Can someone tell me how to know/what would be the Source IP address for an SSL Tunnel Proxied from the PAN NGFW while running in Virtual Wire Mode ?
My topology is very simple:
User (Virtual Wire) ----> PAN ----> Internet
Does the Firewall initiate the Proxied SSL Tunnel using the management interface IP address with the Untrust Zone ?
The firewall will use the IP address that you have configured in your NAT policy. If you don't have a NAT policy the source IP will be the actual source IP of the client, but this configuration won't work unless you have public IPs in your client network.
An example for NAT with VWire you can find here:
on top of how NAT works in a vwire, it is important to note (since you don't mention ssl decryption) your ssl tunnel will not be proxied unless you have ssl decryption enabled, in which case the soure IP will remain the client/NAT ip, the firewall will 'spoof' the appropriate mac and IP while performing decryption.
If ssl is not being decrypted the packets will be passed along and NAT will be applied in-stream (if at all configured)
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the Live Community as a whole!
The Live Community thanks you for your participation!