<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Palo Alto -  GPVPN - IPSEC b2b in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-gpvpn-ipsec-b2b/m-p/292688#M77416</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I would say Option 1 or 2. Both have advantages and disadvantages. I would say make sure that whatever the internal to external NAT should be different just in case a VPN user does something goofy and get that IP blocked some how it wont affect other services.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cheers!&lt;/P&gt;</description>
    <pubDate>Fri, 11 Oct 2019 20:49:04 GMT</pubDate>
    <dc:creator>OtakarKlier</dc:creator>
    <dc:date>2019-10-11T20:49:04Z</dc:date>
    <item>
      <title>Palo Alto -  GPVPN - IPSEC b2b</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-gpvpn-ipsec-b2b/m-p/290190#M77088</link>
      <description>&lt;P&gt;My current role is as a Network Architect and I am working with our security team to get some Palo Alto firewalls setup to provide&lt;/P&gt;&lt;P&gt;GPVPN access and also IPSEC b2b connectivity.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Our initial design has a single external public address to host the GPVPN traffic and the IPSEC b2b traffic and works ok. We are currently discussing the option of implementing a 2nd public address so that we can split the GPVPN and IPSEC b2b traffic on to separate interfaces which seems to make sense.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We are also hearing from the security department that they would like to see each IPSEC b2b tunnel terminated on an individual public IP address which we are going to discuss.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What are your thoughts on this&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Option 1 -&amp;nbsp; Stay with a single public IP to terminate GPVPN and b2b IPSEC tunnels&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Option 2- &amp;nbsp; Have a Public IP for GPVPN and a 2nd Public IP's for "ALL" b2b IPSEC tunnels&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Option 3 - Have a Public IP for GPVPN and multiple Public IP's - 1 for each IPSEC tunnel&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 20 tunnels - 20 public IP's &amp;nbsp; &amp;nbsp;&amp;nbsp; 50 tunnels - 50 public IP's&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am expecting a lot of people to come back with either option 1 or option 2 but I am interested to see if anyone&lt;/P&gt;&lt;P&gt;thinks option 3 is a good idea.&lt;/P&gt;</description>
      <pubDate>Thu, 26 Sep 2019 15:39:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-gpvpn-ipsec-b2b/m-p/290190#M77088</guid>
      <dc:creator>mcronin</dc:creator>
      <dc:date>2019-09-26T15:39:17Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto -  GPVPN - IPSEC b2b</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-gpvpn-ipsec-b2b/m-p/292057#M77342</link>
      <description>&lt;P&gt;Howdy&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Option 2 is what you should be using.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Option 3 is definitely not needed.&amp;nbsp; Having unique public IP does not provide additional security, only additional option for potential misconfiguration and challenging troubleshooting.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I would be using public IP with loopback addresses vs exposing the true public IP associated with your 2 ethernet interfaces.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 09 Oct 2019 03:10:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-gpvpn-ipsec-b2b/m-p/292057#M77342</guid>
      <dc:creator>S.Cantwell</dc:creator>
      <dc:date>2019-10-09T03:10:45Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto -  GPVPN - IPSEC b2b</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-gpvpn-ipsec-b2b/m-p/292414#M77382</link>
      <description>&lt;P&gt;Hi&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/113304"&gt;@S.Cantwell&lt;/a&gt; and what will be the benefit of option 2?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/51263"&gt;@mcronin&lt;/a&gt;I would personally go for option 1:&lt;/P&gt;&lt;P&gt;- The other two options bring unnecessary complexity. One public IP for site-to-site and RA VPN is simple and easy to support&lt;/P&gt;&lt;P&gt;- If you enable GP VPN on the same interface that you use for site-to-site or on a separate, you still need to expose it and open the required ports. If it reachable from internet any scanner will detect it and will try to exploit.&lt;/P&gt;</description>
      <pubDate>Thu, 10 Oct 2019 20:10:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-gpvpn-ipsec-b2b/m-p/292414#M77382</guid>
      <dc:creator>aleksandar.astardzhiev</dc:creator>
      <dc:date>2019-10-10T20:10:59Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto -  GPVPN - IPSEC b2b</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-gpvpn-ipsec-b2b/m-p/292688#M77416</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I would say Option 1 or 2. Both have advantages and disadvantages. I would say make sure that whatever the internal to external NAT should be different just in case a VPN user does something goofy and get that IP blocked some how it wont affect other services.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cheers!&lt;/P&gt;</description>
      <pubDate>Fri, 11 Oct 2019 20:49:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-gpvpn-ipsec-b2b/m-p/292688#M77416</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2019-10-11T20:49:04Z</dc:date>
    </item>
  </channel>
</rss>

