Vpn Tunnel Palo Alto
In accordance with best practices i created a new security zone specifically for azure and assigned that tunnel interface.
Vpn tunnel palo alto. Tunnel monitoring for vpn between palo alto networks firewalls and cisco asa failover using tunnel monitoring. For a quick documentation on how to build a site to site ipsec vpn tunnel between a palo alto networks firewall and a juniper screenos device i am listing the configuration screenshots here. In this lesson we will learn how to configure ipsec vpn on palo alto firewall.
Ipsec configuration in palo alto networks firewall is easy and simple. Step 1 go to network interface tunnel tab click add to create a new tunnel interface and assign the following parameters. The palo alto networks supports only tunnel mode for ipsec vpn.
The tunnel must not be configured with proxy ids or the like. The first thing you ll need to do is create a tunnel interface network interfaces tunnel new. Palo alto site to site vpn configuration step by step 1.
If the vpn tunnel goes down or if there are traffic issues over the vpn the tunnel monitoring will detect it and will bring the tunnel interface down. You need to define a separate virtual tunnel interface for ipsec tunnel. Tunnel monitoring feature is used to make sure the vpn tunnel is passing traffic.
Check the remote reachability. To define the tunnel interface go to network interfaces tunnel select the virtual router the default in my case. Although you do not need to provide ipv4 or ipv6 ip.
Ipsec configuration will be done in several steps. Tunnel monitor on the palo to ping the tunnel interface of the asa constantly this keeps the tunnel up and running. Since there is the intrazone default allow policy on the palo you don t need an explicit policy for allowing the vpn connection from untrust to untrust.