<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Access to Web-GUI (on MGMT-Port) via IPSec-Tunnel from external network in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/access-to-web-gui-on-mgmt-port-via-ipsec-tunnel-from-external/m-p/267758#M74495</link>
    <description>&lt;P&gt;Hey everyone,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have the following active-passive-HA-scenario:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ethernet1/1: External Interface (vpn termination point)&lt;/P&gt;&lt;P&gt;ethernet1/2: Internal Interface&lt;/P&gt;&lt;P&gt;MGMT: Management-Interface&lt;/P&gt;&lt;P&gt;HA1: HA&lt;/P&gt;&lt;P&gt;HA2: HA&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For administrative and monitoring purposes I need access from an external network to the WEB-GUI of both firewall-systems. Because of active-passive-HA, just one firewall is available at the same time. So I thought: Is it possible to establish a IPSec-Tunnel between two firewall to get access to the WEB-GUI:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The ipsec tunnel works fine and I can see hits on the security policy which should allow the traffic from external network to the Management-Interface of the palo alto firewall. But the access via https does not work. &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My questions:&lt;/P&gt;&lt;P&gt;- Is it possible to get access from external network via ipsec-tunnel to the Management-Interface of a Palo Alto Firewall?&lt;/P&gt;&lt;P&gt;- Are there other ways to get access from external network via ipsec-tunnel to the WEB-GUI of both firewall-systems?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance&lt;/P&gt;</description>
    <pubDate>Fri, 07 Jun 2019 08:34:57 GMT</pubDate>
    <dc:creator>GuidoKramer</dc:creator>
    <dc:date>2019-06-07T08:34:57Z</dc:date>
    <item>
      <title>Access to Web-GUI (on MGMT-Port) via IPSec-Tunnel from external network</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/access-to-web-gui-on-mgmt-port-via-ipsec-tunnel-from-external/m-p/267758#M74495</link>
      <description>&lt;P&gt;Hey everyone,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have the following active-passive-HA-scenario:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ethernet1/1: External Interface (vpn termination point)&lt;/P&gt;&lt;P&gt;ethernet1/2: Internal Interface&lt;/P&gt;&lt;P&gt;MGMT: Management-Interface&lt;/P&gt;&lt;P&gt;HA1: HA&lt;/P&gt;&lt;P&gt;HA2: HA&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For administrative and monitoring purposes I need access from an external network to the WEB-GUI of both firewall-systems. Because of active-passive-HA, just one firewall is available at the same time. So I thought: Is it possible to establish a IPSec-Tunnel between two firewall to get access to the WEB-GUI:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The ipsec tunnel works fine and I can see hits on the security policy which should allow the traffic from external network to the Management-Interface of the palo alto firewall. But the access via https does not work. &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My questions:&lt;/P&gt;&lt;P&gt;- Is it possible to get access from external network via ipsec-tunnel to the Management-Interface of a Palo Alto Firewall?&lt;/P&gt;&lt;P&gt;- Are there other ways to get access from external network via ipsec-tunnel to the WEB-GUI of both firewall-systems?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance&lt;/P&gt;</description>
      <pubDate>Fri, 07 Jun 2019 08:34:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/access-to-web-gui-on-mgmt-port-via-ipsec-tunnel-from-external/m-p/267758#M74495</guid>
      <dc:creator>GuidoKramer</dc:creator>
      <dc:date>2019-06-07T08:34:57Z</dc:date>
    </item>
    <item>
