<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: IPSEC VPN for the FW MGMT in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/ipsec-vpn-for-the-fw-mgmt/m-p/1247333#M6652</link>
    <description>&lt;P&gt;you are correct, the MGT interface in the screenshot above is unaware of [and does not need to be aware of] the FW configuration for security zones.&lt;/P&gt;
&lt;P&gt;that stated,&amp;nbsp;In the example picture given, the VLAN 30 gateway on the firewall is in a security zone.&lt;/P&gt;
&lt;P&gt;your MGT interface would be configured with that FW VLAN 30 IP as the gateway IP address. this would allow the FW to route traffic back and forth between VPN and the VLAN 30&lt;/P&gt;
&lt;P&gt;think of that policy as more for the firewall itself than for the MGT interface&lt;/P&gt;
&lt;P&gt;If it helps to visualize, just consider the MGT interface as an independent host on the network, and not as part of the firewall.&lt;/P&gt;</description>
    <pubDate>Tue, 03 Feb 2026 15:01:46 GMT</pubDate>
    <dc:creator>L.LampkinIII</dc:creator>
    <dc:date>2026-02-03T15:01:46Z</dc:date>
    <item>
      <title>IPSEC VPN for the FW MGMT</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/ipsec-vpn-for-the-fw-mgmt/m-p/1247008#M6629</link>
      <description>&lt;P&gt;Hi There,&lt;/P&gt;&lt;P&gt;I would like to establish an IPSEC VPN connection between the Palo Alto firewalls and the Fortigate. This setup is necessary to allow remote access to the Palo Alto firewalls from the Citrix servers. This is for Management connectivity.&lt;/P&gt;&lt;P&gt;The inquiry is, IPSEC VPNs are generally configured to facilitate the passage of data traffic&lt;/P&gt;&lt;P&gt;1. I want to access the PA FW MGMT IP over an IPSEC VPN. Is it doable?&lt;/P&gt;&lt;P&gt;2. Shall I create a Loopback interface and assign a Interface MGMT profile and with this design, I believe I can access only the 'Active' firewall and not the 'passive' one.&lt;/P&gt;&lt;P&gt;How to overcome this caveat?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cheers,&lt;/P&gt;</description>
      <pubDate>Thu, 29 Jan 2026 12:07:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/ipsec-vpn-for-the-fw-mgmt/m-p/1247008#M6629</guid>
      <dc:creator>90435srinivasan</dc:creator>
      <dc:date>2026-01-29T12:07:56Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC VPN for the FW MGMT</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/ipsec-vpn-for-the-fw-mgmt/m-p/1247018#M6630</link>
      <description>&lt;P&gt;You are correct on both points.&lt;/P&gt;
&lt;P&gt;Yes you can set up IPSec to access mgmt interface. Assumingly you have mgmt interface connected to separate management vlan/zone so you need to set up security policy to permit traffic from VPN to Palo mgmt IPs.&lt;/P&gt;
&lt;P&gt;And yes if you use loopback or dataplane interface then you can access only active firewall.&lt;/P&gt;</description>
      <pubDate>Thu, 29 Jan 2026 15:34:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/ipsec-vpn-for-the-fw-mgmt/m-p/1247018#M6630</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2026-01-29T15:34:15Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC VPN for the FW MGMT</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/ipsec-vpn-for-the-fw-mgmt/m-p/1247019#M6631</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/15603"&gt;@Raido_Rattameister&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Many thanks for your reply.&lt;/P&gt;&lt;P&gt;If I talk about MGMT IPs, I believe you're referring about the Loopback/In-band Interface and not the MGMT port.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can we access the PA FW over the MGMT port itself via IPSEC VPN?&lt;/P&gt;</description>
      <pubDate>Thu, 29 Jan 2026 15:38:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/ipsec-vpn-for-the-fw-mgmt/m-p/1247019#M6631</guid>
      <dc:creator>90435srinivasan</dc:creator>
      <dc:date>2026-01-29T15:38:08Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC VPN for the FW MGMT</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/ipsec-vpn-for-the-fw-mgmt/m-p/1247029#M6632</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/940878157"&gt;@90435srinivasan&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Do you have a switch on site?&amp;nbsp; If so, connect the management interfaces to the switch and access them like you would any other.&amp;nbsp; You can access them over the VPN.&amp;nbsp; You would also be able to connect to the passive firewall.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Tom&lt;/P&gt;</description>
      <pubDate>Thu, 29 Jan 2026 19:03:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/ipsec-vpn-for-the-fw-mgmt/m-p/1247029#M6632</guid>
      <dc:creator>TomYoung</dc:creator>
