<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Security Zone Site to Site VPN in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/security-zone-site-to-site-vpn/m-p/188314#M57174</link>
    <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/7608"&gt;@reaper&lt;/a&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm talking about that one: (That's from an instruction video)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="pa.JPG" style="width: 606px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/12579i97A23C76EA1BB0CB/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="pa.JPG" alt="pa.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Which security zone do I have to choose here?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 22 Nov 2017 10:07:25 GMT</pubDate>
    <dc:creator>MPI-AE</dc:creator>
    <dc:date>2017-11-22T10:07:25Z</dc:date>
    <item>
      <title>Security Zone Site to Site VPN</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/security-zone-site-to-site-vpn/m-p/188291#M57168</link>
      <description>&lt;P&gt;Hey guys,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We do have a headquarter and a branch office.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;All services are located in the HQ, in the branch office there are just workstations that access the services of the HQ.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So I have to set up a site to site vpn connection between the BO and HQ.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Let's start with the Palo Alto in the branch office.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have to create a tunnel interface and choose a security zone.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;According to the manual:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;"Security Zone: (select the layer 3 internal zone from which the traffic will originate)"&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I don't understand that. there are more than one client interfaces/networks in the BO, and each interface is a single zone. So there are more than one internal zones which originate traffic to the HQ.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1) Which zone do I have to choose?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;And my second question: 2) When I set up the security policies, which destination zone do I have to use for the traffic that's destination is the HQ ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;and 3) the destination zone in the security policies and the security zone of the tunnel interface, are these the same?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for any help!&lt;/P&gt;</description>
      <pubDate>Wed, 22 Nov 2017 09:18:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/security-zone-site-to-site-vpn/m-p/188291#M57168</guid>
      <dc:creator>MPI-AE</dc:creator>
      <dc:date>2017-11-22T09:18:13Z</dc:date>
    </item>
    <item>
      <title>Re: Security Zone Site to Site VPN</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/security-zone-site-to-site-vpn/m-p/188302#M57171</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/50331"&gt;@MPI-AE&lt;/a&gt;&lt;/P&gt;
&lt;P&gt;there are 2 levels that need to be considered when building VPN tunnels and allowing traffic through&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;first you need to be able to create the VPN tunnel itself, this works at a lower 'network' level as you bind the tunnel to an interface (either physical or loopback)&lt;/P&gt;
&lt;P&gt;so typically you will use your untrust interface to initiate the tunnel&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;once the tunnel is established, you need to allow user connections to enter the tunnel: creating the tunnel has also created a new interface: the tunnel interface&lt;/P&gt;
&lt;P&gt;so any security policies that allow users to connect to the tunnel, will need to be from the user zones to the tunnel interface zone, and reverse in case HQ needs to make connections into the BO (think IT doing remote takeovers)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;please check out this article to help you get started: &lt;A title="Getting Started: VPN " href="https://live.paloaltonetworks.com/t5/Featured-Articles/Getting-Started-VPN/ta-p/68931" target="_blank"&gt;Getting Started: VPN &lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 22 Nov 2017 09:43:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/security-zone-site-to-site-vpn/m-p/188302#M57171</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2017-11-22T09:43:32Z</dc:date>
    </item>
    <item>
      <title>Re: Security Zone Site to Site VPN</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/security-zone-site-to-site-vpn/m-p/188314#M57174</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/7608"&gt;@reaper&lt;/a&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm talking about that one: (That's from an instruction video)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="pa.JPG" style="width: 606px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/12579i97A23C76EA1BB0CB/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="pa.JPG" alt="pa.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Which security zone do I have to choose here?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 22 Nov 2017 10:07:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/security-zone-site-to-site-vpn/m-p/188314#M57174</guid>
      <dc:creator>MPI-AE</dc:creator>
      <dc:date>2017-11-22T10:07:25Z</dc:date>
    </item>
    <item>
      <title>Re: Security Zone Site to Site VPN</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/security-zone-site-to-site-vpn/m-p/188315#M57175</link>
      <description>&lt;P&gt;This is where you create the tunnel interface: it is best practice to assign it it's own zone (create a new one, for example 'vpn-to-HQ') so you can control what goes in and out through security policies; from a security perspective it will behave as a physical interface with a zone&lt;/P&gt;
&lt;P&gt;from trust to vpn-to-hq allow&lt;/P&gt;
&lt;P&gt;from vpn-to-hq to trust allow&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;you can also choose to put it in the user zone and let the default intrazone poloicy simply allow everything in and out&lt;/P&gt;</description>
      <pubDate>Wed, 22 Nov 2017 10:15:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/security-zone-site-to-site-vpn/m-p/188315#M57175</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2017-11-22T10:15:48Z</dc:date>
    </item>
    <item>
      <title>Re: Security Zone Site to Site VPN</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/security-zone-site-to-site-vpn/m-p/188646#M57220</link>
      <description>&lt;P&gt;Thank you, that will help me!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Another question, though:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My PA-820 is on 8.0.2 and my PA-3020 is on 7.1.7&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1) is that a problem?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2) I want to update my PA-3020 in two months to Version 8, too. Will the Site to Site vpn remain?&lt;/P&gt;</description>
      <pubDate>Fri, 24 Nov 2017 11:18:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/security-zone-site-to-site-vpn/m-p/188646#M57220</guid>
      <dc:creator>MPI-AE</dc:creator>
      <dc:date>2017-11-24T11:18:02Z</dc:date>
    </item>
    <item>
