<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: IPSEC VPN implementations in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-implementations/m-p/47353#M34808</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Srikanth,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To answer your questions above:-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. Palo Alto firewall is a route based VPN firewall.&lt;/P&gt;&lt;P&gt;2. It is not mandatory to use proxy ids when establishing the tunnel between two PA devices.&lt;/P&gt;&lt;P&gt;3. The two 2 IKE SA that you see the for the VPN tunnel are ike phase 1 and ike phase 2 negotiation process after which the tunnel is established.&lt;/P&gt;&lt;P&gt;4. Configuring Hub and spoke route based VPN:- &lt;A _jive_internal="true" class="active_link" href="https://live.paloaltonetworks.com/docs/DOC-1608"&gt;https://live.paloaltonetworks.com/docs/DOC-1608&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Did I answer your questions?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Parth&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 25 Sep 2012 10:51:48 GMT</pubDate>
    <dc:creator>ppatel</dc:creator>
    <dc:date>2012-09-25T10:51:48Z</dc:date>
    <item>
      <title>IPSEC VPN implementations</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-implementations/m-p/47351#M34806</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P style="font-size: 12px; font-family: Arial, Helvetica, sans-serif; color: #000000; background-color: #ffffff;"&gt;&lt;IMG alt="IKE SA Palo Alto.jpg" class="jive-image-thumbnail jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/4171_IKE SA Palo Alto.jpg" width="450" /&gt;&lt;/P&gt;&lt;P style="font-size: 12px; font-family: Arial, Helvetica, sans-serif; color: #000000; background-color: #ffffff;"&gt;&lt;/P&gt;&lt;P style="font-size: 12px; font-family: Arial, Helvetica, sans-serif; color: #000000; background-color: #ffffff;"&gt;&lt;/P&gt;&lt;P style="font-size: 12px; font-family: Arial, Helvetica, sans-serif; color: #000000; background-color: #ffffff;"&gt;Hi this is one the sample output that i captured when i established a VPN tunnel between 2 PA firewalls.&lt;/P&gt;&lt;P style="font-size: 12px; font-family: Arial, Helvetica, sans-serif; color: #000000; background-color: #ffffff;"&gt;As far as my knowledge goes Ike SA's are bi directional and IPSEC SA's are uni directional correct me if i am wrong.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="font-size: 12px; font-family: Arial, Helvetica, sans-serif; color: #000000; background-color: #ffffff;"&gt;But here i see 2 SA's in Phase 1 , but all i establised was only 1 VPN tunnel .&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="font-size: 12px; font-family: Arial, Helvetica, sans-serif; color: #000000; background-color: #ffffff;"&gt;Can some throw some light on this please . Thanks&lt;/P&gt;&lt;P style="font-size: 12px; font-family: Arial, Helvetica, sans-serif; color: #000000; background-color: #ffffff;"&gt;&lt;/P&gt;&lt;P style="font-size: 12px; font-family: Arial, Helvetica, sans-serif; color: #000000; background-color: #ffffff;"&gt;I have few other questions like :&lt;/P&gt;&lt;P style="font-size: 12px; font-family: Arial, Helvetica, sans-serif; color: #000000; background-color: #ffffff;"&gt;&lt;/P&gt;&lt;P style="font-size: 12px; font-family: Arial, Helvetica, sans-serif; color: #000000; background-color: #ffffff;"&gt;1. Can we implement policy&amp;nbsp; based VPN's in Palo Alto or everything is Route based ?&lt;/P&gt;&lt;P style="font-size: 12px; font-family: Arial, Helvetica, sans-serif; color: #000000; background-color: #ffffff;"&gt;2. Do we mandatorily need to specify proxy id even though both sides i am running route based vpn and both side PA firewalls?&lt;/P&gt;&lt;P style="font-size: 12px; font-family: Arial, Helvetica, sans-serif; color: #000000; background-color: #ffffff;"&gt;3. IKE SA's are bidirectional and IPSEC SA are unidirectional , but i see 2 IKE SA for the same VPN tunnel.&lt;/P&gt;&lt;P style="font-size: 12px; font-family: Arial, Helvetica, sans-serif; color: #000000; background-color: #ffffff;"&gt;4. Can we implement HUB and Spoke VPN's on PA firewalls , the reason why i ask this i assume we have to assign an ip address for the tunnel interface and configure as multi point in case of juniper i could not see such option here on PA firewall.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 25 Sep 2012 10:22:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-implementations/m-p/47351#M34806</guid>
      <dc:creator>srikanth</dc:creator>
