<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ipsec in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec/m-p/71593#M40844</link>
    <description>&lt;P&gt;&lt;SPAN&gt;Hi Stever&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Here is my setup ,&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;STRONG&gt;ASA (internet side) &amp;lt;------------untrust-----&amp;gt; ( PA VWIRE mode)&amp;nbsp;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;You said&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;"If this is true, you would need to look at your outbound internet access policy setup on the PA. &amp;nbsp;Find the zone assignment for the address pool you assign to users on the ASA. &amp;nbsp;"&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;for example &amp;nbsp;i have assigned vpnusers group 1 ip address &amp;nbsp;( 10.10.10.100- 10.10.10.200) ,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;i would consider these ip addresses are in untrust zone .&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In PA logs &amp;nbsp;, once the vpn connection established , how the traffic look like.I mean the source &amp;nbsp;visible to PA is from the address pool or &amp;nbsp;global IP ?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;" Make sure there is an outbound from this zone to untrust policy on the PA. " ?&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;You mean from the ASA&amp;nbsp;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;"Ma&lt;STRONG&gt;ke sure there is a NAT policy from this address and zone to untrust on the PA." &amp;nbsp;?&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;You mean from the ASA&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Second thing i was talking about a user sitting inside behind the PA &amp;nbsp;and connecting usinng vpn to outside comapny x .&lt;/P&gt;
&lt;P&gt;I don't have an explicit policy to deny these ipsec traffic &amp;nbsp;, sometimes users complain that they are not able t connect to company x .i can see palalto tagging this traffic as &amp;nbsp;ciscovpn . But once they connected ,from palo alto side how the traffic look like ?&lt;/P&gt;
&lt;P&gt;from the log how do i know that is it a succesful connection ?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 26 Jan 2016 06:12:44 GMT</pubDate>
    <dc:creator>sib2017</dc:creator>
    <dc:date>2016-01-26T06:12:44Z</dc:date>
    <item>
      <title>ipsec</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec/m-p/71091#M40671</link>
      <description>&lt;P&gt;Hi&lt;BR /&gt; Internet edge firewall is cisco asa .&lt;BR /&gt;Behind Palo alto running in virtual vire mode. &lt;BR /&gt;for some reason ipsec users cannot connet to outside . &lt;BR /&gt;What we need to be done at palo alto side ?&lt;BR /&gt;Thanks&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 18 Jan 2016 11:41:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec/m-p/71091#M40671</guid>
      <dc:creator>sib2017</dc:creator>
      <dc:date>2016-01-18T11:41:13Z</dc:date>
    </item>
    <item>
      <title>Re: ipsec</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec/m-p/71103#M40677</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hi Sib,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Do you observe the VPN negotiation failing or only the traffic is not passing through after the VPN comes up ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please make sure that Palo alto is passthrough for the IPSEC :&lt;/P&gt;
&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/Configuration-Articles/Configuring-the-Palo-Alto-Networks-Device-as-an-IPSec/ta-p/58732" target="_blank"&gt;https://live.paloaltonetworks.com/t5/Configuration-Articles/Configuring-the-Palo-Alto-Networks-Device-as-an-IPSec/ta-p/58732&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If this does not help, please check what traffic is being dropped by the firewall for the user IPs from the internal network and&amp;nbsp;&lt;/P&gt;
&lt;P&gt;the IP they are trying to connect to. You may monitor the application in case strict rules have been used to application&lt;/P&gt;
&lt;P&gt;control.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hope this helps !&lt;/P&gt;</description>
      <pubDate>Mon, 18 Jan 2016 13:46:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec/m-p/71103#M40677</guid>
      <dc:creator>syadav</dc:creator>
      <dc:date>2016-01-18T13:46:06Z</dc:date>
    </item>
    <item>
      <title>Re: ipsec</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec/m-p/71107#M40680</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;Thanks for the reply ,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In my case &amp;nbsp;what will be the source ip address , i am using cisco client &amp;nbsp;to connect out side .&amp;nbsp;&lt;/P&gt;
