<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Fail-over VPN site-to-site in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/fail-over-vpn-site-to-site/m-p/249179#M70868</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have a PA with two VPNs configured. VPN-Main is the active one and if this vpn falls, the traffic must go through the other VPN-backup. The fact is that when the active VPN falls, the route that has the Palo Alto continues going through the previous VPN, it does not refresh the route and adds it through the new tunnel.&lt;BR /&gt;&lt;BR /&gt;This configuration worked when this deployment was done but suddenly stop working.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have configured a tunnel monitor with destination IP and profile fail-over.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In VPN Main (active):&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="1.JPG" style="width: 703px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/18636iAF13A6E87F8C114D/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="1.JPG" alt="1.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In VPN (backup):&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2.JPG" style="width: 700px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/18637i6EC3D794DE15D4DF/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="2.JPG" alt="2.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;And this is the route table:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="3.JPG" style="width: 720px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/18638i3247E5D4B36C2222/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="3.JPG" alt="3.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;tunnel.29 is the main (active). The metric is 2.&lt;/P&gt;&lt;P&gt;tunnel.27 is the backup. Metric is 5.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Why PA is not deleting the "active" route if the monitor ip is down through the vpn down.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 07 Feb 2019 11:40:10 GMT</pubDate>
    <dc:creator>BigPalo</dc:creator>
    <dc:date>2019-02-07T11:40:10Z</dc:date>
    <item>
      <title>Fail-over VPN site-to-site</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/fail-over-vpn-site-to-site/m-p/249179#M70868</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have a PA with two VPNs configured. VPN-Main is the active one and if this vpn falls, the traffic must go through the other VPN-backup. The fact is that when the active VPN falls, the route that has the Palo Alto continues going through the previous VPN, it does not refresh the route and adds it through the new tunnel.&lt;BR /&gt;&lt;BR /&gt;This configuration worked when this deployment was done but suddenly stop working.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have configured a tunnel monitor with destination IP and profile fail-over.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In VPN Main (active):&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="1.JPG" style="width: 703px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/18636iAF13A6E87F8C114D/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="1.JPG" alt="1.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In VPN (backup):&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2.JPG" style="width: 700px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/18637i6EC3D794DE15D4DF/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="2.JPG" alt="2.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;And this is the route table:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="3.JPG" style="width: 720px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/18638i3247E5D4B36C2222/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="3.JPG" alt="3.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;tunnel.29 is the main (active). The metric is 2.&lt;/P&gt;&lt;P&gt;tunnel.27 is the backup. Metric is 5.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Why PA is not deleting the "active" route if the monitor ip is down through the vpn down.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 07 Feb 2019 11:40:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/fail-over-vpn-site-to-site/m-p/249179#M70868</guid>
      <dc:creator>BigPalo</dc:creator>
      <dc:date>2019-02-07T11:40:10Z</dc:date>
    </item>
    <item>
      <title>Re: Fail-over VPN site-to-site</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/fail-over-vpn-site-to-site/m-p/249272#M70887</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;Its because they are static routes. For this type of config I would recommend one of the following.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For VPN tunnel A&lt;/P&gt;&lt;P&gt;Use Policy based forwarding with the monitoring and "&lt;SPAN&gt;Disable this rule if nexthop/monitor ip is unreachable" checked.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Then use a static route for tunnel B&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;The PAN will enforce PBF policies prior to the routing table so when the PBF disables its self the routing table takes affect.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;The second option is to use PBF for both tunnels and tunnel B lower on the list. The firewall reads these from top down so it will always prefer tunnel A unless it goes down then switch to tunnel B.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Hope that makes sense.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 07 Feb 2019 17:03:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/fail-over-vpn-site-to-site/m-p/249272#M70887</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2019-02-07T17:03:22Z</dc:date>
