<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: VPN to AWS with BGP in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-to-aws-with-bgp/m-p/509440#M106056</link>
    <description>&lt;P&gt;anyone have advice on this?&lt;/P&gt;</description>
    <pubDate>Thu, 21 Jul 2022 01:22:18 GMT</pubDate>
    <dc:creator>mnashe</dc:creator>
    <dc:date>2022-07-21T01:22:18Z</dc:date>
    <item>
      <title>VPN to AWS with BGP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-to-aws-with-bgp/m-p/509304#M106030</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have 3 locations that I need to create VPNs to AWS for.&amp;nbsp; Each location is dual ISP using PBF.&amp;nbsp; &amp;nbsp;Since AWS uses 2 tunnels each VPN connection, seems there will be 4 total tunnels per location (2 per ISP).&amp;nbsp; My initial thought was to use static routing but I'd like to avoid any asymmetric routing from AWS.&amp;nbsp; In these locations, we are using&amp;nbsp;static routing from the palo alto firewalls to each site's core switch. I have some BGP knowledge but never needed to configure on PAN before.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Here's a little about my 2 of my locations setup&lt;/P&gt;
&lt;P&gt;Site A Core SW has the following subnets 10.10.10.0/24, 10.10.11.0/24, 10.10.13.0/24 -&amp;nbsp; 10.10.20.0/24,&amp;nbsp; default route with next-hop of FW.'s trust interface.&amp;nbsp; In FW's default virtual router, there is a static route for 10.10.0.0/16 with a next-hop of Core SW IP&amp;nbsp;and a default route 0.0.0.0/0 next hop of ISP2's DG&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Site B Core SW has the following subnets 10.10.50.0/24, 10.10.55.0/24, 10.10.60.0/24 -&amp;nbsp; 10.10.70.0/24,&amp;nbsp; default route with next-hop of FW.'s trust interface.&amp;nbsp; In FW's default virtual router, there is a static route for 10.10.0.0/16 with a next-hop of Core SW IP&amp;nbsp; and a default route 0.0.0.0/0 next hop of ISP2's DG&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If I were to build the tunnels to AWS with BGP, my first questions are&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&amp;nbsp;can I use the default virtual router or do/should I create a new virtual router and add the tunnel interfaces to that VR?&lt;/LI&gt;
&lt;LI&gt;How do I advertise each individuals site's network to AWS using BGP?&amp;nbsp; Since 2 sites have a static route on the FW pointing to the same subnet range 10.10.0.0/16, I can redistribute that static route to AWS, since AWS will not know which tunnel to use for specific subnet.&amp;nbsp; &amp;nbsp;I also don't want to advertise the default route to AWS.&amp;nbsp; &amp;nbsp;On the individual firewalls do I need to remove the 10.10.0.0/16 and add static routes for each of the subnets or is there a better way to do this?&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 19 Jul 2022 16:12:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-to-aws-with-bgp/m-p/509304#M106030</guid>
      <dc:creator>mnashe</dc:creator>
      <dc:date>2022-07-19T16:12:14Z</dc:date>
    </item>
    <item>
      <title>Re: VPN to AWS with BGP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-to-aws-with-bgp/m-p/509440#M106056</link>
      <description>&lt;P&gt;anyone have advice on this?&lt;/P&gt;</description>
      <pubDate>Thu, 21 Jul 2022 01:22:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-to-aws-with-bgp/m-p/509440#M106056</guid>
      <dc:creator>mnashe</dc:creator>
      <dc:date>2022-07-21T01:22:18Z</dc:date>
    </item>
    <item>
      <title>Re: VPN to AWS with BGP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-to-aws-with-bgp/m-p/509563#M106080</link>
      <description>&lt;P&gt;Funny I just completed making this connection to our AWS instance using BGP. As of now created a zone and assigned to AWS tunnel interface in the default routing instance. Two thing I have done with BGP configuration.&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Create a import rule so that I only import AWS subnets that I want into the table. This can be done by going into Virtual router&amp;gt;VR where tunnel inet is assigned&amp;gt;BGP&amp;gt;import. Here create new rule and under match&amp;gt;Address prefix add the subnet you would like to import from AWS and under Peer select the peer this routes would come from. Rest of the setting would be default.&lt;/LI&gt;
&lt;LI&gt;Create a redist rules under BGP&amp;gt;Redist Rules and specific the subnets or subnet you will like to advertise into AWS. You dont have to modify any metric or preference if you dont need them.&amp;nbsp;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;I also enabled Asymetric routing on this zone since AWS recommends having two tunnels using Zone protection profile created specific for this zone and disabled "Reject non-syn tcp" and applied to the zone. It has been working so for. If you have additional question please let me know.&lt;/P&gt;</description>
      <pubDate>Fri, 22 Jul 2022 04:29:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-to-aws-with-bgp/m-p/509563#M106080</guid>
      <dc:creator>LCMember4417</dc:creator>
      <dc:date>2022-07-22T04:29:40Z</dc:date>
    </item>
    <item>
      <title>Re: VPN to AWS with BGP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-to-aws-with-bgp/m-p/509623#M106092</link>
      <description>&lt;P&gt;hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/5958"&gt;@LCMember4417&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks for getting back to me.&amp;nbsp; You used your existing virtual router for this or created a new VR.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For the redistribution profile, wouldn't the specific routes need to be in the routing table to redistribute them? Meaning, under source type, would I have to select "static" and then in destination, add the specific subnets to advertise?&amp;nbsp; &amp;nbsp; If so, the problem is I don't have specific static routes for those /24 subnets, since my static route is less specific&amp;nbsp; (10.10.0.0/16).&amp;nbsp; &amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 22 Jul 2022 14:51:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-to-aws-with-bgp/m-p/509623#M106092</guid>
      <dc:creator>mnashe</dc:creator>
      <dc:date>2022-07-22T14:51:13Z</dc:date>
    </item>
    <item>
      <title>Re: VPN to AWS with BGP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-to-aws-with-bgp/m-p/509669#M106102</link>
      <description>&lt;P&gt;I didn't create a new VR.&amp;nbsp; I didn't use the "redistribution profile" I used "import" and "Redist Rules" under BGP.&amp;nbsp; I have static routes on the VR so I felt "redistribution profile" was not suitable for me so I used&amp;nbsp;"Redist Rules" which allow you to specify your own subnet you want to advertise to AWS.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="LCMember4417_0-1658526685762.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/42588iF668098978D77264/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="LCMember4417_0-1658526685762.png" alt="LCMember4417_0-1658526685762.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Also this subnets are aggregates of the static routes I have on the firewall. You can advertise any subnet here but firewall needs to know how to route them properly when traffic comes from AWS to this subnet.&lt;/P&gt;
&lt;P&gt;I hope this clarifies things.&lt;/P&gt;</description>
      <pubDate>Fri, 22 Jul 2022 21:53:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-to-aws-with-bgp/m-p/509669#M106102</guid>
      <dc:creator>LCMember4417</dc:creator>
      <dc:date>2022-07-22T21:53:21Z</dc:date>
    </item>
    <item>
      <title>Re: VPN to AWS with BGP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-to-aws-with-bgp/m-p/510008#M106146</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/5958"&gt;@LCMember4417&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Tested this in lab and worked as expected.&amp;nbsp; I didn't realize the Export tab in Palo Alto only works if the route is learned through BGP.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 27 Jul 2022 01:29:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-to-aws-with-bgp/m-p/510008#M106146</guid>
      <dc:creator>mnashe</dc:creator>
      <dc:date>2022-07-27T01:29:35Z</dc:date>
    </item>
  </channel>
</rss>

