<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: VPN tunnel to a firewall NOT internet facing in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-tunnel-to-a-firewall-not-internet-facing/m-p/213750#M62151</link>
    <description>&lt;P&gt;Your routing becomes problematic in the design you are attempting with little benefit.&amp;nbsp; In both scenarios you have your data passing over the Internet inside of an IPSec tunnel.&amp;nbsp;&amp;nbsp;In either method you will need to implement a dynamic routing protocol to have an automated method for path selection.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also keep in mind that when you have the VPN tunnel on the Internal FW, you will need to setup dynamic routing from your core LAN switch to the FW.&amp;nbsp; Otherwise the Firewall will always pass traffic between servers over the VPN tunnel and it won't use the MPLS.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Supertures Super Network 2.png" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/15108i8555B63A14A4733F/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Supertures Super Network 2.png" alt="Supertures Super Network 2.png" /&gt;&lt;/span&gt;In this example we summarize each site with /16 subnet routes.&amp;nbsp; These are static routes on the LAN-SW and the Servers-FW.&amp;nbsp; This will allow traffic to cross the VPN if we lose the Dynamic MPLS routing.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The LAN-SW's at each site will learn a more specific /24 route for the remote office networks and this will be a more prefferred path.&amp;nbsp; Traffic will normally use the MPLS network from site-to-site.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When your MPLS dynamic routing stops (due to&amp;nbsp;circuit or router failure) these specific routes disapear and the next best path are the /16 static routes.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also remember that all of your FW rules will need to be built with the new VPN tunnel zone as a source or destination on the Server-FW's at each location.&lt;/P&gt;</description>
    <pubDate>Wed, 09 May 2018 15:07:18 GMT</pubDate>
    <dc:creator>davanderson</dc:creator>
    <dc:date>2018-05-09T15:07:18Z</dc:date>
    <item>
      <title>VPN tunnel to a firewall NOT internet facing</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-tunnel-to-a-firewall-not-internet-facing/m-p/213698#M62139</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have a scenario with two sites which has two sets (HA) of firewalls, external and internal. So external handles everything internet and behind the internal the datacenter resides. Clients are in between.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have MPLS between the sites which terminate in the internal firewall.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now we want to setup site-to-site vpn as a backup for MPLS failure. Since there is a lot of routing in place we would like the tunnels to terminate in the internal firewalls.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;How would you setup this? &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;NAT, PBF, etc...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Magnus&lt;/P&gt;</description>
      <pubDate>Wed, 09 May 2018 09:43:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-tunnel-to-a-firewall-not-internet-facing/m-p/213698#M62139</guid>
      <dc:creator>superture</dc:creator>
      <dc:date>2018-05-09T09:43:47Z</dc:date>
    </item>
    <item>
      <title>Re: VPN tunnel to a firewall NOT internet facing</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-tunnel-to-a-firewall-not-internet-facing/m-p/213731#M62144</link>
      <description>&lt;P&gt;You would normally have a dynamic routing protocol setup to allow traffic from one site to another via your MPLS network.&amp;nbsp; Then you can easily use your default route to send traffic to the Internet firewall for your backup VPN tunnel.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is an example of how a network would likely be setup to serve the function you describe.&amp;nbsp; When the MPLS goes down, you lose the dynamic routes and the VPN kicks in.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Supertures Super Network.png" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/15105i36547A433C3A88B5/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Supertures Super Network.png" alt="Supertures Super Network.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 09 May 2018 12:17:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-tunnel-to-a-firewall-not-internet-facing/m-p/213731#M62144</guid>
      <dc:creator>davanderson</dc:creator>
      <dc:date>2018-05-09T12:17:23Z</dc:date>
    </item>
    <item>
      <title>Re: VPN tunnel to a firewall NOT internet facing</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-tunnel-to-a-firewall-not-internet-facing/m-p/213744#M62147</link>
