<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: IP Sec VPN Paloalto - Starlink in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ip-sec-vpn-paloalto-starlink/m-p/537619#M110393</link>
    <description>&lt;P&gt;&lt;SPAN&gt;&lt;SPAN class="ui-provider gp b c d e f g h i j k l m n o p q r s t u v w x y z ab ac ae af ag ah ai aj ak"&gt;Thank you for your response. Both sides have policies that permit traffic to/from the tunnel zone. I have another circuit that works with no issues at this site. However, when getting the screenshots you requested I noticed that on Starlink most of the traffic goes Interzone-default policy and is denied.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 04 Apr 2023 16:30:04 GMT</pubDate>
    <dc:creator>CraigSmith2</dc:creator>
    <dc:date>2023-04-04T16:30:04Z</dc:date>
    <item>
      <title>IP Sec VPN Paloalto - Starlink</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ip-sec-vpn-paloalto-starlink/m-p/536637#M110234</link>
      <description>&lt;P&gt;I'm testing Starlink business and having issues passing traffic over my tunnel. This remote site connects to our data center via an IPsec tunnel. I can get the tunnel up and traceroute to the remote side of the tunnel, but I'm unable to pass traffic. I have "&lt;SPAN&gt;Enable NAT Traversal" selected on my IKE Gateway. The Starlink is set to IP passthrough.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Any help would be appreciated.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 27 Mar 2023 16:16:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ip-sec-vpn-paloalto-starlink/m-p/536637#M110234</guid>
      <dc:creator>CraigSmith2</dc:creator>
      <dc:date>2023-03-27T16:16:46Z</dc:date>
    </item>
    <item>
      <title>Re: IP Sec VPN Paloalto - Starlink</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ip-sec-vpn-paloalto-starlink/m-p/536646#M110236</link>
      <description>&lt;P&gt;If you can traceroute to other side over the tunnel it means that some traffic does cross the tunnel successfully right?&lt;/P&gt;</description>
      <pubDate>Mon, 27 Mar 2023 18:23:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ip-sec-vpn-paloalto-starlink/m-p/536646#M110236</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2023-03-27T18:23:39Z</dc:date>
    </item>
    <item>
      <title>Re: IP Sec VPN Paloalto - Starlink</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ip-sec-vpn-paloalto-starlink/m-p/536828#M110255</link>
      <description>&lt;P&gt;Yes, I agree, however, I'm unable to ping the management interface of the PA-220. Also from the remote side, I can't ping the gateway that is on the PA-220 for any of my vlans and my Cisco phones do not register.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 28 Mar 2023 20:33:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ip-sec-vpn-paloalto-starlink/m-p/536828#M110255</guid>
      <dc:creator>CraigSmith2</dc:creator>
      <dc:date>2023-03-28T20:33:09Z</dc:date>
    </item>
    <item>
      <title>Re: IP Sec VPN Paloalto - Starlink</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ip-sec-vpn-paloalto-starlink/m-p/536839#M110261</link>
      <description>&lt;P&gt;Both sides have Palo?&lt;/P&gt;
&lt;P&gt;Do you have access to firewalls on both side?&lt;/P&gt;</description>
      <pubDate>Wed, 29 Mar 2023 00:59:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ip-sec-vpn-paloalto-starlink/m-p/536839#M110261</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2023-03-29T00:59:20Z</dc:date>
    </item>
    <item>
      <title>Re: IP Sec VPN Paloalto - Starlink</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ip-sec-vpn-paloalto-starlink/m-p/536929#M110278</link>
      <description>&lt;P&gt;Yes, both sides have Palo Altos. When I'm on-site I have access to both firewalls. I have to unplug the Starlink cable to keep my other tunnel running.&lt;/P&gt;</description>
      <pubDate>Wed, 29 Mar 2023 15:31:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ip-sec-vpn-paloalto-starlink/m-p/536929#M110278</guid>
      <dc:creator>CraigSmith2</dc:creator>
      <dc:date>2023-03-29T15:31:14Z</dc:date>
    </item>
    <item>
      <title>Re: IP Sec VPN Paloalto - Starlink</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ip-sec-vpn-paloalto-starlink/m-p/536935#M110282</link>
