<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: VPN Site to Site traffic - ALLOWED even if there is defined A SPECIFIC proxy id in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-site-to-site-traffic-allowed-even-if-there-is-defined-a/m-p/148039#M49505</link>
    <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/10238"&gt;@santonic&lt;/a&gt;&amp;nbsp;very valid point. PA is a route (interface) based&amp;nbsp;vpn,&amp;nbsp;so all traffic routed to the tunnel interface gets encrypted. Where policy based one (as the name says) traffic gets encrypted &lt;SPAN&gt;according to a defined policy (an access list). Which device is on the other end?&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Thu, 16 Mar 2017 14:36:58 GMT</pubDate>
    <dc:creator>TranceforLife</dc:creator>
    <dc:date>2017-03-16T14:36:58Z</dc:date>
    <item>
      <title>VPN Site to Site traffic - ALLOWED even if there is defined A SPECIFIC proxy id</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-site-to-site-traffic-allowed-even-if-there-is-defined-a/m-p/148020#M49502</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;First of all enviroment's specific:&lt;/P&gt;&lt;P&gt;panOS 7.1.7&lt;/P&gt;&lt;P&gt;PA 3050&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The "strange behavior description":&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1. VPN S2S between PA and third party vendor&lt;/P&gt;&lt;P&gt;2. Usual configuration&lt;/P&gt;&lt;P&gt;3. Proxy id:&lt;/P&gt;&lt;P&gt;VTI: Tunnel.103&lt;/P&gt;&lt;P&gt;Local: 10.48.0.0/13&lt;/P&gt;&lt;P&gt;Remote: 10.64.22.176/28&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;4. Strange behavior --&amp;gt; Remote network 10.64.22.176/28 is able to reach 10.64.29.0/24 that is NOT defined as our local proxy id&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;**Note: 10.64.29.0/24 is a network that is related with ANOTHER IPsec tunnel behind tunnel.65&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;How this is possible? I never seen a similar behavior before.&lt;/P&gt;&lt;P&gt;I miss something or do you agree that is NOT a normal behavior?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance,&lt;/P&gt;&lt;P&gt;Luca&lt;/P&gt;</description>
      <pubDate>Thu, 16 Mar 2017 14:15:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-site-to-site-traffic-allowed-even-if-there-is-defined-a/m-p/148020#M49502</guid>
      <dc:creator>TheRealDiz</dc:creator>
      <dc:date>2017-03-16T14:15:42Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Site to Site traffic - ALLOWED even if there is defined A SPECIFIC proxy id</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-site-to-site-traffic-allowed-even-if-there-is-defined-a/m-p/148031#M49503</link>
      <description>&lt;P&gt;I guess you are not filtering much with firewall rules?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;PA is not too fussed about proxy-IDs, it just uses them to establish phase 2. After that it receives anything that comes through tunnel I think. And also sends anything into tunnel (per routing table, regardless of source IP). There is no CheckPoint like behavior 'this packet should (not) be encrypted and therefore is dropped'&lt;/P&gt;</description>
      <pubDate>Thu, 16 Mar 2017 14:23:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-site-to-site-traffic-allowed-even-if-there-is-defined-a/m-p/148031#M49503</guid>
      <dc:creator>santonic</dc:creator>
      <dc:date>2017-03-16T14:23:51Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Site to Site traffic - ALLOWED even if there is defined A SPECIFIC proxy id</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-site-to-site-traffic-allowed-even-if-there-is-defined-a/m-p/148032#M49504</link>
      <description>&lt;P&gt;Assuming this ... How can make sense to configure proxy id?!&lt;/P&gt;&lt;P&gt;So IPsec SA generated for specific network&amp;nbsp;&lt;FONT size="4" color="#FF0000"&gt;allows everything you want&lt;/FONT&gt;? Well done...&lt;/P&gt;</description>
      <pubDate>Thu, 16 Mar 2017 14:30:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-site-to-site-traffic-allowed-even-if-there-is-defined-a/m-p/148032#M49504</guid>
      <dc:creator>TheRealDiz</dc:creator>
