index int64 0 4.08k | text stringlengths 34 4.9k ⌀ | url stringclasses 38
values |
|---|---|---|
991 | VPNs
Site-to-Site VPN Concepts
A VPN connection provides secure access to information between two or more sites. In order
to provide secure access to resources and reliable connectivity, a VPN connection needs the
following components:
• IKE Gateway
• Tunnel Interface
• Tunnel Monitoring
• Internet Key Exchange (IKE) f... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
992 | VPNs
protocol to route traffic across the tunnel. With dynamic routing, the tunnel IP address serves as
the next hop IP address for routing traffic to the VPN tunnel.
If you are configuring the Palo Alto Networks firewall with a VPN peer that performs policybased VPN, you must configure a local and remote Proxy ID whe... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
993 | VPNs
IKE Phase 1
In this phase, the firewalls use the parameters defined in the IKE Gateway configuration and the
IKE Crypto profile to authenticate each other and set up a secure control channel. IKE Phase
supports the use of preshared keys or digital certificates (which use public key infrastructure,
PKI) for mutual ... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
994 | VPNs
Group Number Number of Bits
Group 16 4096-bit modular exponential group
Group 19 256-bit elliptic curve group
Group 20 384-bit elliptic curve group
Group 21 512-bit random elliptic curve group
• Authentication algorithms—sha1, sha 256, sha 384, sha 512, or md5
• Encryption algorithms—aes-256-gcm, aes-128-gcm, 3des... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
995 | VPNs
ESP AH
• no-pfs—By default, perfect forward secrecy (PFS) is enabled, which means a new DH key is
generated in IKE phase 2 using one of the groups listed above. This key is independent of
the keys exchanged in IKE phase1 and provides better data transfer security. If you select
no-pfs, the DH key created at phase ... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
996 | VPNs
• Manual Key—Manual key is typically used if the Palo Alto Networks firewall is establishing a
VPN tunnel with a legacy device, or if you want to reduce the overhead of generating session
keys. If using manual keys, the same key must be configured on both peers.
Manual keys are not recommended for establishing a V... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
997 | VPNs
• Change the Cookie Activation Threshold for IKEv2
• Configure IKEv2 Traffic Selectors
Liveness Check
The liveness check for IKEv2 is similar to Dead Peer Detection (DPD), which IKEv1 uses as the
way to determine whether a peer is still available.
In IKEv2, the liveness check is achieved by any IKEv2 packet transm... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
998 | VPNs
example, you can assign different tunnels to each department to isolate their traffic. Separation of
traffic also allows features such as QoS to be implemented.
The IPv4 and IPv6 traffic selectors are:
• Source IP address—A network prefix, address range, specific host, or wildcard.
• Destination IP address—A netwo... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
999 | VPNs
SA Key Lifetime and Re-Authentication Interval
In IKEv2, two IKE crypto profile values, Key Lifetime and IKEv2 Authentication Multiple, control
the establishment of IKEv2 IKE SAs. The key lifetime is the length of time that a negotiated IKE
SA key is effective. Before the key lifetime expires, the SA must be re-ke... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,000 | VPNs
Set Up Site-to-Site VPN
To set up site-to-site VPN:
Make sure that your Ethernet interfaces, virtual routers, and zones are configured properly. For
more information, see Configure Interfaces and Zones.
Create your tunnel interfaces. Ideally, put the tunnel interfaces in a separate zone, so that
tunneled traffic c... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,001 | VPNs
STEP 1 | Define the IKE Gateway.
1. Select Network > Network Profiles > IKE Gateways, Add a gateway, and enter the
gateway Name (General tab).
2. Set the Version to IKEv1 only mode, IKEv2 only mode, or IKEv2 preferred mode. The
IKE gateway begins its negotiation with its peer in the mode you specify here. If you
s... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,002 | VPNs
STEP 5 | Configure a pre-shared key.
1. Enter a Pre-shared Key, which is the security key for authentication across the tunnel.
Re-enter the value to Confirm Pre-shared Key. Use a maximum of 255 ASCII or nonASCII characters.