    </item>
    <item>
      <title>Re: Fail-over VPN site-to-site</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/fail-over-vpn-site-to-site/m-p/249411#M70925</link>
      <description>&lt;P&gt;Yes, but its not necesary PBF. It should be work only with tunnel monitoring&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/7-1/pan-os-admin/vpns/set-up-tunnel-monitoring" target="_blank"&gt;https://docs.paloaltonetworks.com/pan-os/7-1/pan-os-admin/vpns/set-up-tunnel-monitoring&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Whats the problem with static routes???&amp;nbsp; static route should dissapear when monitor ip is down.&lt;/P&gt;</description>
      <pubDate>Fri, 08 Feb 2019 09:03:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/fail-over-vpn-site-to-site/m-p/249411#M70925</guid>
      <dc:creator>BigPalo</dc:creator>
      <dc:date>2019-02-08T09:03:33Z</dc:date>
    </item>
    <item>
      <title>Re: Fail-over VPN site-to-site</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/fail-over-vpn-site-to-site/m-p/249415#M70926</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/85066"&gt;@BigPalo&lt;/a&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The static route will be removed from the FIB not the RIB - if you go to the VR and click "More runtime stats" -&amp;gt; "Forwarding Table" it shouldn't be there.&lt;/P&gt;</description>
      <pubDate>Fri, 08 Feb 2019 09:20:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/fail-over-vpn-site-to-site/m-p/249415#M70926</guid>
      <dc:creator>LukeBullimore</dc:creator>
      <dc:date>2019-02-08T09:20:55Z</dc:date>
    </item>
    <item>
      <title>Re: Fail-over VPN site-to-site</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/fail-over-vpn-site-to-site/m-p/249416#M70927</link>
      <description>&lt;P&gt;but the new traffic should use backup tunel, since the static route dissapear for active path.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 08 Feb 2019 11:25:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/fail-over-vpn-site-to-site/m-p/249416#M70927</guid>
      <dc:creator>BigPalo</dc:creator>
      <dc:date>2019-02-08T11:25:40Z</dc:date>
    </item>
    <item>
      <title>Re: Fail-over VPN site-to-site</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/fail-over-vpn-site-to-site/m-p/249458#M70939</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;In the static route, was the Route monitoring configured? Sorry if I missed it somewhere in the thread?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/8-0/pan-os-new-features/networking-features/static-route-removal-based-on-path-monitoring.html" target="_blank"&gt;https://docs.paloaltonetworks.com/pan-os/8-0/pan-os-new-features/networking-features/static-route-removal-based-on-path-monitoring.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Fri, 08 Feb 2019 15:27:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/fail-over-vpn-site-to-site/m-p/249458#M70939</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2019-02-08T15:27:02Z</dc:date>
    </item>
    <item>
      <title>Re: Fail-over VPN site-to-site</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/fail-over-vpn-site-to-site/m-p/249507#M70957</link>
      <description>&lt;P&gt;Hey&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/27580"&gt;@OtakarKlier&lt;/a&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I may be completely wrong here, but the way that I thought it worked was that if you had&amp;nbsp;&lt;STRONG&gt;tunnel monitoring&lt;/STRONG&gt; configured with action of 'fail-over' the actual failover mechanism works by removing any static routes associated with that tunnel interface from the FIB - effectively making it so you can start using another IPSec tunnel via routes in your RIB.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/vpns/set-up-site-to-site-vpn/set-up-tunnel-monitoring/define-a-tunnel-monitoring-profile.html#" target="_blank"&gt;https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/vpns/set-up-site-to-site-vpn/set-up-tunnel-monitoring/define-a-tunnel-monitoring-profile.html#&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Reading the documentation - when failover option is selected, tunnel interface is disabled so all routes with that tunnel interface are indeed removed from the FIB. So yes&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/85066"&gt;@BigPalo&lt;/a&gt;&amp;nbsp;this setup is valid and the traffic would start using the backup tunnel so long as your primary tunnel has tunnel monitoring with failover option set.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cheers,&lt;/P&gt;&lt;P&gt;Luke.&lt;/P&gt;</description>
