Using HA without a virtual mac possible?

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
Announcements

Using HA without a virtual mac possible?

L0 Member

Hello,

as the title says: I want to implement an HA active-passive setup on a virtualization platform that doesn't support MAC address changes on the VM side. Therefore, a newly generated virtual MAC is unfortunately not an option.

So, is there a way to disable virtual MAC for HA?

 

Thanks 
Tim

1 accepted solution

Accepted Solutions

Cyber Elite
Cyber Elite

Hi @Tim_Reckling ,

 

Could you provide more information?  Here is a good link for HA on VM-Series -> https://docs.paloaltonetworks.com/vm-series/9-1/vm-series-deployment/about-the-vm-series-firewall/vm....  For example, the original HA document for Azure does not use virtual MACs.  However, the Azure deployment guide https://www.paloaltonetworks.com/resources/reference-architectures/azure recommends using the Azure Load Balancer with 2 independent NGFWs for faster failover, in which case the virtual MAC is not required.

 

PANW has reference architectures for AWS, GCP, etc. https://www.paloaltonetworks.com.au/resources/reference-architectures

 

So, there may be some good documents for your virtualization platform to help solve your issue.

 

With regard to normal HA configuration, you must use the virtual MAC address.

 

Thanks,

 

Tom

Help the community: Like helpful comments and mark solutions.

View solution in original post

2 REPLIES 2

Cyber Elite
Cyber Elite

Hi @Tim_Reckling ,

 

Could you provide more information?  Here is a good link for HA on VM-Series -> https://docs.paloaltonetworks.com/vm-series/9-1/vm-series-deployment/about-the-vm-series-firewall/vm....  For example, the original HA document for Azure does not use virtual MACs.  However, the Azure deployment guide https://www.paloaltonetworks.com/resources/reference-architectures/azure recommends using the Azure Load Balancer with 2 independent NGFWs for faster failover, in which case the virtual MAC is not required.

 

PANW has reference architectures for AWS, GCP, etc. https://www.paloaltonetworks.com.au/resources/reference-architectures

 

So, there may be some good documents for your virtualization platform to help solve your issue.

 

With regard to normal HA configuration, you must use the virtual MAC address.

 

Thanks,

 

Tom

Help the community: Like helpful comments and mark solutions.

Cyber Elite
Cyber Elite

In VMware environment you need to use firewall own IPs not virtual to avoid setting virtual switch into promiscuous mode.

This setting can be adjusted at

Device > Setup > Management > Use Hypervisor Assigned MAC Addresses

 

Be aware that in this case firewall failover will cause gratuitous arp to be sent out and not every device accepts it.

For example Palos themselves don't update arp table if gratuitous arp is received.

So assuming you have physical Palo at the perimeter and virtual Palos in HA inside.

Virtual Palo failover will cause outage because perimeter Palo don't care about gratuitous arp.

 

Enterprise Architect, Security @ Cloud Carib Ltd
Palo Alto Networks certified from 2011
  • 1 accepted solution
  • 1048 Views
  • 2 replies
  • 0 Likes
Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!

The LIVEcommunity thanks you for your participation!