<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Amazon AWS VPN (VPC) in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/amazon-aws-vpn-vpc/m-p/45909#M33738</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Amazon requires 2 VPN tunnels per firewall (and we have 2 firewalls). We have around a dozen of tunnels but they are quite low traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks a lot for your great reply!!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 08 May 2014 12:34:21 GMT</pubDate>
    <dc:creator>peterpan13888</dc:creator>
    <dc:date>2014-05-08T12:34:21Z</dc:date>
    <item>
      <title>Amazon AWS VPN (VPC)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/amazon-aws-vpn-vpc/m-p/45905#M33734</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P style="color: #222222; font-family: arial, sans-serif; font-size: 12.727272033691406px;"&gt;Hi all,&lt;/P&gt;&lt;P style="color: #222222; font-family: arial, sans-serif; font-size: 12.727272033691406px;"&gt;&lt;SPAN style="line-height: 1.5em;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="color: #222222; font-family: arial, sans-serif; font-size: 12.727272033691406px;"&gt;&lt;SPAN style="line-height: 1.5em;"&gt;We are working on moving some of our servers to AWS and they require 2 VPN redundant tunnels to be configured with our network. Amazon suggested to terminate the VPN on Internet edge router because the VPN redundancy requires BGP. Between the Internet edge router and the Palo Alto firewall, it is unprotected (but it will be on our physical premises). &lt;/SPAN&gt;&lt;/P&gt;&lt;P style="color: #222222; font-family: arial, sans-serif; font-size: 12.727272033691406px;"&gt;&lt;SPAN style="line-height: 1.5em;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="color: #222222; font-family: arial, sans-serif; font-size: 12.727272033691406px;"&gt;&lt;SPAN style="line-height: 1.5em;"&gt;I have suggested to project team to terminate the VPN on Palo Alto instead. However, in this case, the PA3020 has to run BGP which is supported. My questions are:&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="color: #222222; font-family: arial, sans-serif; font-size: 12.727272033691406px;"&gt;- whether running BGP will have a significant impact on performance? &lt;/P&gt;&lt;P style="color: #222222; font-family: arial, sans-serif; font-size: 12.727272033691406px;"&gt;- As the existing firewall traffic does not run BGP, my plan is to run this AWS VPN on a different virtual router with 2 separate external and internal interfaces totally segregated from existing firewall traffic but still performs traffic inspection. Does this work?&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P style="color: #222222; font-family: arial, sans-serif; font-size: 12.727272033691406px;"&gt;&lt;/P&gt;&lt;P style="color: #222222; font-family: arial, sans-serif; font-size: 12.727272033691406px;"&gt;Do you have any best practice and recommendations for this VPN connectivity?&lt;/P&gt;&lt;P style="color: #222222; font-family: arial, sans-serif; font-size: 12.727272033691406px;"&gt;&lt;/P&gt;&lt;P style="color: #222222; font-family: arial, sans-serif; font-size: 12.727272033691406px;"&gt;Thanks!&amp;nbsp; &lt;/P&gt;&lt;P style="color: #222222; font-family: arial, sans-serif; font-size: 12.727272033691406px;"&gt;&lt;/P&gt;&lt;P style="color: #222222; font-family: arial, sans-serif; font-size: 12.727272033691406px;"&gt;FYI:&lt;/P&gt;&lt;P style="color: #222222; font-family: arial, sans-serif; font-size: 12.727272033691406px;"&gt;&lt;/P&gt;&lt;P style="color: #222222; font-family: arial, sans-serif; font-size: 12.727272033691406px;"&gt;&lt;A href="http://docs.aws.amazon.com/AmazonVPC/latest/UserGuide/VPC_VPN.html" style="color: #1155cc;" target="_blank"&gt;http://docs.aws.amazon.com/AmazonVPC/latest/UserGuide/VPC_VPN.html&lt;/A&gt;&lt;/P&gt;&lt;P style="color: #222222; font-family: arial, sans-serif; font-size: 12.727272033691406px;"&gt;vs.&lt;/P&gt;&lt;DIV&gt;NIST 800-77 (&lt;A href="http://csrc.nist.gov/publications/nistpubs/800-77/sp800-77.pdf" style="color: #1155cc;" target="_blank"&gt;http://csrc.nist.gov/publications/nistpubs/800-77/sp800-77.pdf&lt;/A&gt;) a standard for all US federal agencies to follow:&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;DIV&gt;3 - Traffic Not Protected by IPsec. Organizations should consider carefully the threats against network traffic after it has been processed by the receiving IPsec gateway and sent without IPsec protection across additional network segments. For example, an &lt;SPAN style="color: #ff0000;"&gt;organization that wants to place its VPN gateway outside its Internet firewalls should ensure that the traffic passing between the IPsec gateway and the Internet firewalls has sufficient protection against breaches of confidentiality and integrity. &lt;/SPAN&gt;&lt;P&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 May 2014 20:36:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/amazon-aws-vpn-vpc/m-p/45905#M33734</guid>
      <dc:creator>peterpan13888</dc:creator>
      <dc:date>2014-05-07T20:36:53Z</dc:date>
    </item>
    <item>
      <title>Re: Amazon AWS VPN (VPC)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/amazon-aws-vpn-vpc/m-p/45906#M33735</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Peterpan,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #222222; font-family: arial, sans-serif; font-size: 12.222222328186035px;"&gt;- &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;whether&lt;/SPAN&gt; running BGP will have a significant impact on performance?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #222222; font-family: arial, sans-serif; font-size: 12.222222328186035px;"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;Ans&lt;/SPAN&gt;: It depends upon how many routes you are having into your&amp;nbsp; PAN routing table.&amp;nbsp; Generally speaking, if you configure BGP on a PAN firewall and having route-filter to import and export limited routes from PAN firewall, in that situation it would not take large CPU cycles from the PAN management plane.