<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: IPsec Tunnel in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel/m-p/211146#M61604</link>
    <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;&lt;/P&gt;&lt;P&gt;I was afraid of that, its going to make VPN client they can use more difficult, some people need to have a vpn client for access from home and also a client to access the PCI network. Like me I have a native client configured for PCI access and the GP VPN because, though you can switch back and forth by changing the portal name, it would be easier if you could have multiple entries on one client&lt;/P&gt;&lt;P&gt;The setting for the VPN for the client for the ASA 5510 are L@TP/IPSec with pre-shared key&lt;/P&gt;</description>
    <pubDate>Fri, 20 Apr 2018 13:58:04 GMT</pubDate>
    <dc:creator>jdprovine</dc:creator>
    <dc:date>2018-04-20T13:58:04Z</dc:date>
    <item>
      <title>IPsec Tunnel</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel/m-p/210999#M61580</link>
      <description>&lt;P&gt;This might be a dumb question but I am going to ask it anyway, otherwise I may never know.&amp;nbsp; I want to replace an ASA 5510 firewall IPsec VPN into a PCI network using Palo alto. What is the best way to approach that?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 19 Apr 2018 18:52:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel/m-p/210999#M61580</guid>
      <dc:creator>jdprovine</dc:creator>
      <dc:date>2018-04-19T18:52:36Z</dc:date>
    </item>
    <item>
      <title>Re: IPsec Tunnel</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel/m-p/211008#M61581</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/18719"&gt;@jdprovine&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;I imagine that the tunnel is currently just using a pre-shared key? If that's the case you would simply be able to recreate the tunnel on the PA and you shouldn't run into any issues.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 19 Apr 2018 19:13:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel/m-p/211008#M61581</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2018-04-19T19:13:32Z</dc:date>
    </item>
    <item>
      <title>Re: IPsec Tunnel</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel/m-p/211011#M61582</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;&lt;/P&gt;&lt;P&gt;I would assume the current VPN tunnle is using a pre-shared key also, I didn't set it up, just trying to find out how it is working now and see if I can mimic it on the PA.&amp;nbsp; Then find out what VPN client can connect to it.&lt;/P&gt;</description>
      <pubDate>Thu, 19 Apr 2018 19:23:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel/m-p/211011#M61582</guid>
      <dc:creator>jdprovine</dc:creator>
      <dc:date>2018-04-19T19:23:49Z</dc:date>
    </item>
    <item>
      <title>Re: IPsec Tunnel</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel/m-p/211142#M61600</link>
      <description>&lt;P&gt;Can you use L2TP ?&lt;/P&gt;</description>
      <pubDate>Fri, 20 Apr 2018 13:41:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel/m-p/211142#M61600</guid>
      <dc:creator>jdprovine</dc:creator>
      <dc:date>2018-04-20T13:41:18Z</dc:date>
    </item>
    <item>
      <title>Re: IPsec Tunnel</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel/m-p/211143#M61601</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/18719"&gt;@jdprovine&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;No. L2TP is no longer a feature for the vast majority of appliances anymore.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 20 Apr 2018 13:43:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel/m-p/211143#M61601</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2018-04-20T13:43:34Z</dc:date>
    </item>
    <item>
      <title>Re: IPsec Tunnel</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel/m-p/211146#M61604</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;&lt;/P&gt;&lt;P&gt;I was afraid of that, its going to make VPN client they can use more difficult, some people need to have a vpn client for access from home and also a client to access the PCI network. Like me I have a native client configured for PCI access and the GP VPN because, though you can switch back and forth by changing the portal name, it would be easier if you could have multiple entries on one client&lt;/P&gt;&lt;P&gt;The setting for the VPN for the client for the ASA 5510 are L@TP/IPSec with pre-shared key&lt;/P&gt;</description>
      <pubDate>Fri, 20 Apr 2018 13:58:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel/m-p/211146#M61604</guid>
      <dc:creator>jdprovine</dc:creator>
      <dc:date>2018-04-20T13:58:04Z</dc:date>
    </item>
    <item>
      <title>Re: IPsec Tunnel</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel/m-p/211151#M61607</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/18719"&gt;@jdprovine&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;You actually can do this within the new agent. You would simply add another portal within the agent&amp;nbsp;settings, and then you can toggle between the portals when you connect.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Capture.PNG" style="width: 496px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/14810iC354B65DD1A87036/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Capture.PNG" alt="Capture.PNG" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Capture.PNG" style="width: 274px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/14811i1272121D64523A53/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Capture.PNG" alt="Capture.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 20 Apr 2018 13:57:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel/m-p/211151#M61607</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2018-04-20T13:57:42Z</dc:date>
    </item>
    <item>
      <title>Re: IPsec Tunnel</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel/m-p/211152#M61608</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;&lt;/P&gt;&lt;P&gt;Which version client it that and does it work with 7.1.15&lt;/P&gt;</description>
      <pubDate>Fri, 20 Apr 2018 13:59:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel/m-p/211152#M61608</guid>
      <dc:creator>jdprovine</dc:creator>
      <dc:date>2018-04-20T13:59:29Z</dc:date>
    </item>
    <item>
      <title>Re: IPsec Tunnel</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel/m-p/211157#M61611</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/18719"&gt;@jdprovine&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;It's the 4.1 client. While the 4.1 will work with 7.1.15 I would make sure that it's fully functional in your enviroment before you push it out in mass.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 20 Apr 2018 14:26:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel/m-p/211157#M61611</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2018-04-20T14:26:48Z</dc:date>
    </item>
    <item>
      <title>Re: IPsec Tunnel</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel/m-p/211158#M61612</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;&lt;/P&gt;&lt;P&gt;Nice to see that they are answering our feature requests. I am going to install it on my test laptop and see how it works. This is going to be very helpful&lt;/P&gt;</description>
      <pubDate>Fri, 20 Apr 2018 14:29:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel/m-p/211158#M61612</guid>
      <dc:creator>jdprovine</dc:creator>
      <dc:date>2018-04-20T14:29:16Z</dc:date>
    </item>
    <item>
      <title>Re: IPsec Tunnel</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel/m-p/211165#M61617</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;&lt;/P&gt;&lt;P&gt;Works like a dream on my test machine!!!&amp;nbsp; I love it. Now I just have to figure out how to setup my IPSec tunnel, with the settings from the old ASA 5510&lt;/P&gt;</description>
      <pubDate>Fri, 20 Apr 2018 15:01:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel/m-p/211165#M61617</guid>
      <dc:creator>jdprovine</dc:creator>
      <dc:date>2018-04-20T15:01:25Z</dc:date>
    </item>
  </channel>
</rss>