&lt;P&gt;?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 18 Jan 2016 14:23:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec/m-p/71107#M40680</guid>
      <dc:creator>sib2017</dc:creator>
      <dc:date>2016-01-18T14:23:37Z</dc:date>
    </item>
    <item>
      <title>Re: ipsec</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec/m-p/71515#M40813</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/11223"&gt;@sib2017﻿&lt;/a&gt;&amp;nbsp; If the VPN negotiations itself are failing, then you sould see the request coming from the IP of the PC.&lt;/P&gt;
&lt;P&gt;On the PA, you may check if any traffic is denied/dropped between the IP of the PC and the IP corresponding to the destination IP. Packet captures between these IPs would help.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 24 Jan 2016 07:44:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec/m-p/71515#M40813</guid>
      <dc:creator>syadav</dc:creator>
      <dc:date>2016-01-24T07:44:17Z</dc:date>
    </item>
    <item>
      <title>Re: ipsec</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec/m-p/71521#M40815</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;The tunnel is up and running , after tunnel is up &amp;nbsp;i cannot access anything .&amp;nbsp;&lt;/P&gt;
&lt;P&gt;what does it mean&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks a lot of your support&lt;/P&gt;</description>
      <pubDate>Sun, 24 Jan 2016 19:31:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec/m-p/71521#M40815</guid>
      <dc:creator>sib2017</dc:creator>
      <dc:date>2016-01-24T19:31:24Z</dc:date>
    </item>
    <item>
      <title>Re: ipsec</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec/m-p/71532#M40819</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/11223"&gt;@sib2017﻿&lt;/a&gt;&amp;nbsp;&amp;nbsp;If we assume that the tunnel is setup fine and only the traffic is failing, you should see&lt;BR /&gt;UDP/ESP traffic on the Palo alto. Please check cisco documentation which exact port they use for this traffic.&lt;BR /&gt;ESP protocol number is 50, you may filter with this as well.&lt;/P&gt;</description>
      <pubDate>Mon, 25 Jan 2016 02:17:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec/m-p/71532#M40819</guid>
      <dc:creator>syadav</dc:creator>
      <dc:date>2016-01-25T02:17:48Z</dc:date>
    </item>
    <item>
      <title>Re: ipsec</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec/m-p/71552#M40826</link>
      <description>&lt;P&gt;From your description, I think you are saying that the ASA user access tunnels establish correctly. &amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;And that the users are setup without split tunnel so internet access will be from the ASA.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;And that users are blocked from internet access after connecting.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If this is true, you would need to look at your outbound internet access policy setup on the PA. &amp;nbsp;Find the zone assignment for the address pool you assign to users on the ASA. &amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Make sure there is an outbound from this zone to untrust policy on the PA.&lt;/P&gt;
&lt;P&gt;Make sure there is a NAT policy from this address and zone to untrust on the PA.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Check the logs on the PA for these source addresses to see why the traffic is denied. &amp;nbsp;Also confirm you have logging turned on for your final deny rules.&lt;/P&gt;</description>
      <pubDate>Mon, 25 Jan 2016 11:25:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec/m-p/71552#M40826</guid>
      <dc:creator>pulukas</dc:creator>
      <dc:date>2016-01-25T11:25:06Z</dc:date>
    </item>
    <item>
      <title>Re: ipsec</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec/m-p/71593#M40844</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Hi Stever&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Here is my setup ,&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;STRONG&gt;ASA (internet side) &amp;lt;------------untrust-----&amp;gt; ( PA VWIRE mode)&amp;nbsp;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;You said&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;"If this is true, you would need to look at your outbound internet access policy setup on the PA. &amp;nbsp;Find the zone assignment for the address pool you assign to users on the ASA. &amp;nbsp;"&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;for example &amp;nbsp;i have assigned vpnusers group 1 ip address &amp;nbsp;( 10.10.10.100- 10.10.10.200) ,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;i would consider these ip addresses are in untrust zone .