<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Best config to speed up HA failover in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/best-config-to-speed-up-ha-failover/m-p/279800#M75771</link>
    <description>&lt;P&gt;Do you use pppoe for the internet connection?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 29 Jul 2019 16:41:25 GMT</pubDate>
    <dc:creator>Retired Member</dc:creator>
    <dc:date>2019-07-29T16:41:25Z</dc:date>
    <item>
      <title>Best config to speed up HA failover</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/best-config-to-speed-up-ha-failover/m-p/279777#M75767</link>
      <description>&lt;P&gt;During the last PAN OS upgrade we had to failover between two firewalls in HA configuration. The failover time takes unusually amount of time during which the Internet access was unavailable. It took approximately 10-15 lost pings (to internet host) for passive to become an active. We had opened a case with PAN support and our zoom meeting was dropping, it was reconnecting after about 15 sec automatically. In one of my previous jobs the failover was taking very quickly, i would lost 1 or 2 pings 8.8.8.8..&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Our HA setup is like this:&lt;/P&gt;&lt;P&gt;HA1 - over aux-1&lt;/P&gt;&lt;P&gt;HA2 - over eth1/10&lt;/P&gt;&lt;P&gt;Mode is active-passive/the config sync is enabled/passive link state is auto/preemptive is not setup/LACP-LLDP is not configured/Link and path monitorings are enabled/&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Wondering if someone had simmilar experience and what was the solution to speed up the failover.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 29 Jul 2019 15:44:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/best-config-to-speed-up-ha-failover/m-p/279777#M75767</guid>
      <dc:creator>DraganMilojevic</dc:creator>
      <dc:date>2019-07-29T15:44:05Z</dc:date>
    </item>
    <item>
      <title>Re: Best config to speed up HA failover</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/best-config-to-speed-up-ha-failover/m-p/279790#M75769</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;This is the best practice for upgrades. Hopefully you didnt just reboot the firewall and instead used the 'Ssupend' Feature.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClRrCAK" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClRrCAK&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Mon, 29 Jul 2019 16:05:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/best-config-to-speed-up-ha-failover/m-p/279790#M75769</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2019-07-29T16:05:22Z</dc:date>
    </item>
    <item>
      <title>Re: Best config to speed up HA failover</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/best-config-to-speed-up-ha-failover/m-p/279800#M75771</link>
      <description>&lt;P&gt;Do you use pppoe for the internet connection?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 29 Jul 2019 16:41:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/best-config-to-speed-up-ha-failover/m-p/279800#M75771</guid>
      <dc:creator>Retired Member</dc:creator>
      <dc:date>2019-07-29T16:41:25Z</dc:date>
    </item>
    <item>
      <title>Re: Best config to speed up HA failover</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/best-config-to-speed-up-ha-failover/m-p/279816#M75772</link>
      <description>&lt;P&gt;No, it is a "normal" ISP connection, 50Mbps&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 29 Jul 2019 18:32:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/best-config-to-speed-up-ha-failover/m-p/279816#M75772</guid>
      <dc:creator>DraganMilojevic</dc:creator>
      <dc:date>2019-07-29T18:32:20Z</dc:date>
    </item>
    <item>
      <title>Re: Best config to speed up HA failover</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/best-config-to-speed-up-ha-failover/m-p/279817#M75773</link>
      <description>&lt;P&gt;Appreciate your concern; i have been working with PAN for a quite some time and never had an issue with OS upgrade but that was not my question...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 29 Jul 2019 18:33:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/best-config-to-speed-up-ha-failover/m-p/279817#M75773</guid>
      <dc:creator>DraganMilojevic</dc:creator>
      <dc:date>2019-07-29T18:33:42Z</dc:date>
