Several subnetworks through the tunnel between Palo Alto and Mikrotik

Showing results for 
Show  only  | Search instead for 
Did you mean: 

Several subnetworks through the tunnel between Palo Alto and Mikrotik

L1 Bithead

Site 2 site allows only two networks to be pulled inside the tunnel (one of them behind the mikrotik and the other one behind the palo alto).I’ve tried different settings and it doesn't help.
Has anyone had experience building a tunnel between them based on GRE tunnel over IPsec?
Several subnetworks need to be passed through the tunnel.


Cyber Elite
Cyber Elite

is GRE a requirement?


a regular IPSec tunnel will allow as many subnets as you need, adding GRE will create some limitations because of GRE

Tom Piens
PANgurus - Strata specialist; config reviews, policy optimization

I have configured s2s between mikrotik and palo alto.
Local networks go between them. I need to add other networks through this tunnel.
On the Palo Alto, I added another network on the tunnel to the proxy id.
In mikrotik, the accept rule from the LAN(Firewall - NAT) to the network behind the tunnel.
But there is no ping.
Only two networks can be specified in the IPSEC settings.
It does not work to create another policy, as the keys begin to break.
Also, there is no separate interface on Mikrotik (like with GRE).
When adding routes, I indicate the local interface.


Do either of the firewall logs show where the pings are failing? It could be a policy rule that is preventing the traffic?



In monitoring (traffic) PA there are no records from the network (from source and dest)
ssh PA utility: ping source host (no response)Документ123.jpg

Mikrotik terminal: ping source (no response)
ip - firewall -connection (no response)


Make sure the policies on the PAN are set to log at session end. On the PAN, are the routes to the 172 networksi n the virtual router and pointed at the Tunnel? Also in order for the PAN interface to respond to pings, it must have a management profile attached to it that allows PING.




In the rules, there is a permissive rule from this zone to the lan zone. Then, as a test, I added it to the LAN (LOCAL) zone where all traffic is allowed inside.
Yes, there is a route to the network through the tunnel.
Added MNG profile trust (ping allow) on the tunnel.

Previously, I set up a tunnel between a cisco router and a PA.
IPsec Site-to-Site VPN Palo Alto <-> Cisco Router w / VTI cc
They used a virtual tunnel interface (VTI) in a cisco router.
Drawing an analogy, I tried to collect between PAlo alto and Mikrotik.
As you know, on microtik you need to separately create a GRE interface, and then apply IPSEC.
I tried creating a loopback on it to hang the address on it.
Then I made the settings for IPSEC, and added a route.
Below I am attaching screenshots of both of the devices with settings.
I encountered an error in the IPSEC settings, it does not allow unchecking the Tunnel checkbox.
Instead, it issues an error message "Couldn't change IPSEC Policy - transport mode policy must match sa endpoints".
If you enter the IPSec settings:
Peer Address -
IPSec Policy- SA Dst. Address
It does not help.
In 'IPSec/Peer' set only remote peer, not local.
Tried changing policy settings - action , level, protocols. It does not help too.

Anybody have idea?
ike_crypto.pngike_GW.pngike_GW2.pngipsec_crypto.pngipsec_tunnel.pngtunnel_interface.pngtunnel_interface2.pngvirtual router.pngmikrotik1.jpgmikrotik11.pngmikrotik12.pngmikrotik13.png

  • 7 replies
  • 101 Subscriptions
Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!

The LIVEcommunity thanks you for your participation!