<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Using Loopback interfaces for a site-to-site IPSEC VPN in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/using-loopback-interfaces-for-a-site-to-site-ipsec-vpn/m-p/65035#M38896</link>
    <description>&lt;P&gt;keep tunnel in Partners.&lt;/P&gt;</description>
    <pubDate>Wed, 23 Sep 2015 23:14:14 GMT</pubDate>
    <dc:creator>cpainchaud</dc:creator>
    <dc:date>2015-09-23T23:14:14Z</dc:date>
    <item>
      <title>Using Loopback interfaces for a site-to-site IPSEC VPN</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/using-loopback-interfaces-for-a-site-to-site-ipsec-vpn/m-p/64835#M38800</link>
      <description>&lt;P&gt;Does anybody have experience configuring site-to-site IPSEC VPNs using loopback interfaces instead of phsical ones? &amp;nbsp;If you are going to respond with a sassy comment (e.g. Why are you doing that? &amp;nbsp;or That's dumb!) then please don't respond. &amp;nbsp;I have a specific need. &amp;nbsp;I have the VPN setup. &amp;nbsp;I can send traffic to the remote end, but it appears that the firewall drops the returning ESP packets upon return. &amp;nbsp;I don't see that in the logs, but rather when performing a network capture within the firewall. &amp;nbsp;The firewall records the returning ESP packets in the receive and drop logs. &amp;nbsp;I've been busting my head trying to figure this one out along with others in my circle, but we just can seem to crack this baby.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I will be happy to share my config, or perform a web-ex with you &amp;nbsp;in order to get to the bottom of this.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Your assistance in appreciated...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Scott&lt;/P&gt;&lt;P&gt;801-545-6674&lt;/P&gt;</description>
      <pubDate>Sun, 20 Sep 2015 02:07:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/using-loopback-interfaces-for-a-site-to-site-ipsec-vpn/m-p/64835#M38800</guid>
      <dc:creator>merrick</dc:creator>
      <dc:date>2015-09-20T02:07:25Z</dc:date>
    </item>
    <item>
      <title>Re: Using Loopback interfaces for a site-to-site IPSEC VPN</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/using-loopback-interfaces-for-a-site-to-site-ipsec-vpn/m-p/64837#M38802</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;you need to ensure that your loopback is in same zone than the external interface.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;Anyway, this is not a supported design and I know TAC may refuse to support it. I have seen issues as well.&lt;/P&gt;</description>
      <pubDate>Sun, 20 Sep 2015 19:03:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/using-loopback-interfaces-for-a-site-to-site-ipsec-vpn/m-p/64837#M38802</guid>
      <dc:creator>cpainchaud</dc:creator>
      <dc:date>2015-09-20T19:03:18Z</dc:date>
    </item>
    <item>
      <title>Re: Using Loopback interfaces for a site-to-site IPSEC VPN</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/using-loopback-interfaces-for-a-site-to-site-ipsec-vpn/m-p/64842#M38806</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/13836"&gt;@cpainchaud﻿&lt;/a&gt;&lt;/P&gt;&lt;P&gt;I don't see why you shouldn't use loopback interface for IPSEC?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/32837"&gt;@merrick﻿&lt;/a&gt;&lt;/P&gt;&lt;P&gt;Usual when the packets aren't forwarded and there is nothing in logs it's a routing issue. So I'd suggest to check routing. Maybe the rule&amp;nbsp;is written to forward packets&amp;nbsp;to an interface instead of IP address?&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also if you're behind NAT check if there's a NAT rule for 'any' service&amp;nbsp;as ESP can't be NAT-ed specifically.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 21 Sep 2015 08:04:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/using-loopback-interfaces-for-a-site-to-site-ipsec-vpn/m-p/64842#M38806</guid>
      <dc:creator>santonic</dc:creator>
      <dc:date>2015-09-21T08:04:12Z</dc:date>
    </item>
    <item>
