<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: What did I miss? Cross-zone/vpn traffic in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/what-did-i-miss-cross-zone-vpn-traffic/m-p/45230#M33234</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Assuming you have the&amp;nbsp; IPSEC Tunnel, IKE Gateway, IPSEC Crypto, IKE Crypto configured correctly.... This looks to be a routing issue. What does a tracert look like from a client on one side to a client on the other side? Where does it stop?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 12 Apr 2013 20:10:44 GMT</pubDate>
    <dc:creator>craymond</dc:creator>
    <dc:date>2013-04-12T20:10:44Z</dc:date>
    <item>
      <title>What did I miss? Cross-zone/vpn traffic</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/what-did-i-miss-cross-zone-vpn-traffic/m-p/45227#M33231</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;New PA200 installed and working on getting it setup. Aside from a 2wk demo, I have little experience with PAN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've got a Site-To-Site VPN configured to an ASA5505 at another of our offices.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have one zone setup for a Wifi network. (Called Wifi) IP space behind that zone is 172.168.1.0/24. Interface 1/3 is configured with the IP 172.168.1.1 PAN is providing DHCP for this network. &lt;/P&gt;&lt;P&gt;Client behind this network has a DHCP address of 172.168.1.10 with a subnet mask of 255.255.255.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On the other side of tunnel.1 (this interface is tagged as the Remote zone) is the IP space 10.5.0.0/16. Client behind that firewall has IP 10.5.1.25/255.255.0.0.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have Security Policies configured to allow traffic between the zones.&lt;/P&gt;&lt;P&gt;However, pinging between the clients routes through the wrong rule (Default rule allowing outside access) instead of the Wifi-to-Remote or Remote-To-Wifi rules (depending on which side I'm pinging from)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can ping from the CLI of the PAN to any client in the Remote zone.&lt;/P&gt;&lt;P&gt;And I can ping from any client in the Remote zone to the 172.168.1.1 address of the PAN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Since it wasn't working with the zones defined, I changed the Source/Destination of the rules to the specific IP ranges of the zones in the security rules.&lt;/P&gt;&lt;P&gt;Wifi-To-Remote:&lt;/P&gt;&lt;P&gt;Source: 172.168.1.0/24&lt;/P&gt;&lt;P&gt;Destination: 10.5.0.0/16&lt;/P&gt;&lt;P&gt;Remote-To-Wifi:&lt;/P&gt;&lt;P&gt;Source: 10.5.0.0/16&lt;/P&gt;&lt;P&gt;Destination: 172.168.1.0/24&lt;/P&gt;&lt;P&gt;(I've also tried putting in the range directly, 172.168.1.1-172.168.1.254, with the same result)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now in the Monitor-&amp;gt;Traffic tab, the Wifi-Client to Remote-Client (and vice versa) ping shows up in the correct rule, but the ping still doesn't complete (Request Timed Out)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm sure there's something relatively simple that I've missed, could someone point it out for me?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 12 Apr 2013 14:25:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/what-did-i-miss-cross-zone-vpn-traffic/m-p/45227#M33231</guid>
      <dc:creator>Nathan.S</dc:creator>
      <dc:date>2013-04-12T14:25:23Z</dc:date>
    </item>
    <item>
      <title>Re: What did I miss? Cross-zone/vpn traffic</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/what-did-i-miss-cross-zone-vpn-traffic/m-p/45228#M33232</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Have you added the static routes in the VR's routing table?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 12 Apr 2013 14:55:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/what-did-i-miss-cross-zone-vpn-traffic/m-p/45228#M33232</guid>
      <dc:creator>craymond</dc:creator>
      <dc:date>2013-04-12T14:55:39Z</dc:date>
    </item>
    <item>
      <title>Re: What did I miss? Cross-zone/vpn traffic</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/what-did-i-miss-cross-zone-vpn-traffic/m-p/45229#M33233</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Two static routes in the VR:&lt;/P&gt;&lt;P&gt;0.0.0.0/0 with ISP gateway as next hop on outside-facing interface&lt;/P&gt;&lt;P&gt;10.5.0.0/16, no next hop, tunnel.1 interface&lt;/P&gt;&lt;P&gt;Edit to add: I tried adding a next hop of 10.5.1.1 (Remote gateway) to no avail. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 12 Apr 2013 14:58:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/what-did-i-miss-cross-zone-vpn-traffic/m-p/45229#M33233</guid>
      <dc:creator>Nathan.S</dc:creator>