    </item>
    <item>
      <title>Re: Best config to speed up HA failover</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/best-config-to-speed-up-ha-failover/m-p/279887#M75785</link>
      <description>&lt;P&gt;this sounds like a spanning-tree issue- the time it takes for that port to come up - could be STP going through the listening learning .....stages&lt;/P&gt;</description>
      <pubDate>Tue, 30 Jul 2019 02:35:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/best-config-to-speed-up-ha-failover/m-p/279887#M75785</guid>
      <dc:creator>Sec101</dc:creator>
      <dc:date>2019-07-30T02:35:58Z</dc:date>
    </item>
    <item>
      <title>Re: Best config to speed up HA failover</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/best-config-to-speed-up-ha-failover/m-p/279888#M75786</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/115126"&gt;@DraganMilojevic&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;What&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/27580"&gt;@OtakarKlier&lt;/a&gt;&amp;nbsp;was rightfully pointing out was that the proper upgrade procedure would likely have prevented any extended failover outage, as it's a 'clean' way of switching active status to the other peer. If you simply restarted the firewall as part of the upgrade procedure without suspending it, there are a variety of settings that could cause an extended period of time to elapse before traffic starts flowing through the peer unit. If this is the case, we could actually recommend looking at different log files instead of looking for configuration / configuration issues that would cause extended failover time.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;There are a variety of settings that I would look at to narrow it down. The first being if LACP aggregates are in use at all, then the HA timer settings deployed on the device, that STP is setup correctly on your switches (took me to long to type this reply,&amp;nbsp; +1 to&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/59122"&gt;@Sec101&lt;/a&gt;&amp;nbsp;for being technically the first person to bring up STP), and lastly what&amp;nbsp;@Retired Member&amp;nbsp;mentioned with his PPOE suggestion. You've already said no to two of the four, so the remaining two are things you should look into.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;FYI, your comment to&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/27580"&gt;@OtakarKlier&lt;/a&gt;&amp;nbsp;came off a little rude. Please keep in mind that some suggestions or comments, when answered, will lead to your solution. As mentioned earlier, the order that you performed the upgrade is actually&amp;nbsp;&lt;EM&gt;highly&lt;/EM&gt; important in knowing where we should actually be looking for issues. So if you didn't actually follow recommended procedures, we kinda need to know about it so we don't send you down a rabbit hole troubleshooting the wrong thing.&lt;/P&gt;&lt;P&gt;Unless someone has the title 'Community Manager', everyone that comments on this post is devoting time out of our day to help you answer a question/problem you are having. Please consider that when responding to someone spending part of their day helping others on this forum.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 30 Jul 2019 02:56:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/best-config-to-speed-up-ha-failover/m-p/279888#M75786</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2019-07-30T02:56:50Z</dc:date>
    </item>
    <item>
      <title>Re: Best config to speed up HA failover</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/best-config-to-speed-up-ha-failover/m-p/280000#M75807</link>
      <description>&lt;P&gt;Thanks Sec101, appreciate your comment; i dont think the issue is STP since firewalls are conencted directly; no switch in between.&lt;/P&gt;</description>
      <pubDate>Tue, 30 Jul 2019 14:45:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/best-config-to-speed-up-ha-failover/m-p/280000#M75807</guid>
      <dc:creator>DraganMilojevic</dc:creator>
      <dc:date>2019-07-30T14:45:32Z</dc:date>
    </item>
    <item>
      <title>Re: Best config to speed up HA failover</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/best-config-to-speed-up-ha-failover/m-p/280001#M75808</link>