      <dc:date>2012-09-25T10:22:04Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC VPN implementations</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-implementations/m-p/47352#M34807</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Srikanth,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am attaching the vpn output from the old thread thread .&lt;/P&gt;&lt;P&gt;&lt;IMG alt="ike-sa output.PNG" class="jive-image-thumbnail jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/4172_ike-sa output.PNG" width="450" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When you execute a command,&amp;nbsp; &amp;gt;show vpn ike-sa , it shows the negotiation process of phase 1 and phase 2 both&lt;/P&gt;&lt;P&gt;Check to see phase-1 SA's and phase-2 SA's. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In phase-1 SA you will see the ike crypto algorithms that you had set under Network &amp;gt; Network Profiles&amp;gt; Ike Crypto&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In phase-2 SA you will see the ipsec crypto algorithms that you had set under Network &amp;gt; Network Profiles&amp;gt; Ipsec Crypto&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;gt;show vpn ipsec-sa ,&amp;nbsp; will show you the tunnel that has been set up between the two peers along with the tunnel name and algorithms it negotiated with the peer once the phase 1 and phase 2 negotiations complete.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the link to the document on how to trouble shoot vpn connectivity issues.&lt;/P&gt;&lt;P&gt;&lt;A _jive_internal="true" class="active_link" href="https://live.paloaltonetworks.com/docs/DOC-3671"&gt;https://live.paloaltonetworks.com/docs/DOC-3671&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know if this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Parth&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 25 Sep 2012 10:45:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-implementations/m-p/47352#M34807</guid>
      <dc:creator>ppatel</dc:creator>
      <dc:date>2012-09-25T10:45:26Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC VPN implementations</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-implementations/m-p/47353#M34808</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Srikanth,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To answer your questions above:-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. Palo Alto firewall is a route based VPN firewall.&lt;/P&gt;&lt;P&gt;2. It is not mandatory to use proxy ids when establishing the tunnel between two PA devices.&lt;/P&gt;&lt;P&gt;3. The two 2 IKE SA that you see the for the VPN tunnel are ike phase 1 and ike phase 2 negotiation process after which the tunnel is established.&lt;/P&gt;&lt;P&gt;4. Configuring Hub and spoke route based VPN:- &lt;A _jive_internal="true" class="active_link" href="https://live.paloaltonetworks.com/docs/DOC-1608"&gt;https://live.paloaltonetworks.com/docs/DOC-1608&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Did I answer your questions?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Parth&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 25 Sep 2012 10:51:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-implementations/m-p/47353#M34808</guid>
      <dc:creator>ppatel</dc:creator>
      <dc:date>2012-09-25T10:51:48Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC VPN implementations</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-implementations/m-p/47354#M34809</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;1. Cant one combine PBF (policy based forwarding) with a route-based vpn tunnel as nexthop?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 25 Sep 2012 19:35:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-implementations/m-p/47354#M34809</guid>
      <dc:creator>mikand</dc:creator>
      <dc:date>2012-09-25T19:35:18Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC VPN implementations</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-implementations/m-p/47355#M34810</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Traffic sourcing from a particular zone in the pbf policy can be forced to egress out the tunnel interface.&lt;/P&gt;&lt;P&gt;Monitoring traffic is sourced from the forwarding egress interface defined in the PBF policy&lt;/P&gt;&lt;P&gt;&lt;IMG alt="pbf.PNG" class="jive-image-thumbnail jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/4235_pbf.PNG" width="450" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Parth&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 27 Sep 2012 09:16:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-implementations/m-p/47355#M34810</guid>
      <dc:creator>ppatel</dc:creator>
      <dc:date>2012-09-27T09:16:20Z</dc:date>
    </item>
  </channel>
</rss>

