- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
05-21-2024 01:45 PM
After upgrading PA-220 from 9.1.18 to 10.2.x previously "healthy" Tunnel and Path monitors for VPN tunnels were up and down, constantly re-keying on the remote end.
We managed to solve the re-keying issue (only IPSec was a problem, not the IKE), and removed one of the monitoring solutions - tunnel monitoring as requested by PA TAC, with only Path monitoring left, each of the primary ISP-based tunnels been actively monitored.
Each remote end has two endpoints for redundancy, so we have 6x tunnels total - two for each geo-location for each ISP provider.
I question whether all six path monitors should have active PATH monitoring enabled or only one of the two for each location—three total—to keep static routes under control.
WAN2 CLDW1 -> path monitor enabled
WAN2CLDW2 -> path monitor enabled?
WAN2CLDE1 -> path monitor enabled
WAN2CLDE2 -> path monitor enabled?
WAN2CLDC1 -> path monitor enabled
WAN2CLDC2 -> path monitor enabled?
I appreciate the constructive input.
05-22-2024 10:57 AM
I think your metric values are too close together as the value can be from 1 to 65,535. For something like this I typically use OSPD and use metrics in the thousands, ie for my preferred route, the default metric, for the secondary route, use metric 10000. This guarantees the proper path is taken. For your situation, perhaps something like:
10.80.0.0/12 0.0.0.0 10 A S tunnel.1 - PRI ISP W-endpoint IP1 This will be used 1st
10.80.0.0/12 0.0.0.0 5000 S tunnel.2 - PRI ISP W-endpoint IP2 This will be used 3rd
10.80.0.0/12 0.0.0.0 1000 S tunnel.7 - SECOND ISP W-endpoint IP11 This will be used 2nd
10.80.0.0/12 0.0.0.0 10000 S tunnel.8 - SECOND ISP W-endpoint IP 12 This will be used 4th
This way traffic from Primary WAN firewall to NET1 will go via tunnel.1
on the Net1 firewall so the same thing:
0.0.0.0/0 10 A S tunnel.1 - PRI ISP Pri-WAN This will be used 1st
0.0.0.0/0 5000 S tunnel.2 - PRI ISP Pri-WAN2 This will be used 1st
0.0.0.0/0 1000 S tunnel.7 - SECOND ISP OPT This will be used 1st
0.0.0.0/0 10000 S tunnel.8 - SECOND ISP Opt2 This will be used 1st
05-21-2024 02:42 PM
Hello,
Dont think you need path monitoring on the secondary VPN. If its down and the primary is up, there is nothing to fail over to. However I would add a metric cost to the secondary VPN path so its not desired by the firewall. This way you get failover if primary fails and fail back once its back online.
https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000PLL8CAO
Hope that makes sense.
05-21-2024 02:51 PM
OtakarKlier, thank you for your comment. Yes, different metrics are used for all routes.
WAN2CLD1 metric 10 - Primary ISP
WAN2CLD2 metric 15
------------------------------
OPT2CLD1 metric 20 - Secondary ISP
OPT2CLD2 metric 25
My question is, do I still Path Monitor each route in the tunnel set or only one of them?
WAN2CLD1 metric 10 w/Path Monitor to the NET1
WAN2CLD2 metric 15 with or without Path Monitor to the NET1?
05-21-2024 02:58 PM
Hello,
For the metrics, increase your numbers for the secondary VPN.
Dont path monitor your second path. It doesnt need it since there is nothing to fail over to if it goes down.
Also to clarify you have 3 different end points: each with two VPN's with two different ISP's?
Regards,
05-21-2024 03:12 PM
Only Primary ISP connections are Path Monitored.
Increasing the metric is a possible option, in my case
routes to NET1 would look like this?
WAN2CLD1 metric 10 - Primary ISP
WAN2CLD2 metric 60
------------------------------
OPT2CLD1 metric 20 - Secondary ISP
OPT2CLD2 metric 70
05-21-2024 03:22 PM
About the endpoints,
Each of three endpoints has two redundant VPN tunnels in the cloud, with two ISPs at the remote (PA) end, it makes it six in total 3x pairs for each ISP
05-22-2024 08:43 AM
Hello,
Perhaps I am having a hard time to visualize this. Its it something like:
05-22-2024 10:33 AM
Ah gotcha, so I think I would do something like the following:
Primary WAN - First VPN Tunnel Metric 10, Second VPN tunnel Metric 100
Secondary OPT - First VPN tunnel Metric 200, Secondary VPN tunnel Metric 300
Also make sure you have BFD, bi-directional forwarding disabled. Also on the NET1 router, make sure your static routes point back down the correct tunnels. That way you dont get asymetic routing. I think your metrics are too close together.
Also just a question, why have two tunnels via the same ISP? Perhaps I am missing more info here.
Regards,
05-22-2024 10:39 AM
However, two tunnels from the Primary ISP interface with different metrics, 10 and 70, show different encap/decap counts. We expect all encap and decap on tunnel1 as it is "AS" in the FIB. We are having issues with end-to-end ICMP probing in this region.
....
