<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Two Directly Connected PANs via IPSEC- Do I Need to Build Tunnel Interf in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/two-directly-connected-pans-via-ipsec-do-i-need-to-build-tunnel/m-p/326891#M83234</link>
    <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/96206"&gt;@michaelmertens&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Tunnel interfaces are virtual and as such do not necessarily require an IP when connected to another route based vpn device&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You would apply the /30 to your physical interface&lt;/P&gt;&lt;P&gt;Then configure an 'ike&amp;nbsp; gateway'for the remote device's IP in the /30 and can then use 'unnumbered' tunnel interfaces&lt;/P&gt;&lt;P&gt;In your VirtualRouter you can just set a destination interface as next hop, no need for an IP&lt;/P&gt;&lt;P&gt;For tunnel monitoring you could add IP&amp;nbsp; addresses to the tunnel interfaces, but you could also use a loopback interface&lt;/P&gt;&lt;P&gt;In both cases these up addresses do not need to be known outside of the 2 devices&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 08 May 2020 05:52:36 GMT</pubDate>
    <dc:creator>reaper</dc:creator>
    <dc:date>2020-05-08T05:52:36Z</dc:date>
    <item>
      <title>Two Directly Connected PANs via IPSEC- Do I Need to Build Tunnel Interfaces</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/two-directly-connected-pans-via-ipsec-do-i-need-to-build-tunnel/m-p/326749#M83225</link>
      <description>&lt;P&gt;We are having installed a 10 Gbps Light Wave service for a WAN connection and will have PANs on either side. (The PANs will be on the same /30 subnet, and the Wave service appears to be a raw fiber connection terminated on physical PAN L3 interfaces). We want to authenticate the other end and encrypt using IPSEC. Do I need to build a tunnel interface with another /30 in order to leverage IPSEC in the Palo Alto platform, or is there some "short-cut"? Also, would I need to use a third /30 for a tunnel monitor? Thanks! (I'm pretty new to PANs).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 07 May 2020 18:28:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/two-directly-connected-pans-via-ipsec-do-i-need-to-build-tunnel/m-p/326749#M83225</guid>
      <dc:creator>michaelmertens</dc:creator>
      <dc:date>2020-05-07T18:28:30Z</dc:date>
    </item>
    <item>
      <title>Re: Two Directly Connected PANs via IPSEC- Do I Need to Build Tunnel Interf</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/two-directly-connected-pans-via-ipsec-do-i-need-to-build-tunnel/m-p/326891#M83234</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/96206"&gt;@michaelmertens&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Tunnel interfaces are virtual and as such do not necessarily require an IP when connected to another route based vpn device&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You would apply the /30 to your physical interface&lt;/P&gt;&lt;P&gt;Then configure an 'ike&amp;nbsp; gateway'for the remote device's IP in the /30 and can then use 'unnumbered' tunnel interfaces&lt;/P&gt;&lt;P&gt;In your VirtualRouter you can just set a destination interface as next hop, no need for an IP&lt;/P&gt;&lt;P&gt;For tunnel monitoring you could add IP&amp;nbsp; addresses to the tunnel interfaces, but you could also use a loopback interface&lt;/P&gt;&lt;P&gt;In both cases these up addresses do not need to be known outside of the 2 devices&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 08 May 2020 05:52:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/two-directly-connected-pans-via-ipsec-do-i-need-to-build-tunnel/m-p/326891#M83234</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2020-05-08T05:52:36Z</dc:date>
    </item>
    <item>
      <title>Re: Two Directly Connected PANs via IPSEC- Do I Need to Build Tunnel Interf</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/two-directly-connected-pans-via-ipsec-do-i-need-to-build-tunnel/m-p/327335#M83305</link>
      <description>&lt;P&gt;Reaper,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for your input. I'm still troubleshooting getting the IKE handshake going. (I've got both FWs back-to-back prior to sending out the remote FW). So when you said having the tunnel "unnumbered" you just meant to not assign an IPv4 address in the Tunnel Interface config? And to your point, as I would like to have a tunnel monitor, I'm using a 10.10.1.4/30 for the tunnel monitor and the physical interfaces are using 10.10.1.0/30. Also, I've created new Zone names for the physical interfaces on either end. I don't need to put in explicit rules to allow IPSEC packets (UDP 500, UDP 4500, etc) for IKE/IPSEC SAs? I do have my default Intrazone rule which permits any any...&lt;BR /&gt;&lt;BR /&gt;Anyway, I'm new at the Palo Alto's so appreciate your thoughts and input.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;</description>
      <pubDate>Mon, 11 May 2020 12:56:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/two-directly-connected-pans-via-ipsec-do-i-need-to-build-tunnel/m-p/327335#M83305</guid>
      <dc:creator>michaelmertens</dc:creator>
      <dc:date>2020-05-11T12:56:10Z</dc:date>
    </item>
    <item>
      <title>Re: Two Directly Connected PANs via IPSEC- Do I Need to Build Tunnel Interf</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/two-directly-connected-pans-via-ipsec-do-i-need-to-build-tunnel/m-p/327338#M83306</link>
      <description>&lt;P&gt;With physical interfaces you mean ethernet1/x? (Tunnel interfaces are virtual)&lt;/P&gt;&lt;P&gt;-yes, unnumbered means no ip assigned&lt;/P&gt;&lt;P&gt;-10.10.1.4/30 and 10.10.1.0/30 are unusable addresses (broadcast and network)&lt;/P&gt;&lt;P&gt;The usable ips in that subnet are .1/30 and .2/30&lt;/P&gt;&lt;P&gt;So if the local interface has .1 then the remote should use .2 and monitor would go to .2&lt;/P&gt;&lt;P&gt;-the ipsec packets will happen between the physical ethernet1/x I terfaces, typically untrust to untrust. Intrazone will take care of that (but I do recommend making explicit rules and blocking untrust to untrust at the end)&lt;/P&gt;&lt;P&gt;- the tunnel traffic will come from and will go to the virtual tunnel interfaces' zone&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope this helps&lt;/P&gt;</description>
      <pubDate>Mon, 11 May 2020 13:08:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/two-directly-connected-pans-via-ipsec-do-i-need-to-build-tunnel/m-p/327338#M83306</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2020-05-11T13:08:15Z</dc:date>
    </item>
  </channel>
</rss>

