<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How do I configure an external interface for a direct fiber (metro ethernet) connection? in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/how-do-i-configure-an-external-interface-for-a-direct-fiber/m-p/15585#M11415</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ehm... is it possible for someone from PAN to disable this magic SMTP interaction which this forum seems to have since autoreplies are posted directly into the threads (for obviously no use)?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 09 Apr 2012 23:02:26 GMT</pubDate>
    <dc:creator>mikand</dc:creator>
    <dc:date>2012-04-09T23:02:26Z</dc:date>
    <item>
      <title>How do I configure an external interface for a direct fiber (metro ethernet) connection?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-do-i-configure-an-external-interface-for-a-direct-fiber/m-p/15581#M11411</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We are in the process of switching from a T1 provider to a fiber connection through another ISP.&amp;nbsp; The T1 provider has us on a /29 network where they provide a router which occupies the first usable IP of the range.&amp;nbsp; Our new ISP has the outside interface on our PA-500 connecting directly to a switch.&amp;nbsp; We were given two ranges of IP addresses:&amp;nbsp; a /30 which contains the address we're supposed to assign to the outside interface for OUTBOUND traffic, and a /29 which contains our six usable addresses we're supposed to use for inbound connections.&amp;nbsp; I've provided a diagram with anonymized addresses to show the topology.&lt;/P&gt;&lt;P&gt;/29:&lt;/P&gt;&lt;P&gt;10.1.76.4 = network address&lt;/P&gt;&lt;P&gt;10.1.76.5 = the address of their router&lt;/P&gt;&lt;P&gt;10.1.76.6 = the address they advised we assign to the outside interface of our PA-500&lt;/P&gt;&lt;P&gt;/30:&lt;/P&gt;&lt;P&gt;10.0.194.112 = network address&lt;/P&gt;&lt;P&gt;10.0.194.113-118 = usable IP range&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We wish to set up the following on the usable IP addresses and tie them to the outside interface of the PA-500:&lt;/P&gt;&lt;P&gt;Terminate 5 IPSec VPN connections from remote sites&lt;/P&gt;&lt;P&gt;Host a Palo Alto NetConnect SSL VPN&lt;/P&gt;&lt;P&gt;Point an A record to a remote access server (NAT)&lt;/P&gt;&lt;P&gt;Point MX and A records to our email server (NAT)&lt;/P&gt;&lt;P&gt;Reroute all outbound internet traffic through the new ISP&lt;/P&gt;&lt;P&gt;I'm trying to set up the IPSec VPNs first.&amp;nbsp; I assigned the 10.1.76.6/30 address to the outside interface on the PA-500, and I'm able to ping it from the Internet and can use that address to terminate IPSec VPNs.&amp;nbsp; I couldn't ping any of the usable 10.0.194.### addresses until I set them up as loopback addresses in the PA-500.&amp;nbsp; I was then able to ping them, but couldn't terminate my IPSec VPN tunnel on any of them.&lt;/P&gt;&lt;P&gt;My NAT policy for the IPSec VPNs is zone-based, and I set up the interface identically (in terms of zone membership) to the interface that's hooked up to our old T1 line.&lt;/P&gt;&lt;P&gt;So, I guess my questions would be:&lt;/P&gt;&lt;P&gt;Do I need the loopback settings, or just the NAT rules?&amp;nbsp; Should I be terminating things like IPSec VPNs, NetConnect, and our Internet PAT on that 10.1.76.6 address, and then just use that /29 range for MX and A records for internal NATted devices?&amp;nbsp; Is there otherwise a way to get everything, including IPSec and NetConnect routed over that /29 range?&lt;/P&gt;&lt;P&gt;Thank you for reading through this lengthy explanation.&amp;nbsp; Any assistance would be greatly appreciated.&lt;/P&gt;&lt;P&gt;-KW&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 04 Apr 2012 22:59:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-do-i-configure-an-external-interface-for-a-direct-fiber/m-p/15581#M11411</guid>
      <dc:creator>kwarner23</dc:creator>
      <dc:date>2012-04-04T22:59:51Z</dc:date>
    </item>
    <item>
      <title>Re: How do I configure an external interface for a direct fiber (metro ethernet) connection?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-do-i-configure-an-external-interface-for-a-direct-fiber/m-p/15582#M11412</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You'd need the NAT rules to be able to address your MX records&lt;/P&gt;&lt;P&gt;For IPSEC you can terminate your tunnels on the loopback interfaces&lt;/P&gt;&lt;P&gt;Ideally you want to keep your NETCONNECT and IPSEC connections on two different IP addresses, so terminate the IPSEC on loopbacks&lt;/P&gt;&lt;P&gt;and you can terminate the NETCONNECT on the actual interface IP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So long as you have NAT rules configured and traffic is being routed to your PAN FW, you can just configure the incoming connections and NAT them down to your internal servers&lt;/P&gt;&lt;P&gt;Hope this helps&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 09 Apr 2012 20:38:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-do-i-configure-an-external-interface-for-a-direct-fiber/m-p/15582#M11412</guid>