      <dc:date>2026-01-29T19:03:53Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC VPN for the FW MGMT</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/ipsec-vpn-for-the-fw-mgmt/m-p/1247048#M6633</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/77347"&gt;@TomYoung&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for your reply. I'm referring about the Out of Band MGMT port.&lt;/P&gt;&lt;P&gt;As you know, since it's not part of any security zones, security policy won't be applicable. Is my assumption correct?&lt;/P&gt;&lt;P&gt;In that case, we'd need to use an In-band port (or loopback) and assign to a dedicated zone (MGMT-VPN) and allow security policy (MGMT-VPN to VPN).&lt;/P&gt;&lt;P&gt;I believe in this scenario, only the active firewall would be reachable as it holds the IP address.&lt;/P&gt;&lt;P&gt;Do correct me if I miss anything.&lt;/P&gt;</description>
      <pubDate>Fri, 30 Jan 2026 03:11:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/ipsec-vpn-for-the-fw-mgmt/m-p/1247048#M6633</guid>
      <dc:creator>90435srinivasan</dc:creator>
      <dc:date>2026-01-30T03:11:21Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC VPN for the FW MGMT</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/ipsec-vpn-for-the-fw-mgmt/m-p/1247125#M6636</link>
      <description>&lt;P&gt;You can't route traffic directly from dataplane to management plane. There has to be switch in between.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Below is example using random vlans and IPs.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Raido_Rattameister_0-1769787279046.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/70541i6753D19D1DC3CEFF/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Raido_Rattameister_0-1769787279046.png" alt="Raido_Rattameister_0-1769787279046.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;And then firewall policy can be added to permit traffic from VPN zone to management zone towards Palo mgmt IPs.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Raido_Rattameister_1-1769787299862.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/70542iB695FA898D6FD61F/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Raido_Rattameister_1-1769787299862.png" alt="Raido_Rattameister_1-1769787299862.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 30 Jan 2026 15:36:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/ipsec-vpn-for-the-fw-mgmt/m-p/1247125#M6636</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2026-01-30T15:36:34Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC VPN for the FW MGMT</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/ipsec-vpn-for-the-fw-mgmt/m-p/1247129#M6637</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/15603"&gt;@Raido_Rattameister&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for your reply and sorry if I sound so silly.&lt;/P&gt;&lt;P&gt;As far as I know, dedicated out of band management interface isn't part of any security zone.&lt;/P&gt;&lt;P&gt;Based on the above example, if the dedicated MGT port to be accessed via IPSEC VPN, can you pls let me know how the routing should be setup?&lt;/P&gt;&lt;P&gt;Again, to the best of my knowledge, MGMT interface doesn't use the VR as this is for data-interface.&lt;/P&gt;&lt;P&gt;Please correct me if I miss anything&amp;nbsp;&lt;span class="lia-unicode-emoji" title=":smiling_face_with_smiling_eyes:"&gt;😊&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 30 Jan 2026 17:22:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/ipsec-vpn-for-the-fw-mgmt/m-p/1247129#M6637</guid>
      <dc:creator>90435srinivasan</dc:creator>
      <dc:date>2026-01-30T17:22:58Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC VPN for the FW MGMT</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/ipsec-vpn-for-the-fw-mgmt/m-p/1247333#M6652</link>
      <description>&lt;P&gt;you are correct, the MGT interface in the screenshot above is unaware of [and does not need to be aware of] the FW configuration for security zones.&lt;/P&gt;
&lt;P&gt;that stated,&amp;nbsp;In the example picture given, the VLAN 30 gateway on the firewall is in a security zone.&lt;/P&gt;
&lt;P&gt;your MGT interface would be configured with that FW VLAN 30 IP as the gateway IP address. this would allow the FW to route traffic back and forth between VPN and the VLAN 30&lt;/P&gt;
&lt;P&gt;think of that policy as more for the firewall itself than for the MGT interface&lt;/P&gt;
&lt;P&gt;If it helps to visualize, just consider the MGT interface as an independent host on the network, and not as part of the firewall.&lt;/P&gt;</description>
      <pubDate>Tue, 03 Feb 2026 15:01:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/ipsec-vpn-for-the-fw-mgmt/m-p/1247333#M6652</guid>
      <dc:creator>L.LampkinIII</dc:creator>
      <dc:date>2026-02-03T15:01:46Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC VPN for the FW MGMT</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/ipsec-vpn-for-the-fw-mgmt/m-p/1247535#M6663</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/585602783"&gt;@L.LampkinIII&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Got it. If I understand correctly, MGMT traffic would be routed via data-interface (Ex: Inside-&amp;gt;VPN), provided switch is routing the traffic back to the FW.&lt;/P&gt;&lt;P&gt;Is that correct?&lt;/P&gt;</description>
      <pubDate>Thu, 05 Feb 2026 16:28:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/ipsec-vpn-for-the-fw-mgmt/m-p/1247535#M6663</guid>
      <dc:creator>90435srinivasan</dc:creator>
      <dc:date>2026-02-05T16:28:19Z</dc:date>
    </item>
  </channel>
</rss>