      <dc:date>2013-04-12T14:58:20Z</dc:date>
    </item>
    <item>
      <title>Re: What did I miss? Cross-zone/vpn traffic</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/what-did-i-miss-cross-zone-vpn-traffic/m-p/45230#M33234</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Assuming you have the&amp;nbsp; IPSEC Tunnel, IKE Gateway, IPSEC Crypto, IKE Crypto configured correctly.... This looks to be a routing issue. What does a tracert look like from a client on one side to a client on the other side? Where does it stop?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 12 Apr 2013 20:10:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/what-did-i-miss-cross-zone-vpn-traffic/m-p/45230#M33234</guid>
      <dc:creator>craymond</dc:creator>
      <dc:date>2013-04-12T20:10:44Z</dc:date>
    </item>
    <item>
      <title>Re: What did I miss? Cross-zone/vpn traffic</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/what-did-i-miss-cross-zone-vpn-traffic/m-p/45231#M33235</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Does the Zones belog to the same virtual router? If not, even with correct security rules, traffic won't flow.&lt;/P&gt;&lt;P&gt;In static route you need only net and interface tunnel.1, no next hop&lt;/P&gt;&lt;P&gt;Also pay attention to secuty acls, use zones, not the enforced network until connection is ok.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 12 Apr 2013 21:54:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/what-did-i-miss-cross-zone-vpn-traffic/m-p/45231#M33235</guid>
      <dc:creator>NGS_SOC</dc:creator>
      <dc:date>2013-04-12T21:54:47Z</dc:date>
    </item>
    <item>
      <title>Re: What did I miss? Cross-zone/vpn traffic</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/what-did-i-miss-cross-zone-vpn-traffic/m-p/45232#M33236</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey Nathan,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is the remote side configured to send the traffic (destined to 172.168.1.x) through its tunnel interface as well?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You said: Since it wasn't working with the zones defined, I changed the Source/Destination of the rules to the specific IP ranges of the zones in the security rules.&lt;/P&gt;&lt;P&gt;Assuming you did have a static route for remote subnet pointing to the tunnel.1 interface (remote zone), the traffic must match the Wifi-to-Remote rule, unless the default outbound rule is above this specific rule ignoring it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can also try taking pcaps on the remote side and verify if they are receiving our packets and responding back to us.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Aditi&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 12 Apr 2013 22:16:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/what-did-i-miss-cross-zone-vpn-traffic/m-p/45232#M33236</guid>
      <dc:creator>apasupulati</dc:creator>
      <dc:date>2013-04-12T22:16:07Z</dc:date>
    </item>
    <item>
      <title>Re: What did I miss? Cross-zone/vpn traffic</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/what-did-i-miss-cross-zone-vpn-traffic/m-p/45233#M33237</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;traceroute from the Remote site fails. Both too the PAN (172.168.1.1) and to the client (172.168.1.10). Even though ping to the PAN works.&lt;/P&gt;&lt;P&gt;from the local site to the remote site fails. No hops.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Since there's 'nothing' between the clients on each side of the VPN, I'm not surprised there isn't anything showing in a traceroute.&lt;/P&gt;&lt;P&gt;I am surprised that traceroute is failing from Remote to the PAN, since the ping works.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;All the interfaces of the PAN are in a single VR. It's the only VR on the PAN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The default rule to allow out-bound traffic is at the bottom of the stack. The rules to allow from local-to-remote and remote-to-local are located above that default rule.&lt;/P&gt;&lt;P&gt;Presently only have 3 rules in the PAN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cisco is routing traffic to 172.168.1.0/16 across the tunnel. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 15 Apr 2013 14:15:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/what-did-i-miss-cross-zone-vpn-traffic/m-p/45233#M33237</guid>
      <dc:creator>Nathan.S</dc:creator>
      <dc:date>2013-04-15T14:15:03Z</dc:date>
    </item>
    <item>
