<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Active Active High Availability in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/active-active-high-availability/m-p/414996#M93207</link>
    <description>&lt;P&gt;In ha3 config you also need to set session owner etc. to "first packet" for this to work smoothly&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 24 Jun 2021 12:38:18 GMT</pubDate>
    <dc:creator>reaper</dc:creator>
    <dc:date>2021-06-24T12:38:18Z</dc:date>
    <item>
      <title>Active Active High Availability</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/active-active-high-availability/m-p/414501#M93135</link>
      <description>&lt;P&gt;Hello Group,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have done migration from Cisco ASA Firewalls to Palo Alto Firewalls.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In Cisco ASA Firewalls, I was using multi-context (there were two contexts, Context-A and Context-B). Context A was active on Firewall-1 and Context-B was active on Firewall-2. Once Firewall-1 goes down, Firewall-2 will be active for both Context-A and Context-B.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have studied High Availability documentation for Palo Alto Firewalls, from what i have studied i dont think it is possible to load balance the traffic in this way. I have created two vsys, (vsys-A and vsys-B). I want vsys-A to be active on Firewall-1 and vsys-B to be active on Firewall-2. Vsys-A should get active on Firewall-2 only in case Firewall-1 goes down and once Firewall-1 gets back live again then Vsys-A should be switched to Firewall-1. Similarly for Vsys-B.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;There are four different use cases for Active Active High Availability but i think none of these matches my requirement.&lt;/P&gt;&lt;P&gt;1. Active/Active HA with Floating IP Address Bound to Active-Primary Firewall&lt;BR /&gt;2. Active/Active HA with Floating IP Addresses&lt;BR /&gt;3. Active/Active HA with Route-Based Redundancy&lt;BR /&gt;4. Active/Active HA with ARP Load-Sharing&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please if anyone can give feedback on this.&lt;/P&gt;</description>
      <pubDate>Tue, 22 Jun 2021 15:57:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/active-active-high-availability/m-p/414501#M93135</guid>
      <dc:creator>Mohammedraza</dc:creator>
      <dc:date>2021-06-22T15:57:27Z</dc:date>
    </item>
    <item>
      <title>Re: Active Active High Availability</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/active-active-high-availability/m-p/414865#M93189</link>
      <description>&lt;P&gt;High Availability in Palo Alto is all about redundancy and not about load sharing/balancing&lt;/P&gt;&lt;P&gt;All config will always be active on both members&lt;/P&gt;&lt;P&gt;(for loadbalancing you should use external loadbalancers and HA4)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;what comes closest to your config is floating IP with lower priorities on primary or secondary to make IP's "stick" to one peer until that peer goes down. this way you can control which member owns the IP, so in essence where the vsys and other config is utilised&lt;/P&gt;</description>
      <pubDate>Wed, 23 Jun 2021 21:21:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/active-active-high-availability/m-p/414865#M93189</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2021-06-23T21:21:02Z</dc:date>
    </item>
    <item>
      <title>Re: Active Active High Availability</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/active-active-high-availability/m-p/414995#M93206</link>
      <description>&lt;P&gt;Thank you for your reply! Actually this is what I tried to do on my two firewalls to support above scenario. But its not working in that way.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;There are 10 subnets, i want 5 subnets of Vsys-A to go to Firewall-1 and want 5 subnets of vsys-B to go to Firewall-2.&lt;BR /&gt;If Firewall-1 fails then all 10 subnets of vsys-A and B to go to Firewall-2.&lt;BR /&gt;If firewall-2 fails then all 10 subnets of vsys-A and B to go to Firewall-1.&lt;BR /&gt;Vsys-A&lt;BR /&gt;10.11.1.0/24&lt;BR /&gt;10.11.2.0/24&lt;BR /&gt;10.11.3.0/24&lt;BR /&gt;10.11.4.0/24&lt;BR /&gt;10.11.5.0/24&lt;/P&gt;&lt;P&gt;Vsys-B&lt;BR /&gt;10.11.6.0/24&lt;BR /&gt;10.11.7.0/24&lt;BR /&gt;10.11.8.0/24&lt;BR /&gt;10.11.9.0/24&lt;BR /&gt;10.11.10.0/24&lt;/P&gt;&lt;P&gt;To support my above configuration, I went to Device -&amp;gt; High Availability -&amp;gt; Active/Active Config -&amp;gt; Virtual Addresses.&lt;BR /&gt;I defined 10 Floating Addresses here (default gateways for the 10 subnets). 10.11.x.254&lt;/P&gt;&lt;P&gt;1. 10.11.1.254, 10.11.2.254, 10.11.3.254, 10.11.4.254, 10.11.5.254&lt;BR /&gt;Type Floating&lt;BR /&gt;Device 0: 100&lt;BR /&gt;Device 1: 150&lt;/P&gt;&lt;P&gt;2. 10.11.6.254, 10.11.7.254, 10.11.8.254, 10.11.9.254, 10.11.10.254&lt;BR /&gt;Type Floating&lt;BR /&gt;Device 0: 150&lt;BR /&gt;Device 1: 100&lt;/P&gt;</description>
      <pubDate>Thu, 24 Jun 2021 12:35:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/active-active-high-availability/m-p/414995#M93206</guid>
      <dc:creator>Mohammedraza</dc:creator>
      <dc:date>2021-06-24T12:35:17Z</dc:date>
    </item>
    <item>
      <title>Re: Active Active High Availability</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/active-active-high-availability/m-p/414996#M93207</link>
      <description>&lt;P&gt;In ha3 config you also need to set session owner etc. to "first packet" for this to work smoothly&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 24 Jun 2021 12:38:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/active-active-high-availability/m-p/414996#M93207</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2021-06-24T12:38:18Z</dc:date>
    </item>
  </channel>
</rss>

