How to Configure High Availability on PAN-OS

How to Configure High Availability on PAN-OS

314621
Created On 09/25/18 17:30 PM - Last Modified 11/30/22 03:42 AM


Symptom


This document describes configuration of High Availability (HA) on a pair of identical Palo Alto Networks firewalls with screenshots.

 



Environment


  • Palo Alto Firewalls
  • Supported PAN-OS.
  • Active/ Passive High Availability (HA)

Note: This document does not address configuring HA for PA-200 devices.


Resolution


The article uses data interfaces as HA ports, If the Firewalls have a dedicated HA port, they must  for HA1/HA2 connectivity between firewalls.

Steps:

Configure First Device

  1. Go to Network tab > Interfaces.

    ss1.png

    Notes:

    The HA links should look similar to the following screenshot.

    ss2.png

    1. Confirm the planned HA links are up.
    2. Configure both interfaces to be Interface Type HA.
    • Skip this step if configuring a pair of PA-3000, PA-4000 or PA-5000 Series devices. All other firewalls, including VM-Series, require specific ports to be configured as type HA.
  2. Go to Device tab > High Availability > General.

    ss3.png
     

    Notes:

    1. Locate the setup section.
    2. Click on the gear cog to view/edit the settings.
    3. Enable HA.
    4. Enter a group ID that matches both members.
    5. Enter an IP address for the Peer's Control LInk. This will be used in the next step.
    6. Enable Config Sync.
    • The cluster ID is used when creating the virtual MAC for L3 instances. When more than one cluster is on the same L2 network, the ID must be different on each cluster.
    • The Peer HA IP Address (Control Link) can be any IP address that isn't being used currently in the network.
    • It is recommended to add a Backup Peer HA IP Address if there are enough free ports.
  3. From the General tab, locate the Control Link section and click on Primary.

    ss4.png
     

    Notes:

    1. Choose the first HA interface to be used for the first device's Control Link.
    2. Ener an IP address that is on the same subnet as the Peer HA IP address, configured in step 2.
    • If the Control Link is not directly connected to the other firewall, you may want to enable encryption (AES-256).
    • If the Control Link IPs are on separate broadcast domains, only the gateway needs to be configured, otherwise it's not needed.
  4. From the General tab, locate the Data Link section and click Primary:

    ss5.png
     

    Notes: Transport Methods

    1. Choose the other HA interface to be used for the Data Link.
    2. Configure the IP information for the Data Link.
    3. Ensure the Enabled box is checked.
    • Ethernet: Use when the firewalls are connected back-to-back or through a switch (Ethertype 0x7261).
    • IP: Use when Layer 3 transport is required (IP protocol number 99).
    • UDP: Use to take advantage of the fact the checksum is calculated on the entire packet rather than just the header, as in the IP option (UDP port 29281).
  5. From the General tab, locate the Election Settings section, and click the gear cog:

    ss6.png
     

    1. To specify one of the firewalls as active, enable Preemptive on both firewalls and set the Device Priority.

      The device with the lowest Device Priority is the active device.

    2. To learn about all of the other settings here, click the ? in the top right corner for detailed explanations.
    3. When state synchronization is enabled; the session table, forwarding table, ARP table, and VPN Security Associations (SAs) are copied from the active device to the passive device over HA2.  When the passive device takes over, existing sessions will continue.
    4. If the devices have IP connectivity between the management IPs, it is recommended to enable the Heartbeat Backup, which send pings over the management interface.
  6. Commit the configuration.

    At this point, any Layer3 interface gets a new (shared) MAC address, and multiple gratuitous ARPs are sent out to each layer3 interface informing the attached switches of the new IP/MAC combination.

    ss7.png
     

  7. Confirm the HA is active on the local firewall.

    The firewall’s status should show active and the other values should be unknown, as shown below:

    ss8.png
     

    1. Go to the Dashboard tab.
    2. Add the High Availability widget.
    3. Widgets > System > High Availability.
  8. Configure the Peer Device.

  9. Refer to step 1, ensure the Peer device has two HA links configured to communicate to the first device’s HA links.

    ss9.png
     

    1. Go to the setup section of the Peer Device and enable HA. Refer to step 2.
    2. Assign the same cluster ID as on the other device.
    3. Enter the IP address assigned to the other firewall’s Control Link.
    4. Enable Config Sync.
  10. From the General tab, locate the Control Link section and click on Primary.

    ss10.png
     

    Note: If encryption is enabled on the First device, enable it here as well.

    1. Choose the first HA interface to be used for the Second Device’s Control Link.
    2. Enter an IP address that is on the same subnet as the Peer HA IP address configured in Step 8.
  11. From the General tab, locate the Data Link section and click on Primary:

    ss11.png
     

    1. Choose the other HA interface to be used for the Data Link.
    2. Configure the IP information for the Data Link.
    3. Ensure the Enabled box is checked.
    4. Ensure the Transport drop-down matches the first device’s configuration.
  12. Replicate the settings on the First device with the exception of enabled Preemptive on the First device:

    ss12.png
     

    For this configuration, Preemptive is off.

    1. Enable Preemptive.
    2. Configure the priority field. A higher number means lower priority.
  13. Commit the changes on the Second device:

    ss13.png
     

  14. Go to the first device.

    ss14.png
     

    1. Ensure it still shows as active and it sees the peer device as passive.
    2. Ensure all dynamic updates are synced.
    3. In this example Antivirus and GlobalProtect are not synced.
  15. Update as needed so everything matches, as shown below:

    ss15.png
     

  16. Once everything matches on both devices, go to the active member's Dashboard tab and click Sync to peer. It should say synchronization in progress.

    ss16.png
     

  17. Go to the second (passive) device's CLI and check the HA sync process by running:

    > show jobs all

    The first two attempts failed. Determine and fix the cause of the failure.

    ss17.png
     

  18. To get more details on the failed job, run:

    > show jobs id <id number of the HA-Sync job>

    The first sync failure is ID 13.

    ss18.png
     

    There is a security rule on the passive device named “Samir” that’s causing the HA-Sync process to fail. The rule is a shared rule from a previous Panorama configuration.

    Delete the rule and run the Sync to peer again from the Active Device’s Dashboard tab. The job finished successfully this time:

    ss19.png

    High Availability is configured.
     

  19. Configure Link Monitoring and Path Monitoring (optional):

    ss20.png
     

    1. Device tab > High Availability > Link and Path Monitoring tab.
    2. In this example, monitoring all links. This means, if any link state goes down on the active device a failover occurs.
    3. In this example, Path Monitoring is not configured.
    4. Click the “?” button, in the top right corner of the Link and Path Monitoring tab, to read about Link Monitoring and Path Monitoring.

 

 

 


Actions
  • Print
  • Copy Link

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClGNCA0&refURL=http%3A%2F%2Fknowledgebase.paloaltonetworks.com%2FKCSArticleDetail

Choose Language