      <title>Re: What did I miss? Cross-zone/vpn traffic</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/what-did-i-miss-cross-zone-vpn-traffic/m-p/45234#M33238</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In order to troubleshoot this, I would recommend creating a deny all rule at the bottom with alerts (any zone to any zone with just alerts) so you can see what is being implicitly denied. It sounds like you have 2&amp;nbsp; rules for traffic from "local" to "remote" and from "remote" to "local", and a third from "local" to "external". With those rules, you will not be able to view the implicit denies in the traffic log, so it will be harder to troubleshoot unless you want to do it from the CLI.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 15 Apr 2013 19:10:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/what-did-i-miss-cross-zone-vpn-traffic/m-p/45234#M33238</guid>
      <dc:creator>craymond</dc:creator>
      <dc:date>2013-04-15T19:10:49Z</dc:date>
    </item>
    <item>
      <title>Re: What did I miss? Cross-zone/vpn traffic</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/what-did-i-miss-cross-zone-vpn-traffic/m-p/45235#M33239</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'll add that rule.&lt;BR /&gt;I don't mind working via the CLI, just don't know my way around there. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 15 Apr 2013 19:17:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/what-did-i-miss-cross-zone-vpn-traffic/m-p/45235#M33239</guid>
      <dc:creator>Nathan.S</dc:creator>
      <dc:date>2013-04-15T19:17:36Z</dc:date>
    </item>
    <item>
      <title>Re: What did I miss? Cross-zone/vpn traffic</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/what-did-i-miss-cross-zone-vpn-traffic/m-p/45236#M33240</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Adding the Deny-All rule seems to have broken everything, but I'm not able to ping from either side across the VPN either(even after disabling the Deny-All rule, just to test). Not sure what I broke there. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 15 Apr 2013 22:24:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/what-did-i-miss-cross-zone-vpn-traffic/m-p/45236#M33240</guid>
      <dc:creator>Nathan.S</dc:creator>
      <dc:date>2013-04-15T22:24:12Z</dc:date>
    </item>
    <item>
      <title>Re: What did I miss? Cross-zone/vpn traffic</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/what-did-i-miss-cross-zone-vpn-traffic/m-p/45237#M33241</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The Deny rule at the end of the allows should not have broken anything if you have the correct allow rules above it. As I'm sure you know, the rules are applied in order, and there is an implicit deny rule at the end that blocks everything that is not &lt;SPAN style="text-decoration: underline;"&gt;explicitly&lt;/SPAN&gt; allowed. If your rules are:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;src-zone: WiFi&amp;nbsp; --&amp;gt; dst-zone: Remote, any source ip, any destination ip, any service, any application, allow (defualt profile)&lt;/P&gt;&lt;P&gt;src-zone: Remote --&amp;gt; dst-zone: WiFi, any source ip, any destination ip, any service, any application, allow (defualt profile)&lt;/P&gt;&lt;P&gt;src-zone: WiFi&amp;nbsp; --&amp;gt; dst-zone: External, any source ip, any destination ip, any service, any application, allow (defualt profile)&lt;/P&gt;&lt;P&gt;src-zone: any&amp;nbsp; --&amp;gt; dst-zone: any, any source ip, any destination ip, any service, any application, deny (alert profile)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;All traffic should be allowed to 3 zones. However, you will also need to allow the traffic for the IKE exchange between the Remote location's Peer IP address and your Peer IP address. I assume that these are both their external IP, and your external IP. For example:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have an IPSEC tunnel between a server on our site and a server on a partner site. In order for the tunnel to be open, we have a rule that says:&lt;/P&gt;&lt;P&gt;src-zone: external --&amp;gt; dst-zone: external, src-IP: 156.x.x.x, dst-IP: 26.x.x.x, application &amp;lt;app list&amp;gt;, service application default, allow (default profile)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Even though our Server resides in the DMZ, the tunnel is built between the external interface on our PAN the external interface of the other site's ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyway, you should be able to see what is being blocked in the traffic log with the block rule in place with an alert profile and the "log at session end" check box checked. This will allow you to see what the traffic flows are and what is being blocked, which will allow you define your rules to fit.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Apr 2013 14:05:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/what-did-i-miss-cross-zone-vpn-traffic/m-p/45237#M33241</guid>
      <dc:creator>craymond</dc:creator>
      <dc:date>2013-04-16T14:05:19Z</dc:date>
