Configure Active/Active HA (2024)

Configure Active/Active HA

Updated on

Apr 19, 2024

Focus

Download PDF

Updated on

Apr 19, 2024

Focus

  1. Home
  2. PAN-OS
  3. High Availability
  4. SetUp Active/Active HA
  5. Configure Active/Active HA

Download PDF

Table of Contents

Previous Prerequisites for Active/Active HA
Next Determine Your Active/Active Use Case

The following procedure describes the basicworkflow for configuring your firewalls in an active/active configuration.However, before you begin, DetermineYour Active/Active Use Case for configuration examples moretailored to your specific network environment.

You can configure data ports as both dedicated HA interfaces and as dedicated backup HA interfaces, and is required for firewalls without dedicated HA interfaces.

Data ports configured as HA1, HA2, or HA3 interfaces can be connected directly to each HA interface on the firewall or connected through a Layer2 switch. For data ports configured as an HA3 interface, you must enable jumbo frames as HA3 messages exceed 1,500 bytes.

To configure active/active, first complete thefollowing steps on one peer and then complete them on the secondpeer, ensuring that you set the Device ID to different values (0or 1) on each peer.

  1. Connectthe HA ports to set up a physical connection between the firewalls.

    For each use case, the firewalls could be any hardwaremodel; choose the HA3 step that corresponds with your model.

    • For firewalls with dedicated HA ports, use an Ethernet cableto connect the dedicated HA1 ports and the HA2 ports on peers. Usea crossover cable if the peers are directly connected to each other.

    • For firewalls without dedicated HA ports, select two data interfacesfor the HA2 link and the backup HA1 link. Then, use an Ethernetcable to connect these in-band HA interfaces across both firewalls.Use the management port for the HA1 link and ensure that the managementports can connect to each other across your network.

    • For HA3:

      • On PA-7000 Series firewalls, connectthe High Speed Chassis Interconnect (HSCI-A) on the first chassisto the HSCI-A on the second chassis, and the HSCI-B on the firstchassis to the HSCI-B on the second chassis.

      • On PA-5200 Series firewalls (which have one HSCI port), connectthe HSCI port on the first chassis to the HSCI port on the secondchassis. You can also use data ports for HA3 on PA-5200 Series firewalls.

      • On PA-3200 Series firewalls (which have one HSCI port), connectthe HSCI port on the first chassis to the HSCI port on the secondchassis.

      • On any other hardware model, use dataplane interfaces for HA3.

  2. Enable ping on the management port.

    Enabling ping allows the management port to exchange heartbeatbackup information.

    1. In

      Device

      Setup

      Management

      ,edit Management Interface Settings.

    2. Select

      Ping

      as a service thatis permitted on the interface.

  3. If thefirewall does not have dedicated HA ports, set up the data portsto function as HA ports.

    For firewalls with dedicated HA ports continue to the nextstep.

    1. Select

      Network

      Interfaces

      .

    2. Confirm that the link is up on the ports that youwant to use.

    3. Select the interface and set

      InterfaceType

      to

      HA

      .

    4. Set the

      Link Speed

      and

      LinkDuplex

      settings, as appropriate.

  4. Enable active/active HA and set the group ID.

    1. In

      Device

      High Availability

      General

      ,edit Setup.

    2. Select

      Enable HA

      .

    3. Enter a

      Group ID

      , which mustbe the same for both firewalls. The firewall uses the Group ID tocalculate the virtual MAC address (range is 1-63).

    4. (

      Optional

      ) Enter a

      Description

      .

    5. For

      Mode

      , select

      ActiveActive

      .

  5. Set theDevice ID, enable synchronization, and identify the control linkon the peer firewall

    1. In

      Device

      High Availability

      General

      ,edit Setup.

    2. Select

      Device ID

      as follows:

    3. Select

      Enable Config Sync

      .This setting is required to synchronize the two firewall configurations(enabled by default).

    4. Enter the

      Peer HA1 IP Address

      ,which is the IP address of the HA1 control link on the peer firewall.

    5. (

      Optional

      ) Enter a

      Backup PeerHA1 IP Address

      , which is the IP address of the backupcontrol link on the peer firewall.

    6. Click

      OK

      .

  6. Determinewhether or not the firewall with the lower Device ID preempts theactive-primary firewall upon recovery from a failure.

