Path Monitoring in Palo Alto Networks Firewalls

Overview

Path Monitoring is a feature on Palo Alto Networks firewalls designed to verify the reachability and health of network paths. It achieves this by sending regular ICMP pings to one or more specified destination IP addresses. Based on the success or failure of these probes according to configured thresholds, the firewall can take automated actions to maintain network connectivity.

The primary applications are enhancing the reliability of Static Routes and triggering High Availability (HA) failover based on external path conditions rather than just device or link status.

Usage with Static Routes

Network > Virtual Routers > [VR Name] > Static Routes > [Route Name] > Path Monitoring

When Path Monitoring is enabled for a static route, the firewall monitors the reachability of configured destinations relevant to that route's path (often the next-hop gateway itself, or reliable IPs beyond it).

If the monitored destination(s) become unreachable based on the failure criteria:

Path Monitoring with Multiple Destinations

You can configure a Path Monitoring profile (associated with a static route or HA) to monitor up to eight destination IP addresses simultaneously. This enhances reliability compared to monitoring a single IP.

Configuration Steps:

(As described previously, configured under Static Route or HA Monitoring settings)

  1. Enable Path Monitoring.
  2. Add Monitored Destinations (Name, Destination IP, Source IP, Ping Interval, Ping Count).
  3. Define the Failure Condition :
    • Any : The path is considered down if at least one monitored destination becomes unreachable. This is more sensitive to failure but could trigger on isolated issues.
    • All : The path is considered down only if all monitored destinations become unreachable simultaneously. This provides more redundancy against single target failures but requires complete path failure to trigger.
  4. Configure optional Preemptive Hold Time.

Best Practices:

Path Monitoring Timers and Failure Detection

Path Monitoring Timers

Path Recovery

Once a path marked as down starts successfully responding to pings again (typically after one successful ping), the firewall considers it potentially recovered. However, if a `Preemptive Hold Time` is configured, the firewall waits for this duration with the path consistently up before reinstating the original route or reversing the HA failover trigger condition. This ensures the path is stable before switching back.

Application in High Availability (HA) Failover

Device > High Availability > Link and Path Monitoring > Path Monitoring

Path Monitoring Groups can be configured specifically for HA purposes. If the path(s) monitored by a group fail on the Active firewall, it can trigger an HA failover event, causing the Passive firewall to take over the Active role.

Link Monitoring vs. Path Monitoring for HA:

Both can be used together to provide comprehensive HA failover conditions.

HA Considerations and Caveats

Relation to VPN Tunnel Monitoring

Network > IPSec Tunnels > [Tunnel Name] > Tunnel Monitor

While similar in concept (using probes to check reachability), Tunnel Monitoring is configured specifically within the IPSec tunnel settings. Its primary goals are:

Tunnel Monitoring is focused on the VPN path itself, whereas Path Monitoring (for Static Routes or HA) typically monitors broader network path health, often outside of specific tunnels.

Additional Resources

Path Monitoring Quiz

1. What is the primary mechanism used by Palo Alto Path Monitoring to check reachability?

2. When Path Monitoring detects a failure for a monitored static route, what action does the firewall typically take?

3. You configure Path Monitoring for a static route with three monitored destinations. You set the Failure Condition to "All". When will the static route be considered down?

4. What is the purpose of the "Preemptive Hold Time" setting in Path Monitoring?

5. In an Active/Passive HA configuration, which firewall actively sends Path Monitoring probes?

6. How does Path Monitoring failure trigger an HA failover?

7. With default Path Monitoring settings (Interval 3s, Count 5), how long does it take for the firewall to declare a path down after the first ping fails?

8. Where do you configure Path Monitoring specifically to influence static route failover?

9. In an Active/Active HA setup, how should Path Monitoring typically be configured?

10. How does VPN Tunnel Monitoring differ from the general HA Path Monitoring feature?