Palo Alto

Palo Alto Site-to-Site VPN

OMG one of the best last moment for me in 2018 was last October when me and the Crew attend GITEX the world of technology in Dubai (United Arab of Emirate)

1

IT’S THE BIGGEST & BOLDEST TECH SHOW IN MENA & SOUTH ASIA

attendees from 120+ countries and global media outlets in unpacking the big conversations and latest solutions around AI, blockchain, robotics, cloud and other mega trends, as GITEX takes you on a multi-sensory experience of Future Urbanism across 21 halls with 4,000 exhibitors across 24 sectors.

and here im going to tell you my new article

So Let me tell you, in my years in network i have never implemented a Site-to-Site VPN and i mean never ever in any product wither Cisco, Juniper or Palo Alto

so i spend reading the Last Couple of days reading and study about it and Thanks to My Mentor Mr.Keith barker from CBT Nugget https://www.cbtnuggets.com/trainers/keith-barker he Got His own way to Make the most Difficult thing Easier than you can imagine.

you can find his Palo Alto video in this Link https://www.cbtnuggets.com/it-training/palo-alto-networks-firewall

So Let’s Start, i have 2 Site

One with Palo Alto VM Machine and the Second Site i have Cisco Router 2811

I put Simple IKE Phase 1 and Phase 2

IKE 1

DH Group: group1

Encryption: aes128

Authentication: sha1

Lifetime: 5 Minute (300 seconds)

IKE 2

IPSEC Protocol: ESP

DH Group: group1

Encryption: aes128

Authentication: sha1

Lifetime: 5 Minute (300 seconds)

So First Create a VPN Zone Like i Show you in the First Blog

go to Network – Zones – Add new

999.png

Then create the tunnel interface

Go to Network – Interface – Select the Tunnel tab – Add new

I Choose number 1 and i have one virtual Router and Select the Zone (VPN)

1

Give the Tunnel an IP Address under the IPV4 tab (10.1.1.40)2

Now Lets Create the Phase 1

go to Network – Network profile – IKE Crypto – Add new

i Configure it as my scenario

DH Group: group1

Encryption: aes128

Authentication: sha1

Lifetime: 5 Minute (300 seconds)

3

After that i create the IKE Gateway

Go to Network – Network profile – IKE Gateways – Add new

Select the WAN interface and Choose static for my Peer since  i know the IP Address and Put the Pre-shared Key (ccieroot)

4

go to Advanced tab to Select th IKE Crypto profile and Choose the IKE Crypto for IKE1 i Created Earlier5

Now to IKE2 Configuration

Go to Network –  Network profile – IPSec Crypto – Add new

and Same like IKE1 we will follow out Scenario

IPSEC Protocol: ESP

DH Group: group1

Encryption: aes128

Authentication: sha1

Lifetime: 5 Minute (300 seconds)

6

After that i will Configure the IPSec Tunnel

Go to Network – IPSec tunnel – Add new

Select the Tunnel interface, IKE Gateway and IPSec Crypto profile7

Now i Create a Static Route to Site 2 LAN

Go to Network – Virtual Router – Select Our Router – Edit – Static Route Tab – Add new

type the Destination of Site2 LAN and Select your Tunnel 1 and Type Site2 Tunnel Interface IP Address as My Next hop

8

Last Part of Palo Alto is to Configure Security Policy Rule

Go to Policies – Security – Add new Choose a name and Rule type Universal also Interzone could work8a

Choose Source as the Tunnel Interface Zone which was (VPN) Zone8b

Select my Destination As (LAN) so Ping from Site2 to me Work Perfectly8c

and Choose Action as Allow

22

Again do the Same to My Palo Alto user in Site1 to Allow their Ping to Reach Site2

19

Source as LAN

20

Destination As VPN21

Now if you go to Network Tab – IPSec tunnel you will See the Status is (RED)9

So Lets Start now in Cisco Side To Turn that light Off

First i Configure my Public Interface which Happen to be My FastEthernet  0/0 and My Loopback which my Internal Network

10

Next i Configure my IKE Phase 1 which Same Configuration to IKE1 in Palo Alto

Dont get scare if  you show Run and you Don’t See group1 in the Configuration ;D

11

and Configure the Key Password and my Peer Address12

After that i Configure my IKE Phase 213

and Configure my IPSec Profile14

Then i Configure my Tunnel Interface15

and Last but not Least i Configure my Route to Site 1 LAN16

and now when i get back to my Palo Alto i see the Status turn Green17

Also you can check the status on the Router

900

Now i ping from my Router to Palo Alto LAN Interface and it’s Work Perfectly

18

i Also Login by my PC and i Ping the loopback and ti work perfectly23

;D

Standard