<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: VPN s2s with Juniper ScreenOS with multiple networks on PA side in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-s2s-with-juniper-screenos-with-multiple-networks-on-pa-side/m-p/66438#M39204</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you followed the configuration in the link you already setup a route based VPN on the screenos side. The next step would be:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;-Delete proxy-IDs on both sides (PA and screenos) and check that you can still reach the LAN through the VPN.&lt;/P&gt;&lt;P&gt;And on the screenos side.&lt;/P&gt;&lt;P&gt;-Create a static route to the PA public ip address,&amp;nbsp;&lt;/P&gt;&lt;P&gt;-Replace your current default gateway and disable any possible DIP, do this on a maintenance window as you can lost management. If you're using the public IP interface you also need to create a route like te previous one to manage it.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/Configuration-Articles/Routing-Branch-Site-Internet-Traffic-Through-Headquarters/ta-p/59030" target="_blank"&gt;https://live.paloaltonetworks.com/t5/Configuration-Articles/Routing-Branch-Site-Internet-Traffic-Through-Headquarters/ta-p/59030&lt;/A&gt;&lt;/P&gt;&lt;P&gt;On the PA side,&lt;/P&gt;&lt;P&gt;-Create a dynamicIP/port NAT policy for the network on the branch office and the security policy, this will allow the internet conection.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;regards,&lt;/P&gt;&lt;P&gt;Gerardo.&lt;/P&gt;</description>
    <pubDate>Mon, 12 Oct 2015 18:21:00 GMT</pubDate>
    <dc:creator>glastra1</dc:creator>
    <dc:date>2015-10-12T18:21:00Z</dc:date>
    <item>
      <title>VPN s2s with Juniper ScreenOS with multiple networks on PA side</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-s2s-with-juniper-screenos-with-multiple-networks-on-pa-side/m-p/66404#M39187</link>
      <description>&lt;P&gt;Hello&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have to connect by ipsec vpn PA200 PANOS6.1.6 with NS5GT 6.2.0r15 ScreenOS.&lt;/P&gt;&lt;P&gt;Problem that I have is that clients behind NS must have access to two LANs on PA and to internet throuth tunnel.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;LAN_A———&lt;/P&gt;&lt;P&gt;LAN_B——— PaloAlto……….tunel_IPSec………………Netscreen———LAN_M&lt;/P&gt;&lt;P&gt;Internet —— &amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;How to do it?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;At the moment I have working config like &lt;A href="https://www.corelan.be/index.php/2007/11/17/juniper-setting-up-an-ipsec-vpn-tunnel-between-a-juniper-netscreen-firewallvpn-device-and-a-cisco-vpn-device/" target="_blank"&gt;https://www.corelan.be/index.php/2007/11/17/juniper-setting-up-an-ipsec-vpn-tunnel-between-a-juniper-netscreen-firewallvpn-device-and-a-cisco-vpn-device/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;but I really don't know how to set up tunnel for internet traffic - how to setup "VPN&amp;gt;AutoKey IKE ".&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As I remember on this forum are ScreenOS experts so I ask You for help.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;SLawek&lt;/P&gt;</description>
      <pubDate>Mon, 12 Oct 2015 08:17:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-s2s-with-juniper-screenos-with-multiple-networks-on-pa-side/m-p/66404#M39187</guid>
      <dc:creator>_slv_</dc:creator>
      <dc:date>2015-10-12T08:17:59Z</dc:date>
    </item>
    <item>
      <title>Re: VPN s2s with Juniper ScreenOS with multiple networks on PA side</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-s2s-with-juniper-screenos-with-multiple-networks-on-pa-side/m-p/66405#M39188</link>
      <description>&lt;P&gt;The settings are the same as for any VPN. The only diference are proxy IDs On PA side: local 0.0.0.0/0, remote LAN_M and vice versa on Juniper&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 12 Oct 2015 08:38:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-s2s-with-juniper-screenos-with-multiple-networks-on-pa-side/m-p/66405#M39188</guid>
      <dc:creator>santonic</dc:creator>
      <dc:date>2015-10-12T08:38:14Z</dc:date>
    </item>
    <item>
      <title>Re: VPN s2s with Juniper ScreenOS with multiple networks on PA side</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-s2s-with-juniper-screenos-with-multiple-networks-on-pa-side/m-p/66415#M39195</link>
      <description>&lt;P&gt;Hi Santonic&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I did as You wrote and tunnel is working for LANs, now problem is with internet access only.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now my routing table looks like:&lt;/P&gt;&lt;P&gt;IPv4 Dest-Routes for &amp;lt;trust-vr&amp;gt; (7 entries)&lt;BR /&gt;--------------------------------------------------------------------------------------&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ID&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; IP-Prefix&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Interface&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Gateway&amp;nbsp;&amp;nbsp; P Pref&amp;nbsp;&amp;nbsp;&amp;nbsp; Mtr&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Vsys&lt;BR /&gt;--------------------------------------------------------------------------------------&lt;BR /&gt;*&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 