      <description>&lt;P&gt;Thanks BPry, appreciate your comment and time spent answering question.&lt;BR /&gt;The 'power off' upgrade process was less likely applicable for my case as i mentioned in the original post that during my previous jobs i had successfully performed PAN OS upgrade, losing 1,2 pings which makes me believe i did follow the upgrade process properly and not just powering off the firewall. I would suspect that powering off the firewall will cause more lost pings.&lt;BR /&gt;I am leaning more towards LACP settings at this moment.&lt;BR /&gt;I am strong believer that this community is a great place to get answer, sharing ideas, best practice, tips and trick and that everyone's time is valuable, including mine. Being in this line of work for quite some time, i do understand the importance of right information so i am trying to put as much useful details in the original post as possible which should allow people willing to assist to be pointed into right direction. If there is not enough information, it is much easier to ask question instead making assumptions. I think everyone will benefit from this..&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 30 Jul 2019 15:06:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/best-config-to-speed-up-ha-failover/m-p/280001#M75808</guid>
      <dc:creator>DraganMilojevic</dc:creator>
      <dc:date>2019-07-30T15:06:50Z</dc:date>
    </item>
    <item>
      <title>Re: Best config to speed up HA failover</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/best-config-to-speed-up-ha-failover/m-p/280020#M75817</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;Also in version 8 you can modify the parameters that are used to speed this up a bit. Device tab-&amp;gt;high availability-&amp;gt;General tab-&amp;gt;election settings. I would say set them to aggressive and give it a test.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Tue, 30 Jul 2019 18:27:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/best-config-to-speed-up-ha-failover/m-p/280020#M75817</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2019-07-30T18:27:14Z</dc:date>
    </item>
    <item>
      <title>Re: Best config to speed up HA failover</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/best-config-to-speed-up-ha-failover/m-p/281552#M75971</link>
      <description>&lt;P&gt;Thanks, i will try that in my next maintenance window.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 07 Aug 2019 15:47:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/best-config-to-speed-up-ha-failover/m-p/281552#M75971</guid>
      <dc:creator>DraganMilojevic</dc:creator>
      <dc:date>2019-08-07T15:47:25Z</dc:date>
    </item>
    <item>
      <title>Re: Best config to speed up HA failover</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/best-config-to-speed-up-ha-failover/m-p/281567#M75973</link>
      <description>&lt;P&gt;I'm going to concur with sec101 on this.&amp;nbsp; If your switch ports are not set to go straight into the forwarding state, you may have delays while STP goes through it's learning process.&amp;nbsp; 15s sounds about right.&amp;nbsp; If you are using Cisco equipment, that's the default learning timer.&amp;nbsp; I'm not sure how this is affected by Passive Link State: auto, but you should probably have these ports in "portfast" mode (Cisco speak) or "edge" mode (Juniper speak) either way.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/lan-switching/spanning-tree-protocol/19120-122.html" target="_blank" rel="noopener"&gt;https://www.cisco.com/c/en/us/support/docs/lan-switching/spanning-tree-protocol/19120-122.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;forward delay&lt;/STRONG&gt;&lt;SPAN&gt;—The forward delay is the time that is spent in the listening and learning state. This time is equal to &lt;STRONG&gt;15 sec by default&lt;/STRONG&gt;, but you can tune the time to be between 4 and 30 sec.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;PS - Also agree with using "suspend" instead of just reboot for HA failover.&amp;nbsp; Upgrade the Passive node first thus reducing your failover to a single event as well.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 07 Aug 2019 16:24:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/best-config-to-speed-up-ha-failover/m-p/281567#M75973</guid>
      <dc:creator>jeremy.larsen</dc:creator>
      <dc:date>2019-08-07T16:24:47Z</dc:date>
    </item>
    <item>
