06-07-2019 01:34 AM
Hey everyone,
I have the following active-passive-HA-scenario:
ethernet1/1: External Interface (vpn termination point)
ethernet1/2: Internal Interface
MGMT: Management-Interface
HA1: HA
HA2: HA
For administrative and monitoring purposes I need access from an external network to the WEB-GUI of both firewall-systems. Because of active-passive-HA, just one firewall is available at the same time. So I thought: Is it possible to establish a IPSec-Tunnel between two firewall to get access to the WEB-GUI:
The ipsec tunnel works fine and I can see hits on the security policy which should allow the traffic from external network to the Management-Interface of the palo alto firewall. But the access via https does not work. 😞
My questions:
- Is it possible to get access from external network via ipsec-tunnel to the Management-Interface of a Palo Alto Firewall?
- Are there other ways to get access from external network via ipsec-tunnel to the WEB-GUI of both firewall-systems?
Thanks in advance
09-21-2020 06:14 AM
Create a Management Profile that permits HTTPS, SSH, Ping, etc.
Choose Network > Loopback > Create a Loopback interface with an IP address on the inside of the firewall > Assign the management profile you created and your Virtual Router
Go to Device > Setup > Services > Service Route Configuration > Choose what services you need to traverse the VPN tunnel through your new loopback interface
That should be it, hopefully it helps!
10-20-2020 05:16 PM
Thanks a lot for the explanation
10-21-2020 03:19 AM
No problem, did that work for you?
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!