<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Remote Desktop and IPSec in the DMZ. in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/remote-desktop-and-ipsec-in-the-dmz/m-p/37212#M27300</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This should work with no problem, so you might want to work with Support so they can help troubleshoot. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have seen instances in the past where I had included an incorrect IPSEC application (it turned out to be Cisco VPN instead of generic IPSEC) and that caused the traffic to fail even when switching to an open policy.&amp;nbsp; The reason is because the firewall cached the IKE session initiation but it was later determined to be the incorrect IKE type.&amp;nbsp; All I had to do was to clear the session from the session table and the next IPSEC connection was correctly identified and allowed through.&amp;nbsp; You can clear all sessions or selectively clear sessions from the CLI.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kelly&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 17 Feb 2010 18:10:09 GMT</pubDate>
    <dc:creator>kbrazil</dc:creator>
    <dc:date>2010-02-17T18:10:09Z</dc:date>
    <item>
      <title>Remote Desktop and IPSec in the DMZ.</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/remote-desktop-and-ipsec-in-the-dmz/m-p/37211#M27299</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This is something we had enabled when we were using a Symantec SGS firewall, but had to disable it when we went to the PA-2050. I haven't had much time to play with it, but I need to get it working again. Under the local Group Policy of each server, we have a Secure Terminal Services IPSec policy that requires security when attempted a connection over TCP port 3389.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When we moved to the PA-2050, I had to disable this IPSec Policy on the DMZ Servers. No matter what I did, I wasn't able to see the IPSec traffic in the PAN logs. Even adding the IPSec applications made no difference in the connection, nor did creating a completely open rule from my desktop to one of the servers.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there anything that I am missing here, or is this not feasible anymore?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 17 Feb 2010 16:12:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/remote-desktop-and-ipsec-in-the-dmz/m-p/37211#M27299</guid>
      <dc:creator>mharding</dc:creator>
      <dc:date>2010-02-17T16:12:38Z</dc:date>
    </item>
    <item>
      <title>Re: Remote Desktop and IPSec in the DMZ.</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/remote-desktop-and-ipsec-in-the-dmz/m-p/37212#M27300</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This should work with no problem, so you might want to work with Support so they can help troubleshoot. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have seen instances in the past where I had included an incorrect IPSEC application (it turned out to be Cisco VPN instead of generic IPSEC) and that caused the traffic to fail even when switching to an open policy.&amp;nbsp; The reason is because the firewall cached the IKE session initiation but it was later determined to be the incorrect IKE type.&amp;nbsp; All I had to do was to clear the session from the session table and the next IPSEC connection was correctly identified and allowed through.&amp;nbsp; You can clear all sessions or selectively clear sessions from the CLI.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kelly&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 17 Feb 2010 18:10:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/remote-desktop-and-ipsec-in-the-dmz/m-p/37212#M27300</guid>
      <dc:creator>kbrazil</dc:creator>
      <dc:date>2010-02-17T18:10:09Z</dc:date>
    </item>
  </channel>
</rss>

