<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Remote Management of PA-200 through SSL-VPN in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/remote-management-of-pa-200-through-ssl-vpn/m-p/12097#M8868</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Have you configured a management profile and attached that to the interface/zone which is used when you come through the VPN?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 19 Jun 2012 14:11:58 GMT</pubDate>
    <dc:creator>mikand</dc:creator>
    <dc:date>2012-06-19T14:11:58Z</dc:date>
    <item>
      <title>Remote Management of PA-200 through SSL-VPN</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/remote-management-of-pa-200-through-ssl-vpn/m-p/12096#M8867</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I would like to be able to reach the web management interface and the CLI of our PA device, while connected through the Global Protect VPN. The networks are on separate segments, and I have access routes and rules in place to allow the traffic to the management IP. However no luck with reaching it. Any advice/help would be appreciated.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 19 Jun 2012 13:36:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/remote-management-of-pa-200-through-ssl-vpn/m-p/12096#M8867</guid>
      <dc:creator>mat.gangwer</dc:creator>
      <dc:date>2012-06-19T13:36:01Z</dc:date>
    </item>
    <item>
      <title>Re: Remote Management of PA-200 through SSL-VPN</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/remote-management-of-pa-200-through-ssl-vpn/m-p/12097#M8868</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Have you configured a management profile and attached that to the interface/zone which is used when you come through the VPN?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 19 Jun 2012 14:11:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/remote-management-of-pa-200-through-ssl-vpn/m-p/12097#M8868</guid>
      <dc:creator>mikand</dc:creator>
      <dc:date>2012-06-19T14:11:58Z</dc:date>
    </item>
    <item>
      <title>Re: Remote Management of PA-200 through SSL-VPN</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/remote-management-of-pa-200-through-ssl-vpn/m-p/12098#M8869</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I do have a management profile that is attached to the interface, that allows https, ssh, and still unable to reach the management address.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 19 Jun 2012 15:01:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/remote-management-of-pa-200-through-ssl-vpn/m-p/12098#M8869</guid>
      <dc:creator>mat.gangwer</dc:creator>
      <dc:date>2012-06-19T15:01:15Z</dc:date>
    </item>
    <item>
      <title>Re: Remote Management of PA-200 through SSL-VPN</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/remote-management-of-pa-200-through-ssl-vpn/m-p/12099#M8870</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Do you have a separate zone for the VPN?&amp;nbsp; If so is there a rule allowing traffic from the VPN zone to the management IP?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 19 Jun 2012 18:08:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/remote-management-of-pa-200-through-ssl-vpn/m-p/12099#M8870</guid>
      <dc:creator>shp555</dc:creator>
      <dc:date>2012-06-19T18:08:25Z</dc:date>
    </item>
    <item>
      <title>Re: Remote Management of PA-200 through SSL-VPN</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/remote-management-of-pa-200-through-ssl-vpn/m-p/12100#M8871</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You could also create a loopback address and create a route and a policy to that address for management.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 19 Jun 2012 18:10:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/remote-management-of-pa-200-through-ssl-vpn/m-p/12100#M8871</guid>
      <dc:creator>shp555</dc:creator>
      <dc:date>2012-06-19T18:10:01Z</dc:date>
    </item>
    <item>
      <title>Re: Remote Management of PA-200 through SSL-VPN</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/remote-management-of-pa-200-through-ssl-vpn/m-p/12101#M8872</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The management profile needed to be attached to not the zone that the VPN traffic came in through so in our case Eth1/1 (Internet) but the interface that the VPN put the users Eth2/2 (trusted).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the help.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 21 Jun 2012 21:09:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/remote-management-of-pa-200-through-ssl-vpn/m-p/12101#M8872</guid>
      <dc:creator>mat.gangwer</dc:creator>
      <dc:date>2012-06-21T21:09:47Z</dc:date>
    </item>
  </channel>
</rss>

