Palo Alto High Availability
Palo Alto High Availability
Palo Alto High Availability
TechConnect
High Availability
Von Nguyen
Webinar Agenda
Active/Passive HA
Overview
Configuration
Active/Active HA
Overview
Configuration
HA Monitoring
Troubleshooting
•Page 2
Active/Passive HA
• Supported Modes:
- Layer 2, Layer 3, Virtual Wire
• Links:
- HA1, HA2
• Device States:
- Initial, Active, Passive, Non-functional, Suspend
• Synchronization of:
- State-full sessions, Certificates, Response Pages, Configuration
- Not synchronized: Admin accounts, HA configuration
• 2 Unit cluster, same model
•Page 4
Active/Passive HA Operation
Primary Path
HA2
Secondary Path HA1
•Page 5
HA Configuration
Group ID for Device with lower
HA pair Priority will be
elected Active
Only encrypts
HA1 link info
Enables stateful
synchronization
across HA2 link
“Auto” (for L3
interfaces) or
“Shutdown”
Gateway specification
Page 7 |
Heartbeat Backup – Split Brain Protection
•<Heartbeat/Hello> •<Heartbeat/Hello>
•Redundant path
•DP status confirmation
•Supported on full product line
Page 8 |
Active/Active HA
A/A Agenda
• Overview
• Packet Handling
• Deployments
• Configuration
• Monitoring
• Troubleshooting
• Special Case, Wrap-Up
Page 10 |
Active/Active HA Overview
What is High Availability Active/Active?
• With A/A deployment, both HA peers are active and
processing traffic.
• A/A HA is supported only in the virtual-wire and Layer 3
modes beginning with PAN-OS 4.0.
• Such deployments are most suited for scenarios involving
asymmetric routing.
• Deployment also can be to allow dynamic routing protocols
(OSPF, BGP) to maintain active status across both peers.
• In addition to the HA1 and HA2 links used in A/P, A/A
deployments require a dedicated HA3 link. HA3 link is
used as packet forwarding link for session setup and
asymmetric traffic handling.
Page 11 |
Which to use - A/P or A/A?
What Active/Active is NOT designed for:
• A/A does NOT load balance. Load sharing can be done via
sending of traffic across each peer, but there is no load-
balancing mechanism.
• A/A will not increase performance or allow greater
capacity. At no point should traffic loads go beyond
capacity of a single stand-alone system as failover could
cause single system to become overloaded causing
possible outage.
Page 12 |
HA Peer Connection
• Same HA1 and HA2 links as A/P.
• Add HA3, any free dataplane port with interface mode
‘HA’.
- All packet forwarding between the two devices uses HA3 link.
•HA3 •HA2
•HA1
Page 13 |
Agenda
• Overview
• Packet Handling
• Deployments
• Configuration
• Monitoring
• Troubleshooting
• Special Case, Wrap-Up
Page 14 |
Active/Active Packet Handling
In Active/Active cluster, the packet handling can be
distributed between the two peers. There are two important
functions that are handled by devices in a cluster
• Session ownership
• Session setup
Page 15 |
Session Ownership
• Session owner device can be either the firewall that
receives the first packet of a new session or the device in
an ACTIVE-PRIMARY state.
• This device is responsible for all layer 7 processing, i.e.
app-id, content-id, and threat scanning for this session.
• This device is also responsible for generating all traffic
logs for the session.
Page 16 |
Session Setup
• Session setup device is responsible for layer2 through
layer4 processing required for setting up a new session.
• Address translation is performed by session setup device.
• Session setup device is determined by configuring
“session setup load sharing” options.
