index
int64
0
4.08k
text
stringlengths
34
4.9k
url
stringclasses
38 values
991
VPNs Site-to-Site VPN Concepts A VPN connection provides secure access to information between two or more sites. In order to provide secure access to resources and reliable connectivity, a VPN connection needs the following components: • IKE Gateway • Tunnel Interface • Tunnel Monitoring • Internet Key Exchange (IKE) f...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
992
VPNs protocol to route traffic across the tunnel. With dynamic routing, the tunnel IP address serves as the next hop IP address for routing traffic to the VPN tunnel. If you are configuring the Palo Alto Networks firewall with a VPN peer that performs policy￾based VPN, you must configure a local and remote Proxy ID whe...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
993
VPNs IKE Phase 1 In this phase, the firewalls use the parameters defined in the IKE Gateway configuration and the IKE Crypto profile to authenticate each other and set up a secure control channel. IKE Phase supports the use of preshared keys or digital certificates (which use public key infrastructure, PKI) for mutual ...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
994
VPNs Group Number Number of Bits Group 16 4096-bit modular exponential group Group 19 256-bit elliptic curve group Group 20 384-bit elliptic curve group Group 21 512-bit random elliptic curve group • Authentication algorithms—sha1, sha 256, sha 384, sha 512, or md5 • Encryption algorithms—aes-256-gcm, aes-128-gcm, 3des...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
995
VPNs ESP AH • no-pfs—By default, perfect forward secrecy (PFS) is enabled, which means a new DH key is generated in IKE phase 2 using one of the groups listed above. This key is independent of the keys exchanged in IKE phase1 and provides better data transfer security. If you select no-pfs, the DH key created at phase ...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
996
VPNs • Manual Key—Manual key is typically used if the Palo Alto Networks firewall is establishing a VPN tunnel with a legacy device, or if you want to reduce the overhead of generating session keys. If using manual keys, the same key must be configured on both peers. Manual keys are not recommended for establishing a V...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
997
VPNs • Change the Cookie Activation Threshold for IKEv2 • Configure IKEv2 Traffic Selectors Liveness Check The liveness check for IKEv2 is similar to Dead Peer Detection (DPD), which IKEv1 uses as the way to determine whether a peer is still available. In IKEv2, the liveness check is achieved by any IKEv2 packet transm...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
998
VPNs example, you can assign different tunnels to each department to isolate their traffic. Separation of traffic also allows features such as QoS to be implemented. The IPv4 and IPv6 traffic selectors are: • Source IP address—A network prefix, address range, specific host, or wildcard. • Destination IP address—A netwo...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
999
VPNs SA Key Lifetime and Re-Authentication Interval In IKEv2, two IKE crypto profile values, Key Lifetime and IKEv2 Authentication Multiple, control the establishment of IKEv2 IKE SAs. The key lifetime is the length of time that a negotiated IKE SA key is effective. Before the key lifetime expires, the SA must be re-ke...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,000
VPNs Set Up Site-to-Site VPN To set up site-to-site VPN: Make sure that your Ethernet interfaces, virtual routers, and zones are configured properly. For more information, see Configure Interfaces and Zones. Create your tunnel interfaces. Ideally, put the tunnel interfaces in a separate zone, so that tunneled traffic c...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,001
VPNs STEP 1 | Define the IKE Gateway. 1. Select Network > Network Profiles > IKE Gateways, Add a gateway, and enter the gateway Name (General tab). 2. Set the Version to IKEv1 only mode, IKEv2 only mode, or IKEv2 preferred mode. The IKE gateway begins its negotiation with its peer in the mode you specify here. If you s...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,002
VPNs STEP 5 | Configure a pre-shared key. 1. Enter a Pre-shared Key, which is the security key for authentication across the tunnel. Re-enter the value to Confirm Pre-shared Key. Use a maximum of 255 ASCII or non￾ASCII characters. Generate a key that is difficult to crack with dictionary attacks; use a pre-shared key g...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,003
VPNs STEP 6 | Configure certificate-based authentication. Perform the remaining steps in this procedure if you selected Certificate as the method of authenticating the peer gateway at the opposite end of the tunnel. 1. Select a Local Certificate—one that is already on the firewall, Import a certificate, or Generate a n...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,004
