Good luck!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 08 Aug 2025 22:25:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-with-active-active-ha/m-p/1235733#M124934</guid>
      <dc:creator>M.Nguyen053341</dc:creator>
      <dc:date>2025-08-08T22:25:51Z</dc:date>
    </item>
  </channel>
</rss>

