<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Active/Passive vs. Active/Active in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/active-passive-vs-active-active/m-p/321752#M82325</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/75039"&gt;@MP18&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;Would mind elaborating how you are running active/active in vwire mode?&lt;/P&gt;&lt;P&gt;I am looking at how to use vwire behind a Check Point Cluster as an interim measure until the Palo's replace the Check Points.&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Ben&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 09 Apr 2020 01:01:47 GMT</pubDate>
    <dc:creator>benlewis</dc:creator>
    <dc:date>2020-04-09T01:01:47Z</dc:date>
    <item>
      <title>Active/Passive vs. Active/Active</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/active-passive-vs-active-active/m-p/68584#M39978</link>
      <description>&lt;P&gt;I am currently working on a network redesign project with all Cisco gear. Our network engineer is opting for a complete HSRP Active/Active environment. According to all deployment documentation, HA Active/Passive seems to be the preferred methed for the Palo Alto's. I see that the PA's do support A/A HA using VRRP, so I do not see a configuration issue. Can someone provide the pro's and con's of deploying the PA's in an A/P vs. A/A environment? Are there any performance implications? Are there any issues when using the PA's in an A/A configuration for VPN termination, etc...?&lt;/P&gt;</description>
      <pubDate>Tue, 24 Nov 2015 22:37:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/active-passive-vs-active-active/m-p/68584#M39978</guid>
      <dc:creator>JayBlanchard</dc:creator>
      <dc:date>2015-11-24T22:37:07Z</dc:date>
    </item>
    <item>
      <title>Re: Active/Passive vs. Active/Active</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/active-passive-vs-active-active/m-p/68587#M39979</link>
      <description>&lt;P&gt;Unless you have asymmetric routes (where traffic leaves one firewall and the only way back is through a different firewall), then you should use Active/Passive HA. &amp;nbsp;Active/Active was designed for networks with asymmetric routing. &amp;nbsp;For all other cases, use Active/Passive. &amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 24 Nov 2015 23:23:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/active-passive-vs-active-active/m-p/68587#M39979</guid>
      <dc:creator>jvalentine</dc:creator>
      <dc:date>2015-11-24T23:23:31Z</dc:date>
    </item>
    <item>
      <title>Re: Active/Passive vs. Active/Active</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/active-passive-vs-active-active/m-p/68593#M39985</link>
      <description>&lt;P&gt;PAN does strongly prefer active/passive. &amp;nbsp;But asymmetrical routing is not the only case where &amp;nbsp;active/active is required.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Active/active is required is if your infratructure requires communication be permitted between devices connected to the secondary firewall at all times. &amp;nbsp;With PAN Active/Passive the secondary (passive) node has interfaces connected, link is up but no traffic will pass until the device becomes active.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This is great for preventing layer 2 loops when the active and passive device are simply an alternate path for the same traffic.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;But if you network design is fully active/active and therefore there is traffic such as bgp, vrrp, or other protocols that need to communicate on secondary links at all times, you must have the PAN cluster setup as active/active.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;And if the network design is fully active/active where the traffic load is distributed across both paths, then active/active is also required.&lt;/P&gt;</description>
      <pubDate>Tue, 24 Nov 2015 23:45:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/active-passive-vs-active-active/m-p/68593#M39985</guid>
      <dc:creator>pulukas</dc:creator>
      <dc:date>2015-11-24T23:45:00Z</dc:date>
    </item>
    <item>
      <title>Re: Active/Passive vs. Active/Active</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/active-passive-vs-active-active/m-p/68597#M39989</link>
