<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ssl-vpn and IPsec tunnel Palo Alto with Check Point in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-vpn-and-ipsec-tunnel-palo-alto-with-check-point/m-p/36442#M26790</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Pablo,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To check the tunnel status, run the command from cli: show vpn flow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, do you have a security rule that allows traffic from your internal zone (the one where your test machine is) to vpn zone in which the tunnel is located? Make sure you also have a route configured on CP for the networks behind PAN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Sri Darapuneni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 20 Jul 2012 02:09:00 GMT</pubDate>
    <dc:creator>zarina</dc:creator>
    <dc:date>2012-07-20T02:09:00Z</dc:date>
    <item>
      <title>ssl-vpn and IPsec tunnel Palo Alto with Check Point</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-vpn-and-ipsec-tunnel-palo-alto-with-check-point/m-p/36441#M26789</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello all,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm hoping that somebody may be able to answer a few questions I have about the configuration of Palo Alto firewalls please?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I want to set up two differents VPN, one ssl-vpn and one IPsec, i do this because i want to conect to my firewall from wherever place (ssl-vpn) and the second one to conect to another firewall from other networks (IPsec). I configure the ssl-vpn succesfully and i have access to my firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Later I have set up a IPsec tunnel with a Check Point firewall and a Palo Alto firewall each with an inside and outside interface. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In order to get this working I have:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1) Confired IKE and IPSec Cryptos in PA to match CP&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2) Created tunnel interface and selected virtual router and the vpn zone (the one that i conect when i use Global Protect)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 3) Created IKE gateway specifying local interface, local IP, remote IP, pre-shared key and selected IKE crypto profile&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 4) Created IPSec tunnel specifying tunnel interface, IKE gateway (pulling in some values) and selecting IPSec crypto profile&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 4a) Added a proxy ID with the local internal network and the remote internal network&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 5) Add a static route to virtual router with destination of the remote internal network and tunnel created above as interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think that the IPsec was created correctly because the leds turn "green" on and i saw the system logs and i realice that the authentication in phase 1 and 2 was succesfull. But i'm having problem to get to the other side. I tried to do traceroute but i don't see that the package it's trying to get the other side using the tunnel.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the other side they have an IPS before the firewall, i was wondering if that's can generate me a problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think that the problem could be related with some static route that its missing or with using the ssl-vpn zone.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please i'll be really greatefull with any help that you could give me.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 13 Jul 2012 01:52:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-vpn-and-ipsec-tunnel-palo-alto-with-check-point/m-p/36441#M26789</guid>
      <dc:creator>Pablo.Atiaga</dc:creator>
      <dc:date>2012-07-13T01:52:10Z</dc:date>
    </item>
    <item>
      <title>Re: ssl-vpn and IPsec tunnel Palo Alto with Check Point</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-vpn-and-ipsec-tunnel-palo-alto-with-check-point/m-p/36442#M26790</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Pablo,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To check the tunnel status, run the command from cli: show vpn flow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, do you have a security rule that allows traffic from your internal zone (the one where your test machine is) to vpn zone in which the tunnel is located? Make sure you also have a route configured on CP for the networks behind PAN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Sri Darapuneni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 20 Jul 2012 02:09:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-vpn-and-ipsec-tunnel-palo-alto-with-check-point/m-p/36442#M26790</guid>
      <dc:creator>zarina</dc:creator>
      <dc:date>2012-07-20T02:09:00Z</dc:date>
    </item>
    <item>
      <title>Re: ssl-vpn and IPsec tunnel Palo Alto with Check Point</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ssl-vpn-and-ipsec-tunnel-palo-alto-with-check-point/m-p/36443#M26791</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the answer.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes i have created a security rule that allows the traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When i don't use the "vpn" zone, the IPsec works fine, but i need to use the same zone for the ssl-vpn and the IPsec, that's because i want to use the tunnel when i connect remotely.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 20 Jul 2012 02:20:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ssl-vpn-and-ipsec-tunnel-palo-alto-with-check-point/m-p/36443#M26791</guid>
      <dc:creator>Pablo.Atiaga</dc:creator>
      <dc:date>2012-07-20T02:20:31Z</dc:date>
    </item>
  </channel>
</rss>

