<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Several subnetworks through the tunnel between Palo Alto and Mikrotik in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/several-subnetworks-through-the-tunnel-between-palo-alto-and/m-p/358073#M87842</link>
    <description>&lt;P&gt;is GRE a requirement?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;a regular IPSec tunnel will allow as many subnets as you need, adding GRE will create some limitations because of GRE&lt;/P&gt;</description>
    <pubDate>Thu, 22 Oct 2020 09:17:48 GMT</pubDate>
    <dc:creator>reaper</dc:creator>
    <dc:date>2020-10-22T09:17:48Z</dc:date>
    <item>
      <title>Several subnetworks through the tunnel between Palo Alto and Mikrotik</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/several-subnetworks-through-the-tunnel-between-palo-alto-and/m-p/358028#M87837</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Site 2 site allows only two networks to be pulled inside the tunnel (one of them behind the mikrotik and the other one behind the palo alto).I’ve tried different settings and it doesn't help.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Has anyone had experience building a tunnel between them based on GRE tunnel over IPsec?&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Several subnetworks need to be passed through the tunnel.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 22 Oct 2020 08:03:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/several-subnetworks-through-the-tunnel-between-palo-alto-and/m-p/358028#M87837</guid>
      <dc:creator>melnikov</dc:creator>
      <dc:date>2020-10-22T08:03:07Z</dc:date>
    </item>
    <item>
      <title>Re: Several subnetworks through the tunnel between Palo Alto and Mikrotik</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/several-subnetworks-through-the-tunnel-between-palo-alto-and/m-p/358073#M87842</link>
      <description>&lt;P&gt;is GRE a requirement?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;a regular IPSec tunnel will allow as many subnets as you need, adding GRE will create some limitations because of GRE&lt;/P&gt;</description>
      <pubDate>Thu, 22 Oct 2020 09:17:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/several-subnetworks-through-the-tunnel-between-palo-alto-and/m-p/358073#M87842</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2020-10-22T09:17:48Z</dc:date>
    </item>
    <item>
      <title>Re: Several subnetworks through the tunnel between Palo Alto and Mikrotik</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/several-subnetworks-through-the-tunnel-between-palo-alto-and/m-p/358101#M87846</link>
      <description>&lt;P&gt;I have configured s2s between mikrotik and palo alto.&lt;BR /&gt;Local networks go between them. I need to add other networks through this tunnel.&lt;BR /&gt;On the Palo Alto, I added another network on the tunnel to the proxy id.&lt;BR /&gt;In mikrotik, the accept rule from the LAN(Firewall - NAT) to the network behind the tunnel.&lt;BR /&gt;But there is no ping.&lt;BR /&gt;Only two networks can be specified in the IPSEC settings.&lt;BR /&gt;It does not work to create another policy, as the keys begin to break.&lt;BR /&gt;Also, there is no separate interface on Mikrotik (like with GRE).&lt;BR /&gt;When adding routes, I indicate the local interface.&lt;/P&gt;</description>
      <pubDate>Thu, 22 Oct 2020 10:12:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/several-subnetworks-through-the-tunnel-between-palo-alto-and/m-p/358101#M87846</guid>
      <dc:creator>melnikov</dc:creator>
      <dc:date>2020-10-22T10:12:19Z</dc:date>
    </item>
    <item>
      <title>Re: Several subnetworks through the tunnel between Palo Alto and Mikrotik</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/several-subnetworks-through-the-tunnel-between-palo-alto-and/m-p/358312#M87868</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;Do either of the firewall logs show where the pings are failing? It could be a policy rule that is preventing the traffic?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Thu, 22 Oct 2020 22:07:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/several-subnetworks-through-the-tunnel-between-palo-alto-and/m-p/358312#M87868</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2020-10-22T22:07:24Z</dc:date>
    </item>
    <item>
      <title>Re: Several subnetworks through the tunnel between Palo Alto and Mikrotik</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/several-subnetworks-through-the-tunnel-between-palo-alto-and/m-p/358389#M87875</link>
      <description>&lt;P&gt;In monitoring (traffic) PA there are no records from the network 10.10.10.0/24 (from source and dest)&lt;BR /&gt;ssh PA utility: ping source 10.10.10.1 host 172.16.0.254&amp;nbsp;(no response)&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Документ123.jpg" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/28348i64CC22E24A7E6D17/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Документ123.jpg" alt="Документ123.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Mikrotik terminal: ping source 172.16.0.254&amp;nbsp;10.10.10.1&amp;nbsp;(no response)&lt;BR /&gt;ip - firewall -connection (no response)&lt;/P&gt;</description>
      <pubDate>Fri, 23 Oct 2020 09:13:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/several-subnetworks-through-the-tunnel-between-palo-alto-and/m-p/358389#M87875</guid>
      <dc:creator>melnikov</dc:creator>
      <dc:date>2020-10-23T09:13:08Z</dc:date>
    </item>
    <item>
      <title>Re: Several subnetworks through the tunnel between Palo Alto and Mikrotik</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/several-subnetworks-through-the-tunnel-between-palo-alto-and/m-p/358486#M87888</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;Make sure the policies on the PAN are set to log at session end. On the PAN, are the routes to the 172 networksi n the virtual router and pointed at the Tunnel? Also in order for the PAN interface to respond to pings, it must have a management profile attached to it that allows PING.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Fri, 23 Oct 2020 15:15:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/several-subnetworks-through-the-tunnel-between-palo-alto-and/m-p/358486#M87888</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2020-10-23T15:15:44Z</dc:date>
