<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Pa VPN IPsec in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/pa-vpn-ipsec/m-p/34502#M25311</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Sarah,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You may follow this KB article &lt;A href="https://live.paloaltonetworks.com/docs/DOC-6791"&gt;How to Configure IPSEC VPN&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;gt; &lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;Make sure PAN has been always the VPN initiator &lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;( &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;enable "passive mode" in other end device)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;&amp;gt; Enable NAT-Traversal on both end firewalls.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 04 Nov 2014 14:37:11 GMT</pubDate>
    <dc:creator>HULK</dc:creator>
    <dc:date>2014-11-04T14:37:11Z</dc:date>
    <item>
      <title>Pa VPN IPsec</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-vpn-ipsec/m-p/34495#M25304</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i have a question regarding the VPN IPsec on Paloalto , is palotlo must be in front end when configuring the PA&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sarah&lt;/P&gt;&lt;DIV style="display: none;"&gt; &lt;/DIV&gt;&lt;DIV style="display: none;"&gt; &lt;/DIV&gt;&lt;DIV style="display: none;"&gt; &lt;/DIV&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Nov 2014 14:16:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-vpn-ipsec/m-p/34495#M25304</guid>
      <dc:creator>atelcom</dc:creator>
      <dc:date>2014-11-04T14:16:40Z</dc:date>
    </item>
    <item>
      <title>Re: Pa VPN IPsec</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-vpn-ipsec/m-p/34496#M25305</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Sarah,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could you please explain, what do you mean by "&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;front end". It will help us to understand your exact requirement.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Nov 2014 14:20:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-vpn-ipsec/m-p/34496#M25305</guid>
      <dc:creator>HULK</dc:creator>
      <dc:date>2014-11-04T14:20:44Z</dc:date>
    </item>
    <item>
      <title>Re: Pa VPN IPsec</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-vpn-ipsec/m-p/34497#M25306</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Sarah,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;No that is not a requirement. You can use it as Pass through device as well, where it treats IPSec traffic as any other traffic and allows or denies as per policy configured. Though there are benefits with respect to threats, replay attacks when you configure it as front end or edge device but that is not a requirement. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps. Thank you. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Nov 2014 14:23:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-vpn-ipsec/m-p/34497#M25306</guid>
      <dc:creator>ssharma</dc:creator>
      <dc:date>2014-11-04T14:23:11Z</dc:date>
    </item>
    <item>
      <title>Re: Pa VPN IPsec</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-vpn-ipsec/m-p/34498#M25307</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;here is the architecture,i want to know if the vpn ipsec must be configured on the stonsoft ,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;or we can do that in the PA with private addresses&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="sdfdgfdhgfdh.PNG" class="image-0 jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/16724_sdfdgfdhgfdh.PNG" style="height: 438px; width: 620px;" /&gt;&lt;/P&gt;&lt;DIV style="display: none;"&gt; &lt;/DIV&gt;&lt;DIV style="display: none;"&gt; &lt;/DIV&gt;&lt;DIV style="display: none;"&gt; &lt;/DIV&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Nov 2014 14:27:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-vpn-ipsec/m-p/34498#M25307</guid>
      <dc:creator>atelcom</dc:creator>
      <dc:date>2014-11-04T14:27:41Z</dc:date>
    </item>
    <item>
      <title>Re: Pa VPN IPsec</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-vpn-ipsec/m-p/34499#M25308</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yeah i know that,but i want to know if i can configure the vpn ipsec on the paloalto with private adresses&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thank you&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sarah&lt;/P&gt;&lt;DIV style="display: none;"&gt; &lt;/DIV&gt;&lt;DIV style="display: none;"&gt; &lt;/DIV&gt;&lt;DIV style="display: none;"&gt; &lt;/DIV&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Nov 2014 14:29:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-vpn-ipsec/m-p/34499#M25308</guid>
      <dc:creator>atelcom</dc:creator>
      <dc:date>2014-11-04T14:29:03Z</dc:date>
    </item>
    <item>
      <title>Re: Pa VPN IPsec</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-vpn-ipsec/m-p/34500#M25309</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello &lt;SPAN style="font-size: 12px; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;&lt;STRONG&gt;&lt;A _jive_internal="true" class="jiveTT-hover-user jive-username-link" data-avatarid="-1" data-externalid="" data-presence="null" data-userid="14471" data-username="atelcom" href="https://live.paloaltonetworks.com/people/atelcom" style="padding: 0 3px 0 0; font-weight: inherit; font-style: inherit; font-size: 1.1em; font-family: inherit; color: #006595;"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;atelcom&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt; ,&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes, You can configure the VPN tunnel with Private IP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Nov 2014 14:30:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-vpn-ipsec/m-p/34500#M25309</guid>
      <dc:creator>HULK</dc:creator>
      <dc:date>2014-11-04T14:30:31Z</dc:date>
    </item>
    <item>
      <title>Re: Pa VPN IPsec</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-vpn-ipsec/m-p/34501#M25310</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, you can configure it with private address as well. The requirement is same as with public IP all phase 1 and phase 2 should match. Otherwise there is no difference. Hope this helps. Thank you.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Nov 2014 14:30:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-vpn-ipsec/m-p/34501#M25310</guid>
      <dc:creator>ssharma</dc:creator>
      <dc:date>2014-11-04T14:30:56Z</dc:date>
    </item>
    <item>
      <title>Re: Pa VPN IPsec</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-vpn-ipsec/m-p/34502#M25311</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Sarah,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You may follow this KB article &lt;A href="https://live.paloaltonetworks.com/docs/DOC-6791"&gt;How to Configure IPSEC VPN&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;gt; &lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;Make sure PAN has been always the VPN initiator &lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;( &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;enable "passive mode" in other end device)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;&amp;gt; Enable NAT-Traversal on both end firewalls.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Nov 2014 14:37:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-vpn-ipsec/m-p/34502#M25311</guid>
      <dc:creator>HULK</dc:creator>
      <dc:date>2014-11-04T14:37:11Z</dc:date>
    </item>
  </channel>
</rss>

