<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Extending VLAN through IPSEC + GRE in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/extending-vlan-through-ipsec-gre/m-p/586814#M117104</link>
    <description>&lt;P&gt;More than likely your experience here:&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Brandon_Wertz_0-1715788144222.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/59698i7F508FD542A0EAE3/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="Brandon_Wertz_0-1715788144222.png" alt="Brandon_Wertz_0-1715788144222.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;is because you didn't have ECMP enabled.&amp;nbsp; The setting is in your VR setup:&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Brandon_Wertz_1-1715788237381.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/59699i1904005877A88A02/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="Brandon_Wertz_1-1715788237381.png" alt="Brandon_Wertz_1-1715788237381.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 15 May 2024 15:50:53 GMT</pubDate>
    <dc:creator>Brandon_Wertz</dc:creator>
    <dc:date>2024-05-15T15:50:53Z</dc:date>
    <item>
      <title>Extending VLAN through IPSEC + GRE</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/extending-vlan-through-ipsec-gre/m-p/585121#M116816</link>
      <description>&lt;P&gt;I am trying to extend the VLAN from main site to branch site using a combination of GRE and IPSEC.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Below is a quick representation of the architecture, the objective is to enable remote communications between the main and the branch sites for all devices within VLAN-1.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="OELHANCHI_0-1714232289883.png" style="width: 485px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/59327i2B3F04AEF4CAA556/image-dimensions/485x234/is-moderation-mode/true?v=v2" width="485" height="234" role="button" title="OELHANCHI_0-1714232289883.png" alt="OELHANCHI_0-1714232289883.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am aware that PA does not natively provide L2 tunnels, and VXLAN would be the more appropriate solution for this kind of need, but right now just wondering if this is even possible with only 2 PA firewalls ?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;What i've achieved so far is a ping from 172.28.89.252 to 172.28.89.254 and vice-versa, which is a good start, but whenever i try to route towards 172.28.88.250 through the GRE or IPSEC tunnel, i either get a TTL exceeded indicating a loop somewhere, or no response at all.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I'm also exploring other avenues at the same time such as redistributing static routes with OSPF or BGP over IPSEC, but to no avail so far.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Any insight would definitely be greatly appreciated !&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 27 Apr 2024 15:38:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/extending-vlan-through-ipsec-gre/m-p/585121#M116816</guid>
      <dc:creator>O.ELHANCHI</dc:creator>
      <dc:date>2024-04-27T15:38:44Z</dc:date>
    </item>
    <item>
      <title>Re: Extending VLAN through IPSEC + GRE</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/extending-vlan-through-ipsec-gre/m-p/586620#M117071</link>
      <description>&lt;P&gt;This is not supported with PA unfortunately.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;GRE is limited to L3.&lt;/P&gt;</description>
      <pubDate>Tue, 14 May 2024 09:39:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/extending-vlan-through-ipsec-gre/m-p/586620#M117071</guid>
      <dc:creator>O.ELHANCHI</dc:creator>
      <dc:date>2024-05-14T09:39:05Z</dc:date>
    </item>
    <item>
      <title>Re: Extending VLAN through IPSEC + GRE</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/extending-vlan-through-ipsec-gre/m-p/586692#M117082</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/266280"&gt;@O.ELHANCHI&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;
&lt;P&gt;I am trying to extend the VLAN from main site to branch site using a combination of GRE and IPSEC.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Below is a quick representation of the architecture, the objective is to enable remote communications between the main and the branch sites for all devices within VLAN-1.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="OELHANCHI_0-1714232289883.png" style="width: 485px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/59327i2B3F04AEF4CAA556/image-dimensions/485x234/is-moderation-mode/true?v=v2" width="485" height="234" role="button" title="OELHANCHI_0-1714232289883.png" alt="OELHANCHI_0-1714232289883.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am aware that PA does not natively provide L2 tunnels, and VXLAN would be the more appropriate solution for this kind of need, but right now just wondering if this is even possible with only 2 PA firewalls ?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;What i've achieved so far is a ping from 172.28.89.252 to 172.28.89.254 and vice-versa, which is a good start, but whenever i try to route towards 172.28.88.250 through the GRE or IPSEC tunnel, i either get a TTL exceeded indicating a loop somewhere, or no response at all.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I'm also exploring other avenues at the same time such as redistributing static routes with OSPF or BGP over IPSEC, but to no avail so far.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Any insight would definitely be greatly appreciated !&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;To me this would really be reliant upon the 2 independent networks and how the PA would route to those networks.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The branch fw would have a route that points 172.28.88.0/23 to eth 2/1 and a route for&amp;nbsp;172.28.88.0/23 to eth1/1 and vice versa at the main location.&amp;nbsp; You will want ECMP on both firewalls as well.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;At this point it would be "luck" as to the path the packet took from the firewall.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I don't really think this scenario would functionally work very well, but it could get you what you wanted.&lt;/P&gt;</description>
      <pubDate>Tue, 14 May 2024 18:49:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/extending-vlan-through-ipsec-gre/m-p/586692#M117082</guid>
      <dc:creator>Brandon_Wertz</dc:creator>
      <dc:date>2024-05-14T18:49:18Z</dc:date>
    </item>
    <item>
      <title>Re: Extending VLAN through IPSEC + GRE</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/extending-vlan-through-ipsec-gre/m-p/586705#M117084</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/5300"&gt;@Brandon_Wertz&lt;/a&gt;&amp;nbsp;wrote:
&lt;P class="1715724013816"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The branch fw would have a route that points 172.28.88.0/23 to eth 2/1 and a route for&amp;nbsp;172.28.88.0/23 to eth1/1 and vice versa at the main location.&amp;nbsp; You will want ECMP on both firewalls as well.&lt;/P&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;Hi and thank you for your contribution to this topic,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I assume from this sentence, that you meant directing&amp;nbsp;&lt;SPAN&gt;172.28.88.0/23&amp;nbsp;to eth1/1 on both sides, as branch fw can not directly point to remote eth2/1, except through the tunnel interface which is eth1/1 in this case.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;In which case yes, this is something i've already tried of couple weeks ago, i had a static route on each firewall directing subnet 172.28.88.0/23 through the tunnel interface with a metric of 1. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;What happened in this case was that i could see the ping reaching all the way from the branch fw to the main fw, to the host natted behind the main fw. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I did a wireshark on 172.28.88.250 and was able to see the echo requests all the way from the branch fw, but no reply. I believe the exact reply packet showed a "No response found", if my memory serves me right.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This seemed to indicate that ARP on main site wasn't capable of going through the tunnel, however what i did not try is setting up ECMP.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Obviously would love to give this solution an other try, as it is from my perspective, the most simple to implement, and while it's for many many reasons not ideal to opt for most scenarios, in this particular use case, the pros outweighs the cons in a pretty substantial manner (geographic proximity &amp;lt; 5km, no duplicate addresses etc., simplicity, L2 traffic)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 14 May 2024 22:14:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/extending-vlan-through-ipsec-gre/m-p/586705#M117084</guid>
      <dc:creator>O.ELHANCHI</dc:creator>
      <dc:date>2024-05-14T22:14:25Z</dc:date>
    </item>
    <item>
      <title>Re: Extending VLAN through IPSEC + GRE</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/extending-vlan-through-ipsec-gre/m-p/586814#M117104</link>
      <description>&lt;P&gt;More than likely your experience here:&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Brandon_Wertz_0-1715788144222.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/59698i7F508FD542A0EAE3/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="Brandon_Wertz_0-1715788144222.png" alt="Brandon_Wertz_0-1715788144222.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;is because you didn't have ECMP enabled.&amp;nbsp; The setting is in your VR setup:&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Brandon_Wertz_1-1715788237381.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/59699i1904005877A88A02/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="Brandon_Wertz_1-1715788237381.png" alt="Brandon_Wertz_1-1715788237381.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 15 May 2024 15:50:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/extending-vlan-through-ipsec-gre/m-p/586814#M117104</guid>
      <dc:creator>Brandon_Wertz</dc:creator>
      <dc:date>2024-05-15T15:50:53Z</dc:date>
    </item>
    <item>
      <title>Re: Extending VLAN through IPSEC + GRE</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/extending-vlan-through-ipsec-gre/m-p/586961#M117126</link>
      <description>&lt;P&gt;Hey &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/5300"&gt;@Brandon_Wertz&lt;/a&gt;&amp;nbsp;, thank you again, took off some time today to try this out, as I was very curious.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Here are the screenshots if you would still be interested in landing me some more insights&amp;nbsp; :&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Below are the results of a ping from branch fw 172.28.89.252 to a natted host behind main fw, 172.28.89.248&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Logs from Main FW (172.28.89.254). As you can see the ping arrives well through the tunnel.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="OELHANCHI_0-1715864225431.png" style="width: 912px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/59730i27727DF4F6570A29/image-dimensions/912x114/is-moderation-mode/true?v=v2" width="912" height="114" role="button" title="OELHANCHI_0-1715864225431.png" alt="OELHANCHI_0-1715864225431.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;And below the wireshark results on the natted host 172.28.89.248, with the infamous no response found icmp packets even with ECMP enabled on both sides quite unfortunately :&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="OELHANCHI_1-1715864330054.png" style="width: 838px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/59732i95934271CF726E2E/image-dimensions/838x210/is-moderation-mode/true?v=v2" width="838" height="210" role="button" title="OELHANCHI_1-1715864330054.png" alt="OELHANCHI_1-1715864330054.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For completeness sake here are the related routes left in my VR configuration on Main FW ... technically you can disregard the last 2 routes, they are remainings from previous tests, only the first one really matters in this.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="OELHANCHI_6-1715864846479.png" style="width: 840px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/59737iE314A72DD5FFE26A/image-dimensions/840x55/is-moderation-mode/true?v=v2" width="840" height="55" role="button" title="OELHANCHI_6-1715864846479.png" alt="OELHANCHI_6-1715864846479.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;And VR on the branch FW looks like this:&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="OELHANCHI_5-1715864683788.png" style="width: 860px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/59736i125CA3C90B426180/image-dimensions/860x65/is-moderation-mode/true?v=v2" width="860" height="65" role="button" title="OELHANCHI_5-1715864683788.png" alt="OELHANCHI_5-1715864683788.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;As a side note the packet wouldn't reach branch FW without the last explicit route ... Strange.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Both sites have ECMP enabled on their VR like so :&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="OELHANCHI_3-1715864646031.png" style="width: 645px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/59734i0261E5C7B6191D75/image-dimensions/645x311/is-moderation-mode/true?v=v2" width="645" height="311" role="button" title="OELHANCHI_3-1715864646031.png" alt="OELHANCHI_3-1715864646031.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Any suggestion ?&amp;nbsp;&lt;span class="lia-unicode-emoji" title=":smiling_face_with_halo:"&gt;😇&lt;/span&gt;&lt;/P&gt;
&lt;P style="line-height: 1.71429;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 16 May 2024 13:18:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/extending-vlan-through-ipsec-gre/m-p/586961#M117126</guid>
      <dc:creator>O.ELHANCHI</dc:creator>
      <dc:date>2024-05-16T13:18:44Z</dc:date>
    </item>
  </channel>
</rss>

