<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic How to create IPSec VPN tunnel between two Palo Alto 200 firewalls? in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-create-ipsec-vpn-tunnel-between-two-palo-alto-200/m-p/173483#M54598</link>
    <description>&lt;P&gt;Hi folks,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I went and bought another used PA 200 from Ebay to go along with my existing one to test my first IPSec VPN connection.&lt;/P&gt;&lt;P&gt;Neither have a support or threat license at all and not registered.&lt;/P&gt;&lt;P&gt;PA 200 #1 has PANOS 7.0.5-H2 and PA 200 #2 has PANOS 7.1.9.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am using PA administrator's guides and other material to create an IPSec Tunnel, but still RED for me so far.&lt;/P&gt;&lt;P&gt;I am using the same IKE crypto and IPSec Crypto settings (default and custom).&amp;nbsp; Double checked Peer and local ip address.&amp;nbsp; Tried with and without proxy ID, tried with and without NAT traversal, with and without Local/Peer identification (IP address), but still RED.&amp;nbsp; Created respective Tunnel interfaces and included a static route for the remote subnet in each virtual router.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I created a separate respective VPN zone for each and security rule to allow any access both ways to my Trust-L3 zone.&amp;nbsp; Do I need to set anything for Untrust-L3?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am able to ping each others respective external IP from each firewall (static IPs assigned to me from ISP in the same subnet).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Posting this in case anyone sees something obvious that I may be missing?&lt;/P&gt;&lt;P&gt;Does the PANOS have to be the same or licensed?&lt;/P&gt;</description>
    <pubDate>Mon, 28 Aug 2017 19:51:48 GMT</pubDate>
    <dc:creator>OMatlock</dc:creator>
    <dc:date>2017-08-28T19:51:48Z</dc:date>
    <item>
      <title>How to create IPSec VPN tunnel between two Palo Alto 200 firewalls?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-create-ipsec-vpn-tunnel-between-two-palo-alto-200/m-p/173483#M54598</link>
      <description>&lt;P&gt;Hi folks,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I went and bought another used PA 200 from Ebay to go along with my existing one to test my first IPSec VPN connection.&lt;/P&gt;&lt;P&gt;Neither have a support or threat license at all and not registered.&lt;/P&gt;&lt;P&gt;PA 200 #1 has PANOS 7.0.5-H2 and PA 200 #2 has PANOS 7.1.9.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am using PA administrator's guides and other material to create an IPSec Tunnel, but still RED for me so far.&lt;/P&gt;&lt;P&gt;I am using the same IKE crypto and IPSec Crypto settings (default and custom).&amp;nbsp; Double checked Peer and local ip address.&amp;nbsp; Tried with and without proxy ID, tried with and without NAT traversal, with and without Local/Peer identification (IP address), but still RED.&amp;nbsp; Created respective Tunnel interfaces and included a static route for the remote subnet in each virtual router.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I created a separate respective VPN zone for each and security rule to allow any access both ways to my Trust-L3 zone.&amp;nbsp; Do I need to set anything for Untrust-L3?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am able to ping each others respective external IP from each firewall (static IPs assigned to me from ISP in the same subnet).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Posting this in case anyone sees something obvious that I may be missing?&lt;/P&gt;&lt;P&gt;Does the PANOS have to be the same or licensed?&lt;/P&gt;</description>
      <pubDate>Mon, 28 Aug 2017 19:51:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-create-ipsec-vpn-tunnel-between-two-palo-alto-200/m-p/173483#M54598</guid>
      <dc:creator>OMatlock</dc:creator>
      <dc:date>2017-08-28T19:51:48Z</dc:date>
    </item>
    <item>
