paloaltonetworks:configuration:vpn_monitoring
Differences
This shows you the differences between two versions of the page.
| Next revision | Previous revision | ||
| paloaltonetworks:configuration:vpn_monitoring [2020/05/22 10:30] – created bstafford | paloaltonetworks:configuration:vpn_monitoring [2022/11/23 12:49] (current) – external edit 127.0.0.1 | ||
|---|---|---|---|
| Line 1: | Line 1: | ||
| - | ======VPN | + | ======VPN |
| - | When doing VPN monitoring between | + | ===== PAN-OS to PAN-OS |
| + | When configuring | ||
| + | |||
| + | From Palo Alto Networks support: | ||
| + | |||
| + | //PAN IKEv1 does not support overlapping IKE SA. The phase1 SA will be deleted when its lifetime expires. The phase1 SA rekey will only be triggered when Phase2 SA lifetime expires. It is not a bug. While, IKEV2 support overlapping SA, phase1 SA will be rekeyed before its lifetime expires.// | ||
| + | |||
| + | |||
| + | ===== Monitoring ===== | ||
| + | If you have 169.254.11.1/ | ||
| + | - If you have enabled tunnel monitoring on your VPN to monitor 169.254.22.2/ | ||
| + | - If you have not enabled tunnel monitoring on your VPN, you will find that 169.254.11.1 **cannot** ping 169.254.22.2 | ||
| You can also set the IP address on each tunnel interface to be a /32 (or just type the IP and don't set a subnet). Subnets are not important for the VPN monitoring if you don't mind the associated security rules looking little odd from the Zone point of view. You can select a /16 and then use the third octet to represent the local firewall and the fourth octet to represent the remote firewall. | You can also set the IP address on each tunnel interface to be a /32 (or just type the IP and don't set a subnet). Subnets are not important for the VPN monitoring if you don't mind the associated security rules looking little odd from the Zone point of view. You can select a /16 and then use the third octet to represent the local firewall and the fourth octet to represent the remote firewall. | ||
| - | Unless you use a /30, the rule will need to be SZ_VPN to SZ_Outside as the routing will think that the other IP is out of the normal default gateway interface. | + | Unless you use a correct |
| E.g. 10.10.1.2 on one firewall and 10.10.2.1 on the second firewall. | E.g. 10.10.1.2 on one firewall and 10.10.2.1 on the second firewall. | ||
paloaltonetworks/configuration/vpn_monitoring.1590143422.txt.gz · Last modified: (external edit)