    1. In

      Device

      High Availability

      General

      ,edit Election Settings.

    2. Select

      Preemptive

      to causethe firewall with the lower Device ID to automatically resume active-primaryoperation after either firewall recovers from a failure. Both firewallsmust have

      Preemptive

      selected for preemptionto occur.

      Leave

      Preemptive

      unselected if youwant the active-primary role to remain with the current firewalluntil you manually make the recovered firewall the active-primaryfirewall.

  7. Enableheartbeat backup if your control link uses a dedicated HA port oran in-band port.

    You need not enable heartbeat backup if you are using themanagement port for the control link.

    1. In

      Device

      High Availability

      General

      ,edit Election Settings.

    2. Select

      Heartbeat Backup

      .

      To allow the heartbeats to be transmitted between the firewalls,you must verify that the management port across both peers can routeto each other.

      Enabling heartbeatbackup allows you to prevent a split-brain situation. Split brainoccurs when the HA1 link goes down, causing the firewall to missheartbeats, although the firewall is still functioning. In sucha situation, each peer believes the other is down and attempts tostart services that are running, thereby causing a split brain.Enabling heartbeat backup prevents split brain because redundantheartbeats and hello messages are transmitted over the managementport.

  8. (

    Optional

    ) Modify the HATimers.

    By default, the HA timer profile is set to the

    Recommended

    profileand is suited for most HA deployments.

    1. In

      Device

      High Availability

      General

      ,edit Election Settings.

    2. Select

      Aggressive

      to triggerfaster failover. Select

      Advanced

      to definecustom values for triggering failover in your setup.

      To view the preset value for an individualtimer included in a profile, select

      Advanced

      andclick

      Load Recommended

      or

      LoadAggressive

      . The preset values for your hardware modelwill be displayed on screen.

  9. Set up the control link connection.

    This example uses an in-band port that is set to interfacetype HA.

    For firewalls that use the management port as thecontrol link, the IP address information is automatically pre-populated.

    1. In

      Device

      High Availability

      General

      ,edit Control Link (HA1).

    2. Select the

      Port

      that you havecabled for use as the HA1 link.

    3. Set the

      IPv4/IPv6 Address

      and

      Netmask

      .

      If the HA1 interfaces are on separate subnets, enter theIP address of the

      Gateway

      . Do not add a gatewayaddress if the firewalls are directly connected.

  10. (

    Optional

    ) Enable encryption for the controllink connection.

    This is typically used to secure the link if the two firewallsare not directly connected, that is if the ports are connected toa switch or a router.

    1. Export the HA key from one firewall andimport it into the peer firewall.

      1. Select

        Device

        Certificate Management

        Certificates

        .

      2. Select

        Export HA key

        . Save the HAkey to a network location that the peer can access.

      3. On the peer firewall, select

        Device

        Certificate Management

        Certificates

        ,and select

        Import HA key

        to browse to thelocation that you saved the key and import it in to the peer.

    2. In

      Device

      HighAvailability

      General

      ,edit the Control Link (HA1).

    3. Select

      Encryption Enabled

      .

      If you enable encryption, after you finish configuringthe HA firewalls, you can Refresh HA1 SSH Keys and Configure Key Options.

  11. Set up the backup control link connection.

    1. In

      Device

      High Availability

      General

      ,edit Control Link (HA1 Backup).

    2. Select the HA1 backup interface and set the

      IPv4/IPv6Address

      and

      Netmask

      .

      PA-3200 Series firewalls don’t support an IPv6 addressfor the HA1 backup control link; use an IPv4 address.

  12. Set up the data link connection (HA2) and the backupHA2 connection between the firewalls.

    1. In

      Device

      High Availability

      General

      ,edit Data Link (HA2).

    2. Select the

      Port

      to use forthe data link connection.

    3. Select the

      Transport

      method.The default is

      ethernet

      , and will work whenthe HA pair is connected directly or through a switch. If you needto route the data link traffic through the network, select

      IP

      or

      UDP

      asthe transport mode.

    4. If you use IP or UDP as the transport method, enterthe

      IPv4/IPv6 Address

      and

      Netmask

      .

    5. Verify that

      Enable Session Synchronization

      isselected.