      <title>Re: How to create IPSec VPN tunnel between two Palo Alto 200 firewalls?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-create-ipsec-vpn-tunnel-between-two-palo-alto-200/m-p/173492#M54599</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1) Allow IKE, IPSec protocols to your untrust zone&amp;nbsp;&lt;/P&gt;&lt;P&gt;2) For P1 Use word HAGLE:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;H= Hashing&lt;/P&gt;&lt;P&gt;A= Authentication&lt;/P&gt;&lt;P&gt;G= Diffie-Hellman&lt;/P&gt;&lt;P&gt;L= Lifetime&lt;/P&gt;&lt;P&gt;E= Encryption&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Make sure above parameters are matching between the peers.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;3) The same applies for P2. Make sure to have identical parameters&lt;/P&gt;&lt;P&gt;4) No need Proxy-IDs between the Palo`s&lt;/P&gt;&lt;P&gt;4) No need NAT-T (unless your external ip&amp;nbsp;is RFC1918 ip address)&lt;/P&gt;&lt;P&gt;5) When you complete the set up generate the traffic between the sites or use test vpn&amp;nbsp;command&lt;/P&gt;&lt;P&gt;6) Follow the video:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.youtube.com/watch?v=5xgYhXlnGUw" target="_blank"&gt;https://www.youtube.com/watch?v=5xgYhXlnGUw&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 28 Aug 2017 20:32:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-create-ipsec-vpn-tunnel-between-two-palo-alto-200/m-p/173492#M54599</guid>
      <dc:creator>TranceforLife</dc:creator>
      <dc:date>2017-08-28T20:32:23Z</dc:date>
    </item>
    <item>
      <title>Re: How to create IPSec VPN tunnel between two Palo Alto 200 firewalls?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-create-ipsec-vpn-tunnel-between-two-palo-alto-200/m-p/173595#M54618</link>
      <description>&lt;P&gt;Lifetimes do not have to match; they will be negotiated between the peers. The IKEv1 RFCs state that peers should agree on the lower of the two proposals. IKEv2 SAs are inherently independent.&lt;/P&gt;</description>
      <pubDate>Tue, 29 Aug 2017 11:38:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-create-ipsec-vpn-tunnel-between-two-palo-alto-200/m-p/173595#M54618</guid>
      <dc:creator>9t89m8fu</dc:creator>
      <dc:date>2017-08-29T11:38:12Z</dc:date>
    </item>
    <item>
      <title>Re: How to create IPSec VPN tunnel between two Palo Alto 200 firewalls?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-create-ipsec-vpn-tunnel-between-two-palo-alto-200/m-p/173596#M54619</link>
      <description>&lt;P&gt;Yes, correct. Was easier to write the message &lt;span class="lia-unicode-emoji" title=":grinning_face_with_smiling_eyes:"&gt;😄&lt;/span&gt; , but &amp;nbsp;you are saying true&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 29 Aug 2017 11:40:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-create-ipsec-vpn-tunnel-between-two-palo-alto-200/m-p/173596#M54619</guid>
      <dc:creator>TranceforLife</dc:creator>
      <dc:date>2017-08-29T11:40:18Z</dc:date>
    </item>
    <item>
      <title>Re: How to create IPSec VPN tunnel between two Palo Alto 200 firewalls?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-create-ipsec-vpn-tunnel-between-two-palo-alto-200/m-p/173850#M54668</link>
      <description>&lt;P&gt;Thanks for the feedback.&amp;nbsp; I've configured like the video, including security rules.&amp;nbsp; Still stays red.&amp;nbsp; I don't what I could be doing wrong, but obviously something.&amp;nbsp; I will keep trying, seems fairly straight forward, just matching settings between two PA 200 firewalls.&amp;nbsp; They are not licensed and different PAN OS, but will keep troubleshooting.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks again!&lt;/P&gt;</description>
      <pubDate>Wed, 30 Aug 2017 13:12:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-create-ipsec-vpn-tunnel-between-two-palo-alto-200/m-p/173850#M54668</guid>
      <dc:creator>OMatlock</dc:creator>
      <dc:date>2017-08-30T13:12:32Z</dc:date>
    </item>
    <item>
      <title>Re: How to create IPSec VPN tunnel between two Palo Alto 200 firewalls?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-create-ipsec-vpn-tunnel-between-two-palo-alto-200/m-p/173851#M54669</link>
      <description>&lt;P&gt;If you believe that all config is matching between the peers then VERY IMPORTANT to initiate the tunnel with "interesting traffic" or with the test vpn command.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 30 Aug 2017 13:15:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-create-ipsec-vpn-tunnel-between-two-palo-alto-200/m-p/173851#M54669</guid>
      <dc:creator>TranceforLife</dc:creator>
      <dc:date>2017-08-30T13:15:37Z</dc:date>
    </item>
    <item>
      <title>Re: How to create IPSec VPN tunnel between two Palo Alto 200 firewalls?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-create-ipsec-vpn-tunnel-between-two-palo-alto-200/m-p/173870#M54678</link>
