<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: S2S IPsec VPN with Multiple Domain Encryption in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/s2s-ipsec-vpn-with-multiple-domain-encryption/m-p/1247309#M125949</link>
    <description>&lt;P&gt;I have PA1420 on my side but remote Peer has Cisco NGFW using Policy based VPN. how will these two behave on handling multiple domain encryptions?&lt;/P&gt;</description>
    <pubDate>Tue, 03 Feb 2026 10:56:28 GMT</pubDate>
    <dc:creator>R.Thakar</dc:creator>
    <dc:date>2026-02-03T10:56:28Z</dc:date>
    <item>
      <title>S2S IPsec VPN with Multiple Domain Encryption</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/s2s-ipsec-vpn-with-multiple-domain-encryption/m-p/1247163#M125943</link>
      <description>&lt;P&gt;&lt;SPAN&gt;We have experiencing difficulties having more than one domain encryption in IPsec tunnel, specifically when both are in the same subnet. Only one domain encryption remains active in the IPsec phase2. There are few times you can bounce IPsec gateway and restore connection to affected domain encryption, but after some time again connection lost to the node. Please assist.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;#PA1420&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 02 Feb 2026 06:00:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/s2s-ipsec-vpn-with-multiple-domain-encryption/m-p/1247163#M125943</guid>
      <dc:creator>R.Thakar</dc:creator>
      <dc:date>2026-02-02T06:00:06Z</dc:date>
    </item>
    <item>
      <title>Re: S2S IPsec VPN with Multiple Domain Encryption</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/s2s-ipsec-vpn-with-multiple-domain-encryption/m-p/1247203#M125944</link>
      <description>&lt;P&gt;Palo can't care less about ProxyID's / encryption domains.&lt;/P&gt;
&lt;P&gt;They are there only to make peer side happy when peer supports policy based VPN.&lt;/P&gt;
&lt;P&gt;Palo uses routing table to decide where traffic should go to.&lt;/P&gt;
&lt;P&gt;If you have 2 Palos, then you don't need to use ProxyID at all and then both sides will send 0.0.0.0/0 over to each other behind the scenes.&lt;/P&gt;</description>
      <pubDate>Mon, 02 Feb 2026 14:09:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/s2s-ipsec-vpn-with-multiple-domain-encryption/m-p/1247203#M125944</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2026-02-02T14:09:03Z</dc:date>
    </item>
    <item>
      <title>Re: S2S IPsec VPN with Multiple Domain Encryption</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/s2s-ipsec-vpn-with-multiple-domain-encryption/m-p/1247309#M125949</link>
      <description>&lt;P&gt;I have PA1420 on my side but remote Peer has Cisco NGFW using Policy based VPN. how will these two behave on handling multiple domain encryptions?&lt;/P&gt;</description>
      <pubDate>Tue, 03 Feb 2026 10:56:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/s2s-ipsec-vpn-with-multiple-domain-encryption/m-p/1247309#M125949</guid>
      <dc:creator>R.Thakar</dc:creator>
      <dc:date>2026-02-03T10:56:28Z</dc:date>
    </item>
    <item>
      <title>Re: S2S IPsec VPN with Multiple Domain Encryption</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/s2s-ipsec-vpn-with-multiple-domain-encryption/m-p/1247317#M125953</link>
      <description>&lt;P&gt;Ok in this case you do need ProxyIDs.&lt;/P&gt;
&lt;P&gt;You mentioned they are overlapping.&lt;/P&gt;
&lt;P&gt;Can you bring few examples how they overlap?&lt;/P&gt;</description>
      <pubDate>Tue, 03 Feb 2026 13:31:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/s2s-ipsec-vpn-with-multiple-domain-encryption/m-p/1247317#M125953</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2026-02-03T13:31:25Z</dc:date>
    </item>
    <item>
      <title>Re: S2S IPsec VPN with Multiple Domain Encryption</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/s2s-ipsec-vpn-with-multiple-domain-encryption/m-p/1247487#M125960</link>
      <description>&lt;P&gt;sorry, I cant recall how I used the word "overlapping". But the how it was is, we have one Domain encryption on PA side, and two Domain encryption from remote peer who are using cisco NGFW. And,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Kind of strange, I tried to create rule for each domain encryption and put /32 on each IP and seems okay now. Any idea on this?&lt;/P&gt;</description>
      <pubDate>Thu, 05 Feb 2026 05:19:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/s2s-ipsec-vpn-with-multiple-domain-encryption/m-p/1247487#M125960</guid>
      <dc:creator>R.Thakar</dc:creator>
      <dc:date>2026-02-05T05:19:47Z</dc:date>
    </item>
    <item>
      <title>Re: S2S IPsec VPN with Multiple Domain Encryption</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/s2s-ipsec-vpn-with-multiple-domain-encryption/m-p/1247528#M125967</link>
      <description>&lt;P&gt;I interpreted "&lt;SPAN&gt;specifically when both are in the same subnet" as "overlapping".&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Palo does not try to keep tunnels/proxyid's/encryption-domains active if there is no traffic trying to pass tunnel.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;So if your Phase 2 timeout is 1 hour and no traffic for this time then tunnel is taken down.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;If it bothers you, then you can configure tunnel monitoring in IPSec config or path monitoring in virtual router to keep tunnels up.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 05 Feb 2026 13:39:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/s2s-ipsec-vpn-with-multiple-domain-encryption/m-p/1247528#M125967</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2026-02-05T13:39:11Z</dc:date>
    </item>
  </channel>
</rss>

