Basic IPSec VPN Configuration with PAN-OS

Поделиться
HTML-код
  • Опубликовано: 12 фев 2019
  • In this video, we walk you through the steps to create an IPSec VPN that originates from one of our physical or virtualized next-generation firewalls that is terminating on any hardware, software or cloud-based IPSec VPN compatible device.
    Information needed:
    - Deciding which cyphers - you will need an IKE Crypto set of cyphers and an IPSec set of cyphers. There must be matching cyphers on the local and the remote.
    - Collecting IP information (Remote Peer IP & Local Peer IP) - The remote peer IP is the remote or far end IP address where the IKE session will terminate. Conversely the local peer IP is the IP address of where the IKE session will terminate on the local device.
    - Select a shared key - The shared key will be a string that both local and remote sites will use to validate the IKE session.
    Basic Steps:
    1) Check or create a usable IKE Crypto Profile
    2) Create an IKE Gateway
    3) Create a security Zone for the tunnel interface
    4) Create a Tunnel Interface
    5) Check or create a usable IPSec Crypto Profile
    6) Create an IPSec Tunnel
    After going through the steps, we will provide a demonstration on how to create an IPSec VPN.
    For more information about IPSec VPN configuration, please review the following resources:
    (Discussion with Solution) How to create IPSec VPN tunnel between two Palo Alto 200 firewalls?
    live.paloaltonetworks.com/t5/...
    HOW TO CONFIGURE IPSEC VPN (Knowledge Base)
    knowledgebase.paloaltonetwork...
    IPSec VPN Tunnel Management (TechDocs
    docs.paloaltonetworks.com/pan...

Комментарии • 25

  • @kcarmical
    @kcarmical 4 года назад

    Great demo! Helps a lot!

  • @vikashramdin5430
    @vikashramdin5430 3 года назад +4

    Where do you add the local and remote networks for phase 2?

  • @fenimama
    @fenimama 5 лет назад +2

    Damn this guy is genius. thanks a lot.

  • @alpeshmestry
    @alpeshmestry 4 года назад

    Have you create security policy for tunnel

  • @foehammerone
    @foehammerone 2 года назад

    Where did you get the tunnel interface IP from? Is it just randomly assigned so that the VR can have an interface where the unecrypted traffic is delivered?

  • @dhananjay3974
    @dhananjay3974 4 года назад +1

    Nicely explain

  • @RuchitMShah
    @RuchitMShah 4 года назад +1

    hello, Routing on 10.10.10.1 is required?

  • @ashfaq82786
    @ashfaq82786 2 года назад

    Where did that 10.10.10.x IP came from at 10:45 in video?

  • @kavinpkt
    @kavinpkt 5 лет назад +9

    Hi PA,
    On which basis, you've given tunnel ip as 10.10.10.2 🤔

    • @PaloAltoNetworksLiveCommunity
      @PaloAltoNetworksLiveCommunity  5 лет назад

      It's just an example. This IP address will be used to route traffic to the tunnel and to monitor the status of the tunnel.

    • @pankajpandey5063
      @pankajpandey5063 5 лет назад +6

      @@itmachinist it's just an example. its wrong IP I think he should have mentioned there 10.0.2.0/24

  • @freddygonzalez4995
    @freddygonzalez4995 Год назад

    Are static routes needed pointing to the tunnel interface for the remote subnets

    • @gre1677
      @gre1677 Год назад

      Yes, that's required. also need to create 2 policy for IPSEC Traffic and Traffic from Local to remote.

  • @supersmart671
    @supersmart671 2 года назад +1

    ciphers or cyphers? Spelling. 7:55 NAT transversal or NAT Traversal?

  • @maryamraheel6120
    @maryamraheel6120 2 года назад

    why the MTU size 1427?

  • @allyg1383
    @allyg1383 9 месяцев назад

    Ok, i have question. I want to make connection whit a app. Global protect from anywhere with my local domain network, this is not this tutorial??
    Can you help me, please?

  • @vince.navarrete
    @vince.navarrete 2 года назад +1

    I feel like this is either outdated or not entirely accurate. A tunnel interface IP isn't a requirement to establish and route a tunnel. You would use an IP for dynamic routing or monitoring.

    • @fuzzzy17
      @fuzzzy17 2 года назад

      Exactly. I’ve seen it being used only on AWS tunnels and not any other firewall.

  • @terrybutts4714
    @terrybutts4714 3 года назад

    What about the security policies? You skipped segments that were needed.

    • @PaloAltoNetworksLiveCommunity
      @PaloAltoNetworksLiveCommunity  3 года назад

      Hi, thanks for pointing that out. For sake of time the security policies were already put in place. Also in this video they were already setup but you can see in this video what it looks like: ruclips.net/video/5xgYhXlnGUw/видео.html

  • @onjisan
    @onjisan Год назад +1

    Palo made this way overcomplicated

  • @mal798
    @mal798 11 месяцев назад

    Reading what you see on the screen isn't helpful. Need context on what these settings are, particularly around interfaces. Your official documentation is equally bad.

  • @peternorton7665
    @peternorton7665 5 лет назад +4

    all over the place ! not structured

    • @mrRDX001
      @mrRDX001 5 лет назад

      Why don't you make one with aaaaall STRUCTURED. Let us see how good that is and all the negative people like you commenting on that instead of appreciating.