      <description>&lt;P&gt;Thank you!&amp;nbsp; I will try that.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am noticing that I am able to ping the external IP from one but not the other.&lt;/P&gt;&lt;P&gt;Maybe has something to do with the fact that my two external IPs are on the same subnet issued from my isp (comcast business).&amp;nbsp; They are respective layer3 interfaces on the firewall, but certainly on the same (external) subnet.&amp;nbsp; Using the same ip on respective default static routes for the gateway.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Still working on it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 30 Aug 2017 15:21:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-create-ipsec-vpn-tunnel-between-two-palo-alto-200/m-p/173870#M54678</guid>
      <dc:creator>OMatlock</dc:creator>
      <dc:date>2017-08-30T15:21:33Z</dc:date>
    </item>
    <item>
      <title>Re: How to create IPSec VPN tunnel between two Palo Alto 200 firewalls?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-create-ipsec-vpn-tunnel-between-two-palo-alto-200/m-p/173871#M54679</link>
      <description>&lt;P&gt;I think my test is flawed since even though my ethernet/1 interfaces are public IPs, they are on the same subnet and not communicating with each other from those interfaces.&amp;nbsp; I need to do something different I think.&amp;nbsp; Maybe try a local true layer3 test first or something else to make this work with these two external IPs I have from ISP that are on same subnet.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I will redo and update/close as soon as I can.&lt;/P&gt;</description>
      <pubDate>Wed, 30 Aug 2017 15:35:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-create-ipsec-vpn-tunnel-between-two-palo-alto-200/m-p/173871#M54679</guid>
      <dc:creator>OMatlock</dc:creator>
      <dc:date>2017-08-30T15:35:22Z</dc:date>
    </item>
    <item>
      <title>Re: How to create IPSec VPN tunnel between two Palo Alto 200 firewalls?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-create-ipsec-vpn-tunnel-between-two-palo-alto-200/m-p/173872#M54680</link>
      <description>&lt;P&gt;The same subnet should not be a problem, but if the interfaces cannot communicate within the same subnet then it is problem. Why do you think they cannot communicate?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 30 Aug 2017 15:40:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-create-ipsec-vpn-tunnel-between-two-palo-alto-200/m-p/173872#M54680</guid>
      <dc:creator>TranceforLife</dc:creator>
      <dc:date>2017-08-30T15:40:17Z</dc:date>
    </item>
    <item>
      <title>Re: How to create IPSec VPN tunnel between two Palo Alto 200 firewalls?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-create-ipsec-vpn-tunnel-between-two-palo-alto-200/m-p/174333#M54779</link>
      <description>&lt;P&gt;I don't know why they can not communicate.&amp;nbsp; If I take that cable from ethernet/1, plug into my laptop, configure same external IP and subnet mask only, it pings fine.&amp;nbsp; But for some reason when I plug it back into the PA 200 on ethernet/1 it won't ping.&amp;nbsp; Could it be because the interface (on both PA 200s) are configured as layer3 and expecting to route between them?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I tried a static route thinking that might help but did not.&amp;nbsp; When I ping the other ip, it fails and can tell it is trying to ping it out of the management interface ip, which is totally wrong.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I will close this thread.&amp;nbsp; I need to create a better test, thanks for responding so far.&lt;/P&gt;</description>
      <pubDate>Fri, 01 Sep 2017 12:39:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-create-ipsec-vpn-tunnel-between-two-palo-alto-200/m-p/174333#M54779</guid>
      <dc:creator>OMatlock</dc:creator>
      <dc:date>2017-09-01T12:39:41Z</dc:date>
    </item>
    <item>
      <title>Re: How to create IPSec VPN tunnel between two Palo Alto 200 firewalls?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-create-ipsec-vpn-tunnel-between-two-palo-alto-200/m-p/174334#M54780</link>
      <description>&lt;P&gt;It's weird, I can't ping out to anything from this one PA, even though I can NAT to the internet fine.&amp;nbsp; Must be something wrong with my config.&amp;nbsp; I will stop commenting soon and close this thread.&amp;nbsp; Sorry for all the spam...&lt;/P&gt;</description>
      <pubDate>Fri, 01 Sep 2017 12:52:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-create-ipsec-vpn-tunnel-between-two-palo-alto-200/m-p/174334#M54780</guid>
      <dc:creator>OMatlock</dc:creator>
      <dc:date>2017-09-01T12:52:07Z</dc:date>
    </item>
    <item>