3&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0/0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; untrust&amp;nbsp;&amp;nbsp; x.y.z.129&amp;nbsp;&amp;nbsp; C&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Root&lt;BR /&gt;*&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 5&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.5.1/32&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; trust&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp; H&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Root&lt;BR /&gt;*&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 4&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.5.0/24&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; trust&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp; C&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Root&lt;BR /&gt;*&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1&amp;nbsp;&amp;nbsp; x.y.z.128/26&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; untrust&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp; C&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Root&lt;BR /&gt;*&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 6&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.1.0/24&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; tun.1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp; S&amp;nbsp;&amp;nbsp; 20&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Root&lt;BR /&gt;*&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 7&amp;nbsp;&amp;nbsp;&amp;nbsp; 192.168.50.0/24&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; tun.1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp; S&amp;nbsp;&amp;nbsp; 20&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Root&lt;BR /&gt;*&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2&amp;nbsp;&amp;nbsp; x.y.z.158/32&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; untrust&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0.0.0.0&amp;nbsp;&amp;nbsp; H&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Root&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;x.y.z.129&amp;nbsp; is a default gateway for NS device.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My untrust interface of NS is in route mode.&lt;/P&gt;&lt;P&gt;My security policies loks like:&lt;/P&gt;&lt;P&gt;&lt;IMG src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/617iB48CF9EB5DD8A091/image-size/original?v=mpbl-1&amp;amp;px=-1" alt="2015-10-12_120736.png" title="2015-10-12_120736.png" border="0" /&gt;&lt;/P&gt;&lt;P&gt;Are they policy nessesary? How do I change it according to proxy_id change?&lt;/P&gt;&lt;P&gt;Help me please&lt;/P&gt;</description>
      <pubDate>Mon, 12 Oct 2015 10:09:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-s2s-with-juniper-screenos-with-multiple-networks-on-pa-side/m-p/66415#M39195</guid>
      <dc:creator>_slv_</dc:creator>
      <dc:date>2015-10-12T10:09:44Z</dc:date>
    </item>
    <item>
      <title>Re: VPN s2s with Juniper ScreenOS with multiple networks on PA side</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-s2s-with-juniper-screenos-with-multiple-networks-on-pa-side/m-p/66438#M39204</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you followed the configuration in the link you already setup a route based VPN on the screenos side. The next step would be:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;-Delete proxy-IDs on both sides (PA and screenos) and check that you can still reach the LAN through the VPN.&lt;/P&gt;&lt;P&gt;And on the screenos side.&lt;/P&gt;&lt;P&gt;-Create a static route to the PA public ip address,&amp;nbsp;&lt;/P&gt;&lt;P&gt;-Replace your current default gateway and disable any possible DIP, do this on a maintenance window as you can lost management. If you're using the public IP interface you also need to create a route like te previous one to manage it.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/Configuration-Articles/Routing-Branch-Site-Internet-Traffic-Through-Headquarters/ta-p/59030" target="_blank"&gt;https://live.paloaltonetworks.com/t5/Configuration-Articles/Routing-Branch-Site-Internet-Traffic-Through-Headquarters/ta-p/59030&lt;/A&gt;&lt;/P&gt;&lt;P&gt;On the PA side,&lt;/P&gt;&lt;P&gt;-Create a dynamicIP/port NAT policy for the network on the branch office and the security policy, this will allow the internet conection.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;regards,&lt;/P&gt;&lt;P&gt;Gerardo.&lt;/P&gt;</description>
      <pubDate>Mon, 12 Oct 2015 18:21:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-s2s-with-juniper-screenos-with-multiple-networks-on-pa-side/m-p/66438#M39204</guid>
      <dc:creator>glastra1</dc:creator>
      <dc:date>2015-10-12T18:21:00Z</dc:date>
    </item>
    <item>
      <title>Re: VPN s2s with Juniper ScreenOS with multiple networks on PA side</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-s2s-with-juniper-screenos-with-multiple-networks-on-pa-side/m-p/66501#M39221</link>
      <description>&lt;P&gt;Hi Glastra&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I cretaed static source route from LAN of Netscreen device and internet traffic started working.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank You for all of You for Your help.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;SLawek&lt;/P&gt;</description>
      <pubDate>Wed, 14 Oct 2015 08:43:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-s2s-with-juniper-screenos-with-multiple-networks-on-pa-side/m-p/66501#M39221</guid>
      <dc:creator>_slv_</dc:creator>
      <dc:date>2015-10-14T08:43:58Z</dc:date>
    </item>
  </channel>
</rss>

