<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: IPSEC question in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-question/m-p/147366#M49378</link>
    <description>&lt;P&gt;Np.&lt;/P&gt;</description>
    <pubDate>Mon, 13 Mar 2017 08:35:21 GMT</pubDate>
    <dc:creator>santonic</dc:creator>
    <dc:date>2017-03-13T08:35:21Z</dc:date>
    <item>
      <title>IPSEC question</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-question/m-p/147318#M49359</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I&amp;nbsp;have&amp;nbsp;an&amp;nbsp;existing&amp;nbsp;site&amp;nbsp;with&amp;nbsp;Cisco&amp;nbsp;ASA&amp;nbsp;IPsec&amp;nbsp;tunnel&amp;nbsp;to&amp;nbsp;my&amp;nbsp;HQ&amp;nbsp;Site&amp;nbsp;with&amp;nbsp;Palo&amp;nbsp;Alto&amp;nbsp;firewall.&amp;nbsp;Users&amp;nbsp;at&amp;nbsp;the&amp;nbsp;existing&amp;nbsp;site&amp;nbsp;obtained&amp;nbsp;their&amp;nbsp;IP&lt;BR /&gt;address&amp;nbsp;via&amp;nbsp;DHCP&amp;nbsp;Server&amp;nbsp;configured&amp;nbsp;on&amp;nbsp;the&amp;nbsp;ASA.T&amp;nbsp;he&amp;nbsp;inside&amp;nbsp;interface&amp;nbsp;is&amp;nbsp;G0/0&amp;nbsp;with&amp;nbsp;10.10.1.10/24&amp;nbsp;and&amp;nbsp;outside&amp;nbsp;interface&amp;nbsp;is&amp;nbsp;ISP&amp;nbsp;public&amp;nbsp;IP&lt;BR /&gt;address.&amp;nbsp;PAT&amp;nbsp;translation&amp;nbsp;is&amp;nbsp;configured&amp;nbsp;for&amp;nbsp;internet&amp;nbsp;access.&amp;nbsp;For&amp;nbsp;internal&amp;nbsp;users&amp;nbsp;to&amp;nbsp;access&amp;nbsp;the&amp;nbsp;servers&amp;nbsp;in&amp;nbsp;HQ,&amp;nbsp;it&amp;nbsp;is&amp;nbsp;configured&amp;nbsp;with&amp;nbsp;nat&lt;BR /&gt;exemption.&amp;nbsp;&amp;nbsp;There&amp;nbsp;is&amp;nbsp;no&amp;nbsp;DMZ&amp;nbsp;interface.&amp;nbsp;Default&amp;nbsp;route&amp;nbsp;goes&amp;nbsp;to&amp;nbsp;the&amp;nbsp;ISPA&amp;nbsp;next&amp;nbsp;at&amp;nbsp;branch&amp;nbsp;site.&amp;nbsp;On&amp;nbsp;HQ&amp;nbsp;side,&amp;nbsp;default&amp;nbsp;route&amp;nbsp;configured&amp;nbsp;to&amp;nbsp;ISPB&lt;BR /&gt;next&amp;nbsp;hop.&amp;nbsp;&lt;/P&gt;&lt;P&gt;There&amp;nbsp;will&amp;nbsp;be&amp;nbsp;a&amp;nbsp;new&amp;nbsp;office&amp;nbsp;setup&amp;nbsp;in&amp;nbsp;another&amp;nbsp;location&amp;nbsp;with&amp;nbsp;another&amp;nbsp;new&amp;nbsp;Cisco&amp;nbsp;ASA&amp;nbsp;IPsec&amp;nbsp;tunnel&amp;nbsp;back&amp;nbsp;to&amp;nbsp;the&amp;nbsp;same&amp;nbsp;HQ&amp;nbsp;site&amp;nbsp;PA&amp;nbsp;FW.&amp;nbsp;The&lt;BR /&gt;inside&amp;nbsp;interface&amp;nbsp;on&amp;nbsp;this&amp;nbsp;new&amp;nbsp;firewall&amp;nbsp;is&amp;nbsp;also&amp;nbsp;G0/0&amp;nbsp;10.10.1.10/24,&amp;nbsp;PAT&amp;nbsp;translation&amp;nbsp;for&amp;nbsp;internet&amp;nbsp;and&amp;nbsp;also&amp;nbsp;nat&amp;nbsp;exemption&amp;nbsp;for&amp;nbsp;users&amp;nbsp;to&amp;nbsp;access&lt;BR /&gt;HQ&amp;nbsp;servers.DHCP&amp;nbsp;server&amp;nbsp;will&amp;nbsp;also&amp;nbsp;be&amp;nbsp;configured&amp;nbsp;on&amp;nbsp;the&amp;nbsp;new&amp;nbsp;ASA,&amp;nbsp;The&amp;nbsp;new&amp;nbsp;office&amp;nbsp;has&amp;nbsp;different&amp;nbsp;ISP&amp;nbsp;provider.Eg&amp;nbsp;ISP&amp;nbsp;C&amp;nbsp;and&amp;nbsp;ISP&amp;nbsp;D&amp;nbsp;on&amp;nbsp;each&lt;BR /&gt;side.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Just&amp;nbsp;wanted&amp;nbsp;to&amp;nbsp;ask&amp;nbsp;some&amp;nbsp;subnet&amp;nbsp;concepts&amp;nbsp;and&amp;nbsp;IP&amp;nbsp;addressing&amp;nbsp;at&amp;nbsp;the&amp;nbsp;existing&amp;nbsp;site&amp;nbsp;and&amp;nbsp;also&amp;nbsp;the&amp;nbsp;new&amp;nbsp;site&amp;nbsp;for&amp;nbsp;the&amp;nbsp;IPsec&amp;nbsp;parallel&amp;nbsp;migraton.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In&amp;nbsp;order&amp;nbsp;to&amp;nbsp;run&amp;nbsp;IPsec&amp;nbsp;on&amp;nbsp;both&amp;nbsp;locations&amp;nbsp;parallel&amp;nbsp;to&amp;nbsp;HQ,&amp;nbsp;on&amp;nbsp;existing&amp;nbsp;site,&amp;nbsp;Could&amp;nbsp;i&amp;nbsp;just&amp;nbsp;change&amp;nbsp;the&amp;nbsp;DHCP&amp;nbsp;range&amp;nbsp;&amp;nbsp;to&amp;nbsp;be&amp;nbsp;10.10.1.1&amp;nbsp;­&lt;BR /&gt;10.10.1.128&amp;nbsp;on&amp;nbsp;the&amp;nbsp;existing&amp;nbsp;branch&amp;nbsp;site&amp;nbsp;ASA.&amp;nbsp;For&amp;nbsp;new&amp;nbsp;site,&amp;nbsp;the&amp;nbsp;DHCP&amp;nbsp;range&amp;nbsp;will&amp;nbsp;be&amp;nbsp;10.10.1.129&amp;nbsp;­&amp;nbsp;10.10.1.254.&amp;nbsp;There&amp;nbsp;will&amp;nbsp;be&amp;nbsp;no&lt;BR /&gt;additional&amp;nbsp;tunnel&amp;nbsp;interface&amp;nbsp;created&amp;nbsp;at&amp;nbsp;the&amp;nbsp;PA&amp;nbsp;FW&amp;nbsp;in&amp;nbsp;HQ.&amp;nbsp;Will&amp;nbsp;this&amp;nbsp;method&amp;nbsp;works?&amp;nbsp;The&amp;nbsp;inside&amp;nbsp;ASA&amp;nbsp;interface&amp;nbsp;on&amp;nbsp;both&amp;nbsp;existing&amp;nbsp;and&amp;nbsp;new&amp;nbsp;site is&amp;nbsp;still&amp;nbsp;10.10.1.10/24.&lt;/P&gt;</description>
