<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic HA clarification with a single ISP in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ha-clarification-with-a-single-isp/m-p/307803#M79921</link>
    <description>&lt;P&gt;Hi Gang,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Excuse me for my ignorance. We had firewalls Palo literally thrown at us, and instantaneously put into production (not great!).&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have a pair of Palo's in HA Active/Passive with preemptive enabled on active/primary. These are in turn, patched to an INET switch (internet handed off via a single ethernet patch cable to this switch).&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have HA (device &amp;gt; ha &amp;gt; link and path monitoring) configured for the link and path monitoring:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Link group:&lt;UL&gt;&lt;LI&gt;Failure = any&lt;/LI&gt;&lt;LI&gt;Link group = all interfaces&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;Path monitoring:&amp;nbsp;&lt;UL&gt;&lt;LI&gt;Failure = any&lt;/LI&gt;&lt;LI&gt;path group = virtual router path with internal and external destination IPs, at 500ms interval and 5 ping count.&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Now say the active firewall detects a link failure interface (bear in mind this is an interface that is on the same switch as the secondary). The passive firewall takes over until the primary is ready to preempt over. We are right here.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now the same scenario but this time, there is a path link failure. Now, let's say something has happened upstream, say the ISP router went down. No pings to say public IP addresses 8.8.8.8 and 8.8.4.4, so no internet at all and thus the primary firewall will detect path link failure as per HA. The secondary will take over.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In the scenario mentioned before, not sure what happens:&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;The primary firewall, it will be passive waiting to preempt when links are back, though secondary has no internet either, so what happens here?&lt;/LI&gt;&lt;LI&gt;The secondary it takes over thought what happens here too (I haven't configured link and path monitoring yet on the passive firewall - should I do so)?&lt;/LI&gt;&lt;LI&gt;Both firewalls are sitting there with no path to the internet. What happens here?&lt;/LI&gt;&lt;LI&gt;What happens with flapping in this case and not hard path link failure to both firewalls.&lt;/LI&gt;&lt;LI&gt;Do I bother with virtual router path monitoring or rely on HA monitoring?&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;To make it more confusing, Palo's are connected to ACI. We are wondering if the internet is unavailable for both firewalls, could both firewalls shut down all internal-zone-based-interfaces so that ACI could detect a failure on the aggregate links to active and passive? In this case, ACI would proceed to remove the static quad route to the firewall pair and insert another route so traffic is routed elsewhere. ACI is tracking IPs external IPs via the Palo to determine failure.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Perhaps I am overthinking this and lost in my mind.&amp;nbsp;Appreciate in any sources, knowledge and clarification you all can provide.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Excuse me again for my ignorance.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you kindly,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Dan&lt;/P&gt;</description>
    <pubDate>Fri, 24 Jan 2020 10:22:23 GMT</pubDate>
    <dc:creator>mr_almeida</dc:creator>
    <dc:date>2020-01-24T10:22:23Z</dc:date>
    <item>
      <title>HA clarification with a single ISP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ha-clarification-with-a-single-isp/m-p/307803#M79921</link>
      <description>&lt;P&gt;Hi Gang,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Excuse me for my ignorance. We had firewalls Palo literally thrown at us, and instantaneously put into production (not great!).&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have a pair of Palo's in HA Active/Passive with preemptive enabled on active/primary. These are in turn, patched to an INET switch (internet handed off via a single ethernet patch cable to this switch).&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have HA (device &amp;gt; ha &amp;gt; link and path monitoring) configured for the link and path monitoring:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Link group:&lt;UL&gt;&lt;LI&gt;Failure = any&lt;/LI&gt;&lt;LI&gt;Link group = all interfaces&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;Path monitoring:&amp;nbsp;&lt;UL&gt;&lt;LI&gt;Failure = any&lt;/LI&gt;&lt;LI&gt;path group = virtual router path with internal and external destination IPs, at 500ms interval and 5 ping count.&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Now say the active firewall detects a link failure interface (bear in mind this is an interface that is on the same switch as the secondary). The passive firewall takes over until the primary is ready to preempt over. We are right here.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now the same scenario but this time, there is a path link failure. Now, let's say something has happened upstream, say the ISP router went down. No pings to say public IP addresses 8.8.8.8 and 8.8.4.4, so no internet at all and thus the primary firewall will detect path link failure as per HA. The secondary will take over.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In the scenario mentioned before, not sure what happens:&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;The primary firewall, it will be passive waiting to preempt when links are back, though secondary has no internet either, so what happens here?&lt;/LI&gt;&lt;LI&gt;The secondary it takes over thought what happens here too (I haven't configured link and path monitoring yet on the passive firewall - should I do so)?&lt;/LI&gt;&lt;LI&gt;Both firewalls are sitting there with no path to the internet. What happens here?&lt;/LI&gt;&lt;LI&gt;What happens with flapping in this case and not hard path link failure to both firewalls.&lt;/LI&gt;&lt;LI&gt;Do I bother with virtual router path monitoring or rely on HA monitoring?&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;To make it more confusing, Palo's are connected to ACI. We are wondering if the internet is unavailable for both firewalls, could both firewalls shut down all internal-zone-based-interfaces so that ACI could detect a failure on the aggregate links to active and passive? In this case, ACI would proceed to remove the static quad route to the firewall pair and insert another route so traffic is routed elsewhere. ACI is tracking IPs external IPs via the Palo to determine failure.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Perhaps I am overthinking this and lost in my mind.&amp;nbsp;Appreciate in any sources, knowledge and clarification you all can provide.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Excuse me again for my ignorance.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you kindly,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Dan&lt;/P&gt;</description>
