Тёмный

IPsec site to site tunnel: Palo Alto to Cisco 

Keith Barker - The OG of IT
Подписаться 186 тыс.
Просмотров 79 тыс.
50% 1

Опубликовано:

 

28 окт 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 46   
@KeithBarker
@KeithBarker 12 лет назад
I set up the tunnel in my home lab, not over the live internet, which is why public IPs weren't used for the peers. The loopback was just created as a placeholder for an internal network on one side of the VPN for testing. Thanks for the post, Keith Barker
@nicoleanne967
@nicoleanne967 10 месяцев назад
Hi Keith, could you show me how I can set up IPsec Tunnel between two palo altos using Dynamic IP? I chose dynamic but i cant find any KEYID for my palos
@tatooo1900
@tatooo1900 11 лет назад
Keith, you continue to make my life/job easier with your knowledge and book. Never stop what you are doing cuz you are doing it just perfect.
@KeithBarker
@KeithBarker 11 лет назад
Thanks for the kind feedback! Keith
@KeithBarker
@KeithBarker 11 лет назад
Hello Anton- Let me look into how/if that could be configured. I will add that to my list. Thanks, Keith
@jschar1able
@jschar1able 7 лет назад
This is a good tutorial and I'll be setting up a site-to-site this week between a PA-3020 and ASA5510. The only part that you don't go over, which i'll have to figure out is the tunnel monitoring for 2 ISP's on each end; since i'll be setting up 4 tunnels for redundancy. In my experiance with PA, you can use whatever addresses to monitor. But with PA to Sonicwalls, you need an isolated network for the monitor so I use a random /30. I wonder how the ASA is going to treat this.
@ahmedz121
@ahmedz121 8 лет назад
awesome video - thanks Keith
@KeithBarker
@KeithBarker 11 лет назад
The commands are slightly different on the ASA, but other than that, yes.
@aseemsha
@aseemsha 5 лет назад
Hi Keith, What about the proxy-id if on the cisco device the default route is to tunnel interface. I mean all traffic from the cisco router should go through the tunnel, even the Internet. Should I put 0.0.0.0/0 as local proxy id in PA firewall
@silviavirginiarojassolis1404
@silviavirginiarojassolis1404 5 лет назад
Consulta, si quiero configurar IKEv2 con doble llave (local/remota) porque mi peer es un asa de Cisco, donde se configura la llave en el palo alto?
@buddyrana
@buddyrana 6 лет назад
Awesome video.....Very informative. Do you have any tutorial video of Site -to Site VPN between Palo Alto and Juniper SRX ?
@dddman888
@dddman888 8 лет назад
Good job Keith!!!
11 лет назад
Very nice Video Keith! Is it possible that you could make a video where you configuring an ASA5505 for example to be used as an EasyVPN Client that is connecting to a Palo Alto? We have a lot of them at my work and I had an idea to configuring them to use our two Palo Altos instead of connecting to our two ASA5520 for better speed. Our client-ASAs has random global IP-adresses so we can't use static IPs like you do in this Site-to-Site configuration. A video like that would rule the world!
@praveenkumar9004
@praveenkumar9004 12 лет назад
Hi keith, I want to know that in paloalto part, you have used proxy id only to creat the intresting traffic that we want to encrypt like in cisco we use ACL ? Also when do we use pfs because i haven't any video on that? Thanks.
@lucasborges1591
@lucasborges1591 5 лет назад
Hi Keith. When you configured by SDM, its create a interface tunnel or used split tunnel?
@rodionraskolnikov5675
@rodionraskolnikov5675 5 лет назад
Keith how about the Security Policy that needs to be configured for the tunnel to work? i dont see it here.
@babson184
@babson184 3 года назад
Hi Keith, I am tying to build an IPSec vpn between our Palo Alto PA5050 with our vendor with Cisco ISR 4300. The IPSec vpn configuration on the Cisco side is using tunnel protection IPSec profile and both configuration seems legit and acl are matching on both side. But for some reason, the palo alto system logs is showing proxy ID not matching and receive local id 0.0.0.0/0 and received remote Id 0.0.0.0/0. So phase 2 will come up but after some few seconds, it goes down. Not sure where is the issue. Can you assist?
