<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: 2X of PA820 Active/ Passive Design question in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/2x-of-pa820-active-passive-design-question/m-p/321686#M82319</link>
    <description>&lt;P&gt;Yeah, thanks for clarifying.&lt;/P&gt;&lt;P&gt;I propose to use a switch to connect the fw interconnects together.&lt;/P&gt;</description>
    <pubDate>Wed, 08 Apr 2020 17:56:28 GMT</pubDate>
    <dc:creator>craigpaolozzi</dc:creator>
    <dc:date>2020-04-08T17:56:28Z</dc:date>
    <item>
      <title>2X of PA820 Active/ Passive Design question</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/2x-of-pa820-active-passive-design-question/m-p/321515#M82286</link>
      <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;After some advice, planning to have 2 X PA820 pairs of Active/ Passives, Inner and outer firewalls protecting some internal networks.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;See the diagram, Does the HA2 link pass data plane traffic at all?&amp;nbsp; Or can it?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;There could be a scenario that one set of FW's can failover and the primary unit of one trying to speak to the standby unit of the other.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Or is the only solution to put a switch in between the green cables FW Connect to stop this issue?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Capture.JPG" style="width: 527px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/24999i60AFE406BAEEE3A2/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Capture.JPG" alt="Capture.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 08 Apr 2020 12:39:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/2x-of-pa820-active-passive-design-question/m-p/321515#M82286</guid>
      <dc:creator>craigpaolozzi</dc:creator>
      <dc:date>2020-04-08T12:39:31Z</dc:date>
    </item>
    <item>
      <title>Re: 2X of PA820 Active/ Passive Design question</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/2x-of-pa820-active-passive-design-question/m-p/321567#M82297</link>
      <description>&lt;P&gt;1.&amp;nbsp;Just curious why you are using the old school Firewall sandwich design?&lt;/P&gt;&lt;P&gt;2. HA2 passes sync traffic for the HA Pair.&lt;/P&gt;&lt;P&gt;3. Why would you put a switch between the two?&amp;nbsp; Wouldn't you want a router?&amp;nbsp; Otherwise everything in the middle of the sandwich would need multiple gateways/routes (Yuck, I've seen this).&lt;/P&gt;&lt;P&gt;4. Am I assuming too much based on your limited information?&lt;/P&gt;</description>
      <pubDate>Wed, 08 Apr 2020 14:37:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/2x-of-pa820-active-passive-design-question/m-p/321567#M82297</guid>
      <dc:creator>jeremy.larsen</dc:creator>
      <dc:date>2020-04-08T14:37:32Z</dc:date>
    </item>
    <item>
      <title>Re: 2X of PA820 Active/ Passive Design question</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/2x-of-pa820-active-passive-design-question/m-p/321585#M82302</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/112572"&gt;@craigpaolozzi&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;Everything&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/107910"&gt;@jeremy.larsen&lt;/a&gt;&amp;nbsp;mentioned is correct. If you have the interfaces for it and you don't want to utilize a switch/router between the networks, you would need to cable up both units to both units. So both sets of firewalls need a route to both firewalls. Every "Inner" firewall will need a link to both of your "outer" firewalls. That way if you have a failover you actually have a route for it to get there.&lt;/P&gt;&lt;P&gt;A lot of times people will put something like a switch or router between the two just to save on interfaces, especially on the smaller units like the 820 where interface count is minimal.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also I'm really going to echo what&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/107910"&gt;@jeremy.larsen&lt;/a&gt;&amp;nbsp;already brought up, but is something I would really be asking if someone came to me with this design, why are you still using this model? Do you actually need an "Inner" and "Outer" firewall or could you condense these into a larger HA pair.&lt;/P&gt;</description>
      <pubDate>Wed, 08 Apr 2020 15:14:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/2x-of-pa820-active-passive-design-question/m-p/321585#M82302</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2020-04-08T15:14:52Z</dc:date>
    </item>
    <item>
      <title>Re: 2X of PA820 Active/ Passive Design question</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/2x-of-pa820-active-passive-design-question/m-p/321600#M82303</link>
