<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic How to configure ipsec vpn in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-configure-ipsec-vpn/m-p/559800#M113516</link>
    <description>&lt;P&gt;&lt;SPAN&gt;How to configure ipsec vpn between palo atto and fortigate firewall .&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;VPN flow is following&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Remote Lan&amp;nbsp;(191.168.1.0/24) &amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;nbsp; Fortigate (192.168.10.2 private ip)&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;Cisco router(203.1.1.2/29)&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;PaloAlto(202.1.1.10/30-public ip)----Local lan&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;fortigate firewall is the behind the NATed device that is cisco router and Cisco Router have public ip (203.1.1.2/29) but Fortigate do not have public ip address and they have private ip(191.168.10.2).NATed device is in front&amp;nbsp;of fortigate.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;How can we configure for that?&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Thu, 28 Sep 2023 04:43:31 GMT</pubDate>
    <dc:creator>Chignon</dc:creator>
    <dc:date>2023-09-28T04:43:31Z</dc:date>
    <item>
      <title>How to configure ipsec vpn</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-configure-ipsec-vpn/m-p/559800#M113516</link>
      <description>&lt;P&gt;&lt;SPAN&gt;How to configure ipsec vpn between palo atto and fortigate firewall .&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;VPN flow is following&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Remote Lan&amp;nbsp;(191.168.1.0/24) &amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;nbsp; Fortigate (192.168.10.2 private ip)&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;Cisco router(203.1.1.2/29)&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;PaloAlto(202.1.1.10/30-public ip)----Local lan&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;fortigate firewall is the behind the NATed device that is cisco router and Cisco Router have public ip (203.1.1.2/29) but Fortigate do not have public ip address and they have private ip(191.168.10.2).NATed device is in front&amp;nbsp;of fortigate.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;How can we configure for that?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 28 Sep 2023 04:43:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-configure-ipsec-vpn/m-p/559800#M113516</guid>
      <dc:creator>Chignon</dc:creator>
      <dc:date>2023-09-28T04:43:31Z</dc:date>
    </item>
    <item>
      <title>Re: How to configure ipsec vpn</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-configure-ipsec-vpn/m-p/559860#M113521</link>
      <description>&lt;P&gt;Palo side&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Raido_Rattameister_0-1695907280629.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/54036i5082834AC2426C11/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Raido_Rattameister_0-1695907280629.png" alt="Raido_Rattameister_0-1695907280629.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If Cisco router don't have DNAT rule to forward packets arriving to&amp;nbsp;&lt;SPAN&gt;203.1.1.2 further towards&amp;nbsp;192.168.10.2 then it makes sense to make Palo to be passive.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;"Enable NAT Traversal" will encapsulate IPSec packets into UDP packet. This is needed if NAT is involved.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Raido_Rattameister_1-1695907339183.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/54037iFEEB91BF82CFB9F8/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Raido_Rattameister_1-1695907339183.png" alt="Raido_Rattameister_1-1695907339183.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 28 Sep 2023 13:24:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-configure-ipsec-vpn/m-p/559860#M113521</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2023-09-28T13:24:56Z</dc:date>
    </item>
    <item>
      <title>Re: How to configure ipsec vpn</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-configure-ipsec-vpn/m-p/559889#M113535</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;check out&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/15603"&gt;@Raido_Rattameister&lt;/a&gt;&amp;nbsp;reply. The natted firewall/vpn endpoint needs to have the IP listed as the "Peer Identification" IP address. So point your tunnel at the public IP and the Peer Identification as the VPN endpoint device.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Thu, 28 Sep 2023 16:09:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-configure-ipsec-vpn/m-p/559889#M113535</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2023-09-28T16:09:47Z</dc:date>
    </item>
  </channel>
</rss>

