Use Case: Configure Active/Active HA with Source DIPP NAT Using Floating IP Addresses
Table of Contents
Expand All
|
Collapse All
Next-Generation Firewall Docs
-
-
- Cloud Management of NGFWs
- PAN-OS 10.0 (EoL)
- PAN-OS 10.1
- PAN-OS 10.2
- PAN-OS 11.0
- PAN-OS 11.1 & Later
- PAN-OS 9.1 (EoL)
-
- PAN-OS 10.1
- PAN-OS 10.2
- PAN-OS 11.0
- PAN-OS 11.1 & Later
-
-
- Cloud Management and AIOps for NGFW
- PAN-OS 10.0 (EoL)
- PAN-OS 10.1
- PAN-OS 10.2
- PAN-OS 11.0
- PAN-OS 11.1
- PAN-OS 11.2
- PAN-OS 8.1 (EoL)
- PAN-OS 9.0 (EoL)
- PAN-OS 9.1 (EoL)
Use Case: Configure Active/Active HA with Source DIPP NAT Using Floating IP Addresses
This Layer 3 interface example uses source NAT
in Active/Active HA Mode. The Layer 2 switches create
broadcast domains to ensure users can reach everything north and
south of the firewalls.
PA-3050-1 has Device ID 0 and its
HA peer, PA-3050-2, has Device ID 1. In this use case, NAT translates
the source IP address and port number to the floating IP address
configured on the egress interface. Each host is configured with
a default gateway address, which is the floating IP address on Ethernet1/1
of each firewall. The configuration requires two source NAT rules,
one bound to each Device ID, although you configure both NAT rules
on a single firewall and they are synchronized to the peer firewall.
- On PA-3050-2 (Device ID 1), perform Step 1 through Step 3 of Configure Active/Active HA.Enable active/active HA.
- In DeviceHigh AvailabilityGeneral, edit Setup.Select Enable HA.Enter a Group ID, which must be the same for both firewalls. The firewall uses the Group ID to calculate the virtual MAC address (range is 1-63).For Mode, select Active Active.Set the Device ID to 1.Select Enable Config Sync. This setting is required to synchronize the two firewall configurations (enabled by default).Enter the Peer HA1 IP Address, which is the IP address of the HA1 control link on the peer firewall.(Optional) Enter a Backup Peer HA1 IP Address, which is the IP address of the backup control link on the peer firewall.Click OK.Configure Active/Active HA.Configure Session Owner and Session Setup.
- In DeviceHigh AvailabilityActive/Active Config, edit Packet Forwarding.For Session Owner Selection, select First Packet—The firewall that receives the first packet of a new session is the session owner.For Session Setup, select IP Modulo—Distributes session setup load based on parity of the source IP address.Click OK.Configure an HA virtual address.
- Select DeviceHigh AvailabilityActive/Active ConfigVirtual Address and click Add.Select Interface eth1/1.Select IPv4 and Add an IPv4 Address of 10.1.1.101.For Type, select Floating, which configures the virtual IP address to be a floating IP address.Configure the floating IP address.
- Do not select Floating IP bound to the Active-Primary device.Select Failover address if link state is down to cause the firewall to use the failover address when the link state on the interface is down.Click OK.Enable jumbo frames on firewalls other than the PA-7000 Series.Define HA Failover Conditions.Commit the configuration.Configure the peer firewall, PA-3050-1 with the same settings, except for the following changes:
- Select Device ID 0.
- Configure an HA virtual address of 10.1.1.100.
- For Device 1 Priority, enter 255. For Device 0 Priority, enter 0.
In this example, Device ID 0 has a lower priority value so a higher priority; therefore, the firewall with Device ID 0 (PA-3050-1) owns the floating IP address 10.1.1.100.Still on PA-3050-1, create the source NAT rule for Device ID 0.- Select PoliciesNAT and click Add.Enter a Name for the rule that in this example identifies it as a source NAT rule for Device ID 0.For NAT Type, select ipv4 (default).On the Original Packet, for Source Zone, select Any.For Destination Zone, select the zone you created for the external network.Allow Destination Interface, Service, Source Address, and Destination Address to remain set to Any.For the Translated Packet, select Dynamic IP And Port for Translation Type.For Address Type, select Interface Address, in which case the translated address will be the IP address of the interface. Select an Interface (eth1/1 in this example) and an IP Address of the floating IP address 10.1.1.100.On the Active/Active HA Binding tab, for Active/Active HA Binding, select 0 to bind the NAT rule to Device ID 0.Click OK.Create the source NAT rule for Device ID 1.
- Select PoliciesNAT and click Add.Enter a Name for the policy rule that in this example helps identify it as a source NAT rule for Device ID 1.For NAT Type, select ipv4 (default).On the Original Packet, for Source Zone, select Any. For Destination Zone, select the zone you created for the external network.Allow Destination Interface, Service, Source Address, and Destination Address to remain set to Any.For the Translated Packet, select Dynamic IP And Port for Translation Type.For Address Type, select Interface Address, in which case the translated address will be the IP address of the interface. Select an Interface (eth1/1 in this example) and an IP Address of the floating IP address 10.1.1.101.On the Active/Active HA Binding tab, for the Active/Active HA Binding, select 1 to bind the NAT rule to Device ID 1.Click OK.Commit the configuration.