<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic IPSEC VPN support for both side as Dynamic, Supported on Juniper but not on PA in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-support-for-both-side-as-dynamic-supported-on-juniper/m-p/130989#M46888</link>
    <description>&lt;P&gt;Hi There,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I was migrating configuration from Juniper to PA, everything worked as expected except IPSEC VPN.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Customer has two sites and both sites have ADSL connection with Dynamic IP address, however on one end Dyn DNS is used. In the below example Site-A has Dyn DNS and &lt;A href="http://www.vpn.com" target="_blank"&gt;www.vpn.com&lt;/A&gt; gets updated as soon as IP gets changed on Site-A. But on PA there is no option to configure FQDN for static peer only IP address. However on Juniper you can select peer as Static and you can configured IP/FQDN, even though peer is dynamic you can select it as static and configure the FQDN "&lt;A href="http://www.vpn.com" target="_blank"&gt;www.vpn.com&lt;/A&gt;" and Site-B fires IPSEC VPN traffic and works like a charm.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="IPSEC VPN.PNG" style="width: 716px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/6709i71E486D167CA51AD/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="IPSEC VPN.PNG" alt="IPSEC VPN.PNG" /&gt;&lt;/span&gt;﻿&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Below is the example, where you can configure FQDN on Juniper, I was wondering that does PA has any plan to allow both IP and FQDN if you select peer type as Static like Juniper.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="IPSEC VPN2.PNG" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/6710i3E6FDFD24179F6BD/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="IPSEC VPN2.PNG" alt="IPSEC VPN2.PNG" /&gt;&lt;/span&gt;﻿&lt;/P&gt;</description>
    <pubDate>Sun, 04 Dec 2016 09:46:51 GMT</pubDate>
    <dc:creator>fozail</dc:creator>
    <dc:date>2016-12-04T09:46:51Z</dc:date>
    <item>
      <title>IPSEC VPN support for both side as Dynamic, Supported on Juniper but not on PA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-support-for-both-side-as-dynamic-supported-on-juniper/m-p/130989#M46888</link>
      <description>&lt;P&gt;Hi There,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I was migrating configuration from Juniper to PA, everything worked as expected except IPSEC VPN.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Customer has two sites and both sites have ADSL connection with Dynamic IP address, however on one end Dyn DNS is used. In the below example Site-A has Dyn DNS and &lt;A href="http://www.vpn.com" target="_blank"&gt;www.vpn.com&lt;/A&gt; gets updated as soon as IP gets changed on Site-A. But on PA there is no option to configure FQDN for static peer only IP address. However on Juniper you can select peer as Static and you can configured IP/FQDN, even though peer is dynamic you can select it as static and configure the FQDN "&lt;A href="http://www.vpn.com" target="_blank"&gt;www.vpn.com&lt;/A&gt;" and Site-B fires IPSEC VPN traffic and works like a charm.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="IPSEC VPN.PNG" style="width: 716px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/6709i71E486D167CA51AD/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="IPSEC VPN.PNG" alt="IPSEC VPN.PNG" /&gt;&lt;/span&gt;﻿&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Below is the example, where you can configure FQDN on Juniper, I was wondering that does PA has any plan to allow both IP and FQDN if you select peer type as Static like Juniper.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="IPSEC VPN2.PNG" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/6710i3E6FDFD24179F6BD/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="IPSEC VPN2.PNG" alt="IPSEC VPN2.PNG" /&gt;&lt;/span&gt;﻿&lt;/P&gt;</description>
      <pubDate>Sun, 04 Dec 2016 09:46:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-support-for-both-side-as-dynamic-supported-on-juniper/m-p/130989#M46888</guid>
      <dc:creator>fozail</dc:creator>
      <dc:date>2016-12-04T09:46:51Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC VPN support for both side as Dynamic, Supported on Juniper but not on PA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-support-for-both-side-as-dynamic-supported-on-juniper/m-p/131062#M46897</link>
