<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: VPN site-2-site configuration and OSPF in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-site-2-site-configuration-and-ospf/m-p/249425#M70929</link>
    <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/27580"&gt;@OtakarKlier&lt;/a&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for your reply. I can't ping between the two Palo's on IPs 192.168.210.26 and 192.168.210.120, which are assigned to their e1/1 interfaces. I have set up statics routes anda security policy as follows on both Palo's as suggested.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ping.PNG" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/18673iE6AD4982203383DE/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="ping.PNG" alt="ping.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;VM-PA-01 config.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Static 1.PNG" style="width: 795px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/18669i75CC4A7CB1D64ED4/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Static 1.PNG" alt="Static 1.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Policy 1.PNG" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/18670i0E4E2967D1394671/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Policy 1.PNG" alt="Policy 1.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;VM-PA-02 config.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Static.PNG" style="width: 786px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/18671i4C18B26C82CFABD5/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Static.PNG" alt="Static.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="policy.PNG" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/18672i56E52737B7189984/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="policy.PNG" alt="policy.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any further advice is appreciated.&lt;/P&gt;</description>
    <pubDate>Fri, 08 Feb 2019 10:22:44 GMT</pubDate>
    <dc:creator>rchung54</dc:creator>
    <dc:date>2019-02-08T10:22:44Z</dc:date>
    <item>
      <title>VPN site-2-site configuration and OSPF</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-site-2-site-configuration-and-ospf/m-p/249239#M70879</link>
      <description>&lt;P&gt;Hello forum members,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have been testing the VPN site-2-site configurations on my Palo Alto VM lab, prior to deploying on our production environment. I have successfully set up a VPN connection where both firewalls use static routing. Trouble I'm having now is setting up the VPN connection where the 3rd party site uses static routing and my corp LAN uses OSPF.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I can't get the tunnel up between the two sites. I followed the Site-2-Site VPN with Static and Dynamic Routing example in the PAN-OS Admin guide, but some of the steps seem vague (vague to me any way). My R1 router has formed an OSPF neighbour relation ship with the Palo Alto VM-PA-01 fine and the PC host 172.19.9.10 can ping the E1/2 interface (10.216.7.1) of the Palo Alto fine.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The following is my lab topology and screen shots of the configs.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="topology.PNG" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/18639iA734FFC13BE74B69/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="topology.PNG" alt="topology.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;VM-PA-01 config.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="interfaces.PNG" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/18640iBC33BB1B7B253E9F/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="interfaces.PNG" alt="interfaces.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="tunnel.PNG" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/18641iC84FB27B909638DC/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="tunnel.PNG" alt="tunnel.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="VR.PNG" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/18642i9215B09FFB9D6098/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="VR.PNG" alt="VR.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="static.PNG" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/18643i2BC3A25404EB4AED/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="static.PNG" alt="static.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ospf1.PNG" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/18644iA8A6E21DF73217C8/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="ospf1.PNG" alt="ospf1.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="redist profile.PNG" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/18645i94705EA8A843A890/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="redist profile.PNG" alt="redist profile.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="IPSEC tunn.PNG" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/18646i209C163199BAAC36/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="IPSEC tunn.PNG" alt="IPSEC tunn.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="IKE gate1.PNG" style="width: 795px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/18647iE5713B73D89CA38B/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="IKE gate1.PNG" alt="IKE gate1.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;*** I also tried this IKE Gateway config with the FQDNs, as in the PAN-OS guide ***&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="IKE gate2.PNG" style="width: 794px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/18648i437B9C2F0521FAEB/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="IKE gate2.PNG" alt="IKE gate2.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Security.PNG" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/18649iF9DAE93FC3469F0B/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Security.PNG" alt="Security.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;VM-PA-02 config.