HA Active/Active Mode with Multi VSYS

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 

HA Active/Active Mode with Multi VSYS

L3 Networker

Hi All,

 

Is it possible to use a Multi-VSYS Palo Alto to have the active-primary on one Palo Alto and a second VSYS Active-Primary on the second Palo Alto in Active-Active HA mode. I've done this on Cisco Active-Active firewalls but I need to do this on a Palo Alto pair.

 

Regards

Adrian

 

2 ACCEPTED SOLUTIONS

Accepted Solutions

Cyber Elite
Cyber Elite

hi @a.jones 

 

On the Palo Alto chassis HA is achieved at the system level meaning that all components are subservient to the state of the chassis, so you can't have a vsys that is active on one, but not on the other chassis

 

what you can do to achieve a sort of 'vsys spread' among the peers is to use floating IP with a preference priority for one member or the other, wherever you want the specific vsys to receive it's sessions

floating IP.png

Tom Piens
PANgurus - (co)managed services and consultancy

View solution in original post

Agreed, don't think of Active/Active as Active Primary and Active Secondary.  Think of them as equal partners both able to process or hand off the same traffic simultaneously.  If you really want to do any kind of traffic management and push certain traffic one direction or the other, you need to do this with your routing protocols and NOT a setting on the firewall.  Usually this is done by using Anycast with your default gateway so that two physically disparate locations will prefer the Firewall closest to them and not have to traverse or hairpin through come kind of site-to-site interconnect.  Does this help?

 

PS - I love PAN's Active/Active implementation but I only consider it for very specific use cases.  If your firewalls are stacked together at the same location, you most likely should be using Active/Passive instead.  The goal of Active/Active is NOT to increase throughput.  If this is the mindset you are taking, you will most likely be VERY disappointed.

View solution in original post

18 REPLIES 18

Cyber Elite
Cyber Elite

hi @a.jones 

 

On the Palo Alto chassis HA is achieved at the system level meaning that all components are subservient to the state of the chassis, so you can't have a vsys that is active on one, but not on the other chassis

 

what you can do to achieve a sort of 'vsys spread' among the peers is to use floating IP with a preference priority for one member or the other, wherever you want the specific vsys to receive it's sessions

floating IP.png

Tom Piens
PANgurus - (co)managed services and consultancy

Agreed, don't think of Active/Active as Active Primary and Active Secondary.  Think of them as equal partners both able to process or hand off the same traffic simultaneously.  If you really want to do any kind of traffic management and push certain traffic one direction or the other, you need to do this with your routing protocols and NOT a setting on the firewall.  Usually this is done by using Anycast with your default gateway so that two physically disparate locations will prefer the Firewall closest to them and not have to traverse or hairpin through come kind of site-to-site interconnect.  Does this help?

 

PS - I love PAN's Active/Active implementation but I only consider it for very specific use cases.  If your firewalls are stacked together at the same location, you most likely should be using Active/Passive instead.  The goal of Active/Active is NOT to increase throughput.  If this is the mindset you are taking, you will most likely be VERY disappointed.

I ran active/active for nearly 2 years.

I would recommend stay away from active / active . what they called A/A is not prod ready

especially if you have asyn routing through the nodes

if you use NAT'ing

Also if you have OSPF this can cause asym routing and issue.

 

 

Interesting, I have run Active/Active with OSPF and NAT without a single issue.  I'd be curious to know what version of PAN-OS you were using and how you were setting up NAT.  The biggest hurdle is understanding how to set up your dynamic routing properly and how to set up NAT with floating IPs to make it work correctly.

Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!

The LIVEcommunity thanks you for your participation!