<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic AWS - Palo ALto IPSEC or AWS native IPSEC? in VM-Series in the Public Cloud</title>
    <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-palo-alto-ipsec-or-aws-native-ipsec/m-p/236759#M438</link>
    <description>&lt;P&gt;AWS - Palo ALto IPSEC or AWS native IPSEC?&lt;/P&gt;&lt;P&gt;Which is better any why?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
    <pubDate>Tue, 23 Oct 2018 20:43:06 GMT</pubDate>
    <dc:creator>junior_r</dc:creator>
    <dc:date>2018-10-23T20:43:06Z</dc:date>
    <item>
      <title>AWS - Palo ALto IPSEC or AWS native IPSEC?</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-palo-alto-ipsec-or-aws-native-ipsec/m-p/236759#M438</link>
      <description>&lt;P&gt;AWS - Palo ALto IPSEC or AWS native IPSEC?&lt;/P&gt;&lt;P&gt;Which is better any why?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Tue, 23 Oct 2018 20:43:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-palo-alto-ipsec-or-aws-native-ipsec/m-p/236759#M438</guid>
      <dc:creator>junior_r</dc:creator>
      <dc:date>2018-10-23T20:43:06Z</dc:date>
    </item>
    <item>
      <title>Re: AWS - Palo ALto IPSEC or AWS native IPSEC?</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-palo-alto-ipsec-or-aws-native-ipsec/m-p/236900#M440</link>
      <description>&lt;P&gt;The all depends on what type of design and throughput you are looking for?&lt;/P&gt;
&lt;P&gt;For example if you use AWS Native IPsec then you will need to setup a VGW which has a limit of 1.25 Gbps throughput&lt;/P&gt;
&lt;P&gt;if you setup VM-Series to Device your limit is only the bandwidth and the performance capabilities of the devices you are using for VPN. That will probably be the main thing to consider but I am sure there is more.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 24 Oct 2018 18:51:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-palo-alto-ipsec-or-aws-native-ipsec/m-p/236900#M440</guid>
      <dc:creator>jperry1</dc:creator>
      <dc:date>2018-10-24T18:51:31Z</dc:date>
    </item>
    <item>
      <title>Re: AWS - Palo ALto IPSEC or AWS native IPSEC?</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-palo-alto-ipsec-or-aws-native-ipsec/m-p/236904#M441</link>
      <description>&lt;P&gt;The AWS VGW limit is 1.25Gbps not Mbps&lt;/P&gt;</description>
      <pubDate>Wed, 24 Oct 2018 18:51:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-palo-alto-ipsec-or-aws-native-ipsec/m-p/236904#M441</guid>
      <dc:creator>jperry1</dc:creator>
      <dc:date>2018-10-24T18:51:53Z</dc:date>
    </item>
    <item>
      <title>Re: AWS - Palo ALto IPSEC or AWS native IPSEC?</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-palo-alto-ipsec-or-aws-native-ipsec/m-p/236932#M442</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/2533"&gt;@jperry1&lt;/a&gt;&lt;SPAN class=""&gt;&amp;nbsp;&lt;/SPAN&gt;wouldn't&amp;nbsp;&lt;SPAN&gt;VM-Series to Device&amp;nbsp;be slower...even if I take the VM with higest resources?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thanks&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 24 Oct 2018 23:38:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-palo-alto-ipsec-or-aws-native-ipsec/m-p/236932#M442</guid>
      <dc:creator>junior_r</dc:creator>
      <dc:date>2018-10-24T23:38:43Z</dc:date>
    </item>
    <item>
      <title>Re: AWS - Palo ALto IPSEC or AWS native IPSEC?</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-palo-alto-ipsec-or-aws-native-ipsec/m-p/236937#M443</link>
      <description>&lt;P&gt;It depends on the size VM-Series you use but certain VM-series devices will give you over 2GB throughput on IPSec. At that point you are at the mercy of your Internet speed.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 25 Oct 2018 00:51:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-palo-alto-ipsec-or-aws-native-ipsec/m-p/236937#M443</guid>
      <dc:creator>jperry1</dc:creator>
      <dc:date>2018-10-25T00:51:58Z</dc:date>
    </item>
    <item>
      <title>Re: AWS - Palo ALto IPSEC or AWS native IPSEC?</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-palo-alto-ipsec-or-aws-native-ipsec/m-p/238062#M444</link>
      <description>&lt;P&gt;It would be best to do the VPN to AWS and let the VM firewall deal with inspection. After all, why bog down the VM firewall with the extra overhead of doing encryption/decryption? AWS VPN is also pretty easy to set up, even with BGP for dynamic routing for failover.&lt;/P&gt;</description>
      <pubDate>Wed, 31 Oct 2018 19:29:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-palo-alto-ipsec-or-aws-native-ipsec/m-p/238062#M444</guid>
      <dc:creator>mrzepa2</dc:creator>
      <dc:date>2018-10-31T19:29:45Z</dc:date>
    </item>
    <item>
      <title>Re: AWS - Palo ALto IPSEC or AWS native IPSEC?</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-palo-alto-ipsec-or-aws-native-ipsec/m-p/238069#M445</link>
      <description>&lt;P&gt;Without knowing more about your use case, the decision around where to decrypt will come down to routing.&amp;nbsp; In general, if you terminate on the VGW, there are very limited options to have the traffic route through the Firewalls due to routing limitations within the VPC.&amp;nbsp; AWS typical recommends "Transit VPC" designs where remote traffic and/or spoke VPC traffic can route through multiple Firewalls in a fault tolerant fashion.&amp;nbsp; You can find both manual and automated Transit VPC Options here.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://github.com/PaloAltoNetworks/aws-transit-vpc" target="_blank"&gt;https://github.com/PaloAltoNetworks/aws-transit-vpc&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 31 Oct 2018 20:16:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-palo-alto-ipsec-or-aws-native-ipsec/m-p/238069#M445</guid>
      <dc:creator>jmeurer</dc:creator>
      <dc:date>2018-10-31T20:16:24Z</dc:date>
    </item>
  </channel>
</rss>