      <description>&lt;P&gt;&lt;SPAN style="line-height: 20px;"&gt;Here's a link to the high-availability section of the PAN-OS documentation:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;- &lt;A href="https://www.paloaltonetworks.com/documentation/70/pan-os/pan-os/high-availability/ha-concepts.html#17894" target="_blank"&gt;https://www.paloaltonetworks.com/documentation/70/pan-os/pan-os/high-availability/ha-concepts.html#17894&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;From there you can read Palo Alto Networks' recommendations, along with links to design guides and tech notes relating to both methods of high availability. &amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 25 Nov 2015 00:20:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/active-passive-vs-active-active/m-p/68597#M39989</guid>
      <dc:creator>jvalentine</dc:creator>
      <dc:date>2015-11-25T00:20:22Z</dc:date>
    </item>
    <item>
      <title>Re: Active/Passive vs. Active/Active</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/active-passive-vs-active-active/m-p/254249#M72166</link>
      <description>&lt;P&gt;I am thinking of running active/active on a pair of 5250's in the network core due to the fact that southbound is a pair of core switches that are running alternating HSRP groups or even GLBP. If both firewalls are active then I can leverage ECMP from Core Switches to Core Firewalls. Anyone running Palo Altos in the core active/active?&lt;/P&gt;</description>
      <pubDate>Tue, 19 Mar 2019 18:18:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/active-passive-vs-active-active/m-p/254249#M72166</guid>
      <dc:creator>stevenjwilliams83</dc:creator>
      <dc:date>2019-03-19T18:18:12Z</dc:date>
    </item>
    <item>
      <title>Re: Active/Passive vs. Active/Active</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/active-passive-vs-active-active/m-p/254336#M72178</link>
      <description>&lt;P&gt;yes we are alto running active active in vwire mode.&lt;/P&gt;</description>
      <pubDate>Wed, 20 Mar 2019 00:24:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/active-passive-vs-active-active/m-p/254336#M72178</guid>
      <dc:creator>MP18</dc:creator>
      <dc:date>2019-03-20T00:24:33Z</dc:date>
    </item>
    <item>
      <title>Re: Active/Passive vs. Active/Active</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/active-passive-vs-active-active/m-p/254736#M72292</link>
      <description>&lt;P&gt;I have ran them active/active at the core.&amp;nbsp; I scratched all Layer2 trickery (HSRP,VRRP,etc) and just incorporated them into my OSPF area.&amp;nbsp; You have to think of them as 2 routers that just happen to shared a session table.&amp;nbsp; You can then inject default 0.0.0.0/0 routes from both.&amp;nbsp; It doesn't matter which default route is preferred in your route tables (and yes, ECMP works awesome).&amp;nbsp; If PANa is the session owner but PANb receives the packet, it will forward the packet over to the session owner (HA3/HSCI).&amp;nbsp; There is only one catch in this scenario.&amp;nbsp; If one of the PANs fail, the failover is instantaneous.&amp;nbsp; Problems can arrive when the failed member rejoins.&amp;nbsp; If the OSPF/BGP,etc protocol come up before the firewalls are completely synced, you will get some drops.&amp;nbsp; To fix this, you can manually or script the ports connected to the PANs to turn on only after a full sync has occurred.&amp;nbsp; (This last part in thanks to my Panorama instructor)&lt;/P&gt;</description>
      <pubDate>Fri, 22 Mar 2019 19:40:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/active-passive-vs-active-active/m-p/254736#M72292</guid>
      <dc:creator>jeremy.larsen</dc:creator>
      <dc:date>2019-03-22T19:40:10Z</dc:date>
    </item>
    <item>
      <title>Re: Active/Passive vs. Active/Active</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/active-passive-vs-active-active/m-p/254895#M72346</link>
      <description>&lt;P&gt;Were you using them as your core routing point for all your vlans? Or were you running a core pair of switches southbound and terminating SVIs there?&lt;/P&gt;</description>
      <pubDate>Mon, 25 Mar 2019 13:16:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/active-passive-vs-active-active/m-p/254895#M72346</guid>
      <dc:creator>stevenjwilliams83</dc:creator>
      <dc:date>2019-03-25T13:16:02Z</dc:date>
    </item>
    <item>
      <title>Re: Active/Passive vs. Active/Active</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/active-passive-vs-active-active/m-p/254915#M72351</link>