      <pubDate>Fri, 24 Jan 2020 10:22:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ha-clarification-with-a-single-isp/m-p/307803#M79921</guid>
      <dc:creator>mr_almeida</dc:creator>
      <dc:date>2020-01-24T10:22:23Z</dc:date>
    </item>
    <item>
      <title>Re: HA clarification with a single ISP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ha-clarification-with-a-single-isp/m-p/307917#M79929</link>
      <description>&lt;P&gt;So i am assuming you have enabled preempt on active firewall Then:&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;The primary firewall, it will be passive waiting to preempt when links are back, though secondary has no internet either, so what happens here? So The secondary will take over as Active and there will be outage as it doesn't have a way out to internet.&lt;/LI&gt;&lt;LI&gt;The secondary it takes over thought what happens here too (I haven't configured link and path monitoring yet on the passive firewall - should I do so)?till the time you dont have a readability from the second firewall there is no point in configuring ( you can do that by introducing a l2 switch in between internet router and both of the firewalls.&lt;/LI&gt;&lt;LI&gt;Both firewalls are sitting there with no path to the internet. What happens here? If both the firewalls have path monitoring configured then they will play the Game of HA Dance(bouncing between each other)&lt;/LI&gt;&lt;LI&gt;What happens with flapping in this case and not hard path link failure to both firewalls. Same as above&lt;/LI&gt;&lt;LI&gt;Do I bother with virtual router path monitoring or rely on HA monitoring?We use VR path mointoring when we have 2 routes to a destination and we want to remove one when it goes down.in your case IFF&amp;nbsp; you have 2 default routes out for internet (fro 2 ISP) then u can use that.&lt;/LI&gt;&lt;/OL&gt;</description>
      <pubDate>Fri, 24 Jan 2020 16:53:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ha-clarification-with-a-single-isp/m-p/307917#M79929</guid>
      <dc:creator>lrangra</dc:creator>
      <dc:date>2020-01-24T16:53:18Z</dc:date>
    </item>
    <item>
      <title>Re: HA clarification with a single ISP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ha-clarification-with-a-single-isp/m-p/307929#M79932</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/121189"&gt;@mr_almeida&lt;/a&gt;&amp;nbsp;well crafted description of your scenario!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;At the end of the day there are many layers to an HA configuration meant to provide physical system (FW) resiliency within your environment... the HA configuration is specific to each FW in the HA pair and with the exception of FW specific IPs must match timer/other settings, a couple things to consider:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- HA Preempt&lt;/P&gt;&lt;P&gt;Configure this only if you are comfortable with the fact that the problem that caused the HA fail-over to occur is or doesn't have the potential to be intermittent as that could cause bouncing of the HA pair unnecessarily... general rule of thumb is to NOT enable HA Preempt so that you can control when to fail-back, if desired, after resolving whatever issue caused the initial fail-over.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- HA Link Monitoring&lt;/P&gt;&lt;P&gt;This is the best first step in enhancing your HA configuration as you want to control, via Link Groups, the fail-over behavior at the physical layer where you have a failed interface/cable. In this case, if there is an interface/cable issue with the directly connected L2 switch then this configuration will help fail-over appropriately... don't forget to include all your traffic bearing/forwarding links... &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- HA Path Monitoring&lt;/P&gt;&lt;P&gt;If you only have one logical path out, in this case a single upstream ISP router/link, then Path Monitoring thru that will not be very fruitful and lead to the scenario described by&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/119671"&gt;@lrangra&lt;/a&gt;&amp;nbsp;so probably not worth configuring. If you have multiple downstream (internal) paths then you could investigate setting up Path Monitoring for those.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Couple good links if need be:&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/high-availability/ha-concepts.html" target="_blank"&gt;https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/high-availability/ha-concepts.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClGNCA0" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClGNCA0&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;hth!&lt;/P&gt;</description>
      <pubDate>Fri, 24 Jan 2020 18:24:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ha-clarification-with-a-single-isp/m-p/307929#M79932</guid>
      <dc:creator>ddelcourt</dc:creator>
      <dc:date>2020-01-24T18:24:27Z</dc:date>
    </item>
    <item>
      <title>Re: HA clarification with a single ISP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ha-clarification-with-a-single-isp/m-p/307930#M79933</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;First off no need to excuse yourself. Your scenario was well written and very common. The others that replied via what happens in HA fail over are correct. Here are some things I have done in the past.&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Get a second line from the same ISP with an agreement that only one will be used at a time, usually a small cost&lt;UL&gt;&lt;LI&gt;then get rid of the switch (single point of failure) and plug it into the passive firewall&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;Get a second ISP that is relative inexpensive as backup and plug it into either the one switch (single point of failure) or directly into the passive firewall. Obviously if you are hosing sites, etc. this one wont work.&lt;/LI&gt;&lt;LI&gt;Disable path monitoring. Both firewalls will be down anyway so need for a fail over. (just my opinion)&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;I'm sure others can provide additional thoughts as well.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cheers!&lt;/P&gt;</description>
      <pubDate>Fri, 24 Jan 2020 18:32:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ha-clarification-with-a-single-isp/m-p/307930#M79933</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2020-01-24T18:32:21Z</dc:date>
    </item>
  </channel>
</rss>