@lifeofneiltube
@lifeofneiltube 12 лет назад
Hi Keith would be good if you included the part about creating the 5.5.5.5 interface If seems odd that you never specify public IPs. If your making a tunnel over the internet why are the public IPs at each site used?
@tatooo1900
@tatooo1900 11 лет назад
With that said, I'm a bit stressed out. My employer is sending me today to build a site to site VPN tunnel (using PAN firewall) for a customer and I'm hoping that it will go as smooth as you made it look here.
@Crion629
@Crion629 7 лет назад
Does this apply regardless of whether the Palo Alto is the HQ or branch office?
@clogen
@clogen 3 года назад
Is it possible if you can share the initial config for the ASA? Thanks in advance
@joelolivo819
@joelolivo819 10 лет назад
Can you setup a site to site IPSEC tunnel using a Palo Alto PA-500 and a Juniper SSG5?
@eduardomilski
@eduardomilski 8 лет назад
Keith, do you touch the virtual router to specify some static route to the Cisco?? or the network is reachable by default?
@asahelsanchez3928
@asahelsanchez3928 9 лет назад
Hey Keith, perhaps i missed that part, but where did you specify the preshared key on the PAN OS
@KeithBarker
@KeithBarker 9 лет назад
Asahel Sanchez At 3minutes, 50 seconds in it show the IKE Gateway config, it is there that the PSK is configured. Thanks, Keith
@MrVetrivijay
@MrVetrivijay 6 лет назад
nice KB Video....Thanks....
@cmaartin39
@cmaartin39 12 лет назад
Great video , keep Loding stuff Thanks a lot
@MrVetrivijay
@MrVetrivijay 6 лет назад
Hi Keith, nice KB Video...thanks. ..
@35075579
@35075579 10 лет назад
Hi Keith, mine is stuck at this state and i have verified the key to be same on both ends. what could possibly cause this.
@spv7511
@spv7511 5 лет назад
Good one ..thanks..
@KeithBarker
@KeithBarker 5 лет назад
Thank you!
@webnovice2012
@webnovice2012 8 лет назад
If I need to add more than one network to the tunnel, would that proxy ID be the place where I'd do it?
@muriloninja
@muriloninja 7 лет назад
Yes, if it is another network that you need to traverse the L2L then it needs to be added on both the PAN (Proxy ID) and ASA (ACL) - ASA is a Route Based VPN whereas PAN is a Policy Based VPN hence why the need for Proxy ID's when terminating an L2L from a PAN to an ASA. For teaching purposes you should have added each step along with Security Policy creation, creation of a new zone for L2L or leverage the existing Trust zone (Pros and Cons) etc. All in all a good entry to PAN L2L's
@adityaprasaddash5204
@adityaprasaddash5204 5 лет назад
Any one pls suggest still I am waiting. Still facing the same issues in between cisco and PA
@tormodhope2044
@tormodhope2044 9 лет назад
What if the Cisco device is behind a NAT?
@shakilkhan-dx1jx
@shakilkhan-dx1jx 11 лет назад
hi keith is it the same with an ASA site to site with palo alto??
@adityaprasaddash5204
@adityaprasaddash5204 5 лет назад
Its partially up in PA box. Its stuck in MM_NO_STATE in cisco. any additional configuration required? Pls help anyone ...
@adityaprasaddash5204
@adityaprasaddash5204 5 лет назад
%CRYPTO-4-IKMP_NO_SA: IKE message from 192.168.x.x has no SA and is not an initialization offer
@RakeshSharma-bx5pj
@RakeshSharma-bx5pj 7 лет назад
Nice Lecture. Do u have any video of how to install vm image of palo alto. any good video. there are lot bad videos in youtube. i want easy and good video. Thanks in advance. !!!
@adityaprasaddash5204
@adityaprasaddash5204 5 лет назад
I am not able to ping from cisco to palo alto . Anyone did it ? pls help me here
@emilislamzadeh
@emilislamzadeh 5 лет назад
enable ICMP on paloalto interface
@adityaprasaddash5204
@adityaprasaddash5204 5 лет назад
@@emilislamzadeh already enabled
Далее
Palo Alto Lesson: 10.10 Lab Site-to-Site VPN
21:15
Просмотров 20 тыс.
无意间发现了老公的小金库 #一键入戏
00:20
What is IPSec?
9:44
Просмотров 176 тыс.
Cisco DMVPNs
22:58
Просмотров 100 тыс.
How To Configure IPSEC SITE TO SITE VPN using IKEV2
46:04