- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
04-15-2011 07:56 AM
I think it's my phase II re-key traffic being dropped. I tried to set up a rule source untrust with a specific IP, dest untrust with my Firewall's IP, application IPSEC, service application default, Action Allow.
It never gets hit and my udp/500 traffic gets dropped by my clean-up rule.
I am brand new to Palo Alto and probably don't fully understand apps and services yet. If I turn off the drop rule, everything is fine but that seems to defeat the purpose of the firewall no?
Thanks
04-15-2011 09:58 AM
add IKE to your applications on the VPN rule.
the any/any cleanup rule is blocking intrazone traffic.
-Benjamin
04-15-2011 09:58 AM
add IKE to your applications on the VPN rule.
the any/any cleanup rule is blocking intrazone traffic.
-Benjamin
04-15-2011 12:01 PM
I've a much deeper understanding about the implicit drop rule. I was stiil in CP frame of mind. Folks wanted to see the dropped traffic, hence the rule with screwed up all my intrzone traffic and pushed my down the path of IKE policy things. I've taken out the drop rule (clean-up Rule), explained the situation to my co-workers and developed a pair of rules that will give drop info if needed later on. My PA5020 HA cluster thanks you, I thank you.
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!