PAN9 EDU210 Lab 13
PAN9 EDU210 Lab 13
PAN9 EDU210 Lab 13
NETLAB Academy Edition, NETLAB Professional Edition, and NETLAB+ are registered trademarks of Network Development Group, Inc.
Palo Alto Networks and the Palo Alto Networks logo are trademarks or registered trademarks of Palo Alto Networks, Inc.
Lab 13: Active/Passive High Availability
Contents
Introduction ........................................................................................................................ 3
Objectives............................................................................................................................ 3
Lab Topology ....................................................................................................................... 4
Theoretical Lab Topology .................................................................................................... 4
Lab Settings ......................................................................................................................... 5
1 Active/Passive High Availability .................................................................................. 6
1.0 Load Lab Configuration ........................................................................................ 6
1.1 Display the HA Widget ......................................................................................... 8
1.2 Configure the HA Interface .................................................................................. 9
1.3 Configure Active/Passive HA .............................................................................. 10
1.4 Configure HA Monitoring ................................................................................... 14
1.5 Observe the HA Widget...................................................................................... 17
Introduction
The board and the executives have become worried that we could experience downtime
with the current configuration. They have therefore approved the purchase of a second
Palo Alto Networks firewall like the first one and to implement Active/Passive High
Availability to prevent possible downtime. We are going to test the process of
configuring the feature before the second device arrives. We will then be able to
duplicate the process when the second device arrives and turn it on.
Objectives
Lab Topology
Lab Settings
The information in the table below will be needed in order to complete the lab. The
task sections below provide details on the use of this information.
1. Launch the Client virtual machine to access the graphical login screen.
To launch the console window for a virtual machine, you may access by
either clicking on the machine’s graphic image from the topology page
or by clicking on the machine’s respective tab from the navigation bar.
2. Click within the splash screen to bring up the login screen. Log in as lab-user using
the password Pal0Alt0.
Parameter Value
Name admin
Password admin
8. Click the drop-down list next to the Name text box and select edu-210-lab-13. Click
OK.
9. Click Close.
10. Click the Commit link at the top-right of the web interface.
11. Click Commit and wait until the commit process is complete.
13. Leave the firewall web interface open to continue with the next task.
If high availability (HA) is enabled, the High Availability widget on the Dashboard
indicates the HA status.
1. In the web interface, click the Dashboard tab to display current firewall information.
2. If the High Availability panel is not displayed, select Widgets > System > High
Availability to enable the display.
4. Leave the firewall web interface open to continue with the next task.
3. In the Ethernet Interface window, select HA from the Interface Type drop-down list
and click OK.
4. Leave the firewall web interface open to continue with the next task.
In this deployment, the active firewall continuously synchronizes its configuration and
session information with the passive firewall over two dedicated interfaces. In the event
of a hardware or software disruption on the active firewall, the passive firewall becomes
active automatically without loss of service. Active/passive HA deployments are
supported by the interface modes Virtual Wire, Layer 2, and Layer 3.
1. In the web interface, navigate to Device > High Availability > General.
2. Click the Edit icon from the Setup panel to open the Setup configuration window.
3. In the Setup window, configure the following. Once finished, click OK.
Parameter Value
Enable HA Check the checkbox
Group ID Type 60 (This field is required and must be unique if
multiple HA pairs reside on the same broadcast
domain.)
Mode Verify that the Active Passive radio button is selected
Enable Config Sync Check the checkbox (Select this option to enable
synchronization of configuration settings between the
peers.)
Peer HA1 IP Address Type 172.16.3.11
6. Click the Edit icon from the Election Settings panel to configure failover behavior.
7. In the Election Settings window, configure the following. Once finished, click OK.
Parameter Value
Device Priority Type 80
(Enter a priority value (range is 0-255) to identify the
active firewall. The firewall with the lower value
(higher priority) becomes the active firewall when the
Preemptive capability is enabled on both firewalls in
the pair.)
Preemptive Check the checkbox
(Enables the higher priority firewall to resume active
operation after recovering from a failure. This
parameter must be enabled on both firewalls but is
not always a recommended practice.)
Heartbeat Backup Uncheck the checkbox
(Uses the management ports on the HA firewalls to
provide a backup path for heartbeat and hello
messages.)
8. Click the Edit icon from the Control Link (HA1) panel to configure the HA1 link.
The firewalls in an HA pair use HA links to synchronize data and maintain state
information.
9. In the Control Link (HA1) window, configure the following. Once finished, click OK.
Parameter Value
Port Select ethernet1/6 from the drop-down list
IPv4/IPv6 Address Type 172.16.3.10
Netmask Type 255.255.255.0
10. Click the Edit icon from the Data Link (HA2) configuration window.
11. In the Data Link (HA2) windows, deselect the Enable Session Synchronization
checkbox and click OK.
12. Leave the firewall web interface open to continue with the next task.
1. In the web interface, navigate to Device > High Availability > Link and Path
Monitoring.
2. Click the Edit icon from the Link Monitoring panel to configure link failure
detection.
3. In the Link Monitoring window, verify that the Enabled checkbox is checked and that
the Any radio button is selected. Click OK.
4. Click Add in the Link Group panel to configure the traffic links to monitor.
5. In the Link Group window, configure the following. Once finished, click OK.
Parameter Value
Name Type traffic-links
Enabled Verify that Enabled is checked
(Note: Not supported on VM-series on ESXi.)
Failure Condition Verify that the Any radio button is selected
Interface Click Add and select the following from the drop-down list:
ethernet1/1
ethernet1/2
6. Click the Edit icon from the Path Monitoring panel to configure the Path Failure
detection.
7. In the Path Monitoring window, verify that the Enabled checkbox is checked and
that the Any radio button is selected. Click OK.
8. Find the Path Group panel and click Add Virtual Router Path to configure the path
failure condition.
9. In the HA Path Group Virtual Router window, configure the following. Once finished,
click OK.
Parameter Value
Name Select lab-vr from the drop-down list
Enabled Verify that the Enabled checkbox is checked
Failure Condition Verify that the Any radio button is selected
Destination IP Click Add and type 8.8.8.8
1. In the web interface, click the Dashboard tab and view the High Availability status
widget for the firewall.
2. If a peer was configured and was operating in passive mode, the High Availability
widget on the Dashboard would appear as follows.