<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Redundant Static Route through two IPSec Tunnels in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/redundant-static-route-through-two-ipsec-tunnels/m-p/414719#M93166</link>
    <description>&lt;P&gt;Hello All,&lt;/P&gt;&lt;P&gt;I am attempting to setup primary and backup route to the same IP through two different IPSec tunnels. I have attempted both PBF and Static Route Path Monitoring and cant seem to get either to work, in both cases is because there is no IP assigned directly to the tunnel interface.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here's the layout:&lt;/P&gt;&lt;P&gt;Site A&lt;/P&gt;&lt;P&gt;PA-820&amp;nbsp; Int 3&amp;lt;-------------------&amp;gt; Int 1(Service provider Cisco ISR) &amp;nbsp;route to 192.168.2.0/24 (Primary)&lt;/P&gt;&lt;P&gt;192.168.1.0/24&lt;/P&gt;&lt;P&gt;IPSec Tunnels to Sites B &amp;amp; C&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Site B&lt;/P&gt;&lt;P&gt;PA-220&amp;nbsp; Int 3&amp;lt;-------------------&amp;gt; Int 1(Service provider Cisco ISR) &amp;nbsp;route to 192.168.2.0/24 (Secondary)&lt;/P&gt;&lt;P&gt;192.168.2.0/24&lt;/P&gt;&lt;P&gt;IPSec Tunnels to Sites A &amp;amp; C&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Sites C&lt;/P&gt;&lt;P&gt;PA-220&lt;/P&gt;&lt;P&gt;192.168.3.0/24&lt;/P&gt;&lt;P&gt;IPSec Tunnels to Sites A &amp;amp; B&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The outcome I am looking for is any time Site A or C cannot get to the 192.168.2.0 network through Site A that it will automatically start routing 192.168.2.0 traffic to Site B.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Same for Site B, anytime it cannot get to 192.168.2.0 through its direct connected route, it will pass that traffic to Site A.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The way I have it configured now is with two static routes to 192.168.2.0 with the secondary route having a higher metric and distance but was really wanting a more solid solution that would remove the route the way path monitoring or PBF works.&lt;/P&gt;</description>
    <pubDate>Wed, 23 Jun 2021 12:53:31 GMT</pubDate>
    <dc:creator>JoeJackson</dc:creator>
    <dc:date>2021-06-23T12:53:31Z</dc:date>
    <item>
      <title>Redundant Static Route through two IPSec Tunnels</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/redundant-static-route-through-two-ipsec-tunnels/m-p/414719#M93166</link>
      <description>&lt;P&gt;Hello All,&lt;/P&gt;&lt;P&gt;I am attempting to setup primary and backup route to the same IP through two different IPSec tunnels. I have attempted both PBF and Static Route Path Monitoring and cant seem to get either to work, in both cases is because there is no IP assigned directly to the tunnel interface.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here's the layout:&lt;/P&gt;&lt;P&gt;Site A&lt;/P&gt;&lt;P&gt;PA-820&amp;nbsp; Int 3&amp;lt;-------------------&amp;gt; Int 1(Service provider Cisco ISR) &amp;nbsp;route to 192.168.2.0/24 (Primary)&lt;/P&gt;&lt;P&gt;192.168.1.0/24&lt;/P&gt;&lt;P&gt;IPSec Tunnels to Sites B &amp;amp; C&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Site B&lt;/P&gt;&lt;P&gt;PA-220&amp;nbsp; Int 3&amp;lt;-------------------&amp;gt; Int 1(Service provider Cisco ISR) &amp;nbsp;route to 192.168.2.0/24 (Secondary)&lt;/P&gt;&lt;P&gt;192.168.2.0/24&lt;/P&gt;&lt;P&gt;IPSec Tunnels to Sites A &amp;amp; C&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Sites C&lt;/P&gt;&lt;P&gt;PA-220&lt;/P&gt;&lt;P&gt;192.168.3.0/24&lt;/P&gt;&lt;P&gt;IPSec Tunnels to Sites A &amp;amp; B&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The outcome I am looking for is any time Site A or C cannot get to the 192.168.2.0 network through Site A that it will automatically start routing 192.168.2.0 traffic to Site B.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Same for Site B, anytime it cannot get to 192.168.2.0 through its direct connected route, it will pass that traffic to Site A.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The way I have it configured now is with two static routes to 192.168.2.0 with the secondary route having a higher metric and distance but was really wanting a more solid solution that would remove the route the way path monitoring or PBF works.&lt;/P&gt;</description>
      <pubDate>Wed, 23 Jun 2021 12:53:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/redundant-static-route-through-two-ipsec-tunnels/m-p/414719#M93166</guid>
      <dc:creator>JoeJackson</dc:creator>
      <dc:date>2021-06-23T12:53:31Z</dc:date>
    </item>
    <item>
      <title>Re: Redundant Static Route through two IPSec Tunnels</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/redundant-static-route-through-two-ipsec-tunnels/m-p/414729#M93168</link>
      <description>&lt;P&gt;Good Day&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;May I recommend that you simply add an IP address within the tunnel interface, so that you can do tunnel monitoring.&lt;/P&gt;
&lt;P&gt;PBF, Static Route Path Monitoring, and Tunnel Monitoring would use IPs for either next hops or monitoring IPs.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 23 Jun 2021 13:27:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/redundant-static-route-through-two-ipsec-tunnels/m-p/414729#M93168</guid>
      <dc:creator>S.Cantwell</dc:creator>
      <dc:date>2021-06-23T13:27:26Z</dc:date>
    </item>
    <item>
      <title>Re: Redundant Static Route through two IPSec Tunnels</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/redundant-static-route-through-two-ipsec-tunnels/m-p/414770#M93177</link>
      <description>&lt;P&gt;I did try that. At site A, I added IP 192.168.1.5/24 to the tunnel interface but I get an error that the IP address overlaps with the IP addresses assigned to another interface. How do I fix this?&lt;/P&gt;</description>
      <pubDate>Wed, 23 Jun 2021 15:24:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/redundant-static-route-through-two-ipsec-tunnels/m-p/414770#M93177</guid>
      <dc:creator>JoeJackson</dc:creator>
      <dc:date>2021-06-23T15:24:18Z</dc:date>
    </item>
    <item>
      <title>Re: Redundant Static Route through two IPSec Tunnels</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/redundant-static-route-through-two-ipsec-tunnels/m-p/414779#M93178</link>
      <description>&lt;P&gt;What I would recommend is to have a subnet (could be /30) that would be unique for each VPN.&lt;/P&gt;
&lt;P&gt;So for a single VPN (have a different subnet... 10.99.99.1/30 on one side and 10.99.99.2/30 on the other, and continue to monitor)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;That would be for tunnel monitoring (under your IPSec configuration)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For the static route path monitor, you could have your virtual router "ping" some IP on the remote side of the VPN.&lt;BR /&gt;I believe this may alleviate the need to set up tunnel interfaces, or a way to compliment them.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;What other questions can we answer.&lt;/P&gt;</description>
      <pubDate>Wed, 23 Jun 2021 15:52:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/redundant-static-route-through-two-ipsec-tunnels/m-p/414779#M93178</guid>
      <dc:creator>S.Cantwell</dc:creator>
      <dc:date>2021-06-23T15:52:50Z</dc:date>
    </item>
  </channel>
</rss>

