<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Prisma Access enable the option &amp;quot;IKE Passive Mode&amp;quot; for extra security as only outbound IPSEC need to be allowed from the private data center in Prisma Access Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/prisma-access-enable-the-option-quot-ike-passive-mode-quot-for/m-p/504133#M372</link>
    <description>&lt;P&gt;The option "IKE Passive Mode" makes the Prisma Access cloud to be only a VPN responder to the IPSEC traffic, iniated by the on-prem router/firewall or the ZTNA connector and this allows only outbound connections to be permitted. This is similar to some other ZTNA solutions that&amp;nbsp;emphasize that only outbound connections are allowed. The VPN solutions&amp;nbsp;in a long time had options for VPN initiator and VPN responder , also with the new ZTNA connectors it is similar to Zscaler ZPA for example.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/prisma/prisma-access/prisma-access-cloud-managed-admin/prisma-access-service-connections/enable-access-to-corporate-resources-using-service-connections/set-up-a-primary-ipsec-tunnel-for-your-service-connection" target="_blank" rel="noopener"&gt;Set Up a Primary IPSec Tunnel for Your Service Connection (paloaltonetworks.com)&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Thu, 16 Jun 2022 09:38:33 GMT</pubDate>
    <dc:creator>nikoolayy1</dc:creator>
    <dc:date>2022-06-16T09:38:33Z</dc:date>
    <item>
      <title>Prisma Access enable the option "IKE Passive Mode" for extra security as only outbound IPSEC need to be allowed from the private data center</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/prisma-access-enable-the-option-quot-ike-passive-mode-quot-for/m-p/504133#M372</link>
      <description>&lt;P&gt;The option "IKE Passive Mode" makes the Prisma Access cloud to be only a VPN responder to the IPSEC traffic, iniated by the on-prem router/firewall or the ZTNA connector and this allows only outbound connections to be permitted. This is similar to some other ZTNA solutions that&amp;nbsp;emphasize that only outbound connections are allowed. The VPN solutions&amp;nbsp;in a long time had options for VPN initiator and VPN responder , also with the new ZTNA connectors it is similar to Zscaler ZPA for example.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/prisma/prisma-access/prisma-access-cloud-managed-admin/prisma-access-service-connections/enable-access-to-corporate-resources-using-service-connections/set-up-a-primary-ipsec-tunnel-for-your-service-connection" target="_blank" rel="noopener"&gt;Set Up a Primary IPSec Tunnel for Your Service Connection (paloaltonetworks.com)&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 16 Jun 2022 09:38:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-access-discussions/prisma-access-enable-the-option-quot-ike-passive-mode-quot-for/m-p/504133#M372</guid>
      <dc:creator>nikoolayy1</dc:creator>
      <dc:date>2022-06-16T09:38:33Z</dc:date>
    </item>
  </channel>
</rss>