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="interfaces.PNG" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/18650i24D62E3EFDA5880E/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="interfaces.PNG" alt="interfaces.PNG" /&gt;&lt;/span&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="tunnel int.PNG" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/18651i16B1D0AF57962428/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="tunnel int.PNG" alt="tunnel int.PNG" /&gt;&lt;/span&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="VR.PNG" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/18652iDEDCF1C0A50BF0DC/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="VR.PNG" alt="VR.PNG" /&gt;&lt;/span&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="static.PNG" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/18653iCFF7AD1736EA1589/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="static.PNG" alt="static.PNG" /&gt;&lt;/span&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="IPSEC tun.PNG" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/18654i9C7B7BF6B2152D81/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="IPSEC tun.PNG" alt="IPSEC tun.PNG" /&gt;&lt;/span&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ike 1.PNG" style="width: 783px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/18655iA7B330B5CE0E916A/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="ike 1.PNG" alt="ike 1.PNG" /&gt;&lt;/span&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;*** I also tried this IKE Gateway config with the FQDNs, as in the PAN-OS guide ***&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ike 2.PNG" style="width: 793px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/18656iF604523685B78F27/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="ike 2.PNG" alt="ike 2.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="security.PNG" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/18657i8022639C42AC4C9F/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="security.PNG" alt="security.PNG" /&gt;&lt;/span&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any suggestions and advice will be much appreciated.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 07 Feb 2019 15:04:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-site-2-site-configuration-and-ospf/m-p/249239#M70879</guid>
      <dc:creator>rchung54</dc:creator>
      <dc:date>2019-02-07T15:04:55Z</dc:date>
    </item>
    <item>
      <title>Re: VPN site-2-site configuration and OSPF</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-site-2-site-configuration-and-ospf/m-p/249269#M70884</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I took a bit of a look, and I didnt see a route between the PAN's? Can the external interfaces of the two ping each other? You will have to add a monitoring profile to it so they can reply as well as a security policy. What I do is always have a static route between the two for monitoring, but they need to be able to see each other.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Just a thought.&lt;/P&gt;</description>
      <pubDate>Thu, 07 Feb 2019 16:52:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-site-2-site-configuration-and-ospf/m-p/249269#M70884</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2019-02-07T16:52:08Z</dc:date>
    </item>
    <item>
      <title>Re: VPN site-2-site configuration and OSPF</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-site-2-site-configuration-and-ospf/m-p/249375#M70917</link>
      <description>&lt;P&gt;In the OSPF configuration, do you have the redistribution rule setup to pull in the static route pointed to the remote site vpn and distribute it down to your "corp" lan for the return path.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 08 Feb 2019 01:22:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-site-2-site-configuration-and-ospf/m-p/249375#M70917</guid>
      <dc:creator>pulukas</dc:creator>
      <dc:date>2019-02-08T01:22:20Z</dc:date>
    </item>
    <item>
      <title>Re: VPN site-2-site configuration and OSPF</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-site-2-site-configuration-and-ospf/m-p/249425#M70929</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/27580"&gt;@OtakarKlier&lt;/a&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for your reply. I can't ping between the two Palo's on IPs 192.168.210.26 and 192.168.210.120, which are assigned to their e1/1 interfaces. I have set up statics routes anda security policy as follows on both Palo's as suggested.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ping.PNG" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/18673iE6AD4982203383DE/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="ping.PNG" alt="ping.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;VM-PA-01 config.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Static 1.PNG" style="width: 795px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/18669i75CC4A7CB1D64ED4/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Static 1.PNG" alt="Static 1.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Policy 1.PNG" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/18670i0E4E2967D1394671/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Policy 1.PNG" alt="Policy 1.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;VM-PA-02 config.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Static.PNG" style="width: 786px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/18671i4C18B26C82CFABD5/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Static.PNG" alt="Static.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="policy.PNG" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/18672i56E52737B7189984/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="policy.PNG" alt="policy.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any further advice is appreciated.&lt;/P&gt;</description>
      <pubDate>Fri, 08 Feb 2019 10:22:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-site-2-site-configuration-and-ospf/m-p/249425#M70929</guid>
      <dc:creator>rchung54</dc:creator>
      <dc:date>2019-02-08T10:22:44Z</dc:date>
    </item>
    <item>
      <title>Re: VPN site-2-site configuration and OSPF</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-site-2-site-configuration-and-ospf/m-p/249440#M70932</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/9524"&gt;@pulukas&lt;/a&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hi pulkas,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have created this profile (underlined in red), is this what you mean?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ospf redis.PNG" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/18676i7C2D33144F52D9E3/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="ospf redis.PNG" alt="ospf redis.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 08 Feb 2019 11:40:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-site-2-site-configuration-and-ospf/m-p/249440#M70932</guid>
      <dc:creator>rchung54</dc:creator>
      <dc:date>2019-02-08T11:40:04Z</dc:date>
    </item>
    <item>
      <title>Re: VPN site-2-site configuration and OSPF</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-site-2-site-configuration-and-ospf/m-p/249455#M70936</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;Make sure you have set an Interface Management Profile and at least allow ping on both PAN's. It looked like your security profile would already allow ping.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 497px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/18679iF62AD0FDACD6AA6C/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Keep an eye on the logs to see what is getting blocked if anything.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Fri, 08 Feb 2019 15:13:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-site-2-site-configuration-and-ospf/m-p/249455#M70936</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2019-02-08T15:13:09Z</dc:date>
