<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: GlobalProtect, enabling ipsec from outside in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-enabling-ipsec-from-outside/m-p/28940#M21154</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Did that resolved your issue? Please do let us know. Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 10 Oct 2012 22:13:03 GMT</pubDate>
    <dc:creator>ssharma</dc:creator>
    <dc:date>2012-10-10T22:13:03Z</dc:date>
    <item>
      <title>GlobalProtect, enabling ipsec from outside</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-enabling-ipsec-from-outside/m-p/28937#M21151</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am trying to enable Global Protect. So far I've been able to connect the client to the firewall successfully. However the remote VPN client cannot talk to inside hosts. But the inside hosts can ping the remote client.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After troubleshooting, I found&amp;nbsp; IPSec traffic is blocked at the outside interface (which blocks everything). When I enable all incoming traffic on the outside interface the remote client is able to talk to the inside zone.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've now enabled "IPSec" application group to be passed through the outside interface, however the remote client is still unable to talk to the inside zone. Is there a standard set of applications/services that needs to be allowed on the outside interface for GlobalProtect clients?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Many thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 09 Oct 2012 02:27:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-enabling-ipsec-from-outside/m-p/28937#M21151</guid>
      <dc:creator>BTS_MS</dc:creator>
      <dc:date>2012-10-09T02:27:38Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect, enabling ipsec from outside</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-enabling-ipsec-from-outside/m-p/28938#M21152</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;On the rule that you have enabled "IPSec", please go ahead and add following as well " &lt;SPAN style="color: #222222; font-family: Tahoma, Arial, Helvetica, sans-serif; font-size: 11px; background-color: #ebedee;"&gt;panos-global-protect&lt;/SPAN&gt;&lt;SPAN style="color: #222222; font-family: Tahoma, Arial, Helvetica, sans-serif; font-size: 11px; background-color: #ebedee;"&gt;, &lt;/SPAN&gt;&lt;SPAN style="color: #222222; font-family: Tahoma, Arial, Helvetica, sans-serif; font-size: 11px; background-color: #ebedee;"&gt;ike, ipsec-esp-udp, panos-web-interface, ssl&lt;/SPAN&gt;". This should resolve the issue.Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 09 Oct 2012 03:39:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-enabling-ipsec-from-outside/m-p/28938#M21152</guid>
      <dc:creator>ssharma</dc:creator>
      <dc:date>2012-10-09T03:39:02Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect, enabling ipsec from outside</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-enabling-ipsec-from-outside/m-p/28939#M21153</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;you can allow the above said applications, alternatively you can place the tunnel interface in the internal zone that way you need not create any security policies.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 09 Oct 2012 04:02:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-enabling-ipsec-from-outside/m-p/28939#M21153</guid>
      <dc:creator>sdurga</dc:creator>
      <dc:date>2012-10-09T04:02:48Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect, enabling ipsec from outside</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-enabling-ipsec-from-outside/m-p/28940#M21154</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Did that resolved your issue? Please do let us know. Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 10 Oct 2012 22:13:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-enabling-ipsec-from-outside/m-p/28940#M21154</guid>
      <dc:creator>ssharma</dc:creator>
      <dc:date>2012-10-10T22:13:03Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect, enabling ipsec from outside</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-enabling-ipsec-from-outside/m-p/28941#M21155</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Putting the tunnel interface on the inside zone fixed the problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Opening up the apps on the outside interface did not, however I didn't have much time to troubleshoot this scenario, so it is possible I missed something.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the help guys.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 12 Oct 2012 04:25:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-enabling-ipsec-from-outside/m-p/28941#M21155</guid>
      <dc:creator>BTS_MS</dc:creator>
      <dc:date>2012-10-12T04:25:29Z</dc:date>
    </item>
  </channel>
</rss>