      <dc:date>2017-03-16T14:30:17Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Site to Site traffic - ALLOWED even if there is defined A SPECIFIC proxy id</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-site-to-site-traffic-allowed-even-if-there-is-defined-a/m-p/148039#M49505</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/10238"&gt;@santonic&lt;/a&gt;&amp;nbsp;very valid point. PA is a route (interface) based&amp;nbsp;vpn,&amp;nbsp;so all traffic routed to the tunnel interface gets encrypted. Where policy based one (as the name says) traffic gets encrypted &lt;SPAN&gt;according to a defined policy (an access list). Which device is on the other end?&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 16 Mar 2017 14:36:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-site-to-site-traffic-allowed-even-if-there-is-defined-a/m-p/148039#M49505</guid>
      <dc:creator>TranceforLife</dc:creator>
      <dc:date>2017-03-16T14:36:58Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Site to Site traffic - ALLOWED even if there is defined A SPECIFIC proxy id</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-site-to-site-traffic-allowed-even-if-there-is-defined-a/m-p/148040#M49506</link>
      <description>&lt;P&gt;Nope, PA &lt;FONT size="3" color="#FF0000"&gt;&lt;STRONG&gt;uses firewall rules to filter&lt;/STRONG&gt;&lt;/FONT&gt;&amp;nbsp;traffic. Not SAs. Or enforcing policy by routing.&lt;/P&gt;</description>
      <pubDate>Thu, 16 Mar 2017 14:40:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-site-to-site-traffic-allowed-even-if-there-is-defined-a/m-p/148040#M49506</guid>
      <dc:creator>santonic</dc:creator>
      <dc:date>2017-03-16T14:40:34Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Site to Site traffic - ALLOWED even if there is defined A SPECIFIC proxy id</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-site-to-site-traffic-allowed-even-if-there-is-defined-a/m-p/148047#M49507</link>
      <description>&lt;P&gt;The best way l think to put tunnel interface to the&amp;nbsp;separate zone and then control&amp;nbsp;the traffic flow by policy as&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/10238"&gt;@santonic&lt;/a&gt;&amp;nbsp;mentioned&lt;/P&gt;</description>
      <pubDate>Thu, 16 Mar 2017 14:40:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-site-to-site-traffic-allowed-even-if-there-is-defined-a/m-p/148047#M49507</guid>
      <dc:creator>TranceforLife</dc:creator>
      <dc:date>2017-03-16T14:40:33Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Site to Site traffic - ALLOWED even if there is defined A SPECIFIC proxy id</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-site-to-site-traffic-allowed-even-if-there-is-defined-a/m-p/148058#M49509</link>
      <description>&lt;P&gt;On the other end probably Fortinet.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If it's like you both told me&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/37163"&gt;@TranceforLife&lt;/a&gt;&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/10238"&gt;@santonic&lt;/a&gt;, I'm a little bit disappointed.&lt;/P&gt;&lt;P&gt;I don't care about Checkpoint, Fortinet etc.&lt;/P&gt;&lt;P&gt;Also I don't care about routing:&lt;/P&gt;&lt;P&gt;You have to configure a specific "tunnel interface". So each VPN tunnel as a dedicated "tunnel interface" and a dedicated route.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;On my side it's a simple a concept:&lt;/P&gt;&lt;P&gt;Define encryption domain between two firewalls = define IPsec security association for specific networks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You told me that:&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Define encryption domain between two firewalls = define IPsec proxy ids. &lt;FONT color="#993300"&gt;Then if there is a route for a network which is NOT included in the proxy id defined, and obviuosly a security policy that allows the traffic flow.. Well go&amp;nbsp;everywhere you want&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;FONT color="#993300"&gt;&lt;FONT color="#000000"&gt;Sorry but from the bottom of my experience.. I'm like &lt;span class="lia-unicode-emoji" title=":face_with_open_mouth:"&gt;😮&lt;/span&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;/FONT&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 16 Mar 2017 14:51:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-site-to-site-traffic-allowed-even-if-there-is-defined-a/m-p/148058#M49509</guid>
      <dc:creator>TheRealDiz</dc:creator>
      <dc:date>2017-03-16T14:51:27Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Site to Site traffic - ALLOWED even if there is defined A SPECIFIC proxy id</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-site-to-site-traffic-allowed-even-if-there-is-defined-a/m-p/148075#M49511</link>
