HA Overview

High availability (HA) is a deployment in which two firewalls are placed in a group or up to 16 firewalls are placed in an HA cluster and their configuration is synchronized to prevent a single point of failure on your network. A heartbeat connection between the firewall peers ensures seamless failover in the event that a peer goes down. Setting up HA provides redundancy and allows you to ensure business continuity.

You can configure two Palo Alto Networks firewalls as an HA pair or configure up to 16 firewalls as peer members of an HA cluster. The peers in the cluster can be HA pairs or standalone firewalls. HA allows you to minimize downtime by making sure that an alternate firewall is available in the event that a peer firewall fails. The firewalls in an HA pair or cluster use dedicated or in-band HA ports on the firewall to synchronize data—network, object, and policy configurations—and to maintain state information.

Firewall-specific configuration such as management interface IP address or administrator profiles, HA specific configuration, log data, and the Application Command Center (ACC) information is not shared between peers.

For a consolidated application and log view across an HA pair, you must use Panorama, the Palo Alto Networks centralized management system.

When a failure occurs on a firewall in an HA pair or HA cluster and a peer firewall takes over the task of securing traffic, the event is called a failover . The conditions that trigger a failover are:

Palo Alto Networks firewalls support stateful active/passive or active/active high availability with session and configuration synchronization with a few exceptions:

It is highly recommended that you use Panorama to provision HA cluster members.

HA Modes

You can set up the firewalls in an HA pair in one of two modes:

In active/active HA mode, the firewall does not support DHCP client. Furthermore, only the active-primary firewall can function as a DHCP Relay. If the active-secondary firewall receives DHCP broadcast packets, it drops them.

An active/active configuration does not load-balance traffic by default. Although you can load-share by sending traffic to the peer (e.g., using ECMP, multiple ISPs, load balancers), the firewalls themselves don't perform load balancing.

When deciding whether to use active/passive or active/active mode, consider the following differences:

In active/active mode, the HA pair can be used to temporarily process more traffic than what one firewall can normally handle. However, this should not be the norm because a failure of one firewall causes all traffic to be redirected to the remaining firewall in the HA pair. Your design must allow the remaining firewall to process the maximum capacity of your traffic loads with content inspection enabled. If the design oversubscribes the capacity of the remaining firewall, high latency and/or application failure can occur.

In an HA cluster, all members are considered active; there is no concept of passive firewalls except for HA pairs in the clusters, which can keep their active/passive relationship after you add them to an HA cluster.

Device Priority and Preemption

The firewalls in an Active-Passive HA pair can be assigned a device priority value to indicate a preference for which firewall should assume the active role. If you need to use a specific firewall in the HA pair for actively securing traffic, you must enable the preemptive behavior on both the firewalls and assign a device priority value for each firewall. The firewall with the lower numerical value, and therefore higher priority , is designated as active. The other firewall is the passive firewall.

The same is true for an Active-Active HA pair; however, the device ID (0 or 1) is used to determine priority. The lower numerical value (Device ID 0) corresponds to a higher priority. The firewall with the higher priority becomes active-primary and the paired firewall becomes active-secondary.

By default, preemption is disabled on the firewalls and must be enabled on both firewalls if desired. When enabled, the preemptive behavior allows the firewall with the higher priority (lower numerical value or Device ID 0) to resume as active or active-primary after it recovers from a failure. When preemption occurs, the event is logged in the system logs.

Failover

When a failure occurs on one firewall and the peer in the HA pair (or a peer in the HA cluster) takes over the task of securing traffic, the event is called a failover . A failover is triggered, for example, when a monitored metric on a firewall in the HA pair fails. The metrics that the firewall monitors for detecting a firewall failure are:

In addition to the failover triggers listed above, a failover also occurs when the administrator suspends the firewall or when preemption occurs.

On PA-3200 Series, PA-5200 Series, PA-5450, and PA-7000 Series firewalls, a failover can occur when an internal health check fails. This health check is not configurable and is enabled to monitor the critical components, such as the FPGA and CPUs. Additionally, general health checks occur on any platform, causing failover.

The following describes what occurs in the event of a failure of a Network Processing Card (NPC) on a PA-7000 Series firewall that is a member of an HA cluster:

LACP and LLDP Pre-Negotiation for Active/Passive HA

If a firewall uses LACP or LLDP, negotiation of those protocols upon failover prevents sub-second failover. However, you can enable an interface on a passive firewall to negotiate LACP and LLDP prior to failover. Thus, a firewall in Passive or Non-functional HA state can communicate with neighboring devices using LACP or LLDP. Such pre-negotiation speeds up failover.

All firewall models except VM-Series firewalls support a pre-negotiation configuration, which depends on whether the Ethernet or AE interface is in a Layer 2, Layer 3, or virtual wire deployment. An HA passive firewall handles LACP and LLDP packets in one of two ways:

The following table displays which deployments are supported on Aggregate Ethernet (AE) and Ethernet interfaces.

Interface Deployment AE Interface Ethernet Interface
LACP in Layer 2 Active Not supported
LACP in Layer 3 Active Not supported
LACP in Virtual Wire Not supported Passive
LLDP in Layer 2 Active Active
LLDP in Layer 3 Active Active
LLDP in Virtual Wire Active
  • Active if LLDP itself is configured.
  • Passive if LLDP itself is not configured.

Pre-negotiation is not supported on subinterfaces or tunnel interfaces.

