<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Active/Active ECMP in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/active-active-ecmp/m-p/281604#M75989</link>
    <description>&lt;P&gt;I was just trying to understand the question of why do I think the standby node would receive traffic.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 07 Aug 2019 17:31:14 GMT</pubDate>
    <dc:creator>Stevenjwilliams83</dc:creator>
    <dc:date>2019-08-07T17:31:14Z</dc:date>
    <item>
      <title>Active/Active ECMP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/active-active-ecmp/m-p/277869#M75510</link>
      <description>&lt;P&gt;I have two Palo Alto 5250s running in my core network as a core firewall for all campus and datacetner traffic. They are running active/active. I have layer 3 routing south bound to two cat9500s not in VSS. So I am running HSRP on each 9500 alternating vlans to utilize them both. All 4 units are running OSPF to advertise loopbacks and iBGP is used to carry routes. The 9500s are setup for ECMP and so are the Palo Altos. I feel like there is some weird traffic issues with this, Should the Palo Altos even be setup with ECMP? If so should I be using the symetrical return option? Would having ECMP on the Cat9500s be enough to achieve load sharing/balancing over each layer 3 link to each Palo Alto? Each cat 9500 has a layer 3 link to each Palo Alto. And yes before people tell me Active/Active is not a good idea I cant see why not when my network is symetrical.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 20 Jul 2019 16:45:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/active-active-ecmp/m-p/277869#M75510</guid>
      <dc:creator>Stevenjwilliams83</dc:creator>
      <dc:date>2019-07-20T16:45:09Z</dc:date>
    </item>
    <item>
      <title>Re: Active/Active ECMP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/active-active-ecmp/m-p/277877#M75511</link>
      <description>&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Could be this GUY?!?" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/20721i0D70155DBD486081/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="15636466912634282740625795455068.jpg" alt="Could be this GUY?!?" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;Could be this GUY?!?&lt;/span&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 20 Jul 2019 18:18:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/active-active-ecmp/m-p/277877#M75511</guid>
      <dc:creator>Jessewilliams</dc:creator>
      <dc:date>2019-07-20T18:18:58Z</dc:date>
    </item>
    <item>
      <title>Re: Active/Active ECMP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/active-active-ecmp/m-p/277878#M75512</link>
      <description />
      <pubDate>Sat, 20 Jul 2019 18:24:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/active-active-ecmp/m-p/277878#M75512</guid>
      <dc:creator>Jessewilliams</dc:creator>
      <dc:date>2019-07-20T18:24:26Z</dc:date>
    </item>
    <item>
      <title>Re: Active/Active ECMP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/active-active-ecmp/m-p/277879#M75513</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/112548"&gt;@Stevenjwilliams83&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;&lt;FONT color="#FF0000"&gt;&lt;SPAN&gt;hould the Palo Altos even be setup with ECMP?&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#000000"&gt;&lt;SPAN&gt;Depends on how many uplinks you have between the Palo Alto and the 9500s, and if the answer is more than one are you not utilizing simple AE interfaces? It sounds like you have two 9500s and each 9500 has a link to each active peer correct? If that's the case you could actually be introducing asymetrical return traffic depending on your configuration.&amp;nbsp;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#FF0000"&gt;&lt;SPAN&gt;If so should I be using the symetrical return option?&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#000000"&gt;&lt;SPAN&gt;We'd need to know more about how your firewall is actually configured to give a yay or nay on this. From the rough outline that can be gathered from your post it sounds as though enforcing symetrical return traffic would be a good idea; but we would need more info about the actual config to be positive.&amp;nbsp;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#FF0000"&gt;&lt;SPAN&gt;Would having ECMP on the Cat9500s be enough to achieve load sharing/balancing over each layer 3 link to each Palo Alto?&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#000000"&gt;&lt;SPAN&gt;I assume that you are talking about removing the ECMP configuration on the firewall? It would achieve a level of load balancing from your cores, but depending on the rest of your configuration this could cause issues.&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#FF0000"&gt;&lt;SPAN&gt;And yes before people tell me Active/Active is not a good idea I cant see why not when my network is symetrical.&amp;nbsp;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#000000"&gt;&lt;SPAN&gt;With emphisis on the fact that you state your network is&amp;nbsp;&lt;STRONG&gt;symetrical&lt;/STRONG&gt;, this would actually be an instance where we would 100% not generally recommend someone utilize Active/Active outside of a handful of other factors. Active/Active is best deployed in a network where you have&amp;nbsp;&lt;STRONG&gt;asymetrical&lt;/STRONG&gt; traffic&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 21 Jul 2019 01:13:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/active-active-ecmp/m-p/277879#M75513</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2019-07-21T01:13:04Z</dc:date>