VPNs STEP 7 | Configure advanced options for the gateway. 1. (Optional) Enable Passive Mode in the Common Options (Advanced Options) to specify that the firewall only respond to IKE connection requests and never initiate them. 2. If you have a device performing NAT between the gateways, Enable NAT Traversal to use UDP ...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,005
VPNs STEP 2 | On the Device Certificates tab, select the certificate to Export to the server. The status of the certificate should be valid, not expired. The firewall will not stop you from exporting an invalid certificate. STEP 3 | For File Format, select Binary Encoded Certificate (DER). STEP 4 | Leave Export private...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,006
VPNs To change the default values, perform the following task. A prerequisite is that an IKE crypto profile already exists. STEP 1 | Change the SA key lifetime or authentication interval for an IKE Crypto profile. 1. Select Network > Network Profiles > IKE Crypto and select the IKE Crypto profile that applies to the lo...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,007
VPNs STEP 6 | In the Protocol field, select the transport protocol (TCP or UDP). STEP 7 | Click OK. Define Cryptographic Profiles A cryptographic profile specifies the ciphers used for authentication and/or encryption between two IKE peers, and the lifetime of the key. The time period between each renegotiation is know...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,008
VPNs STEP 2 | Specify the DH (Diffie–Hellman) Group for key exchange and the Authentication and Encryption algorithms. Click Add in the corresponding sections (DH Group, Authentication, and Encryption) and select from the menus. If you are not certain what the VPN peers support, add multiple groups or algorithms in the...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,009
VPNs Choose the strongest authentication and encryption algorithms the peer can support. For the authentication algorithm, use SHA-256 or higher (SHA-384 or higher preferred for long-lived transactions). Do not use SHA-1 or MD5. For the encryption algorithm, use AES; DES and 3DES are weak and vulnerable. AES with Galoi...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,010
VPNs STEP 1 | Create a new IPSec profile. 1. Select Network > Network Profiles > IPSec Crypto and select Add. 2. Enter a Name for the new profile. 3. Select the IPSec Protocol—ESP or AH—that you want to apply to secure the data as it traverses across the tunnel. As a best practice, select ESP (Encapsulating Security pa...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,011
VPNs STEP 5 | Attach the IPSec Profile to an IPSec tunnel configuration. See Set up key exchange. Set Up an IPSec Tunnel The IPSec tunnel configuration allows you to authenticate and/or encrypt the data (IP packet) as it traverses the tunnel. If you are setting up the firewall to work with a peer that supports policy-b...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,012
VPNs ESP. To route IPv6 traffic to the tunnel, you can use a static route to the tunnel, or use OSPFv3, or use a Policy-Based Forwarding (PBF) rule. 3. Enter the 64-bit extended unique Interface ID in hexadecimal format, for example, 00:26:08:FF:FE:DE:4E:29. By default, the firewall will use the EUI-64 generated from t...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,013
VPNs (packets that are too old) or packets that already appear in the sliding window (duplicate or replayed packets). Accepted packets, after they are validated, update the sliding window, displacing the lowest sequence number out of the window if it was already full. 1. On the General tab, select Show Advanced Options...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,014
VPNs STEP 10 | Create a Proxy ID to identify the VPN peers. This step is required only if the VPN peer uses policy-based VPN. 1. Select Network > IPSec Tunnels and click Add. 2. Select the Proxy IDs tab. 3. Select the IPv4 or IPv6 tab. 4. Click Add and enter the Proxy ID name. 5. Enter the Local IP address or subnet fo...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,015
VPNs STEP 4 | Specify the Interval (sec) and Threshold to trigger the specified action. • Threshold specifies the number of heartbeats to wait before taking the specified action (range is 2-100; default is 5). • Interval (sec) specifies the time (in seconds) between heartbeats (range is 2-10; default is 3). STEP 5 | At...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,016
VPNs Enable or disable an IKE gateway. 1. Select Network > Network Profiles > IKE Gateways and select the gateway you want to enable or disable. 2. At the bottom of the screen, click Enable or Disable. Enable or disable an IPSec tunnel. 1. Select Network > IPSec Tunnels and select the tunnel you want to enable or disab...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,017
VPNs Refresh or restart an IKE gateway. 1. Select Network > IPSec Tunnels and select the tunnel for the gateway you want to refresh or restart. 2. In the row for that tunnel, under the Status column, click IKE Info. 3. At the bottom of the IKE Info screen, click the action you want: • Refresh—Updates the statistics on ...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,018
