Configure an Aggregate Interface Group
Table of Contents
Expand All
|
Collapse All
Next-Generation Firewall Docs
-
-
- Cloud Management of NGFWs
- PAN-OS 10.0 (EoL)
- PAN-OS 10.1
- PAN-OS 10.2
- PAN-OS 11.0
- PAN-OS 11.1 & Later
- PAN-OS 9.1 (EoL)
-
- PAN-OS 10.1
- PAN-OS 10.2
- PAN-OS 11.0
- PAN-OS 11.1 & Later
-
-
-
- Cloud Management and AIOps for NGFW
- PAN-OS 10.0 (EoL)
- PAN-OS 10.1
- PAN-OS 10.2
- PAN-OS 11.0
- PAN-OS 11.1
- PAN-OS 11.2
- PAN-OS 8.1 (EoL)
- PAN-OS 9.0 (EoL)
- PAN-OS 9.1 (EoL)
Configure an Aggregate Interface Group
An aggregate interface group uses IEEE 802.1AX
link aggregation to combine multiple Ethernet interfaces into a
single virtual interface that connects the firewall to another network
device or firewall. An aggregate group increases the bandwidth between
peers by load balancing traffic across the combined interfaces.
It also provides redundancy; when one interface fails, the remaining
interfaces continue supporting traffic.
By default, interface failure detection is automatic only at the physical layer between directly
connected peers. However, if you enable Link Aggregation Control Protocol (LACP),
failure detection is automatic at the physical and data link layers regardless of
whether the peers are directly connected. LACP also enables automatic failover to
standby interfaces if you configured hot spares. All Palo Alto Networks®
firewalls support aggregate groups. The Product Selection tool indicates the number of aggregate
groups each firewall supports. Each aggregate group can have up to eight
interfaces.
PAN-OS® firewall
models support a maximum of 16,000 IP addresses assigned to physical
or virtual Layer 3 interfaces; this maximum includes both IPv4 and
IPv6 addresses.
QoS is supported on only the first
eight aggregate groups.
Before configuring an aggregate group,
you must configure its interfaces. Among the interfaces assigned
to any particular aggregate group, the hardware media can differ
(for example, you can mix fiber optic and copper), but the bandwidth
and interface type must be the same. The bandwidth and interface
type options are:
- Bandwidth—1Gbps, 10Gbps, 25Gbps, 40Gbps, or 100Gbps.
- Interface type—HA3, virtual wire, Layer 2, or Layer 3.
This
procedure describes configuration steps only for the Palo Alto Networks
firewall. You must also configure the aggregate group on the peer device.
Refer to the documentation of that device for instructions.
- Configure the general interface group parameters.
- Select NetworkInterfacesEthernet and Add Aggregate Group.In the field adjacent to the read-only Interface Name, enter a number to identify the aggregate group. The range is 1 to the maximum number of aggregate interface groups supported by the firewall.For the Interface Type, select HA, Virtual Wire, Layer2, or Layer3.Configure the remaining parameters for the Interface Type you selected.For a Layer 3 interface, if you want to configure a static IPv4 address, select IPv4 and refer to Configure Layer 3 Interfaces for configuring a static IPv4 address.For a Layer 3 interface, if you want to configure a static IPv6 address, select IPv6 and refer to Configure Layer 3 Interfaces for configuring a static IPv6 address.For a Layer 3 interface, if you want to configure the interface as a DHCP client to receive an IPv4 address, select IPv4 and refer to Configure an Interface as a DHCPv4 Client for configuring a DHCP client.For a Layer 3 interface, if you want to configure the interface as a DHCPv6 client to receive an IPv6 address (with or without prefix delegation), select IPv6 and refer to Configure an Interface as a DHCPv6 Client for configuring a DHCPv6 client.Configure the LACP settings.Perform this step only if you want to enable LACP for the aggregate group.You cannot enable LACP for virtual wire interfaces.