      <title>Re: Using Loopback interfaces for a site-to-site IPSEC VPN</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/using-loopback-interfaces-for-a-site-to-site-ipsec-vpn/m-p/64843#M38807</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/10238"&gt;@santonic&lt;/a&gt; because my experiences over 5 years on the product instructs that there are issues and also because I am 90% sure TAC will say it is not supported as they did for 2 of my customers.&lt;/P&gt;</description>
      <pubDate>Mon, 21 Sep 2015 08:09:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/using-loopback-interfaces-for-a-site-to-site-ipsec-vpn/m-p/64843#M38807</guid>
      <dc:creator>cpainchaud</dc:creator>
      <dc:date>2015-09-21T08:09:16Z</dc:date>
    </item>
    <item>
      <title>Re: Using Loopback interfaces for a site-to-site IPSEC VPN</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/using-loopback-interfaces-for-a-site-to-site-ipsec-vpn/m-p/64848#M38809</link>
      <description>&lt;P&gt;Hi Merrick&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;could you provide some more information regarding your config? There are several different ways to configure ipsec on a loopback interface, having some insight into how you set it up may help: is there NAT, which zones are being used, how did you configure the ike gateway objects ...&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In general it would be recommended to set the loopback in the external zone and assign it a public IP, this will make for the least complexity as NAT and different zones could require complex policies depending on your overal design plus some options may not be available&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;regards&lt;/P&gt;
&lt;P&gt;Tom&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 21 Sep 2015 11:29:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/using-loopback-interfaces-for-a-site-to-site-ipsec-vpn/m-p/64848#M38809</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2015-09-21T11:29:52Z</dc:date>
    </item>
    <item>
      <title>Re: Using Loopback interfaces for a site-to-site IPSEC VPN</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/using-loopback-interfaces-for-a-site-to-site-ipsec-vpn/m-p/64861#M38812</link>
      <description>&lt;P&gt;Put the loopback in same zone as that of physical interface zone. That will work.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;There is a KB article for that as well.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here is the doc&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/Configuration-Articles/IPSec-Traffic-Being-Discarded/ta-p/57187" target="_blank"&gt;https://live.paloaltonetworks.com/t5/Configuration-Articles/IPSec-Traffic-Being-Discarded/ta-p/57187&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 21 Sep 2015 13:51:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/using-loopback-interfaces-for-a-site-to-site-ipsec-vpn/m-p/64861#M38812</guid>
      <dc:creator>pankaku</dc:creator>
      <dc:date>2015-09-21T13:51:34Z</dc:date>
    </item>
    <item>
      <title>Re: Using Loopback interfaces for a site-to-site IPSEC VPN</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/using-loopback-interfaces-for-a-site-to-site-ipsec-vpn/m-p/65033#M38894</link>
      <description>&lt;P&gt;So I have a zone called PARTNERS which is where my current loopback and tunnel interface are configured. &amp;nbsp;If I change the loopback to the UNTRUST zone (to the Internet), then do I need to move my tunnel interface to that zone as well? &amp;nbsp;I would like to write rules in which the source zone would be PARTNERS as this connection is with a business partner. &amp;nbsp;What do I need to do in this case?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 23 Sep 2015 23:08:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/using-loopback-interfaces-for-a-site-to-site-ipsec-vpn/m-p/65033#M38894</guid>
      <dc:creator>merrick</dc:creator>
      <dc:date>2015-09-23T23:08:35Z</dc:date>
    </item>
    <item>
      <title>Re: Using Loopback interfaces for a site-to-site IPSEC VPN</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/using-loopback-interfaces-for-a-site-to-site-ipsec-vpn/m-p/65035#M38896</link>
      <description>&lt;P&gt;keep tunnel in Partners.&lt;/P&gt;</description>
