HA Clustering Overview
A number of Palo Alto Networks ® firewall models now support session state synchronization among firewalls in a high availability (HA) cluster of up to 16 firewalls. The HA cluster peers synchronize sessions to protect against failure of the data center or a large security inspection point with horizontally scaled firewalls. In the case of a network outage or a firewall going down, the sessions fail over to a different firewall in the cluster. Such synchronization is especially helpful in the following use cases.
One use case is when HA peers are spread across multiple data centers so that there is no single point of failure within or between data centers. A second multi-data center use case is when one data center is active and the other is standby.

HA Clustering: Multi-Data Center Redundancy
A third HA clustering use case is horizontal scaling, in which you add HA cluster members to a single data center to scale security and ensure session survivability.

HA Clustering: Horizontal Scaling in a Single Data Center
HA clusters support a Layer 3 or virtual wire deployment. HA peers in the cluster can be a combination of HA pairs and standalone cluster members. In an HA cluster, all members are considered active; there is no concept of passive firewalls except for HA pairs, which can keep their active/passive relationship after you add them to an HA cluster.
All cluster members share session state. When a new firewall joins an HA cluster, that triggers all firewalls in the cluster to synchronize all existing sessions. HA4 and HA4 backup connections are the dedicated cluster links that synchronize session state among all cluster members having the same cluster ID. The HA4 link between cluster members detects connectivity failures between cluster members. HA1 (control link), HA2 (data link), and HA3 (packet-forwarding link) are not supported between cluster members that aren’t HA pairs.
For a normal session that has not failed over, only the firewall that is the session owner creates a traffic log. For a session that failed over, the new session owner (the firewall that receives the failed over traffic) creates the traffic log.
The firewall models that support HA clustering and the maximum number of members supported per cluster are as follows:
Firewall Model | Number of Members Supported Per Cluster |
---|---|
PA-3200 Series | 6 |
PA-5200 Series | 16 |
PA-5450 | 8 |
PA-7000 Series firewalls that have at least one of the following cards: PA-7000-100G-NPC, PA-7000-20GQXM-NPC, PA-7000-20GXM-NPC |
PA-7080: 4
PA-7050: 6 |
VM-300 | 6 |
VM-500 | 6 |
VM-700 | 16 |
HA clustering is not supported in public cloud deployments. Consider the HA Clustering Best Practices and Provisioning before you start to Configure HA Clustering.
HA Clustering Best Practices and Provisioning
These are the provisioning requirements and best practices for HA clustering.
Provisioning Requirements and Best Practices
- HA cluster members must be the same firewall model and run the same PAN-OS ® version.
- When upgrading, firewall members will continue to synchronize sessions with one member at a different version.
- It is highly recommended and a best practice to use Panorama to provision HA cluster members to keep all configuration and policies synchronized among all cluster members.
- HA cluster members must be licensed for the same components to ensure consistent policy enforcement and content inspection capabilities.
- The licenses must expire at the same time to prevent mismatched licenses and loss of functionality.
- All cluster members should be running with the same version of dynamic Content Updates for consistent security enforcement.
- HA cluster members must share the same zone names in order for sessions to successfully fail over to another cluster member. For example, suppose sessions going to an ingress zone named internal are dropped because the link is down. For those sessions to fail over to an HA firewall peer in the cluster, that peer must also have a zone named internal .
- Client-to-server and server-to-client flows must go back to the same firewall under normal (non-failure) conditions in order for security content scanning to occur. Asymmetric traffic won’t be dropped, but it cannot be scanned for security purposes.
Session Synchronization Best Practices
- Dedicated HA communication interfaces should be used over dataplane interfaces. HSCI interfaces aren’t used for HA4. This allows separation of HA pair and cluster session synchronization to ensure maximum bandwidth and reliability for session syncing.
- HA4 should be adequately sized if you use dataplane interfaces. This ensures best effort session state synchronizing between cluster members.
- Best practice is to have a dedicated cluster network for the HA4 communications link to ensure adequate bandwidth and non-congested, low-latency connections between cluster members.
- Architect your networks and perform traffic engineering to avoid possible race conditions, in which a network steers traffic from the session owner to a cluster member before the session is successfully synced between the firewalls. Layer 2 HA4 connections must have sufficient bandwidth and low latency to allow timely synchronization between HA members. The HA4 latency must be lower than the latency incurred when the peering devices switch traffic between cluster members.
- Architect your networks to minimize asymmetric flows. Session setup requires one cluster member to see the complete TCP three-way handshake.
Health Check Best Practices
- On HA pairs in a cluster, configure an Active/Passive pair with HA backup communication links for HA1, HA2, and HA4. Configure an Active/Active pair with HA backup communications links for HA1, HA2, HA3, and HA4.
- Configure HA4 backup links on all cluster members.
Configure HA Clustering
Learn about HA clustering and follow the HA Clustering Best Practices and Provisioning before you configure HA firewalls as members of a cluster.
-
Establish an interface as an HA interface (to later assign as the HA4 link).
- Select Network > Interfaces > Ethernet and select an interface; for example, ethernet1/1.
- Select the Interface Type to be HA .
- Click OK .
- Repeat this step to configure another interface to use as the HA4 backup link.
-
Enable HA clustering.
- Select Device > High Availability > General and edit the Clustering Settings.
- Enable Cluster Participation .
- Enter the Cluster ID , a unique numeric ID for an HA cluster in which all members can share session state; range is 1 to 99.
- Enter a short, helpful Cluster Description .
- (Optional) Change Cluster Synchronization Timeout (min) , which is the maximum number of minutes that the local firewall waits before going to Active state when another cluster member (for example, in unknown state) is preventing the cluster from fully synchronizing; range is 0 to 30; default is 0.
- (Optional) Change Monitor Fail Hold Down Time (min) , which is the number of minutes after which a down link is retested to see if it is back up; range is 1 to 60; default is 1.
- Click OK .
-
Configure the HA4 link.
- Select Device > High Availability > HA Communications and in the Clustering Links section, edit the HA4 section.
- Select the interface you configured in the first step as an HA interface to be the Port for the HA4 link; for example, ethernet1/1.
- Enter the IPv4/IPv6 Address of the local HA4 interface.
- Enter the Netmask .
- (Optional) Change the HA4 Keep-alive Threshold (ms) to specify the timeframe within which the firewall must receive keepalives from a cluster member to know that the cluster member is functional; range is 5,000 to 60,000; default is 10,000.
- Click OK .
-
Configure the HA4 Backup link.
- Edit the HA4 Backup section.
- Select the other interface you configured in the first step as an HA interface to be the Port for the HA4 backup link.
- Enter the IPv4/IPv6 Address of the local HA4 backup interface.
- Enter the Netmask .
- Click OK .
-
Specify all members of the HA cluster, including the local member and both HA peers in any HA pair.
- Select Device > High Availability > Cluster Config .
- ( On a supported firewall ) Add a peer member’s Device Serial Number .
- ( On Panorama ) Add and select a Device from the dropdown and enter a Device Name .
- Enter the HA4 IP Address of the HA peer in the cluster.
- Enter the HA4 Backup IP Address of the HA peer in the cluster.
- Enable Session Synchronization with the peer you identified.
- (Optional) Enter a helpful Description .
- Click OK .
- Select the device and Enable it.
- Define HA failover conditions with link and path monitoring. (Refer to standard HA configuration guides)
- Commit .
-
(
Panorama only
) Refresh the list of HA firewalls in the HA cluster.
- Under Templates, select Device > High Availability > Cluster Config .
- Click Refresh at the bottom of the screen.
-
View HA cluster information in the UI.
- Select Dashboard .
- View the HA cluster fields. The top section displays cluster state and HA4 connections to provide cluster health at a glance. The HA4 and HA4 Backup indicators will be one of the following: Green indicates the link status of the cluster members is Up. Red indicates the link status of all the cluster members is Down. Yellow indicates the link status of some cluster members is Up while the status of other cluster members is Down. Grey indicates not configured. The center section displays the capacity of the local session table and session cache table so you can monitor how full the tables are and plan for firewall upgrades. The lower section displays communication errors on the HA4 and HA4 backup links, signifying possible problems with synchronizing information between members.