Generate a key that is difficult to crack with dictionary attacks; use a pre-shared
key g... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,003 | VPNs
STEP 6 | Configure certificate-based authentication.
Perform the remaining steps in this procedure if you selected Certificate as the method of
authenticating the peer gateway at the opposite end of the tunnel.
1. Select a Local Certificate—one that is already on the firewall, Import a certificate, or
Generate a n... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,004 | VPNs
STEP 7 | Configure advanced options for the gateway.
1. (Optional) Enable Passive Mode in the Common Options (Advanced Options) to specify
that the firewall only respond to IKE connection requests and never initiate them.
2. If you have a device performing NAT between the gateways, Enable NAT Traversal to
use UDP ... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,005 | VPNs
STEP 2 | On the Device Certificates tab, select the certificate to Export to the server.
The status of the certificate should be valid, not expired. The firewall will not stop you
from exporting an invalid certificate.
STEP 3 | For File Format, select Binary Encoded Certificate (DER).
STEP 4 | Leave Export private... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,006 | VPNs
To change the default values, perform the following task. A prerequisite is that an IKE crypto
profile already exists.
STEP 1 | Change the SA key lifetime or authentication interval for an IKE Crypto profile.
1. Select Network > Network Profiles > IKE Crypto and select the IKE Crypto profile that
applies to the lo... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,007 | VPNs
STEP 6 | In the Protocol field, select the transport protocol (TCP or UDP).
STEP 7 | Click OK.
Define Cryptographic Profiles
A cryptographic profile specifies the ciphers used for authentication and/or encryption between
two IKE peers, and the lifetime of the key. The time period between each renegotiation is know... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,008 | VPNs
STEP 2 | Specify the DH (Diffie–Hellman) Group for key exchange and the Authentication and
Encryption algorithms.
Click Add in the corresponding sections (DH Group, Authentication, and Encryption) and select
from the menus.
If you are not certain what the VPN peers support, add multiple groups or algorithms in the... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,009 | VPNs
Choose the strongest authentication and encryption algorithms the peer can support.
For the authentication algorithm, use SHA-256 or higher (SHA-384 or higher preferred
for long-lived transactions). Do not use SHA-1 or MD5. For the encryption algorithm,
use AES; DES and 3DES are weak and vulnerable. AES with Galoi... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,010 | VPNs
STEP 1 | Create a new IPSec profile.
1. Select Network > Network Profiles > IPSec Crypto and select Add.
2. Enter a Name for the new profile.
3. Select the IPSec Protocol—ESP or AH—that you want to apply to secure the data as it
traverses across the tunnel.
As a best practice, select ESP (Encapsulating Security pa... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,011 | VPNs
STEP 5 | Attach the IPSec Profile to an IPSec tunnel configuration.
See Set up key exchange.
Set Up an IPSec Tunnel
The IPSec tunnel configuration allows you to authenticate and/or encrypt the data (IP packet) as it
traverses the tunnel.
If you are setting up the firewall to work with a peer that supports policy-b... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,012 | VPNs
ESP. To route IPv6 traffic to the tunnel, you can use a static route to the tunnel, or use
OSPFv3, or use a Policy-Based Forwarding (PBF) rule.
3. Enter the 64-bit extended unique Interface ID in hexadecimal format, for example,
00:26:08:FF:FE:DE:4E:29. By default, the firewall will use the EUI-64 generated from t... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,013 | VPNs
(packets that are too old) or packets that already appear in the sliding window (duplicate or
replayed packets). Accepted packets, after they are validated, update the sliding window,
displacing the lowest sequence number out of the window if it was already full.
1. On the General tab, select Show Advanced Options... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,014 | VPNs
STEP 10 | Create a Proxy ID to identify the VPN peers.
This step is required only if the VPN peer uses policy-based VPN.
1. Select Network > IPSec Tunnels and click Add.
2. Select the Proxy IDs tab.
3. Select the IPv4 or IPv6 tab.
4. Click Add and enter the Proxy ID name.
5. Enter the Local IP address or subnet fo... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,015 | VPNs
STEP 4 | Specify the Interval (sec) and Threshold to trigger the specified action.
