10-23-2018 08:36 AM - edited 10-24-2018 02:46 PM
I am so close to a successful AWS IPSec tunnel to my on premise (test) PA200 7.1.15.
I've downloaded the configuration file and using it as a guide, IPs, etc.
But I've been using this article to configure. Main difference is I created a specific AWS zone like I do for all my IPSec Tunnels.
I am able to access my on premise environment from the AWS EC2 instance, but not from on premise to AWS EC2 172.31.24.69.
I can't ping it or connect to the EC2 via RDP. I see the ping tries in traffic log, but nothing shows up in packet trace for the RDP attempts. <UPDATE> Resolved after correcting IPs for PBF and RDP connection from LAN.
AWS has two VPN connections for redundancy. I have both configured and active.
NOTE: My Azure IPSec tunnel works great!
Configured tunnel interfaces according to AWS text document.
Configured tunnel monitor profile.
Configured PBF like referenced in documentation. <Corrected>
Configured Static routes for both VPN connections (different metric).
Created security rules in and out for AWS zone, open.
No additional NAT rules. Just basic outbound internet rule to Untrust. <corrected>
A ping from a VM inside my LAN ages out. Nothing shows up when I try to RDP, including a packet trace, not even a drop file.
11-19-2018 05:01 AM
If you are refering to both tunnels going to the same VPG on the same firewall, yes, leave them in the same zone. While they do not support ECMP, they also do not guarantee the same tunnel will be active always. Putting the tunnels in the same zone will overcome IP Spoofing issue that creates.
11-19-2018 05:13 AM
Thanks for the suggestion
we will try that option as well. Also AWS suggested the below
Entering configuration mode  # set deviceconfig setting tcp asymmetric-path bypass
# set deviceconfig setting session tcp-reject-non-syn no
We are quite hesitant to enable this gloabally, as this would also apply for non aws traffic. So enabled this via the zone protection profile - strickly for that zone.
11-19-2018 05:18 AM
I agree with your hesitation. In general, routing asymmetry is bad for security visilbility. I would not turn off reject no sync on your internet facing interfaces.
11-19-2018 05:39 AM
thanks Jmeurer. I will try re-try this by moving to the same zone. Do you know or come across any step by step guide to the setting up process between the tunnels between on-prem palo and aws VPC's.
11-19-2018 05:57 AM
I typically recommend to start with this guide.
Once you have your Transit Firewalls built, you can terminate the on-prem Firewalls on the Transit Firwalls with VPNs as if they are another spoke. From there you can control policy locally or with Panorama, creating rules based on zones or subnets.
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!