
After opening up that port the data started flowing from both ends successfully. Doing some more investigation, it ended up that the ASA ISP router had the NAT-T port 4500/udp closed. NAT-T seemed to be failing between the two firewalls, and it looked like the remote ASA was not using port 4500/udp as it should have.

Looking at the above snippet there was a couple of interesting things. On the other side, when I tried to enable NAT-T on the Palo Alto, Phase 1 tunnel could not be established, and I got a similar snippet as the following from the debugs (the IP addresses have been replaced): Interestingly I could not see anything worth mentioning on the debugs or logs output. Digging deeper into this and asking some help on (which I highly recommend to anyone wants to put on the table any Palo Alto topic to be discussed and received prompted answers from expert people), I started enabling some debugs on the Palo Alto and ASA. However, when I tried to initiate the traffic from the ASA side, everything was working as expected. And on the ASA side I could not see anything landing into the IPsec tunnel or even hitting the ASA outside interface. When I tried to initiate the traffic from the Palo Alto side, I could see the encaps increasing on the IPSec tunnel, but zero decaps. However, there was no traffic passing through between the local and the remote encryptions domains. Basically, the VPN tunnel was configured with no NAT-T enabled where I could see both Phase 1 and 2 being successfully established between the two firewalls. Here is the scenario I came across with a site to site VPN tunnel between a Palo Alto and a Cisco ASA behind a NAT device. Without this redistribution profile routing protocol do not exchange any route information with other protocols running on the same router.This post covers a potential issue that might cause a Palo Alto VPN tunnel to be up but with no traffic flowing between the encryption domains. When the routing protocol is different between two peers, redistribution profile must be configured on firewall to participate in both static and dynamic routing process. In this scenario, one site uses static routes and the other site uses OSPF. Site-to-Site VPN with Static and Dynamic Routing Step 8: Verify OSPF adjacencies and routes from the CLI. Step 7: Create policies to apply on tunnel interface to allow traffic between the sites

Step 4: Set up the OSPF configuration on the router and attach the OSPF areas with the appropriate interfaces on the firewall. Step 3: Set up the Crypto profiles (IKE Crypto profile for phase 1 and IPSec Crypto profile for phase 2) on both ends.

Step 2: Create a tunnel interface and attach it to a virtual router and security zone. Step 1: Configure a Layer 3 interfaces on each side of both firewall. IPSec VPN Set Up: Palo Alto Networks Setting Up Site-to-Site VPN VPN tunnel is established by using the IPSec Crypto profile to allow the secure transfer of data between the two sites. If the security policy permits the connection, VPN Peer A uses the IKE Crypto profile parameters (IKE phase 1) to establish a secure connection and authenticate with VPN Peer B.

When a user that is secured by VPN Peer A needs data from a server located behind VPN peer B. When packet reaches far end, header is removed and only original IP packet is left.ĭiagram above depicts a VPN tunnel between two sites. Source IP address in new header is local VPN peer and destination IP address is far end peer. The IP packet (header and payload) is embedded into another IP payload, a new header is applied and then passed through the IPSec tunnel. IP Security (IPSec) set of protocols is used to set up a secure tunnel for the VPN traffic, and the information in the TCP/IP packet is secured by ESP encryption. Palo Alto sets up route based VPN tunnel to take routing decision to choose destination and all traffic handled by VPN tunnel. Palo Alto firewall can also communicate with third-party policy-based VPN devices. Route based VPN can be configuring to connect Palo Alto Networks firewallslocated at two sites or to connect a Palo Alto Networks firewall with a third-party security device at another location. A VPN connection that allows you to connect two Local Area Networks (LANs) securely is called a site-to-site VPN.
