<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: VPN passthrough in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-passthrough/m-p/197349#M58668</link>
    <description>Hi, thanks for the hint. I found one counter with severity=drop: zonechange: flow_fwd_zonechange 2 0 drop flow forward Packets dropped: forwarded to different zone Customer is connecting from "outside" (only default route matches), DMZ, where site-to-site VPN concentrator is installed is using "connected" route. There are only static routers configured on PAN. There is no NAT configured for DMZ zone. Firewall rule permits any traffic (I tried with app-default, all tcp+udp ports...). Packet capture shows dropped packets (stage=dropped) with customers public IP address as originating IP address and with our site to site VPN concentrator's public IP address as the destination IP address. Could you please give me a hing how can I diagnose the root cause of the issue?</description>
    <pubDate>Mon, 29 Jan 2018 11:18:04 GMT</pubDate>
    <dc:creator>jerryv</dc:creator>
    <dc:date>2018-01-29T11:18:04Z</dc:date>
    <item>
      <title>VPN passthrough</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-passthrough/m-p/197238#M58656</link>
      <description>Hi, we're experiencing issue with site-to-site connectivity since we installed PAN firewall in the network few days ago. There are many IPSec (ikev1) tunnels configured between endpoints on the internet and Cisco VPN concentrator (ISR 4k router) behind the PAN firewall. Only 2 specific sites can't establish IPsec connection anymore since PAN has been installed in the prodution. Network diagram before PAN was installed in the network: customer linux server with openswan - (private IP) - customer router with NAT 1:1 - ##internet## - router - (pub IP) - VPN concentrator Network diagram after PAN has been installed: customer linux server with openswan - (private IP) - customer router with NAT 1:1 - ##internet## - router - (pub IP) - PAN firewall - (pub IP) - VPN concentrator Logs on Cisco ISR: *Jan 27 20:30:31.891: ISAKMP-PAK: (1468):sending packet to 191.84.85.31 my_port 500 peer_port 500 (R) MM_KEY_EXCH *Jan 27 20:30:31.891: ISAKMP: (1468):Sending an IKE IPv4 Packet. *Jan 27 20:30:31.891: ISAKMP: (1468):Input = IKE_MESG_INTERNAL, IKE_PROCESS_COMPLETE *Jan 27 20:30:31.891: ISAKMP: (1468):Old State = IKE_R_MM3 New State = IKE_R_MM4 *Jan 27 20:30:33.440: ISAKMP: (1080):purging node 2651156776 *Jan 27 20:30:41.891: ISAKMP: (1468):retransmitting phase 1 MM_KEY_EXCH... *Jan 27 20:30:41.891: ISAKMP: (1468):: incrementing error counter on sa, attempt 1 of 5: retransmit phase 1 There is access policy configured on PAN that permits "any" application, "any service" between zones/ip addresses. It seems there is some traffic blocked by PAN. I run packet capture with filters defined (public IP addresses of both endpoints) and there were some NAT-T (udp/4500) packets dropped in the "drop" packet capture file. I configured one linux server with openswan for testing purposes and assigned public IP address on the network adapter. IPsec tunnel was established without any problem. I tried to lower MTU (1300) on outside interface but it didn't solve the problem. Does anyone have any idea what could be wrong?</description>
      <pubDate>Sat, 27 Jan 2018 20:54:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-passthrough/m-p/197238#M58656</guid>
      <dc:creator>jerryv</dc:creator>
      <dc:date>2018-01-27T20:54:07Z</dc:date>
    </item>
    <item>
      <title>Re: VPN passthrough</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-passthrough/m-p/197325#M58665</link>
      <description>&lt;P&gt;Have you verified why the packet was in the drop stage? you can follow global counters while you're doing packetcaptures:&lt;/P&gt;
&lt;P&gt;&amp;gt; show counter global filter delta yes packet-filter yes&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This will show why packets may get discarded (also, traffic logs or threat logs may help shed light on what's going on)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 29 Jan 2018 09:45:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-passthrough/m-p/197325#M58665</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2018-01-29T09:45:26Z</dc:date>
    </item>
    <item>
      <title>Re: VPN passthrough</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-passthrough/m-p/197349#M58668</link>
      <description>Hi, thanks for the hint. I found one counter with severity=drop: zonechange: flow_fwd_zonechange 2 0 drop flow forward Packets dropped: forwarded to different zone Customer is connecting from "outside" (only default route matches), DMZ, where site-to-site VPN concentrator is installed is using "connected" route. There are only static routers configured on PAN. There is no NAT configured for DMZ zone. Firewall rule permits any traffic (I tried with app-default, all tcp+udp ports...). Packet capture shows dropped packets (stage=dropped) with customers public IP address as originating IP address and with our site to site VPN concentrator's public IP address as the destination IP address. Could you please give me a hing how can I diagnose the root cause of the issue?</description>
      <pubDate>Mon, 29 Jan 2018 11:18:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-passthrough/m-p/197349#M58668</guid>
      <dc:creator>jerryv</dc:creator>
      <dc:date>2018-01-29T11:18:04Z</dc:date>
    </item>
    <item>
