<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to configure a IPSEC VPN proxy-id to allow Internet bound traffic? in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-configure-a-ipsec-vpn-proxy-id-to-allow-internet-bound/m-p/357744#M87806</link>
    <description>&lt;P&gt;Hello there.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The will be changed by use of the routing table (generally speaking)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Routing Table (example)&lt;/P&gt;
&lt;P&gt;ToPAN_as_PeerID (199.99.88.88) use Internet route&lt;/P&gt;
&lt;P&gt;0.0.0.0 use tunnel interface.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Now, the FW will establish the Phase1 portion of the VPN to the Peer.&lt;/P&gt;
&lt;P&gt;And Phase2 traffic will now be passed through the tunnel interface.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 21 Oct 2020 13:46:26 GMT</pubDate>
    <dc:creator>S.Cantwell</dc:creator>
    <dc:date>2020-10-21T13:46:26Z</dc:date>
    <item>
      <title>How to configure a IPSEC VPN proxy-id to allow Internet bound traffic?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-configure-a-ipsec-vpn-proxy-id-to-allow-internet-bound/m-p/357730#M87805</link>
      <description>&lt;P&gt;I have a S-to-S vpn tunnel to a remote location (terminating on cisco router) which was passing just the Intranet traffic. But, I would like to pass the site's Internet bound traffic through the VPN tunnel and subject it to Palo's threat inspection policies.How can I do this?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 21 Oct 2020 13:40:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-configure-a-ipsec-vpn-proxy-id-to-allow-internet-bound/m-p/357730#M87805</guid>
      <dc:creator>SThatipelly</dc:creator>
      <dc:date>2020-10-21T13:40:11Z</dc:date>
    </item>
    <item>
      <title>Re: How to configure a IPSEC VPN proxy-id to allow Internet bound traffic?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-configure-a-ipsec-vpn-proxy-id-to-allow-internet-bound/m-p/357744#M87806</link>
      <description>&lt;P&gt;Hello there.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The will be changed by use of the routing table (generally speaking)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Routing Table (example)&lt;/P&gt;
&lt;P&gt;ToPAN_as_PeerID (199.99.88.88) use Internet route&lt;/P&gt;
&lt;P&gt;0.0.0.0 use tunnel interface.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Now, the FW will establish the Phase1 portion of the VPN to the Peer.&lt;/P&gt;
&lt;P&gt;And Phase2 traffic will now be passed through the tunnel interface.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 21 Oct 2020 13:46:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-configure-a-ipsec-vpn-proxy-id-to-allow-internet-bound/m-p/357744#M87806</guid>
      <dc:creator>S.Cantwell</dc:creator>
      <dc:date>2020-10-21T13:46:26Z</dc:date>
    </item>
    <item>
      <title>Re: How to configure a IPSEC VPN proxy-id to allow Internet bound traffic?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-configure-a-ipsec-vpn-proxy-id-to-allow-internet-bound/m-p/357759#M87809</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/113304"&gt;@S.Cantwell&lt;/a&gt;&amp;nbsp; I'm not quite sure I got your point. Are you suggesting me to put in a route pointing to tunnel interface on the peer side?&amp;nbsp; The peer is cisco router.&lt;/P&gt;</description>
      <pubDate>Wed, 21 Oct 2020 13:51:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-configure-a-ipsec-vpn-proxy-id-to-allow-internet-bound/m-p/357759#M87809</guid>
      <dc:creator>SThatipelly</dc:creator>
      <dc:date>2020-10-21T13:51:07Z</dc:date>
    </item>
    <item>
      <title>Re: How to configure a IPSEC VPN proxy-id to allow Internet bound traffic?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-configure-a-ipsec-vpn-proxy-id-to-allow-internet-bound/m-p/357816#M87814</link>
      <description>&lt;P&gt;Howdy&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Yes, you should really have a simplified routing table (if I understand your query)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;From the Cisco side.&lt;/P&gt;
&lt;P&gt;One route to the PAN FW public IP (for establishing the VPN).&lt;/P&gt;
&lt;P&gt;One (default route) to the PANW, via a tunnel interface, so that all traffic is encapsulated/transmited to the PANW FW for inspection.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Now 100% of all traffic goes across Cisco to PAN VPN for inspection.&lt;/P&gt;</description>
      <pubDate>Wed, 21 Oct 2020 15:23:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-configure-a-ipsec-vpn-proxy-id-to-allow-internet-bound/m-p/357816#M87814</guid>
      <dc:creator>S.Cantwell</dc:creator>
      <dc:date>2020-10-21T15:23:05Z</dc:date>
    </item>
  </channel>
</rss>