      <description>&lt;P&gt;IN Palto firewall if you are using dynamic ip .. please select as below.. the you can established site to site vpn&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="vpn.PNG" style="width: 610px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/6713i8DCE1732B8561734/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="vpn.PNG" alt="vpn.PNG" /&gt;&lt;/span&gt;﻿&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 05 Dec 2016 06:10:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-support-for-both-side-as-dynamic-supported-on-juniper/m-p/131062#M46897</guid>
      <dc:creator>Fitaihi_NetworkAdmin</dc:creator>
      <dc:date>2016-12-05T06:10:57Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC VPN support for both side as Dynamic, Supported on Juniper but not on PA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-support-for-both-side-as-dynamic-supported-on-juniper/m-p/131064#M46898</link>
      <description>&lt;P&gt;That could work. But you need to make sure the other side uses FQDN for phase 1 identification. From that Juniper screenshot FQDN is used only for getting the IP for transport while peer ID is left empty.&lt;/P&gt;</description>
      <pubDate>Mon, 05 Dec 2016 07:11:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-support-for-both-side-as-dynamic-supported-on-juniper/m-p/131064#M46898</guid>
      <dc:creator>santonic</dc:creator>
      <dc:date>2016-12-05T07:11:34Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC VPN support for both side as Dynamic, Supported on Juniper but not on PA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-support-for-both-side-as-dynamic-supported-on-juniper/m-p/131072#M46900</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Agreed with the comments above. Make sure PA can resolve FQDN of the peer (bi-directional). DDNS has to be configured for the both peers&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 05 Dec 2016 10:03:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-support-for-both-side-as-dynamic-supported-on-juniper/m-p/131072#M46900</guid>
      <dc:creator>TranceforLife</dc:creator>
      <dc:date>2016-12-05T10:03:23Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC VPN support for both side as Dynamic, Supported on Juniper but not on PA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-support-for-both-side-as-dynamic-supported-on-juniper/m-p/131173#M46923</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I configured peer identification as FQDN, but PA does not fire IPSEC VPN. Enabled debug for ikemgr.log and could see that "can't initiate IPSEC VPN for Dynamic peer".&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 05 Dec 2016 15:29:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-support-for-both-side-as-dynamic-supported-on-juniper/m-p/131173#M46923</guid>
      <dc:creator>fozail</dc:creator>
      <dc:date>2016-12-05T15:29:49Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC VPN support for both side as Dynamic, Supported on Juniper but not on PA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-support-for-both-side-as-dynamic-supported-on-juniper/m-p/131187#M46925</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Post the IKE Gateway config and logs from the both devices if possible.&lt;/P&gt;&lt;P&gt;Can you resolve the FQDN for the remote peer? Can peer resolve yours? Can you reach the&amp;nbsp;peer with simple ping? How about your security policies. Do you have IPSEC traffic permitted&amp;nbsp;on the untrust interface (same zone traffic untrust&amp;gt;untrust)? (you can enable management profile for outside interface for the test)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thx,&lt;/P&gt;&lt;P&gt;Myky&lt;/P&gt;</description>
      <pubDate>Mon, 05 Dec 2016 16:08:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-support-for-both-side-as-dynamic-supported-on-juniper/m-p/131187#M46925</guid>
      <dc:creator>TranceforLife</dc:creator>
      <dc:date>2016-12-05T16:08:38Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC VPN support for both side as Dynamic, Supported on Juniper but not on PA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-support-for-both-side-as-dynamic-supported-on-juniper/m-p/131197#M46928</link>
