<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Site to Site VPN between AWS transit GW  and PA FW in AWS in VM-Series in the Public Cloud</title>
    <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/site-to-site-vpn-between-aws-transit-gw-and-pa-fw-in-aws/m-p/342163#M918</link>
    <description>&lt;P&gt;Hello&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for your response but sadly that was not the correct solution and i am still working on the case ....&lt;/P&gt;</description>
    <pubDate>Wed, 05 Aug 2020 08:44:11 GMT</pubDate>
    <dc:creator>tinaye-hgi</dc:creator>
    <dc:date>2020-08-05T08:44:11Z</dc:date>
    <item>
      <title>Site to Site VPN between AWS transit GW  and PA FW in AWS</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/site-to-site-vpn-between-aws-transit-gw-and-pa-fw-in-aws/m-p/341001#M909</link>
      <description>&lt;P&gt;Hello&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;First time posting and looking for help on solution ............i have a PA fw in AWS and i am attempting to setup a VPN to AWS transit GW.&lt;/P&gt;&lt;P&gt;FW set up with ÖUTSIDE int using DHCP and and EIP attached ...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;AWS TGW (VPN) -------------------------------------------------AWS(single FW with DHCP)&lt;/P&gt;&lt;P&gt;52.x.x.x&amp;nbsp; -------------------------------------------------EIP-3.x.x.x attached to 10.0.2.10 (-----outside int (FW) inside int&amp;nbsp;&lt;/P&gt;&lt;P&gt;18.x.x.x&lt;/P&gt;&lt;P&gt;AWS does not initiate session, so firewall must initiate. It works fine if i config a static IP address on Firewall outside interface but if&amp;nbsp;&lt;/P&gt;&lt;P&gt;i leave it as DHCP it seems to work on and off ......I have been advised that i must leave the PA interface address as DHCP based on&amp;nbsp;&lt;/P&gt;&lt;P&gt;design guidelines. So i have messed around with IPSEC settings in the hope of getting tunnels to come up by setting the Local and&amp;nbsp; Remote peer addresses but not luck .......&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any ideas or advice please ..............................and is it true that i should not set fixed IP on interfaces of FW&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance for advice and help ..&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 28 Jul 2020 07:29:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/site-to-site-vpn-between-aws-transit-gw-and-pa-fw-in-aws/m-p/341001#M909</guid>
      <dc:creator>tinaye-hgi</dc:creator>
      <dc:date>2020-07-28T07:29:54Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site VPN between AWS transit GW  and PA FW in AWS</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/site-to-site-vpn-between-aws-transit-gw-and-pa-fw-in-aws/m-p/341092#M912</link>
      <description>&lt;P&gt;he tunnel build process is documented here.&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.paloaltonetworks.com/resources/reference-architectures/aws" target="_blank"&gt;https://www.paloaltonetworks.com/resources/reference-architectures/aws&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In general, if it works intermittently, check your timers in your IKE and IPSec profiles.&amp;nbsp; Also, ensure that only the VPN ethernet interface has the "Automatically create default route pointing to DG provided by server".&amp;nbsp; If you have multiple interfaces, you may end up with 2 default routes in the VR that are competing with each other.&amp;nbsp; If you have EIPs on multiple interfaces, then you give each its own virtual router with a 0.0.0.0/0 route pointing outbound.&lt;/P&gt;&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClQRCA0" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClQRCA0&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 28 Jul 2020 17:39:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/site-to-site-vpn-between-aws-transit-gw-and-pa-fw-in-aws/m-p/341092#M912</guid>
      <dc:creator>jmeurer</dc:creator>
      <dc:date>2020-07-28T17:39:59Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site VPN between AWS transit GW  and PA FW in AWS</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/site-to-site-vpn-between-aws-transit-gw-and-pa-fw-in-aws/m-p/342163#M918</link>
      <description>&lt;P&gt;Hello&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for your response but sadly that was not the correct solution and i am still working on the case ....&lt;/P&gt;</description>
      <pubDate>Wed, 05 Aug 2020 08:44:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/site-to-site-vpn-between-aws-transit-gw-and-pa-fw-in-aws/m-p/342163#M918</guid>
      <dc:creator>tinaye-hgi</dc:creator>
      <dc:date>2020-08-05T08:44:11Z</dc:date>
    </item>
  </channel>
</rss>