      <description>&lt;P&gt;Thanks for the replies&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Ideally yes I would of used a single ha pair of 820s instead of a back to back pair.&amp;nbsp; But our customer has already purchased them and have asked us to design them basically &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So the plan was to use a /30 between both Firewalls, since the Palo altos share the same IP address on the interfaces when in active passive mode.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The idea of putting a switch in the middle would be so the firewalls don't send packets to the passive Firewall as it will drop traffic.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So I would take both FW interconnect ports from both pairs (4 ports in total) and patch them into a new L2 vlan, then when the Firewalls arps for the address that's in the routing table it will respond with the correct active address instead of the possibly one of the active nodes paseses traffic to a passive node and will be dropped.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Does that make sense?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 08 Apr 2020 15:43:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/2x-of-pa820-active-passive-design-question/m-p/321600#M82303</guid>
      <dc:creator>craigpaolozzi</dc:creator>
      <dc:date>2020-04-08T15:43:53Z</dc:date>
    </item>
    <item>
      <title>Re: 2X of PA820 Active/ Passive Design question</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/2x-of-pa820-active-passive-design-question/m-p/321648#M82308</link>
      <description>&lt;P&gt;I'm just trying to help here.&amp;nbsp; That doesn't make any sense at all unless you were running these Active/Active.&amp;nbsp; But then that's another discussion.&amp;nbsp; Traffic will never go to the passive firewall (it's passive after all) and the VIPs will all be on the Active firewall (ARP baby).&amp;nbsp; I guess I don't really see what you are trying to accomplish here.&amp;nbsp; A /30 between them doesn't give you any address space in the DMZ/Middle of the Sandwich if you are going "Old School" like this.&amp;nbsp; Perhaps we are missing some piece of the design here?&lt;/P&gt;</description>
      <pubDate>Wed, 08 Apr 2020 16:36:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/2x-of-pa820-active-passive-design-question/m-p/321648#M82308</guid>
      <dc:creator>jeremy.larsen</dc:creator>
      <dc:date>2020-04-08T16:36:25Z</dc:date>
    </item>
    <item>
      <title>Re: 2X of PA820 Active/ Passive Design question</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/2x-of-pa820-active-passive-design-question/m-p/321659#M82310</link>
      <description>&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="craigpaolozzi_0-1586365391961.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/25002i02A9885C57D5B11C/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="craigpaolozzi_0-1586365391961.png" alt="craigpaolozzi_0-1586365391961.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Heres a better diagram of the full solution......so this is for an OT environment so sensitive networks.&lt;/P&gt;&lt;P&gt;So there are networks behind the Inner Palo Alto pair.....they will be accessed by the Cisco LAN behind the Outer Pair of Palo Altos&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 08 Apr 2020 17:04:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/2x-of-pa820-active-passive-design-question/m-p/321659#M82310</guid>
      <dc:creator>craigpaolozzi</dc:creator>
      <dc:date>2020-04-08T17:04:31Z</dc:date>
    </item>
    <item>
      <title>Re: 2X of PA820 Active/ Passive Design question</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/2x-of-pa820-active-passive-design-question/m-p/321665#M82312</link>
      <description>&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="craigpaolozzi_0-1586366198672.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/25004i73F4E8CC6A476C19/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="craigpaolozzi_0-1586366198672.png" alt="craigpaolozzi_0-1586366198672.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Heres another of the situation I want to aviod;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;if the active FW in the bottom pair wants to send traffic north, it will send via the passive not - which will fail&lt;/P&gt;&lt;P&gt;And if HA2 doesnt send the traffic to the active pair....then still the traffic is dropped&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 08 Apr 2020 17:19:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/2x-of-pa820-active-passive-design-question/m-p/321665#M82312</guid>
      <dc:creator>craigpaolozzi</dc:creator>
      <dc:date>2020-04-08T17:19:20Z</dc:date>
    </item>
    <item>
      <title>Re: 2X of PA820 Active/ Passive Design question</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/2x-of-pa820-active-passive-design-question/m-p/321671#M82314</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/112572"&gt;@craigpaolozzi&lt;/a&gt;l,&lt;/P&gt;&lt;P&gt;&lt;FONT color="#008000"&gt;if the active FW in the bottom pair wants to send traffic north, it will send via the passive not - which will fail&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#008000"&gt;And if HA2 doesnt send the traffic to the active pair....then still the traffic is dropped&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#000000"&gt;Why&amp;nbsp; do you thing this will ever be sent via the passive node? The passive node does not accept or forward any traffic, nothing is "alive" so to speak outside of your management interface. It has absolutely no way to send/receive traffic.&amp;nbsp;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 08 Apr 2020 17:33:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/2x-of-pa820-active-passive-design-question/m-p/321671#M82314</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2020-04-08T17:33:17Z</dc:date>
    </item>
    <item>