      <pubDate>Mon, 13 Mar 2017 05:39:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-question/m-p/147318#M49359</guid>
      <dc:creator>donathon</dc:creator>
      <dc:date>2017-03-13T05:39:02Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC question</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-question/m-p/147338#M49360</link>
      <description>&lt;P&gt;Not pretty but it would work. Just make sure routes on PA are correct: 10.10.1.0/25 to the first tunnel interface and 10.10.1.128/25 to the second. However for IPSEC to be established with current settings you will have to keep Proxy IDs on PA as 10.10.1.0/24 for both.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Just out of curiosity; why not just setup 2nd location with 10.10.2.0/24 network? I doubt you're running out of private classes?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 13 Mar 2017 07:18:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-question/m-p/147338#M49360</guid>
      <dc:creator>santonic</dc:creator>
      <dc:date>2017-03-13T07:18:13Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC question</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-question/m-p/147339#M49361</link>
      <description>&lt;P&gt;Won't the return traffic have issues since the gateway are the same but yet the host are on 2 physically disconnected IPSEC tunnel? Would services that rely on broadcast traffic still work since it is the same broadcast domain but on 2 physical links?&lt;/P&gt;</description>
      <pubDate>Mon, 13 Mar 2017 07:22:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-question/m-p/147339#M49361</guid>
      <dc:creator>donathon</dc:creator>
      <dc:date>2017-03-13T07:22:02Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC question</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-question/m-p/147341#M49363</link>
      <description>&lt;P&gt;Why would the gateway be the same? You mean for routes that point into IPSEC tunnel?&lt;/P&gt;&lt;P&gt;Point those routes to interace only, not specific IP.&lt;/P&gt;&lt;P&gt;Like:&lt;/P&gt;&lt;P&gt;10.10.1.0/25 next hop interface tunnel.x1&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;10.10.1.128/25 next hop interface tunnel.x2&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 13 Mar 2017 07:26:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-question/m-p/147341#M49363</guid>
      <dc:creator>santonic</dc:creator>
      <dc:date>2017-03-13T07:26:04Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC question</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-question/m-p/147350#M49366</link>
      <description>&lt;P&gt;As mentioned in the first post. There is no subnetting in place. Basically, both of the tunnel is using /24 which have the same gateway and same broadcast domain. The only thing that is different is the DHCP scope is active for the first tunnel (.1-.128) only and the 2nd tunnel we are going to set static IPs. DHCP would not be possible for the 2nd tunnel.&lt;/P&gt;</description>
      <pubDate>Mon, 13 Mar 2017 07:38:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-question/m-p/147350#M49366</guid>
      <dc:creator>donathon</dc:creator>
      <dc:date>2017-03-13T07:38:51Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC question</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-question/m-p/147351#M49367</link>
      <description>&lt;P&gt;Ohh, I missed the part about '&lt;SPAN&gt;There&amp;nbsp;will&amp;nbsp;be&amp;nbsp;no&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;additional&amp;nbsp;tunnel&amp;nbsp;interface&amp;nbsp;created&amp;nbsp;at&amp;nbsp;the&amp;nbsp;PA&amp;nbsp;FW&amp;nbsp;i&lt;/SPAN&gt;&lt;SPAN&gt;n&amp;nbsp;HQ'&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;How will you make it work then? I don't see a way without additional IPSEC configuration (with needed tunnel interface) on PA.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 13 Mar 2017 07:44:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-question/m-p/147351#M49367</guid>
