<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Global Protect Cloud with AWS in VM-Series in the Public Cloud</title>
    <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/globalprotect-cloud-services-with-aws/m-p/186754#M170</link>
    <description>&lt;P&gt;Thanks so much for the info&amp;nbsp;&lt;SPAN&gt;hpunjabi! So now I'm able to successfully build the tunnel in AWS and also GPCS.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;AWS Tunnels both&amp;nbsp; show up&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;GPCS shows status of ok for remote network&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;The only issue I have is when I create a test machine in the AWS VPC I can't seem to send out the internet traffic through the tunnel. I'm pretty sure it's a routing issue on the AWS side.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;So far I have here's the routes I have for the VPC:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;local AWS subnet route and target is local&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;0.0.0.0/0 which is going to the internet gateway. I figured this one had to be pointed to the virtual gw, but when I change it to that it just breaks my connection to the test device in the AWS VPC.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;GPCS infrastruture subnet and the target it the vgw&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;both tunnel 169.x.x.x addressess and the target is the vgw&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;any ideas?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thanks,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Nick&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 13 Nov 2017 20:16:16 GMT</pubDate>
    <dc:creator>nbenos</dc:creator>
    <dc:date>2017-11-13T20:16:16Z</dc:date>
    <item>
      <title>GlobalProtect Cloud Services with AWS</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/globalprotect-cloud-services-with-aws/m-p/184970#M159</link>
      <description>&lt;P&gt;Looking to egress AWS vpc traffic to GlobalProtect Cloud Services if that's even possible? Anyone have experience or tried doing this?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p1"&gt;NOTE: GlobalProtect Cloud Service has changed to Prisma Access.&lt;/P&gt;</description>
      <pubDate>Thu, 11 Jul 2019 02:45:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/globalprotect-cloud-services-with-aws/m-p/184970#M159</guid>
      <dc:creator>nbenos</dc:creator>
      <dc:date>2019-07-11T02:45:37Z</dc:date>
    </item>
    <item>
      <title>Re: Global Protect Cloud with AWS</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/globalprotect-cloud-services-with-aws/m-p/185523#M161</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/21527"&gt;@nbenos&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You should be able to form VPN between AWS VPC and Global Protect Cloud.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Are you trying VPN connection with AWS VPN Gateway or do you have a VPN capable device (Palo Alto EC2 instance for example) in your VPC ?&lt;/P&gt;</description>
      <pubDate>Sun, 05 Nov 2017 13:15:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/globalprotect-cloud-services-with-aws/m-p/185523#M161</guid>
      <dc:creator>hpunjabi</dc:creator>
      <dc:date>2017-11-05T13:15:01Z</dc:date>
    </item>
    <item>
      <title>Re: Global Protect Cloud with AWS</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/globalprotect-cloud-services-with-aws/m-p/185610#M163</link>
      <description>&lt;P&gt;Hi hpunjabi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for the response. I'm trying to vpn between the AWS vpn gateway and the Global protect cloud. Just not sure of the configuration for this and if it's even possible?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Nick&lt;/P&gt;</description>
      <pubDate>Mon, 06 Nov 2017 15:17:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/globalprotect-cloud-services-with-aws/m-p/185610#M163</guid>
      <dc:creator>nbenos</dc:creator>
      <dc:date>2017-11-06T15:17:50Z</dc:date>
    </item>
    <item>
      <title>Re: Global Protect Cloud with AWS</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/globalprotect-cloud-services-with-aws/m-p/186588#M168</link>
      <description>&lt;P&gt;Hi Nick,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yes you should be able to configure VPN between GPCS Cloud and AWS VPN.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1. Create a Customer Gateway (Amazon) pointing to GPCS Cloud Public IP.&lt;/P&gt;&lt;P&gt;2. In VPN Connection (Amazon) specify static routes for Mobile VPN/Remote VPN subnet as well as Infrastructure subnet in GP cloud.&lt;/P&gt;&lt;P&gt;3. In GPCS all configuration should be same like other VPN, specify Amazon VPC as remote subnet and in tunnel monitor specify 169.X.X.X ip address specified by Amazon (this can be viewed once you click Download configuration).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also one thing to take note that the encryption and authentication would be visible under downloaded configuration from Amazon which you will have to replicate in GPCS.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 12 Nov 2017 15:38:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/globalprotect-cloud-services-with-aws/m-p/186588#M168</guid>
      <dc:creator>hpunjabi</dc:creator>
      <dc:date>2017-11-12T15:38:17Z</dc:date>
    </item>
    <item>
      <title>Re: Global Protect Cloud with AWS</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/globalprotect-cloud-services-with-aws/m-p/186754#M170</link>
      <description>&lt;P&gt;Thanks so much for the info&amp;nbsp;&lt;SPAN&gt;hpunjabi! So now I'm able to successfully build the tunnel in AWS and also GPCS.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;AWS Tunnels both&amp;nbsp; show up&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;GPCS shows status of ok for remote network&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;The only issue I have is when I create a test machine in the AWS VPC I can't seem to send out the internet traffic through the tunnel. I'm pretty sure it's a routing issue on the AWS side.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;So far I have here's the routes I have for the VPC:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;local AWS subnet route and target is local&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;0.0.0.0/0 which is going to the internet gateway. I figured this one had to be pointed to the virtual gw, but when I change it to that it just breaks my connection to the test device in the AWS VPC.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;GPCS infrastruture subnet and the target it the vgw&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;both tunnel 169.x.x.x addressess and the target is the vgw&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;any ideas?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thanks,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Nick&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 13 Nov 2017 20:16:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/globalprotect-cloud-services-with-aws/m-p/186754#M170</guid>
      <dc:creator>nbenos</dc:creator>
      <dc:date>2017-11-13T20:16:16Z</dc:date>
    </item>
    <item>
      <title>Re: Global Protect Cloud with AWS</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/globalprotect-cloud-services-with-aws/m-p/186881#M171</link>
      <description>&lt;P&gt;Hi Nick,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Have you setup Corporate VPN ? After the VPN is up now aren't you able to get access from Corporate LAN?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;One thing I can suggest is to add route for your public IP address (System or Laptop) from which you are managing test machine towards Internet Gateway and then default route towards VPN Gateway in Amazon.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This way you will have the connectivity to the test machine and you can test for Internet connection through GP cloud.&lt;/P&gt;</description>
      <pubDate>Tue, 14 Nov 2017 12:35:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/globalprotect-cloud-services-with-aws/m-p/186881#M171</guid>
      <dc:creator>hpunjabi</dc:creator>
      <dc:date>2017-11-14T12:35:48Z</dc:date>
    </item>
    <item>
      <title>Re: Global Protect Cloud with AWS</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/globalprotect-cloud-services-with-aws/m-p/187971#M172</link>
      <description>&lt;P&gt;Hi hpunjabi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks again for all the help. I did add a public route for the test IP and after troubleshooting a bit, I realized it was a route that needed to be placed on the vpn tunnel settings in AWS. I'm now able to filter traffic egressing the AWS VPC. Thanks again for all the time spent helping me out!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;-Nick&lt;/P&gt;</description>
      <pubDate>Mon, 20 Nov 2017 14:35:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/globalprotect-cloud-services-with-aws/m-p/187971#M172</guid>
      <dc:creator>nbenos</dc:creator>
      <dc:date>2017-11-20T14:35:51Z</dc:date>
    </item>
  </channel>
</rss>