HA Timers

High availability (HA) timers facilitate a firewall to detect a firewall failure and trigger a failover. To reduce the complexity in configuring timers for an HA pair, you can select from three profiles: Recommended , Aggressive and Advanced . These profiles auto-populate the optimum HA timer values for the specific firewall platform to enable a speedier HA deployment.

Use the Recommended profile for typical failover timer settings and the Aggressive profile for faster failover timer settings. The Advanced profile allows you to customize the timer values to suit your network requirements.

The following table describes each timer included in the profiles and the preset values (Recommended/Aggressive) across different hardware models; these values are for reference and can change.

Timers that affect members of an HA cluster are described in Configure HA Clustering documentation.

Timers Description PA-7000/5450/5200/3200 Series PA-800/220 Series, VM-Series Panorama
Monitor Fail Hold Up Time (ms) Interval during which the firewall will remain active following a path monitor or link monitor failure. This setting is recommended to avoid an HA failover due to the occasional flapping of neighboring devices. 0/0 0/0 0/0
Preemption Hold Time (min) Time that a passive or active-secondary firewall will wait before taking over as the active or active-primary firewall. 1/1 1/1 1/1
Heartbeat Interval (ms) Frequency at which the HA peers exchange heartbeat messages in the form of an ICMP (ping). 1000/1000 2000/1000 2000/1000
Promotion Hold Time (ms) Time that the passive firewall (in active/passive mode) or the active-secondary firewall (in active/active mode) will wait before taking over as the active or active-primary firewall after communications with the HA peer have been lost. This hold time will begin only after the peer failure declaration has been made. 2000/500 2000/500 2000/500
Additional Master Hold Up Time (ms) Time interval in milliseconds that is applied to the same event as Monitor Fail Hold Up Time (range is 0 to 60,000; default is 500). The additional time interval is applied only to the active firewall in active/passive mode and to the active-primary firewall in active/active mode. This timer is recommended to avoid a failover when both firewalls experience the same link/path monitor failure simultaneously. 500/500 500/500 7000/5000
Hello Interval (ms) Interval in milliseconds between hello packets that are sent to verify that the HA functionality on the other firewall is operational (range is 8,000 to 60,000; default is 8,000). 8000/8000 8000/8000 8000/8000
Flap Max A flap is counted when:
  • A preemption-enabled firewall leaves the active state within 20 minutes after becoming active.
  • A link or path fails to stay up for 10 minutes after becoming functional.
In the case of a failed preemption or non-functional loop, this value indicates the maximum number of flaps that are permitted before the firewall is suspended (range 0 to 16; default is 3).
3/3 (Default/Aggressive for all)

Active/Active Concepts: Session Owner & Setup

In an HA active/active configuration, both firewalls are active simultaneously, which means packets can be distributed between them. Such distribution requires the firewalls to fulfill two functions: session ownership and session setup. Typically, each firewall of the pair performs one of these functions, thereby avoiding race conditions that can occur in asymmetrically routed environments.

Session Owner

You configure the session owner of sessions to be either the firewall that receives the First Packet of a new session from the end host or the firewall that is in active-primary state (the Primary device). If Primary device is configured, but the firewall that receives the first packet is not in active-primary state, the firewall forwards the packet to the peer firewall (the session owner) over the HA3 link.

The session owner performs all Layer 7 processing, such as App-ID, Content-ID, and threat scanning for the session. The session owner also generates all traffic logs for the session.

If the session owner fails, the peer firewall becomes the session owner. The existing sessions fail over to the functioning firewall and no Layer 7 processing is available for those sessions. When a firewall recovers from a failure, by default, all sessions it owned before the failure revert back to that original firewall; Layer 7 processing does not resume.

Palo Alto Networks recommends setting the Session Owner to First Packet and the Session Setup to IP Modulo (or First Packet) unless otherwise indicated in a specific use case. Setting the Session Owner to First Packet reduces traffic across the HA3 link and helps distribute the dataplane load across peers.

Setting Session Owner and Session Setup to Primary Device causes the active-primary firewall to perform all traffic processing. You might want to configure this for one of these reasons:

Session Setup

The session setup firewall performs the Layer 2 through Layer 4 processing necessary to set up a new session. The session setup firewall also performs NAT using the NAT pool of the session owner. You determine the session setup firewall in an active/active configuration by selecting one of the following session setup load sharing options.

Session Setup Option Description
IP Modulo The firewall distributes the session setup load based on parity of the source IP address. This is a deterministic method of sharing the session setup.
IP Hash The firewall uses a hash of the source and destination IP addresses to distribute session setup responsibilities.
Primary Device The active-primary firewall always sets up the session; only one firewall performs all session setup responsibilities.
First Packet The firewall that receives the first packet of a session performs session setup.

Recommendations:

The firewall uses the HA3 link to send packets to its peer for session setup if necessary.

Diagram showing packet flow for new session setup in Active/Active HA when session owner and setup firewall differ.
Packet Flow: New Session Setup (Session Owner != Session Setup Firewall)

Packet Path (New Session, FW1 receives first packet, FW2 is session setup firewall):

  1. End host sends packet to FW1.
  2. FW1 determines it's a new session and becomes session owner (assuming First Packet setting).
  3. FW1 determines FW2 is the session setup firewall (based on IP Modulo, Hash, or Primary setting).
  4. FW1 sends packet to FW2 via HA3 link.
  5. FW2 sets up session, returns packet to FW1 via HA3 link.
  6. FW1 performs L7 processing (as session owner) and forwards packet out egress interface.
Diagram showing packet flow for existing session in Active/Active HA.
Packet Flow: Existing Session

Packet Path (Existing Session):

  1. End host sends packet to FW1.
  2. FW1 matches packet to existing session and processes it directly (regardless of original session owner/setup firewall).
  3. FW1 forwards packet out egress interface.