      <description>&lt;P&gt;The proxy ID's are implemented for compatibility with policy based vpn peers as they can only setup phase2 if you provide specific subnets&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The PANW firewalls are route based, so they set up a tunnel as if it is a normal (zone based) interface and then you route traffic to it and set security policies to control which applications are allowed to traverse the tunnel&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If both ends of the tunnel are route based, the proxyIDs are obsolete&lt;/P&gt;</description>
      <pubDate>Thu, 16 Mar 2017 16:05:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-site-to-site-traffic-allowed-even-if-there-is-defined-a/m-p/148075#M49511</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2017-03-16T16:05:13Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Site to Site traffic - ALLOWED even if there is defined A SPECIFIC proxy id</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-site-to-site-traffic-allowed-even-if-there-is-defined-a/m-p/148089#M49514</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/7608"&gt;@reaper&lt;/a&gt;&amp;nbsp;and everybody else pretty much somed this up for you already; but essentially since PA is route based the&amp;nbsp;&lt;EM&gt;only&lt;/EM&gt; reason to include proxy ids is so policy based appliances can actually connect. Generally I like to put my tunnels into there very own zone, then most security policies built for remote offices will include most if not all of the zones, but it allows me to easily filter out traffic if a remote office doesn't need access to something else, like say certain file servers.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 16 Mar 2017 17:15:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-site-to-site-traffic-allowed-even-if-there-is-defined-a/m-p/148089#M49514</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2017-03-16T17:15:29Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Site to Site traffic - ALLOWED even if there is defined A SPECIFIC proxy id</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-site-to-site-traffic-allowed-even-if-there-is-defined-a/m-p/148169#M49530</link>
      <description>&lt;P&gt;Thx all of you for the explanation&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/7608"&gt;@reaper&lt;/a&gt;&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/37163"&gt;@TranceforLife&lt;/a&gt;&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/10238"&gt;@santonic&lt;/a&gt;.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I know that is a route based (zone based) firewall but everytime I have configured proxy ids, I suppose (wrongly) PA would do something implicitly that denies traffic which is not included in the proxy ids defined. I suppose that was a "complete integration" with a VPN policy based firewall.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;"&lt;SPAN&gt;The proxy ID's are implemented (ONLY) for compatibility with policy based vpn peers" --&amp;gt; Is there something &amp;nbsp;explicitly written inside documentation? Or just &lt;FONT color="#993300"&gt;starting from the fact that is route based&lt;/FONT&gt;, PA doesn't take care about "proxy ids"?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Many many thanks again to all of you &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;D!Z&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 17 Mar 2017 09:55:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-site-to-site-traffic-allowed-even-if-there-is-defined-a/m-p/148169#M49530</guid>
      <dc:creator>TheRealDiz</dc:creator>
      <dc:date>2017-03-17T09:55:29Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Site to Site traffic - ALLOWED even if there is defined A SPECIFIC proxy id</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-site-to-site-traffic-allowed-even-if-there-is-defined-a/m-p/148173#M49531</link>
      <description>&lt;P&gt;Further &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/7608"&gt;@reaper&lt;/a&gt;&amp;nbsp;I got your point:&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/Configuration-Articles/Security-Policies-Based-on-Zone-Assignment-for-VPN-Tunnel/ta-p/54385&amp;nbsp;" target="_blank"&gt;https://live.paloaltonetworks.com/t5/Configuration-Articles/Security-Policies-Based-on-Zone-Assignment-for-VPN-Tunnel/ta-p/54385&amp;nbsp;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-unicode-emoji" title=":grinning_face_with_smiling_eyes:"&gt;😄&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 17 Mar 2017 10:12:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-site-to-site-traffic-allowed-even-if-there-is-defined-a/m-p/148173#M49531</guid>
      <dc:creator>TheRealDiz</dc:creator>
