Hi Steven, See my update below The vpn would build on the internal interfaces since the ISP for one side is down. - You’re correct, I’m planning to build the tunnel via the Internal Interface on PAN Firewall The PA default route for the down ISP goes into the tunnel - I’m planning to used PBF together with the built-in monitor to track the site ISP connections and once it is down, default route will be routed to VPN Tunnel. Do I need to create two PBF for this scenario? On the PA with good ISP - return traffic to the other site needs to go into the vpn instead of the MPLS or the tunnel will be asymmetrical and fail - If I enable “Enforce Symmetric Return in PFB Rule? Does it reduce the complexity that you mention? NAT for internet access - Yes, I’ll do dynamic NAT translation for all traffic coming out of the VPN tunnel. Possible issue that I’m anticipating are the NAT translation for the public IP’s owned by ISP that having an issue. Any thoughts on this? It’s looks like it’s getting complicated than the original plan that I thought. Do you think it make since to do it this way or I need to look at another solutions. Your feedback are highly appreciated and help me a lot to think out of the box for the solution that I’m planning. Cheers, Erwin
... View more