IPsec Site to Site VPN between Palo Alto On-premises and AWS over BGP

Поделиться
HTML-код
  • Опубликовано: 6 сен 2024
  • Configure IPsec VPN over BGP between Palo Alto and AWS.
    Testing with Palo Alto on eve-ng and ubuntu server instance in AWS

Комментарии • 20

  • @reginrnair9176
    @reginrnair9176 11 месяцев назад +1

    great work, well explained . Thank you

    • @techfrapi
      @techfrapi  10 месяцев назад

      Glad you liked it

  • @AlanMartinez-do9jh
    @AlanMartinez-do9jh 3 месяца назад

    Can you do any example between Azure & Palo Alto, with 2 VPN's IPSec Active/Active with Gateway BGP? Please

  • @ihsanfavy9265
    @ihsanfavy9265 4 месяца назад

    why we need additional rule like ike and ipsec, because while we configure the normal site2site , those rule doesn't need it

    • @techfrapi
      @techfrapi  4 месяца назад

      Which additional rules exactly

  • @stevengutierrez605
    @stevengutierrez605 9 месяцев назад

    This was great men thank you

    • @techfrapi
      @techfrapi  9 месяцев назад

      You're very welcome

  • @Bormanb23
    @Bormanb23 11 месяцев назад

    Awesome video

    • @techfrapi
      @techfrapi  11 месяцев назад

      Glad you enjoyed it

  • @fabriciotorres
    @fabriciotorres 9 месяцев назад

    Thank you so much!

    • @techfrapi
      @techfrapi  8 месяцев назад

      You're welcome!

  • @jerseyjeeper1575
    @jerseyjeeper1575 Год назад

    Excellent thanks!

  • @Bormanb23
    @Bormanb23 11 месяцев назад

    Would you know how to give one tunnel priority over the other? (active/standby) in Palo? I see you configured the tunnel monitor

    • @techfrapi
      @techfrapi  11 месяцев назад

      AWS does asymmetric routing and is the recommended way of doing it, but you should be able to achieve it over the BGP to preferer one tunnel over the other

  • @rouellmamaril2436
    @rouellmamaril2436 Год назад

    how did you connect that aws-lan to eve-ng?

    • @techfrapi
      @techfrapi  Год назад +1

      It's not directly connected to EVE-ng, I did it this way to represent my topology.
      If you want to use it with eve-ng you need to do port forwarding on you router on port 500 and 4500 coming from the aws IPs

    • @vishnuk9523
      @vishnuk9523 2 месяца назад

      @@techfrapi I'm using same setup to build ipsec tunnel to aws from fortigate firewall using eve-ng lab but tunnel not coming up. I'm using private ip as wan1 in fortigate to form ipsec with aws. How to achive can you help me ?

  • @atiyousefiattaei4103
    @atiyousefiattaei4103 Год назад

    Thank you very much!