<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Azure Palo VM IPSec Tunnel to another Azure Palo VM in VM-Series in the Public Cloud</title>
    <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/azure-palo-vm-ipsec-tunnel-to-another-azure-palo-vm/m-p/588192#M2183</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/1261564789"&gt;@iamroott&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Could you share the system logs for the tunnel?&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 29 May 2024 02:52:01 GMT</pubDate>
    <dc:creator>JayGolf</dc:creator>
    <dc:date>2024-05-29T02:52:01Z</dc:date>
    <item>
      <title>Azure Palo VM IPSec Tunnel to another Azure Palo VM</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/azure-palo-vm-ipsec-tunnel-to-another-azure-palo-vm/m-p/582852#M2139</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;I am running into an issue. I have 1 Azure subscription with multiple regions (US , Europe etc). I have a Palo Alto Virtual Appliance in front of each region. Which filters all traffic going to and from the regions. I have successfully built tunnels with no issues to my on premise Palo Altos, but can't seem to figure out why I can't build the tunnels from one VM in the US region to another VM in the Europe region.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Anytime I try to initiate the tunnels, the SA fails due to timeout.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Now I tried to use UDRs to make sure that it wasn't taking any Azure backend routing. Tried ikev2/ikev1, auto/manual/aggressive modes, security policies, anything I could think of trying.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Has anyone successfully built IPSEC Tunnels from one PA VM to another PA VM within the same tenant?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Sat, 06 Apr 2024 18:09:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/azure-palo-vm-ipsec-tunnel-to-another-azure-palo-vm/m-p/582852#M2139</guid>
      <dc:creator>iamroott</dc:creator>
      <dc:date>2024-04-06T18:09:45Z</dc:date>
    </item>
    <item>
      <title>Re: Azure Palo VM IPSec Tunnel to another Azure Palo VM</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/azure-palo-vm-ipsec-tunnel-to-another-azure-palo-vm/m-p/587919#M2182</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/1261564789"&gt;@iamroott&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;
&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;I am running into an issue. I have 1 Azure subscription with multiple regions (US , Europe etc). I have a Palo Alto Virtual Appliance in front of each region. Which filters all traffic going to and from the regions. I have successfully built tunnels with no issues to my on premise Palo Altos, but can't seem to figure out why I can't build the tunnels from one VM in the US region to another VM in the Europe region.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Anytime I try to initiate the tunnels, the SA fails due to timeout.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Now I tried to use UDRs to make sure that it wasn't taking any Azure backend routing. Tried ikev2/ikev1, auto/manual/aggressive modes, security policies, anything I could think of trying.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Has anyone successfully built IPSEC Tunnels from one PA VM to another PA VM within the same tenant?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks.&lt;/P&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Certainly! Building IPsec tunnels between Palo Alto Networks VM-Series firewalls within the same Azure tenant is a common requirement for creating secure communication channels. Let’s address this issue step by step:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;IKEv2 for Dynamic Routing:&lt;BR /&gt;Microsoft Azure requires IKEv2 for dynamic routing (also known as route-based VPN). IKEv1 is restricted to static routing only. Ensure that you’re using IKEv2 for your VPN configuration.&lt;BR /&gt;Verify that your Palo Alto Networks firewall is running PAN-OS 7.1.4 or a newer version, as these fully support the necessary route-based VPN and crypto profiles for connecting to Azure’s dynamic VPN architecture.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Configuration Steps:&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Azure Configuration:&lt;/P&gt;
&lt;P&gt;Deploy an Azure Virtual Network Gateway (if not already created).&lt;BR /&gt;Define IP address ranges for each local network site that you’ll be connecting to Azure. These ranges are essential for dynamic routing.&lt;BR /&gt;Refer to Microsoft’s documentation for detailed instructions on setting up the VPN gateway in the Azure environment.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Palo Alto Networks Firewall Configuration:&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Tunnel Interface:&lt;BR /&gt;Inside the Palo Alto Networks WebGUI, navigate to Network &amp;gt; Interfaces &amp;gt; Tunnel.&lt;BR /&gt;Add a new tunnel interface.&lt;BR /&gt;Select a virtual router and an appropriate security zone.&lt;BR /&gt;Optionally, assign an IP address on the same subnet as the Azure Gateway for dynamic routing and/or tunnel monitoring within the IPv4 tab.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;IKE Gateway:&lt;BR /&gt;Add an IKE Gateway in Network &amp;gt; Network Profiles &amp;gt; IKE Gateway.&lt;BR /&gt;Configure the IKEv2 parameters based on Microsoft Azure’s supported crypto parameters.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;IPSec Crypto Profile:&lt;BR /&gt;Create an IPSec Crypto Profile with the necessary parameters (encryption, authentication, and DH group) that align with Azure’s requirements.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Security Policies:&lt;BR /&gt;Define security policies to allow traffic between the VMs in different regions.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Monitor and Troubleshoot:&lt;BR /&gt;Monitor the tunnel status and logs to identify any issues.&lt;BR /&gt;Check if there are any specific error messages related to the SA timeout.&lt;BR /&gt;Consider packet captures or debug logs to diagnose further.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Common Pitfalls:&lt;BR /&gt;Ensure that the public IP addresses used in your configuration are correct.&lt;BR /&gt;Verify that the security policies allow traffic between the VMs.&lt;BR /&gt;Double-check the IKE and IPSec parameters (encryption, authentication, DH group) to match Azure’s requirements.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;I hope the information may helps you.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 25 May 2024 05:18:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/azure-palo-vm-ipsec-tunnel-to-another-azure-palo-vm/m-p/587919#M2182</guid>
      <dc:creator>Dennisleon</dc:creator>
      <dc:date>2024-05-25T05:18:17Z</dc:date>
    </item>
    <item>
      <title>Re: Azure Palo VM IPSec Tunnel to another Azure Palo VM</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/azure-palo-vm-ipsec-tunnel-to-another-azure-palo-vm/m-p/588192#M2183</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/1261564789"&gt;@iamroott&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Could you share the system logs for the tunnel?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 29 May 2024 02:52:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/azure-palo-vm-ipsec-tunnel-to-another-azure-palo-vm/m-p/588192#M2183</guid>
      <dc:creator>JayGolf</dc:creator>
      <dc:date>2024-05-29T02:52:01Z</dc:date>
    </item>
  </channel>
</rss>

