top of page

How to Configure IPSec VPN on Palo Alto Firewall

  • Jan 20
  • 2 min read



We need to configure below steps to configure S2S vpn into Paloalto

 

 

-->> Tunnel Zone

-->> Tunnel Interface

-->> IKE Crypto (phase 1)

-->> IPSec Crypto (phase 2)

-->> IKE Gateway

-->> IPSec Tunnel

-->> Routes

-->> Security Policy





Zone -- 

 

1- Inside- For internal traffic 

2- Outside - this connect to Internet 

3- VPN - this zone use for VPN tunnel 


 ---->> Configure Tunnel Interface <<--- 

1- Login into Webgui -->> Go into Network Tab-->> Tunnel Interface 

 

Interface Name: tunnel.12


Virtual Router: MY-VR


Security Zone: VPN


IPv4: 192.168.1./30


 



---->> IKE Crypto (phase 1) <<---

1- Go to Network >> Network Profile >> IKE Crypto and click Add

 

Name: Test-IKE-CRYPTO

DH Group: group5

Authentication: sha256

Encryption: aes-192-cbc

Timers (Key Lifetime): 50,000 seconds 



--->> IPSec Crypto (phase 2)<<-----

1- Go to Network >> Network Profile >> IPSec Crypto and click Add.

 

 

Name: Test-IPSEC-CRYPTO

Encryption: aes-256-cbc

Authentication: sha1

DH Group: group2

Lifetime: 10,000 seconds



----->>>  IKE Gateway<<<-----

  

1- Go to Network >> Network Profile >> IKE Gateway and click Add

 

Name: Test-IKE-GATEWAY

Version: IKEv1

Interface: ethernet1/1 (IPSec interface)

Local IP Address: 10.1.1.1/24

Peer IP Address Type: IP

Peer Address: 10.1.1.2

Authentication: Pre-Shared Key

Pre-shared Key: "Test@123"




Now click on Advanced Tab and select our IKE crypto profile.




 --->>>IPSec Tunnel---->>

1- Go to Network >> IPSec Tunnels and click Add-

 

Name: TEST-IPSEC

Tunnel Interface: tunnel.12

IKE Gateway: Test-IKE-GATEWAY

IPSec Crypto Profile: Test-IPSEC-CRYPTO


In this profile, we can call our both profile IKE and IPSEC on that and include the Tunel group which we created Tunnel .12





In Proxy id , we only allowed interested traffic on that like LAN IPs





--->>> Routes<<-----

Add routes to reach PA-A to PA-B and vise-versa. Below are the route from PA-A to PA-B, where the gateway is IPSec peer IP, which is 192.168.1.1


Router Name - Router

Destination IP- 10.10.10.0/24

Next Hop IP - 192.168.1.2(Gateway IPSec Peer ip)




--->> Security Policy<<---

-->>  We can use two policies for this Site to site VPN


1- IPSec 

2-  For LAN to LAN communication between peer

 

-->> IPSec

Source Zone: Outside

Destination Zone: Outside

Application: ike, ipsec-esp


-->> For LAN to LAN communication between peer 

Source Zone: LAN & VPN

Source IP: 172.16.0.0/24 & 10.10.10.0/24

Destination Zone: LAN & VPN

Destination IP: 172.16.0.0/24 & 10.10.10.0/24

Application: any 



-->> check Logs <<--

1 - Go into Monitor -->> logs -->> system 



--->>> Troubleshooting for Site to Site VPN <<----

# show vpn ike-sa



#show vpn ipsec-sa tunnel "tunnel name"

 #show vpn flow name "tunnel name"

show running tunnel flow



Please command if you still face any issue.

Comments


Tags

bottom of page