&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In PA logs &amp;nbsp;, once the vpn connection established , how the traffic look like.I mean the source &amp;nbsp;visible to PA is from the address pool or &amp;nbsp;global IP ?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;" Make sure there is an outbound from this zone to untrust policy on the PA. " ?&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;You mean from the ASA&amp;nbsp;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;"Ma&lt;STRONG&gt;ke sure there is a NAT policy from this address and zone to untrust on the PA." &amp;nbsp;?&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;You mean from the ASA&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Second thing i was talking about a user sitting inside behind the PA &amp;nbsp;and connecting usinng vpn to outside comapny x .&lt;/P&gt;
&lt;P&gt;I don't have an explicit policy to deny these ipsec traffic &amp;nbsp;, sometimes users complain that they are not able t connect to company x .i can see palalto tagging this traffic as &amp;nbsp;ciscovpn . But once they connected ,from palo alto side how the traffic look like ?&lt;/P&gt;
&lt;P&gt;from the log how do i know that is it a succesful connection ?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 26 Jan 2016 06:12:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec/m-p/71593#M40844</guid>
      <dc:creator>sib2017</dc:creator>
      <dc:date>2016-01-26T06:12:44Z</dc:date>
    </item>
    <item>
      <title>Re: ipsec</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec/m-p/71605#M40852</link>
      <description>&lt;P&gt;I am confused on what the issue is for inbound VPN.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Users connect to the Cisco ASA for SSL VPN and cannot access internet? &amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Users connect to PA SSL VPN and cannot access Internet?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Users connect to PA SSL VPN and cannot access internal resources?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;to find outbound connections and logs on the PA filter&amp;nbsp;for the source address and&amp;nbsp;destination address of the&amp;nbsp;user and destination vpn in the logs. &amp;nbsp;These will show if the traffic is permitted or denied.&lt;/P&gt;</description>
      <pubDate>Tue, 26 Jan 2016 11:05:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec/m-p/71605#M40852</guid>
      <dc:creator>pulukas</dc:creator>
      <dc:date>2016-01-26T11:05:50Z</dc:date>
    </item>
    <item>
      <title>Re: ipsec</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec/m-p/71674#M40880</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please clarify the setup a bit more. I am assuming the setup to be as below:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Cisco ASA ---------- Internet Cloud ------------ PA Vwire ------- VPN User&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;\------------------------------- VPN --------------------------------/&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;1. In this case shall we assume that VPN user is connecting using&amp;nbsp;Cisco VPN client to the Cisco ASA?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;2. Where is the NAT on the PA side? Is there another Router on the PA side which is natting the private network? For example:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Cisco ASA ---------- Internet Cloud ------------ Edge Router ------ PA Vwire ------- VPN User&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;\------------------------------------------ VPN ------------------------------------------/&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN&gt;3. If this is correct as above, then PA should allow&amp;nbsp;ESP/ UDP-4500 traffic if IPSEC VPN.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN&gt;4.&amp;nbsp;If there is no split tunneling, then, on Cisco ASA, there should be a ACL to allow traffic coming from tunnel and going out to Internet unencrypted. Also you need a source NAT on Cisco ASA for the same.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN&gt;5. To troubleshoot, check traffic logs on PA with source IP as the actual IP on the VPN User (not VPN assigned IP), and destination IP as Cisco ASA. Check for any drops.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN&gt;6. On the Cisco ASA check if it is receiving any traffic via the tunnel, and then check how is the packet getting processed.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN&gt;BR.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 27 Jan 2016 02:27:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec/m-p/71674#M40880</guid>
      <dc:creator>abjain</dc:creator>
      <dc:date>2016-01-27T02:27:06Z</dc:date>
    </item>
  </channel>
</rss>