      <pubDate>Wed, 23 Sep 2015 23:14:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/using-loopback-interfaces-for-a-site-to-site-ipsec-vpn/m-p/65035#M38896</guid>
      <dc:creator>cpainchaud</dc:creator>
      <dc:date>2015-09-23T23:14:14Z</dc:date>
    </item>
    <item>
      <title>Re: Using Loopback interfaces for a site-to-site IPSEC VPN</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/using-loopback-interfaces-for-a-site-to-site-ipsec-vpn/m-p/272414#M74912</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;was going through this thread as i have a similar issue which is -&lt;/P&gt;&lt;P&gt;# client has 3 different internet links terminated on 3 different ASA firewalls which i have consolidated into 1 Internet Vsys.&lt;/P&gt;&lt;P&gt;# Now using 3 Loopback interfaces to terminate Site-Site VPNs. All 3 have different public ip addresses.&lt;/P&gt;&lt;P&gt;# Loopback interfaces are in "internet zone", tunnel interfaces are in a separate "VPN zone".&lt;/P&gt;&lt;P&gt;# VPN zone to trust zone policy is their.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My questions -&lt;/P&gt;&lt;P&gt;1. I have 100+ tunnel interfaces, assigning specific routes with tunnel interface is the only option their ?&lt;/P&gt;&lt;P&gt;2. Do i need to put an "internet zone" to "vpn zone" policy ? i think its not required.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any help is much appreciated.&lt;/P&gt;</description>
      <pubDate>Sat, 22 Jun 2019 11:38:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/using-loopback-interfaces-for-a-site-to-site-ipsec-vpn/m-p/272414#M74912</guid>
      <dc:creator>SharadP</dc:creator>
      <dc:date>2019-06-22T11:38:58Z</dc:date>
    </item>
    <item>
      <title>Re: Using Loopback interfaces for a site-to-site IPSEC VPN</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/using-loopback-interfaces-for-a-site-to-site-ipsec-vpn/m-p/272900#M74969</link>
      <description>&lt;P&gt;hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/116030"&gt;@SharadP&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;1. yes, you'll need to route somehow (someone may have an elegant dynamic routing solution?)&lt;/P&gt;
&lt;P&gt;2. no, the vpn zone does not need to talk to your internet zone, unless you want to route traffic out to the internet (eg if a remote site must come through the main site for internet access)&lt;/P&gt;</description>
      <pubDate>Tue, 25 Jun 2019 13:04:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/using-loopback-interfaces-for-a-site-to-site-ipsec-vpn/m-p/272900#M74969</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2019-06-25T13:04:55Z</dc:date>
    </item>
    <item>
      <title>Re: Using Loopback interfaces for a site-to-site IPSEC VPN</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/using-loopback-interfaces-for-a-site-to-site-ipsec-vpn/m-p/272917#M74976</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;For routing I always use OSPF. However static and PBF also work, just keep in mind any failover scenarios, etc.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Tue, 25 Jun 2019 14:55:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/using-loopback-interfaces-for-a-site-to-site-ipsec-vpn/m-p/272917#M74976</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2019-06-25T14:55:09Z</dc:date>
    </item>
    <item>
      <title>Re: Using Loopback interfaces for a site-to-site IPSEC VPN</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/using-loopback-interfaces-for-a-site-to-site-ipsec-vpn/m-p/445129#M100433</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I saw this topic interesting and I am planning to use this set up on our current environment. Is it possible to establish a S2S VPN on Palo alto given the following requirements:&lt;/P&gt;&lt;P&gt;Loopback interface - Public IP (/30)&lt;/P&gt;&lt;P&gt;External interface - Private IP (/28, pt to pt IP with ACI)&lt;/P&gt;&lt;P&gt;We will use this setup to reduce the Public IP's to be used since ACI always requires /28 IP.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 03 Nov 2021 05:37:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/using-loopback-interfaces-for-a-site-to-site-ipsec-vpn/m-p/445129#M100433</guid>