      <title>Re: How to create IPSec VPN tunnel between two Palo Alto 200 firewalls?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-create-ipsec-vpn-tunnel-between-two-palo-alto-200/m-p/174335#M54781</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We don't use routing between the same subnet, and no it should not be a problem. We expect Palo to ARP for an&amp;nbsp;ip address within the same subnet.&lt;/P&gt;&lt;P&gt;You need to take a PCAP from the Palo and check what is going on, check your&amp;nbsp;apr table. Can you see&amp;nbsp;MAC address of other Palo interface?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 01 Sep 2017 12:57:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-create-ipsec-vpn-tunnel-between-two-palo-alto-200/m-p/174335#M54781</guid>
      <dc:creator>TranceforLife</dc:creator>
      <dc:date>2017-09-01T12:57:57Z</dc:date>
    </item>
    <item>
      <title>Re: How to create IPSec VPN tunnel between two Palo Alto 200 firewalls?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-create-ipsec-vpn-tunnel-between-two-palo-alto-200/m-p/174336#M54782</link>
      <description>&lt;P&gt;Are you pinging from inside Palo?&lt;/P&gt;&lt;P&gt;If you use command "ping host 8.8.8.8" then ping request goes out from mgmt interface.&lt;/P&gt;&lt;P&gt;Is your mgmt interface connected?&lt;/P&gt;&lt;P&gt;Assuming your public IP is 1.2.3.4 then command "ping source 1.2.3.4 host 8.8.8.8" will send requests out from external interface.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you can ping then initiate command "test vpn ipsec-sa tunnel VPN" (replace VPN with name of the tunnel).&lt;/P&gt;&lt;P&gt;Log into other firewall and go to System log. Responding side will show you in log what is wrong with tunnel.&lt;/P&gt;&lt;P&gt;Paste error message here.&lt;/P&gt;</description>
      <pubDate>Fri, 01 Sep 2017 13:02:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-create-ipsec-vpn-tunnel-between-two-palo-alto-200/m-p/174336#M54782</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2017-09-01T13:02:08Z</dc:date>
    </item>
    <item>
      <title>Re: How to create IPSec VPN tunnel between two Palo Alto 200 firewalls?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-create-ipsec-vpn-tunnel-between-two-palo-alto-200/m-p/174337#M54783</link>
      <description>&lt;P&gt;I finally got it working by assigning a default gateway to the management interface on the PA 200 that could not ping out at all, to anything.&amp;nbsp; My management interface has an internal IP address and same network as my ethernet/2 trust interface.&amp;nbsp; My other PA 200 already had a default gateway on its management interface, set up the same way, internal ip and network.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;After assigning a default gateway to the management interface, everything working, ping, now including my IPsec tunnels!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I still trying to wrap my head around why this was necessary in this configuration.&amp;nbsp; But working now.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I should do some network traces and try to study further.&amp;nbsp; Thank you for hanging with me!&lt;/P&gt;</description>
      <pubDate>Fri, 01 Sep 2017 13:02:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-create-ipsec-vpn-tunnel-between-two-palo-alto-200/m-p/174337#M54783</guid>
      <dc:creator>OMatlock</dc:creator>
      <dc:date>2017-09-01T13:02:25Z</dc:date>
    </item>
    <item>
      <title>Re: How to create IPSec VPN tunnel between two Palo Alto 200 firewalls?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-create-ipsec-vpn-tunnel-between-two-palo-alto-200/m-p/174339#M54784</link>
      <description>&lt;P&gt;Mgmt interface ping is not required for vpn.&lt;/P&gt;&lt;P&gt;But unless you configure IPSec monitoring that sends pings over tunnel there is no interersting traffic.&lt;/P&gt;&lt;P&gt;Palo will not bring tunnel up if there is no interesting traffic.&lt;/P&gt;&lt;P&gt;Other option is to use test vpn command as mentioned earlier.&lt;/P&gt;</description>
      <pubDate>Fri, 01 Sep 2017 13:08:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-create-ipsec-vpn-tunnel-between-two-palo-alto-200/m-p/174339#M54784</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2017-09-01T13:08:47Z</dc:date>
    </item>
    <item>
      <title>Re: How to create IPSec VPN tunnel between two Palo Alto 200 firewalls?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-create-ipsec-vpn-tunnel-between-two-palo-alto-200/m-p/174343#M54786</link>
      <description>&lt;P&gt;Thank you.&amp;nbsp; Using the test vpn command for ike and ipsec tunnel, and everything is green now on both sides for IPsec and IKE!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;However, I am not able to ping or communicate with the internal subnets on the other side, even though I've input static routes respectively.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Working on this now.&amp;nbsp; &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 01 Sep 2017 13:25:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-create-ipsec-vpn-tunnel-between-two-palo-alto-200/m-p/174343#M54786</guid>