      <dc:creator>santonic</dc:creator>
      <dc:date>2017-03-13T07:44:21Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC question</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-question/m-p/147355#M49369</link>
      <description>&lt;P&gt;So do you know of any method of making this work? Is this technically not possible?&lt;/P&gt;</description>
      <pubDate>Mon, 13 Mar 2017 07:47:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-question/m-p/147355#M49369</guid>
      <dc:creator>donathon</dc:creator>
      <dc:date>2017-03-13T07:47:00Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC question</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-question/m-p/147356#M49370</link>
      <description>&lt;P&gt;Why not make second IPSEC tunnel on PA? Then everything would be possible (and easy).&lt;/P&gt;</description>
      <pubDate>Mon, 13 Mar 2017 07:52:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-question/m-p/147356#M49370</guid>
      <dc:creator>santonic</dc:creator>
      <dc:date>2017-03-13T07:52:38Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC question</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-question/m-p/147358#M49372</link>
      <description>&lt;P&gt;Well that's not what our Manager that runs network and the firewall says. I am saying that it will not work he is inisting that it will work. So here I am asking if this is even technically feasible.&lt;/P&gt;</description>
      <pubDate>Mon, 13 Mar 2017 07:58:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-question/m-p/147358#M49372</guid>
      <dc:creator>donathon</dc:creator>
      <dc:date>2017-03-13T07:58:13Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC question</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-question/m-p/147359#M49373</link>
      <description>&lt;P&gt;Hehe, i feel sorry for you &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Nope, IPSEC would be flapping between both sites imo. If it would work at all (it would have to be setup with dynamic IP etc..)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 13 Mar 2017 08:07:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-question/m-p/147359#M49373</guid>
      <dc:creator>santonic</dc:creator>
      <dc:date>2017-03-13T08:07:37Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC question</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-question/m-p/147362#M49374</link>
      <description>&lt;P&gt;I am sorry how would dynamic IP work???&lt;/P&gt;</description>
      <pubDate>Mon, 13 Mar 2017 08:11:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-question/m-p/147362#M49374</guid>
      <dc:creator>donathon</dc:creator>
      <dc:date>2017-03-13T08:11:01Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC question</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-question/m-p/147364#M49376</link>
      <description>&lt;P&gt;If you setup on PA IKE gateways with&amp;nbsp;dynamic IPs, aggresive mode IKE and some other sort of ID for phase 1 both locations would be able to establish IPSEC tunnel. But I'm not sure what would happen if they do it at same time, probably IPSEC flapping. And there is no way to distinguish which traffic to route where.&lt;/P&gt;</description>
      <pubDate>Mon, 13 Mar 2017 08:18:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-question/m-p/147364#M49376</guid>
      <dc:creator>santonic</dc:creator>
      <dc:date>2017-03-13T08:18:22Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC question</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-question/m-p/147365#M49377</link>
      <description>&lt;P&gt;Thanks a million!!!&lt;/P&gt;</description>
      <pubDate>Mon, 13 Mar 2017 08:27:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-question/m-p/147365#M49377</guid>
      <dc:creator>donathon</dc:creator>
      <dc:date>2017-03-13T08:27:29Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC question</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-question/m-p/147366#M49378</link>
      <description>&lt;P&gt;Np.&lt;/P&gt;</description>
      <pubDate>Mon, 13 Mar 2017 08:35:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-question/m-p/147366#M49378</guid>
      <dc:creator>santonic</dc:creator>
      <dc:date>2017-03-13T08:35:21Z</dc:date>
    </item>
  </channel>
</rss>

