<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Static Route Path Monitoring for automated VPN failover in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/static-route-path-monitoring-for-automated-vpn-failover/m-p/349743#M86892</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I would like to know if static route path monitoring can monitoring outside of the interface bound to the static route?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For example, I want to monitor across a VPN tunnel and if the test fails, withdraw the static route so traffic fails over to the backup VPN tunnel. I don't have a IP addresses (within the tunnel) on the destination side of the VPN tunnel which is always up and reachable. To get around this, I was hoping to monitor from a different interface to the public IP address of the destination VPN tunnel endpoint e.g. Internet facing interface of my firewall to the internet facing interface of the remote firewall.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is this scenerio possible or can static route path monitoring only monitor a destination which is reachable from the interface configured on the static route? Are there any other features that could get around this issue.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 16 Sep 2020 10:39:32 GMT</pubDate>
    <dc:creator>Bilbo007</dc:creator>
    <dc:date>2020-09-16T10:39:32Z</dc:date>
    <item>
      <title>Static Route Path Monitoring for automated VPN failover</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/static-route-path-monitoring-for-automated-vpn-failover/m-p/349743#M86892</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I would like to know if static route path monitoring can monitoring outside of the interface bound to the static route?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For example, I want to monitor across a VPN tunnel and if the test fails, withdraw the static route so traffic fails over to the backup VPN tunnel. I don't have a IP addresses (within the tunnel) on the destination side of the VPN tunnel which is always up and reachable. To get around this, I was hoping to monitor from a different interface to the public IP address of the destination VPN tunnel endpoint e.g. Internet facing interface of my firewall to the internet facing interface of the remote firewall.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is this scenerio possible or can static route path monitoring only monitor a destination which is reachable from the interface configured on the static route? Are there any other features that could get around this issue.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 16 Sep 2020 10:39:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/static-route-path-monitoring-for-automated-vpn-failover/m-p/349743#M86892</guid>
      <dc:creator>Bilbo007</dc:creator>
      <dc:date>2020-09-16T10:39:32Z</dc:date>
    </item>
    <item>
      <title>Re: Static Route Path Monitoring for automated VPN failover</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/static-route-path-monitoring-for-automated-vpn-failover/m-p/349757#M86894</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/155841"&gt;@Bilbo007&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In IPSEC tunnel failover scenario, you need to put static route path monitoring on the routes which are pointing to Primary tunnel interface. So If the destination mentioned in the path monitoring fails, that route will get automatically removed from FIB and the next route will get added into FIB which will point same destinations to the Secondary Tunnel interface. So for this, you need to have two routes for same tunnel destinations towards primary and secondary tunnel interfaces keeping higher metric on the secondary tunnel interface route. You will enable path monitoring on Primary tunnel interface route only.&amp;nbsp; This source IP should be allowed via tunnel.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For this configuration, whatever destination you are adding under monitoring, that destination should be reachable via tunnel. Also you need to have IP configured on the tunnel interface which will act as a source IP while monitoring respective destination.&amp;nbsp; &lt;STRONG&gt;This source IP should be allowed via tunnel.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you try to monitor IP from different interface lets say outside/internet facing so it means you are enabling path monitoring for the route which is being used to reach public IP. Mostly it will be your default route pointing towards internet. With this, it won't create any impact on the tunnel interface route. &lt;FONT color="#FF0000"&gt;But it may create problem on your default route which may create problems if destination becomes unreachable. So the scenario that you are saying wont work here.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;In order to work tunnel failover using static route path monitoring properly, you need to enable path-monitoring on the tunnel static routes only (The way it is explained in first para). &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;There is one more option to configure tunnel monitoring e.g. using Tunnel Monitoring under &lt;STRONG&gt;IPSEC Tunnel Profile, &lt;/STRONG&gt;in that case also you need to configure IP on the primary tunnel interface IP on Palo Alto Side.&lt;/P&gt;</description>
      <pubDate>Wed, 16 Sep 2020 12:09:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/static-route-path-monitoring-for-automated-vpn-failover/m-p/349757#M86894</guid>
      <dc:creator>SutareMayur</dc:creator>
      <dc:date>2020-09-16T12:09:53Z</dc:date>
    </item>
    <item>
      <title>Re: Static Route Path Monitoring for automated VPN failover</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/static-route-path-monitoring-for-automated-vpn-failover/m-p/349970#M86911</link>
      <description>&lt;P&gt;Thank you for all that information. You have answered my question perfectly.&lt;/P&gt;</description>
      <pubDate>Wed, 16 Sep 2020 23:51:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/static-route-path-monitoring-for-automated-vpn-failover/m-p/349970#M86911</guid>
      <dc:creator>Bilbo007</dc:creator>
      <dc:date>2020-09-16T23:51:16Z</dc:date>
    </item>
  </channel>
</rss>