      <title>Re: Best config to speed up HA failover</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/best-config-to-speed-up-ha-failover/m-p/536979#M110289</link>
      <description>&lt;P&gt;Dragan,&amp;nbsp; wondering if you ever got a solution for this issue?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We are having the same.&amp;nbsp; &amp;nbsp;I have a new pair of PA-440s with 8 Ethernet ports plus one management port.&amp;nbsp; There are no dedicated HA ports on the model.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Firewalls are currently running PAN-OS 10.2.3-h4.&lt;/P&gt;
&lt;P&gt;Eth1/1 is the external interface&lt;/P&gt;
&lt;P&gt;Eth1/2 is the internal network&lt;/P&gt;
&lt;P&gt;Eth1/3 is the management network&lt;/P&gt;
&lt;P&gt;Eth1/4 is unused&lt;/P&gt;
&lt;P&gt;Eth1/5 is used for HA1&lt;/P&gt;
&lt;P&gt;Eth1/6 is used for HA1 Backup&lt;/P&gt;
&lt;P&gt;Eth1/7 is used for HA2&lt;/P&gt;
&lt;P&gt;Eth1/8 is used for HA2 Backup&lt;/P&gt;
&lt;P&gt;HA setup is active/passive&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The management port goes to a switchport configured for the management VLAN.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;There is a Cisco Catalyst 9300 switch.&amp;nbsp; Three VLANs are configured for EXTERNAL, INTERNAL and MANAGEMENT.&lt;/P&gt;
&lt;P&gt;All the switch ports that the PA firewalls are connected to are set to portfast mode.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have a constant ping running from a computer behind the firewall to 8.8.8.8&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;When I go to the active firewall to Device, High Availability, Operational Commands and suspend it, I lose ping responses for close to 30 seconds and then it recovers.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The HA election settings were initially set to Recommended.&amp;nbsp; I set them to Aggressive on both, committed the changes, and suspended the current active one -- still 30 second data loss.&amp;nbsp; &amp;nbsp;I went to Aggressive mode and was going to try setting some values lower, but several of them are apparently at their minimum value in Advanced mode.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;No aggregate ports are configured on the firewalls, no LACP is in use -- all connections are singletons.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Config sync is on&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Anyone have any suggestions?&lt;/P&gt;</description>
      <pubDate>Wed, 29 Mar 2023 21:00:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/best-config-to-speed-up-ha-failover/m-p/536979#M110289</guid>
      <dc:creator>dgsans</dc:creator>
      <dc:date>2023-03-29T21:00:28Z</dc:date>
    </item>
    <item>
      <title>Re: Best config to speed up HA failover</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/best-config-to-speed-up-ha-failover/m-p/537023#M110290</link>
      <description>&lt;P&gt;30 second data loss is definitely configuration issue.&lt;/P&gt;
&lt;P&gt;Check your switch configs (spanning tree, LACP etc).&lt;/P&gt;
&lt;P&gt;HA default timers will give you 0-1 lost ping during failover. No need to adjust HA to aggressive mode.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;By default passive will keep it's interfaces in shut mode and this can take time until switch will enable interfaces.&lt;/P&gt;
&lt;P&gt;Auto mode gives faster failover as swithport is already up but without knowing config on switch side I can't give any recommendations.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 30 Mar 2023 00:54:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/best-config-to-speed-up-ha-failover/m-p/537023#M110290</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2023-03-30T00:54:55Z</dc:date>
    </item>
    <item>
      <title>Re: Best config to speed up HA failover</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/best-config-to-speed-up-ha-failover/m-p/537103#M110300</link>
      <description>&lt;P&gt;I did find one config setting to improve on the PAs.&amp;nbsp; Under Device, High Availability, General, Active/Passive Settings, I had Passive Link State set to Shutdown -- I changed this to Auto on both firewalls, committed and tried again.&amp;nbsp; &amp;nbsp;Now its about 12-13 seconds of data loss during the switchover.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am not using LACP on the switch -- each firewall has one connection to one switch for each of the three VLANs.&lt;/P&gt;