      <title>Re: 2X of PA820 Active/ Passive Design question</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/2x-of-pa820-active-passive-design-question/m-p/321677#M82315</link>
      <description>&lt;P&gt;Because the active node in the latest diagram I sent only has a link to the passive node, if that was in active mode it would be fine and would pass traffic.&lt;/P&gt;</description>
      <pubDate>Wed, 08 Apr 2020 17:39:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/2x-of-pa820-active-passive-design-question/m-p/321677#M82315</guid>
      <dc:creator>craigpaolozzi</dc:creator>
      <dc:date>2020-04-08T17:39:02Z</dc:date>
    </item>
    <item>
      <title>Re: 2X of PA820 Active/ Passive Design question</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/2x-of-pa820-active-passive-design-question/m-p/321680#M82316</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/112572"&gt;@craigpaolozzi&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;That would be a design flaw then. As I stated previously if you aren't going to use some sort of switch/router in the middle and directly connect these two clusters you would need to have each individual node to have it's own link to&amp;nbsp;&lt;STRONG&gt;both&lt;/STRONG&gt; the opposite firewalls. If that isn't done you don't have a route to the active unit and this breaks your entire design.&lt;/P&gt;</description>
      <pubDate>Wed, 08 Apr 2020 17:44:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/2x-of-pa820-active-passive-design-question/m-p/321680#M82316</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2020-04-08T17:44:35Z</dc:date>
    </item>
    <item>
      <title>Re: 2X of PA820 Active/ Passive Design question</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/2x-of-pa820-active-passive-design-question/m-p/321686#M82319</link>
      <description>&lt;P&gt;Yeah, thanks for clarifying.&lt;/P&gt;&lt;P&gt;I propose to use a switch to connect the fw interconnects together.&lt;/P&gt;</description>
      <pubDate>Wed, 08 Apr 2020 17:56:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/2x-of-pa820-active-passive-design-question/m-p/321686#M82319</guid>
      <dc:creator>craigpaolozzi</dc:creator>
      <dc:date>2020-04-08T17:56:28Z</dc:date>
    </item>
    <item>
      <title>Re: 2X of PA820 Active/ Passive Design question</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/2x-of-pa820-active-passive-design-question/m-p/321701#M82320</link>
      <description>&lt;P&gt;If this were me (and it's not),&amp;nbsp; I would STRONGLY suggest that your customer reconsider this design proposal.&amp;nbsp; This looks like it could turn into a real nightmare to manage with a ton of traffic being unnecessarily processed twice by the same firewall engine.&amp;nbsp; The only scenario I would even consider this in, is one where each pair is managed by a different team without overlap.&amp;nbsp; Even this, would have to be a forced security requirement on me.&amp;nbsp; My two cents. Good luck to you.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;PS - Even better, I would talk to Palo about trading in those 4 firewalls for 2x of a more powerful model.&lt;/P&gt;</description>
      <pubDate>Wed, 08 Apr 2020 19:16:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/2x-of-pa820-active-passive-design-question/m-p/321701#M82320</guid>
      <dc:creator>jeremy.larsen</dc:creator>
      <dc:date>2020-04-08T19:16:06Z</dc:date>
    </item>
    <item>
      <title>Re: 2X of PA820 Active/ Passive Design question</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/2x-of-pa820-active-passive-design-question/m-p/321709#M82321</link>
      <description>&lt;P&gt;I may see if thats possible...but I doubt it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;very little traffic traverses the firewalls pairs.....syslog, snmp, icmp thats it basically.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 08 Apr 2020 20:35:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/2x-of-pa820-active-passive-design-question/m-p/321709#M82321</guid>
      <dc:creator>craigpaolozzi</dc:creator>
      <dc:date>2020-04-08T20:35:11Z</dc:date>
    </item>
    <item>
      <title>Re: 2X of PA820 Active/ Passive Design question</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/2x-of-pa820-active-passive-design-question/m-p/321716#M82322</link>
      <description>&lt;P&gt;Another quick question sorry...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In PA Active/ Passive - they share the same interface IP's (except the management ports)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In a Cisco ASA world, if I wanted to logon to the Passive member, I could do by using the Standby address of the firewall.&amp;nbsp; But in Palo Alto world that's not possible as interfaces don't have standby address.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm assuming the only way I can achieve the above is by using the management ports on each of the firewalls, then I can logon to the Passive node via the management IP.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We are going to be using Panorama too&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 08 Apr 2020 21:02:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/2x-of-pa820-active-passive-design-question/m-p/321716#M82322</guid>
      <dc:creator>craigpaolozzi</dc:creator>
      <dc:date>2020-04-08T21:02:12Z</dc:date>
    </item>
    <item>