• Separation of session owner and session setup devices is
necessary to avoid race conditions that can occur in
asymmetrically routed environments
Page 17 |
Packet Flow
In order to understand packet flow within a cluster, we will
discuss three different scenarios
1. New session
2. Established session
3. Asymmetric packet flow
Page 18 |
Session Setup
1. Packet arrives at one of the
devices
2. Receiving device has no
session for the packet, and
assumes ownership of the Session owner
Session setup device
Will be L7 owner
session
3. Computed hash/modulo
determines device is not
responsible for session-setup,
and forwards packet to peer
device over HA3 link
4. Session is setup and session
info and packet are returned to
session owner
5. Original device forwards 0010100010
101001001
0010100010
101001001
Page 21 |
Packet Flow: Existing Session
The sequence of steps for an existing session
is listed below
Page 22 |
Established Session – Packet Arriving at non
session owner device
1.Packet arrives at one of
the devices
0010100010
101001001
Page 23 |
Packet Flow: Asymmetric Flow - L3
The sequence of steps for an assymetric
packet flow
Page 24 |
Packet Flow: Asymmetric Flow – V-Wire
The sequence of steps for an assymetric
packet flow
Page 25 |
Agenda
• Overview
• Packet Handling
• Deployments
• Configuration
• Monitoring
• Troubleshooting
• Special Case, Wrap-Up
Page 26 |
Deployment: V-Wire
• Simplest solution to implement high
availability
• Firewalls are installed between L3
devices. These are often used in
conjunction with dynamic routing
protocols which will fail traffic over to the
other cluster member if needed.
Note: Implementing A/A HA in v-wire
mode in a layer2 sandwich will result in
switching loops if Spanning Tree Protocol
is not enabled on the switches. It is
recommended to deploy A/A in v-wire in a
layer3 topology.
Page 27 |
Deployment: Layer 3
Layer3 deployment supports virtual IP addressing, NAT,
and use of dynamic routing protocols for redundancy.
Active/Active cluster can be deployed in several different
scenarios in layer3 mode as described below
• Floating IP
• ARP load sharing
• Mixed mode (combine both floating IP and ARP load
share)
Page 28 |
Deployment: L3 Floating IP
• Floating IP can move between HA devices when a link
failure or device failure occurs.
• Interface on device in cluster that owns floating IP
responds to ARP requests with a virtual MAC.
• Floating IPs are recommended when VRRP-like
functionality is required.
• Floating IPs can be used for VPNs and source NAT
allowing for persistent connections when a failure
occurs.
• Each interface on firewall has its own IP and a floating
IP. Interface IP remains local to the device but floating IP
address can move between the devices.
• End hosts are configured to use floating IP as default
gateway allowing traffic to be load balanced within the
cluster.
• External load balancers can also be used to load
balance traffic between firewalls within the cluster.
• If failover occurs, gratuitous ARP is sent out by the
functional device. Once device recovers, floating IP and
VMAC will move back to the original device.
Page 29 |
Deployment: L3 ARP Load Sharing
• HA pair to share an IP address and provide gateway
services.
• All hosts are configured with single gateway IP. ARP
requests for gateway IP are responded to with a virtual
MAC address from a single device in the pair.
• Each device will have unique virtual MAC address
generated for the shared IP.
• The device that responds to ARP request is determined
by computing hash or modulo of source IP of the ARP
request.
• Once end host receives ARP response from device, it
caches the MAC address and all traffic from host is
routed via the firewall that responded with VMAC. Life
time of ARP cache is dependent on end host OS.
• ARP load-sharing should be used only when a Layer 2
separation exists between firewalls and end hosts.
• If link or device failure, floating IP and VMAC moves over
to the functional device. Gratuitous ARP is sent out by
the functional device.
Page 30 |
Deployment: L3 Mixed Mode
• It is possible to have some of interfaces configured with
floating IPs and some with shared IPs for ARP loading
sharing.
• Cluster can be configured with ARP load sharing IPs,
configured for hosts on the LAN segment, and floating IP
configured on upstream WAN edge routers.