Active/Active Concepts: Redundancy Mechanisms

Floating IP Address and Virtual MAC Address

In a Layer 3 deployment of HA active/active mode, you can assign floating IP addresses , which move from one HA firewall to the other if a link or firewall fails. The interface on the firewall that owns the floating IP address responds to ARP requests with a virtual MAC address .

Floating IP addresses are recommended when you need functionality such as Virtual Router Redundancy Protocol (VRRP). Floating IP addresses can also be used to implement VPNs and source NAT, allowing for persistent connections when a firewall offering those services fails.

Each HA firewall interface has its own IP address and can have floating IP address(es). The interface IP address remains local to the firewall, but the floating IP address moves between the firewalls upon firewall failure. You configure the end hosts to use a floating IP address as its default gateway, allowing you to load balance traffic to the two HA peers. You can also use external load balancers to load balance traffic.

Diagram illustrating Floating IP addresses in an Active/Active HA setup.
Active/Active HA with Floating IP Addresses

If a link or firewall fails or a path monitoring event causes a failover, the floating IP address and virtual MAC address move over to the functional firewall. The functioning firewall sends a gratuitous ARP to update the MAC tables of the connected switches to inform them of the change in floating IP address and MAC address ownership to redirect traffic to itself.

After the failed firewall recovers, by default the floating IP address and virtual MAC address move back to firewall with the Device ID (0 or 1) to which the floating IP address is bound (lowest priority value). There is an option to bind the floating IP to the Active-Primary device instead.

Each firewall in the HA pair creates a virtual MAC address for each of its interfaces that has a floating IP address or ARP Load-Sharing IP address. The format depends on the firewall model:

ARP Load-Sharing

In a Layer 3 interface deployment and active/active HA configuration, ARP load-sharing allows the firewalls to share an IP address and provide gateway services. Use ARP load-sharing only when no Layer 3 device exists between the firewall and end hosts , that is, when end hosts use the firewall as their default gateway.

Diagram illustrating ARP Load-Sharing in an Active/Active HA setup where firewalls are the default gateway.
Active/Active HA with ARP Load-Sharing (LAN side)

In such a scenario, all hosts are configured with a single gateway IP address. One of the firewalls responds to ARP requests for the gateway IP address with its virtual MAC address. Each firewall has a unique virtual MAC address generated for the shared IP address. The load-sharing algorithm ( IP Modulo or IP Hash ) that controls which firewall will respond to the ARP request is configurable.

After the end host receives the ARP response from the gateway, it caches the MAC address and all traffic from the host is routed via the firewall that responded with the virtual MAC address for the lifetime of the ARP cache.

If a link or firewall fails, the shared IP address functionality relies on the surviving firewall to respond to ARPs previously handled by the failed peer. The surviving firewall sends gratuitous ARPs to update switch MAC tables.

Diagram showing ARP Load-Sharing on the LAN side and Floating IPs on the WAN side.
Active/Active HA with ARP Load-Sharing (LAN) and Floating IPs (WAN)

The firewall supports a shared IP address for ARP load-sharing only on the LAN side of the firewall; the shared IP address cannot be on the WAN side.

Route-Based Redundancy

In a Layer 3 interface deployment and active/active HA configuration where the firewalls are connected to routers (not directly to end-host segments), route-based redundancy is used. The firewalls use dynamic routing protocols (RIP, OSPF, or BGP) to determine the best path (asymmetric route) and to load share between the HA pair. In such a scenario, no floating IP addresses are necessary .

Diagram showing Active/Active HA using dynamic routing protocols (OSPF) for redundancy.
Active/Active HA with Route-Based Redundancy (using OSPF)

If a link, monitored path, or firewall fails, or if Bidirectional Forwarding Detection (BFD) detects a link failure, the routing protocol handles the rerouting of traffic to the functioning firewall. You configure each firewall interface with a unique IP address. The IP addresses remain local to the firewall where they are configured; they do not move between devices when a firewall fails.

Active/Active Concepts: NAT and ECMP

NAT in Active/Active HA Mode

In an active/active HA configuration:

Thus, when one of the firewalls creates a new session, the Device ID binding determines which NAT rules match the firewall. The device binding must include the session owner firewall to produce a match.

The session setup firewall performs the NAT policy match, but the NAT rules are evaluated based on the session owner . That is, the session is translated according to NAT rules that are bound to the session owner firewall. While performing NAT policy matching, a firewall skips all NAT rules that are not bound to the session owner firewall.

If one of the peer firewalls fails, the active firewall continues to process traffic for synchronized sessions from the failed firewall, including NAT traffic. In a source NAT configuration using floating IPs, when one firewall fails:

ECMP in Active/Active HA Mode

When an active/active HA peer fails, its sessions transfer to the new active-primary firewall, which tries to use the same egress interface that the failed firewall was using. If the firewall finds that interface among the ECMP paths, the transferred sessions will take the same egress interface and path. This behavior occurs regardless of the ECMP algorithm in use; using the same interface is desirable.

Only if no ECMP path matches the original egress interface will the active-primary firewall select a new ECMP path.

If you did not configure the same interfaces on the active/active peers, upon failover the active-primary firewall selects the next best path from the FIB table. Consequently, the existing sessions might not be distributed according to the ECMP algorithm.

