- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
Enhanced Security Measures in Place: To ensure a safer experience, we’ve implemented additional, temporary security measures for all users.
12-27-2016 04:59 PM
Hello,
We are setting up Site-to-Site IPSec VPN between PA and Cisco router. The examples provided on PA websites do not suggest any security policy for this. When we use a security policy for 'Outside-Untrust' to 'Outside-Untrust' to allow traffic between IPsec tunnel end points, we can see traffic matching this policy.
Do we need an intrazone policy on 'Outside-Untrust' just for IPSec traffic?
12-27-2016 11:25 PM
First you have to allow IPSEC traffic (IKE, ESP...) between (public) IP addresses of both VPN peers.
Then you have to make rules which traffic to allow througfh VPN (between networks/hosts defined in proxy IDs). Security zones is usually between LAN/trust/internal and zone that you associated with the tunnel interface for that specific VPN.
12-27-2016 11:25 PM
First you have to allow IPSEC traffic (IKE, ESP...) between (public) IP addresses of both VPN peers.
Then you have to make rules which traffic to allow througfh VPN (between networks/hosts defined in proxy IDs). Security zones is usually between LAN/trust/internal and zone that you associated with the tunnel interface for that specific VPN.
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!