<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: GRE traffic being dropped by PAN in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/gre-traffic-being-dropped-by-pan/m-p/167095#M53423</link>
    <description>&lt;P&gt;Thank you for the confirmation. Closing the loop by mentioning that we set up 1-to-1 NAT and that solved the issue.&lt;/P&gt;</description>
    <pubDate>Wed, 19 Jul 2017 00:41:24 GMT</pubDate>
    <dc:creator>Farzana</dc:creator>
    <dc:date>2017-07-19T00:41:24Z</dc:date>
    <item>
      <title>GRE traffic being dropped by PAN</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/gre-traffic-being-dropped-by-pan/m-p/166907#M53400</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;An internal host is attempting to establish PPTP tunnel connection with an outside Internet host. The internal host accesses the Internet over NAT (actually PAT) on firewall's outside IP address. There was no issue with PPTP (TCP 1723) connection, but GRE (IP 47) packets from the remote host could not reach the internal host. Packet capture on the firewall shows GRE packets got dropped on "drop" stage, and cannot be seen on "transmit" or "firewall" stage captures.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;On some firewalls there is a feature known as PPTP inspection, where the PPTP traffic will be inspected by the firewall, and based on the PPTP session info, incoming GRE traffic will be NATed and forwarded to the correct internal host. May I know if such feature is available on PAN firewall (software 6.1.6), or is there actually alternate configuration to achieve the same result?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance.&lt;/P&gt;</description>
      <pubDate>Tue, 18 Jul 2017 03:42:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/gre-traffic-being-dropped-by-pan/m-p/166907#M53400</guid>
      <dc:creator>Farzana</dc:creator>
      <dc:date>2017-07-18T03:42:02Z</dc:date>
    </item>
    <item>
      <title>Re: GRE traffic being dropped by PAN</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/gre-traffic-being-dropped-by-pan/m-p/166920#M53401</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have tested this on 7.1 and 8.0. It works. Not exactly sure since then is this supported but in these versions firewall will open predict session for GRE traffic.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best Regards&lt;/P&gt;</description>
      <pubDate>Tue, 18 Jul 2017 03:48:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/gre-traffic-being-dropped-by-pan/m-p/166920#M53401</guid>
      <dc:creator>abjain</dc:creator>
      <dc:date>2017-07-18T03:48:53Z</dc:date>
    </item>
    <item>
      <title>Re: GRE traffic being dropped by PAN</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/gre-traffic-being-dropped-by-pan/m-p/167095#M53423</link>
      <description>&lt;P&gt;Thank you for the confirmation. Closing the loop by mentioning that we set up 1-to-1 NAT and that solved the issue.&lt;/P&gt;</description>
      <pubDate>Wed, 19 Jul 2017 00:41:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/gre-traffic-being-dropped-by-pan/m-p/167095#M53423</guid>
      <dc:creator>Farzana</dc:creator>
      <dc:date>2017-07-19T00:41:24Z</dc:date>
    </item>
  </channel>
</rss>