      <description>&lt;P&gt;I've done both.&amp;nbsp; My preference is to run OSPF (or choose your dynamic routing protocol) to switches that support sub-interfaces (ie - most Junipers) thus severing any Layer 2 / bridge loop goofiness and shrinking your broadcast/failure domains.&amp;nbsp; These sub-interfaces are then segmented by VRF/vRouter/(choose your terminology) which are then assigned to security zones on the PAN.&amp;nbsp; Then, interVRF matches interZone and intraVRF matches intraZone.&amp;nbsp; Anything traversing between VRFs must hit the PAN and be processed (ie - VRF Segmentation)&lt;/P&gt;</description>
      <pubDate>Mon, 25 Mar 2019 16:17:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/active-passive-vs-active-active/m-p/254915#M72351</guid>
      <dc:creator>jeremy.larsen</dc:creator>
      <dc:date>2019-03-25T16:17:29Z</dc:date>
    </item>
    <item>
      <title>Re: Active/Passive vs. Active/Active</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/active-passive-vs-active-active/m-p/255076#M72393</link>
      <description>&lt;P&gt;Where are you running you vlan gateways?&lt;/P&gt;</description>
      <pubDate>Tue, 26 Mar 2019 15:16:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/active-passive-vs-active-active/m-p/255076#M72393</guid>
      <dc:creator>stevenjwilliams83</dc:creator>
      <dc:date>2019-03-26T15:16:31Z</dc:date>
    </item>
    <item>
      <title>Re: Active/Passive vs. Active/Active</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/active-passive-vs-active-active/m-p/255077#M72394</link>
      <description>&lt;P&gt;Gateways are pushed down by OSPF.&amp;nbsp; You would most likely be pushing the local VLAN GW with DHCP.&amp;nbsp; OSPF would take care of it from there.&amp;nbsp; Does that make sense?&lt;/P&gt;</description>
      <pubDate>Tue, 26 Mar 2019 15:28:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/active-passive-vs-active-active/m-p/255077#M72394</guid>
      <dc:creator>jeremy.larsen</dc:creator>
      <dc:date>2019-03-26T15:28:21Z</dc:date>
    </item>
    <item>
      <title>Re: Active/Passive vs. Active/Active</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/active-passive-vs-active-active/m-p/255079#M72396</link>
      <description>&lt;P&gt;So your SVIs run on layer 3 interfaces/sub-interfaces on the Palos. I would be running mine on a pair of Cat9ks one layer southbound.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 26 Mar 2019 15:39:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/active-passive-vs-active-active/m-p/255079#M72396</guid>
      <dc:creator>stevenjwilliams83</dc:creator>
      <dc:date>2019-03-26T15:39:49Z</dc:date>
    </item>
    <item>
      <title>Re: Active/Passive vs. Active/Active</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/active-passive-vs-active-active/m-p/255082#M72397</link>
      <description>&lt;P&gt;You can either span the vlan all the way through to the PAN subinterfaces or route between the PAN &amp;amp; the 9Ks.&amp;nbsp; I prefer routing between the two and like I mentioned before, breaking up my security zones using VRF and redistributing your default gateway(s) with a dynamic routing protocol.&amp;nbsp; You can do VRF on the 9Ks all day long.&lt;/P&gt;</description>
      <pubDate>Tue, 26 Mar 2019 16:50:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/active-passive-vs-active-active/m-p/255082#M72397</guid>
      <dc:creator>jeremy.larsen</dc:creator>
      <dc:date>2019-03-26T16:50:51Z</dc:date>
    </item>
    <item>
      <title>Re: Active/Passive vs. Active/Active</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/active-passive-vs-active-active/m-p/255083#M72398</link>
      <description>&lt;P&gt;So what are you doing to redistribute routes and default routes into vrfs and global route tables?&lt;/P&gt;</description>
      <pubDate>Tue, 26 Mar 2019 16:55:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/active-passive-vs-active-active/m-p/255083#M72398</guid>
      <dc:creator>stevenjwilliams83</dc:creator>
      <dc:date>2019-03-26T16:55:13Z</dc:date>
    </item>
    <item>
      <title>Re: Active/Passive vs. Active/Active</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/active-passive-vs-active-active/m-p/255084#M72399</link>
      <description>&lt;P&gt;That depends on your design and preferences.&amp;nbsp; You can create a 0.0.0.0/0 static route on the PAN and redistribute from there.&amp;nbsp; If you are running internet facing routers, you can redistribute from there back into the PAN.&amp;nbsp; Or, you can have your ISP redistribute the default into your internet facing routers and back down through.&amp;nbsp; It's really up to you.&lt;/P&gt;</description>
      <pubDate>Tue, 26 Mar 2019 16:58:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/active-passive-vs-active-active/m-p/255084#M72399</guid>
      <dc:creator>jeremy.larsen</dc:creator>
      <dc:date>2019-03-26T16:58:56Z</dc:date>
