<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Access to Internal Web Site Through pfSense VPN in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/access-to-internal-web-site-through-pfsense-vpn/m-p/414926#M93200</link>
    <description>&lt;P&gt;Hmm not sure of your exact setup... &amp;nbsp;what is the servers default gateway, if its the palo then do you have static route to the 10.x network via the other appliance... &amp;nbsp;prob not much help but perhaps a sketch/doodle may help...&lt;/P&gt;</description>
    <pubDate>Thu, 24 Jun 2021 05:16:14 GMT</pubDate>
    <dc:creator>Mick_Ball</dc:creator>
    <dc:date>2021-06-24T05:16:14Z</dc:date>
    <item>
      <title>Access to Internal Web Site Through pfSense VPN</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/access-to-internal-web-site-through-pfsense-vpn/m-p/414918#M93198</link>
      <description>&lt;P&gt;Hey Community:&lt;/P&gt;&lt;P&gt;I am in the process of rolling out GlobalProtect, but until I do, i have to continue to use a pfSense OpenVPN that was already in place before the Palo was deployed.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The problem I am running into when i connect to the pfSense VPN i cannot browse to a web server that sits on server 192.168.130.221. I can ping the host just appears that no TCP communications is allowed. I have also checked my policies and nothing in my findings is blocking it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Setup:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;PA-220; 192.168.130.1 &amp;lt;---------------------------&amp;gt;192.168.130.249: pfSense VPN Appliance, VPN clients are assigned an IP address from pool 10.31.253.0/25 network.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I can ping from a 10.31.253.x to the web host 192.168.130.221but I cannot browse to the website it is hosting, keep getting a timeout error. I also ran a packet capture and I can see that my web browse attempt is making it to the web server but the return traffic is getting dropped and I see resets.This same thing is happening to another web site that sits behind 192.168.31.224. Can ping it just not access it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 24 Jun 2021 04:38:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/access-to-internal-web-site-through-pfsense-vpn/m-p/414918#M93198</guid>
      <dc:creator>JoeJackson</dc:creator>
      <dc:date>2021-06-24T04:38:48Z</dc:date>
    </item>
    <item>
      <title>Re: Access to Internal Web Site Through pfSense VPN</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/access-to-internal-web-site-through-pfsense-vpn/m-p/414926#M93200</link>
      <description>&lt;P&gt;Hmm not sure of your exact setup... &amp;nbsp;what is the servers default gateway, if its the palo then do you have static route to the 10.x network via the other appliance... &amp;nbsp;prob not much help but perhaps a sketch/doodle may help...&lt;/P&gt;</description>
      <pubDate>Thu, 24 Jun 2021 05:16:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/access-to-internal-web-site-through-pfsense-vpn/m-p/414926#M93200</guid>
      <dc:creator>Mick_Ball</dc:creator>
      <dc:date>2021-06-24T05:16:14Z</dc:date>
    </item>
    <item>
      <title>Re: Access to Internal Web Site Through pfSense VPN</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/access-to-internal-web-site-through-pfsense-vpn/m-p/414936#M93201</link>
      <description>&lt;P&gt;Thanks for your reply. The web server's gateway is the palo's IP of 192.168.130.1. Yes there is a route on the appliance to the 10.x.&lt;/P&gt;&lt;P&gt;To note, this all worked with the previous setup with a Meraki MX gateway which we replaced with the Palo. Again, i can ping all of these servers from the 10.x network so routing is working just fine, it has to be something at another level.&lt;/P&gt;</description>
      <pubDate>Thu, 24 Jun 2021 05:29:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/access-to-internal-web-site-through-pfsense-vpn/m-p/414936#M93201</guid>
      <dc:creator>JoeJackson</dc:creator>
      <dc:date>2021-06-24T05:29:01Z</dc:date>
    </item>
    <item>
      <title>Re: Access to Internal Web Site Through pfSense VPN</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/access-to-internal-web-site-through-pfsense-vpn/m-p/414943#M93202</link>
      <description>&lt;P&gt;Looks like asymmetric routing issue. &amp;nbsp; Pfsense will see server local and go direct, server will see traffic from 10 address which is not local so will send to def gateway palo... &amp;nbsp;palo prob drop cos never got a session start. &amp;nbsp;Icmp works different so nobody really cares about sessions... you could nat 10 traffic to a 192 address, then server will reply back to pfs interface...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;or add a static route on the server to&amp;nbsp;&lt;SPAN&gt;10.31.253.0/24 via GW&amp;nbsp;192.168.130.249.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;i would prefer the NAT option as you may have several servers and will need to remove when PFS appliance is removed.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 24 Jun 2021 07:55:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/access-to-internal-web-site-through-pfsense-vpn/m-p/414943#M93202</guid>
      <dc:creator>Mick_Ball</dc:creator>
      <dc:date>2021-06-24T07:55:36Z</dc:date>
    </item>
    <item>
      <title>Re: Access to Internal Web Site Through pfSense VPN</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/access-to-internal-web-site-through-pfsense-vpn/m-p/414994#M93205</link>
      <description>&lt;P&gt;Thanks for your help. Your comment put me on the right path even though I did not use the solution you provided. The issue was with asymmetric routing and i confirmed this by doing a packet cap on the Palo and could see return traffic getting dropped.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What I ended up doing was applying a Zone Protection Profile to the LAN Zone that permitted Asymmetric routing. Once we have moved completely over to GlobalProtect, i will remove the ZPP from the LAN zone. Again, thank you for your help.&lt;/P&gt;</description>
      <pubDate>Thu, 24 Jun 2021 12:27:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/access-to-internal-web-site-through-pfsense-vpn/m-p/414994#M93205</guid>
      <dc:creator>JoeJackson</dc:creator>
      <dc:date>2021-06-24T12:27:32Z</dc:date>
    </item>
  </channel>
</rss>