Configuration: Active/Passive HA

Prerequisites for Active/Passive HA

To set up high availability on your Palo Alto Networks firewalls, you need a pair of firewalls that meet the following requirements:

As a best practice, if you have an existing firewall and you want to add a new firewall for HA purposes and the new firewall has an existing configuration Reset the Firewall to Factory Default Settings on the new firewall. This ensures that the new firewall has a clean configuration. After HA is configured, you will then sync the configuration on the primary firewall to the newly introduced firewall with the clean configuration.

Configuration Guidelines for Active/Passive HA

To set up an active (PeerA) passive (PeerB) pair in HA, you must configure some options identically on both firewalls and some independently (non-matching) on each firewall. These HA settings are not synchronized between the firewalls.

The following settings must be configured identically on both firewalls:

HA functionality (HA1 and HA1 backup) is not supported on the management interface if it's configured for DHCP addressing (IP Type set to DHCP Client), except on AWS and Azure.

The following settings must be configured independently on each firewall:

Independent Configuration Settings PeerA (Example: Active) PeerB (Example: Passive)
Control Link (HA1) IP Address IP address of the HA1 link configured on this firewall (PeerA). IP address of the HA1 link configured on this firewall (PeerB). (Must be on the same subnet as PeerA's HA1 if directly connected or same switch).
Data Link (HA2) IP Address (if using IP/UDP) If using IP/UDP transport, IP address for the HA2 link on PeerA. If using IP/UDP transport, IP address for the HA2 link on PeerB. (Subnet must not overlap HA1 or data ports).
Device Priority (if preemption enabled) Lower numerical value (e.g., 100) for higher priority (active). Higher numerical value (e.g., 110) for lower priority (passive).
Link Monitoring Interfaces Select physical interfaces on PeerA to monitor. Select corresponding physical interfaces on PeerB to monitor.
Path Monitoring Destinations Define destination IPs/groups to monitor from PeerA. Define corresponding destination IPs/groups to monitor from PeerB.

Configure Active/Passive HA Steps

Active/Passive HA Topology Example
Example Active/Passive HA Topology

To configure an active/passive HA pair, first complete the following workflow on the first firewall and then repeat the steps on the second firewall.

  1. Connect the HA ports physically between the firewalls (HA1-to-HA1, HA2-to-HA2, etc., using appropriate cables/ports for the model).
  2. Enable ping on the management port ( Device > Setup > Interfaces > Management ) if using it for heartbeat backup.
  3. If not using dedicated HA ports, configure data ports as Interface Type HA ( Network > Interfaces > Ethernet ).
  4. Set the HA mode and group ID ( Device > High Availability > General > Setup):
    1. Enter a unique Group ID (same on both).
    2. Set Mode to Active Passive .
  5. Set up the control link (HA1) connection ( Device > High Availability > HA Communications > Control Link (HA1)):
    1. Select the appropriate Port .
    2. Set the local IPv4/IPv6 Address and Netmask .
    3. Add Gateway only if HA1 peers are on different subnets.
  6. (Optional) Enable encryption for the HA1 link:
    1. Export/Import HA keys between peers ( Device > Certificate Management > Certificates ).
    2. Select Encryption Enabled in HA1 settings.
  7. Set up the backup control link (HA1 Backup) connection ( Device > High Availability > HA Communications > Control Link (HA1 Backup)):
    1. Select the backup Port .
    2. Set the local backup IPv4/IPv6 Address and Netmask . (Note: PA-3200 does not support IPv6 for HA1 backup).
  8. Set up the data link (HA2) connection ( Device > High Availability > HA Communications > Data Link (HA2)):
    1. Select the HA2 Port .
    2. Select Transport (Ethernet, IP, or UDP - UDP required for Azure).
    3. If IP/UDP, enter IPv4/IPv6 Address and Netmask .
    4. Verify Enable Session Synchronization is selected.
    5. (Optional) Select HA2 Keep-alive .
    6. Configure Data Link (HA2 Backup) similarly if needed.
  9. Enable heartbeat backup if needed based on HA1/HA1 Backup port types ( Device > High Availability > General > Election Settings > Heartbeat Backup ).
  10. Set device priority and enable preemption if desired ( Device > High Availability > General > Election Settings):
    1. Set Device Priority (lower value = higher priority/active).
    2. Select Preemptive (must be enabled on both peers).
  11. (Optional) Modify HA Timers ( Device > High Availability > General > Election Settings > Timer Profile: Recommended, Aggressive, or Advanced).
  12. (Optional) Modify passive link state ( Device > High Availability > General > Active Passive Settings > Passive Link State : Shutdown (default) or Auto). Setting to Auto can speed up failover but ensure adjacent devices don't forward traffic based only on link status.
  13. Enable HA ( Device > High Availability > General > Setup):
    1. Select Enable HA .
    2. Select Enable Config Sync .
    3. Enter Peer HA1 IP Address .
    4. (Optional) Enter Backup HA1 IP Address .
  14. (Optional) Enable LACP/LLDP Pre-Negotiation ( Network > Interfaces > Select AE/Ethernet Interface > LACP or Advanced/LLDP tab > Enable in HA Passive State ). Requires Passive Link State set to Auto.
  15. Save configuration changes ( Commit ).
  16. After configuring both firewalls, verify pairing on the Dashboard (HA Widget) and sync config using Sync to peer on the active firewall.

Define HA Failover Conditions

Configure link monitoring or path monitoring to trigger failover based on network conditions.