• Threshold specifies the number of heartbeats to wait before taking the specified action
(range is 2-100; default is 5).
• Interval (sec) specifies the time (in seconds) between heartbeats (range is 2-10; default is 3).
STEP 5 | At... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,016 | VPNs
Enable or disable an IKE gateway.
1. Select Network > Network Profiles > IKE Gateways and select the gateway you want to
enable or disable.
2. At the bottom of the screen, click Enable or Disable.
Enable or disable an IPSec tunnel.
1. Select Network > IPSec Tunnels and select the tunnel you want to enable or disab... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,017 | VPNs
Refresh or restart an IKE gateway.
1. Select Network > IPSec Tunnels and select the tunnel for the gateway you want to
refresh or restart.
2. In the row for that tunnel, under the Status column, click IKE Info.
3. At the bottom of the IKE Info screen, click the action you want:
• Refresh—Updates the statistics on ... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,018 | VPNs
STEP 4 | Enter the following command to test if IKE phase 2 is set up:
show vpn ipsec-sa tunnel <tunnel_name>
In the output, check whether the Security Association displays. If it doesn’t, review the system
log messages to interpret the reason for failure.
STEP 5 | To view the VPN traffic flow information, use the... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,019 | VPNs
If error is this: Try this:
IKE phase-1 negotiation is failed.
Unable to process peer’s SA payload.
pfs group mismatched:my: 2peer: 0
or
IKE phase-2 negotiation failed when
processing SA payload. No suitable
proposal found in peer’s SA payload.
Check the IPSec Crypto profile
configuration to verify that:
• pfs is ... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,020 | VPNs
Site-to-Site VPN Quick Configs
The following sections provide instructions for configuring some common VPN deployments:
• Site-to-Site VPN with Static Routing
• Site-to-Site VPN with OSPF
• Site-to-Site VPN with Static and Dynamic Routing
Site-to-Site VPN with Static Routing
The following example shows a VPN conne... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,021 | VPNs
STEP 1 | Configure a Layer 3 interface.
This interface is used for the IKE phase-1 tunnel.
1. Select Network > Interfaces > Ethernet and then select the interface you want to
configure for VPN.
2. Select Layer3 from the Interface Type.
3. On the Config tab, select the Security Zone to which the interface belongs:
... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,022 | VPNs
STEP 2 | Create a tunnel interface and attach it to a virtual router and security zone.
1. Select Network > Interfaces > Tunnel and click Add.
2. In the Interface Name field, specify a numeric suffix, such as .1.
3. On the Config tab, expand the Security Zone to define the zone as follows:
• To use your trust zone... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,023 | VPNs
STEP 4 | Set up the Crypto profiles (IKE Crypto profile for phase 1 and IPSec Crypto profile for phase
2).
Complete this task on both peers and make sure to set identical values.
1. Select Network > Network Profiles > IKE Crypto. In this example, we use the default
profile.
2. Select Network > Network Profiles > I... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,024 | VPNs
STEP 6 | Set up the IPSec Tunnel.
1. Select Network > IPSec Tunnels.
2. Click Add and configure the options in the General tab.
In this example, the configuration for VPN Peer A is:
• Tunnel Interface—tunnel.10
• Type—Auto Key
• IKE Gateway—Select the IKE Gateway defined above.
• IPSec Crypto Profile—Select the IP... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,025 | VPNs
STEP 1 | Configure the Layer 3 interfaces on each firewall.
1. Select Network > Interfaces > Ethernet and then select the interface you want to
configure for VPN.
2. Select Layer3 from the Interface Type list.
3. On the Config tab, select the Security Zone to which the interface belongs:
• The interface must be ac... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,026 | VPNs
STEP 2 | Create a tunnel interface and attach it to a virtual router and security zone.