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #222222; font-family: arial, sans-serif; font-size: 12.222222328186035px; line-height: 1.5em;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #222222; font-family: arial, sans-serif; font-size: 12.222222328186035px; line-height: 1.5em;"&gt;--As the existing firewall traffic does not run BGP, my plan is to run this AWS VPN on a different virtual router with 2 separate external and internal interfaces totally segregated from existing firewall traffic but still performs traffic inspection. Does this work?&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GINGER_SOFTWARE_mark" style="color: #222222; font-family: arial, sans-serif; font-size: 12.222222328186035px; line-height: 1.5em;"&gt;Ans&lt;/SPAN&gt;&lt;SPAN style="color: #222222; font-family: arial, sans-serif; font-size: 12.222222328186035px; line-height: 1.5em;"&gt;: Yes, it will work perfectly. As, creating an another virtual-router means, the PAN firewall will create an another routing table &lt;/SPAN&gt;&lt;SPAN class="GINGER_SOFTWARE_mark" style="color: #222222; font-family: arial, sans-serif; font-size: 12.222222328186035px; line-height: 1.5em;"&gt;( &lt;/SPAN&gt;&lt;SPAN style="color: #222222; font-family: arial, sans-serif; font-size: 12.222222328186035px; line-height: 1.5em;"&gt;segregation of routing table) &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #222222; font-family: arial, sans-serif; font-size: 12.222222328186035px; line-height: 1.5em;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="line-height: 1.5em; color: #222222; font-size: 12.222222328186035px; font-family: arial, sans-serif;"&gt;--Do you have any best practice and recommendations for this VPN connectivity?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="line-height: 1.5em; color: #222222; font-size: 12.222222328186035px; font-family: arial, sans-serif;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="line-height: 1.5em; color: #222222; font-size: 12.222222328186035px; font-family: arial, sans-serif;"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;Ans&lt;/SPAN&gt;: VPN traffic will be encrypted by ESP/AH header. Hence an extra layer will be added &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;on&lt;/SPAN&gt; the top of the packet. Hence adjust the TCP MSS or reduce it to 1420 will be a good practice. Secondly, using a higher length encryption key &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;( &lt;/SPAN&gt;AES-256, 3 DES&lt;SPAN class="GINGER_SOFTWARE_mark"&gt; )&lt;/SPAN&gt; might bring latency during traffic flow, because it will take more CPU cycles to encrypt/decrypt traffic on PAN firewall. I would recommend you to use AES-128 on both VPN gateways.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="line-height: 1.5em; color: #222222; font-size: 12.222222328186035px; font-family: arial, sans-serif;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="line-height: 1.5em; color: #222222; font-size: 12.222222328186035px; font-family: arial, sans-serif;"&gt;Hope this helps.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="line-height: 1.5em; color: #222222; font-size: 12.222222328186035px; font-family: arial, sans-serif;"&gt;Thanks&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 07 May 2014 21:16:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/amazon-aws-vpn-vpc/m-p/45906#M33735</guid>
      <dc:creator>HULK</dc:creator>
      <dc:date>2014-05-07T21:16:00Z</dc:date>
    </item>
    <item>
      <title>Re: Amazon AWS VPN (VPC)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/amazon-aws-vpn-vpc/m-p/45907#M33736</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the great answer. By BGP filtering, do you mean implementing BGP filtering on the Edge router or on the PAN itself (an available feature?)? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Another question is whether I should insist VPN termination on the firewall and not the Internet edge router as the latter is Amazon's authoritative recommendation but NIST has some caution against it. I look like an idiot to our team because Amazon is God to them.&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 08 May 2014 03:32:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/amazon-aws-vpn-vpc/m-p/45907#M33736</guid>
      <dc:creator>peterpan13888</dc:creator>
      <dc:date>2014-05-08T03:32:48Z</dc:date>
    </item>
    <item>
      <title>Re: Amazon AWS VPN (VPC)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/amazon-aws-vpn-vpc/m-p/45908#M33737</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P style="text-align: left; color: #575757; text-indent: 0px;"&gt;Hello Peterpan,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="text-align: left; color: #575757; text-indent: 0px;"&gt;1) I am talking about&lt;SPAN class="Apple-converted-space"&gt; &lt;/SPAN&gt;route filter implementation on PAN firewall itself. PAN is having capability to filter routes ( advartize by BGP peers) and accordingly install into it's rib/routing-table ( routing information base).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;These docs might help you to implement BGP:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/docs/DOC-1573"&gt;How to Configure BGP Route Filtering&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/docs/DOC-1574"&gt; BGP Traffic Engineering&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/docs/DOC-3858"&gt;How to Perform Route Filtering with BGP&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) How many VPN tunnels you are planning to terminate into the PAN firewall..? &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://live.paloaltonetworks.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 08 May 2014 05:37:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/amazon-aws-vpn-vpc/m-p/45908#M33737</guid>
      <dc:creator>HULK</dc:creator>
      <dc:date>2014-05-08T05:37:09Z</dc:date>
    </item>
    <item>
      <title>Re: Amazon AWS VPN (VPC)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/amazon-aws-vpn-vpc/m-p/45909#M33738</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Amazon requires 2 VPN tunnels per firewall (and we have 2 firewalls). We have around a dozen of tunnels but they are quite low traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks a lot for your great reply!!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 08 May 2014 12:34:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/amazon-aws-vpn-vpc/m-p/45909#M33738</guid>
      <dc:creator>peterpan13888</dc:creator>
      <dc:date>2014-05-08T12:34:21Z</dc:date>
    </item>
  </channel>
</rss>