&lt;P&gt;All the switch ports that the firewalls are connected to have portfast enabled.&amp;nbsp; Are there other spanning tree related configurations to check on a Cisco switch when set for portfast?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Thu, 30 Mar 2023 13:00:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/best-config-to-speed-up-ha-failover/m-p/537103#M110300</guid>
      <dc:creator>dgsans</dc:creator>
      <dc:date>2023-03-30T13:00:48Z</dc:date>
    </item>
    <item>
      <title>Re: Best config to speed up HA failover</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/best-config-to-speed-up-ha-failover/m-p/537171#M110313</link>
      <description>&lt;P&gt;In Passive Palo add capture filter that includes non-ip.&lt;/P&gt;
&lt;P&gt;If you can't find really calm moment (during offhours) with low traffic volume then choose only one low utilization interface to reduce amount of data logged.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Send retrieve and transit captures into same file.&lt;/P&gt;
&lt;P&gt;Start capture.&lt;/P&gt;
&lt;P&gt;Send active firewall to reboot.&lt;/P&gt;
&lt;P&gt;Wait until traffic starts flowing.&lt;/P&gt;
&lt;P&gt;Stop capture.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Raido_Rattameister_0-1680233128398.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/49172i277261177C4F7185/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="Raido_Rattameister_0-1680233128398.png" alt="Raido_Rattameister_0-1680233128398.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Analyze how long it takes from Palo sending out&amp;nbsp;gratuitous arp until traffic started flowing in. If it is 15 seconds then go and analyze why it takes switch so long to switch ports active.&lt;/P&gt;
&lt;P&gt;If you are inside then you can ping firewall IP then it is easy to filter based on arp and ping packets to identify the delay.&lt;/P&gt;
&lt;P&gt;Are there any other packets in between arp going out and ping coming in that might reveal what is going on on the switchport?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 31 Mar 2023 03:32:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/best-config-to-speed-up-ha-failover/m-p/537171#M110313</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2023-03-31T03:32:13Z</dc:date>
    </item>
    <item>
      <title>Re: Best config to speed up HA failover</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/best-config-to-speed-up-ha-failover/m-p/537226#M110316</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/175832"&gt;@dgsans&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;That time window sounds eerily close to the STP forward delay timer.&lt;/P&gt;
&lt;P&gt;Can you share the output from both switches of:&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;show interface &amp;lt;firewall_uplink&amp;gt; switchport
show spanning-tree vlan &amp;lt;firewall_trunk_vlans&amp;gt;&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;cheers,&lt;/P&gt;
&lt;P&gt;Seb.&lt;/P&gt;</description>
      <pubDate>Fri, 31 Mar 2023 11:05:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/best-config-to-speed-up-ha-failover/m-p/537226#M110316</guid>
      <dc:creator>seb_rupik</dc:creator>
      <dc:date>2023-03-31T11:05:50Z</dc:date>
    </item>
    <item>
      <title>Re: Best config to speed up HA failover</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/best-config-to-speed-up-ha-failover/m-p/537638#M110395</link>
      <description>&lt;P&gt;Output of those commands for all three interfaces that one of the firewalls is connected to.&amp;nbsp; Yes, it does seem to correlate to forward delay timer value.&amp;nbsp; But if switch ports are in portfast mode, shouldn't it be coming up right away?&amp;nbsp; If this is a small office with only the one switch, should I just disable STP on the VLANs connected to the firewall or is there an adjustment to be made to the forward, hello, or other timers for STP to get intentional failover to take only 1 second?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Tue, 04 Apr 2023 19:38:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/best-config-to-speed-up-ha-failover/m-p/537638#M110395</guid>
      <dc:creator>dgsans</dc:creator>
      <dc:date>2023-04-04T19:38:53Z</dc:date>
    </item>