1. Select Network > Interfaces > Tunnel and click Add.
2. In the Interface Name field, specify a numeric suffix, such as, .11.
3. On the Config tab, expand Security Zone to define the zone as follows:
• To use your trust zone a... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,027 | VPNs
STEP 4 | Set up the OSPF configuration on the virtual router and attach the OSPF areas with the
appropriate interfaces on the firewall.
For more information on the OSPF options that are available on the firewall, see Configure
OSPF.
Use Broadcast as the link type when there are more than two OSPF routers that need... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,028 | VPNs
STEP 6 | Set up the IPSec Tunnel.
1. Select Network > IPSec Tunnels.
2. Click Add and configure the options in the General tab.
In this example, the configuration for VPN Peer A is:
• Tunnel Interface—tunnel.41
• Type—Auto Key
• IKE Gateway—Select the IKE Gateway defined above.
• IPSec Crypto Profile—Select the IK... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,029 | VPNs
STEP 8 | Verify OSPF adjacencies and routes from the CLI.
Verify that both the firewalls can see each other as neighbors with full status. Also confirm
that the IP address of the VPN peer’s tunnel interface and the OSPF Router ID. Use the
following CLI commands on each VPN peer.
• show routing protocol ospf neighb... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,030 | VPNs
STEP 9 | Test VPN Connectivity.
See Set Up Tunnel Monitoring and View the Status of the Tunnels.
Site-to-Site VPN with Static and Dynamic Routing
In this example, one site uses static routes and the other site uses OSPF. When the routing
protocol is not the same between the locations, the tunnel interface on each ... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,031 | VPNs
STEP 1 | Configure the Layer 3 interfaces on each firewall.
1. Select Network > Interfaces > Ethernet and then select the interface you want to
configure for VPN.
2. Select Layer3 from the Interface Type.
3. On the Config tab, select the Security Zone to which the interface belongs:
• The interface must be accessi... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,032 | VPNs
STEP 3 | Set up the IKE Gateway.
With pre-shared keys, to add authentication scrutiny when setting up the IKE phase-1 tunnel,
you can set up Local and Peer Identification attributes and a corresponding value that is
matched in the IKE negotiation process.
1. Select Network > Network Profiles > IKE Gateway.
2. Clic... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,033 | VPNs
STEP 4 | Create a tunnel interface and attach it to a virtual router and security zone.
1. Select Network > Interfaces > Tunnel and click Add.
2. In the Interface Name field, specify a numeric suffix, say, .41.
3. On the Config tab, expand the Security Zone to define the zone as follows:
• To use your trust zone a... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,034 | VPNs
STEP 6 | Set up the static route and the OSPF configuration on the virtual router and attach the OSPF
areas with the appropriate interfaces on the firewall.
1. On VPN Peer B, select Network > Virtual Routers, and select the default router or add a
new router.
2. Select Static Routes and Add the tunnel IP address a... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,035 | VPNs
STEP 8 | Set up the IPSec Tunnel.
1. Select Network > IPSec Tunnels.
2. Click Add and configure the options in the General tab.
In this example, the configuration for VPN Peer A is:
• Tunnel Interface—tunnel.41
• Type—Auto Key
• IKE Gateway—Select the IKE Gateway defined above.
• IPSec Crypto Profile—Select the IK... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,036 | VPNs
STEP 10 | Verify OSPF adjacencies and routes from the CLI.
Verify that both the firewalls can see each other as neighbors with full status. Also confirm
that the IP address of the VPN peer’s tunnel interface and the OSPF Router ID. Use the
following CLI commands on each VPN peer.
• show routing protocol ospf neigh... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,037 | VPNs
PAN-OS® Administrator’s Guide Version 10.2 1038 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,038 | Large Scale VPN (LSVPN)
The GlobalProtect Large Scale VPN (LSVPN) feature on the Palo Alto Networks next-generation
firewall simplifies the deployment of traditional hub and spoke VPNs, enabling you to quickly
deploy enterprise networks with several branch offices with a minimum amount of configuration
required on the ... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,039 | Large Scale VPN (LSVPN)
LSVPN Overview
GlobalProtect provides a complete infrastructure for managing secure access to corporate
resources from your remote sites. This infrastructure includes the following components:
• GlobalProtect Portal—Provides the management functions for your GlobalProtect LSVPN
infrastructure. E... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,040 | Large Scale VPN (LSVPN)
Create Interfaces and Zones for the LSVPN
You must configure the following interfaces and zones for your LSVPN infrastructure:
• GlobalProtect portal—Requires a Layer 3 interface for GlobalProtect satellites to connect to.
