<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Accessing web systems using main office's IP trough IPSec tunnel in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/accessing-web-systems-using-main-office-s-ip-trough-ipsec-tunnel/m-p/12442#M9100</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In PA side, i have interface, that is dedicated for VPN and policies that provides access to internal resources: VPN_POLICY - LAN_POLICY and rule for access to internet (if its correct): VPN_POLICY - WAN_INTERFACE.&lt;/P&gt;&lt;P&gt;As goes for NAT rules or any other configuration besides IPSec's on Mikrotik side, i will add some pictures. Route is default to provide that connection works.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;pics &lt;A href="http://imgur.com/a/l6K7n"&gt;-&amp;gt;here&amp;lt;-&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 06 Jun 2013 13:29:41 GMT</pubDate>
    <dc:creator>JanisM</dc:creator>
    <dc:date>2013-06-06T13:29:41Z</dc:date>
    <item>
      <title>Accessing web systems using main office's IP trough IPSec tunnel</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/accessing-web-systems-using-main-office-s-ip-trough-ipsec-tunnel/m-p/12440#M9098</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello.&lt;/P&gt;&lt;P&gt;We have a few IPsec S-2-S tunnels with different devices on other side and all works nice, but in one of them is required, that users on other side can use internet resources (to get this sides WAN IP address and access few web systems that with restricted usage by IP's) trough main office. &lt;/P&gt;&lt;P&gt;What would be the correct or at least theoretical configuration to get such thing work? I've done some sloppy testing with routes but usually connection and tunnel just drops dead or nothing happens. &lt;/P&gt;&lt;P&gt;One way, of course, is proxy (install local server on main side and just configure other sides browsers network configuration) and it's the easy way for me, but not for the users. They would have to turn proxy settings on or off, it they wanted to use their local internet resources for casual internet browsing. &lt;/P&gt;&lt;P&gt;Device on other side is a Microtik router.&lt;/P&gt;&lt;P&gt;Besides that, tunnel works nice. I can join domain and do stuff as usual.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Jun 2013 11:46:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/accessing-web-systems-using-main-office-s-ip-trough-ipsec-tunnel/m-p/12440#M9098</guid>
      <dc:creator>JanisM</dc:creator>
      <dc:date>2013-06-06T11:46:40Z</dc:date>
    </item>
    <item>
      <title>Re: Accessing web systems using main office's IP trough IPSec tunnel</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/accessing-web-systems-using-main-office-s-ip-trough-ipsec-tunnel/m-p/12441#M9099</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;IF you've got no palo on remote site, in my mind you have to modify:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; - Proxy ID (subnet) on both remote and central Palo&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; - Be sure that security rule on your central palo allow traffic from this remote site to internet (Zone + Subnet)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; - Be sure that your internet NAT rule match for remote subnet and remote VPN zone.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After that, should be ok&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;v.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Jun 2013 12:18:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/accessing-web-systems-using-main-office-s-ip-trough-ipsec-tunnel/m-p/12441#M9099</guid>
      <dc:creator>VinceM</dc:creator>
      <dc:date>2013-06-06T12:18:54Z</dc:date>
    </item>
    <item>
      <title>Re: Accessing web systems using main office's IP trough IPSec tunnel</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/accessing-web-systems-using-main-office-s-ip-trough-ipsec-tunnel/m-p/12442#M9100</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In PA side, i have interface, that is dedicated for VPN and policies that provides access to internal resources: VPN_POLICY - LAN_POLICY and rule for access to internet (if its correct): VPN_POLICY - WAN_INTERFACE.&lt;/P&gt;&lt;P&gt;As goes for NAT rules or any other configuration besides IPSec's on Mikrotik side, i will add some pictures. Route is default to provide that connection works.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;pics &lt;A href="http://imgur.com/a/l6K7n"&gt;-&amp;gt;here&amp;lt;-&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Jun 2013 13:29:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/accessing-web-systems-using-main-office-s-ip-trough-ipsec-tunnel/m-p/12442#M9100</guid>