  1. Configure Link Monitoring ( Device > High Availability > Link and Path Monitoring ):
    1. Add Link Group(s), select interfaces, and set group Failure Condition (Any/All).
    2. (Optional) Modify overall Link Monitoring Failure Condition (Any/All).
  2. Configure Path Monitoring ( Device > High Availability > Link and Path Monitoring ):
    1. Add Path Group (Virtual Wire, VLAN, or Virtual Router).
    2. Configure Source IP (if VW/VLAN), Enable, Failure Condition (Any/All), Ping Interval/Count.
    3. Add Destination IP Group(s) with Destination IPs and Failure Condition (Any/All).
    4. (Optional) Modify overall Path Monitoring Failure Condition (Any/All).
  3. Commit changes.

Path monitoring in VLANs is supported only on active/passive pairs. Ensure reachability and source IP configuration before enabling path monitoring.

Verify Failover

Test the configuration by triggering a manual failover.

  1. Suspend the active firewall ( Device > High Availability > Operational Commands > Suspend local device ).
  2. Verify the passive firewall becomes active (Dashboard > HA Widget).
  3. Restore the suspended firewall ( Make local device functional ).
  4. If preemption is enabled, verify the original active firewall preempts and becomes active again.

Configuration: Active/Active HA

Prerequisites for Active/Active HA

To set up active/active HA on your firewalls, you need a pair of firewalls that meet the following requirements:

If adding a new firewall for HA, reset it to factory defaults first, then sync the configuration from the primary peer after setting up HA.

Configure Active/Active HA Steps (Basic Workflow)

The following describes the basic workflow. Select a specific use case below for tailored examples.

  1. Connect the HA ports physically (HA1, HA2, HA3, and backups).
  2. Enable ping on the management port ( Device > Setup > Interfaces > Management ).
  3. If not using dedicated HA ports, configure data ports as Interface Type HA ( Network > Interfaces > Ethernet ).
  4. Enable Active/Active HA and set Group ID ( Device > High Availability > General > Setup):
    1. Select Enable HA .
    2. Enter the same Group ID on both peers (1-63).
    3. Set Mode to Active Active .
  5. Set Device ID (0 or 1), enable Config Sync, and identify peer HA1 details ( Device > High Availability > General > Setup):
    1. Select Device ID (0 for one peer, 1 for the other).
    2. Select Enable Config Sync .
    3. Enter Peer HA1 IP Address .
    4. (Optional) Enter Backup Peer HA1 IP Address .
  6. Determine preemption behavior ( Device > High Availability > General > Election Settings > Preemptive ). Enable on both if desired.
  7. Enable heartbeat backup if needed based on HA1/HA1 Backup port types ( Device > High Availability > General > Election Settings > Heartbeat Backup ).
  8. (Optional) Modify HA Timers ( Device > High Availability > General > Election Settings > Timer Profile).
  9. Set up the control link (HA1) connection ( Device > High Availability > HA Communications > Control Link (HA1)).
  10. (Optional) Enable encryption for the HA1 link.
  11. Set up the backup control link (HA1 Backup) connection ( Device > High Availability > HA Communications > Control Link (HA1 Backup)).
  12. Set up the data link (HA2) connection and backup ( Device > High Availability > HA Communications > Data Link (HA2)).
  13. Configure the HA3 link for packet forwarding ( Device > High Availability > HA Communications > Packet Forwarding):
    1. Select the HA3 Interface .
    2. (Optional) Select VR Sync for static routing environments.
    3. (Optional) Select QoS Sync .
  14. (Optional) Modify Tentative Hold time ( Device > High Availability > HA Communications > Packet Forwarding).
  15. Configure Session Owner and Session Setup ( Device > High Availability > HA Communications > Packet Forwarding). Recommended: Session Owner = First Packet , Session Setup = IP Modulo or First Packet .
  16. Configure HA Virtual Addresses if using Floating IPs or ARP Load-Sharing ( Device > High Availability > Active/Active Config ).
  17. (If using Floating IPs) Configure Floating IP settings (priority, failover condition).
  18. (If using ARP Load-Sharing) Configure ARP Load-Sharing Algorithm (IP Modulo or IP Hash).
  19. (If needed) Enable Jumbo Frames for HA3 ( Device > Setup > Session > Session Settings).
  20. Define HA Failover Conditions (Link/Path Monitoring).
  21. Commit the configuration.
  22. Configure the peer firewall similarly, ensuring the Device ID is different.
  23. Configure NAT rules with appropriate HA Binding if using NAT.

Active/Active Use Cases

Select the use case that matches your deployment for specific configuration steps:

Use Case: Configure Active/Active HA with Route-Based Redundancy

This Layer 3 topology uses dynamic routing (e.g., OSPF) for redundancy. When a link or firewall fails, the routing protocol handles rerouting.

Diagram showing Active/Active HA using dynamic routing protocols (OSPF) for redundancy.
Active/Active HA with Route-Based Redundancy
  1. Follow steps 1-15 in the basic Active/Active configuration workflow above.
  2. Configure OSPF (or other dynamic routing protocol). See OSPF documentation .
  3. Define HA Failover Conditions (Link/Path Monitoring).
  4. Commit the configuration.
  5. Configure the peer firewall similarly, ensuring a different Device ID.

Use Case: Configure Active/Active HA with Floating IP Addresses

This Layer 3 example connects firewalls to switches and uses floating IP addresses. End hosts use a floating IP as their gateway.

