- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
11-08-2023 02:16 AM
Hello,
as the title says: I want to implement an HA active-passive setup on a virtualization platform that doesn't support MAC address changes on the VM side. Therefore, a newly generated virtual MAC is unfortunately not an option.
So, is there a way to disable virtual MAC for HA?
Thanks
Tim
11-08-2023 04:06 AM
Hi @Tim_Reckling ,
Could you provide more information? Here is a good link for HA on VM-Series -> https://docs.paloaltonetworks.com/vm-series/9-1/vm-series-deployment/about-the-vm-series-firewall/vm.... For example, the original HA document for Azure does not use virtual MACs. However, the Azure deployment guide https://www.paloaltonetworks.com/resources/reference-architectures/azure recommends using the Azure Load Balancer with 2 independent NGFWs for faster failover, in which case the virtual MAC is not required.
PANW has reference architectures for AWS, GCP, etc. https://www.paloaltonetworks.com.au/resources/reference-architectures
So, there may be some good documents for your virtualization platform to help solve your issue.
With regard to normal HA configuration, you must use the virtual MAC address.
Thanks,
Tom
11-08-2023 04:06 AM
Hi @Tim_Reckling ,
Could you provide more information? Here is a good link for HA on VM-Series -> https://docs.paloaltonetworks.com/vm-series/9-1/vm-series-deployment/about-the-vm-series-firewall/vm.... For example, the original HA document for Azure does not use virtual MACs. However, the Azure deployment guide https://www.paloaltonetworks.com/resources/reference-architectures/azure recommends using the Azure Load Balancer with 2 independent NGFWs for faster failover, in which case the virtual MAC is not required.
PANW has reference architectures for AWS, GCP, etc. https://www.paloaltonetworks.com.au/resources/reference-architectures
So, there may be some good documents for your virtualization platform to help solve your issue.
With regard to normal HA configuration, you must use the virtual MAC address.
Thanks,
Tom
11-08-2023 05:43 AM
In VMware environment you need to use firewall own IPs not virtual to avoid setting virtual switch into promiscuous mode.
This setting can be adjusted at
Device > Setup > Management > Use Hypervisor Assigned MAC Addresses
Be aware that in this case firewall failover will cause gratuitous arp to be sent out and not every device accepts it.
For example Palos themselves don't update arp table if gratuitous arp is received.
So assuming you have physical Palo at the perimeter and virtual Palos in HA inside.
Virtual Palo failover will cause outage because perimeter Palo don't care about gratuitous arp.
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!