<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Ipsec Tunnel Failover issue in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-failover-issue/m-p/329278#M83608</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;Have you tried enabling tunnel monitor?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/vpns/site-to-site-vpn-concepts/tunnel-monitoring.html" target="_blank"&gt;https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/vpns/site-to-site-vpn-concepts/tunnel-monitoring.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000CloYCAS" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000CloYCAS&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;</description>
    <pubDate>Thu, 21 May 2020 21:39:54 GMT</pubDate>
    <dc:creator>OtakarKlier</dc:creator>
    <dc:date>2020-05-21T21:39:54Z</dc:date>
    <item>
      <title>Ipsec Tunnel Failover issue</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-failover-issue/m-p/329094#M83580</link>
      <description>&lt;DIV&gt;&lt;DIV class=""&gt;&lt;DIV class="public-DraftStyleDefault-block public-DraftStyleDefault-ltr"&gt;&lt;SPAN&gt;We have a PA-3020 firewall pair that has multiple IPsec tunnels to a VM series pair in AWS. We have 4 IPsec tunnels that we run to the firewalls. They are: &lt;/SPAN&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;UL&gt;&lt;LI&gt;&lt;DIV class="public-DraftStyleDefault-block public-DraftStyleDefault-ltr"&gt;&lt;SPAN&gt;Tunnel A - On Prem to AWS FW1 over Direct Connect&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;LI&gt;&lt;DIV class="public-DraftStyleDefault-block public-DraftStyleDefault-ltr"&gt;&lt;SPAN&gt;Tunnel B - On Prem to AWS FW2 over Direct Connect&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;LI&gt;&lt;DIV class="public-DraftStyleDefault-block public-DraftStyleDefault-ltr"&gt;&lt;SPAN&gt;Tunnel C - On Prem to AWS FW1 over Public Internet&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;LI&gt;&lt;DIV class="public-DraftStyleDefault-block public-DraftStyleDefault-ltr"&gt;&lt;SPAN&gt;Tunnel D - On Prem to AWS FW1 over Public Internet&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;DIV class=""&gt;&lt;DIV class="public-DraftStyleDefault-block public-DraftStyleDefault-ltr"&gt;&lt;SPAN&gt;We also have BGP routing in place and peer with the AWS FW1 and FW2. If I test killing BGP on FW1 in AWS, our PA-3020 automatically routes traffic to Tunnel B, and within 15 seconds, we are sending traffic to/from FW2. That part works perfectly. &lt;/SPAN&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class="public-DraftStyleDefault-block public-DraftStyleDefault-ltr"&gt;&lt;SPAN&gt;However, if I down Tunnel A from the AWS side, we stay down indefinitely. BGP knows to send traffic to Tunnel B, but communication over Tunnel B does not occur. Security policies on the on prem firewall and AWS FW1 and FW2 allow for BGP and IPSec communication for all the tunnels.&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class="public-DraftStyleDefault-block public-DraftStyleDefault-ltr"&gt;&lt;SPAN&gt;I have tried Static Route monitoring, where you create the same route for the AWS traffic, but create different Metrics for each route which would use different tunnels.&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class="public-DraftStyleDefault-block public-DraftStyleDefault-ltr"&gt;&lt;SPAN&gt;For example: &lt;/SPAN&gt;&lt;SPAN&gt;&lt;A href="https://172.16.0.0/16" target="_blank" rel="noopener"&gt;172.16.0.0/16&lt;/A&gt;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class="public-DraftStyleDefault-block public-DraftStyleDefault-ltr"&gt;&lt;SPAN&gt;Route A &lt;/SPAN&gt;&lt;SPAN&gt;&lt;A href="https://172.16.0.0/16" target="_blank" rel="noopener"&gt;172.16.0.0/16&lt;/A&gt;&lt;/SPAN&gt;&lt;SPAN&gt; via Tunnel A Metric 10&lt;BR /&gt;Route B &lt;/SPAN&gt;&lt;SPAN&gt;&lt;A href="https://172.16.0.0/16" target="_blank" rel="noopener"&gt;172.16.0.0/16&lt;/A&gt;&lt;/SPAN&gt;&lt;SPAN&gt; via Tunnel B Metric 15&lt;BR /&gt;Route C &lt;/SPAN&gt;&lt;SPAN&gt;&lt;A href="https://172.16.0.0/16" target="_blank" rel="noopener"&gt;172.16.0.0/16&lt;/A&gt;&lt;/SPAN&gt;&lt;SPAN&gt; via Tunnel C Metric 20&lt;BR /&gt;Route D &lt;/SPAN&gt;&lt;SPAN&gt;&lt;A href="https://172.16.0.0/16" target="_blank" rel="noopener"&gt;172.16.0.0/16&lt;/A&gt;&lt;/SPAN&gt;&lt;SPAN&gt; via Tunnel D Metric 10&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class="public-DraftStyleDefault-block public-DraftStyleDefault-ltr"&gt;&lt;SPAN&gt;&lt;BR /&gt;I have also enabled tunnel monitoring, and allowed pings to/from each firewall. I know that the static routes are no longer required since we use BGP, but what would be the preferred method in order to get the on prem firewall to automatically use Tunnel B if Tunnel A went down? Would a PBF profile be in order?&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;</description>
      <pubDate>Wed, 20 May 2020 23:39:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-failover-issue/m-p/329094#M83580</guid>
      <dc:creator>Fr4nk4</dc:creator>
      <dc:date>2020-05-20T23:39:10Z</dc:date>
    </item>
    <item>
      <title>Re: Ipsec Tunnel Failover issue</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-failover-issue/m-p/329278#M83608</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;Have you tried enabling tunnel monitor?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/vpns/site-to-site-vpn-concepts/tunnel-monitoring.html" target="_blank"&gt;https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/vpns/site-to-site-vpn-concepts/tunnel-monitoring.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000CloYCAS" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000CloYCAS&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;</description>
      <pubDate>Thu, 21 May 2020 21:39:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-failover-issue/m-p/329278#M83608</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2020-05-21T21:39:54Z</dc:date>
    </item>
  </channel>
</rss>