      <title>Re: Access to Web-GUI (on MGMT-Port) via IPSec-Tunnel from external network</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/access-to-web-gui-on-mgmt-port-via-ipsec-tunnel-from-external/m-p/267807#M74499</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/114083"&gt;@GuidoKramer&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Yes it is possible.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Check out the following page for best practices for securing admin access and for remote access to the management network :&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/8-0/pan-os-admin/getting-started/best-practices-for-securing-administrative-access.html#" target="_blank" rel="noopener"&gt;best-practices-for-securing-administrative-access&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Cheers !&lt;/P&gt;
&lt;P&gt;-Kiwi.&lt;/P&gt;
&lt;DIV id="ConnectiveDocSignExtentionInstalled" data-extension-version="1.0.4"&gt;&amp;nbsp;&lt;/DIV&gt;</description>
      <pubDate>Fri, 07 Jun 2019 09:57:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/access-to-web-gui-on-mgmt-port-via-ipsec-tunnel-from-external/m-p/267807#M74499</guid>
      <dc:creator>kiwi</dc:creator>
      <dc:date>2019-06-07T09:57:53Z</dc:date>
    </item>
    <item>
      <title>Re: Access to Web-GUI (on MGMT-Port) via IPSec-Tunnel from external network</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/access-to-web-gui-on-mgmt-port-via-ipsec-tunnel-from-external/m-p/267827#M74500</link>
      <description>&lt;P&gt;OK, I added a new security policy with the information mentioned on the page "Best Practices for Securing Administrative Access". When I tried to initiate a session with my web browser I can see that the hit count of this policy raises; but still the login prompt does not appear in the browser.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Of course, the network from which I initiate the connection was added to "Device --&amp;gt; Setup --&amp;gt; Interface --&amp;gt; Management --&amp;gt; Permitted IP Addresses".&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Or do I have to connect via GlobalProtect?&lt;/P&gt;</description>
      <pubDate>Fri, 07 Jun 2019 10:17:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/access-to-web-gui-on-mgmt-port-via-ipsec-tunnel-from-external/m-p/267827#M74500</guid>
      <dc:creator>GuidoKramer</dc:creator>
      <dc:date>2019-06-07T10:17:13Z</dc:date>
    </item>
    <item>
      <title>Re: Access to Web-GUI (on MGMT-Port) via IPSec-Tunnel from external network</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/access-to-web-gui-on-mgmt-port-via-ipsec-tunnel-from-external/m-p/267831#M74501</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I don't know how you're routing is set up.&lt;/P&gt;
&lt;P&gt;I say this because the mgmt port is usually out-of-band.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Alternatives:&lt;/P&gt;
&lt;P&gt;You can use a bastion host as explained in the best practices link&lt;/P&gt;
&lt;P&gt;You can configure a mgmt profile on your tunnel interface (if it's numbered) or use a mgmt profile on a loopback interface.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Cheers !&lt;/P&gt;
&lt;P&gt;-Kiwi.&lt;/P&gt;
&lt;DIV id="ConnectiveDocSignExtentionInstalled" data-extension-version="1.0.4"&gt;&amp;nbsp;&lt;/DIV&gt;</description>
      <pubDate>Fri, 07 Jun 2019 11:03:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/access-to-web-gui-on-mgmt-port-via-ipsec-tunnel-from-external/m-p/267831#M74501</guid>
      <dc:creator>kiwi</dc:creator>
      <dc:date>2019-06-07T11:03:04Z</dc:date>
    </item>
    <item>
      <title>Re: Access to Web-GUI (on MGMT-Port) via IPSec-Tunnel from external network</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/access-to-web-gui-on-mgmt-port-via-ipsec-tunnel-from-external/m-p/267911#M74510</link>
      <description>&lt;P&gt;Resolve this a few ways&lt;/P&gt;&lt;P&gt;1) GP is best/secure, so use that if you can.&lt;/P&gt;&lt;P&gt;2) Clientless VPN (connect to portal of FW on the GUI page, and have a widget to web into the mgmt IP of 2nd FW&lt;/P&gt;&lt;P&gt;3) Port forwarding of a NAT'd address, to the mgmt IP of the 2nd FW.&lt;/P&gt;&lt;P&gt;Untrust --&amp;gt; Untrust --&amp;gt; publicIPofSomething -- (port XXYZ)&amp;nbsp; Xlate to Mgmt-IPof2ndFW. on 443&lt;/P&gt;&lt;P&gt;Now, create a security policy that allow access from Untrust to (InternalZone) publicIPofSomething (port XXYZ)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Those are a few ways to do this.&amp;nbsp; Some secure, others just engineering a solution.&amp;nbsp; &lt;span class="lia-unicode-emoji" title=":face_with_tongue:"&gt;😛&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 07 Jun 2019 14:11:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/access-to-web-gui-on-mgmt-port-via-ipsec-tunnel-from-external/m-p/267911#M74510</guid>