      <description>&lt;P&gt;You likely have a configuration error on the IKE gateway, I assume that the security policy to allow the traffic has already been generated on both devices. To clarify this connection is between two Palo Alto devices right, it isn't a Palo Alto to something else?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 05 Dec 2016 16:07:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-support-for-both-side-as-dynamic-supported-on-juniper/m-p/131197#M46928</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2016-12-05T16:07:15Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC VPN support for both side as Dynamic, Supported on Juniper but not on PA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-support-for-both-side-as-dynamic-supported-on-juniper/m-p/131208#M46930</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yes I can resolve the FQDN of peer. I can reach to peer (ping source X.X.X.X host &lt;A href="http://www.xyz.com" target="_blank"&gt;www.xyz.com&lt;/A&gt;).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I don't see any traffic reaching on remote peer.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;A security policy has been configured on both end to allow IPSEC traffic.&lt;/P&gt;</description>
      <pubDate>Mon, 05 Dec 2016 16:20:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-support-for-both-side-as-dynamic-supported-on-juniper/m-p/131208#M46930</guid>
      <dc:creator>fozail</dc:creator>
      <dc:date>2016-12-05T16:20:03Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC VPN support for both side as Dynamic, Supported on Juniper but not on PA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-support-for-both-side-as-dynamic-supported-on-juniper/m-p/131211#M46932</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What is on the&amp;nbsp;remote side (device)? Logs will help. Also, who is an initiator of the tunnel? Best to check responder side logs.&lt;/P&gt;&lt;P&gt;Can you provide the logs?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thx,&lt;/P&gt;&lt;P&gt;Myky&lt;/P&gt;</description>
      <pubDate>Mon, 05 Dec 2016 16:28:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-support-for-both-side-as-dynamic-supported-on-juniper/m-p/131211#M46932</guid>
      <dc:creator>TranceforLife</dc:creator>
      <dc:date>2016-12-05T16:28:36Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC VPN support for both side as Dynamic, Supported on Juniper but not on PA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-support-for-both-side-as-dynamic-supported-on-juniper/m-p/131212#M46933</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Got the confirmation from PA TAC that tunnel can't be stablished if both peer is DYNAMIC, one end has to be static.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But it is supported on Juniper, henec I will raise a feature request for this.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for your help.&lt;/P&gt;</description>
      <pubDate>Mon, 05 Dec 2016 16:30:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-support-for-both-side-as-dynamic-supported-on-juniper/m-p/131212#M46933</guid>
      <dc:creator>fozail</dc:creator>
      <dc:date>2016-12-05T16:30:57Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC VPN support for both side as Dynamic, Supported on Juniper but not on PA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-support-for-both-side-as-dynamic-supported-on-juniper/m-p/131214#M46934</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Very good info)) I always thought you can with PA. Theoretically should work&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thx,&lt;/P&gt;&lt;P&gt;Myky&lt;/P&gt;</description>
      <pubDate>Mon, 05 Dec 2016 16:32:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-support-for-both-side-as-dynamic-supported-on-juniper/m-p/131214#M46934</guid>
      <dc:creator>TranceforLife</dc:creator>
      <dc:date>2016-12-05T16:32:30Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC VPN support for both side as Dynamic, Supported on Juniper but not on PA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-support-for-both-side-as-dynamic-supported-on-juniper/m-p/131246#M46938</link>
      <description>&lt;P&gt;Same, I guess I never had a need for both ends to be dynamic.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 05 Dec 2016 18:10:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-support-for-both-side-as-dynamic-supported-on-juniper/m-p/131246#M46938</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2016-12-05T18:10:17Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC VPN support for both side as Dynamic, Supported on Juniper but not on PA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-support-for-both-side-as-dynamic-supported-on-juniper/m-p/131253#M46941</link>
      <description>&lt;P&gt;Yes, I concur with you. I had an impression that if FQDN gets resolved to an IP, it should work.&lt;/P&gt;</description>
      <pubDate>Mon, 05 Dec 2016 18:58:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-support-for-both-side-as-dynamic-supported-on-juniper/m-p/131253#M46941</guid>
      <dc:creator>fozail</dc:creator>
