<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: GlobalProtect IPSec configuration in GlobalProtect Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-ipsec-configuration/m-p/402082#M1235</link>
    <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Start on the client, check the \Program Files\Palo Alto Networks\GlobalProtect\PANgps.log - you should see if the client is (or not) trying to connect via IPsec, or falling back to SSL.&lt;/P&gt;&lt;P&gt;You can also check if the client does not have anything blocking outgoing IPSEC from his location/s.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;On the firewall - kind reminder that this traffic usually is source=internet zone; destination=internet zone and that the default rule here is Intrazone default (2nd from last rule). Also these rules by default do NOT have log at session end enabled so this could be why you do not see logs. You have not written the loopback assigned zone name - this will impact which rule is being hit.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You can also try a packet capture on the firewall - filter by a single test client source IP and see what ports exactly are being received.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you are using a loopback because you want GP to listen on a different IP than the Interface default, for example the Interface is 203.0.113.20/24 and you want GP to listen on 203.0.113.55 - just &lt;STRONG&gt;add&lt;/STRONG&gt; this IP in the IPv4 tab of the ethernet1/x (which will now show 203.0.113.20/24 and 203.0.113.55). This way you will be able to select this IP and Ethernet in the GP configuration pages and not use a loopback at all.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope this help,&lt;/P&gt;&lt;P&gt;Shai&lt;/P&gt;</description>
    <pubDate>Tue, 27 Apr 2021 06:01:05 GMT</pubDate>
    <dc:creator>ShaiW</dc:creator>
    <dc:date>2021-04-27T06:01:05Z</dc:date>
    <item>
      <title>GlobalProtect IPSec configuration</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-ipsec-configuration/m-p/401972#M1233</link>
      <description>&lt;P&gt;We have been using GlobalProtect for awhile but I just became aware that none of our clients are connected using IPSec even though the option is checked.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I can't see anything being blocked so I am wondering if it is a configuration issue of some kind.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Note: we are using loopback interfaces and both the gateway and portal use the same loopback&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 26 Apr 2021 17:35:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-ipsec-configuration/m-p/401972#M1233</guid>
      <dc:creator>HeathRamos</dc:creator>
      <dc:date>2021-04-26T17:35:54Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect IPSec configuration</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-ipsec-configuration/m-p/402082#M1235</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Start on the client, check the \Program Files\Palo Alto Networks\GlobalProtect\PANgps.log - you should see if the client is (or not) trying to connect via IPsec, or falling back to SSL.&lt;/P&gt;&lt;P&gt;You can also check if the client does not have anything blocking outgoing IPSEC from his location/s.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;On the firewall - kind reminder that this traffic usually is source=internet zone; destination=internet zone and that the default rule here is Intrazone default (2nd from last rule). Also these rules by default do NOT have log at session end enabled so this could be why you do not see logs. You have not written the loopback assigned zone name - this will impact which rule is being hit.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You can also try a packet capture on the firewall - filter by a single test client source IP and see what ports exactly are being received.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you are using a loopback because you want GP to listen on a different IP than the Interface default, for example the Interface is 203.0.113.20/24 and you want GP to listen on 203.0.113.55 - just &lt;STRONG&gt;add&lt;/STRONG&gt; this IP in the IPv4 tab of the ethernet1/x (which will now show 203.0.113.20/24 and 203.0.113.55). This way you will be able to select this IP and Ethernet in the GP configuration pages and not use a loopback at all.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope this help,&lt;/P&gt;&lt;P&gt;Shai&lt;/P&gt;</description>
      <pubDate>Tue, 27 Apr 2021 06:01:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-ipsec-configuration/m-p/402082#M1235</guid>
      <dc:creator>ShaiW</dc:creator>
      <dc:date>2021-04-27T06:01:05Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect IPSec configuration</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-ipsec-configuration/m-p/402271#M1237</link>
