Basic IPSec VPN Configuration with PAN-OS

แชร์
ฝัง
  • เผยแพร่เมื่อ 30 ก.ย. 2024
  • In this video, we walk you through the steps to create an IPSec VPN that originates from one of our physical or virtualized next-generation firewalls that is terminating on any hardware, software or cloud-based IPSec VPN compatible device.
    Information needed:
    - Deciding which cyphers - you will need an IKE Crypto set of cyphers and an IPSec set of cyphers. There must be matching cyphers on the local and the remote.
    - Collecting IP information (Remote Peer IP & Local Peer IP) - The remote peer IP is the remote or far end IP address where the IKE session will terminate. Conversely the local peer IP is the IP address of where the IKE session will terminate on the local device.
    - Select a shared key - The shared key will be a string that both local and remote sites will use to validate the IKE session.
    Basic Steps:
    1) Check or create a usable IKE Crypto Profile
    2) Create an IKE Gateway
    3) Create a security Zone for the tunnel interface
    4) Create a Tunnel Interface
    5) Check or create a usable IPSec Crypto Profile
    6) Create an IPSec Tunnel
    After going through the steps, we will provide a demonstration on how to create an IPSec VPN.
    For more information about IPSec VPN configuration, please review the following resources:
    (Discussion with Solution) How to create IPSec VPN tunnel between two Palo Alto 200 firewalls?
    live.paloalton...
    HOW TO CONFIGURE IPSEC VPN (Knowledge Base)
    knowledgebase....
    IPSec VPN Tunnel Management (TechDocs
    docs.paloalton...

ความคิดเห็น • 25

  • @mal798
    @mal798 ปีที่แล้ว

    Reading what you see on the screen isn't helpful. Need context on what these settings are, particularly around interfaces. Your official documentation is equally bad.

  • @kavinpkt
    @kavinpkt 5 ปีที่แล้ว +9

    Hi PA,
    On which basis, you've given tunnel ip as 10.10.10.2 🤔

    • @PaloAltoNetworksLiveCommunity
      @PaloAltoNetworksLiveCommunity  5 ปีที่แล้ว

      It's just an example. This IP address will be used to route traffic to the tunnel and to monitor the status of the tunnel.

    • @pankajpandey5063
      @pankajpandey5063 5 ปีที่แล้ว +6

      @@itmachinist it's just an example. its wrong IP I think he should have mentioned there 10.0.2.0/24

  • @onjisan
    @onjisan 2 ปีที่แล้ว +1

    Palo made this way overcomplicated

  • @vikashramdin5430
    @vikashramdin5430 4 ปีที่แล้ว +4

    Where do you add the local and remote networks for phase 2?

  • @supersmart671
    @supersmart671 2 ปีที่แล้ว +1

    ciphers or cyphers? Spelling. 7:55 NAT transversal or NAT Traversal?

  • @allyg1383
    @allyg1383 11 หลายเดือนก่อน

    Ok, i have question. I want to make connection whit a app. Global protect from anywhere with my local domain network, this is not this tutorial??
    Can you help me, please?

  • @vince.navarrete
    @vince.navarrete 2 ปีที่แล้ว +1

    I feel like this is either outdated or not entirely accurate. A tunnel interface IP isn't a requirement to establish and route a tunnel. You would use an IP for dynamic routing or monitoring.

    • @fuzzzy17
      @fuzzzy17 2 ปีที่แล้ว

      Exactly. I’ve seen it being used only on AWS tunnels and not any other firewall.

  • @RuchitMShah
    @RuchitMShah 5 ปีที่แล้ว +1

    hello, Routing on 10.10.10.1 is required?

  • @foehammerone
    @foehammerone 2 ปีที่แล้ว

    Where did you get the tunnel interface IP from? Is it just randomly assigned so that the VR can have an interface where the unecrypted traffic is delivered?

  • @ashfaq82786
    @ashfaq82786 2 ปีที่แล้ว

    Where did that 10.10.10.x IP came from at 10:45 in video?

  • @alpeshmestry
    @alpeshmestry 4 ปีที่แล้ว

    Have you create security policy for tunnel

  • @maryamraheel6120
    @maryamraheel6120 2 ปีที่แล้ว

    why the MTU size 1427?

  • @terrybutts4714
    @terrybutts4714 3 ปีที่แล้ว

    What about the security policies? You skipped segments that were needed.

    • @PaloAltoNetworksLiveCommunity
      @PaloAltoNetworksLiveCommunity  3 ปีที่แล้ว

      Hi, thanks for pointing that out. For sake of time the security policies were already put in place. Also in this video they were already setup but you can see in this video what it looks like: th-cam.com/video/5xgYhXlnGUw/w-d-xo.html

  • @freddygonzalez4995
    @freddygonzalez4995 ปีที่แล้ว

    Are static routes needed pointing to the tunnel interface for the remote subnets

    • @gre1677
      @gre1677 ปีที่แล้ว

      Yes, that's required. also need to create 2 policy for IPSEC Traffic and Traffic from Local to remote.

  • @dhananjay3974
    @dhananjay3974 4 ปีที่แล้ว +1

    Nicely explain

  • @fenimama
    @fenimama 5 ปีที่แล้ว +2

    Damn this guy is genius. thanks a lot.

  • @peternorton7665
    @peternorton7665 5 ปีที่แล้ว +4

    all over the place ! not structured

    • @mrRDX001
      @mrRDX001 5 ปีที่แล้ว

      Why don't you make one with aaaaall STRUCTURED. Let us see how good that is and all the negative people like you commenting on that instead of appreciating.

  • @kcarmical
    @kcarmical 4 ปีที่แล้ว

    Great demo! Helps a lot!