<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: IPSec tunnel between PA-220 and VM300 in Azure in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-between-pa-220-and-vm300-in-azure/m-p/217275#M62869</link>
    <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/49312"&gt;@hfregoso&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;Whats the stae of your phase 1 ?&lt;/P&gt;&lt;P&gt;Is the issue with phase 2?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;One recommendation is to use proxy ids with Azure, I know proxy ids ar eonly for cisco devices but this is one exception to the rule.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;I have cli access from the PA220 so I've been running the initial vpn test from there, but I don't have CLI access from the cloud side, yet, so I have not initiated anything from that side, yet.&amp;nbsp; The system logs on either side don't show me anything related to the VPN, so that might be my problem.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The proxy IDs is something I have not tried yet, and I was just reading about that yesterday.&amp;nbsp; I will give that a try.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I mostly wanted to make sure that, with the VM300 in the Azure cloud, I was treating this setup properly and not overlooking some issue related to the particular environment.&amp;nbsp; The PA220 is coming off a working cable modem connection we use for lab setups, and as far as I know, if I allow access through the public facing interface on the Azure side, there's nothing else I have to do in Azure spcifically.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Other than that, on both sides I have the ethernet interfaces with static IP addresses added to virtual routers that allow public facing access, as well as their own security zones. The IPsec tunnels are also in the same securty zones, and both tunnels are in 192.168.100.x/24 subnets with .1 as the IP on one side and .10 as the IP on the other.&amp;nbsp; The peer addresses are correct on each side of the tunnel, and the IKE Gateways have the correct local and&amp;nbsp;peer addresses.&amp;nbsp; I'm using the default IKE Crypto and IPSec crypto on both sides.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The one thing I want to try is the proxy IP addressing, so I'll give that a try, but wanted to make sure I wasn't overlooking something special.&amp;nbsp; Thanks in advance for the advice.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sat, 09 Jun 2018 13:27:13 GMT</pubDate>
    <dc:creator>anthony.goethals</dc:creator>
    <dc:date>2018-06-09T13:27:13Z</dc:date>
    <item>
      <title>IPSec tunnel between PA-220 and VM300 in Azure</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-between-pa-220-and-vm300-in-azure/m-p/217235#M62857</link>
      <description>&lt;P&gt;Trying to build a IPSec tunnel between a lab PA220 and a VM300 we have in operation in an Azure environment.&amp;nbsp; I think I've got all the necessary ingredients covered, and I've checked all the "How To" docs I can find, but still no luck.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Are there any gotchas related to this kind of setup that I should know about as I proceed?&amp;nbsp; Any advice would be helpful.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 08 Jun 2018 19:59:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-between-pa-220-and-vm300-in-azure/m-p/217235#M62857</guid>
      <dc:creator>anthony.goethals</dc:creator>
      <dc:date>2018-06-08T19:59:06Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec tunnel between PA-220 and VM300 in Azure</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-between-pa-220-and-vm300-in-azure/m-p/217250#M62858</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;What are you seeing in the logs, traffic and system? The system logs show the VPN connections. Also not sure about Azure, but Google and AWS have load balancers in front of the hosted VM's, may want to double check and see if those ACL's are open?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Fri, 08 Jun 2018 20:21:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-between-pa-220-and-vm300-in-azure/m-p/217250#M62858</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2018-06-08T20:21:27Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec tunnel between PA-220 and VM300 in Azure</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-between-pa-220-and-vm300-in-azure/m-p/217251#M62859</link>
      <description>&lt;P&gt;If no interesting traffic then tunnel is down.&lt;/P&gt;&lt;P&gt;You can initiate tunnel on one side with command:&lt;/P&gt;&lt;P&gt;&amp;gt; test vpn ipsec-sa tunnel &amp;lt;tunnel-name&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;And check logs at other side.&lt;/P&gt;</description>
      <pubDate>Fri, 08 Jun 2018 20:28:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-between-pa-220-and-vm300-in-azure/m-p/217251#M62859</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2018-06-08T20:28:51Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec tunnel between PA-220 and VM300 in Azure</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-between-pa-220-and-vm300-in-azure/m-p/217269#M62865</link>