    6. Select

      HA2 Keep-alive

      to enablemonitoring on the HA2 data link between the HA peers. If a failureoccurs based on the threshold that is set (default is 10000 ms),the defined action will occur. When an HA2 Keep-alive failure occurs,the system either generates a critical system log message or causesa split dataplane depending on your configuration.

      You can configure the HA2 Keep-alive option on bothfirewalls, or just one firewall in the HA pair. If the option isonly enabled on one firewall, only that firewall sends the Keep-alivemessages. The other firewall is notified if a failure occurs.

      A split dataplane causes the dataplanes of both peersto operate independently while leaving the high-available stateas Active-Primary and Active-Secondary. If only one firewall isconfigured to split dataplane, then split dataplane applies to theother device as well.

    7. Edit the

      Data Link (HA2 Backup)

      section,select the interface, and add the

      IPv4/IPv6 Address

      and

      Netmask

      .

    8. Click

      OK

      .

  13. Configure the HA3 link for packet forwarding.

    1. In

      Device

      High Availability

      Active/Active Config

      ,edit Packet Forwarding.

    2. For

      HA3 Interface

      , select theinterface you want to use to forward packets between active/activeHA peers. It must be a dedicated interface capable of Layer 2 transportand set to

      Interface Type HA

      .

    3. Select

      VR Sync

      to force synchronizationof all virtual routers configured on the HA peers. Select when thevirtual router is not configured for dynamic routing protocols.Both peers must be connected to the same next-hop router througha switched network and must use static routing only.

    4. Select

      QoS Sync

      to synchronizethe QoS profile selection on all physical interfaces. Select whenboth peers have similar link speeds and require the same QoS profileson all physical interfaces. This setting affects the synchronizationof QoS settings on the

      Network

      tab. QoS policyis synchronized regardless of this setting.

  14. (

    Optional

    )Modify the Tentative Hold time.

    1. In

      Device

      High Availability

      Active/Active Config

      ,edit Packet Forwarding.

    2. For

      Tentative Hold Time (sec)

      ,enter the number of seconds that a firewall stays in Tentative stateafter it recovers post-failure (range is 10-600, default is 60).

  15. Configure SessionOwner and SessionSetup.

    1. In

      Device

      High Availability

      Active/Active Config

      ,edit Packet Forwarding.

    2. For

      Session Owner Selection

      ,select one of the following:

      • First Packet

        —The firewallthat receives the first packet of a new session is the session owner(recommended setting). This setting minimizes traffic across HA3and load shares traffic across peers.

      • Primary Device

        —The firewall that isin active-primary state is the session owner.

    3. For

      Session Setup

      , select oneof the following:

      • IP Modulo

        —The firewall performsan XOR operation on the source and destination IP addresses from thepacket and based on the result, the firewall chooses which HA peerwill set up the session.

      • Primary Device

        —The active-primaryfirewall sets up all sessions.

      • First Packet

        —The firewall that receivesthe first packet of a new session performs session setup (recommended setting).

        Start with First Packet for Session Ownerand Session Setup, and then based on load distribution, you canchange to one of the other options.

      • IP Hash

        —The firewall uses a hash ofeither the source IP address or a combination of the source anddestination IP addresses to distribute session setup responsibilities.

    4. Click

      OK

      .

  16. Configure an HA virtual address.

    You need a virtual address to use a FloatingIP Address and Virtual MAC Address or ARPLoad-Sharing.

    1. In

      Device

      High Availability

      Active/Active Config

      ,

      Add

      aVirtual Address.

    2. Enter or select an

      Interface

      .

    3. Select the

      IPv4

      or

      IPv6

      taband click

      Add

      .

    4. Enter an

      IPv4 Address

      or

      IPv6Address

      .

    5. For

      Type

      :

      • Select

        Floating

        to configurethe virtual IP address to be a floating IP address.

      • Select

        ARP Load Sharing

        to configurethe virtual IP address to be a shared IP address and skip to ConfigureARP Load-Sharing.

  17. Configure the floating IP address.

    1. Do not select

      Floating IP boundto the Active-Primary device

      unless you want the active/active HApair to behave like an active/passive HA pair.

    2. For

      Device 0 Priority

      and

      Device1 Priority

      , enter a priority for the firewall configured withDevice ID 0 and Device ID 1, respectively. The relative prioritiesdetermine which peer owns the floating IP address you just configured(range is 0-255). The firewall with the lowest priority value (highestpriority) owns the floating IP address.