      <dc:creator>sjamaluddin</dc:creator>
      <dc:date>2012-04-09T20:38:22Z</dc:date>
    </item>
    <item>
      <title>Re: How do I configure an external interface for a direct fiber (metro ethernet) connection?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-do-i-configure-an-external-interface-for-a-direct-fiber/m-p/15583#M11413</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Also I think kwarner23 missplaced the /29 and /30 networks in the first post.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The /30 (if we speak IPv4) has 4 ip addresses (2 usable) and is in these situations often refered to as the "linknet" (or "link network"). Not uncommon that the linknet is using a private ip range (RFC918 - which means that it isnt (or shouldnt be) accessible from another ISP).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;While the /29 has 8 ip addresses (6 usable) and is often called the "routed network". Not uncommon that this routed network is a set of public ip addresses so it is accessible from other ISPs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This gives that in your router (well PAN in your case) you setup it to use ip 10.1.76.6 mask 255.255.255.252 (/30) with 10.1.76.5 as defgw. And your ISP will set 10.1.76.6 as nexthop for 10.0.194.112/29 (which then they announce in their network as a valid range and to which distrouter it belongs to).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So if your linknet is using public ip addresses then I would use the PAN ip address to terminate the incoming encryped VPN-tunnels (unless you use a dedicated box for this sitting on a DMZ but then you would use one of the routed addresses for this). Otherwise you could (I think) setup one of the /29 addresses as localinterface with mask /32 and let the other VPN hosts connect to this ip (this way the PAN will still handle the VPN-connections - again unless you use a dedicated box for this in a DMZ).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also I guess that 10.0.194.112/29 was just an example from your side since this range aint routable over the Internet (on the other hand perhaps it isnt the Internet you are connected to)?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the /29 is a range of public addresses I would avoid using NAT if possible (on the other hand you would then lose 2 addresses as net/broadcast if you for example use 10.0.194.112/30 as DMZ and 10.0.194.116/30 as outgoing SNAT addresses for surfing or whatever)..&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 09 Apr 2012 22:49:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-do-i-configure-an-external-interface-for-a-direct-fiber/m-p/15583#M11413</guid>
      <dc:creator>mikand</dc:creator>
      <dc:date>2012-04-09T22:49:28Z</dc:date>
    </item>
    <item>
      <title>Re: How do I configure an external interface for a direct fiber (metro ethernet) connection?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-do-i-configure-an-external-interface-for-a-direct-fiber/m-p/15584#M11414</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am currently out of the office and will be returning on Thursday, April 12, 2012.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you need immediate assistance, please contact the COMPUTERLINKS Technical Support group via phone at +1 512 672 8903; or by using the appropriate support phone number within your support contract.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Darren Sharenko&lt;/P&gt;&lt;P&gt;Sales Engineer&lt;/P&gt;&lt;P&gt;COMPUTERLINKS North America&lt;/P&gt;&lt;P&gt;11500 Metric Blvd, Suite 300&lt;/P&gt;&lt;P&gt;Austin, TX 78758&lt;/P&gt;&lt;P&gt;T:  1 512 672 8903&lt;/P&gt;&lt;P&gt;darren.sharenko@computerlinks.com&lt;/P&gt;&lt;P&gt;www.computerlinks.com&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 09 Apr 2012 22:50:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-do-i-configure-an-external-interface-for-a-direct-fiber/m-p/15584#M11414</guid>
      <dc:creator>darren_sharenko</dc:creator>
      <dc:date>2012-04-09T22:50:44Z</dc:date>
    </item>
    <item>
      <title>Re: How do I configure an external interface for a direct fiber (metro ethernet) connection?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-do-i-configure-an-external-interface-for-a-direct-fiber/m-p/15585#M11415</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ehm... is it possible for someone from PAN to disable this magic SMTP interaction which this forum seems to have since autoreplies are posted directly into the threads (for obviously no use)?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 09 Apr 2012 23:02:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-do-i-configure-an-external-interface-for-a-direct-fiber/m-p/15585#M11415</guid>
