I have created site to site VPN between Palo alto in azure and checkpoint firewall.
Created VPN on untrust interface (Public IP is mapped on that interface ) . Even the Phase 1 is not up.
Can anyone help me with config on azure palo alto
What do your logs say? Have you run a debug on the ike yet? If you are trying the connection take a look at the mp-log ikemgr.log and look at the messages. Watching that will give you a good indication where the issue might be.
Are you able to ping the public IP peer on the remote side? I would also go over your ike/ipsec settings from the vendor and make sure you are matched up.
look at the system logs and filter with (subtype eq vpn) .If you seel messages saying failing due to negotiation timeout then take a packet capture on palo alto and checkpoint to check if you are sending/receiving isakmp packets
Run a test vpn ike-sa gateway <gateway> and have a look at mp-log ikemgr.log for more info
In our reference architecture and companion deployment guide, we do not typically recommend terminating the VPNs on the Virtual Appliance running in Azure. This is b/c you will need to use SNAT to enforce return path routing through the proper firewall to prevent asymmetric routing as we cannot extend BGP from the firewalls to the Azure Route Table. Instead, you may consider terminating the VPN on the Azure VPN Gateway and use our backhaul routing design to force all traffic to and from the Gateway subnet through the firewall utilizing UDRs and the Load Balancer.
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!