      <pubDate>Fri, 08 Feb 2019 19:39:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/fail-over-vpn-site-to-site/m-p/249507#M70957</guid>
      <dc:creator>LukeBullimore</dc:creator>
      <dc:date>2019-02-08T19:39:05Z</dc:date>
    </item>
    <item>
      <title>Re: Fail-over VPN site-to-site</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/fail-over-vpn-site-to-site/m-p/249642#M70992</link>
      <description>&lt;P&gt;PanOS is 7.1.x. It this version there is no path monitoring in the static route.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Feb 2019 08:14:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/fail-over-vpn-site-to-site/m-p/249642#M70992</guid>
      <dc:creator>BigPalo</dc:creator>
      <dc:date>2019-02-11T08:14:57Z</dc:date>
    </item>
    <item>
      <title>Re: Fail-over VPN site-to-site</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/fail-over-vpn-site-to-site/m-p/249643#M70993</link>
      <description>&lt;P&gt;So the version is 7.1.x. We think that its all configured properly but we dont know why its not working&lt;/P&gt;</description>
      <pubDate>Mon, 11 Feb 2019 08:16:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/fail-over-vpn-site-to-site/m-p/249643#M70993</guid>
      <dc:creator>BigPalo</dc:creator>
      <dc:date>2019-02-11T08:16:23Z</dc:date>
    </item>
    <item>
      <title>Re: Fail-over VPN site-to-site</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/fail-over-vpn-site-to-site/m-p/249762#M71024</link>
      <description>&lt;P&gt;A ticket with support may help find the rason why.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Feb 2019 21:49:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/fail-over-vpn-site-to-site/m-p/249762#M71024</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2019-02-11T21:49:27Z</dc:date>
    </item>
    <item>
      <title>Re: Fail-over VPN site-to-site</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/fail-over-vpn-site-to-site/m-p/249792#M71033</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/85066"&gt;@BigPalo&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have similar setup (IPsec failover to secondary tunnel) for two different firewall deployments. Both are on 8.1.x, but the first one was configured back when the FW was still on 7.1.x&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I would say that your configuration seems OK - indeed you don't really need policy based routing (I still don't understand why there are instructions for doing such...). As &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/52796"&gt;@LukeBullimore&lt;/a&gt; mentioned the tunnel monitor will "disable", or bring down the logical tunnel interface, after that is is pure networking - any static routes assosiated with interface in down state will be removed from the FIB - there are still in RIB since they are static, but they are not active so they are not used to forward traffic.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The biggest "gotcha" with tunnel monitor is the encryption domain (proxy-IDs). I learned this through the hard way - If your tunnel is configured with multiple proxy IDs, FW will try to send pings to each of them. But in order for the pings to be successful your source and destination needs to match the proxy ID (interesting traffic needs to match the phase2 SAs)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For example:&lt;/P&gt;&lt;P&gt;ProxyID: local 10.10.10.0/24 - remote 20.20.20.0/24&lt;BR /&gt;tunnel.1 IP - 10.10.10.254/32 - tunnel monitor destination 20.20.20.254&lt;/P&gt;&lt;P&gt;The config above will work since you have only one ProxyID which is matching the source and destination addresses of the ping packet.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But if you have:&lt;/P&gt;&lt;P&gt;ProxyID-1: local 10.10.10.0/24 - remote 20.20.20.0/24&lt;/P&gt;&lt;P&gt;ProxyID-2: local 10.10.10.0/24 - remote 30.30.30.0/24&lt;BR /&gt;tunnel.1 IP - 10.10.10.254/32 - tunnel monitor destination 20.20.20.254&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here tunnel monitor will report that this tunnel is down. The reason for that is the FW will try to send ping for both proxy-IDs. Pings will success for the first one, but will fail for second proxy ID, because the destination is not matching the remote encrpytion. And all static routes assosiated with this tunnel will be inactive (not installed in the FIB)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So I would suggest to double check if the firewall is still believing that main tunnel is down:&lt;/P&gt;&lt;P&gt;- Under the GUI check tunnel status (the far right icon under IPsec Tunnels)&lt;/P&gt;&lt;P&gt;- Under GUI check statistics for tunnel monitor - show vpn flow name &amp;lt;name if your tunnel &amp;gt;&lt;/P&gt;&lt;P&gt;- If you have multiple proxy-id configured run above command for each proxy-id&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Feb 2019 09:37:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/fail-over-vpn-site-to-site/m-p/249792#M71033</guid>