      <description>&lt;P&gt;Check firewall policies on both sides if they permit traffic to/from tunnel zone.&lt;/P&gt;
&lt;P&gt;Can you share screenshot of working and not working traffic log from both sides and have at least those columns visible.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Raido_Rattameister_0-1680104836923.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/49114iE7E1CF5467CE4559/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="Raido_Rattameister_0-1680104836923.png" alt="Raido_Rattameister_0-1680104836923.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 29 Mar 2023 15:48:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ip-sec-vpn-paloalto-starlink/m-p/536935#M110282</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2023-03-29T15:48:33Z</dc:date>
    </item>
    <item>
      <title>Re: IP Sec VPN Paloalto - Starlink</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ip-sec-vpn-paloalto-starlink/m-p/537619#M110393</link>
      <description>&lt;P&gt;&lt;SPAN&gt;&lt;SPAN class="ui-provider gp b c d e f g h i j k l m n o p q r s t u v w x y z ab ac ae af ag ah ai aj ak"&gt;Thank you for your response. Both sides have policies that permit traffic to/from the tunnel zone. I have another circuit that works with no issues at this site. However, when getting the screenshots you requested I noticed that on Starlink most of the traffic goes Interzone-default policy and is denied.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 04 Apr 2023 16:30:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ip-sec-vpn-paloalto-starlink/m-p/537619#M110393</guid>
      <dc:creator>CraigSmith2</dc:creator>
      <dc:date>2023-04-04T16:30:04Z</dc:date>
    </item>
    <item>
      <title>Re: IP Sec VPN Paloalto - Starlink</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ip-sec-vpn-paloalto-starlink/m-p/537654#M110398</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;Do you have policies in place to allow the traffic to flow via the tunnel? Also how is the 'default', 0.0.0.0/0 route getting advertised on the 'remote' side, or is it a static route?&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Tue, 04 Apr 2023 21:37:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ip-sec-vpn-paloalto-starlink/m-p/537654#M110398</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2023-04-04T21:37:41Z</dc:date>
    </item>
    <item>
      <title>Re: IP Sec VPN Paloalto - Starlink</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ip-sec-vpn-paloalto-starlink/m-p/537655#M110399</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;Sorry I didnt see the traffic screen shots before. But it looks like there are missing policies so the traffic is hitting the 'default' policies.&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Tue, 04 Apr 2023 21:39:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ip-sec-vpn-paloalto-starlink/m-p/537655#M110399</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2023-04-04T21:39:45Z</dc:date>
    </item>
    <item>
      <title>Re: IP Sec VPN Paloalto - Starlink</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ip-sec-vpn-paloalto-starlink/m-p/572006#M115126</link>
      <description>&lt;P&gt;I'm having the same problem. It dosn't happen all the time. I think it has to do with esp traffic being blocked&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 06 Jan 2024 23:35:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ip-sec-vpn-paloalto-starlink/m-p/572006#M115126</guid>
      <dc:creator>ChrisThornton</dc:creator>
      <dc:date>2024-01-06T23:35:54Z</dc:date>
    </item>
    <item>
      <title>Re: IP Sec VPN Paloalto - Starlink</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ip-sec-vpn-paloalto-starlink/m-p/572060#M115133</link>
      <description>&lt;P&gt;Is there any solution&lt;A href="https://cuyahogacountyauditor.site" target="_self"&gt;.&lt;/A&gt;?&lt;/P&gt;</description>
      <pubDate>Tue, 09 Jan 2024 07:05:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ip-sec-vpn-paloalto-starlink/m-p/572060#M115133</guid>
      <dc:creator>Pollack32</dc:creator>
      <dc:date>2024-01-09T07:05:20Z</dc:date>
    </item>
    <item>
