<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Multiple SSL VPN tunnels to same endpoint - possible? in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/multiple-ssl-vpn-tunnels-to-same-endpoint-possible/m-p/25866#M18872</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hi Kelly.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The DMZ is a public routable IP address, so it should be dead easy.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I just wasn't sure what I'd need to let in from outside to the destination IP address - now I do.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your help, and I can go away and set it up now.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 25 Nov 2010 05:41:36 GMT</pubDate>
    <dc:creator>dagibbs</dc:creator>
    <dc:date>2010-11-25T05:41:36Z</dc:date>
    <item>
      <title>Multiple SSL VPN tunnels to same endpoint - possible?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/multiple-ssl-vpn-tunnels-to-same-endpoint-possible/m-p/25862#M18868</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I run a pair of PA 2050's on my internet edge, and currently use them for terminating an SSL VPN for staff to remote access internal resources.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I want to put in a second SSL VPN, different IP range, different security zone, much more restricted for contractors/external support staff so I can let them logon and access specific services without giving carte blanche access to the rest of the network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I tried building another SSL VPN and setting it up on the same external IP (our outside interface), but the OS wouldn't allow me to do so.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is this possible? Or is there some workaround? Can I use an IP address on another interface (a DMZ) to terminate the second SSl VPN and just have the external staff login to that instead of the main one?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 25 Nov 2010 01:57:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/multiple-ssl-vpn-tunnels-to-same-endpoint-possible/m-p/25862#M18868</guid>
      <dc:creator>dagibbs</dc:creator>
      <dc:date>2010-11-25T01:57:34Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple SSL VPN tunnels to same endpoint - possible?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/multiple-ssl-vpn-tunnels-to-same-endpoint-possible/m-p/25863#M18869</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi there,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes, this is possible.&amp;nbsp; You can configure multiple SSL VPN Portals on the device but they need to be bound to different IP addresses.&amp;nbsp; One Portal would be for your corporate users and one would be for your external contractors.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can use any L3 interface or sub-interface, including loopbacks and VLAN Interfaces, to bind the SSL VPN Portals.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kelly&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 25 Nov 2010 02:14:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/multiple-ssl-vpn-tunnels-to-same-endpoint-possible/m-p/25863#M18869</guid>
      <dc:creator>kbrazil</dc:creator>
      <dc:date>2010-11-25T02:14:47Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple SSL VPN tunnels to same endpoint - possible?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/multiple-ssl-vpn-tunnels-to-same-endpoint-possible/m-p/25864#M18870</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Kelly.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;OK, so I've got an available IP address on a DMZ interface which is "inside" the normal external address - what security policy would I need to put in place to allow a VPN to terminate on this address? Being that this interface is in the "DMZ" zone?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Or would an interface management profile allowing http/https be sufficient to allow this to work?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 25 Nov 2010 02:21:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/multiple-ssl-vpn-tunnels-to-same-endpoint-possible/m-p/25864#M18870</guid>
      <dc:creator>dagibbs</dc:creator>
      <dc:date>2010-11-25T02:21:22Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple SSL VPN tunnels to same endpoint - possible?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/multiple-ssl-vpn-tunnels-to-same-endpoint-possible/m-p/25865#M18871</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If the IP address in the DMZ is a publicly routable address, then this should be pretty straightforward.&amp;nbsp; You would have a policy from Untrust to DMZ zones allowing any IP to the SSL VPN IP.&amp;nbsp; You would allow SSL, IKE, and IPSEC-ESP-UDP to the IP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the IP address is private then you will need a NAT policy in addition to the above Security policy.&amp;nbsp; The NAT policy will be an out-bound source-nat from the SSL VPN IP out to the internet (DMZ to Untrust zone).&amp;nbsp; Make sure the check the "bi-directional" checkbox on the source-nat translation window and you should be set.&amp;nbsp; Put this rule at the top of the NAT policy in case there are other out-bound NAT rules that might take precedence.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Of course you will then need your DMZ to Trust security policies to allow the contractors limited access to the internal resources once the tunnel is established.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kelly&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 25 Nov 2010 04:07:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/multiple-ssl-vpn-tunnels-to-same-endpoint-possible/m-p/25865#M18871</guid>
      <dc:creator>kbrazil</dc:creator>
      <dc:date>2010-11-25T04:07:59Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple SSL VPN tunnels to same endpoint - possible?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/multiple-ssl-vpn-tunnels-to-same-endpoint-possible/m-p/25866#M18872</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hi Kelly.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The DMZ is a public routable IP address, so it should be dead easy.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I just wasn't sure what I'd need to let in from outside to the destination IP address - now I do.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your help, and I can go away and set it up now.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 25 Nov 2010 05:41:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/multiple-ssl-vpn-tunnels-to-same-endpoint-possible/m-p/25866#M18872</guid>
      <dc:creator>dagibbs</dc:creator>
      <dc:date>2010-11-25T05:41:36Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple SSL VPN tunnels to same endpoint - possible?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/multiple-ssl-vpn-tunnels-to-same-endpoint-possible/m-p/25867#M18873</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey there,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think my brain was out to lunch - no need for IKE with SSL VPN. &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://live.paloaltonetworks.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After some digging, here are the correct Apps and Ports to allow for SSL VPN:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;web-browsing&lt;/STRONG&gt; app-id: this is because the PAN sees the decrypted SSL traffic when the user logs in via the web portal.&amp;nbsp; This will be on &lt;STRONG&gt;TCP port 443&lt;/STRONG&gt;.&amp;nbsp; you may optionally wish to allow this on &lt;STRONG&gt;TCP port 80&lt;/STRONG&gt; (in addition to port 443) to allow redirects to port 443 for the user's convenience when they attempt to log into the web portal.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;ssl&lt;/STRONG&gt; app-id: this is if the user starts the VPN without using the web portal.&amp;nbsp; Also, if SSL transport is being used for the VPN, the tunnel traffic will use this app-id.&amp;nbsp; This will be on &lt;STRONG&gt;TCP port 443&lt;/STRONG&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;ipsec-esp-udp&lt;/STRONG&gt; app-id:&amp;nbsp; this is the how the tunnel traffic will be identified if the IPSEC option is used and successfully negotiated during the session.&amp;nbsp; This will be on &lt;STRONG&gt;UDP port 4501&lt;/STRONG&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kelly&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 25 Nov 2010 20:02:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/multiple-ssl-vpn-tunnels-to-same-endpoint-possible/m-p/25867#M18873</guid>
      <dc:creator>kbrazil</dc:creator>
      <dc:date>2010-11-25T20:02:11Z</dc:date>
    </item>
  </channel>
</rss>

