- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
10-22-2015 01:52 PM
I have a PA-3020 that will have two ISP connections. Primary ISP interface will be used for the Global Protect Portal and Primary Gateway using tunnel.1. Is it possible to have a second gateway using tunnel.2 on the same firewall using the secondary ISP interface?
Also, if the Portal is only on the primary ISP interface and that connection is down making the Portal unreachable, will the GP Client still connect to the secondary Gateway?
10-22-2015 02:05 PM
Yes you can have multiple gateways.
Just run it on interface of diferent isp connection.
Clients should cache gateway information they get from portal so even if portal is down they try to connect to gateways they have in their cache.
10-22-2015 02:05 PM
Yes you can have multiple gateways.
Just run it on interface of diferent isp connection.
Clients should cache gateway information they get from portal so even if portal is down they try to connect to gateways they have in their cache.
10-22-2015 02:06 PM
I know I have used the following to help me out in the past. It should be possible, but its gonna task some whiteboarding to making it work properly.
Hope this helps...
10-22-2015 04:26 PM
I was going to use PBF rules to manage the traffic. Would it be better to have two VRs to handle each ISP routing table?
10-23-2015 06:42 AM
You can use just one, especially if you are using dynamic routing such as OSPF (I have had issues with this in the past without using physical interfaces. There are documents out there that show how to do this with one VR.
10-29-2015 08:59 AM
I ended up using two virtual routers and it was fine. The ISPs are set up as active/passive so the second gateway is used when the primary gateway is down.
03-18-2020 05:53 PM - edited 03-19-2020 03:35 AM
but how do you reach the internal if on the interface like lan you can only connect one VR? how do you route the traffic
03-24-2020 02:37 AM
same problem here... how do you route the traffic to the internal lan?
thank you
04-17-2020 12:05 PM - edited 04-17-2020 12:06 PM
You have to add the routes of course from one VR to the other, using inter VR routes.
I have it working: even when ISP1 is up, I can connect to both gateways (ISP1 in VR1, ISP2 in VR2) and I can always reach my LAN 192.168.1.0/24
LAN resides in VR1
In VR1 I route the pool of Globalprotect gateway-ISP2 to VR2
In VR2 I route 192.168.1.0/24 to VR1
03-04-2021 01:41 PM
Just to let everyone know that a Blog has been written about this subject here:
https://live.paloaltonetworks.com/t5/blogs/multiple-globalprotect-portals-and-gateways/ba-p/360452
Please be sure to check it out.
05-05-2023 07:59 PM
I know this post is fairly old, but thank you for this!! This was such a simple yet brilliant solution to overcome Palo Alto's terrible failure to track which interface a packet came in and should exit out of. This is also the only solution I was able to find that you can concurrently use both gateways on the same firewall over each ISP. Even better, this doesn't require loopback interfaces, NAT'ing, PBF rules, or even any sort of manual intervention when a failure occurs.
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!