      <title>Re: 2X of PA820 Active/ Passive Design question</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/2x-of-pa820-active-passive-design-question/m-p/321720#M82323</link>
      <description>&lt;P&gt;I've run into this a lot.&amp;nbsp; The first thing I tell people recovering from ASA... is take everything you know about firewalls and perform a memory dump.&amp;nbsp; ASA is a slowly dying dinosaur that has somehow survived on the Cisco name alone.&amp;nbsp; PAN operates completely different and the sooner you accept this, the sooner you will be happy, successful and never look back.&amp;nbsp; Management ports on the PAN run on the Control Plane and can be thought of as running on an independent OS with it's own routing table, ACL, etc.&amp;nbsp; If you have any familiarity with Juniper, it's almost the same.&amp;nbsp; To answer your question, Passive Nodes are available using the Management port completely independent of the Active Firewall. If you plan on using Panorama, don't set up your firewalls and then port to Panorama later.&amp;nbsp; You will regret it.&amp;nbsp; Step one of my Panorama deployments is to completely wipe the config on the Firewalls.&amp;nbsp; All configs/settings/updates/etc are then wholly managed and pushed from Panorama.&amp;nbsp; It is a top tier product and makes life full of awesome.&amp;nbsp; It really sounds to me like you guys need some PAN training.&amp;nbsp; I can't recommend this enough and you should talk to your PAN Rep ASAP.&lt;/P&gt;</description>
      <pubDate>Wed, 08 Apr 2020 21:18:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/2x-of-pa820-active-passive-design-question/m-p/321720#M82323</guid>
      <dc:creator>jeremy.larsen</dc:creator>
      <dc:date>2020-04-08T21:18:21Z</dc:date>
    </item>
    <item>
      <title>Re: 2X of PA820 Active/ Passive Design question</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/2x-of-pa820-active-passive-design-question/m-p/321794#M82333</link>
      <description>&lt;P&gt;Thanks for that, so I&amp;nbsp; will use the Management ports.&lt;/P&gt;&lt;P&gt;Yep we are waiting for training costs,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I would manage both pairs via the management address from Panorama?&lt;/P&gt;</description>
      <pubDate>Thu, 09 Apr 2020 06:23:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/2x-of-pa820-active-passive-design-question/m-p/321794#M82333</guid>
      <dc:creator>craigpaolozzi</dc:creator>
      <dc:date>2020-04-09T06:23:35Z</dc:date>
    </item>
    <item>
      <title>Re: 2X of PA820 Active/ Passive Design question</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/2x-of-pa820-active-passive-design-question/m-p/321893#M82361</link>
      <description>&lt;P&gt;Yes.&amp;nbsp; It is possible to change this behavior, but you would be locking yourself out of the passive node.&amp;nbsp; Stick with the management interfaces and you'll be fine.&lt;/P&gt;</description>
      <pubDate>Thu, 09 Apr 2020 14:38:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/2x-of-pa820-active-passive-design-question/m-p/321893#M82361</guid>
      <dc:creator>jeremy.larsen</dc:creator>
      <dc:date>2020-04-09T14:38:21Z</dc:date>
    </item>
    <item>
      <title>Re: 2X of PA820 Active/ Passive Design question</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/2x-of-pa820-active-passive-design-question/m-p/322018#M82390</link>
      <description>&lt;P&gt;Great, thanks for the advice BTW,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I should be able to keep the interface on the Palo Alo set as Layer 3 shouldnt i?&amp;nbsp; &amp;nbsp;Or will I have to change to a L2 interface ? I need to be able to have a IP address on the interface for the static routing.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;L2 VLAN, vlan id 555 for example, and all 4 ports will sit in that VLAN.&lt;/P&gt;</description>
      <pubDate>Thu, 09 Apr 2020 21:57:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/2x-of-pa820-active-passive-design-question/m-p/322018#M82390</guid>
      <dc:creator>craigpaolozzi</dc:creator>
      <dc:date>2020-04-09T21:57:56Z</dc:date>
    </item>
    <item>
      <title>Re: 2X of PA820 Active/ Passive Design question</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/2x-of-pa820-active-passive-design-question/m-p/322137#M82421</link>
      <description>&lt;P&gt;I highly recommend using Layer 3 sub-interfaces instead of vlan interfaces unless you've got some strange Layer 2 requirements.&lt;/P&gt;</description>
      <pubDate>Fri, 10 Apr 2020 14:14:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/2x-of-pa820-active-passive-design-question/m-p/322137#M82421</guid>
      <dc:creator>jeremy.larsen</dc:creator>
      <dc:date>2020-04-10T14:14:23Z</dc:date>
    </item>
    <item>
      <title>Re: 2X of PA820 Active/ Passive Design question</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/2x-of-pa820-active-passive-design-question/m-p/322140#M82423</link>
      <description>&lt;P&gt;Cool will setup L3 sub interfaces, and tag the vlan to the correct access vlan defined on the switch&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 10 Apr 2020 15:04:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/2x-of-pa820-active-passive-design-question/m-p/322140#M82423</guid>
      <dc:creator>craigpaolozzi</dc:creator>
      <dc:date>2020-04-10T15:04:34Z</dc:date>
    </item>
  </channel>
</rss>

