Тёмный

Tutorial: IPSec VPN Setup 

Palo Alto Networks LIVEcommunity
Подписаться 34 тыс.
Просмотров 75 тыс.
50% 1

The components and configuration of a basic IPSec (Site to Site) VPN tunnel between two Palo Alto Networks firewalls.

Опубликовано:

 

26 мар 2017

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 30   
@GSG834129
@GSG834129 4 года назад
Great tutorial, Very well outlined and explained! Love Palo Alto!
@aries5534
@aries5534 4 года назад
Nice video, but I feel you should have spent a minute or two explaining "security policy" piece in the VPN config. I feel it's one of the most important if not the most important part.
@mofistagomofarde3248
@mofistagomofarde3248 11 месяцев назад
Agreed - it was kind of strange to not include that in this tutorial
@jalanjalan7099
@jalanjalan7099 7 лет назад
thank you for the very insightful tutorial. i was hoping that you could include some testing to ensure that the tunnel does work.
@PaloAltoNetworksLiveCommunity
@PaloAltoNetworksLiveCommunity 7 лет назад
We'll certainly add this to the todo list, but please take a look at this article in the meanwhile: live.paloaltonetworks.com/t5/Management-Articles/How-to-Troubleshoot-IPSec-VPN-connectivity-issues/ta-p/59187
@alinaqvi385
@alinaqvi385 4 года назад
Very good, very well explained.
@PaloAltoNetworksLiveCommunity
@PaloAltoNetworksLiveCommunity 4 года назад
Glad you liked it! We encourage you to check out the LIVEcommunity page for more great info: live.paloaltonetworks.com
@RogueDire
@RogueDire 5 лет назад
Great tutorial, well explained. How do you monitor/troubleshoot VPN tunnels?
@edwardnygma1247
@edwardnygma1247 4 года назад
Nice explanation, cleared my doubts about how does the GUI look like. Would like to know which FW model was used.
@SpleensRule
@SpleensRule 6 лет назад
It was great until you got to the security policies phase where you didn't configure it live (or even scroll across the screen) so we could see how to do it.
@mal798
@mal798 10 месяцев назад
What is it with Palo Alto and glossing over key parts? The security settings are clearly going to affect the outcomes here.
@nitricdx
@nitricdx 4 года назад
awesome vid.
@PaloAltoNetworksLiveCommunity
@PaloAltoNetworksLiveCommunity 4 года назад
Glad you enjoyed it. Please check out the LIVEcommunity page for more great info: live.paloaltonetworks.com
@programmingjava3724
@programmingjava3724 5 лет назад
greate video,
@HughJass-jv2lt
@HughJass-jv2lt 2 года назад
*Bravo!!* :]
@sandeeproy5412
@sandeeproy5412 2 года назад
is there a video for site to site vpn with ikev2? and with the use of proxy id's
@srinivasann2493
@srinivasann2493 6 лет назад
Hi, Security policy for VPN traffic is configured as Source Zone from Trust-L3 to Untrust-L3. It should be from Untrust-L3 to Untrust-L3, right.. And configuring only VPN zones as source and destination should work right..
@PaloAltoNetworksLiveCommunity
@PaloAltoNetworksLiveCommunity 6 лет назад
Hi, yes and no: the VPN tunnel itself will function from Untrust-L3 to Untriust-L3, and if you created a catch-all drop rule you will need to create this policy also (by default this traffic is allowed). The security policies demonstrated in the video are to allow traffic inside the tunnel, which will from from Trust-L3 to VPN and from VPN to Trust-L3 (so the destination untrust needs to be trust)
@MultiFazel
@MultiFazel 3 года назад
did not see the static route towards tunnel interface for the remote local subnet
@rodionraskolnikov5675
@rodionraskolnikov5675 4 года назад
Hello, @8:57 the source is VPN-192.168.2.0, what's the destination address?? VPN- i couldnt see it
@MikeDeanOfficials
@MikeDeanOfficials 4 года назад
Started to rush at the end. Should have spoke about routes and the security rule. But thanks was good video
@muriloninja
@muriloninja 6 лет назад
I find it funny how nobody, not even the vendor explain the importance of Security Policies in L2L VPN's...wtf?
@_roddypiper_
@_roddypiper_ 7 лет назад
I have a deny all policy. What needs to be allowed for the IPSec site to site vpn? Just the IPSec Application? (ike and IPSec-esp-udp)? I believe this would also be Untrust-Untrust Zone.
@PaloAltoNetworksLiveCommunity
@PaloAltoNetworksLiveCommunity 7 лет назад
An allow policy for untrust to untrust (or the zone that, based on routing, is closest to the VPN peer) with the 'ipsec' application and services set to application-default should do the trick. Make sure to have logging enabled at least during troubleshooting on the deny-all policy so in case the peer is using some sort of tunnel-monitor-outside-of-the-tunnel (ping to the peer ip,...) you can add this application/protocol to the VPN policy on a need-to basis
@zqureshi1
@zqureshi1 6 лет назад
Rod Ormond
@PatientXero607
@PatientXero607 Год назад
I have to call this one a farce. I have two PA-440's and they will not talk to each other in this configuration.
@HughJass-jv2lt
@HughJass-jv2lt 2 года назад
6:35 So..... under What Circumstance is it recommended to give/assign your *tunnel interface* an *ip address?* You didnt do it in this example; nor did you specify a *next-hop* ip-address inside your Virtual-Router (VR). (at 8:30 mark) So is this just a 'trick' that works because the IPsec Tunnel was between *two Palo Altos?* thanks
@PaloAltoNetworksLiveCommunity
@PaloAltoNetworksLiveCommunity 2 года назад
To route traffic between the sites, a tunnel interface does not require an IP address. An IP address is only required if you want to enable tunnel monitoring or if you are using a dynamic routing protocol to route traffic across the tunnel. With dynamic routing, the tunnel IP address serves as the next hop IP address for routing traffic to the VPN tunnel: docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/vpns/set-up-site-to-site-vpn/set-up-an-ipsec-tunnel.html#id8d470269-98d5-4a45-9841-f855cda24b96
@HughJass-jv2lt
@HughJass-jv2lt 2 года назад
@@PaloAltoNetworksLiveCommunity Ha! Thanks... I could never figure out the reasoning :] ❤❤
@testuser7325
@testuser7325 4 года назад
testing decryption policy. dont mind me
Далее
Tutorial: Auto-tagging & DNS Sinkhole
19:56
Просмотров 15 тыс.
skibidi toilet zombie universe 34 ( New Virus)
03:35
Просмотров 2,6 млн
IP Sec VPN Fundamentals
14:55
Просмотров 149 тыс.
What is IPSec?
9:44
Просмотров 174 тыс.
SASE Prisma Access VPN with AWS
30:42
Просмотров 2,7 тыс.
VPNs Explained | Site-to-Site + Remote Access
9:08
Просмотров 814 тыс.
Tutorial: Configuring Your Security Policy
14:13
Просмотров 37 тыс.
Palo Alto Networks- DNS Sinkhole
11:42
Просмотров 31 тыс.