      <dc:date>2016-12-05T18:58:20Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC VPN support for both side as Dynamic, Supported on Juniper but not on PA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-support-for-both-side-as-dynamic-supported-on-juniper/m-p/131382#M46948</link>
      <description>&lt;P&gt;FQDN in this case is just an ID for phase 1. If peer is set as dynamic, PA can't know to which IP address to send the packet to. I assumed you have static IP on PA and the other gateway could be initiator. And yeah, if both gatways have dynamic IP nobody can know to what IP to send packets to start negotiation.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In Juniper case i guess FQDN was just a mechanism to feed IP to FW and IPSEC was basically set as static to static. Which I agree is a good feature to have.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 06 Dec 2016 07:16:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-support-for-both-side-as-dynamic-supported-on-juniper/m-p/131382#M46948</guid>
      <dc:creator>santonic</dc:creator>
      <dc:date>2016-12-06T07:16:29Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC VPN support for both side as Dynamic, Supported on Juniper but not on PA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-support-for-both-side-as-dynamic-supported-on-juniper/m-p/131512#M46965</link>
      <description>&lt;P&gt;Yep this is what l thought so that PA resolve a DNS&amp;gt;IP before initiate a tunnel P1&lt;/P&gt;</description>
      <pubDate>Tue, 06 Dec 2016 16:54:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-support-for-both-side-as-dynamic-supported-on-juniper/m-p/131512#M46965</guid>
      <dc:creator>TranceforLife</dc:creator>
      <dc:date>2016-12-06T16:54:47Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC VPN support for both side as Dynamic, Supported on Juniper but not on PA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-support-for-both-side-as-dynamic-supported-on-juniper/m-p/131753#M46975</link>
      <description>&lt;P&gt;Yes, you are correct. It's jsut a peer identification. As both peer is dynamic and hence does not know IP address of peer. So tunnel can't be initiated by any peer.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If we have one one end as static and other as dynamic, who has dynamic can always initiate the tunnel as it's local IP is dynamic but it knows peer IP.&lt;/P&gt;</description>
      <pubDate>Wed, 07 Dec 2016 13:31:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-support-for-both-side-as-dynamic-supported-on-juniper/m-p/131753#M46975</guid>
      <dc:creator>fozail</dc:creator>
      <dc:date>2016-12-07T13:31:27Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC VPN support for both side as Dynamic, Supported on Juniper but not on PA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-support-for-both-side-as-dynamic-supported-on-juniper/m-p/131995#M47000</link>
      <description>&lt;P&gt;Unfortunately, the feature to use a FQDN instead of an IP address for a remote VPN gateway is a rare&amp;nbsp;one in the site-to-site VPN world. As you picture, SceeenOS had this feature and Sonicwall was the only other one I've worked with that allowed this configuration option. &amp;nbsp;This is very convenient but rare.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Even Juniper only semi migrated this to Junos. &amp;nbsp;They allow you to enter an FQDN gateway when you do a VPN configuration but Junos simply uses this to resove the CURRENT address for the FQDN then stores and uses the actual IP address in the configuration.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So the bottom line here is one side will need to have an IP address gateway entered to get a configuration to initiate and come up.&lt;/P&gt;</description>
      <pubDate>Thu, 08 Dec 2016 11:13:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-support-for-both-side-as-dynamic-supported-on-juniper/m-p/131995#M47000</guid>
      <dc:creator>pulukas</dc:creator>
      <dc:date>2016-12-08T11:13:25Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC VPN support for both side as Dynamic, Supported on Juniper but not on PA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-support-for-both-side-as-dynamic-supported-on-juniper/m-p/132272#M47048</link>
      <description>Hi, Yes, you are correct. One end should have static IP address to establish the IPSEC VPN.</description>
      <pubDate>Fri, 09 Dec 2016 14:44:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-support-for-both-side-as-dynamic-supported-on-juniper/m-p/132272#M47048</guid>
      <dc:creator>fozail</dc:creator>
      <dc:date>2016-12-09T14:44:23Z</dc:date>
    </item>
  </channel>
</rss>