    </item>
    <item>
      <title>Re: Active/Passive vs. Active/Active</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/active-passive-vs-active-active/m-p/255091#M72401</link>
      <description>&lt;P&gt;I think focusing on the Core Switch Layer (nexus/cat9k) that has multiple VRFs that egress Layer 3 routed ports on the Core to the Core Palo FW. In order for the Palo to come back down to a different VRF the Palo needs to know about thise VRF networks in the global route table. So right now im just using static to do this but BGP could help route leak and make it easier and cleaner. Now are you saying you have ONE vRouter per vrf and then vrouters can talk to each other?&lt;/P&gt;</description>
      <pubDate>Tue, 26 Mar 2019 18:53:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/active-passive-vs-active-active/m-p/255091#M72401</guid>
      <dc:creator>stevenjwilliams83</dc:creator>
      <dc:date>2019-03-26T18:53:04Z</dc:date>
    </item>
    <item>
      <title>Re: Active/Passive vs. Active/Active</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/active-passive-vs-active-active/m-p/255094#M72402</link>
      <description>&lt;P&gt;Nah.&amp;nbsp; I would give the PAN a single vRouter.&amp;nbsp; That's your VRF convergence point.&amp;nbsp; No leaking necessary.&lt;/P&gt;</description>
      <pubDate>Tue, 26 Mar 2019 19:19:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/active-passive-vs-active-active/m-p/255094#M72402</guid>
      <dc:creator>jeremy.larsen</dc:creator>
      <dc:date>2019-03-26T19:19:19Z</dc:date>
    </item>
    <item>
      <title>Re: Active/Passive vs. Active/Active</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/active-passive-vs-active-active/m-p/255095#M72403</link>
      <description>&lt;P&gt;Yes but then you need to get all your Routing layer subnets per vrf back into the global route table so the palo can route back down to a different vrf&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 26 Mar 2019 19:20:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/active-passive-vs-active-active/m-p/255095#M72403</guid>
      <dc:creator>stevenjwilliams83</dc:creator>
      <dc:date>2019-03-26T19:20:53Z</dc:date>
    </item>
    <item>
      <title>Re: Active/Passive vs. Active/Active</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/active-passive-vs-active-active/m-p/255116#M72406</link>
      <description>&lt;P&gt;Maybe I'm misunderstanding what you mean by "global route table".&amp;nbsp; For example: Let's say you have a single PAN vRouter and all of it's attached interfaces (ie - VRFs on the 9K) all in an OSPF area 0.&amp;nbsp; Then each VRF will have routes for every other VRF.&amp;nbsp; But, they must be allowed through by your FW rules in the PAN.&amp;nbsp; Perhaps I'm missing a piece of this equation?&lt;/P&gt;</description>
      <pubDate>Tue, 26 Mar 2019 21:26:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/active-passive-vs-active-active/m-p/255116#M72406</guid>
      <dc:creator>jeremy.larsen</dc:creator>
      <dc:date>2019-03-26T21:26:37Z</dc:date>
    </item>
    <item>
      <title>Re: Active/Passive vs. Active/Active</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/active-passive-vs-active-active/m-p/278342#M75591</link>
      <description>&lt;P&gt;So I have this setup and it appears to be "working" but I seem to be having some issues with ECMP and sessions. When I run a packet capture I am seeing tcp out of order messages.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My core 9500s (not stacked or using VSS) are dual connected to each Palo Alto in active/active. I have HA session owner to first packet and session setup to first packet as well.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am seeing lots of "unknowns" "n/a" "aged-out" in my traffic logs. The core 9500s are running /30 layer 3 links to each palo. OSPF is used to advertise loopbacks into the route table and the 9500s and palos are using iBGP for the main routing protocol. I am seeing multiple-paths from the core 9500s and the palos. The 9500s are running HSRP. So OSPF is doing ecmp to loopbacks from 9500s to palos, palos doing ecmp to each 9500.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What should my ecmp settings be? Should my ha session options be different than they are?&lt;/P&gt;</description>
      <pubDate>Tue, 23 Jul 2019 12:41:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/active-passive-vs-active-active/m-p/278342#M75591</guid>
      <dc:creator>Stevenjwilliams83</dc:creator>
      <dc:date>2019-07-23T12:41:45Z</dc:date>
    </item>
  </channel>
</rss>