    </item>
    <item>
      <title>Re: VPN site-2-site configuration and OSPF</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-site-2-site-configuration-and-ospf/m-p/249456#M70937</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I just noticed you didnt source your pings so they would have come from the maangement interface. Try the following:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;From VM-PA-01&lt;BR /&gt;Ping source 192.168.210.26 host 192.168.210.120&lt;/P&gt;&lt;P&gt;From VM-PA-02&lt;BR /&gt;Ping source 192.168.210.120 host 192.168.210.26&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;See if that returns any good replies. But the fact that the pings stated 'Destination Host unreachable' tells me that routing could be an issues from your management interface.&lt;/P&gt;</description>
      <pubDate>Fri, 08 Feb 2019 15:17:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-site-2-site-configuration-and-ospf/m-p/249456#M70937</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2019-02-08T15:17:14Z</dc:date>
    </item>
    <item>
      <title>Re: VPN site-2-site configuration and OSPF</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-site-2-site-configuration-and-ospf/m-p/249526#M70966</link>
      <description>&lt;P&gt;Have you assigned the underlined redistribution profile to an export rule in OSPF?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 08 Feb 2019 22:56:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-site-2-site-configuration-and-ospf/m-p/249526#M70966</guid>
      <dc:creator>rmfalconer</dc:creator>
      <dc:date>2019-02-08T22:56:34Z</dc:date>
    </item>
    <item>
      <title>Re: VPN site-2-site configuration and OSPF</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-site-2-site-configuration-and-ospf/m-p/249581#M70974</link>
      <description>&lt;P&gt;As rmfalconer notes, you also need to assign the redistribution profile to OSPF for it to become active.&amp;nbsp; Without both steps the local static route will not be redistributed to the rest of the OSPF infrastructure for the return path.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 10 Feb 2019 13:04:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-site-2-site-configuration-and-ospf/m-p/249581#M70974</guid>
      <dc:creator>pulukas</dc:creator>
      <dc:date>2019-02-10T13:04:16Z</dc:date>
    </item>
    <item>
      <title>Re: VPN site-2-site configuration and OSPF</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-site-2-site-configuration-and-ospf/m-p/249680#M71000</link>
      <description>&lt;P&gt;Hi pulukas, rmfalconer, Otakar.Klier,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for your responses and advice.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/27580"&gt;@OtakarKlier&lt;/a&gt;- Both the Palo's can ping each other if I source the IPs, even when I don't have static rule set up&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I lab'd this up again following the Site-to-Site VPN with Static and Dynamic Routing config guide in the PAN-OS 8.1 Admin guide and got the tunnels up with the remote sites pinging each other.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="top.PNG" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/18730i03FEA11DB06AC585/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="top.PNG" alt="top.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;However, it did take a bit of tweaking with trial and errors, until I got the config working.&amp;nbsp; The config steps are not clear in the Admin guide, if one is new to Palo Alto and VPNs.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;These are the observations I made when I lab'd this up again.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1. On the IKE Gateway configuration, the Admin. guide said use the FQDN for the local and peer identification. This did not work for me in my lab.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="FQDN.PNG" style="width: 621px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/18727iA43571F17A4E08AD/image-dimensions/621x368/is-moderation-mode/true?v=v2" width="621" height="368" role="button" title="FQDN.PNG" alt="FQDN.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Instead, I used the following config on both Palo's, by specifying the Peer IP address and the local and the IP peer addresses for the Local and Peer identification:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="IKE gate.PNG" style="width: 498px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/18728i1B30A326C6D50714/image-dimensions/498x380/is-moderation-mode/true?v=v2" width="498" height="380" role="button" title="IKE gate.PNG" alt="IKE gate.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2. I was told that static routes pointing down tunnels should not have a next hop address defined. If it did not, how would the secure traffic travel across the tunnel? in order for my config to work, i had to specify the Next Hop IP address of the tunnel interface.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="static.PNG" style="width: 605px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/18729iC7F9DC5C18B6F20A/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="static.PNG" alt="static.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;3. Both my Palo Alto's do not see each other as OSPF neighbours. Surely they would only see each other as OSPF neighbours, if both Palo's had OSPF running on them? Not sure why the guide stated this, only one of the Palo's has OSPF configured. The peer VM-PA-02 which has OSPF configured. has formed a neighbour relationship with router R1 fine.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Anyone else had to tweak things to their configs working?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Many thanks.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Feb 2019 12:58:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-site-2-site-configuration-and-ospf/m-p/249680#M71000</guid>
      <dc:creator>rchung54</dc:creator>
      <dc:date>2019-02-11T12:58:30Z</dc:date>
    </item>
    <item>
      <title>Re: VPN site-2-site configuration and OSPF</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-site-2-site-configuration-and-ospf/m-p/249760#M71022</link>
      <description>&lt;P&gt;Glad you got it working!&lt;/P&gt;</description>
      <pubDate>Mon, 11 Feb 2019 21:47:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-site-2-site-configuration-and-ospf/m-p/249760#M71022</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2019-02-11T21:47:02Z</dc:date>
    </item>
  </channel>
</rss>