If the portal and gateway are on the same firewall, they can use the same... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,041 | Large Scale VPN (LSVPN)
STEP 2 | On the firewall(s) hosting GlobalProtect gateway(s), configure the logical tunnel interface
that will terminate VPN tunnels established by the GlobalProtect satellites.
IP addresses are not required on the tunnel interface unless you plan to use dynamic
routing. However, assigning an IP... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,042 | Large Scale VPN (LSVPN)
Enable SSL Between GlobalProtect LSVPN Components
All interaction between the GlobalProtect components occurs over an SSL/TLS connection.
Therefore, you must generate and/or install the required certificates before configuring each
component so that you can reference the appropriate certificate(... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,043 | Large Scale VPN (LSVPN)
STEP 1 | On the firewall hosting the GlobalProtect portal, create the root CA certificate for signing the
certificates of the GlobalProtect components.
Create a Self-Signed Root CA Certificate:
1. Select Device > Certificate Management > Certificates > Device Certificates and click
Generate.
2. ... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,044 | Large Scale VPN (LSVPN)
STEP 3 | Deploy the self-signed server certificates to the gateways.
Best Practices:
• Export the self-signed server certificates issued by the root CA from the portal and
import them onto the gateways.
• Be sure to issue a unique server certificate for each gateway.
• The Common Name (CN) and, ... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,045 | Large Scale VPN (LSVPN)
STEP 4 | Import the root CA certificate used to issue server certificates for the LSVPN components.
You must import the root CA certificate onto all gateways and satellites. For security reasons,
make sure you export the certificate only, and not the associated private key.
1. Download the root ... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,046 | Large Scale VPN (LSVPN)
the settings in the SCEP profile and automatically includes the serial number of the device in the
subject of the client certificate. After receiving the client certificate from the enterprise PKI, the
portal transparently deploys the client certificate to the satellite device. The satellite dev... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,047 | Large Scale VPN (LSVPN)
STEP 4 | (Optional) Configure cryptographic settings for the certificate.
• Select the key length (Number of Bits) for the certificate. If the firewall is in FIPS-CC mode
and the key generation algorithm is RSA. The RSA keys must be 2048 bits or larger.
• Select the Digest for CSR which indicate... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,048 | Large Scale VPN (LSVPN)
Configure the Portal to Authenticate Satellites
To register with the LSVPN, each satellite must establish an SSL/TLS connection with the
portal. After establishing the connection, the portal authenticates the satellite to ensure that
it is authorized to join the LSVPN. After successfully authent... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,049 | Large Scale VPN (LSVPN)
PAN-OS RELEASE SUPPORTED AUTHENTICATION METHOD
While configuring the Username/
password and Satellite Cookie
Authentication method, configure
the satellite cookie expiration to
a value more than the satellite
upgrade time to avoid login
failures.
PAN-OS 10.2.8 and later 10.2 releases • Username/... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,050 | Large Scale VPN (LSVPN)
The following workflow describes how to set up the portal to authenticate satellites against an
existing authentication service.
STEP 1 | Set up local database authentication so that the satellite administrator can authenticate the
satellite to the portal.
1. Select Device > Local User Database ... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,051 | Large Scale VPN (LSVPN)
Serial Number
and IP
Address
Authentication
Method
Configured
retry-interval
(Default is 5
seconds)
Serial Number IP Address in
Allow List
Satellite
Cookie
Established
Authentication
Method
Enabled The retryinterval value
is greater
than or equal
to 5
Registered Allowed Will not be
checked
Seri... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,052 | Large Scale VPN (LSVPN)
In the LSVPN serial number and IP address authentication method, PAN-OS stores the
configuration changes in the database internally. Therefore, the latest saved configuration is
applied when you upgrade to or downgrade from this feature.
