<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: AWS VPN Tunnel and Path Monitoring in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/aws-vpn-tunnel-and-path-monitoring/m-p/336123#M84690</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;This could be a config issue on the AWS side? I would double check both sides to make sure the proper settings are configured.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;</description>
    <pubDate>Tue, 30 Jun 2020 18:27:20 GMT</pubDate>
    <dc:creator>OtakarKlier</dc:creator>
    <dc:date>2020-06-30T18:27:20Z</dc:date>
    <item>
      <title>AWS VPN Tunnel and Path Monitoring</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/aws-vpn-tunnel-and-path-monitoring/m-p/336047#M84669</link>
      <description>&lt;P&gt;I have 2 AWS instances(Prod and Stage) each with redundant VPN tunnels to the same remote end Palo.&amp;nbsp; I setup path monitoring for each so that when one tunnel is down, the route is removed and the backup route is put in the FIB.&amp;nbsp; This only works with our stage instance and not our prod instance.&amp;nbsp; In each case, the tunnel state on the AWS side does not reflect the fact that I brought the tunnel down on the Palo side.&amp;nbsp; We also have seen times when the AWS tunnel was down, but the Palo side showed the tunnel as up.&amp;nbsp; Has anyone seen this or is anyone using AWS with VPN to Palos and have failover working properly?&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 30 Jun 2020 15:07:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/aws-vpn-tunnel-and-path-monitoring/m-p/336047#M84669</guid>
      <dc:creator>eridavis</dc:creator>
      <dc:date>2020-06-30T15:07:18Z</dc:date>
    </item>
    <item>
      <title>Re: AWS VPN Tunnel and Path Monitoring</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/aws-vpn-tunnel-and-path-monitoring/m-p/336107#M84683</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/135860"&gt;@eridavis&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;What is your ping interval and count set to, along with your preemptive hold value? What version of PAN-OS are you running?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This should just work, regardless if you VM-Series is running in AWS, Azure, or ESXi there really isn't anything special to the configuration due to hypervisor being utilized. The tunnels will likely show as up unless you've setup tunnel-monitoring so the actual tunnels are checking status; you're kind of already doing that with the path-monitoring on the static routes, but that doesn't really do anything as far as the actual tunnel itself is concerned.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 30 Jun 2020 17:06:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/aws-vpn-tunnel-and-path-monitoring/m-p/336107#M84683</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2020-06-30T17:06:34Z</dc:date>
    </item>
    <item>
      <title>Re: AWS VPN Tunnel and Path Monitoring</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/aws-vpn-tunnel-and-path-monitoring/m-p/336117#M84685</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;&amp;nbsp;Interval is default of 3 seconds and hold is default of 2 mins.&amp;nbsp; Pan-OS 8.1.11.&amp;nbsp; To clarify, we only have Palo at one end.&amp;nbsp; WE are using AWS VPV/VPN natively on the AWS side.&amp;nbsp; The issue is that in our Prod instance the VPN failover is not working.&amp;nbsp; I manually shutdown the primary IPsec tunnel and the path monitor removes the active route properly and adds the backup route to the FIB as it should.&amp;nbsp; The path monitor shows the tunnel is down and the traffic leaves the 2nd tunnel interface but no traffic comes back.&amp;nbsp; Also, the AWS side does not show the tunnel being down in either the prod or stage instances, so I'm not sure how AWS is routing traffic over the tunnels.&lt;/P&gt;</description>
      <pubDate>Tue, 30 Jun 2020 17:17:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/aws-vpn-tunnel-and-path-monitoring/m-p/336117#M84685</guid>
      <dc:creator>eridavis</dc:creator>
      <dc:date>2020-06-30T17:17:57Z</dc:date>
    </item>
    <item>
      <title>Re: AWS VPN Tunnel and Path Monitoring</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/aws-vpn-tunnel-and-path-monitoring/m-p/336123#M84690</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;This could be a config issue on the AWS side? I would double check both sides to make sure the proper settings are configured.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Tue, 30 Jun 2020 18:27:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/aws-vpn-tunnel-and-path-monitoring/m-p/336123#M84690</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2020-06-30T18:27:20Z</dc:date>
    </item>
  </channel>
</rss>

