<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: IP for Cluster HA Active Pasive in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ip-for-cluster-ha-active-pasive/m-p/434176#M95951</link>
    <description>&lt;P&gt;Thank you&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/192671"&gt;@Alpalo&lt;/a&gt;&amp;nbsp;for posting question.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;To my knowledge this is not possible. Management interface is configured individually on each firewall and is not part of HA. Here is the list of items that are not HA synchronized, management interface is on the top of the list:&amp;nbsp;&lt;A href="https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/high-availability/reference-ha-synchronization/what-settings-dont-sync-in-activepassive-ha.html" target="_blank"&gt;https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/high-availability/reference-ha-synchronization/what-settings-dont-sync-in-activepassive-ha.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I know that some Firewalls for example Cisco ASA has management interface to be part of HA, then when there is a failover the management interface is also changed, however PA does not have this implementation. Can I ask for the reason why this is required?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you &amp;amp; Regards&lt;/P&gt;&lt;P&gt;Pavel&lt;/P&gt;</description>
    <pubDate>Wed, 15 Sep 2021 13:21:10 GMT</pubDate>
    <dc:creator>PavelK</dc:creator>
    <dc:date>2021-09-15T13:21:10Z</dc:date>
    <item>
      <title>IP for Cluster HA Active Pasive</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ip-for-cluster-ha-active-pasive/m-p/434100#M95945</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;We have a 3200 series HA cluster active/passive version 9.1.10.&lt;/P&gt;&lt;P&gt;The requirement is to access through a single ip always to the active node.&lt;/P&gt;&lt;P&gt;That is, I have an IP for the active node and another for the passive node but I want to configure a single IP to access the active node either one or the other.&lt;/P&gt;&lt;P&gt;Can anyone help me to configure it? How do I have to do it?&lt;/P&gt;</description>
      <pubDate>Wed, 15 Sep 2021 10:19:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ip-for-cluster-ha-active-pasive/m-p/434100#M95945</guid>
      <dc:creator>Alpalo</dc:creator>
      <dc:date>2021-09-15T10:19:42Z</dc:date>
    </item>
    <item>
      <title>Re: IP for Cluster HA Active Pasive</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ip-for-cluster-ha-active-pasive/m-p/434176#M95951</link>
      <description>&lt;P&gt;Thank you&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/192671"&gt;@Alpalo&lt;/a&gt;&amp;nbsp;for posting question.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;To my knowledge this is not possible. Management interface is configured individually on each firewall and is not part of HA. Here is the list of items that are not HA synchronized, management interface is on the top of the list:&amp;nbsp;&lt;A href="https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/high-availability/reference-ha-synchronization/what-settings-dont-sync-in-activepassive-ha.html" target="_blank"&gt;https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/high-availability/reference-ha-synchronization/what-settings-dont-sync-in-activepassive-ha.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I know that some Firewalls for example Cisco ASA has management interface to be part of HA, then when there is a failover the management interface is also changed, however PA does not have this implementation. Can I ask for the reason why this is required?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you &amp;amp; Regards&lt;/P&gt;&lt;P&gt;Pavel&lt;/P&gt;</description>
      <pubDate>Wed, 15 Sep 2021 13:21:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ip-for-cluster-ha-active-pasive/m-p/434176#M95951</guid>
      <dc:creator>PavelK</dc:creator>
      <dc:date>2021-09-15T13:21:10Z</dc:date>
    </item>
    <item>
      <title>Re: IP for Cluster HA Active Pasive</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ip-for-cluster-ha-active-pasive/m-p/434177#M95952</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/192671"&gt;@Alpalo&lt;/a&gt;&amp;nbsp;I presume you are referring to the firewall's managed IP address. If this is the case, the management IP need to be unique on each node.&amp;nbsp;&lt;/P&gt;&lt;P&gt;You have two possible solutions for you task:&amp;nbsp;&lt;/P&gt;&lt;P&gt;1. Enable firewall &lt;A href="https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/networking/configure-interfaces/use-interface-management-profiles-to-restrict-access" target="_self"&gt;management&lt;/A&gt; on one of the data interfaces, e.g. ethernet 1/1. You can achieve this by applying interface management profile to it and enable ssh and https. It may also need security policies configuration . This will ensure management connections only to the active HA member.&amp;nbsp;&lt;/P&gt;&lt;P&gt;2. The other more complex option will be to use some 3rd party load balancer appliance, which can detect the primary member through API calls and sent management traffic to it.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 15 Sep 2021 13:22:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ip-for-cluster-ha-active-pasive/m-p/434177#M95952</guid>
      <dc:creator>batd2</dc:creator>
      <dc:date>2021-09-15T13:22:36Z</dc:date>
    </item>
  </channel>
</rss>