      <dc:creator>JanisM</dc:creator>
      <dc:date>2013-06-06T13:29:41Z</dc:date>
    </item>
    <item>
      <title>Re: Accessing web systems using main office's IP trough IPSec tunnel</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/accessing-web-systems-using-main-office-s-ip-trough-ipsec-tunnel/m-p/12443#M9101</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In your print screen, on the paloalto, you configure just proxy-ID with just two subnets, maybe you have to configure on palo local subnet 0.0.0.0/0.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;V.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Jun 2013 13:42:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/accessing-web-systems-using-main-office-s-ip-trough-ipsec-tunnel/m-p/12443#M9101</guid>
      <dc:creator>VinceM</dc:creator>
      <dc:date>2013-06-06T13:42:32Z</dc:date>
    </item>
    <item>
      <title>Re: Accessing web systems using main office's IP trough IPSec tunnel</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/accessing-web-systems-using-main-office-s-ip-trough-ipsec-tunnel/m-p/12444#M9102</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I played a little with proxy ID's on both sides (changes sources, destinations and stuff), but with no real result. &lt;/P&gt;&lt;P&gt;What would be the correct way to configure such thing if i would have PA devices on both sides? Maybe according to such configuration, i could get to work that mikrotik router and see if i did something wrong in previous config tests.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 07 Jun 2013 11:46:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/accessing-web-systems-using-main-office-s-ip-trough-ipsec-tunnel/m-p/12444#M9102</guid>
      <dc:creator>JanisM</dc:creator>
      <dc:date>2013-06-07T11:46:15Z</dc:date>
    </item>
    <item>
      <title>Re: Accessing web systems using main office's IP trough IPSec tunnel</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/accessing-web-systems-using-main-office-s-ip-trough-ipsec-tunnel/m-p/12445#M9103</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If you have palo on both side, on remote, you just have to create a default route like &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; destination: 0.0.0.0/0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; interface: tunnelX&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;IMG alt="Capture.JPG" class="jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/6830_Capture.JPG" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 07 Jun 2013 13:22:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/accessing-web-systems-using-main-office-s-ip-trough-ipsec-tunnel/m-p/12445#M9103</guid>
      <dc:creator>VinceM</dc:creator>
      <dc:date>2013-06-07T13:22:33Z</dc:date>
    </item>
    <item>
      <title>Re: Accessing web systems using main office's IP trough IPSec tunnel</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/accessing-web-systems-using-main-office-s-ip-trough-ipsec-tunnel/m-p/12446#M9104</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm practicing necromancy by bring up this old post of mine. Then I settled with using proxy and all is acceptable, but for some trial time i got an CheckPoint SG80 device with OS version R75 with plans to get the same - get all traffic trough VPN so users behind CP device can use Web apps with PA external IP. Creating VPN is easy, bet when i active on CP "Route all traffic trough this site"&lt;/P&gt;&lt;P&gt;&lt;IMG alt="checkpoint_1.1.PNG.png" class="jive-image" height="99" src="https://live.paloaltonetworks.com/legacyfs/online/9595_checkpoint_1.1.PNG.png" style="width: 343px; height: 98.6934px;" width="343" /&gt;&lt;/P&gt;&lt;P&gt;and set proxy ID on PA like local: 192.168.0.0/24 and remote: 0.0.0.0/0 tunnel partially goes down. I can ping from PA to CP, but can't ping from CP to PA.&lt;/P&gt;&lt;P&gt;System log shows, where *.*.*.118 is CP external IP:&lt;/P&gt;&lt;P&gt;&lt;IMG alt="checkpoint_1.3.PNG.png" class="jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/9596_checkpoint_1.3.PNG.png" style="width: 620px; height: 109px;" /&gt;&lt;/P&gt;&lt;P&gt;Does this "error" shows that computer behind CP is sending dns requests to google dns server but PA does not know what to do whit that? What would be proxy ID if on the other side would be an PA device with config like&amp;nbsp; VinceM previously given?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 04 Nov 2013 09:51:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/accessing-web-systems-using-main-office-s-ip-trough-ipsec-tunnel/m-p/12446#M9104</guid>
      <dc:creator>JanisM</dc:creator>
      <dc:date>2013-11-04T09:51:28Z</dc:date>
    </item>
  </channel>
</rss>