Use the following workflow to authenticate the satellite u... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,053 | Large Scale VPN (LSVPN)
IP address that you want to exclude must be within the IP address range that you
configured in the satellite-ip-allowlist.
For example:
username@hostname> set global-protect global-protectportal portal gp-portal-1 satellite-serialnumberip-auth
satellite-ip-exclude-from range 192.0.2.0-192.0.2.... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,054 | Large Scale VPN (LSVPN)
IP Address Format IPv4 Address IPv6 Address
192.0.2.10-192.0.2.20
(HA deployments only) The added satellite IP address list is synchronized among the HA
peers.
• Ensure that Enable Config Sync (select Device > High Availability > General)
is enabled on your HA configuration to configure the Seri... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,055 | Large Scale VPN (LSVPN)
When the Serial number and IP address Authentication is enabled and if the
satellite authentication fails, then based on the retry interval, the satellite will
retry the authentication process again. There is no fall back mechanism available
to support Username/Password and Satellite Cookie base... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,056 | Large Scale VPN (LSVPN)
STEP 4 | (Optional) Use the following operational commands to disable, delete, or view information
about the serial number and IP address authentication method.
1. Enter the following command to disable the serial number and IP address authentication
method on the firewall.
username@hostname> se... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,057 | Large Scale VPN (LSVPN)
(HA deployments only) The deleted satellite devices IP address from the satellite IP allow
list is synchronized among the HA peers.
7. Enter the following command per portal to delete a satellite device IP address from the
satellite IP exclude list. You can delete only the entries that are added... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,058 | Large Scale VPN (LSVPN)
Configure GlobalProtect Gateways for LSVPN
Because the GlobalProtect configuration that the portal delivers to the satellites includes the
list of gateways the satellite can connect to, it is a good idea to configure the gateways before
configuring the portal.
Before you can configure the Global... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,059 | Large Scale VPN (LSVPN)
STEP 3 | Specify how the gateway authenticates satellites attempting to establish tunnels. If
you haven’t yet created an SSL/TLS Service profile for the gateway, see Deploy Server
Certificates to the GlobalProtect LSVPN Components.
If you haven’t set up the authentication profiles or certificate... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,060 | Large Scale VPN (LSVPN)
firewalls within your organization, you can typically use the default (predefined) profile, which
uses ESP as the IPSec protocol, group2 for the DH group, AES-128-CBC for encryption, and
SHA-1 for authentication.
In the IPSec Crypto Profile drop-down, select default to use the predefined profile... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,061 | Large Scale VPN (LSVPN)
STEP 8 | (Optional) Define what routes, if any, the gateway will accept from satellites.
By default, the gateway will not add any routes satellites advertise to its routing table. If you
do not want the gateway to accept routes from satellites, you do not need to complete this
step.
1. To enable... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,062 | Large Scale VPN (LSVPN)
Configure the GlobalProtect Portal for LSVPN
The GlobalProtect portal provides the management functions for your GlobalProtect LSVPN.
Every satellite system that participates in the LSVPN receives configuration information from the
portal, including information about available gateways as well a... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,063 | Large Scale VPN (LSVPN)
STEP 2 | Specify the network information to enable satellites to connect to the portal.
If you haven’t yet created the network interface for the portal, see Create Interfaces and
Zones for the LSVPN for instructions.
1. Select the Interface that satellites will use for ingress access to the port... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,064 | Large Scale VPN (LSVPN)
satellite configuration to deploy. As with security rule evaluation, the portal looks for a match
starting from the top of the list. When it finds a match, it delivers the corresponding configuration
to the satellite.
For example, the following figure shows a network in which some branch offices... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,065 | Large Scale VPN (LSVPN)
Therefore, more specific configurations must precede more general ones. See Step 5 for
instructions on ordering the list of satellite configurations.
