<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: IP Sec VPN Failover Paloalto FW – Cisco IOS in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ip-sec-vpn-failover-paloalto-fw-cisco-ios/m-p/273499#M75040</link>
    <description>&lt;P&gt;I configured the second tunnel and add on VR new route with metric 20, it looks like:&lt;/P&gt;&lt;P&gt;main route 10.28.28.0/24 tunnel5 metric 5&lt;/P&gt;&lt;P&gt;backup route&amp;nbsp;10.28.28.0/24 tunnel6 metric 20&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;How to Configure Tunnel monitor?&lt;/P&gt;&lt;P&gt;Tunnel monitor to configure on main tunnel?&lt;/P&gt;&lt;P&gt;What insert to Destination IP?&lt;/P&gt;&lt;P&gt;Example:&amp;nbsp;&lt;/P&gt;&lt;P&gt;Ip address interface Tunnel 5 172.16.30.1&amp;nbsp;&lt;/P&gt;&lt;P&gt;Ip address interface Tunnel 6 172.16.30.2&lt;/P&gt;&lt;P&gt;and Tunnel monitor 172.16.30.1?&lt;/P&gt;&lt;P&gt;Or it is wrong?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 27 Jun 2019 11:37:53 GMT</pubDate>
    <dc:creator>Tarczynski-SA</dc:creator>
    <dc:date>2019-06-27T11:37:53Z</dc:date>
    <item>
      <title>IP Sec VPN Failover Paloalto FW – Cisco IOS</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ip-sec-vpn-failover-paloalto-fw-cisco-ios/m-p/273391#M75030</link>
      <description>&lt;P&gt;Hello!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;How to configure a backup VPN?&lt;/P&gt;&lt;P&gt;The main VPN configured and worked, path monitoring worked&amp;nbsp;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot_9.jpg" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/20507i43889DDBE94A8483/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Screenshot_9.jpg" alt="Screenshot_9.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 27 Jun 2019 07:21:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ip-sec-vpn-failover-paloalto-fw-cisco-ios/m-p/273391#M75030</guid>
      <dc:creator>Tarczynski-SA</dc:creator>
      <dc:date>2019-06-27T07:21:52Z</dc:date>
    </item>
    <item>
      <title>Re: IP Sec VPN Failover Paloalto FW – Cisco IOS</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ip-sec-vpn-failover-paloalto-fw-cisco-ios/m-p/273451#M75034</link>
      <description>a 'clean' (but not the only) solution is to put the second ISP on a separate VirtualRouter and configure the second tunnel on that VR. Then use PBF to direct traffic inside the tunnel

&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClFiCAK" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClFiCAK&lt;/A&gt;</description>
      <pubDate>Thu, 27 Jun 2019 09:29:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ip-sec-vpn-failover-paloalto-fw-cisco-ios/m-p/273451#M75034</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2019-06-27T09:29:56Z</dc:date>
    </item>
    <item>
      <title>Re: IP Sec VPN Failover Paloalto FW – Cisco IOS</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ip-sec-vpn-failover-paloalto-fw-cisco-ios/m-p/273454#M75036</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/72617"&gt;@Tarczynski-SA&lt;/a&gt;&amp;nbsp;, you can create a secondary tunnel and add route of remote LAN with higher metric through that tunnel. you need to have tunnel monitoring enabled in primary to remove the primary static route from the routing table, so once the primary tunnel is down, the route willl be trough secondary tunnel, and the tunnel will come up.&lt;/P&gt;</description>
      <pubDate>Thu, 27 Jun 2019 09:58:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ip-sec-vpn-failover-paloalto-fw-cisco-ios/m-p/273454#M75036</guid>
      <dc:creator>Abdul_Razaq</dc:creator>
      <dc:date>2019-06-27T09:58:08Z</dc:date>
    </item>
    <item>
      <title>Re: IP Sec VPN Failover Paloalto FW – Cisco IOS</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ip-sec-vpn-failover-paloalto-fw-cisco-ios/m-p/273499#M75040</link>
      <description>&lt;P&gt;I configured the second tunnel and add on VR new route with metric 20, it looks like:&lt;/P&gt;&lt;P&gt;main route 10.28.28.0/24 tunnel5 metric 5&lt;/P&gt;&lt;P&gt;backup route&amp;nbsp;10.28.28.0/24 tunnel6 metric 20&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;How to Configure Tunnel monitor?&lt;/P&gt;&lt;P&gt;Tunnel monitor to configure on main tunnel?&lt;/P&gt;&lt;P&gt;What insert to Destination IP?&lt;/P&gt;&lt;P&gt;Example:&amp;nbsp;&lt;/P&gt;&lt;P&gt;Ip address interface Tunnel 5 172.16.30.1&amp;nbsp;&lt;/P&gt;&lt;P&gt;Ip address interface Tunnel 6 172.16.30.2&lt;/P&gt;&lt;P&gt;and Tunnel monitor 172.16.30.1?&lt;/P&gt;&lt;P&gt;Or it is wrong?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 27 Jun 2019 11:37:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ip-sec-vpn-failover-paloalto-fw-cisco-ios/m-p/273499#M75040</guid>
      <dc:creator>Tarczynski-SA</dc:creator>
      <dc:date>2019-06-27T11:37:53Z</dc:date>
    </item>
    <item>
      <title>Re: IP Sec VPN Failover Paloalto FW – Cisco IOS</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ip-sec-vpn-failover-paloalto-fw-cisco-ios/m-p/273500#M75041</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/72617"&gt;@Tarczynski-SA&lt;/a&gt;&amp;nbsp;, You need to configure tunnel monitor on main tunnel. Destination IP can be any pingable IP reachable through tunnel(IP at cisco side). Please note that the source of this monitor ping will be tunnel IP, make sure this communication is added in proxy ID ( &lt;SPAN&gt;172.16.30.1 to destination)&lt;/SPAN&gt;. Monitor profile should be 'fail-over'.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Follow this document for tunnel monitor configuration,&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/8-0/pan-os-admin/vpns/set-up-site-to-site-vpn/set-up-tunnel-monitoring/define-a-tunnel-monitoring-profile.html#" target="_blank"&gt;https://docs.paloaltonetworks.com/pan-os/8-0/pan-os-admin/vpns/set-up-site-to-site-vpn/set-up-tunnel-monitoring/define-a-tunnel-monitoring-profile.html#&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 27 Jun 2019 11:57:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ip-sec-vpn-failover-paloalto-fw-cisco-ios/m-p/273500#M75041</guid>
      <dc:creator>Abdul_Razaq</dc:creator>
      <dc:date>2019-06-27T11:57:10Z</dc:date>
    </item>
  </channel>
</rss>

