User Tools

Site Tools


paloaltonetworks:configuration:vpn

This is an old revision of the document!


VPN on PAN-OS

Don't enable replay protection unless required as it impacts VPN throughput performance.

IKEv2 DH 14 or 19.

AWS-GCM-128 with SHA-256 for best throughput (if we ignore SHA-1). (See this page.)

AWS

When configuring VPN tunnels between two PAN firewalls in AWS, the tunnels need to use Local ID as they are both behind NAT. PAN to AWS VPN GW doesn't need this however.

Debug

debug ike gateway gatewayname on dump
tail follow yes mp.log ike.log
debug ike gateway gatewayname off

VPN Throughput

For VM firewalls, Bi-directional throughput for traffic across IPsec tunnel is limited to 600 Mbps. This limitation is due PAN-OS architecture where each IPsec tunnel session is processed by only one core and each core encapsulate a maximum of 300 Mbps of traffic and decapsulate another 300 Mbps of traffic combining to get a bidirectional throughput of 600 Mbps.

More details in this article.

show session info | match Throughput
paloaltonetworks/configuration/vpn.1643209865.txt.gz · Last modified: (external edit)