    <item>
      <title>Re: Best config to speed up HA failover</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/best-config-to-speed-up-ha-failover/m-p/537712#M110421</link>
      <description>&lt;P&gt;Hi there,&lt;/P&gt;
&lt;P&gt;If the firewall HA Passive link state set to auto? This should set the link state to UP for the passive firewall. The switchport on the other end should be in a Forwarding state if PortFast has been enabled.&lt;/P&gt;
&lt;P&gt;Were you able to gather the switch output requested before?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;cheers,&lt;/P&gt;
&lt;P&gt;Seb.&lt;/P&gt;</description>
      <pubDate>Wed, 05 Apr 2023 10:16:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/best-config-to-speed-up-ha-failover/m-p/537712#M110421</guid>
      <dc:creator>seb_rupik</dc:creator>
      <dc:date>2023-04-05T10:16:46Z</dc:date>
    </item>
    <item>
      <title>Re: Best config to speed up HA failover</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/best-config-to-speed-up-ha-failover/m-p/537717#M110424</link>
      <description>&lt;P&gt;Yes, the HA Passive Link State is set to auto.&amp;nbsp; I see the interfaces as Green on the Dashboard on both firewalls.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Whoops, I forgot to paste the switch output in last reply.&amp;nbsp; Here it is:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;swt-acc#sho interfaces gigabitEthernet 1/0/3 switchport&lt;BR /&gt;Name: Gi1/0/3&lt;BR /&gt;Switchport: Enabled&lt;BR /&gt;Administrative Mode: static access&lt;BR /&gt;Operational Mode: static access&lt;BR /&gt;Administrative Trunking Encapsulation: dot1q&lt;BR /&gt;Operational Trunking Encapsulation: native&lt;BR /&gt;Negotiation of Trunking: Off&lt;BR /&gt;Access Mode VLAN: 10 (VLAN-10-ISP-INTERNET)&lt;BR /&gt;Trunking Native Mode VLAN: 1 (default)&lt;BR /&gt;Administrative Native VLAN tagging: enabled&lt;BR /&gt;Voice VLAN: none&lt;BR /&gt;Administrative private-vlan host-association: none&lt;BR /&gt;Administrative private-vlan mapping: none&lt;BR /&gt;Administrative private-vlan trunk native VLAN: none&lt;BR /&gt;Administrative private-vlan trunk Native VLAN tagging: enabled&lt;BR /&gt;Administrative private-vlan trunk encapsulation: dot1q&lt;BR /&gt;Administrative private-vlan trunk normal VLANs: none&lt;BR /&gt;Administrative private-vlan trunk associations: none&lt;BR /&gt;Administrative private-vlan trunk mappings: none&lt;BR /&gt;Operational private-vlan: none&lt;BR /&gt;Trunking VLANs Enabled: ALL&lt;BR /&gt;Pruning VLANs Enabled: 2-1001&lt;BR /&gt;Capture Mode Disabled&lt;BR /&gt;Capture VLANs Allowed: ALL&lt;/P&gt;
&lt;P&gt;Protected: false&lt;BR /&gt;Unknown unicast blocked: disabled&lt;BR /&gt;Unknown multicast blocked: disabled&lt;BR /&gt;Vepa Enabled: false&lt;BR /&gt;App Interface: false&lt;BR /&gt;Appliance trust: none&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;swt-acc#sho interfaces gigabitEthernet 1/0/13 switchport&lt;BR /&gt;Name: Gi1/0/13&lt;BR /&gt;Switchport: Enabled&lt;BR /&gt;Administrative Mode: static access&lt;BR /&gt;Operational Mode: static access&lt;BR /&gt;Administrative Trunking Encapsulation: dot1q&lt;BR /&gt;Operational Trunking Encapsulation: native&lt;BR /&gt;Negotiation of Trunking: Off&lt;BR /&gt;Access Mode VLAN: 20 (VLAN-20-OFFICE)&lt;BR /&gt;Trunking Native Mode VLAN: 1 (default)&lt;BR /&gt;Administrative Native VLAN tagging: enabled&lt;BR /&gt;Voice VLAN: none&lt;BR /&gt;Administrative private-vlan host-association: none&lt;BR /&gt;Administrative private-vlan mapping: none&lt;BR /&gt;Administrative private-vlan trunk native VLAN: none&lt;BR /&gt;Administrative private-vlan trunk Native VLAN tagging: enabled&lt;BR /&gt;Administrative private-vlan trunk encapsulation: dot1q&lt;BR /&gt;Administrative private-vlan trunk normal VLANs: none&lt;BR /&gt;Administrative private-vlan trunk associations: none&lt;BR /&gt;Administrative private-vlan trunk mappings: none&lt;BR /&gt;Operational private-vlan: none&lt;BR /&gt;Trunking VLANs Enabled: ALL&lt;BR /&gt;Pruning VLANs Enabled: 2-1001&lt;BR /&gt;Capture Mode Disabled&lt;BR /&gt;Capture VLANs Allowed: ALL&lt;/P&gt;