      <description>&lt;P&gt;Thanks for the feedback&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I looked at the logs on one of the clients and it can see it trying to connect using ipsec but failing.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Logs:&lt;/P&gt;&lt;P&gt;-&amp;nbsp;Trying to do ipsec connection to IP_Address [4501]&lt;/P&gt;&lt;P&gt;-&amp;nbsp;Network is reachable&lt;/P&gt;&lt;P&gt;-&amp;nbsp;Connected to: IP_Address [4501], Sending keep alive to ipsec socket&lt;/P&gt;&lt;P&gt;-&amp;nbsp;failed to receive keep alive&lt;/P&gt;&lt;P&gt;-&amp;nbsp;IPSec anti-replay statistics: outside window count 0, replay count 0&lt;/P&gt;&lt;P&gt;-&amp;nbsp;Disconnect udp socket&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This happens with every client (all Windows 10 clients with standard configurations, including mine), so I am leaning toward it being a firewall issue. Pan-OS is 9.1.8 and GP Client is 5.2.5-c84.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I was thinking of trying to add a 2nd external ip address and bypassing loopback set up as well as creating a test environment separate from what's being used in production but I wasn't sure how. Sounds like if my external interface was an ip address of 1.1.1.1/29, I can add 1.1.1.2 as a 2nd ip address, create a new tunnel and VPN security zone, use the same authentication, certificate profiles and test the set up.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I will update this post if I see anything else in the logs&lt;/P&gt;</description>
      <pubDate>Tue, 27 Apr 2021 14:09:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-ipsec-configuration/m-p/402271#M1237</guid>
      <dc:creator>HeathRamos</dc:creator>
      <dc:date>2021-04-27T14:09:46Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect IPSec configuration</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-ipsec-configuration/m-p/402274#M1238</link>
      <description>&lt;P&gt;I have a Deny All rule for all source and destination zones with the log at end of session enabled so I believe the firewall should log all blocked traffic, hopefully.&lt;/P&gt;</description>
      <pubDate>Tue, 27 Apr 2021 14:21:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-ipsec-configuration/m-p/402274#M1238</guid>
      <dc:creator>HeathRamos</dc:creator>
      <dc:date>2021-04-27T14:21:22Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect IPSec configuration</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-ipsec-configuration/m-p/402275#M1239</link>
      <description>&lt;P&gt;is there supposed to be a specific policy or NAT rule that allows UDP 4501?&lt;/P&gt;</description>
      <pubDate>Tue, 27 Apr 2021 14:26:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-ipsec-configuration/m-p/402275#M1239</guid>
      <dc:creator>HeathRamos</dc:creator>
      <dc:date>2021-04-27T14:26:08Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect IPSec configuration</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-ipsec-configuration/m-p/402348#M1240</link>
      <description>&lt;P&gt;well...I added a 2nd ip to external interface, created new tunnel, security zone, gateway, portal, added new security policy and altered the local host file on my laptop and was able to connect using IPSec.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;at least I know it is a firewall issue and not a client side issue.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;now to see if I can get it to work using loopback interface.&lt;/P&gt;</description>
      <pubDate>Tue, 27 Apr 2021 18:22:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-ipsec-configuration/m-p/402348#M1240</guid>
      <dc:creator>HeathRamos</dc:creator>
      <dc:date>2021-04-27T18:22:48Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect IPSec configuration</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-ipsec-configuration/m-p/402713#M1244</link>
      <description>&lt;P&gt;Talked to PAN tech support and they weren't able to get ipsec to work with the loopback set up. still looking into it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;in the meantime, I have looked at various documents on setting up GP but none of them had info on any policies needed to allow traffic.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What traffic needs to be allowed? I don't want to anything that could lead to security issues if it is on the external interface.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Keep in mind, I created a security zone for VPN. not sure if that changes things.&lt;/P&gt;</description>
      <pubDate>Wed, 28 Apr 2021 13:46:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-ipsec-configuration/m-p/402713#M1244</guid>
      <dc:creator>HeathRamos</dc:creator>
      <dc:date>2021-04-28T13:46:15Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect IPSec configuration</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-ipsec-configuration/m-p/465723#M2464</link>
      <description>&lt;P&gt;Are you NATing your client IP?&amp;nbsp; NAT is not supported to the IPSEC GlobalProtect Gateway.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000001VK8CAM&amp;amp;lang=en_US%E2%80%A9" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000001VK8CAM&amp;amp;lang=en_US%E2%80%A9&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 14 Feb 2022 23:22:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-ipsec-configuration/m-p/465723#M2464</guid>
      <dc:creator>DaveHatch</dc:creator>
      <dc:date>2022-02-14T23:22:05Z</dc:date>
    </item>
  </channel>
</rss>