      <title>Re: VPN passthrough</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-passthrough/m-p/197353#M58669</link>
      <description>Hi, I found one interesting info: show session all filter from OUTSIDE source 191.84.85.31 38 ipsec-esp-udp ACTIVE FLOW 191.84.85.31[4500]/OUTSIDE/17 (191.84.85.31[4500]) vsys1 81.29.27.52[4500]/OUTSIDE (81.29.27.52[4500]) 4220 ike ACTIVE FLOW 191.84.85.31[500]/OUTSIDE/17 (191.84.85.31[500]) vsys1 81.29.27.52[500]/DMZ (81.29.27.52[500]) There are two different zones detected for same connection flow: OUTSIDE (wrong) and DMZ (correct). Zone configuration only includes interface name. Strange...</description>
      <pubDate>Mon, 29 Jan 2018 11:29:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-passthrough/m-p/197353#M58669</guid>
      <dc:creator>jerryv</dc:creator>
      <dc:date>2018-01-29T11:29:32Z</dc:date>
    </item>
    <item>
      <title>Re: VPN passthrough</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-passthrough/m-p/197354#M58670</link>
      <description>&lt;P&gt;can you include a network design and what your routing table looks like?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;there may be overlap in your IP subnets on your interfaces, or irregularities in your routing table&lt;/P&gt;</description>
      <pubDate>Mon, 29 Jan 2018 11:39:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-passthrough/m-p/197354#M58670</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2018-01-29T11:39:25Z</dc:date>
    </item>
    <item>
      <title>Re: VPN passthrough</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-passthrough/m-p/197359#M58671</link>
      <description>&lt;P&gt;Hi, here is the network diagram&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="design" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/13457iBD539BFC70FF1E7F/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="site-to-site-design.png" alt="design" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;design&lt;/span&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="design" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/13457iBD539BFC70FF1E7F/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="site-to-site-design.png" alt="design" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;design&lt;/span&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="design" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/13457iBD539BFC70FF1E7F/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="site-to-site-design.png" alt="design" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;design&lt;/span&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 29 Jan 2018 12:01:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-passthrough/m-p/197359#M58671</guid>
      <dc:creator>jerryv</dc:creator>
      <dc:date>2018-01-29T12:01:18Z</dc:date>
    </item>
    <item>
      <title>Re: VPN passthrough</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-passthrough/m-p/197360#M58672</link>
      <description>&lt;P&gt;that looks more straight forward than I had expected &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So your firewall has 1 interface 88.200.12.2/30, one interface 81.29.27.33/27, the static routing table is 0.0.0.0/0 -&amp;gt; 88.200.12.1&lt;/P&gt;
&lt;P&gt;Then a security policy any any accept, no nat ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Ah but wait, it's the same ISR4K providing the ipsec endpoint that also provides your WAN routing ?&lt;/P&gt;
&lt;P&gt;could it be it is performing som einternal routing and some packets may be egressing on the opposite side of the firewall ?&lt;/P&gt;</description>
      <pubDate>Mon, 29 Jan 2018 12:23:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-passthrough/m-p/197360#M58672</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2018-01-29T12:23:54Z</dc:date>
    </item>
    <item>
      <title>Re: VPN passthrough</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-passthrough/m-p/197362#M58673</link>
      <description>&lt;P&gt;Hi, there are two different ISR routers installed.&lt;/P&gt;&lt;P&gt;There is not NAT configured between OUTSIDE and DMZ.&lt;/P&gt;</description>
      <pubDate>Mon, 29 Jan 2018 12:38:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-passthrough/m-p/197362#M58673</guid>
      <dc:creator>jerryv</dc:creator>
      <dc:date>2018-01-29T12:38:24Z</dc:date>
    </item>
    <item>
      <title>Re: VPN passthrough</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-passthrough/m-p/197384#M58679</link>
      <description>&lt;P&gt;Any chance you're running &amp;lt; 8.0.7 code?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="IPSec.PNG" style="width: 725px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/13460i73325909FEE2CC8C/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="IPSec.PNG" alt="IPSec.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 29 Jan 2018 14:25:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-passthrough/m-p/197384#M58679</guid>
      <dc:creator>Brandon_Wertz</dc:creator>
      <dc:date>2018-01-29T14:25:38Z</dc:date>
    </item>
    <item>
      <title>Re: VPN passthrough</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-passthrough/m-p/197387#M58680</link>
      <description>&lt;P&gt;Hi, no, we're running 8.0.7.&lt;/P&gt;</description>
      <pubDate>Mon, 29 Jan 2018 14:29:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-passthrough/m-p/197387#M58680</guid>
      <dc:creator>jerryv</dc:creator>
      <dc:date>2018-01-29T14:29:58Z</dc:date>
    </item>
  </channel>
</rss>

