<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Securing IPSec VPN tunnel in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/securing-ipsec-vpn-tunnel/m-p/51652#M37997</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;you can create a security policy to allow or block the traffic. &lt;/P&gt;&lt;P&gt;You will also have option to monitor the traffic in the logs and can take decision whether to allow or block apps/ip/ports.&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;Numan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 02 Dec 2013 19:22:30 GMT</pubDate>
    <dc:creator>mbutt</dc:creator>
    <dc:date>2013-12-02T19:22:30Z</dc:date>
    <item>
      <title>Securing IPSec VPN tunnel</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/securing-ipsec-vpn-tunnel/m-p/51651#M37996</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Recently we are planning to roll out potentially hundreds of IPSEC VPN tunnels at our customer locations to access our own remote devices securely over the Internet. However, we don't have good control of physical access to these remote VPN devices managed by us and I don't want unauthorized access to our trusted network (in separate security zone) through these remote devices.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;The good news is that we will always initiate connections and the TCP/UDP port is always fixed.&amp;nbsp; I tried to add a firewall rule that ended up terminating the VPN tunnel. I am also aware the IPSEC proxy tab allows me to set the protocol and ports on both ends but not sure this works.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;Any suggestions how to lock it down based on these two requirements?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;Thanks!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;Peter Man&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 02 Dec 2013 16:52:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/securing-ipsec-vpn-tunnel/m-p/51651#M37996</guid>
      <dc:creator>peterpan13888</dc:creator>
      <dc:date>2013-12-02T16:52:07Z</dc:date>
    </item>
    <item>
      <title>Re: Securing IPSec VPN tunnel</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/securing-ipsec-vpn-tunnel/m-p/51652#M37997</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;you can create a security policy to allow or block the traffic. &lt;/P&gt;&lt;P&gt;You will also have option to monitor the traffic in the logs and can take decision whether to allow or block apps/ip/ports.&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;Numan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 02 Dec 2013 19:22:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/securing-ipsec-vpn-tunnel/m-p/51652#M37997</guid>
      <dc:creator>mbutt</dc:creator>
      <dc:date>2013-12-02T19:22:30Z</dc:date>
    </item>
    <item>
      <title>Re: Securing IPSec VPN tunnel</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/securing-ipsec-vpn-tunnel/m-p/51653#M37998</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Actually I did try to add a policy that terminated the the vpn tunnel and causing some grief. I am going to do more testing in a test environment to see how it works without interrupting production services.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 03 Dec 2013 14:00:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/securing-ipsec-vpn-tunnel/m-p/51653#M37998</guid>
      <dc:creator>peterpan13888</dc:creator>
      <dc:date>2013-12-03T14:00:49Z</dc:date>
    </item>
    <item>
      <title>Re: Securing IPSec VPN tunnel</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/securing-ipsec-vpn-tunnel/m-p/51654#M37999</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In case of site-to-site VPN, I would recommend you to configure Proxy-ID to more control over the traffic and prevent unauthorized access to your internal resources. The ID payload during IPsec phase-2 negotiation, contains the proxy identities on whose behalf the initiator does the negotiation. These are generally IP address subnets, but they can have more fields, such as port, too. In the case of a site-to-site IPsec set up with two gateways doing IPsec negotiations with each other, the proxy IDs are based on rules defined on the gateways that define what type of traffic is supposed to be encrypted by the peers ( specific source, destination, protocols). So, if you have multiple subnets to allow behind both VPN peers, there will be multiple SPI ( security parameter Index) to enhance the security and administrative control over the VPN tunnel.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 03 Dec 2013 18:31:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/securing-ipsec-vpn-tunnel/m-p/51654#M37999</guid>
      <dc:creator>HULK</dc:creator>
      <dc:date>2013-12-03T18:31:43Z</dc:date>
    </item>
  </channel>
</rss>

