<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Firewall - Interface High availablity in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/firewall-interface-high-availablity/m-p/241578#M69174</link>
    <description>&lt;P&gt;You could set up Palo interfaces in Layer 2 mode.&lt;/P&gt;&lt;P&gt;But check spanning tree settings so that it would block link between switches that goes through Palo and not between core switches &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
    <pubDate>Thu, 29 Nov 2018 14:21:34 GMT</pubDate>
    <dc:creator>Raido_Rattameister</dc:creator>
    <dc:date>2018-11-29T14:21:34Z</dc:date>
    <item>
      <title>Firewall - Interface High availablity</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/firewall-interface-high-availablity/m-p/241543#M69170</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="pa-220-ha.png" style="width: 545px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/17740i4B1B6B504D441497/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="pa-220-ha.png" alt="pa-220-ha.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;In my scenario, i have single PA-220 for guest access.&amp;nbsp; In trusted zone i would like to keep the interface lelvel (active/standby) high availablity.Interface type as L2.&amp;nbsp; I couldn't do aggregate interface since it's connected to two seperate switches.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;How we can achieve this.??&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in Advance..&lt;/P&gt;</description>
      <pubDate>Thu, 29 Nov 2018 08:08:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/firewall-interface-high-availablity/m-p/241543#M69170</guid>
      <dc:creator>gpsriram</dc:creator>
      <dc:date>2018-11-29T08:08:57Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall - Interface High availablity</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/firewall-interface-high-availablity/m-p/241578#M69174</link>
      <description>&lt;P&gt;You could set up Palo interfaces in Layer 2 mode.&lt;/P&gt;&lt;P&gt;But check spanning tree settings so that it would block link between switches that goes through Palo and not between core switches &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 29 Nov 2018 14:21:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/firewall-interface-high-availablity/m-p/241578#M69174</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2018-11-29T14:21:34Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall - Interface High availablity</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/firewall-interface-high-availablity/m-p/241582#M69178</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/15603"&gt;@Raido_Rattameister&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;You could set up Palo interfaces in Layer 2 mode.&lt;/P&gt;&lt;P&gt;But check spanning tree settings so that it would block link between switches that goes through Palo and not between core switches &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;I did this exact setup for a 220 HA pair.&amp;nbsp; With a 3750 stack.&amp;nbsp; I actually ended up using port-channels though on the internal and external interfaces.&amp;nbsp; This got me device redundancy&amp;nbsp;on both the firewall and switch side.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But like&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/15603"&gt;@Raido_Rattameister&lt;/a&gt;&amp;nbsp;mentioned.&amp;nbsp; an access vlan config to each switch should work just fine.&lt;/P&gt;</description>
      <pubDate>Thu, 29 Nov 2018 14:41:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/firewall-interface-high-availablity/m-p/241582#M69178</guid>
      <dc:creator>Brandon_Wertz</dc:creator>
      <dc:date>2018-11-29T14:41:49Z</dc:date>
    </item>
  </channel>
</rss>

