Latest

Active/Passive HA Setup in Palo Alto Firewall

Active/Passive HA Setup in Palo Alto Firewall

High availability (HA) is a setup in which two firewalls are grouped together and their configurations are synchronized to avoid a single point of failure on your network. A heartbeat connection between firewall peers ensures that if one of them fails, the others can continue to function. Setting up two firewalls in a HA pair ensures redundancy and uninterrupted operations.

As you know that two Palo Alto Networks firewalls can be configured as a HA pair; the HA peers must run the same PAN-OS version and content version.

HA helps to reduce downtime by ensuring that an alternate firewall is accessible in the case that the peer firewall fails. An HA pair's firewalls use dedicated or in-band HA ports to synchronize data network, object, and policy configurations as well as status information. 

Peers do not communicate firewall-specific configurations such as management interface IP addresses or administrator profiles, HA configurations, log data, or Application Command Center (ACC) information over the HA. 

Active/Passive HA Setup in Palo Alto Firewall
Fig 1.1- Active/Passive HA Setup in Palo Alto Firewall

A Failover occurs when one of the firewalls in a HA pair fails and the peer firewall assumes responsibility for protecting traffic in the following conditions 

  • When monitor interfaces fail on the  PA firewall.
  • When there are some destinations cant be reached through  PA firewall.
  • When  PA firewall not responding to heartbeat polls.
  • When packet path health monitoring fails on PA firewall.

 ⭐ Configuring HA setup on Palo Alto Firewalls

We are going to make ethernet1/1 as HA1 and ethernet1/2 as HA2. Lets start with these ports to be part of HA setup

Step 1: Navigate to Network >> Interfaces. Create two interfaces as a part of HA

Ethernet Interface 1 : Ethernet 1/1
Ethernet Interface 2 : Ethernet 1/2

PaloAlto HA Interface
PaloAlto HA interface 2

Step 2: Now we need to enable the Control Link (HA1) setup. In our case Ethernet 1/1 is our Control Link (HA1) on both the Palo Alto Firewalls PA-1 and PA-2. Lets do it on both the Palo Alto Firewalls PA-1 and PA-2

Navigate to General tab >> Control Link section >> click on Primary.

PALO ALTO PA -1
Port for Control Link HA1 : Ethernet 1/1
IP address : 192.168.1.1

Palo Alto Control Link HA1

PALO ALTO PA -2
Port for Control Link Primary : Ethernet 1/1
IP address : 192.168.1.2

Palo Alto Control Link HA1


Step 3: Now we need to enable the Data Link (HA2) setup. In our case Ethernet 1/2 is our Control Link (HA1) on both the Palo Alto Firewalls PA-1 and PA-2. Lets do it on both the Palo Alto Firewalls PA-1 and PA-2

Navigate to General tab >> Data Link section.
Port for Data Link Primary : Ethernet 1/2

Ethernet1/2 is our HA2 link. It's directly connected, thus the transport method is ethernet. We don't need to mention any IP addresses. However, if your data link is routed over L3 networks, you must give IP addresses.

PALO ALTO PA -1 and PALO ALTO PA -2

Palo Alto PA Data Link section


Step 4: Navigate to Device tab >> High Availability >> General >> Setup

PALO ALTO PA -1
Checkbox for HA: Done
Group Id : 1
Mode (Active/Passive or Active/Active) : Active/Passive
Peer HA IP Address : 192.168.1.2
Enable Checkbox for Config Sync : Done

Palo Alto Group Configuration

PALO ALTO PA -2
Checkbox for HA: Done
Group Id : 1
Mode (Active/Passive or Active/Active) : Active/Passive
Peer HA IP Address : 192.168.1.1
Enable Checkbox for Config Sync : Done

Palo Alto Group Configuration


Step 5: Now setup Priority and Preemption setup on both Palo Alto PA devices as follow

The firewall with the lower numerical value, and therefore higher priority, is designated as active. The other firewall is the passive firewall.
So we need to make Palo Alto PA-1 as Active and Palo Alto PA-2 as Passive

PALO ALTO PA -1
Device Priority : 50
Preempt : Enable
Role: Active

Priority and Preemption setup


PALO ALTO PA -2
Device Priority : 100
Preempt : Enable
Role: Passive

Priority and Preemption setup

After this configuration Active-Passive HA will be formed. However, configuration doesn’t sync yet. You need to sync configuration from Active to Passive unit.

admin@PA-ACTIVE(active)> request high-availability sync-to-remote running-config

Executing this command will overwrite the candidate configuration on the peer and trigger a commit on the peer. Do you want to continue(y/n)? (y or n) y

HA synchronization job has been queued on peer. Please check job status on peer.

admin@PA-ACTIVE(active)>

Now HA setup between the Palo Alto Firewalls PA-1 and PA-2 has been completed.