    </item>
    <item>
      <title>Re: Active/Active ECMP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/active-active-ecmp/m-p/277882#M75516</link>
      <description>&lt;P&gt;Yes Each 9500 has a link to each Palo Alto so "criss-crossed" essentially. No ae interfaces being used just straight /30 routed links between 9500s and Palo Altos. So if I have vlan 10, 20, 30, and 40, 9500-01 has hsrp active for vlan 10,30 and 9500-02 has hsrp active for vlan 20,40 to use both swtiches rather then one sit idle.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I to this day do not understand why you want active and active in an asymetrical network rather then symetrical? Also wouldnt you want to ultilize BOTH firewalls when you can?&lt;/P&gt;</description>
      <pubDate>Sun, 21 Jul 2019 01:19:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/active-active-ecmp/m-p/277882#M75516</guid>
      <dc:creator>Stevenjwilliams83</dc:creator>
      <dc:date>2019-07-21T01:19:19Z</dc:date>
    </item>
    <item>
      <title>Re: Active/Active ECMP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/active-active-ecmp/m-p/277965#M75530</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/112548"&gt;@Stevenjwilliams83&lt;/a&gt;l&lt;/P&gt;&lt;P&gt;I'll be honest here, unless someone is able to look at a detailed map of how you have things configured along with the configuration on your firewalls it's impossible to say if things are configured correctly or where you could be introducing issues. The posts that I've seen and what you alude to in this post causes me to believe that you have something misconfigured and this is causing asymetrical return traffic from your firewalls. I could be wrong, but until someone can take a look at how you have everything confiugred we can only really take a guess at what could possibly be misconfigured. When you start talking about ECMP and Active/Active the first thing that comes to my mind is that you would really need to design this setup carefully to ensure you won't run into routing/pathing issues further down the road.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#FF0000"&gt;&lt;SPAN&gt;I to this day do not understand why you want active and active in an asymetrical network rather then symetrical?&amp;nbsp;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#000000"&gt;&lt;SPAN&gt;Because utilizing Active/Passive firewalls in a situation with asymetrical return traffic would cause the traffic hitting the passive firewall to be dropped. This is eliminated in an Active/Active setup as the HA3 link will bring the traffic back to the origin firewall as long as you've configured things properly. The downside to Active/Active is that if you've poorly configured/designed the setup it can actually introduce asymetrical routing where you wouldn't have had any to being with. In addition every single use of Active/Active is intorducing configuration complexity that otherwise wouldn't be there.&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#000000"&gt;&lt;SPAN&gt;Active/Active while being a supported configuration has a lot of gotchas and issues in its own right. It can be worked around and everything can be perfectly fine but it complicates the confiugration, support, and maintenance of the device. There is a reason that PAN users and support has long had a stance that Active/Active is best used in asymetrical environments, and it's largely to do with the fact that if it isn't designed and configured well you can introduce a lot of issues into your enviornment.&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#FF0000"&gt;&lt;SPAN&gt;Also wouldnt you want to ultilize BOTH firewalls when you can?&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#000000"&gt;&lt;SPAN&gt;Real world stats, utilizing both of these firewalls at the same time is seeing you net a performance gain of +25% in the best well designed scenario during peak workloads, while still properly allowing a single firewall to manage your entire environment in the event one of those units fail. Most environemnts that are symetrical would have no need to enable Active/Active for performance reasons unless they've failed to size their firewalls correctly or have outgrown the 7000 series chassis where this becomes a necessity.&amp;nbsp;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#000000"&gt;&lt;SPAN&gt;If you look at that stats on your firewall I would be willing to bet that your seeing a net-zero return by utilizing Active/Active over Active/Passive as far as performance goes. Which means that the only benefit Active/Active is actually giving you is near-instant failover times (again, depending on configuration) for the cost of increasing configuration complexity and the chance of introducing issues into your network.&amp;nbsp;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 22 Jul 2019 02:01:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/active-active-ecmp/m-p/277965#M75530</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2019-07-22T02:01:04Z</dc:date>