10.80.0.0/12 0.0.0.0 10 A S tunnel.1 - PRI ISP W-endpoint IP1
10.80.0.0/12 0.0.0.0 70 S tunnel.2 - PRI ISP W-endpoint IP2
10.80.0.0/12 0.0.0.0 20 S tunnel.7 - SECOND ISP W-endpoint IP11
10.80.0.0/12 0.0.0.0 80 S tunnel.8 - SECOND ISP W-endpoint IP 12
show vpn flow tunnel-id 1
tunnel WAN2E1
id: 1
type: IPSec
gateway id: 1
local ip: ccccccc
peer ip: yyyyyyy
inner interface: tunnel.1
outer interface: ethernet1/1
state: active
session: 46407
tunnel mtu: 1427
soft lifetime: 3569
hard lifetime: 3600
lifetime remain: 2385 sec
lifesize remain: N/A
latest rekey: 1215 seconds ago
monitor: off
monitor packets seen: 0
monitor packets reply:0
en/decap context: 615
local spi: F3FF42A4
remote spi: C8C60A2C
key type: auto key
protocol: ESP
auth algorithm: SHA1
enc algorithm: AES128
anti replay check: yes
anti replay window: 1024
copy tos: no
enable gre encap: no
initiator: no
authentication errors: 0
decryption errors: 0
inner packet warnings: 0
replay packets: 0
packets received
when lifetime expired:0
when lifesize expired:0
sending sequence: 9286
receive sequence: 0
encap packets: 1319141
decap packets: 0
encap bytes: 1380852888
decap bytes: 0
key acquire requests: 1
owner state: 0
owner cpuid: s1dp0
ownership: 1
show vpn flow tunnel-id 2
tunnel WAN2E2
id: 2
type: IPSec
gateway id: 2
local ip: ccccccc
peer ip: yyyyyyy
inner interface: tunnel.2
outer interface: ethernet1/1
state: active
session: 45593
tunnel mtu: 1427
soft lifetime: 3575
hard lifetime: 3600
lifetime remain: 1080 sec
lifesize remain: N/A
latest rekey: 2520 seconds ago
monitor: off
monitor packets seen: 0
monitor packets reply:0
en/decap context: 332
local spi: 9FFCBA57
remote spi: C50623FD
key type: auto key
protocol: ESP
auth algorithm: SHA1
enc algorithm: AES128
anti replay check: yes
anti replay window: 1024
copy tos: no
enable gre encap: no
initiator: no
authentication errors: 0
decryption errors: 0
inner packet warnings: 0
replay packets: 0
packets received
when lifetime expired:0
when lifesize expired:0
sending sequence: 839
receive sequence: 2676
encap packets: 58074
decap packets: 273829
encap bytes: 6968880
decap bytes: 32166648
key acquire requests: 1
owner state: 0
owner cpuid: s1dp0
ownership: 1
05-22-2024 10:54 AM
We do not have controls on the Cloud provider's end. They always make 2x Tunnels for each VPN connection to allow redundancy and flexibility to reset the tunnels at will - move to a different host, etc.- without distracting the VPN connection.
05-22-2024 10:57 AM
I think your metric values are too close together as the value can be from 1 to 65,535. For something like this I typically use OSPD and use metrics in the thousands, ie for my preferred route, the default metric, for the secondary route, use metric 10000. This guarantees the proper path is taken. For your situation, perhaps something like:
10.80.0.0/12 0.0.0.0 10 A S tunnel.1 - PRI ISP W-endpoint IP1 This will be used 1st
10.80.0.0/12 0.0.0.0 5000 S tunnel.2 - PRI ISP W-endpoint IP2 This will be used 3rd
10.80.0.0/12 0.0.0.0 1000 S tunnel.7 - SECOND ISP W-endpoint IP11 This will be used 2nd
10.80.0.0/12 0.0.0.0 10000 S tunnel.8 - SECOND ISP W-endpoint IP 12 This will be used 4th
This way traffic from Primary WAN firewall to NET1 will go via tunnel.1
on the Net1 firewall so the same thing:
0.0.0.0/0 10 A S tunnel.1 - PRI ISP Pri-WAN This will be used 1st
0.0.0.0/0 5000 S tunnel.2 - PRI ISP Pri-WAN2 This will be used 1st
0.0.0.0/0 1000 S tunnel.7 - SECOND ISP OPT This will be used 1st
0.0.0.0/0 10000 S tunnel.8 - SECOND ISP Opt2 This will be used 1st
05-22-2024 10:58 AM
we do not use PBF or advanced routing engines... so I can't disable bi-directional forwarding? TY!
05-22-2024 11:26 AM
Thanks a lot, OtakarKlier, for constructive feedback.
05-22-2024 11:29 AM
Hello,
I hope this works for you as the this still might cause asymmetric routing, eg the cloud provider sending traffic down the incorrect tunnel. When I do this, I utilize Policy Based Forwarding, however since you have two sites, I'm not sure how your WAN and OPT devices share routing info and this can also cause issues.
Please let us know if this worked or if you have additional questions.
Cheers!
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!