<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: VPN Site to Site configuration between two PAs in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-site-to-site-configuration-between-two-pas/m-p/483886#M104388</link>
    <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/217724"&gt;@smshafek&lt;/a&gt; ,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When you say, "Everything is green" I assume that you mean the Status &amp;gt; Tunnel Info and Status &amp;gt; IKE Info are both green under Network &amp;gt; IPSec Tunnels.&amp;nbsp; Good!&amp;nbsp; Here are a couple of critical places to look:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Click on Status &amp;gt; Tunnel Info and verify there are PKT ENCAP and PKT DECAP counters.&amp;nbsp; If there are no encaps, then the problem is on the local NGFW.&amp;nbsp; If there are no decaps, then the problem is on the remote NGFW.&lt;/LI&gt;&lt;LI&gt;On the problem NGFW, look at Monitor &amp;gt; Logs &amp;gt; Traffic and verify sessions are being allowed to the proper zone.&amp;nbsp; There could be a LOT of different reasons why this is failing.&amp;nbsp; You will have to take it from here.&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Tom&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 29 Apr 2022 21:13:21 GMT</pubDate>
    <dc:creator>TomYoung</dc:creator>
    <dc:date>2022-04-29T21:13:21Z</dc:date>
    <item>
      <title>VPN Site to Site configuration between two PAs</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-site-to-site-configuration-between-two-pas/m-p/483798#M104384</link>
      <description>&lt;P&gt;Hi,&lt;BR /&gt;&lt;BR /&gt;I've been trying to get clients on the end of two different Palo Altos to be able to ping each other. Everything is green but the IPsec Tunnel doesnt seem to be working. Using tracert, traffic from a client first hops to the LAN Port and then to the opposite end of the tunnel and stops there. I've already created policies that allows traffic from LAN to VPN and vice versa.&lt;BR /&gt;&lt;BR /&gt;Full 'Picture'&lt;BR /&gt;PA 1&lt;BR /&gt;Client : 10.10.254.100&lt;BR /&gt;LAN : 10.10.254.1&lt;BR /&gt;Tunnel IP : 192.168.4.254&lt;BR /&gt;&lt;BR /&gt;PA 2&lt;BR /&gt;Client : 10.10.253.100&lt;BR /&gt;LAN : 10.10.253.1&lt;BR /&gt;Tunnel IP : 172.20.3.253&lt;BR /&gt;&lt;BR /&gt;On tracert from client (10.10.254.100) on PA 1's side :&lt;BR /&gt;10.10.254.1 -&amp;gt; 172.20.3.253&lt;BR /&gt;&lt;BR /&gt;Any suggestions?&lt;BR /&gt;&lt;BR /&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Fri, 29 Apr 2022 12:33:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-site-to-site-configuration-between-two-pas/m-p/483798#M104384</guid>
      <dc:creator>smshafek</dc:creator>
      <dc:date>2022-04-29T12:33:58Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Site to Site configuration between two PAs</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-site-to-site-configuration-between-two-pas/m-p/483886#M104388</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/217724"&gt;@smshafek&lt;/a&gt; ,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When you say, "Everything is green" I assume that you mean the Status &amp;gt; Tunnel Info and Status &amp;gt; IKE Info are both green under Network &amp;gt; IPSec Tunnels.&amp;nbsp; Good!&amp;nbsp; Here are a couple of critical places to look:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Click on Status &amp;gt; Tunnel Info and verify there are PKT ENCAP and PKT DECAP counters.&amp;nbsp; If there are no encaps, then the problem is on the local NGFW.&amp;nbsp; If there are no decaps, then the problem is on the remote NGFW.&lt;/LI&gt;&lt;LI&gt;On the problem NGFW, look at Monitor &amp;gt; Logs &amp;gt; Traffic and verify sessions are being allowed to the proper zone.&amp;nbsp; There could be a LOT of different reasons why this is failing.&amp;nbsp; You will have to take it from here.&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Tom&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 29 Apr 2022 21:13:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-site-to-site-configuration-between-two-pas/m-p/483886#M104388</guid>
      <dc:creator>TomYoung</dc:creator>
      <dc:date>2022-04-29T21:13:21Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Site to Site configuration between two PAs</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-site-to-site-configuration-between-two-pas/m-p/483931#M104390</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;Also check to make sure you have security policies to allow ping. If you are attempting to ping interfaces on the PAN's, you'll need to enable that as well in the interface management.&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Fri, 29 Apr 2022 21:34:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-site-to-site-configuration-between-two-pas/m-p/483931#M104390</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2022-04-29T21:34:07Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Site to Site configuration between two PAs</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-site-to-site-configuration-between-two-pas/m-p/483995#M104399</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/217724"&gt;@smshafek&lt;/a&gt; ,&lt;/P&gt;&lt;P&gt;- If traceroute suggest traffic reaches the remote side of the tunnel do you see traffic logs on the PA 2? More importantly does bytes received counter different than zero - this should confirm if traffic is indeed reaching the other side of the tunnel and if return traffic is hitting PA2.&lt;/P&gt;&lt;P&gt;- As &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/77347"&gt;@TomYoung&lt;/a&gt;&amp;nbsp; suggest, check if packet encrypted and packets decrypted counters are increasing on both sides of the tunnel.&lt;/P&gt;&lt;P&gt;- Is there any NAT for the traffic over the tunnel? Have you check if unintentional NAT is not being applied?&lt;/P&gt;&lt;P&gt;- For very long time detailed traffic log of PAN firewalls were completely enough for me to identify most network issue, but recently I had some bizarre cases and I developed new habit - use global counters with packet filter applied for the specific traffic - &lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000CloNCAS" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000CloNCAS&lt;/A&gt; If you have control over both firewall definitely do that on both sides.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Having results from above should give you some direction where to look next.&lt;/P&gt;</description>
      <pubDate>Sat, 30 Apr 2022 18:10:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-site-to-site-configuration-between-two-pas/m-p/483995#M104399</guid>
      <dc:creator>aleksandar.astardzhiev</dc:creator>
      <dc:date>2022-04-30T18:10:03Z</dc:date>
    </item>
  </channel>
</rss>