    </item>
    <item>
      <title>Re: Active/Active ECMP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/active-active-ecmp/m-p/277968#M75533</link>
      <description>&lt;P&gt;Thanks for the input. I will open a support case and have someone look into the configuration.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 22 Jul 2019 02:24:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/active-active-ecmp/m-p/277968#M75533</guid>
      <dc:creator>Stevenjwilliams83</dc:creator>
      <dc:date>2019-07-22T02:24:42Z</dc:date>
    </item>
    <item>
      <title>Re: Active/Active ECMP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/active-active-ecmp/m-p/281361#M75961</link>
      <description>&lt;P&gt;The culporit in this whole thing is HSRP. The design of HSRP is flawed as each vlan has an active and standby hsrp peer. Because the vlan network has an SVI on each HSRP peer regardless of active or standby, the network is known as connected and tells this to each palo alto. So the palo alto sees each downstream HSRP peer as equal cost, so it at times sends return traffic for that said vlan to the standby HSRP peer and I assume the ARP and MAC address as some mismatches doing on since from the clients aspect the gateway address for the HSRP group sends a virtual mac, but when traffic returns the peers use their real mac and not the virtual.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So I can fix this by just turning off ECMP on the palo altos which means I will use ecmp from the core 9500s out to the rest of the network but return traffic will only return on one path. BUT what I do not get is that if I am setting my ECMP with symmetric return why would it ingest traffic from the active hsrp peer and not send it back to the same peer as the reason for symmetric return is "return traffic on the same interface it was received on"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 06 Aug 2019 16:15:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/active-active-ecmp/m-p/281361#M75961</guid>
      <dc:creator>Stevenjwilliams83</dc:creator>
      <dc:date>2019-08-06T16:15:54Z</dc:date>
    </item>
    <item>
      <title>Re: Active/Active ECMP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/active-active-ecmp/m-p/281574#M75975</link>
      <description>&lt;P&gt;I was going to say it first but you beat me to it.&amp;nbsp; If you want to use ECMP then you need to ditch HSRP.&amp;nbsp; You can't use them together because HSRP by it's very nature forces routing to a single point.&amp;nbsp; Does that make sense?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;PS - Active/Active is not designed to increase throughput (even though this can be a slight byproduct in the right scenario).&amp;nbsp; It is designed to handle asynchronous routing.&amp;nbsp; If you are basing your purchasing decision based on increased throughput, you will be dissappointed.&amp;nbsp; Right size your firewalls with the assumption that one of them is offline.&lt;/P&gt;</description>
      <pubDate>Wed, 07 Aug 2019 16:31:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/active-active-ecmp/m-p/281574#M75975</guid>
      <dc:creator>jeremy.larsen</dc:creator>
      <dc:date>2019-08-07T16:31:08Z</dc:date>
    </item>
    <item>
      <title>Re: Active/Active ECMP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/active-active-ecmp/m-p/281578#M75976</link>
      <description>&lt;P&gt;Ya what I figured out was that without any HSRP trickery or some kind of BGP attribute to influence routes . inbound, each palo is always going to choose Core SW01 due to lowest router-id. I guess I could migrate to GLBP or just stack the 9500s in VSS.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 07 Aug 2019 16:32:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/active-active-ecmp/m-p/281578#M75976</guid>
      <dc:creator>Stevenjwilliams83</dc:creator>
      <dc:date>2019-08-07T16:32:31Z</dc:date>
    </item>
    <item>
      <title>Re: Active/Active ECMP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/active-active-ecmp/m-p/281582#M75978</link>
      <description>&lt;P&gt;ECMP should still work as long as you remove HSRP regardless of router ID for "Equal Cost Paths" only.&lt;/P&gt;</description>
      <pubDate>Wed, 07 Aug 2019 16:34:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/active-active-ecmp/m-p/281582#M75978</guid>
      <dc:creator>jeremy.larsen</dc:creator>
      <dc:date>2019-08-07T16:34:24Z</dc:date>
    </item>
    <item>
      <title>Re: Active/Active ECMP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/active-active-ecmp/m-p/281585#M75979</link>
      <description>&lt;P&gt;Not running active/active for increase performance because I know you get maybe 20% on that. I am using it because I have two active core switches and it becomes a load share game. Do ditch HSRP and use what for LAN side? thats the real challenge.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 07 Aug 2019 16:36:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/active-active-ecmp/m-p/281585#M75979</guid>
      <dc:creator>Stevenjwilliams83</dc:creator>
      <dc:date>2019-08-07T16:36:38Z</dc:date>
    </item>
    <item>