      <dc:creator>ftbaraoidan</dc:creator>
      <dc:date>2021-11-03T05:37:52Z</dc:date>
    </item>
    <item>
      <title>Re: Using Loopback interfaces for a site-to-site IPSEC VPN</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/using-loopback-interfaces-for-a-site-to-site-ipsec-vpn/m-p/549978#M112178</link>
      <description>&lt;P&gt;Followed this document :-&amp;nbsp;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClSbCAK" target="_blank"&gt;DotW: Using Loopback Interfaces for a Site-to-Site IPSec VPN - Knowledge Base - Palo Alto Networks&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;But still my tunnel is not coming up. For testing I am having both Wan ips on same subnet. That is why I am using loopback on different zone.&amp;nbsp; Still tunnel is not coming up.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Getting this logs on firewall&lt;/P&gt;
&lt;P&gt;2023-07-18 08:57:31.000 -0700 [DEBG]: { 1: }: resend phase1 packet d217dd2b9ccf0efe:0000000000000000, retry 5&lt;BR /&gt;2023-07-18 08:57:31.498 -0700 debug: pan_msg_process(daemon/panike_sysd_if.c:2849): iked rcv msg ipsec_sa_handler(14).&lt;BR /&gt;2023-07-18 08:57:31.498 -0700 [DEBG]: { 1: 2}: processing acquire for IKEv1&lt;BR /&gt;2023-07-18 08:57:31.498 -0700 [DEBG]: encryption(3des)&lt;BR /&gt;2023-07-18 08:57:31.498 -0700 [INFO]: { 1: 2}: request for establishing IPsec-SA was queued since phase1 is not mature, state 3&lt;BR /&gt;2023-07-18 08:57:31.498 -0700 debug: sysd_msg_send(daemon/panike_sysd_if.c:2487): iked sysd msg enqueue: ipsec_sa_handler&lt;BR /&gt;2023-07-18 08:57:44.000 -0700 [PNTF]: { 1: }: ====&amp;gt; PHASE-1 NEGOTIATION FAILED AS INITIATOR, MAIN MODE &amp;lt;====&lt;BR /&gt;====&amp;gt; Failed SA: 10.7.7.1[500]-10.44.199.72[500] cookie:d217dd2b9ccf0efe:0000000000000000 &amp;lt;==== Due to timeout.&lt;BR /&gt;----------------------------&lt;/P&gt;</description>
      <pubDate>Wed, 19 Jul 2023 08:38:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/using-loopback-interfaces-for-a-site-to-site-ipsec-vpn/m-p/549978#M112178</guid>
      <dc:creator>yogesh12345</dc:creator>
      <dc:date>2023-07-19T08:38:43Z</dc:date>
    </item>
    <item>
      <title>Re: Using Loopback interfaces for a site-to-site IPSEC VPN</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/using-loopback-interfaces-for-a-site-to-site-ipsec-vpn/m-p/550022#M112181</link>
      <description>&lt;P&gt;Hi there,&lt;/P&gt;
&lt;P&gt;Can you elaborate on what you mean when you say both WAN IPs are in the same subnet. The firewall and any router for that matter would not allow routed interfaces in the same VRF to exist in the same subnet.&lt;/P&gt;
&lt;P&gt;To get this topology to work you need your WAN interfaces in different subnets, and whatever IP address that your loopback is using to be advertised to your WAN peers. This can be tricky if your WAN peers are not configured for dynamic routing updates. You could ask them to statically configure a route towards your loopback, but they would still need to advertise your loopback to their own peers. This is handled automatically when your loopback IP is part of an aggregate address given by your ISP, but becomes problematic when you are trying to convince ISP2 to advertise a /32 which belongs to ISP1 !&lt;/P&gt;
&lt;P&gt;If there peering is done across a private network then there should not be a problem with these advertisements.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I wrote a blog post this covers this setup, albeit using separate VRs but that bit can be ignored:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://cs7networks.co.uk/2023/06/30/palo-alto-tunnel-vrf-with-ipsec/" target="_blank"&gt;Palo Alto – tunnel VRF with IPSec – CS7 Networks&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;cheers,&lt;/P&gt;
&lt;P&gt;Seb.&lt;/P&gt;</description>
      <pubDate>Wed, 19 Jul 2023 15:31:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/using-loopback-interfaces-for-a-site-to-site-ipsec-vpn/m-p/550022#M112181</guid>
      <dc:creator>seb_rupik</dc:creator>
      <dc:date>2023-07-19T15:31:02Z</dc:date>
    </item>
  </channel>
</rss>