      <dc:creator>aleksandar.astardzhiev</dc:creator>
      <dc:date>2019-02-12T09:37:17Z</dc:date>
    </item>
    <item>
      <title>Re: Fail-over VPN site-to-site</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/fail-over-vpn-site-to-site/m-p/249818#M71037</link>
      <description>&lt;P&gt;We dont use proxyIds. Its blank.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Feb 2019 11:21:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/fail-over-vpn-site-to-site/m-p/249818#M71037</guid>
      <dc:creator>BigPalo</dc:creator>
      <dc:date>2019-02-12T11:21:49Z</dc:date>
    </item>
    <item>
      <title>Re: Fail-over VPN site-to-site</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/fail-over-vpn-site-to-site/m-p/249820#M71039</link>
      <description>&lt;P&gt;What is the output of the commad:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;gt; show vpn flow name &amp;lt;name of your tunnel&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do you see statistics for the monitor? What are they showing?&lt;/P&gt;</description>
      <pubDate>Tue, 12 Feb 2019 12:08:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/fail-over-vpn-site-to-site/m-p/249820#M71039</guid>
      <dc:creator>aleksandar.astardzhiev</dc:creator>
      <dc:date>2019-02-12T12:08:13Z</dc:date>
    </item>
    <item>
      <title>Re: Fail-over VPN site-to-site</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/fail-over-vpn-site-to-site/m-p/249824#M71041</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/85066"&gt;@BigPalo&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is what i feel, i feel&amp;nbsp;you may face little trouble with this configuration&lt;/P&gt;&lt;P&gt;You have a default route through tunnel and have a tunnel monitoring with fail over in primary and wait-recover in secondary.&lt;/P&gt;&lt;P&gt;and if you dont have a static route to remote peers other that through tunnel,&lt;/P&gt;&lt;P&gt;consider following scenarios&lt;/P&gt;&lt;P&gt;1- primary tunnel-monitor&amp;nbsp; is up - everything works you wont face any issues,&lt;/P&gt;&lt;P&gt;2 - primary tunnel monitor is down - it makes tunnel disable and removes the route, second tunnel will become up and will have a default route through secondary tunnel. as you may not have a static route other than this to remote peer, primary monitoring might be keep on trying to rekey through seconday tunnel which may not be successful. what if your secondary tunnel aldo down now, as you have default monitoring(wait-recover), this tunnel will try to recover and route will be still there.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So i feel you should add a static route to remote peers not through tunnel, and no need of tunnel monitor in secondary as if first one succesfully rekeys, it will add a lower metric route.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Feb 2019 13:58:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/fail-over-vpn-site-to-site/m-p/249824#M71041</guid>
      <dc:creator>Abdul_Razaq</dc:creator>
      <dc:date>2019-02-12T13:58:13Z</dc:date>
    </item>
    <item>
      <title>Re: Fail-over VPN site-to-site</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/fail-over-vpn-site-to-site/m-p/249835#M71046</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/101029"&gt;@Abdul_Razaq&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;From the screenshots in the original post you can see his routes through the tunnels are not default routes.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Feb 2019 15:15:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/fail-over-vpn-site-to-site/m-p/249835#M71046</guid>
      <dc:creator>aleksandar.astardzhiev</dc:creator>
      <dc:date>2019-02-12T15:15:12Z</dc:date>
    </item>
    <item>
      <title>Re: Fail-over VPN site-to-site</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/fail-over-vpn-site-to-site/m-p/278848#M75685</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/70130"&gt;@aleksandar.astardzhiev&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have the same problem with failover VPN. We have 6 proxy IDs in the tunnel and the primary ipsec tunnel drops. You explained why it drops and now I am interested if you have maybe any solution for that problem?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;BR&lt;/P&gt;</description>
      <pubDate>Thu, 25 Jul 2019 07:35:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/fail-over-vpn-site-to-site/m-p/278848#M75685</guid>
      <dc:creator>LukaPecher</dc:creator>
      <dc:date>2019-07-25T07:35:11Z</dc:date>
    </item>
    <item>
