Accessing web systems using main office's IP trough IPSec tunnel

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
Announcements

Accessing web systems using main office's IP trough IPSec tunnel

L2 Linker

Hello.

We have a few IPsec S-2-S tunnels with different devices on other side and all works nice, but in one of them is required, that users on other side can use internet resources (to get this sides WAN IP address and access few web systems that with restricted usage by IP's) trough main office.

What would be the correct or at least theoretical configuration to get such thing work? I've done some sloppy testing with routes but usually connection and tunnel just drops dead or nothing happens.

One way, of course, is proxy (install local server on main side and just configure other sides browsers network configuration) and it's the easy way for me, but not for the users. They would have to turn proxy settings on or off, it they wanted to use their local internet resources for casual internet browsing.

Device on other side is a Microtik router.

Besides that, tunnel works nice. I can join domain and do stuff as usual.

6 REPLIES 6

L5 Sessionator

Hi,

IF you've got no palo on remote site, in my mind you have to modify:

     - Proxy ID (subnet) on both remote and central Palo

     - Be sure that security rule on your central palo allow traffic from this remote site to internet (Zone + Subnet)

     - Be sure that your internet NAT rule match for remote subnet and remote VPN zone.

After that, should be ok

v.

In PA side, i have interface, that is dedicated for VPN and policies that provides access to internal resources: VPN_POLICY - LAN_POLICY and rule for access to internet (if its correct): VPN_POLICY - WAN_INTERFACE.

As goes for NAT rules or any other configuration besides IPSec's on Mikrotik side, i will add some pictures. Route is default to provide that connection works.

pics ->here<-

Hi,

In your print screen, on the paloalto, you configure just proxy-ID with just two subnets, maybe you have to configure on palo local subnet 0.0.0.0/0.

Let me know

V.

I played a little with proxy ID's on both sides (changes sources, destinations and stuff), but with no real result.

What would be the correct way to configure such thing if i would have PA devices on both sides? Maybe according to such configuration, i could get to work that mikrotik router and see if i did something wrong in previous config tests.

If you have palo on both side, on remote, you just have to create a default route like

     destination: 0.0.0.0/0

     interface: tunnelX

     Capture.JPG

L2 Linker

I'm practicing necromancy by bring up this old post of mine. Then I settled with using proxy and all is acceptable, but for some trial time i got an CheckPoint SG80 device with OS version R75 with plans to get the same - get all traffic trough VPN so users behind CP device can use Web apps with PA external IP. Creating VPN is easy, bet when i active on CP "Route all traffic trough this site"

checkpoint_1.1.PNG.png

and set proxy ID on PA like local: 192.168.0.0/24 and remote: 0.0.0.0/0 tunnel partially goes down. I can ping from PA to CP, but can't ping from CP to PA.

System log shows, where *.*.*.118 is CP external IP:

checkpoint_1.3.PNG.png

Does this "error" shows that computer behind CP is sending dns requests to google dns server but PA does not know what to do whit that? What would be proxy ID if on the other side would be an PA device with config like  VinceM previously given?

  • 3565 Views
  • 6 replies
  • 0 Likes
Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!

The LIVEcommunity thanks you for your participation!