      <description>&lt;P&gt;Whats the stae of your phase 1 ?&lt;/P&gt;&lt;P&gt;Is the issue with phase 2?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;One recommendation is to use proxy ids with Azure, I know proxy ids ar eonly for cisco devices but this is one exception to the rule.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I wish I could help more but having more details would come in handy.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 09 Jun 2018 08:02:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-between-pa-220-and-vm300-in-azure/m-p/217269#M62865</guid>
      <dc:creator>hfregoso</dc:creator>
      <dc:date>2018-06-09T08:02:07Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec tunnel between PA-220 and VM300 in Azure</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-between-pa-220-and-vm300-in-azure/m-p/217274#M62868</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/27580"&gt;@OtakarKlier&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;What are you seeing in the logs, traffic and system? The system logs show the VPN connections. Also not sure about Azure, but Google and AWS have load balancers in front of the hosted VM's, may want to double check and see if those ACL's are open?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;From the PA220 I can test the vpn and I see it initiate but I can't find anything in the VM300 logs indicating failed connection attempts.&amp;nbsp; We might not have a policy setup yet to show the connection attempts.&amp;nbsp; Our Azure fabric is in production and used for a great many other things at this time --- not just for the Palo.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I did make sure in the Azure fabric to allow ipsec connectiivty through the public facing interface with a inbound port rule, but not sure if I did enough to allow connectivity.&amp;nbsp; I've approached this mostly as a Palo-to-Palo tunnel peer connection setup, so not sure if I've done my homework on the Azure side.&lt;/P&gt;</description>
      <pubDate>Sat, 09 Jun 2018 13:03:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-between-pa-220-and-vm300-in-azure/m-p/217274#M62868</guid>
      <dc:creator>anthony.goethals</dc:creator>
      <dc:date>2018-06-09T13:03:28Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec tunnel between PA-220 and VM300 in Azure</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-between-pa-220-and-vm300-in-azure/m-p/217275#M62869</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/49312"&gt;@hfregoso&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;Whats the stae of your phase 1 ?&lt;/P&gt;&lt;P&gt;Is the issue with phase 2?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;One recommendation is to use proxy ids with Azure, I know proxy ids ar eonly for cisco devices but this is one exception to the rule.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;I have cli access from the PA220 so I've been running the initial vpn test from there, but I don't have CLI access from the cloud side, yet, so I have not initiated anything from that side, yet.&amp;nbsp; The system logs on either side don't show me anything related to the VPN, so that might be my problem.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The proxy IDs is something I have not tried yet, and I was just reading about that yesterday.&amp;nbsp; I will give that a try.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I mostly wanted to make sure that, with the VM300 in the Azure cloud, I was treating this setup properly and not overlooking some issue related to the particular environment.&amp;nbsp; The PA220 is coming off a working cable modem connection we use for lab setups, and as far as I know, if I allow access through the public facing interface on the Azure side, there's nothing else I have to do in Azure spcifically.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Other than that, on both sides I have the ethernet interfaces with static IP addresses added to virtual routers that allow public facing access, as well as their own security zones. The IPsec tunnels are also in the same securty zones, and both tunnels are in 192.168.100.x/24 subnets with .1 as the IP on one side and .10 as the IP on the other.&amp;nbsp; The peer addresses are correct on each side of the tunnel, and the IKE Gateways have the correct local and&amp;nbsp;peer addresses.&amp;nbsp; I'm using the default IKE Crypto and IPSec crypto on both sides.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The one thing I want to try is the proxy IP addressing, so I'll give that a try, but wanted to make sure I wasn't overlooking something special.&amp;nbsp; Thanks in advance for the advice.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 09 Jun 2018 13:27:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-between-pa-220-and-vm300-in-azure/m-p/217275#M62869</guid>
      <dc:creator>anthony.goethals</dc:creator>
      <dc:date>2018-06-09T13:27:13Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec tunnel between PA-220 and VM300 in Azure</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-between-pa-220-and-vm300-in-azure/m-p/389274#M90613</link>
      <description>&lt;P&gt;Networking in Azure is very abstract. When setting up a Palo Alto gateway in Azure as a VPN gateway, did you need to use NAT traversal?&amp;nbsp; The PA only sees its private IP as Azure handles the public.&amp;nbsp; Please let us know if you get it working.&lt;/P&gt;</description>
      <pubDate>Fri, 05 Mar 2021 02:27:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-between-pa-220-and-vm300-in-azure/m-p/389274#M90613</guid>
      <dc:creator>JimMcGrady</dc:creator>
      <dc:date>2021-03-05T02:27:05Z</dc:date>
    </item>
  </channel>
</rss>

