- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
10-30-2015 07:48 PM
I'm troubleshooting a configuration that consists of a Palo Alto 3020 with multiple virtual systems enabled.
Currently configured are:
Internet traffic to the main vsys works, as does regular site-to-site IPSec traffic, which terminates in the SG vsys, but happily routes using the default virtual router to any subnets reachable within the vrouter.
For GlobalProtect, because it needs to terminate on an interface/IP within the vsys, and can't be in the SG, I created a loopback interface in the untrust zone within the main vsys, and also a tunnel interface in the trust zone (for simplicity) within the main vsys.
I created a NAT rule in the SG vsys that destination NATs a second public IP address to the loopback IP within the vsys for UDP/500 and UDP/4500.
I also created a security rule within the vsys allowing the same services to the loopback IP.
The problem I'm having is that VPN clients authenticate and connect, however can't pass any traffic successfully.
I'm testing using a simple ping from the VPN client to a switch behind the firewall.
After having done extensive captures from both ends and troubleshooting, I have verified the following:
This shouldn't be a complicated setup, I have the exact same setup running on a firewall without multiple virtual systems enabled, and it works just fine, including being able to ping the same VPN client.
It just seems as though once the return traffic hits the tunnel interface, it either doesn't make it back to the loopback, or the loopback can't encapsulate and send back to the SG zone and out.
If anyone has any tips on troubleshooting this or something simple I might be overlooking, much appreciated.
10-30-2015 09:13 PM
Actually, looks like this may be related to 6.1.7 known issue 69458.
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!