Diagram illustrating Floating IP addresses in an Active/Active HA setup.
Active/Active HA with Floating IP Addresses
  1. Follow steps 1-15 in the basic Active/Active configuration workflow.
  2. Configure HA Virtual Address(es):
    1. Go to Device > High Availability > Active/Active Config , Add Virtual Address.
    2. Select Interface, IP version, Add IP Address.
    3. Set Type to Floating .
  3. Configure Floating IP settings:
    1. Do NOT select Floating IP bound to the Active-Primary device (for standard floating IP behavior).
    2. Set Device 0 Priority and Device 1 Priority to determine ownership (lower value = owner).
    3. (Optional) Select Failover address if link state is down .
    4. Click OK.
  4. (If needed) Enable Jumbo Frames ( Device > Setup > Session ).
  5. Define HA Failover Conditions (Link/Path Monitoring).
  6. Commit the configuration.
  7. Configure the peer firewall similarly, ensuring a different Device ID.

Use Case: Configure Active/Active HA with ARP Load-Sharing

This Layer 3 example assumes firewalls are the direct gateway for hosts and uses a shared IP address for ARP Load-Sharing.

Diagram illustrating ARP Load-Sharing in an Active/Active HA setup where firewalls are the default gateway.
Active/Active HA with ARP Load-Sharing (LAN side)
  1. Follow steps 1-15 in the basic Active/Active configuration workflow.
  2. Configure HA Virtual Address:
    1. Go to Device > High Availability > Active/Active Config , Add Virtual Address.
    2. Select the LAN-facing Interface, IP version, Add the shared IP Address.
    3. Set Type to ARP Load Sharing .
  3. Configure ARP Load-Sharing settings:
    1. Select Device Selection Algorithm (IP Modulo or IP Hash).
    2. Click OK.
  4. (If needed) Enable Jumbo Frames ( Device > Setup > Session ).
  5. Define HA Failover Conditions (Link/Path Monitoring).
  6. Commit the configuration.
  7. Configure the peer firewall similarly, ensuring a different Device ID.

Use Case: Configure Active/Active HA with Floating IP Address Bound to Active-Primary Firewall

This use case makes an A/A pair function like A/P regarding traffic flow by binding the floating IP strictly to the active-primary device. It allows A/A path monitoring benefits while controlling traffic flow.

Diagram showing floating IP bound to active-primary firewall.
Active/Active HA with Floating IP Bound to Active-Primary
  1. Follow steps 1-5 of the basic Active/Active configuration workflow.
  2. (Optional but Recommended) Disable Preemption ( Device > High Availability > General > Election Settings > clear Preemptive ).
  3. Follow steps 7-14 of the basic Active/Active configuration workflow.
  4. Configure Session Owner and Setup:
    1. Go to Device > High Availability > Active/Active Config > Packet Forwarding.
    2. Set Session Owner Selection to Primary Device .
    3. Set Session Setup to Primary Device .
    4. Click OK.
  5. Configure HA Virtual Address:
    1. Go to Device > High Availability > Active/Active Config , Add Virtual Address.
    2. Select Interface, IP version, Add the floating IP Address.
    3. Set Type to Floating .
  6. Configure Floating IP settings:
    1. Select Floating IP bound to the Active-Primary device .
    2. (Optional) Select Failover address if link state is down .
    3. Click OK.
  7. (If needed) Enable Jumbo Frames ( Device > Setup > Session ).
  8. Define HA Failover Conditions (Link/Path Monitoring are strongly recommended here).
  9. Commit the configuration.
  10. Configure the peer firewall similarly, ensuring a different Device ID.

You cannot configure NAT for a floating IP address that is bound to an active-primary firewall.

Use Case: Configure Active/Active HA with Source DIPP NAT Using Floating IP Addresses

This Layer 3 example uses source DIPP NAT with floating IPs.

Diagram showing Active/Active HA with source DIPP NAT using Floating IPs.
Active/Active HA with Source DIPP NAT using Floating IPs
  1. On Peer B (Device ID 1), follow steps 1-3 of basic A/A config.
  2. Enable A/A HA, set Group ID, Mode=Active Active, Device ID=1, Peer HA1 IP, Enable Config Sync.
  3. Follow steps 6-15 of basic A/A config.
  4. Configure Virtual Address (Floating IP) 10.1.1.101 on eth1/1. Set Type=Floating. Do not bind to Active-Primary. Set Device 0/1 Priorities appropriately (e.g., Dev1=0, Dev0=255 if Dev1 should own this IP).
  5. (If needed) Enable Jumbo Frames.
  6. Define Failover Conditions.
  7. Commit on Peer B.
  8. Configure Peer A (Device ID 0) similarly, but with Device ID=0 and Virtual Address 10.1.1.100 on eth1/1, owned by Device 0 (e.g., Dev0=0, Dev1=255).
  9. On Peer A (or Peer B, it will sync), create NAT rules:
    1. Rule 1 (Src-NAT-dev0): Original Packet (Src Zone=Any, Dst Zone=Untrust), Translated Packet (Type=DIPP, Address Type=Interface Address, Interface=eth1/1, IP=10.1.1.100), Active/Active HA Binding=0.
    2. Rule 2 (Src-NAT-dev1): Original Packet (Src Zone=Any, Dst Zone=Untrust), Translated Packet (Type=DIPP, Address Type=Interface Address, Interface=eth1/1, IP=10.1.1.101), Active/Active HA Binding=1.
  10. Commit the configuration.

Use Case: Configure Separate Source NAT IP Address Pools for Active/Active HA Firewalls

This example uses separate IP address pools for source NAT, binding each pool to a specific device ID.

