<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: AWS IPSec Tunnel success? in VM-Series in the Public Cloud</title>
    <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-ipsec-tunnel-success/m-p/240308#M465</link>
    <description>&lt;P&gt;I agree with your hesitation.&amp;nbsp; In general, routing asymmetry is bad for security visilbility.&amp;nbsp; I would not turn off reject no sync on your internet facing interfaces.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 19 Nov 2018 13:18:02 GMT</pubDate>
    <dc:creator>jmeurer</dc:creator>
    <dc:date>2018-11-19T13:18:02Z</dc:date>
    <item>
      <title>AWS IPSec Tunnel success?</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-ipsec-tunnel-success/m-p/236700#M435</link>
      <description>&lt;P&gt;Hello folks,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am so close to a successful AWS IPSec tunnel to my on premise (test) PA200 7.1.15.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've downloaded the configuration file and using it as a guide, IPs, etc.&lt;/P&gt;&lt;P&gt;But I've been using this article to configure.&amp;nbsp; Main difference is I created a specific AWS zone like I do for all my IPSec Tunnels.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.richardyau.com/?p=240" target="_blank"&gt;http://www.richardyau.com/?p=240&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am able to access my on premise environment from the AWS EC2 instance, but not from on premise to AWS EC2 172.31.24.69.&lt;/P&gt;&lt;P&gt;I can't ping it or connect to the EC2 via RDP.&amp;nbsp; I see the ping tries in traffic log, but nothing shows up in packet trace for the RDP attempts.&amp;nbsp; &amp;lt;UPDATE&amp;gt;&amp;nbsp; Resolved after correcting IPs for PBF and RDP connection from LAN.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;AWS has two VPN connections for redundancy.&amp;nbsp; I have both configured and active.&lt;/P&gt;&lt;P&gt;NOTE:&amp;nbsp; My Azure IPSec tunnel works great!&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="paaws1.jpg" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/17265iE44D026ED2690D26/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="paaws1.jpg" alt="paaws1.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Configured tunnel interfaces according to AWS text document.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="paaws2.jpg" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/17266i61C46DEAB88E6B9A/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="paaws2.jpg" alt="paaws2.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Configured tunnel monitor profile.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="paaws3.jpg" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/17267i92DE65F242A8650C/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="paaws3.jpg" alt="paaws3.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Configured PBF like referenced in documentation. &amp;lt;Corrected&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="awscorrection1.jpg" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/17287i615F877CB37A7F0A/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="awscorrection1.jpg" alt="awscorrection1.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Configured Static routes for both VPN connections (different metric).&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="paaws5.jpg" style="width: 798px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/17269iF31948058872E81D/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="paaws5.jpg" alt="paaws5.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Created security rules in and out for AWS zone, open.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="paaws6.jpg" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/17270iF55BE33E77921AD9/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="paaws6.jpg" alt="paaws6.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;No additional NAT rules.&amp;nbsp; Just basic outbound internet rule to Untrust.&amp;nbsp; &amp;lt;corrected&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="awscorrection2.jpg" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/17288i0CBB7D725D9E0211/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="awscorrection2.jpg" alt="awscorrection2.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;A ping from a VM inside my LAN ages out.&amp;nbsp; Nothing shows up when I try to RDP, including a packet trace, not even a drop file.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="paaws8.jpg" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/17272i61F9CAEAFFDA4057/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="paaws8.jpg" alt="paaws8.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 24 Oct 2018 21:46:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-ipsec-tunnel-success/m-p/236700#M435</guid>
      <dc:creator>OMatlock</dc:creator>
      <dc:date>2018-10-24T21:46:00Z</dc:date>
    </item>
    <item>
      <title>Re: AWS IPSec Tunnel success?</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-ipsec-tunnel-success/m-p/236893#M439</link>
      <description>&lt;P&gt;I've resolved this, able to communicate to AWS EC2 back and forth.&amp;nbsp; I've corrected my screenshots above.&lt;/P&gt;&lt;P&gt;My configuration errors:&lt;/P&gt;&lt;P&gt;- PBF destination IPs were incorrect.&lt;/P&gt;&lt;P&gt;- NAT rule not needed.&lt;/P&gt;&lt;P&gt;- Was using incorrect IP when attempting to RDP from LAN resource.&amp;nbsp; That's why was not showing up in my log.&lt;/P&gt;&lt;P&gt;- Ping was not working because was not enabled on AWS security group.&lt;/P&gt;</description>
      <pubDate>Wed, 24 Oct 2018 21:45:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-ipsec-tunnel-success/m-p/236893#M439</guid>
      <dc:creator>OMatlock</dc:creator>
      <dc:date>2018-10-24T21:45:12Z</dc:date>
    </item>
    <item>
      <title>Re: AWS IPSec Tunnel success?</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-ipsec-tunnel-success/m-p/239749#M454</link>
      <description>&lt;P&gt;Does the inbound from AWS to On-Prem(resource) work ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Are you using multiple-vr's ?&lt;/P&gt;</description>
      <pubDate>Wed, 14 Nov 2018 00:24:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-ipsec-tunnel-success/m-p/239749#M454</guid>
