due to a bug (ID:80950), that PANW is not able to fix, it is necessary to create seperate IPSec-ESP policies for both directions trough the PA-7050.
IPSec-ESP that comes in response to a opened session is being dropped if there is no separate policy for incomming ESP traffic.
-Client are allowed to open IPSec-Connections from "trust" to "untrust".
-You have to allow ESP also from "untrust" to "trust" for any adress a IPSec client might use
To avoid flooding, etc. from outside I am searching for solutions to avoid this.
Has any PA-7k admin found a valid approach?
Are you using hide-NAT to provide internet access?
Maybe using a Hide-NATfor the internal users you're allowing traffic to the untrust could workaround the issue, using NAT-transversal should encapsulate the traffic in UDP instead of ESP and almost every vendor support it.
You can find the NAT-transversal negotiation in the RFC
so if you simply hide NAT the outgoing traffic from trust to untrust going to UDP port 500 should do the trick.
If you can control the client configuration use IKEv2 when possible, it's more resilent to DOS attacks.
Be careful because allowing outgoing ESP traffic gives the end user tha ability to bypass your company policy rules.
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the Live Community as a whole!
The Live Community thanks you for your participation!