    </item>
    <item>
      <title>Re: What did I miss? Cross-zone/vpn traffic</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/what-did-i-miss-cross-zone-vpn-traffic/m-p/45238#M33242</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here's the rules I have now, in this order:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;src-zone: Wifi --&amp;gt; dst-zone: Remote, any source ip, any destination ip, any service, any application, allow (no profile)&lt;/P&gt;&lt;P&gt;src-zone: Remote --&amp;gt; dst-zone: Wifi, any source ip, any destination ip, any service, any application, allow (no profile)&lt;/P&gt;&lt;P&gt;src-zone: External --&amp;gt; dst-zone: External, &amp;lt;PAN public IP&amp;gt;, &amp;lt;Cisco Public IP&amp;gt;, any service, any application, allow (no profile)&lt;/P&gt;&lt;P&gt;src-zone: Wifi -&amp;gt; dst-zone: External, any source ip, any destination ip, any service, any application, allow (no profile)&lt;/P&gt;&lt;P&gt;src-zone: any -&amp;gt; dst-zone: any, any source ip, any destination ip, any service, any application, Deny (no profile)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From a client behind the Cisco, I can ping the PAN's inside IP (172.168.1.1) but not a client behind the PAN (172.168.1.10)&lt;/P&gt;&lt;P&gt;From a client behind the PAN, I can't ping the Cisco internal IP (10.5.1.1 which is pingable from internal) , or the client behind it (10.5.1.25)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;tracert from behind the PAN goes outside (both by looking at IPs and from checking traffic log on the PAN)&lt;/P&gt;&lt;P&gt;traceroute from behind the Cisco never completes, but doesn't go outside.&lt;/P&gt;&lt;P&gt;Ping from behind the Cisco to the PAN logs as Remote-to-Wifi rule in the PAN. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Apr 2013 14:56:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/what-did-i-miss-cross-zone-vpn-traffic/m-p/45238#M33242</guid>
      <dc:creator>Nathan.S</dc:creator>
      <dc:date>2013-04-16T14:56:58Z</dc:date>
    </item>
    <item>
      <title>Re: What did I miss? Cross-zone/vpn traffic</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/what-did-i-miss-cross-zone-vpn-traffic/m-p/45239#M33243</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Under the system log, are you seeing the all of the vpn negotiations coming back&amp;nbsp; as successful? Use the filter ( subtype eq vpn ) to see just the vpn traffic. &lt;/P&gt;&lt;P&gt;Also, in the traffic log are you seeing any denies? - use the filters ( app eq not-applicable ) or ( action eq deny ) to see the traffic that is being blocked. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just in case you haven't reviewed yet - there is a document on IPSEC to ASA located here:&lt;/P&gt;&lt;P&gt;&lt;A _jive_internal="true" class="active_link" href="https://live.paloaltonetworks.com/docs/DOC-2579"&gt;https://live.paloaltonetworks.com/docs/DOC-2579&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Apr 2013 19:47:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/what-did-i-miss-cross-zone-vpn-traffic/m-p/45239#M33243</guid>
      <dc:creator>craymond</dc:creator>
      <dc:date>2013-04-16T19:47:32Z</dc:date>
    </item>
    <item>
      <title>Re: What did I miss? Cross-zone/vpn traffic</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/what-did-i-miss-cross-zone-vpn-traffic/m-p/45240#M33244</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;All vpn attempts are successful. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Blocked traffic is one of two lines:&lt;/P&gt;&lt;P&gt;date/time, drop, from: External, to:External,source:&amp;lt;PAN public IP&amp;gt;, destination: &amp;lt;ISP DNS server&amp;gt;, to port: 53, application: not applicable, action: deny, rule: Deny-All, bytes: 84&lt;/P&gt;&lt;P&gt;date/time, drop, from: External, to:External,source:&amp;lt;PAN public IP&amp;gt;, destination: &amp;lt;Internal DNS server&amp;gt;, to port: 53, application: not applicable, action: deny, rule: Deny-All, bytes: 84&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Traffic from Wifi, which should have gone across the VPN was being directed outside until I changed from the destination zone to the ip range of the far side of the VPN. Now it flows through the rules correctly, but still fails to ping.&lt;/P&gt;&lt;P&gt;Traffic from Remote across the vpn to client behind the PAN flows through the rules properly, but fails to ping either.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you for the example/walk-through. I'd not found that one, only an older one dealing with PANos 3.x which was different enough to be not very helpful to this newb. &lt;/P&gt;&lt;P&gt;Accounting for minor differences in config, my ASA config matches that in the example. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Apr 2013 21:53:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/what-did-i-miss-cross-zone-vpn-traffic/m-p/45240#M33244</guid>
