<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: site to site IPsec tunnel between PA and AWS in VM-Series in the Public Cloud</title>
    <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/site-to-site-ipsec-tunnel-between-pa-and-aws/m-p/224431#M377</link>
    <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/91304"&gt;@R_Sharma&lt;/a&gt;&amp;nbsp;You just can not use the Public IP as proxy-id, you need to use private. This is how AWS works.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 01 Aug 2018 14:33:46 GMT</pubDate>
    <dc:creator>BatD</dc:creator>
    <dc:date>2018-08-01T14:33:46Z</dc:date>
    <item>
      <title>site to site IPsec tunnel between PA and AWS</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/site-to-site-ipsec-tunnel-between-pa-and-aws/m-p/224401#M374</link>
      <description>&lt;P&gt;HI members&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Has anyone had an experienced setting up a site to site tunnel between AWS and PA?&lt;/P&gt;&lt;P&gt;I have set up the IPSEC tunnel on my PA (we did use the parameters as&amp;nbsp;per aws downloaded file).&amp;nbsp;The issue is if&amp;nbsp;I use the&amp;nbsp;server's public IP (actual source)&amp;nbsp;on&amp;nbsp;AWS end&amp;nbsp;as &amp;nbsp;in proxy ID instead of private IP, the other end can't access my server. In our environment , the use of private ip is restricted. The private IP works fine.Appears that aws side the private is routable and not public ip.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;how can we resolve it. I understand its the issue on AWS end configuration or set up.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any guidance please AWS experts.&lt;/P&gt;</description>
      <pubDate>Wed, 01 Aug 2018 12:43:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/site-to-site-ipsec-tunnel-between-pa-and-aws/m-p/224401#M374</guid>
      <dc:creator>R_Sharma</dc:creator>
      <dc:date>2018-08-01T12:43:56Z</dc:date>
    </item>
    <item>
      <title>Re: site to site IPsec tunnel between PA and AWS</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/site-to-site-ipsec-tunnel-between-pa-and-aws/m-p/224421#M375</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/91304"&gt;@R_Sharma&lt;/a&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You are correct, that routing can be changed for private, but not public IPs.&lt;/P&gt;&lt;P&gt;It is how AWS works. Public IP is, as the name suggests “Public”. It is not "your server’s" IP, but is rather an AWS owned IP address, which is NAT-ted by AWS to the private IP of your server. You &amp;nbsp;cannot control the routing of traffic for public IPs and traffic will always be sent out to internet. &amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 01 Aug 2018 14:13:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/site-to-site-ipsec-tunnel-between-pa-and-aws/m-p/224421#M375</guid>
      <dc:creator>BatD</dc:creator>
      <dc:date>2018-08-01T14:13:34Z</dc:date>
    </item>
    <item>
      <title>Re: site to site IPsec tunnel between PA and AWS</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/site-to-site-ipsec-tunnel-between-pa-and-aws/m-p/224428#M376</link>
      <description>Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/74884"&gt;@BatD&lt;/a&gt;&lt;BR /&gt;&lt;BR /&gt;I didn’t understand. I am using VPN peer obviously a public up but in the acl as in proxy ID I want to use public up too not private . How is it setup on Aws end do you know?&lt;BR /&gt;</description>
      <pubDate>Wed, 01 Aug 2018 14:21:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/site-to-site-ipsec-tunnel-between-pa-and-aws/m-p/224428#M376</guid>
      <dc:creator>R_Sharma</dc:creator>
      <dc:date>2018-08-01T14:21:57Z</dc:date>
    </item>
    <item>
      <title>Re: site to site IPsec tunnel between PA and AWS</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/site-to-site-ipsec-tunnel-between-pa-and-aws/m-p/224431#M377</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/91304"&gt;@R_Sharma&lt;/a&gt;&amp;nbsp;You just can not use the Public IP as proxy-id, you need to use private. This is how AWS works.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 01 Aug 2018 14:33:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/site-to-site-ipsec-tunnel-between-pa-and-aws/m-p/224431#M377</guid>
      <dc:creator>BatD</dc:creator>
      <dc:date>2018-08-01T14:33:46Z</dc:date>
    </item>
    <item>
      <title>Re: site to site IPsec tunnel between PA and AWS</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/site-to-site-ipsec-tunnel-between-pa-and-aws/m-p/224433#M378</link>
      <description>Okay! Thank you. Can I know how it’s set up on aws side which restricts the use of it, if you know.&lt;BR /&gt;Regards</description>
      <pubDate>Wed, 01 Aug 2018 14:38:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/site-to-site-ipsec-tunnel-between-pa-and-aws/m-p/224433#M378</guid>
      <dc:creator>R_Sharma</dc:creator>
      <dc:date>2018-08-01T14:38:52Z</dc:date>
    </item>
    <item>
      <title>Re: site to site IPsec tunnel between PA and AWS</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/site-to-site-ipsec-tunnel-between-pa-and-aws/m-p/226304#M382</link>
      <description>&lt;P&gt;R_sharma.- I think&amp;nbsp; AWS&amp;nbsp; VPNs are designed to use a proxy at their end. The remote interesting traffic (AWS side) is NAT or PATed or&amp;nbsp; proxy device IP. AWS gives the proxy IP as the parameter&amp;nbsp; for interesting traffic their side. So in Proxy ID filed we never use public IP, we use proxy IP (private) only. On local PA side we will NAT the AWS proxy IP.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Needless to say&amp;nbsp; local/remote peer IPs will always be a public IP.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 07 Aug 2018 15:41:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/site-to-site-ipsec-tunnel-between-pa-and-aws/m-p/226304#M382</guid>
      <dc:creator>Prakhar</dc:creator>
      <dc:date>2018-08-07T15:41:12Z</dc:date>
    </item>
  </channel>
</rss>