Specify the match criteria for the satellite configuration as follows:
• To restrict this configuration to satellites with specific serial numbers... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,066 | Large Scale VPN (LSVPN)
STEP 5 | Arrange the satellite configurations so that the proper configuration is deployed to each
satellite.
• To move a satellite configuration up on the list of configurations, select the configuration
and click Move Up.
• To move a satellite configuration down on the list of configurations, ... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,067 | Large Scale VPN (LSVPN)
Prepare the Satellite to Join the LSVPN
To participate in the LSVPN, the satellites require a minimal amount of configuration. Because the
required configuration is minimal, you can pre-configure the satellites before shipping them to
your branch offices for installation.
STEP 1 | Configure a La... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,068 | Large Scale VPN (LSVPN)
STEP 3 | If you generated the portal server certificate using a Root CA that is not trusted by the
satellites (for example, if you used self-signed certificates), import the root CA certificate
used to issue the portal server certificate.
The root CA certificate is required to enable the satelli... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,069 | Large Scale VPN (LSVPN)
STEP 5 | (Optional) Configure the satellite to publish local routes to the gateway.
Pushing routes to the gateway enables traffic to the subnets local to the satellite via the
gateway. However, you must also configure the gateway to accept the routes as detailed in
Configure GlobalProtect Gatewa... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,070 | Large Scale VPN (LSVPN)
Verify the LSVPN Configuration
After configuring the portal, gateways, and satellites, verify that the satellites are able to connect
to the portal and gateway and establish VPN tunnels with the gateway(s).
STEP 1 | Verify satellite connectivity with portal.
From the firewall hosting the portal,... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,071 | Large Scale VPN (LSVPN)
LSVPN Quick Configs
The following sections provide step-by-step instructions for configuring some common
GlobalProtect LSVPN deployments:
• Basic LSVPN Configuration with Static Routing
• Advanced LSVPN Configuration with Dynamic Routing
• Advanced LSVPN Configuration with iBGP
Basic LSVPN Confi... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,072 | Large Scale VPN (LSVPN)
STEP 3 | Create the Security policy rule to enable traffic flow between the VPN zone where the
tunnel terminates (lsvpn-tun) and the trust zone where the corporate applications reside (L3-
Trust).
See Create a Security Policy Rule.
STEP 4 | Assign an SSL/TLS Service profile to the portal/gateway... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,073 | Large Scale VPN (LSVPN)
STEP 8 | Configure the Portal.
Select Network > GlobalProtect > Portal and Add a configuration. This example requires the
following portal configuration:
• Interface—ethernet1/11
• IP Address—203.0.113.11/24
• SSL/TLS Server Profile—lsvpnserver
• Authentication Profile—lsvpn-sat
STEP 9 | Define ... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,074 | Large Scale VPN (LSVPN)
• Manual assignment of IP addresses to tunnel interfaces on all gateways and satellites.
• Configuration of OSPF point-to-multipoint (P2MP) on the virtual router on all gateways and
satellites. In addition, as part of the OSPF configuration on each gateway, you must manually
define the tunnel IP... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,075 | Large Scale VPN (LSVPN)
STEP 2 | Configure the dynamic routing protocol on the gateway.
To configure OSPF on the gateway:
1. Select Network > Virtual Routers and select the virtual router associated with your VPN
interfaces.
2. On the Areas tab, click Add to create the backbone area, or, if it is already configured,
cl... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,076 | Large Scale VPN (LSVPN)
Advanced LSVPN Configuration with iBGP
This use case illustrates how GlobalProtect LSVPN securely connects distributed office locations
with primary and disaster recovery data centers that house critical applications for users and how
internal border gateway protocol (iBGP) eases deployment and ... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,077 | Large Scale VPN (LSVPN)
STEP 1 | Create Interfaces and Zones for the LSVPN.