      <dc:creator>OMatlock</dc:creator>
      <dc:date>2017-09-01T13:25:24Z</dc:date>
    </item>
    <item>
      <title>Re: How to create IPSec VPN tunnel between two Palo Alto 200 firewalls?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-create-ipsec-vpn-tunnel-between-two-palo-alto-200/m-p/174344#M54787</link>
      <description>&lt;P&gt;Check traffic log Monitor &amp;gt; Traffic.&lt;/P&gt;&lt;P&gt;Add Ingress/Egress interface columns and check if traffic is sent towards tunnel interface and is permitted.&lt;/P&gt;</description>
      <pubDate>Fri, 01 Sep 2017 13:41:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-create-ipsec-vpn-tunnel-between-two-palo-alto-200/m-p/174344#M54787</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2017-09-01T13:41:48Z</dc:date>
    </item>
    <item>
      <title>Re: How to create IPSec VPN tunnel between two Palo Alto 200 firewalls?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-create-ipsec-vpn-tunnel-between-two-palo-alto-200/m-p/174347#M54790</link>
      <description>&lt;P&gt;Yep, looks like I did not have my security rule proper.&amp;nbsp; I just changed my one rule to source and destination to include my IPSecVPN zone and Trust interfaces only.&amp;nbsp; I removed reference to Untrust, which is consistent with how our IPSec tunnels are configured at my job, but not consistent with the youtube video referenced earlier.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am still pondering how it works in my test and at work without a VPN zone permission to Untrust directly.&amp;nbsp; I have the Trust zone permission to Untrust of course for my internet access.&amp;nbsp; My tunnel interfaces that I static route to are members of my IPSecVPN zone, as recommended.&amp;nbsp; I will have to post my configuration and accept solutions to end this thread.&lt;/P&gt;</description>
      <pubDate>Fri, 01 Sep 2017 14:07:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-create-ipsec-vpn-tunnel-between-two-palo-alto-200/m-p/174347#M54790</guid>
      <dc:creator>OMatlock</dc:creator>
      <dc:date>2017-09-01T14:07:15Z</dc:date>
    </item>
    <item>
      <title>Re: How to create IPSec VPN tunnel between two Palo Alto 200 firewalls?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-create-ipsec-vpn-tunnel-between-two-palo-alto-200/m-p/174350#M54792</link>
      <description>&lt;P&gt;It is bad-bad practice to place VPN into untrust zone. VPN has always have to have dedicated zone. I don't know why so many documentations suggest to place VPN into untrust zone.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 01 Sep 2017 14:16:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-create-ipsec-vpn-tunnel-between-two-palo-alto-200/m-p/174350#M54792</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2017-09-01T14:16:55Z</dc:date>
    </item>
    <item>
      <title>Re: How to create IPSec VPN tunnel between two Palo Alto 200 firewalls?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-create-ipsec-vpn-tunnel-between-two-palo-alto-200/m-p/174613#M54849</link>
      <description>&lt;P&gt;Thanks folks for all the feedback.&amp;nbsp; I now understand better and can see where I was confused a lot.&lt;/P&gt;&lt;P&gt;First, I did not understand that I was in the context of the management interface using SSH&amp;nbsp;when I was unable to ping my public IP and needed a gateway entry there.&amp;nbsp; Which is totally separate and unrelated to the IPSec tunnel being up or down.&amp;nbsp; I needed to run the test vpn commands to generate the interesting traffic.&amp;nbsp; You guys were trying to tell me that, and I was not getting it yet.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am attaching my diagram for now and close this thread.&amp;nbsp; I may come back and attach my firewall config.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="IPSecVPN.jpg" style="width: 767px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/11017iE12B93BDCB8516AC/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="IPSecVPN.jpg" alt="IPSecVPN.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 04 Sep 2017 13:38:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-create-ipsec-vpn-tunnel-between-two-palo-alto-200/m-p/174613#M54849</guid>
      <dc:creator>OMatlock</dc:creator>
      <dc:date>2017-09-04T13:38:42Z</dc:date>
    </item>
  </channel>
</rss>

