<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Issue in HA link monitoring in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/issue-in-ha-link-monitoring/m-p/396525#M91381</link>
    <description>&lt;P&gt;It sounds good if the passive fortigate blocks the traffic to (8.8.8.8) as I am not fortigate expert but be carefull even when the connected fortigate to palo alto becomes passive if there is dunamic routing and so on it is possible the icmp health monitor probes to go from Palo Alto firewall to the other fortigate that is active and the palo alto will not failover.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If the path is as in the picture and for the active palo alto to reach 8.8.8.8 when the fortigate that is on top of it failovers then the active firewall will send the icmp to the standby palo alto firewall and it will be discarded and the path monitoring failover will work.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClcACAS" target="_blank" rel="noopener"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClcACAS&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You only need to make certain that there are no other network paths that you have noshow in the provided picture for the palo Alto firewall icmp probes.&lt;/P&gt;</description>
    <pubDate>Thu, 08 Apr 2021 10:05:12 GMT</pubDate>
    <dc:creator>nikoolayy1</dc:creator>
    <dc:date>2021-04-08T10:05:12Z</dc:date>
    <item>
      <title>Issue in HA link monitoring</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/issue-in-ha-link-monitoring/m-p/396065#M91337</link>
      <description>&lt;P&gt;Hi,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ISP Primary&amp;gt;&amp;gt;Fortigate Active &amp;gt;&amp;gt; Paloalt Active&lt;/P&gt;&lt;P&gt;ISP Standby &amp;gt;&amp;gt;Fortigate Passive &amp;gt;&amp;gt; Paloalto Passive&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;we have&amp;nbsp; ISP&amp;nbsp; is connected with&amp;nbsp; FortiGate Active&amp;nbsp; Firewall and FortiGate which is directly connected with Paloalto&amp;nbsp; Active Firewall same as ISP standby is connected with&amp;nbsp; Fortigate Passive Firewall which directly connected with&amp;nbsp; Paloalto&amp;nbsp; Passive firewall.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;As we have configured the link monitoring between Paloalto and fortigate. For any reason, if FortiGate is not working then it’s shifts their traffic from FortiGate active to FortiGate passive firewall and also shifts their traffic&amp;nbsp; Paloalto active firewall to Paloalto passive firewall.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now our&amp;nbsp; query is that if we&amp;nbsp; make forcefully do the FortiGate active to the passive firewall. Will the Paloalto firewall changes their state from active to passive or not.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Joshan_Lakhani_1-1617727170024.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/30750i3C8B64A2159EB563/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="Joshan_Lakhani_1-1617727170024.png" alt="Joshan_Lakhani_1-1617727170024.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 06 Apr 2021 16:40:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/issue-in-ha-link-monitoring/m-p/396065#M91337</guid>
      <dc:creator>Joshan_Lakhani</dc:creator>
      <dc:date>2021-04-06T16:40:17Z</dc:date>
    </item>
    <item>
      <title>Re: Issue in HA link monitoring</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/issue-in-ha-link-monitoring/m-p/396282#M91352</link>
      <description>&lt;P&gt;If the palo Alto path monitoring is to a floating/VRRP etc. IP address on the fortigate (or the ip address on something else after the fortigate) and you make so that this ip is only reachable by the path monitoring using routing and security only when the fortigate next to the palo alto is active. In other words the path monitoring icmp probes should only work on left active palo alto firewall, when the fortigate on the left is also active.&lt;/P&gt;</description>
      <pubDate>Wed, 07 Apr 2021 09:58:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/issue-in-ha-link-monitoring/m-p/396282#M91352</guid>
      <dc:creator>nikoolayy1</dc:creator>
      <dc:date>2021-04-07T09:58:00Z</dc:date>
    </item>
    <item>
      <title>Re: Issue in HA link monitoring</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/issue-in-ha-link-monitoring/m-p/396309#M91357</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/153031"&gt;@nikoolayy1&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My question is that if i forcefully change the state fortigate active firewall to passive firewall.Did paloalto will change there status automatically from active to passive or not.&lt;/P&gt;</description>
