<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: full mesh or hub and spoke VPNs running OSPF in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/full-mesh-or-hub-and-spoke-vpns-running-ospf/m-p/1028#M807</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;...terminate one or two of your sites to the Palo and evaluate it &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://live.paloaltonetworks.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We just migrated to Palo firewalls and we switched our IPSec VPN architecture over also. We have Cisco routers at a dozen or so remote sites with static public IPs that terminate thier IPSec tunnels back to the Palos at HQ. Prior to switching our VPN over, I did a lot of lab testing with different IPSec VPN scenarios such as full mesh, hub/spoke, static VPN routes and found that I found that the Palos are very versatile and and seem to handle almost any design.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We use Cisco at the remote sites, but Juniper routers should work just as well...the SRX series for example, can do policy based or route based VPN. I used this guide for our set up...but for your Juniper routers you will just have to do some lab testing for the VPN termination architecture.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;How to Configure Dynamic Routing over IPSec against Cisco routers:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;&lt;A _jive_internal="true" class="active_link" href="https://live.paloaltonetworks.com/docs/DOC-2250"&gt;https://live.paloaltonetworks.com/docs/DOC-2250&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As for your stability comment about Juniper releases...I know what you mean. We use the Juniper SA Series and the software releases upset stuff very frequently.&lt;/P&gt;&lt;P&gt;The stability of your new design would be determined by how often you upgrade software on your remote Juniper routers and on the Palo. Because you will be working with the dedicated Palo hardware (vs your current VPN termination approach using the Juniper NSM), I don't expect core features (such as IPSec) on the Palo changing as much where it should cause stability issues with VPN tunnels.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 10 Aug 2012 14:17:38 GMT</pubDate>
    <dc:creator>panman</dc:creator>
    <dc:date>2012-08-10T14:17:38Z</dc:date>
    <item>
      <title>full mesh or hub and spoke VPNs running OSPF</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/full-mesh-or-hub-and-spoke-vpns-running-ospf/m-p/1026#M805</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi there,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;is anyone managing this with let's say 50 sites and multiple connections (Internet, MPLS). &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Currently we are using Juniper and the VPN manager inside the central management (NSM) does this job for us. The good thing is that when you have found a NSM release which is working and has no show stopping bugs it is running really well.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How does Palo Alto solve this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for helping me &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Jul 2012 12:13:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/full-mesh-or-hub-and-spoke-vpns-running-ospf/m-p/1026#M805</guid>
      <dc:creator>hag</dc:creator>
      <dc:date>2012-07-06T12:13:23Z</dc:date>
    </item>
    <item>
      <title>Re: full mesh or hub and spoke VPNs running OSPF</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/full-mesh-or-hub-and-spoke-vpns-running-ospf/m-p/1027#M806</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Anyone?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 10 Aug 2012 08:17:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/full-mesh-or-hub-and-spoke-vpns-running-ospf/m-p/1027#M806</guid>
      <dc:creator>hag</dc:creator>
      <dc:date>2012-08-10T08:17:32Z</dc:date>
    </item>
    <item>
      <title>Re: full mesh or hub and spoke VPNs running OSPF</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/full-mesh-or-hub-and-spoke-vpns-running-ospf/m-p/1028#M807</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;...terminate one or two of your sites to the Palo and evaluate it &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://live.paloaltonetworks.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We just migrated to Palo firewalls and we switched our IPSec VPN architecture over also. We have Cisco routers at a dozen or so remote sites with static public IPs that terminate thier IPSec tunnels back to the Palos at HQ. Prior to switching our VPN over, I did a lot of lab testing with different IPSec VPN scenarios such as full mesh, hub/spoke, static VPN routes and found that I found that the Palos are very versatile and and seem to handle almost any design.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We use Cisco at the remote sites, but Juniper routers should work just as well...the SRX series for example, can do policy based or route based VPN. I used this guide for our set up...but for your Juniper routers you will just have to do some lab testing for the VPN termination architecture.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;How to Configure Dynamic Routing over IPSec against Cisco routers:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;&lt;A _jive_internal="true" class="active_link" href="https://live.paloaltonetworks.com/docs/DOC-2250"&gt;https://live.paloaltonetworks.com/docs/DOC-2250&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As for your stability comment about Juniper releases...I know what you mean. We use the Juniper SA Series and the software releases upset stuff very frequently.&lt;/P&gt;&lt;P&gt;The stability of your new design would be determined by how often you upgrade software on your remote Juniper routers and on the Palo. Because you will be working with the dedicated Palo hardware (vs your current VPN termination approach using the Juniper NSM), I don't expect core features (such as IPSec) on the Palo changing as much where it should cause stability issues with VPN tunnels.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 10 Aug 2012 14:17:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/full-mesh-or-hub-and-spoke-vpns-running-ospf/m-p/1028#M807</guid>
      <dc:creator>panman</dc:creator>
      <dc:date>2012-08-10T14:17:38Z</dc:date>
    </item>
  </channel>
</rss>