Portal and Primary gateway:
• Zone: LSVPN-Untrust-Primary
• Interface: ethernet1/21
• IPv4: 172.16.22.1/24
• Zone: L3-Trust
• Interface: ethernet1/23
• IPv4: 200.99.0.1/16
Backup gateway:
• Zone: LSVPN-Untrust-Primary
• Interface: ethernet1/5
•... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,078 | Large Scale VPN (LSVPN)
STEP 3 | Enable SSL Between GlobalProtect LSVPN Components.
The gateway uses the self-signed root certificate authority (CA) to issue certificates for the
satellites in a GlobalProtect LSVPN. Because one firewall houses the portal and primary
gateway, a single certificate is used for authenticat... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,079 | Large Scale VPN (LSVPN)
single satellite configuration is needed. Satellites are matched based on their serial
numbers, so no satellites will need to authenticate as a user.
6. On Satellite > Network Settings, define the pool of IP address to assign to the tunnel
interface on the satellite once the VPN connection is es... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,080 | Large Scale VPN (LSVPN)
STEP 6 | Prepare the Satellite to Join the LSVPN.
The configuration shown is a sample of a single satellite.
Repeat this configuration each time you add a new satellite to the LSVPN deployment.
1. Configure a tunnel interface as the tunnel endpoint for the VPN connection to the
gateways.
2. Set ... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,081 | Large Scale VPN (LSVPN)
STEP 8 | Verify the LSVPN Configuration.
STEP 9 | (Optional) Add a new site to the LSVPN deployment.
1. Select Network > GlobalProtect > Portals > GlobalProtect Portal > Satellite
Configuration > GlobalProtect Satellite > Devices to add the serial number of the new
satellite to the GlobalProtect... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,082 | Policy
Policies allow you to enforce rules and take action. The different types of policy rules that you can
create on the firewall are: Security, NAT, Quality of Service (QoS), Policy Based Forwarding (PBF),
Decryption, Application Override, Authentication, Denial of Service (DoS), and Zone protection
policies. All th... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,083 | Policy
• Identify Users Connected through a Proxy Server
• Policy-Based Forwarding
• Application Override Policy
• Test Policy Rules
PAN-OS® Administrator’s Guide Version 10.2 1084 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,084 | Policy
Policy Types
The Palo Alto Networks next-generation firewall supports a variety of policy types that work
together to safely enable applications on your network.
For all policy types, when you Enforce Policy Rule Description, Tag, and Audit Comment, you
can use the audit comment archive to view how a policy rule... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,085 | Policy
Policy Type Description
DoS Protection Identify potential denial-of-service (DoS) attacks and take protective
action in response to rule matches. For more details, see DoS
Protection Profiles.
PAN-OS® Administrator’s Guide Version 10.2 1086 ©2025 Palo Alto Networks, Inc. | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,086 | Policy
Security Policy
Security policy protects network assets from threats and disruptions and helps to optimally
allocate network resources for enhancing productivity and efficiency in business processes. On a
Palo Alto Networks firewall, individual Security policy rules determine whether to block or allow
a session ... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,087 | Policy
Required/
Optional
Field Description
Name A label (up to 63 characters) that identifies the rule.
UUID The Universally Unique Identifier (UUID) is a distinct 32-character
string that permanently identifies rules so that you can track a rule
regardless of any changes to it, such as the name.
Rule Type Specifies w... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,088 | Policy
Required/
Optional
Field Description
unresponsive to the user. For more details, see Security Policy
Actions.
Tag A keyword or phrase that allows you to filter security rules. This
is handy when you have defined many rules and wish to then
review those that are tagged with a keyword such as IT-sanctioned
applica... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,089 | Policy
Required/
Optional
Field Description
To block or allow traffic based on URL category, you
must apply a URL Filtering profile to the security policy
rules. Define the URL Category as Any and attach a
URL Filtering profile to the security policy. See Set Up
a Basic Security Policy for information on using the
defa... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
1,090 | Policy
helpful for data center firewalls serving many devices. You won’t have to manage an unnecessarily
large number of address objects to cover all the matching IP addresses or use less restrictive
Security policy rules than you need due to IP address capacity constraints.
For example, suppose you use the IPv4 addres... | https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.