      <description>&lt;P&gt;Haha looks great!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But... suppose we have a lot of static routing and really want to terminate tunnel on the internal firewalls?&lt;/P&gt;</description>
      <pubDate>Wed, 09 May 2018 14:03:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-tunnel-to-a-firewall-not-internet-facing/m-p/213744#M62147</guid>
      <dc:creator>superture</dc:creator>
      <dc:date>2018-05-09T14:03:06Z</dc:date>
    </item>
    <item>
      <title>Re: VPN tunnel to a firewall NOT internet facing</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-tunnel-to-a-firewall-not-internet-facing/m-p/213750#M62151</link>
      <description>&lt;P&gt;Your routing becomes problematic in the design you are attempting with little benefit.&amp;nbsp; In both scenarios you have your data passing over the Internet inside of an IPSec tunnel.&amp;nbsp;&amp;nbsp;In either method you will need to implement a dynamic routing protocol to have an automated method for path selection.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also keep in mind that when you have the VPN tunnel on the Internal FW, you will need to setup dynamic routing from your core LAN switch to the FW.&amp;nbsp; Otherwise the Firewall will always pass traffic between servers over the VPN tunnel and it won't use the MPLS.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Supertures Super Network 2.png" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/15108i8555B63A14A4733F/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Supertures Super Network 2.png" alt="Supertures Super Network 2.png" /&gt;&lt;/span&gt;In this example we summarize each site with /16 subnet routes.&amp;nbsp; These are static routes on the LAN-SW and the Servers-FW.&amp;nbsp; This will allow traffic to cross the VPN if we lose the Dynamic MPLS routing.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The LAN-SW's at each site will learn a more specific /24 route for the remote office networks and this will be a more prefferred path.&amp;nbsp; Traffic will normally use the MPLS network from site-to-site.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When your MPLS dynamic routing stops (due to&amp;nbsp;circuit or router failure) these specific routes disapear and the next best path are the /16 static routes.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also remember that all of your FW rules will need to be built with the new VPN tunnel zone as a source or destination on the Server-FW's at each location.&lt;/P&gt;</description>
      <pubDate>Wed, 09 May 2018 15:07:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-tunnel-to-a-firewall-not-internet-facing/m-p/213750#M62151</guid>
      <dc:creator>davanderson</dc:creator>
      <dc:date>2018-05-09T15:07:18Z</dc:date>
    </item>
    <item>
      <title>Re: VPN tunnel to a firewall NOT internet facing</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-tunnel-to-a-firewall-not-internet-facing/m-p/214398#M62307</link>
      <description>&lt;P&gt;Thanks!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm thinking if I terminate tunnel in the same zone as MPLS on the internal fw and use static route monitor it might work? I realize we could do this much more efficient but that will have to wait for switch refresh I think.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;How do I get the tunnel to the internal fw? NAT all the way or PBF maybe?&lt;/P&gt;</description>
      <pubDate>Wed, 16 May 2018 07:58:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-tunnel-to-a-firewall-not-internet-facing/m-p/214398#M62307</guid>
      <dc:creator>superture</dc:creator>
      <dc:date>2018-05-16T07:58:40Z</dc:date>
    </item>
    <item>
      <title>Re: VPN tunnel to a firewall NOT internet facing</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-tunnel-to-a-firewall-not-internet-facing/m-p/214446#M62319</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;If you have a lot of static routing then PDF would be your best bet. That way you set your PBF policy to route your primary way with a monitor and the option to 'Disable' the policy if hte monitor goes down. Then your static routes would be setup to use the backup path. This works great because the PBF policies are used prior to the routes in the virtual router.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.paloaltonetworks.com/documentation/80/pan-os/pan-os/policy/policy-based-forwarding/use-case-pbf-for-outbound-access-with-dual-isps#id1e130c06-0775-45d9-9f96-c416531fdb5f" target="_blank"&gt;https://www.paloaltonetworks.com/documentation/80/pan-os/pan-os/policy/policy-based-forwarding/use-case-pbf-for-outbound-access-with-dual-isps#id1e130c06-0775-45d9-9f96-c416531fdb5f&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Wed, 16 May 2018 13:56:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-tunnel-to-a-firewall-not-internet-facing/m-p/214446#M62319</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2018-05-16T13:56:26Z</dc:date>
    </item>
  </channel>
</rss>