      <title>Re: Security Zone Site to Site VPN</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/security-zone-site-to-site-vpn/m-p/188654#M57221</link>
      <description>&lt;P&gt;1. No&lt;/P&gt;
&lt;P&gt;2. Yes&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ipsec parameters on both PAN-OS are identical so version mismatch is no problem and after an upgrade the configuration will remain identical and the tunnel will immediately work as before&lt;/P&gt;</description>
      <pubDate>Fri, 24 Nov 2017 12:05:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/security-zone-site-to-site-vpn/m-p/188654#M57221</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2017-11-24T12:05:15Z</dc:date>
    </item>
    <item>
      <title>Re: Security Zone Site to Site VPN</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/security-zone-site-to-site-vpn/m-p/188655#M57222</link>
      <description>&lt;P&gt;That's good to know!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I think there is a last question.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We do have a /22 public ip addresses.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;And our Global Protect Gateway listens on one of that public addresses. The external interface on our firewall, however, is an ip from our ISP, so it's different from our public space.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The question is, for the site to site vpn. when I set up the IKE Gateway, can I use an address from our public space as a peer or do I need to use the external interface with the IP of our ISP?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For example with a loopback interface?&lt;/P&gt;</description>
      <pubDate>Fri, 24 Nov 2017 12:44:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/security-zone-site-to-site-vpn/m-p/188655#M57222</guid>
      <dc:creator>MPI-AE</dc:creator>
      <dc:date>2017-11-24T12:44:03Z</dc:date>
    </item>
    <item>
      <title>Re: Security Zone Site to Site VPN</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/security-zone-site-to-site-vpn/m-p/188658#M57224</link>
      <description>&lt;P&gt;you can either add your public space to your external interface and use that addrss, or create a loopback interface and place it in the external zone (or a different zone and then control ipsec/ike with security policy)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;if you need proxy-arp, you'll need to add the public IP range to the interface, and can then still add a loopback for a specific IP. If your ISP is forwarding the entire range to your firewall MAC, you can use the loopback without adding the range to your external interface&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;hope this makes sense&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 24 Nov 2017 13:30:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/security-zone-site-to-site-vpn/m-p/188658#M57224</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2017-11-24T13:30:40Z</dc:date>
    </item>
    <item>
      <title>Re: Security Zone Site to Site VPN</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/security-zone-site-to-site-vpn/m-p/188697#M57230</link>
      <description>&lt;P&gt;yeah that makes sense, I will try that:)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I finsihed the configuration on my remote firewall.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm wondering why I don't see any logs in the traffic monitor that the firewall wants to reach the gateway peer ip address?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is that normal?&lt;/P&gt;</description>
      <pubDate>Sat, 25 Nov 2017 16:55:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/security-zone-site-to-site-vpn/m-p/188697#M57230</guid>
      <dc:creator>MPI-AE</dc:creator>
      <dc:date>2017-11-25T16:55:52Z</dc:date>
    </item>
    <item>
      <title>Re: Security Zone Site to Site VPN</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/security-zone-site-to-site-vpn/m-p/188704#M57231</link>
      <description>The actual packets are probably flowing untrust to untrust (originating on the external interface heading out to the internet)&lt;BR /&gt;If you don't have a specific security policy, these packets will hit the default intrazone policy which has logging disabled by default&lt;BR /&gt;&lt;BR /&gt;The negotiation should be visible in the 'system'  log</description>
      <pubDate>Sat, 25 Nov 2017 21:01:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/security-zone-site-to-site-vpn/m-p/188704#M57231</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2017-11-25T21:01:03Z</dc:date>
    </item>
    <item>
      <title>Re: Security Zone Site to Site VPN</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/security-zone-site-to-site-vpn/m-p/191308#M57642</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/7608"&gt;@reaper&lt;/a&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for your help, the tunnel is working now.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When I want to connect to the firewall via https over the tunnel, the monitor traffic log says:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Application: incomplete&lt;/P&gt;&lt;P&gt;To Port: 443&lt;/P&gt;&lt;P&gt;Action: allow&lt;/P&gt;&lt;P&gt;Reason: Aged Out.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can you tell me why it doesn't recognize ssl?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The same problem with ssh..&lt;/P&gt;&lt;P&gt;Is the encryption too strong?&lt;/P&gt;</description>
      <pubDate>Tue, 12 Dec 2017 10:47:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/security-zone-site-to-site-vpn/m-p/191308#M57642</guid>
      <dc:creator>MPI-AE</dc:creator>
      <dc:date>2017-12-12T10:47:59Z</dc:date>
    </item>
    <item>
      <title>Re: Security Zone Site to Site VPN</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/security-zone-site-to-site-vpn/m-p/191309#M57643</link>
      <description>&lt;P&gt;once the tunnels are up, you need to make sure routing is fine on both sides for the sessions that need to go into the tunnel&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;you'll need to add a route on the virtual router with the remote subnet pointed at the local tunnel interface. you will also need security policies to allow in- and egress sessions to be created so you'll probably&amp;nbsp;need a few "trust to vpn" and "vpn to trust" rules&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;are you trying to connect to the managment interface througfh the vpn tunnel?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;is the management on the remote end connected to the 'lan' interface or is it in it's own network. you'll need to make sure the whole 'chain' can be reached&amp;nbsp;&lt;/P&gt;
&lt;P&gt;eg. routing from your client to your local firewall, routing from your local firewall into the tunnel, security policy on your local firewall to allow the connection. security policy on the remote fiorewall to allow the packets from the tunnel onto the lan, routing to your mgmt interface, routing from the mgmt interface to your client's ip (if there's a router in between you will need to add routing to the firewall), routing on the firewall to return the packet into the tunnel&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Dec 2017 10:55:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/security-zone-site-to-site-vpn/m-p/191309#M57643</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2017-12-12T10:55:26Z</dc:date>
    </item>
  </channel>
</rss>