      <title>Re: Active/Active ECMP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/active-active-ecmp/m-p/281591#M75980</link>
      <description>&lt;P&gt;MC-LAG?&amp;nbsp; Not sure the new 9500s support that.&amp;nbsp; Are you avoiding stacking them for any specific reason?&lt;/P&gt;</description>
      <pubDate>Wed, 07 Aug 2019 16:45:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/active-active-ecmp/m-p/281591#M75980</guid>
      <dc:creator>jeremy.larsen</dc:creator>
      <dc:date>2019-08-07T16:45:00Z</dc:date>
    </item>
    <item>
      <title>Re: Active/Active ECMP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/active-active-ecmp/m-p/281592#M75981</link>
      <description>&lt;P&gt;Cat9500s not stacked, no VSS, no Nexus core running active/active HSRP. So doesnt qualify.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 07 Aug 2019 16:44:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/active-active-ecmp/m-p/281592#M75981</guid>
      <dc:creator>Stevenjwilliams83</dc:creator>
      <dc:date>2019-08-07T16:44:48Z</dc:date>
    </item>
    <item>
      <title>Re: Active/Active ECMP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/active-active-ecmp/m-p/281593#M75982</link>
      <description>&lt;P&gt;Now, I am fantasizing&amp;nbsp;here, but I thought about running HSRP egress side to the palos and running palos with floating IP (essentially vrrp)....&lt;/P&gt;</description>
      <pubDate>Wed, 07 Aug 2019 16:46:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/active-active-ecmp/m-p/281593#M75982</guid>
      <dc:creator>Stevenjwilliams83</dc:creator>
      <dc:date>2019-08-07T16:46:33Z</dc:date>
    </item>
    <item>
      <title>Re: Active/Active ECMP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/active-active-ecmp/m-p/281594#M75983</link>
      <description>&lt;P&gt;Be aware, there are some pretty specific restrictions/caveats with floating IPs especially when it comes to NAT.&amp;nbsp; If you don't have asynchronous routing and you aren't utilizing ECMP, Active/Passive is the way to go.&lt;/P&gt;</description>
      <pubDate>Wed, 07 Aug 2019 16:53:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/active-active-ecmp/m-p/281594#M75983</guid>
      <dc:creator>jeremy.larsen</dc:creator>
      <dc:date>2019-08-07T16:53:56Z</dc:date>
    </item>
    <item>
      <title>Re: Active/Active ECMP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/active-active-ecmp/m-p/281595#M75984</link>
      <description>&lt;P&gt;Avoid the stacking because in-service upgrades give me PTSD. No NAT because they are Core Firewalls. Would like to use ECMP but it seems to be a headache. And even with Active/Passive and HSRP there is still the issue that there is a 50 percent chance that the active firewall will send the return traffic to the standby HSRP node.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 07 Aug 2019 16:56:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/active-active-ecmp/m-p/281595#M75984</guid>
      <dc:creator>Stevenjwilliams83</dc:creator>
      <dc:date>2019-08-07T16:56:20Z</dc:date>
    </item>
    <item>
      <title>Re: Active/Active ECMP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/active-active-ecmp/m-p/281596#M75985</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/112548"&gt;@Stevenjwilliams83&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;I'm lost on why you think you are going to hit the standby HSRP node? HSRP is going to give you an address that you can target as your next-hop address for routing. If you want to use HSRP, then you remove ECMP. If you want to use ECMP, then you remove HSRP.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 07 Aug 2019 17:07:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/active-active-ecmp/m-p/281596#M75985</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2019-08-07T17:07:18Z</dc:date>
    </item>
    <item>
      <title>Re: Active/Active ECMP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/active-active-ecmp/m-p/281599#M75986</link>
      <description>&lt;P&gt;Yes, yes, and double yes.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Or you could stack your switches downstream from the 9500s and push Layer 3 out toward the access layer.&amp;nbsp; Then you would pretty much be using them as routers and you can ECMP all day long.&lt;/P&gt;</description>
      <pubDate>Wed, 07 Aug 2019 17:16:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/active-active-ecmp/m-p/281599#M75986</guid>
      <dc:creator>jeremy.larsen</dc:creator>
      <dc:date>2019-08-07T17:16:41Z</dc:date>
    </item>
    <item>
      <title>Re: Active/Active ECMP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/active-active-ecmp/m-p/281600#M75987</link>
      <description>&lt;P&gt;How do you figure? If each palo is learning each HSRP group VLAN via a routing protocol and both core switches own an SVI for that vlan, network is now connected. So OSPF will see the same subnet for a single vlan on each core switch as connected and based on ecmp will have a 50/50 shot of sending it the right node.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 07 Aug 2019 17:20:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/active-active-ecmp/m-p/281600#M75987</guid>
      <dc:creator>Stevenjwilliams83</dc:creator>
      <dc:date>2019-08-07T17:20:08Z</dc:date>
    </item>
  </channel>
</rss>