      <dc:creator>Nathan.S</dc:creator>
      <dc:date>2013-04-16T21:53:00Z</dc:date>
    </item>
    <item>
      <title>Re: What did I miss? Cross-zone/vpn traffic</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/what-did-i-miss-cross-zone-vpn-traffic/m-p/45241#M33245</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If you have your Proxy IDs set to /24s on PAN and /24s for ASA for protected traffic, and exempted NAT from the ASA side, I don't know why this is not functioning. Since the tunnel is up, and the traffic is supposed to be protected and allowed, I am at a loss as to why this isn't working for you. Hopefully someone else will chime in, or you might want to open an incident with TAC. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 18 Apr 2013 15:57:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/what-did-i-miss-cross-zone-vpn-traffic/m-p/45241#M33245</guid>
      <dc:creator>craymond</dc:creator>
      <dc:date>2013-04-18T15:57:23Z</dc:date>
    </item>
    <item>
      <title>Re: What did I miss? Cross-zone/vpn traffic</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/what-did-i-miss-cross-zone-vpn-traffic/m-p/45242#M33246</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Set it /24 local and /16 remote. Reversed on the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've got a ticket filed with support. Thanks for your help!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'll post back up if I can find something specific to point to. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 18 Apr 2013 18:44:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/what-did-i-miss-cross-zone-vpn-traffic/m-p/45242#M33246</guid>
      <dc:creator>Nathan.S</dc:creator>
      <dc:date>2013-04-18T18:44:41Z</dc:date>
    </item>
    <item>
      <title>Re: What did I miss? Cross-zone/vpn traffic</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/what-did-i-miss-cross-zone-vpn-traffic/m-p/45243#M33247</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Worked with support for several hours yesterday.&lt;/P&gt;&lt;P&gt;Found that I'd left a PBF that was preventing local from following the rest of the rules I'd set in place. Doh!&lt;/P&gt;&lt;P&gt;Now I'm pinging from local to remote, but not from remote to local.&lt;/P&gt;&lt;P&gt;We're staring at config files on the ASA to see what we missed.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 19 Apr 2013 15:23:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/what-did-i-miss-cross-zone-vpn-traffic/m-p/45243#M33247</guid>
      <dc:creator>Nathan.S</dc:creator>
      <dc:date>2013-04-19T15:23:24Z</dc:date>
    </item>
    <item>
      <title>Re: What did I miss? Cross-zone/vpn traffic</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/what-did-i-miss-cross-zone-vpn-traffic/m-p/45244#M33248</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You must have a little different routing setup then what I have dealt with. We did not need any PBF rules for our site to site VPN setup, and from all of the documentation that I have looked at, it never shows any PBF rules required to make it function. I did find that there were static routes needed on the ASA in the document that I linked to, but nothing more than that. Hopefully TAC will be able to discover what is missing. Sorry I could not help more!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 22 Apr 2013 18:19:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/what-did-i-miss-cross-zone-vpn-traffic/m-p/45244#M33248</guid>
      <dc:creator>craymond</dc:creator>
      <dc:date>2013-04-22T18:19:06Z</dc:date>
    </item>
    <item>
      <title>Re: What did I miss? Cross-zone/vpn traffic</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/what-did-i-miss-cross-zone-vpn-traffic/m-p/45245#M33249</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;PBF was part of my earlier attempts to get out-bound traffic working. Wasn't needed then, simply forgot to remove it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Static routes are in place on the ASA. Matching the range behind the PAN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;At this point, I can see traffic in the log on the PAN as approved for passage, yet the ping does not complete.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have my boss looking at the configs on the ASA to ensure they're properly configured. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 22 Apr 2013 18:24:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/what-did-i-miss-cross-zone-vpn-traffic/m-p/45245#M33249</guid>
      <dc:creator>Nathan.S</dc:creator>
      <dc:date>2013-04-22T18:24:23Z</dc:date>
    </item>
  </channel>
</rss>