      <dc:creator>S.Cantwell</dc:creator>
      <dc:date>2019-06-07T14:11:23Z</dc:date>
    </item>
    <item>
      <title>Re: Access to Web-GUI (on MGMT-Port) via IPSec-Tunnel from external network</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/access-to-web-gui-on-mgmt-port-via-ipsec-tunnel-from-external/m-p/326463#M83188</link>
      <description>&lt;P&gt;Guido,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Did you ever get this working? How did you end up setting this up?&lt;/P&gt;</description>
      <pubDate>Wed, 06 May 2020 17:59:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/access-to-web-gui-on-mgmt-port-via-ipsec-tunnel-from-external/m-p/326463#M83188</guid>
      <dc:creator>tjjohnso</dc:creator>
      <dc:date>2020-05-06T17:59:49Z</dc:date>
    </item>
    <item>
      <title>Re: Access to Web-GUI (on MGMT-Port) via IPSec-Tunnel from external network</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/access-to-web-gui-on-mgmt-port-via-ipsec-tunnel-from-external/m-p/340846#M85517</link>
      <description>&lt;P&gt;I to would like to know the resolution&lt;/P&gt;</description>
      <pubDate>Mon, 27 Jul 2020 13:48:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/access-to-web-gui-on-mgmt-port-via-ipsec-tunnel-from-external/m-p/340846#M85517</guid>
      <dc:creator>SirchRettop</dc:creator>
      <dc:date>2020-07-27T13:48:36Z</dc:date>
    </item>
    <item>
      <title>Re: Access to Web-GUI (on MGMT-Port) via IPSec-Tunnel from external network</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/access-to-web-gui-on-mgmt-port-via-ipsec-tunnel-from-external/m-p/340964#M85554</link>
      <description>&lt;P&gt;I setup a loopback interface with an IP address on the inside of the firewall and assigned it an IP and management profile. That worked well. Let me know if you need more detail.&lt;/P&gt;</description>
      <pubDate>Mon, 27 Jul 2020 23:35:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/access-to-web-gui-on-mgmt-port-via-ipsec-tunnel-from-external/m-p/340964#M85554</guid>
      <dc:creator>tjjohnso</dc:creator>
      <dc:date>2020-07-27T23:35:08Z</dc:date>
    </item>
    <item>
      <title>Re: Access to Web-GUI (on MGMT-Port) via IPSec-Tunnel from external network</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/access-to-web-gui-on-mgmt-port-via-ipsec-tunnel-from-external/m-p/350476#M86966</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am interested in knowing how you did that configuration&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;</description>
      <pubDate>Fri, 18 Sep 2020 17:25:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/access-to-web-gui-on-mgmt-port-via-ipsec-tunnel-from-external/m-p/350476#M86966</guid>
      <dc:creator>Efrain_Olmos</dc:creator>
      <dc:date>2020-09-18T17:25:27Z</dc:date>
    </item>
    <item>
      <title>Re: Access to Web-GUI (on MGMT-Port) via IPSec-Tunnel from external network</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/access-to-web-gui-on-mgmt-port-via-ipsec-tunnel-from-external/m-p/350477#M86967</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/115190"&gt;@Efrain_Olmos&lt;/a&gt; ,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You need to understand that PAN firewalls have strict separation between management plane and data plane including the routing for the mgmt and data interfaces. So there is no way to route traffic received by data plane interface to the dedicated management interface, without sending this traffic via another device (switch or router).