      <title>Re: IP Sec VPN Paloalto - Starlink</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ip-sec-vpn-paloalto-starlink/m-p/572091#M115135</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;For the policy that handles the VPN traffic, do not perform and inspections or ssl decryption, etc. Basically allow all traffic to/from the two IP's that are the VPN endpoints and see how that works out. My guess is that there is UDP traffic getting blocked/dropped.&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Mon, 08 Jan 2024 15:36:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ip-sec-vpn-paloalto-starlink/m-p/572091#M115135</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2024-01-08T15:36:47Z</dc:date>
    </item>
    <item>
      <title>Re: IP Sec VPN Paloalto - Starlink</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ip-sec-vpn-paloalto-starlink/m-p/595790#M118550</link>
      <description>&lt;P&gt;Sorry for not responding. I abandoned this project.&lt;/P&gt;
&lt;P&gt;Yes the routes are static and looking back at my screenshots I think you are correct that policies were missing.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I'm considering trying StarLink again, I was reviewing what went wrong. Thank you for your help.&lt;/P&gt;</description>
      <pubDate>Fri, 23 Aug 2024 17:50:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ip-sec-vpn-paloalto-starlink/m-p/595790#M118550</guid>
      <dc:creator>CraigSmith2</dc:creator>
      <dc:date>2024-08-23T17:50:01Z</dc:date>
    </item>
    <item>
      <title>Re: IP Sec VPN Paloalto - Starlink</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ip-sec-vpn-paloalto-starlink/m-p/606906#M120467</link>
      <description>&lt;P&gt;We had the same issue and StarLink confirmed the following so we are looking into a solution&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ESP packets are dropped.&lt;/P&gt;
&lt;P&gt;VPNs that rely on protocols 47 (GRE), 50 (ESP), 51 (AH), 115 (L2TP) are dropped by CGNAT at this time.&lt;/P&gt;</description>
      <pubDate>Fri, 18 Oct 2024 15:24:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ip-sec-vpn-paloalto-starlink/m-p/606906#M120467</guid>
      <dc:creator>dkaliel</dc:creator>
      <dc:date>2024-10-18T15:24:44Z</dc:date>
    </item>
    <item>
      <title>Re: IP Sec VPN Paloalto - Starlink</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ip-sec-vpn-paloalto-starlink/m-p/1225070#M123810</link>
      <description>&lt;P&gt;Just going to chime in for folks like myself who have limited choices. I found a good article on a competitor site that helped me and i managed to get a site to site up thru starlink residential.&lt;/P&gt;
&lt;P&gt;my setup is PA--&amp;gt;FTG--&amp;gt;Starlink---&amp;gt;ISP---&amp;gt;PA Corp.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;PA on Corp side is in passive mode since it has the static ip&lt;/P&gt;
&lt;P&gt;Both PAs are running ikev1 in aggressive mode with NAT-T&lt;/P&gt;
&lt;P&gt;The FTG in my case is just acting like a service provider&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.fortinet.com/t5/Support-Forum/IPSEC-tunnels-behind-CGNAT-Starlink/m-p/226976" target="_blank" rel="noopener"&gt;https://community.fortinet.com/t5/Support-Forum/IPSEC-tunnels-behind-CGNAT-Starlink/m-p/226976&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.starlink.com/support/article/aa5aecf3-e97c-e84e-3f87-8d2ecdfde857" target="_blank" rel="noopener"&gt;https://www.starlink.com/support/article/aa5aecf3-e97c-e84e-3f87-8d2ecdfde857&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am a bit curious if anyone has run any testing to see if any of the ports are blocked per the article from starlink below? I would think the traffic thru the vpn would be immune to this.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.starlink.com/support/article/c3caacdf-1c1f-98db-b821-bbb36ca9d89b" target="_blank" rel="noopener"&gt;https://www.starlink.com/support/article/c3caacdf-1c1f-98db-b821-bbb36ca9d89b&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 29 Mar 2025 01:50:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ip-sec-vpn-paloalto-starlink/m-p/1225070#M123810</guid>
      <dc:creator>PktBlocker</dc:creator>
      <dc:date>2025-03-29T01:50:46Z</dc:date>
    </item>
  </channel>
</rss>