    </item>
    <item>
      <title>Re: Several subnetworks through the tunnel between Palo Alto and Mikrotik</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/several-subnetworks-through-the-tunnel-between-palo-alto-and/m-p/358773#M87928</link>
      <description>&lt;P&gt;Hello/&lt;/P&gt;&lt;P&gt;In the rules, there is a permissive rule from this zone to the lan zone. Then, as a test, I added it to the LAN (LOCAL) zone where all traffic is allowed inside.&lt;BR /&gt;Yes, there is a route to the network through the tunnel.&lt;BR /&gt;Added MNG profile trust (ping allow) on the tunnel.&lt;/P&gt;</description>
      <pubDate>Mon, 26 Oct 2020 13:41:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/several-subnetworks-through-the-tunnel-between-palo-alto-and/m-p/358773#M87928</guid>
      <dc:creator>melnikov</dc:creator>
      <dc:date>2020-10-26T13:41:03Z</dc:date>
    </item>
    <item>
      <title>Re: Several subnetworks through the tunnel between Palo Alto and Mikrotik</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/several-subnetworks-through-the-tunnel-between-palo-alto-and/m-p/361658#M88208</link>
      <description>&lt;P&gt;Previously, I set up a tunnel between a cisco router and a PA.&lt;BR /&gt;IPsec Site-to-Site VPN Palo Alto &amp;lt;-&amp;gt; Cisco Router w / VTI cc&lt;BR /&gt;They used a virtual tunnel interface (VTI) in a cisco router.&lt;BR /&gt;Drawing an analogy, I tried to collect between PAlo alto and Mikrotik.&lt;BR /&gt;As you know, on microtik you need to separately create a GRE interface, and then apply IPSEC.&lt;BR /&gt;I tried creating a loopback on it to hang the address on it.&lt;BR /&gt;Then I made the settings for IPSEC, and added a route.&lt;BR /&gt;Below I am attaching screenshots of both of the devices with settings.&lt;BR /&gt;I encountered an error in the IPSEC settings, it does not allow unchecking the Tunnel checkbox.&lt;BR /&gt;Instead, it issues an error message "Couldn't change IPSEC Policy - transport mode policy must match sa endpoints".&lt;BR /&gt;If you enter the IPSec settings:&lt;BR /&gt;Peer Address - 0.0.0.0/0&lt;BR /&gt;IPSec Policy- SA Dst. Address 0.0.0.0/0&lt;BR /&gt;It does not help.&lt;BR /&gt;In 'IPSec/Peer' set only remote peer, not local.&lt;BR /&gt;&lt;A href="https://wiki.mikrotik.com/wiki/Manual:IP/IPsec" target="_blank"&gt;https://wiki.mikrotik.com/wiki/Manual:IP/IPsec&lt;/A&gt;&lt;BR /&gt;Tried changing policy settings - action , level, protocols. It does not help too.&lt;/P&gt;&lt;P&gt;Anybody have idea?&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ike_crypto.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/28546i11D6556B65CDAA68/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="ike_crypto.png" alt="ike_crypto.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ike_GW.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/28549i4A026C1E191795EF/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="ike_GW.png" alt="ike_GW.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ike_GW2.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/28547i82D55FED3FD9A4C3/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="ike_GW2.png" alt="ike_GW2.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ipsec_crypto.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/28548i68286B591DE8C61F/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="ipsec_crypto.png" alt="ipsec_crypto.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ipsec_tunnel.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/28552i9A7D54DF26648DA5/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="ipsec_tunnel.png" alt="ipsec_tunnel.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="tunnel_interface.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/28550i22CEFA3297679D74/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="tunnel_interface.png" alt="tunnel_interface.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="tunnel_interface2.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/28551iD08E95F91FDD1FF5/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="tunnel_interface2.png" alt="tunnel_interface2.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="virtual router.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/28553i3847D35100C33D93/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="virtual router.png" alt="virtual router.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="mikrotik1.jpg" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/28555i97C26AE6DB4894A3/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="mikrotik1.jpg" alt="mikrotik1.jpg" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="mikrotik11.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/28557iE7E60837E9CAA82F/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="mikrotik11.png" alt="mikrotik11.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="mikrotik12.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/28556iE9E569634F43E5AD/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="mikrotik12.png" alt="mikrotik12.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="mikrotik13.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/28554i593F5435D731343E/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="mikrotik13.png" alt="mikrotik13.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 09 Nov 2020 14:47:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/several-subnetworks-through-the-tunnel-between-palo-alto-and/m-p/361658#M88208</guid>
      <dc:creator>melnikov</dc:creator>
      <dc:date>2020-11-09T14:47:48Z</dc:date>
    </item>
  </channel>
</rss>