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As mentioned earlier most straight forward approach would be to create loopback, assign it with mgm-int profile and build IPsec tunnel that will accept traffic destine to that loopback (assigning the tunnel interface with IP will also do the trick).&lt;/P&gt;&lt;P&gt;Basically it is the same approach if you use GlobalProtect, the same concept, but the tunnel is client-to-site, not site-to-site.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The biggest disadvantage of these approaches is if you have active-passive HA you will be able to reach only the current active member (since both members in the cluster are sharing one ip).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So if you want to monitor both members at the same time - any solution that involves dataplane interface with interface-management profile will not work. You will need to use the dedicated/oob management port. In that case you will need to use additional switch or a router that will make the connection between the dataplane interface and the mgmt. For example - you can connect the inside interface and mgmt interface to the same vlan, so when you build the ipsec traffic will first exit the fw, pass the layer2 switch and go to the mgmt interface. Or if the site is bit bigger and you use different networks/vlans for the mgmt and the inside you can put a route on the fw that it needs to route to the mgmt network via the core switch.&lt;/P&gt;</description>
      <pubDate>Fri, 18 Sep 2020 18:29:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/access-to-web-gui-on-mgmt-port-via-ipsec-tunnel-from-external/m-p/350477#M86967</guid>
      <dc:creator>aleksandar.astardzhiev</dc:creator>
      <dc:date>2020-09-18T18:29:25Z</dc:date>
    </item>
    <item>
      <title>Re: Access to Web-GUI (on MGMT-Port) via IPSec-Tunnel from external network</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/access-to-web-gui-on-mgmt-port-via-ipsec-tunnel-from-external/m-p/350853#M87013</link>
      <description>&lt;P&gt;Create a Management Profile that permits HTTPS, SSH, Ping, etc.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Choose Network &amp;gt; Loopback &amp;gt; Create a Loopback interface with an IP address on the inside of the firewall &amp;gt; Assign the management profile you created and your Virtual Router&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Go to Device &amp;gt; Setup &amp;gt; Services &amp;gt; Service Route Configuration &amp;gt; Choose what services you need to traverse the VPN tunnel through your new loopback interface&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;That should be it, hopefully it helps!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 21 Sep 2020 13:14:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/access-to-web-gui-on-mgmt-port-via-ipsec-tunnel-from-external/m-p/350853#M87013</guid>
      <dc:creator>tjjohnso</dc:creator>
      <dc:date>2020-09-21T13:14:51Z</dc:date>
    </item>
    <item>
      <title>Re: Access to Web-GUI (on MGMT-Port) via IPSec-Tunnel from external network</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/access-to-web-gui-on-mgmt-port-via-ipsec-tunnel-from-external/m-p/357618#M87784</link>
      <description>&lt;P&gt;Thanks a lot for the explanation&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 21 Oct 2020 00:16:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/access-to-web-gui-on-mgmt-port-via-ipsec-tunnel-from-external/m-p/357618#M87784</guid>
      <dc:creator>Efrain_Olmos</dc:creator>
      <dc:date>2020-10-21T00:16:19Z</dc:date>
    </item>
    <item>
      <title>Re: Access to Web-GUI (on MGMT-Port) via IPSec-Tunnel from external network</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/access-to-web-gui-on-mgmt-port-via-ipsec-tunnel-from-external/m-p/357703#M87795</link>
      <description>&lt;P&gt;No problem, did that work for you?&lt;/P&gt;</description>
      <pubDate>Wed, 21 Oct 2020 10:19:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/access-to-web-gui-on-mgmt-port-via-ipsec-tunnel-from-external/m-p/357703#M87795</guid>
      <dc:creator>tjjohnso</dc:creator>
      <dc:date>2020-10-21T10:19:40Z</dc:date>
    </item>
  </channel>
</rss>