      <title>Re: Fail-over VPN site-to-site</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/fail-over-vpn-site-to-site/m-p/279712#M75750</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/110317"&gt;@LukaPecher&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My solution was to split the proxy-id into separate IPsec tunnel configuration. It may sound very confusing, so I will try to explain it as clear as possible:&lt;/P&gt;&lt;P&gt;- You will need four ipsec tunnel - two tunnel to primary remote peer and two tunnel to secondary remote peer&lt;/P&gt;&lt;P&gt;- First two tunnels &lt;STRONG&gt;must be assigned with same tunnel interface &lt;/STRONG&gt;(let say tunnel.1) and same IKE gateway (remote peer)&lt;/P&gt;&lt;P&gt;- Second two tunnels also must be assigned to same tunnel interface - tunnel.2 and same remote peer&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- &lt;STRONG&gt;First primary&lt;/STRONG&gt; tunnel will be configure &lt;STRONG&gt;with tunnel monitor enabled&lt;/STRONG&gt; and with &lt;STRONG&gt;only one proxy-id&lt;/STRONG&gt;&lt;STRONG&gt; that match the source and dest of the monitor&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;- &lt;STRONG&gt;Second primary&lt;/STRONG&gt; tunnel will be configured with tunnel monitor &lt;STRONG&gt;disabled&lt;/STRONG&gt; and with as many proxy-id as you like/need, &lt;STRONG&gt;excluding the proxy-id &lt;/STRONG&gt;configured in the first primary&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Identical you need to configure the second two tunnels to the secondary remote peer.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So under Network &amp;gt; IPsec Tunnels you should have something like that:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 605px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/20798i33BF7D0BA2AE71C6/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;That way the tunnel monitor will send pings only via the correct proxy-id.&lt;/P&gt;&lt;P&gt;If the pings fail (for what ever reason), tunnel monitor will bring the logical tunnel interface. And because we are using the same tunnel interface for the second tunnel (to the primary peer without monitor), all the routes to tunnel.1 will be remove from FIB and traffic wil be redirected to secondary tunnel.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 29 Jul 2019 08:10:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/fail-over-vpn-site-to-site/m-p/279712#M75750</guid>
      <dc:creator>aleksandar.astardzhiev</dc:creator>
      <dc:date>2019-07-29T08:10:47Z</dc:date>
    </item>
    <item>
      <title>Re: Fail-over VPN site-to-site</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/fail-over-vpn-site-to-site/m-p/334103#M84322</link>
      <description>&lt;P&gt;How would pbf work with VPN.&amp;nbsp; I thought VPN traffic you could use pbf?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;</description>
      <pubDate>Thu, 18 Jun 2020 16:12:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/fail-over-vpn-site-to-site/m-p/334103#M84322</guid>
      <dc:creator>treese</dc:creator>
      <dc:date>2020-06-18T16:12:25Z</dc:date>
    </item>
    <item>
      <title>Re: Fail-over VPN site-to-site</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/fail-over-vpn-site-to-site/m-p/334107#M84323</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;Yes PBF can work. You would set the static route to the secondary tunnel and the PBF would point at the primary VPN with a tunnel monitor and disable of the policy.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="OtakarKlier_0-1592497578908.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/26252i12A3A3BAF62475D3/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="OtakarKlier_0-1592497578908.png" alt="OtakarKlier_0-1592497578908.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;The PBF takes effect prior to the Virtual Router, so if the PBF is disabled because of primary VPN down and tunnel monitor, the Virtual router then uses the static route that points at the secondary VPN tunnel.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;</description>
      <pubDate>Thu, 18 Jun 2020 16:27:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/fail-over-vpn-site-to-site/m-p/334107#M84323</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2020-06-18T16:27:37Z</dc:date>
    </item>
    <item>
      <title>Re: Fail-over VPN site-to-site</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/fail-over-vpn-site-to-site/m-p/334114#M84324</link>
      <description>&lt;P&gt;Ok in my situation I have 1 VPN tunnel as backup and the primary fiber circuit lives on our core switchs.&amp;nbsp; The VPN tunnel points to the VIP on our cores until I manually change routes on the Palo to move to vpn when fiber circuit failure occur.&amp;nbsp; The other side isn't owned by us and don't support BFD.&amp;nbsp; I have a flow direct set on cores to remove the primary route (when unavailable) and send the traffic to the FW to engage the VPN but the FW routes are static and trying to decide to use PBF if possible to switch the traffic.&amp;nbsp; The VIPs on cores won't ever go down and looked at tunnel monitoring and path monitoring too but not sure how well it would work with only one VPN tunnel and the primary route to the core VIP.&amp;nbsp; All thoughts are welcome.&amp;nbsp; Thank you&lt;/P&gt;</description>
      <pubDate>Thu, 18 Jun 2020 16:38:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/fail-over-vpn-site-to-site/m-p/334114#M84324</guid>
      <dc:creator>treese</dc:creator>
      <dc:date>2020-06-18T16:38:41Z</dc:date>
    </item>
  </channel>
</rss>