  1. On one HA firewall, create Address Objects for each pool (e.g., Dyn-IP-Pool-dev0 for 10.1.1.140-150, Dyn-IP-Pool-dev1 for 10.1.1.160-170).
  2. Create NAT rule for Device ID 0:
    1. Policies > NAT > Add. Name: Src-NAT-dev0.
    2. Original Packet: Src Zone=Any, Dst Zone=Untrust.
    3. Translated Packet: Type=DIPP, Address Type=Translated Address, Add Address Object: Dyn-IP-Pool-dev0.
    4. Active/Active HA Binding tab: Bind to 0.
    5. OK.
  3. Create NAT rule for Device ID 1:
    1. Policies > NAT > Add. Name: Src-NAT-dev1.
    2. Original Packet: Src Zone=Any, Dst Zone=Untrust.
    3. Translated Packet: Type=DIPP, Address Type=Translated Address, Add Address Object: Dyn-IP-Pool-dev1.
    4. Active/Active HA Binding tab: Bind to 1.
    5. OK.
  4. Commit the configuration (this will sync to the peer).

Use Case: Configure Active/Active HA for ARP Load-Sharing with Destination NAT

This Layer 3 example uses ARP Load-Sharing on the LAN and Destination NAT for an internal server. The active-primary firewall handles ARPs for the shared destination NAT address.

Diagram showing A/A HA with ARP Load Sharing (LAN) and Destination NAT.
Active/Active HA with ARP Load-Sharing (LAN) and Destination NAT
  1. Follow steps 1-3 of basic A/A config on Peer B (Device ID 1).
  2. Enable A/A HA, set Group ID, Mode=Active Active, Device ID=1, Peer HA1 IP, Enable Config Sync.
  3. Follow steps 6-15 of basic A/A config.
  4. Configure HA Virtual Address for ARP Load-Sharing (e.g., 10.1.1.200 on eth1/2, Type=ARP Load Sharing, Algorithm=IP Modulo).
  5. (If needed) Enable Jumbo Frames.
  6. Define HA Failover Conditions.
  7. Commit on Peer B.
  8. Configure Peer A (Device ID 0) similarly, with Device ID=0.
  9. On Peer A (or Peer B, it will sync), create the Destination NAT rule:
    1. Policies > NAT > Add. Name: Dst-NAT-ARP-L2.
    2. Original Packet: Src Zone=Any, Dst Zone=Untrust, Dst Address=10.1.1.200.
    3. Translated Packet: Dst Translation > Translated Address=192.168.1.200 (internal server IP).
    4. Active/Active HA Binding tab: Bind to primary .
    5. OK.
  10. Commit the configuration.

Use Case: Configure Active/Active HA for ARP Load-Sharing with Destination NAT in Layer 3

Similar to the previous case, but requires binding the Destination NAT rule to both Device IDs because traffic can arrive at either firewall from upstream routers.

Diagram showing A/A HA with ARP Load Sharing (LAN) and Destination NAT (L3 upstream).
Active/Active HA with ARP Load-Sharing (LAN) and Destination NAT (L3)
  1. Follow steps 1-3 of basic A/A config on Peer B (Device ID 1).
  2. Enable A/A HA, set Group ID, Mode=Active Active, Device ID=1, Peer HA1 IP, Enable Config Sync.
  3. Follow steps 6-15 of basic A/A config.
  4. Configure HA Virtual Address for ARP Load-Sharing (e.g., 192.168.1.1 on eth1/1, Type=ARP Load Sharing, Algorithm=IP Modulo).
  5. (If needed) Enable Jumbo Frames.
  6. Define HA Failover Conditions.
  7. Commit on Peer B.
  8. Configure Peer A (Device ID 0) similarly, with Device ID=0.
  9. On Peer A (or Peer B, it will sync), create the Destination NAT rule:
    1. Policies > NAT > Add. Name: Dst-NAT-ARP-L3.
    2. Original Packet: Src Zone=Any, Dst Zone=Untrust, Dst Address=10.1.1.200 (public IP).
    3. Translated Packet: Dst Translation > Translated Address=192.168.1.200 (internal server IP).
    4. Active/Active HA Binding tab: Bind to both .
    5. OK.
  10. Commit the configuration.

High Availability Quiz

Test your understanding of Palo Alto Networks High Availability. Select the best answer for each question.

1. What is the primary purpose of the HA1 (Control Link) in an HA pair?

Correct Answer: C. The HA1 link handles control plane communication, including heartbeats, state information, routing updates, User-ID info, and configuration synchronization. Session state sync uses the HA2 link. Relevance: PCNSE/PCNSA, Core Concept

2. Which HA mode requires an HA3 link for packet forwarding between peers?

Correct Answer: B. The HA3 link is specifically required in Active/Active mode to forward packets between peers for session setup and handling asymmetric traffic flows. Relevance: PCNSE/PCNSA

3. Which of the following is a mandatory prerequisite for configuring an HA pair?

Correct Answer: B. HA pairs require identical models, PAN-OS versions, interface types for HA links, and identical licenses. Hostnames and management IPs must be unique. Specific licenses like Threat Prevention are needed on both if used, but aren't prerequisites for HA itself. Relevance: Critical, Prerequisite

4. In Active/Passive HA, what does enabling Preemption achieve?

Correct Answer: C. Preemption, when enabled on both peers, allows the firewall designated with higher priority (lower numerical value) to automatically take back the active role once it recovers from the failure that caused the failover. Relevance: PCNSE/PCNSA, HA Concept

