- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
01-30-2021 05:40 PM
I have two PA800 NGFW running in Active-Standby HA mode and they are connected to a Perimeter Switch. Need an insight about a V-P-N Configuration on my PA that is about to connect to remote office. I am new to this and I brought this here because there is a little bit more/less about this configuration for me. My office and the remote office are connected via a dedicated line purchased from a Service provider and it is 10M fiber link. The objective is to extend my Enterprise Network boundary to the remote office so the User in the remote office will be able to use the Cisco collaboration CUCM solution that is implemented in my Enterprise boundary, just simply to put an IP phone in the remote office and that IPT phone could be able to make use of the extension numbers and make calls as if they are inside my Enterprise boundary. The gateway device at the remote end is a Huawei Eudemon 1000E Firewall. So my Service provider had finished setting up the V-P-N link and provided me with two IP subnets, one for each end. So I wanted to seek opinion from this community before I get in to the implementation work incase if I missed anything. Plus, few things are getting me wondering If I made this successfully.
Will the IPT phone on the remote be able to use the DHCP service that is currently working in my boundary to acquire a dynamic IP address via the IPSec tunnel? If not, then what option do I have?
If the SP is providing me with a VPN Leased Line then will I be needing to go further into configuring additional Auth-Encr parameters to get this as an IPSec.
I have started testing the configuration with one sub interface under my L3 aggregate and I have put it in a new zone. Is this a wise move to start it?
Following up on #3, How will my VR look because I currently am using a Single VR for all my routes including Internet connectivity?
If anyone out here has done it before, would you suggest anything to look out for?
Look forward to you responses with Thanks and regards.
02-01-2021 12:51 AM - edited 02-01-2021 12:55 AM
Hi @iscofate ,
- Yes, if there is reachability with the server over the tunnel, this will work.
-Yes, you need to create site-2-site tunnel configuration on both ends. Both end’s public IPs will act as peer for each other. Below article may help you for the configuration steps on Palo Alto side. https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClGkCAK
- Where is the internet/lease line is terminated? If it is on dedicated interface then don’t need to add sub-interface. Just configure the interface with proper IP address. If you're going to re-use this interface in future for any other connectivity or you want to use existing interface for this connectivity, you can go for sub-interface.
- In the same VR, you need to add route for the remote office network which is going to communicate via tunnel and pointe that route to the desired tunnel interface. Refer given article.
Yes, we have one site communicating over tunnel. While configuring tunnel, you need to take care of encryption domain, tunnel parameters, required security policies and routing.
Hope it helps!
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!