      <dc:date>2017-03-17T10:12:13Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Site to Site traffic - ALLOWED even if there is defined A SPECIFIC proxy id</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-site-to-site-traffic-allowed-even-if-there-is-defined-a/m-p/148176#M49533</link>
      <description>&lt;P&gt;yes excellent explanation by&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/7608"&gt;@reaper&lt;/a&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 17 Mar 2017 10:38:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-site-to-site-traffic-allowed-even-if-there-is-defined-a/m-p/148176#M49533</guid>
      <dc:creator>TranceforLife</dc:creator>
      <dc:date>2017-03-17T10:38:39Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Site to Site traffic - ALLOWED even if there is defined A SPECIFIC proxy id</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-site-to-site-traffic-allowed-even-if-there-is-defined-a/m-p/148177#M49534</link>
      <description>&lt;P&gt;i cant take credit for that article as it was written by&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/2533"&gt;@jperry1&lt;/a&gt;&amp;nbsp;&lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 17 Mar 2017 10:56:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-site-to-site-traffic-allowed-even-if-there-is-defined-a/m-p/148177#M49534</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2017-03-17T10:56:16Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Site to Site traffic - ALLOWED even if there is defined A SPECIFIC proxy id</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-site-to-site-traffic-allowed-even-if-there-is-defined-a/m-p/148193#M49537</link>
      <description>&lt;P&gt;So according to the 7.1 guide the only place that it actually mentions this is in the following paragraph. Everywhere else that a curosry glance at it just kinda indicates that you only need it for policy&amp;nbsp;based peers.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you are setting up the Palo Alto Networks firewall to work with a peer that supports policy‐based VPN,&lt;BR /&gt;you must define Proxy IDs. Devices that support policy‐based VPN use specific security rules/policies or&lt;BR /&gt;access‐lists (source addresses, destination addresses and ports) for permitting interesting traffic through an&lt;BR /&gt;IPSec tunnel. These rules are referenced during quick mode/IKE phase 2 negotiation, and are exchanged as&lt;BR /&gt;Proxy‐IDs in the first or the second message of the process. So, if you are configuring the Palo Alto Networks&lt;BR /&gt;firewall to work with a policy‐based VPN peer, for a successful phase 2 negotiation you must define the&lt;BR /&gt;Proxy‐ID so that the setting on both peers is identical. If the Proxy‐ID is not configured, because the Palo&lt;BR /&gt;Alto Networks firewall supports route‐based VPN, the default values used as Proxy‐ID are source ip:&lt;BR /&gt;0.0.0.0/0, destination ip: 0.0.0.0/0 and application: any; and when these values are exchanged with the peer,&lt;BR /&gt;it results in a failure to set up the VPN connection.&lt;/P&gt;</description>
      <pubDate>Fri, 17 Mar 2017 12:50:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-site-to-site-traffic-allowed-even-if-there-is-defined-a/m-p/148193#M49537</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2017-03-17T12:50:04Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Site to Site traffic - ALLOWED even if there is defined A SPECIFIC proxy id</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-site-to-site-traffic-allowed-even-if-there-is-defined-a/m-p/148246#M49550</link>
      <description>&lt;P&gt;Interestingly enough now I'm wondering if setting the info on the Cisco path to make the proxy-ids match routing 0.0.0.0/0 would allow the tunnel to form up properly; I'll have to haul out my 5506-x and give it a test.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;P.S: If you think this is a bad insight the 5506-X currently can't create a BVI (major new feature added in the latest release for 5505 feature parity) and actually route IPSec traffic to the BVI, it creates a VPN-Handle-Error and until the last update forced the device to run out of memory and crash. Makes me want use it to hit my Cisco rep across the head.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 17 Mar 2017 16:44:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-site-to-site-traffic-allowed-even-if-there-is-defined-a/m-p/148246#M49550</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2017-03-17T16:44:31Z</dc:date>
    </item>
  </channel>
</rss>