5. Which HA link is used to synchronize session tables between active/active peers?

Correct Answer: B. The HA2 link's primary function is to synchronize sessions, forwarding tables, IPSec SAs, and ARP tables between the HA peers. HA4 is used for session cache sync between cluster members. Relevance: PCNSE/PCNSA, HA Links

6. In an Active/Active setup, what does "Session Owner: First Packet" mean?

Correct Answer: B. When Session Owner is set to "First Packet", the firewall that initially receives the SYN packet (or first packet) for a new flow becomes the owner, responsible for L7 inspection and logging for that specific session. Relevance: PCNSE/PCNSA, A/A Concepts

7. What is required for an HA3 link configured on a dataplane port?

Correct Answer: C. The HA3 link uses MAC-in-MAC encapsulation and adds a proprietary header, often causing packet sizes to exceed the standard 1500-byte MTU. Therefore, jumbo frame support must be enabled on the HA3 interface and any intervening Layer 2 switches. Relevance: Important, HA Links

8. Which Active/Active redundancy method relies on dynamic routing protocols like OSPF or BGP?

Correct Answer: C. Route-Based Redundancy is used when firewalls connect to routers. Failover and load sharing depend on the dynamic routing protocol's ability to detect path changes and reroute traffic. Relevance: PCNSE/PCNSA, A/A Concepts

9. How must NAT rules be bound in an Active/Active HA configuration?

Correct Answer: B. Dynamic IP and DIPP NAT rules require specific binding to Device ID 0 or 1. Static NAT rules offer more flexibility, allowing binding to 0, 1, both, or the current active-primary device. Relevance: PCNSE/PCNSA, NAT HA, Gotcha

10. When using ARP Load-Sharing, which device responds to ARP requests for the shared IP?

Correct Answer: C. ARP Load-Sharing uses either the IP Modulo or IP Hash algorithm based on the source IP of the ARP request to decide which HA peer (Device 0 or 1) will respond with its unique virtual MAC for the shared IP address. Relevance: A/A Concepts

11. LACP/LLDP Pre-Negotiation is primarily beneficial for which HA scenario?

Correct Answer: C. By allowing the passive firewall to pre-negotiate LACP/LLDP with neighbors, the link comes up much faster upon failover, reducing downtime. It's primarily for Active/Passive HA. Relevance: HA Concepts

12. What is the recommended setting for "Passive Link State" in Active/Passive HA to potentially speed up failover?

Correct Answer: B. Setting Passive Link State to "Auto" allows interfaces on the passive firewall to reflect their physical link status (up if cabled), enabling faster failover and LACP/LLDP pre-negotiation. The default is "Shutdown". Relevance: Configuration Setting, Important

13. Which HA timer profile provides the fastest failover times?

Correct Answer: C. The "Aggressive" profile uses lower timer values than the "Recommended" profile specifically to achieve faster detection of failures and quicker failover, though it might be more sensitive to transient network issues. Relevance: HA Timers

14. If Heartbeat Backup is enabled, what transport mechanism is used for the backup heartbeats?

Correct Answer: C. Heartbeat Backup utilizes the Management (MGT) port (using UDP port 28771) as a redundant path for heartbeats and hello messages, helping to prevent split-brain scenarios if the primary HA1 link fails. Relevance: HA Links, Gotcha

15. In Active/Active HA, if the Session Owner is set to 'First Packet' and Session Setup is 'Primary Device', what happens when the Active-Secondary firewall receives the first packet?

Correct Answer: B. The firewall receiving the first packet (Active-Secondary in this case) becomes the Session Owner. Because Session Setup is 'Primary Device', it must forward the packet over HA3 to the Active-Primary peer to handle the setup tasks. The packet might then be returned over HA3 for L7 inspection by the owner. Relevance: A/A Concepts, Session Owner/Setup

16. What is the main benefit of using Floating IP addresses in Active/Active HA?

Correct Answer: B. Floating IPs provide a stable IP address for services like gateways, VPNs, or NAT pools that moves to the functional firewall during a failover, ensuring service continuity without needing clients or upstream devices to change their destination IP. Relevance: PCNSE/PCNSA, A/A Concepts

17. Which scenario requires binding a destination NAT rule to 'both' Device IDs in Active/Active HA?

Correct Answer: B. If traffic for the public destination NAT IP can arrive at either HA peer (common in L3 setups with upstream routing), the NAT rule must be bound to 'both' devices so that whichever firewall receives the packet can perform the translation. Binding to 'primary' is used when you want only the active-primary to handle the traffic/ARP. Relevance: NAT HA, A/A Concepts, Gotcha

18. What happens to existing sessions that fail over from a failed peer in Active/Active HA?

Correct Answer: C. State synchronization allows existing sessions to continue after failover, but the surviving peer does not perform Layer 7 inspection (App-ID, Content-ID, Threat) on sessions it did not originally own. New sessions established on the surviving peer get full inspection. Relevance: PCNSE/PCNSA, A/A Concepts, Gotcha

19. Can the management port be used for the HA2 (Data Link)?

Correct Answer: C. The HA2 data link requires a dataplane interface (either dedicated HA2, HSCI, or an in-band port set to type HA). The management port is strictly for management plane traffic and can optionally serve as HA1 or HA1 backup. Relevance: HA Links

20. What is the primary benefit of HA Clustering over a simple HA pair?

Correct Answer: B. HA Clustering allows scaling beyond a simple pair, providing redundancy with multiple active firewalls (up to 16 members) sharing session state via HA4 links, managed typically by load balancers. Relevance: HA Concepts, HA Clustering
Please answer all questions before submitting.