- Select the LACP tab and Enable LACP.Set the Mode for LACP status queries to Passive (the firewall just responds—the default) or Active (the firewall queries peer devices).As a best practice, set one LACP peer to active and the other to passive. LACP cannot function if both peers are passive. The firewall cannot detect the mode of its peer device.Set the Transmission Rate for LACP query and response exchanges to Slow (every 30 seconds—the default) or Fast (every second). Base your selection on how much LACP processing your network supports and how quickly LACP peers must detect and resolve interface failures.Select Fast Failover if you want to enable failover to a standby interface in less than one second. By default, the option is disabled and the firewall uses the IEEE 802.1ax standard for failover processing, which takes at least three seconds.As a best practice, use Fast Failover in deployments where you might lose critical data during the standard failover interval.Enter the Max Ports (number of interfaces) that are active (1 to 8) in the aggregate group. If the number of interfaces you assign to the group exceeds the Max Ports, the remaining interfaces will be in standby mode. The firewall uses the LACP Port Priority of each interface you assign (Step 3) to determine which interfaces are initially active and to determine the order in which standby interfaces become active upon failover. If the LACP peers have non-matching port priority values, the values of the peer with the lower System Priority number (default is 32,768; range is 1 to 65,535) will override the other peer.(Optional) For active/passive firewalls only, select Enable in HA Passive State if you want to enable LACP pre-negotiation for the passive firewall. LACP pre-negotiation enables quicker failover to the passive firewall (for details, see LACP and LLDP Pre-Negotiation for Active/Passive HA).If you select this option, you cannot select Same System MAC Address for Active-Passive HA; pre-negotiation requires unique interface MAC addresses on each HA firewall.(Optional) For active/passive firewalls only, select Same System MAC Address for Active-Passive HA and specify a single MAC Address for both HA firewalls. This option minimizes failover latency if the LACP peers are virtualized (appearing to the network as a single device). By default, the option is disabled: each firewall in an HA pair has a unique MAC address.If the LACP peers are not virtualized, use unique MAC addresses to minimize failover latency.Click OK.Assign interfaces to the aggregate group.Perform the following steps for each interface (1–8) that will be a member of the aggregate group.
- Select NetworkInterfacesEthernet and click the interface name to edit it.Set the Interface Type to Aggregate Ethernet.Select the Aggregate Group you just defined.Select the Link Speed, Link Duplex, and Link State.As a best practice, set the same link speed and duplex values for every interface in the group. For non-matching values, the firewall defaults to the higher speed and full duplex.(Optional) Enter an LACP Port Priority (default is 32,768; range is 1 to 65,535) if you enabled LACP for the aggregate group. If the number of interfaces you assign exceeds the Max Ports value of the group, the port priorities determine which interfaces are active or standby. The interfaces with the lower numeric values (higher priorities) will be active.Click OK.If the firewalls have an active/active configuration and you are aggregating HA3 interfaces, enable packet forwarding for the aggregate group.
- Select DeviceHigh AvailabilityActive/Active Config and edit the Packet Forwarding section.Select the aggregate group you configured for the HA3 Interface and click OK.(Supported firewalls only) If the interface corresponds to a PoE (Power over Ethernet) port on the firewall, you can optionally configure PoE.Commit your changes.Verify the aggregate group status.
- Select NetworkInterfacesEthernet.Verify that the Link State column displays a green icon for the aggregate group, indicating that all member interfaces are up. If the icon is yellow, at least one member is down but not all. If the icon is red, all members are down.If you configured LACP, verify that the Features column displays the LACP enabled icon(PA-7050 and PA-7080 firewalls only) If you have an aggregate interface group that has interfaces located on different line cards, it is a best practice to enable the firewall so that it can handle fragmented IP packets it receives on multiple interfaces of the AE group that are spread over multiple cards. To do so, use the following CLI operational command with the hash keyword. (The other two keywords are also shown for completeness.)
- Access the CLI.Use the following operational CLI command: set ae-frag redistribution-policy <self | fixed sXdpX | hash>
- self—(default) This keyword is for legacy behavior; it does not enable the firewall to handle fragmented packets received on multiple interfaces of an AE interface group.
- fixed s<slot-number>dp<dataplane-cpu-number>—Replace the slot-number variable and replace the data-plane-cpu-number variable with the dataplane number of the dataplane that will handle all IP fragments received by all members of all AE interfaces. The fixed keyword is intended mainly for troubleshooting purposes and shouldn’t be used in production.
- hash—Use to enable the firewall to handle fragmented packets it receives on multiple interfaces of an AE interface group that are located on more than one line card.