Page 31 |
Agenda
• Overview
• Packet Handling
• Deployments
• HA States
• Configuration
• Monitoring
• Troubleshooting
• Special Case, Wrap-Up
Page 32 |
Active/Active Configuration
• First step, set the HA mode to active-active.
Device > High Availability; Setup
• ID: HA group ID. Both devices must have the same group ID. HA group-ID is used to calculate virtual MAC.
• Mode: Choose active-active from the drop down list.
• Device-id: Select unique device from drop down list (0 or 1). Device-ID remains local to the device and does not
transition between devices during failover. This field is also used to calculate VMAC.
• Peer HA IP Address: IP address of HA1 control link on peer device.
• Backup Peer HA IP Address: IP address of backup control link on peer device. This field is optional.
• Enable Config Sync: Enabled by default, required to synchronize configuration between devices in cluster.
Page 33 |
HA Control and Data Links
• Same as Active/Passive
•PA-1 •PA-2
•Control
Link
•Data
Link
Page 34 |
HA3 Link
Used for packet forwarding between session owner and
session setup device.
Page 38 |
Configuring Link Monitoring
• Device > High Availability; Link Monitoring
Page 39 |
Configuring Path Monitoring
• Device > High Availability; Path Monitoring
Page 40 |
Agenda
• Overview
• Packet Handling
• Deployments
• Configuration
• Troubleshooting
• Special Case, Wrap-Up
Page 41 |
Troubleshooting
• CLI show commands:
admin@PA-2(active-primary)> show high-availability ?
> all Show high-availability information
> control-link Show control-link statistic information
> dataplane-status Show dataplane runtime status
> flap-statistics Show high-availability preemptive/non-functional
flap statistics
> interface Show high-availability interface information
> link-monitoring Show link-monitoring state
> path-monitoring Show path-monitoring statistics
> state Show high-availability state information
> state-synchronization Show state synchronization statistics
> transitions Show high-availability transition statistic
information
> virtual-address Show Active-Active virtual address status
• Logs:
- less mp-log ha_agent.log
- show log system
Note: For HA issues, be sure to always get data from BOTH peers as
issues may be on either device.
Page 42 |
HA CLI Commands
• Force configuration and session synchronization to peer
admin@student1> request high-availability sync-to-remote
• Show HA status
admin@student1> show high-availability state
admin@student1> show high-availability link / path -monitoring
Troubleshooting Sessions
Session flow from host 172.35.2.4 to host 10.1.1.250.
admin@PA-2(active-primary)> show session all filter destination-port 23
--------------------------------------------------------------------------------
ID Application State Type Flag Src[Sport]/Zone/Proto (translated IP[Port])
Vsys Dst[Dport]/Zone (translated IP[Port])
--------------------------------------------------------------------------------
19485 telnet ACTIVE FLOW NS 172.35.2.4[56484]/trust-l3/6 (10.1.1.101[57558])
vsys1 10.1.1.250[23]/untrust-l3 (10.1.1.250[23])
Page 44 |
Global Counter
Show counter global for Active/Active related packets.
admin@PA-2(active-primary)> show counter global filter aspect aa delta yes
Global counters:
Elapsed time since last sampling: 24.406 seconds
Page 45 |
Viewing Floating IPs
• “show high-availability virtual-address” can be used to
view all configured floating IP addresses.
Page 46 |
Manual failover
Same as A/P except will determine Primary/Secondary.
• GUI:
Page 47 |
Logs and Packet Captures
• All traffic logs are logged by session owner.
• When session owner fails, peer device will become
session owner and will handle logging.
• If preempt is enabled and should failed device recover
before session ends, it will take back ownership of the
session and handle logging.
Page 48 |
Agenda
• Overview
• Packet Handling
• Deployments
• Configuration
• Monitoring
• Troubleshooting
• Special Case, Wrap-Up
Page 49 |
PA-200 – A/P HA-Lite
Page 50 |
For More Information
Page 51 |
THANK YOU !!
Page 52 |