      <dc:creator>mikand</dc:creator>
      <dc:date>2012-04-09T23:02:26Z</dc:date>
    </item>
    <item>
      <title>Re: How do I configure an external interface for a direct fiber (metro ethernet) connection?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-do-i-configure-an-external-interface-for-a-direct-fiber/m-p/15586#M11416</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you for your reply.&amp;nbsp; I am starting by attempting to migrate my IPSec tunnels from our old ISP to the new one.&amp;nbsp; I can successfully terminate the tunnels on the IP of the physical interface (in this example it was 10.1.76.6), but when I attempt to terminate on a loopback address (in this example 10.0.194.118), the remote Cisco ASA gets stuck during phase 1 of the key exchange with a "MM_WAIT_MSG2" error.&amp;nbsp; I tried re-entering the pre-shared key on both ends, but that didn't work.&lt;/P&gt;&lt;P&gt;My policies (NAT and Security) that pertain to the IPSec VPNs specifically are pretty simple.&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;NAT&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Name = No_NAT, Source zone = any, Dest. zone = any, Dest. Address = 192.168.192.0/24 (the private range of the remote network).&amp;nbsp; On the physical interface, I hadn't had any source or destination translations set up, and wouldn't think I'd have to, given that the VPN is terminating on the outside of the firewall.&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;Security&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Permit anything into Trust zone or DMZ zone (zones that live "behind" the firewall) from VPN zone (zone that encompasses the IP ranges of all of the remote networks that connect via IPSec VPN).&lt;/P&gt;&lt;P&gt;So I can see how NAT will work when I'm moving MX and A records, but terminating IPSec on the loopback is so far proving problematic.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Apr 2012 20:04:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-do-i-configure-an-external-interface-for-a-direct-fiber/m-p/15586#M11416</guid>
      <dc:creator>kwarner23</dc:creator>
      <dc:date>2012-04-10T20:04:42Z</dc:date>
    </item>
    <item>
      <title>Re: How do I configure an external interface for a direct fiber (metro ethernet) connection?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-do-i-configure-an-external-interface-for-a-direct-fiber/m-p/15587#M11417</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for your reply.&amp;nbsp; I did transpose the /29 and /30 as you'd suggested.&amp;nbsp; It's correct in my diagram, but wrong in my text.&amp;nbsp; You're also correct that I've anonymized the IPs and my example uses a private range.&lt;/P&gt;&lt;P&gt;My first step has been to start migrating the IPSec VPNs over to the new ISP.&amp;nbsp; I've been successful in putting those onto the IP of the physical interface (in this example 10.1.76.6), but have thus far been unable to get those onto a loopback address (in this example, I'm attempting 10.0.194.118).&amp;nbsp; I would be comfortable terminating those IPSec VPNs on the 10.1.76.6 address, but another respondent recommended putting these onto one of the loopback interfaces and saving the physical interface IP for NetConnect.&amp;nbsp; In hindsight, though, with our old ISP, we've had NetConnect and the IPSec tunnels terminated on the same IP address on a physical interface.&amp;nbsp; So maybe I could just terminate NetConnect and the IPSec VPNs on the physical IP, and then just save the loopbacks for my NAT translations?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Apr 2012 20:12:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-do-i-configure-an-external-interface-for-a-direct-fiber/m-p/15587#M11417</guid>
      <dc:creator>kwarner23</dc:creator>
      <dc:date>2012-04-10T20:12:27Z</dc:date>
    </item>
    <item>
      <title>Re: How do I configure an external interface for a direct fiber (metro ethernet) connection?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-do-i-configure-an-external-interface-for-a-direct-fiber/m-p/15588#M11418</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes you can terminate both the IPSEC and NETconnect onto the same physical&amp;nbsp; interface - one will use ssl and the other IPSEC so you should be ok.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you create NAT rules using those IP addresses - you *should not need any loopbacks and the PAN FW should just proxy for those IP addresses for which is has the NAT rules.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Apr 2012 21:37:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-do-i-configure-an-external-interface-for-a-direct-fiber/m-p/15588#M11418</guid>
      <dc:creator>sjamaluddin</dc:creator>
      <dc:date>2012-04-10T21:37:40Z</dc:date>
    </item>
  </channel>
</rss>