      <dc:creator>Junaid-Khan</dc:creator>
      <dc:date>2018-11-14T00:24:01Z</dc:date>
    </item>
    <item>
      <title>Re: AWS IPSec Tunnel success?</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-ipsec-tunnel-success/m-p/240247#M461</link>
      <description>&lt;P&gt;Sorry for my delayed response.&amp;nbsp; Yes, I did get AWS to On-Premise working.&amp;nbsp; I did not create a separate or second Virtual Router.&amp;nbsp; Just used my default.&amp;nbsp; Please let me know if I can help or provide more notes.&amp;nbsp; I still have this running...&lt;/P&gt;</description>
      <pubDate>Sun, 18 Nov 2018 07:02:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-ipsec-tunnel-success/m-p/240247#M461</guid>
      <dc:creator>OMatlock</dc:creator>
      <dc:date>2018-11-18T07:02:54Z</dc:date>
    </item>
    <item>
      <title>Re: AWS IPSec Tunnel success?</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-ipsec-tunnel-success/m-p/240292#M462</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;A href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/56398" target="_self"&gt;&lt;SPAN class=""&gt;OMatlock&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have a similar issue from or end, for some reason we can't enable both tunnels at the same time- as it creates asymmetric routing. For e.g if traffic is sent from one tunnel, the PAN will reject any traffic from the other tunnel.&lt;/P&gt;&lt;P&gt;I see you have configured both tunnel interfaces to be part of the same zone. But we have used different zone, not sure if this is an issue too?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- we had to enable ECMP- later knew its not supported by AWS&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Kind Regards&lt;/P&gt;&lt;P&gt;Anu&lt;/P&gt;</description>
      <pubDate>Mon, 19 Nov 2018 10:57:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-ipsec-tunnel-success/m-p/240292#M462</guid>
      <dc:creator>Huddlebuy</dc:creator>
      <dc:date>2018-11-19T10:57:03Z</dc:date>
    </item>
    <item>
      <title>Re: AWS IPSec Tunnel success?</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-ipsec-tunnel-success/m-p/240305#M463</link>
      <description>&lt;P&gt;If you are refering to both tunnels going to the same VPG on the same firewall, yes, leave them in the same zone.&amp;nbsp; While they do not support ECMP, they also do not guarantee the same tunnel will be active always.&amp;nbsp; Putting the tunnels in the same zone will overcome IP Spoofing issue that creates.&lt;/P&gt;</description>
      <pubDate>Mon, 19 Nov 2018 13:01:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-ipsec-tunnel-success/m-p/240305#M463</guid>
      <dc:creator>jmeurer</dc:creator>
      <dc:date>2018-11-19T13:01:18Z</dc:date>
    </item>
    <item>
      <title>Re: AWS IPSec Tunnel success?</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-ipsec-tunnel-success/m-p/240307#M464</link>
      <description>&lt;P&gt;Thanks for the suggestion&lt;/P&gt;&lt;P&gt;we will try that option as well. Also AWS suggested the below&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Entering configuration mode [edit] # set deviceconfig setting tcp asymmetric-path bypass&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;# set deviceconfig setting session tcp-reject-non-syn no&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;# commit&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;We are quite hesitant to enable this gloabally, as this would also apply for non aws traffic. So enabled this via the zone protection profile - strickly for that zone.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 19 Nov 2018 13:13:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-ipsec-tunnel-success/m-p/240307#M464</guid>
      <dc:creator>Huddlebuy</dc:creator>
      <dc:date>2018-11-19T13:13:31Z</dc:date>
    </item>
    <item>
      <title>Re: AWS IPSec Tunnel success?</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-ipsec-tunnel-success/m-p/240308#M465</link>
      <description>&lt;P&gt;I agree with your hesitation.&amp;nbsp; In general, routing asymmetry is bad for security visilbility.&amp;nbsp; I would not turn off reject no sync on your internet facing interfaces.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 19 Nov 2018 13:18:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-ipsec-tunnel-success/m-p/240308#M465</guid>
      <dc:creator>jmeurer</dc:creator>
      <dc:date>2018-11-19T13:18:02Z</dc:date>
    </item>
    <item>
      <title>Re: AWS IPSec Tunnel success?</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-ipsec-tunnel-success/m-p/240312#M466</link>
      <description>&lt;P&gt;thanks Jmeurer. I will try re-try this by moving to the same zone. Do you know or come across any step by step guide to the setting up process between the tunnels between on-prem palo and aws VPC's.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Kind regards&lt;/P&gt;&lt;P&gt;Anu&lt;/P&gt;</description>
      <pubDate>Mon, 19 Nov 2018 13:39:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-ipsec-tunnel-success/m-p/240312#M466</guid>
      <dc:creator>Huddlebuy</dc:creator>
      <dc:date>2018-11-19T13:39:17Z</dc:date>
    </item>
    <item>
      <title>Re: AWS IPSec Tunnel success?</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-ipsec-tunnel-success/m-p/240319#M467</link>
      <description>&lt;P&gt;I typically recommend to start with this guide.&lt;/P&gt;&lt;P&gt;&lt;A href="https://github.com/PaloAltoNetworks/aws-transit-vpc/blob/master/documentation/Transit_VPC_Manual_Build_Guide.pdf" target="_blank"&gt;https://github.com/PaloAltoNetworks/aws-transit-vpc/blob/master/documentation/Transit_VPC_Manual_Build_Guide.pdf&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Once you have your Transit Firewalls built, you can terminate the on-prem Firewalls on the Transit Firwalls with VPNs as if they are another spoke.&amp;nbsp; From there you can control policy locally or with Panorama, creating rules based on zones or subnets.&lt;/P&gt;</description>
      <pubDate>Mon, 19 Nov 2018 13:57:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-ipsec-tunnel-success/m-p/240319#M467</guid>
      <dc:creator>jmeurer</dc:creator>
      <dc:date>2018-11-19T13:57:55Z</dc:date>
    </item>
  </channel>
</rss>