&lt;P&gt;Protected: false&lt;BR /&gt;Unknown unicast blocked: disabled&lt;BR /&gt;Unknown multicast blocked: disabled&lt;BR /&gt;Vepa Enabled: false&lt;BR /&gt;App Interface: false&lt;BR /&gt;Appliance trust: none&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;swt-acc#sho interfaces gigabitEthernet 1/0/37 switchport&lt;BR /&gt;Name: Gi1/0/37&lt;BR /&gt;Switchport: Enabled&lt;BR /&gt;Administrative Mode: static access&lt;BR /&gt;Operational Mode: static access&lt;BR /&gt;Administrative Trunking Encapsulation: dot1q&lt;BR /&gt;Operational Trunking Encapsulation: native&lt;BR /&gt;Negotiation of Trunking: Off&lt;BR /&gt;Access Mode VLAN: 30 (VLAN-30-MGMT)&lt;BR /&gt;Trunking Native Mode VLAN: 1 (default)&lt;BR /&gt;Administrative Native VLAN tagging: enabled&lt;BR /&gt;Voice VLAN: none&lt;BR /&gt;Administrative private-vlan host-association: none&lt;BR /&gt;Administrative private-vlan mapping: none&lt;BR /&gt;Administrative private-vlan trunk native VLAN: none&lt;BR /&gt;Administrative private-vlan trunk Native VLAN tagging: enabled&lt;BR /&gt;Administrative private-vlan trunk encapsulation: dot1q&lt;BR /&gt;Administrative private-vlan trunk normal VLANs: none&lt;BR /&gt;Administrative private-vlan trunk associations: none&lt;BR /&gt;Administrative private-vlan trunk mappings: none&lt;BR /&gt;Operational private-vlan: none&lt;BR /&gt;Trunking VLANs Enabled: ALL&lt;BR /&gt;Pruning VLANs Enabled: 2-1001&lt;BR /&gt;Capture Mode Disabled&lt;BR /&gt;Capture VLANs Allowed: ALL&lt;/P&gt;
&lt;P&gt;Protected: false&lt;BR /&gt;Unknown unicast blocked: disabled&lt;BR /&gt;Unknown multicast blocked: disabled&lt;BR /&gt;Vepa Enabled: false&lt;BR /&gt;App Interface: false&lt;BR /&gt;Appliance trust: none&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;swt-acc#show spanning-tree vlan 10&lt;/P&gt;
&lt;P&gt;VLAN0010&lt;BR /&gt;Spanning tree enabled protocol rstp&lt;BR /&gt;Root ID Priority 32768&lt;BR /&gt;Address b8f8.5386.0d21&lt;BR /&gt;Cost 20004&lt;BR /&gt;Port 1 (GigabitEthernet1/0/1)&lt;BR /&gt;Hello Time 2 sec Max Age 6 sec Forward Delay 2 sec&lt;/P&gt;
&lt;P&gt;Bridge ID Priority 32778 (priority 32768 sys-id-ext 10)&lt;BR /&gt;Address 5c31.924e.4c00&lt;BR /&gt;Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec&lt;BR /&gt;Aging Time 300 sec&lt;/P&gt;
&lt;P&gt;Interface Role Sts Cost Prio.Nbr Type&lt;BR /&gt;------------------- ---- --- --------- -------- --------------------------------&lt;BR /&gt;Gi1/0/1 Root FWD 20000 128.1 P2p&lt;BR /&gt;Gi1/0/3 Desg FWD 20000 128.3 P2p Edge&lt;BR /&gt;Gi1/0/4 Desg FWD 20000 128.4 P2p Edge&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;swt-acc#show spanning-tree vlan 20&lt;/P&gt;
&lt;P&gt;VLAN0020&lt;BR /&gt;Spanning tree enabled protocol rstp&lt;BR /&gt;Root ID Priority 32788&lt;BR /&gt;Address 5c31.924e.4c00&lt;BR /&gt;This bridge is the root&lt;BR /&gt;Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec&lt;/P&gt;
&lt;P&gt;Bridge ID Priority 32788 (priority 32768 sys-id-ext 20)&lt;BR /&gt;Address 5c31.924e.4c00&lt;BR /&gt;Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec&lt;BR /&gt;Aging Time 300 sec&lt;/P&gt;
&lt;P&gt;Interface Role Sts Cost Prio.Nbr Type&lt;BR /&gt;------------------- ---- --- --------- -------- --------------------------------&lt;BR /&gt;Gi1/0/13 Desg FWD 20000 128.13 P2p Edge&lt;BR /&gt;Gi1/0/14 Desg FWD 20000 128.14 P2p Edge&lt;BR /&gt;Gi1/0/17 Desg FWD 20000 128.17 P2p Edge&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;swt-acc#show spanning-tree vlan 30&lt;/P&gt;
&lt;P&gt;VLAN0030&lt;BR /&gt;Spanning tree enabled protocol rstp&lt;BR /&gt;Root ID Priority 32798&lt;BR /&gt;Address 5c31.924e.4c00&lt;BR /&gt;This bridge is the root&lt;BR /&gt;Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec&lt;/P&gt;
&lt;P&gt;Bridge ID Priority 32798 (priority 32768 sys-id-ext 30)&lt;BR /&gt;Address 5c31.924e.4c00&lt;BR /&gt;Hello Time 2 sec Max Age 20 sec Forward Delay 15 sec&lt;BR /&gt;Aging Time 300 sec&lt;/P&gt;
&lt;P&gt;Interface Role Sts Cost Prio.Nbr Type&lt;BR /&gt;------------------- ---- --- --------- -------- --------------------------------&lt;BR /&gt;Gi1/0/37 Desg FWD 20000 128.37 P2p Edge&lt;BR /&gt;Gi1/0/38 Desg FWD 20000 128.38 P2p Edge&lt;BR /&gt;Gi1/0/39 Desg FWD 20000 128.39 P2p Edge&lt;BR /&gt;Gi1/0/40 Desg FWD 20000 128.40 P2p Edge&lt;BR /&gt;Gi1/0/41 Desg FWD 20000 128.41 P2p Edge&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 05 Apr 2023 12:10:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/best-config-to-speed-up-ha-failover/m-p/537717#M110424</guid>
      <dc:creator>dgsans</dc:creator>
      <dc:date>2023-04-05T12:10:11Z</dc:date>
    </item>
  </channel>
</rss>