    3. Select

      Failover address if link state isdown

      to cause the firewall to use the failover addresswhen the link state on the interface is down.

    4. Click

      OK

      .

  18. Configure ARPLoad-Sharing.

    The device selection algorithm determines which HA firewallresponds to the ARP requests to provide load sharing.

    1. For

      Device Selection Algorithm

      ,select one of the following:

      • IP Modulo

        —The firewall thatwill respond to ARP requests is based on the parity of the ARP requester's IPaddress.

      • IP Hash

        —The firewall that will respondto ARP requests is based on a hash of the ARP requester's IP address.

    2. Click

      OK

      .

  19. DefineHA Failover Conditions.

  20. Commit

    the configuration.

"); adBlockNotification.append($( "Thanks for visiting https://docs.paloaltonetworks.com. To improve your experience when accessing content across our site, please add the domain to the allow list on your ad blocker application." )); let adBlockNotificationClose = $("x"); adBlockNotification.prepend(adBlockNotificationClose) $('body').append(adBlockNotification); setTimeout(function (e) { adBlockNotification.addClass('open'); }, 10); adBlockNotificationClose.on('click', function (e) { adBlockNotification.removeClass('open'); }) } }, 5000)

Previous Prerequisites for Active/Active HA
Next Determine Your Active/Active Use Case

Recommended For You

{{ if(( raw.pantechdoctype != "techdocsAuthoredContentPage" && raw.objecttype != "Knowledge" && raw.pancommonsourcename != "TD pan.dev Docs")) { }} {{ if (raw.panbooktype) { }} {{ if (raw.panbooktype.indexOf('PANW Yellow Theme') != -1){ }}

{{ } else if (raw.panbooktype.indexOf('PANW Green Theme') != -1){ }}

{{ } else if (raw.panbooktype.indexOf('PANW Blue Theme') != -1){ }}

{{ } else { }}

{{ } }} {{ } else { }}

{{ } }} {{ } else { }} {{ if (raw.pantechdoctype == "pdf"){ }}

{{ } else if (raw.objecttype == "Knowledge") { }}

{{ } else if (raw.pancommonsourcename == "TD pan.dev Docs") { }}

{{ } else if (raw.pancommonsourcename == "LIVEcommunity Public") { }}

{{ } else { }}

{{ } }} {{ } }}

{{ if (raw.pancommonsourcename == "LIVEcommunity Public") { }}

{{ if (raw.pantechdoctype == "pdf"){ }}

{{ } }}

{{ } else { }}

{{ if (raw.pantechdoctype == "pdf"){ }}

{{ } }}

{{ } }}

{{ if (raw.pancommonsourcename != "TD pan.dev Docs"){ }} {{ if (raw.pandevdocsosversion){ }} {{ } else { }} {{ if ((_.size(raw.panosversion)>0) && !(_.isNull(raw.panconversationid )) && (!(_.isEmpty(raw.panconversationid ))) && !(_.isNull(raw.otherversions ))) { }} (See other versions) {{ } }} {{ } }} {{ } }}

{{ } }}{{ if (raw.pantechdoctype == "bookDetailPage"){ }}

{{ } }}{{ if (raw.pantechdoctype == "bookLandingPage"){ }}

{{ } }}{{ if (raw.pantechdoctype == "productLanding"){ }}

{{ } }}{{ if (raw.pantechdoctype == "techdocsAuthoredContentPage"){ }}

{{ } }}{{ if (raw.pantechdoctype == "pdf"){ }}

{{ } }}

© 2024 Palo Alto Networks, Inc. All rights reserved.

Configure Active/Active HA (2024)

References

Top Articles
Latest Posts
Article information

Author: Kerri Lueilwitz

Last Updated:

Views: 5999

Rating: 4.7 / 5 (67 voted)

Reviews: 82% of readers found this page helpful

Author information

Name: Kerri Lueilwitz

Birthday: 1992-10-31

Address: Suite 878 3699 Chantelle Roads, Colebury, NC 68599

Phone: +6111989609516

Job: Chief Farming Manager

Hobby: Mycology, Stone skipping, Dowsing, Whittling, Taxidermy, Sand art, Roller skating

Introduction: My name is Kerri Lueilwitz, I am a courageous, gentle, quaint, thankful, outstanding, brave, vast person who loves writing and wants to share my knowledge and understanding with you.