HA Cluster Widget on the Dashboard
-
Access the CLI to view HA cluster and HA4 link information and perform other HA clustering tasks.
Example CLI commands:
- show high-availability cluster members
- show high-availability cluster statistics
- show high-availability cluster session brief
- show counter global filter aspect ha_cluster
You can view HA cluster flap statistics. The cluster flap count is reset when the HA device moves from suspended to functional and vice versa. The cluster flap count also resets when the non-functional hold time expires.
HA Firewall States
An HA firewall can be in one of the following states:
HA Firewall State | Occurs In | Description |
---|---|---|
Initial | A/P or A/A | Transient state of a firewall when it joins the HA pair. The firewall remains in this state after boot-up until it discovers a peer and negotiations begins. After a timeout, the firewall becomes active if HA negotiation has not started. |
Active | A/P | State of the active firewall in an active/passive configuration. |
Passive | A/P |
State of the passive firewall in an active/passive configuration. The passive firewall is ready to become the active firewall with no disruption to the network. Although the passive firewall is not processing other traffic:
|
Active-Primary | A/A | In an active/active configuration, state of the firewall that connects to User-ID agents, runs DHCP server and DHCP relay, and matches NAT and PBF rules with the Device ID of the active-primary firewall. A firewall in this state can own sessions and set up sessions. |
Active-Secondary | A/A | In an active/active configuration, state of the firewall that connects to User-ID agents, runs DHCP server, and matches NAT and PBF rules with the Device ID of the active-secondary firewall. A firewall in active-secondary state does not support DHCP relay. A firewall in this state can own sessions and set up sessions. |
Tentative | A/A |
State of a firewall (in an active/active configuration) caused by one of the following:
A firewall in tentative state synchronizes sessions and configurations from the peer.
After the failed path or link clears or as a failed firewall transitions from tentative state to active-secondary state, the Tentative Hold Time is triggered and routing convergence occurs. The firewall attempts to build routing adjacencies and populate its route table before processing any packets. Without this timer, the recovering firewall would enter active-secondary state immediately and would silently discard packets because it would not have the necessary routes. When a firewall leaves suspended state, it goes into tentative state for the Tentative Hold Time after links are up and able to process incoming packets. Tentative Hold Time range (sec) can be disabled (which is 0 seconds) or in the range 10-600; default is 60. |
Non-functional | A/P or A/A |
Error state due to a dataplane failure or a configuration mismatch
, such as only one firewall configured for packet forwarding, VR sync or QoS sync.
In active/passive mode, all of the causes listed for Tentative state cause non-functional state. |
Suspended | A/P or A/A | The device is disabled so won’t pass data traffic and although HA communications still occur, the device doesn’t participate in the HA election process. It can’t move to an HA functional state without user intervention. |
Diagrams
HA Cluster Configuration Flow HA State Transitions (Simplified)

State diagram showing common transitions between HA firewall states (simplified).
Interactive Quiz
Test your knowledge of Palo Alto HA Clustering. Please answer all questions before submitting.