      <pubDate>Wed, 07 Apr 2021 11:23:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/issue-in-ha-link-monitoring/m-p/396309#M91357</guid>
      <dc:creator>Joshan_Lakhani</dc:creator>
      <dc:date>2021-04-07T11:23:03Z</dc:date>
    </item>
    <item>
      <title>Re: Issue in HA link monitoring</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/issue-in-ha-link-monitoring/m-p/396314#M91358</link>
      <description>&lt;P&gt;This is not a specific Palo Alto question as it depends if you have set up the path monitoring IP correctly and the routing and security but that is the idea of path monitoring to switch between firewalls being active or passive:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/10-0/pan-os-web-interface-help/device/device-high-availability/ha-link-and-path-monitoring.html" target="_blank"&gt;https://docs.paloaltonetworks.com/pan-os/10-0/pan-os-web-interface-help/device/device-high-availability/ha-link-and-path-monitoring.html&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 07 Apr 2021 11:38:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/issue-in-ha-link-monitoring/m-p/396314#M91358</guid>
      <dc:creator>nikoolayy1</dc:creator>
      <dc:date>2021-04-07T11:38:06Z</dc:date>
    </item>
    <item>
      <title>Re: Issue in HA link monitoring</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/issue-in-ha-link-monitoring/m-p/396505#M91378</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/153031"&gt;@nikoolayy1&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank for your message.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In case the path monitoring is configured &amp;nbsp;with the PA IP of the &amp;nbsp;port which is &amp;nbsp;connected to FG as source &amp;nbsp;and 8.8.8.8 as destination , when FG become slave the PA connected port to FG will not be able to reach the 8.8.8.8 and then the PA become slave .&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can that be &amp;nbsp;done with Path monitoring ? if yes please suggest&lt;/P&gt;</description>
      <pubDate>Thu, 08 Apr 2021 05:06:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/issue-in-ha-link-monitoring/m-p/396505#M91378</guid>
      <dc:creator>Joshan_Lakhani</dc:creator>
      <dc:date>2021-04-08T05:06:47Z</dc:date>
    </item>
    <item>
      <title>Re: Issue in HA link monitoring</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/issue-in-ha-link-monitoring/m-p/396525#M91381</link>
      <description>&lt;P&gt;It sounds good if the passive fortigate blocks the traffic to (8.8.8.8) as I am not fortigate expert but be carefull even when the connected fortigate to palo alto becomes passive if there is dunamic routing and so on it is possible the icmp health monitor probes to go from Palo Alto firewall to the other fortigate that is active and the palo alto will not failover.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If the path is as in the picture and for the active palo alto to reach 8.8.8.8 when the fortigate that is on top of it failovers then the active firewall will send the icmp to the standby palo alto firewall and it will be discarded and the path monitoring failover will work.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClcACAS" target="_blank" rel="noopener"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClcACAS&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You only need to make certain that there are no other network paths that you have noshow in the provided picture for the palo Alto firewall icmp probes.&lt;/P&gt;</description>
      <pubDate>Thu, 08 Apr 2021 10:05:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/issue-in-ha-link-monitoring/m-p/396525#M91381</guid>
      <dc:creator>nikoolayy1</dc:creator>
      <dc:date>2021-04-08T10:05:12Z</dc:date>
    </item>
    <item>
      <title>Re: Issue in HA link monitoring</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/issue-in-ha-link-monitoring/m-p/396689#M91399</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;Just curious as to why you have two firewalls in line like this? I know it was a practice back in the day. However with a properly licensed and configured Palo Alto, you dont need this.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Thu, 08 Apr 2021 21:34:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/issue-in-ha-link-monitoring/m-p/396689#M91399</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2021-04-08T21:34:09Z</dc:date>
    </item>
  </channel>
</rss>

