<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: vwire for cisco ASA terminating ipsec vpn in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/vwire-for-cisco-asa-terminating-ipsec-vpn/m-p/252935#M71873</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;Yeah the PAN does a better job of protection. I also created a policy to only allow VPN application traffic. If this is for site2site, I would say limit it to source/destination as well.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cheers!&lt;/P&gt;</description>
    <pubDate>Fri, 08 Mar 2019 20:03:51 GMT</pubDate>
    <dc:creator>OtakarKlier</dc:creator>
    <dc:date>2019-03-08T20:03:51Z</dc:date>
    <item>
      <title>vwire for cisco ASA terminating ipsec vpn</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vwire-for-cisco-asa-terminating-ipsec-vpn/m-p/252905#M71863</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have cisco ASA where remote users ipsec connection terminate.&lt;/P&gt;&lt;P&gt;Need to confirm can we use the PA in vwire for this traffic?&lt;/P&gt;</description>
      <pubDate>Fri, 08 Mar 2019 18:07:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vwire-for-cisco-asa-terminating-ipsec-vpn/m-p/252905#M71863</guid>
      <dc:creator>MP18</dc:creator>
      <dc:date>2019-03-08T18:07:41Z</dc:date>
    </item>
    <item>
      <title>Re: vwire for cisco ASA terminating ipsec vpn</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vwire-for-cisco-asa-terminating-ipsec-vpn/m-p/252927#M71865</link>
      <description>&lt;P&gt;I can confirm since I have done this in the past. We vwired it on the untrust side and then plugged it into the PAN on the trust side and created its own zone for it. That way all the ASA did was terminate the tunnels and the PAN did the rest of the inspections and allowances.&lt;/P&gt;</description>
      <pubDate>Fri, 08 Mar 2019 18:59:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vwire-for-cisco-asa-terminating-ipsec-vpn/m-p/252927#M71865</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2019-03-08T18:59:19Z</dc:date>
    </item>
    <item>
      <title>Re: vwire for cisco ASA terminating ipsec vpn</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vwire-for-cisco-asa-terminating-ipsec-vpn/m-p/252934#M71872</link>
      <description>&lt;P&gt;Many thanks for confirmation.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Will do this soon on our end.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Good to know if works with VPN.&lt;/P&gt;</description>
      <pubDate>Fri, 08 Mar 2019 20:02:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vwire-for-cisco-asa-terminating-ipsec-vpn/m-p/252934#M71872</guid>
      <dc:creator>MP18</dc:creator>
      <dc:date>2019-03-08T20:02:08Z</dc:date>
    </item>
    <item>
      <title>Re: vwire for cisco ASA terminating ipsec vpn</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vwire-for-cisco-asa-terminating-ipsec-vpn/m-p/252935#M71873</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;Yeah the PAN does a better job of protection. I also created a policy to only allow VPN application traffic. If this is for site2site, I would say limit it to source/destination as well.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cheers!&lt;/P&gt;</description>
      <pubDate>Fri, 08 Mar 2019 20:03:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vwire-for-cisco-asa-terminating-ipsec-vpn/m-p/252935#M71873</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2019-03-08T20:03:51Z</dc:date>
    </item>
  </channel>
</rss>