VPNs STEP 4 | Enter the following command to test if IKE phase 2 is set up: show vpn ipsec-sa tunnel <tunnel_name> In the output, check whether the Security Association displays. If it doesn’t, review the system log messages to interpret the reason for failure. STEP 5 | To view the VPN traffic flow information, use the...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,019
VPNs If error is this: Try this: IKE phase-1 negotiation is failed. Unable to process peer’s SA payload. pfs group mismatched:my: 2peer: 0 or IKE phase-2 negotiation failed when processing SA payload. No suitable proposal found in peer’s SA payload. Check the IPSec Crypto profile configuration to verify that: • pfs is ...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,020
VPNs Site-to-Site VPN Quick Configs The following sections provide instructions for configuring some common VPN deployments: • Site-to-Site VPN with Static Routing • Site-to-Site VPN with OSPF • Site-to-Site VPN with Static and Dynamic Routing Site-to-Site VPN with Static Routing The following example shows a VPN conne...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,021
VPNs STEP 1 | Configure a Layer 3 interface. This interface is used for the IKE phase-1 tunnel. 1. Select Network > Interfaces > Ethernet and then select the interface you want to configure for VPN. 2. Select Layer3 from the Interface Type. 3. On the Config tab, select the Security Zone to which the interface belongs: ...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,022
VPNs STEP 2 | Create a tunnel interface and attach it to a virtual router and security zone. 1. Select Network > Interfaces > Tunnel and click Add. 2. In the Interface Name field, specify a numeric suffix, such as .1. 3. On the Config tab, expand the Security Zone to define the zone as follows: • To use your trust zone...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,023
VPNs STEP 4 | Set up the Crypto profiles (IKE Crypto profile for phase 1 and IPSec Crypto profile for phase 2). Complete this task on both peers and make sure to set identical values. 1. Select Network > Network Profiles > IKE Crypto. In this example, we use the default profile. 2. Select Network > Network Profiles > I...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,024
VPNs STEP 6 | Set up the IPSec Tunnel. 1. Select Network > IPSec Tunnels. 2. Click Add and configure the options in the General tab. In this example, the configuration for VPN Peer A is: • Tunnel Interface—tunnel.10 • Type—Auto Key • IKE Gateway—Select the IKE Gateway defined above. • IPSec Crypto Profile—Select the IP...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,025
VPNs STEP 1 | Configure the Layer 3 interfaces on each firewall. 1. Select Network > Interfaces > Ethernet and then select the interface you want to configure for VPN. 2. Select Layer3 from the Interface Type list. 3. On the Config tab, select the Security Zone to which the interface belongs: • The interface must be ac...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,026
VPNs STEP 2 | Create a tunnel interface and attach it to a virtual router and security zone. 1. Select Network > Interfaces > Tunnel and click Add. 2. In the Interface Name field, specify a numeric suffix, such as, .11. 3. On the Config tab, expand Security Zone to define the zone as follows: • To use your trust zone a...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,027
VPNs STEP 4 | Set up the OSPF configuration on the virtual router and attach the OSPF areas with the appropriate interfaces on the firewall. For more information on the OSPF options that are available on the firewall, see Configure OSPF. Use Broadcast as the link type when there are more than two OSPF routers that need...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,028
VPNs STEP 6 | Set up the IPSec Tunnel. 1. Select Network > IPSec Tunnels. 2. Click Add and configure the options in the General tab. In this example, the configuration for VPN Peer A is: • Tunnel Interface—tunnel.41 • Type—Auto Key • IKE Gateway—Select the IKE Gateway defined above. • IPSec Crypto Profile—Select the IK...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,029
VPNs STEP 8 | Verify OSPF adjacencies and routes from the CLI. Verify that both the firewalls can see each other as neighbors with full status. Also confirm that the IP address of the VPN peer’s tunnel interface and the OSPF Router ID. Use the following CLI commands on each VPN peer. • show routing protocol ospf neighb...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,030
VPNs STEP 9 | Test VPN Connectivity. See Set Up Tunnel Monitoring and View the Status of the Tunnels. Site-to-Site VPN with Static and Dynamic Routing In this example, one site uses static routes and the other site uses OSPF. When the routing protocol is not the same between the locations, the tunnel interface on each ...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,031
VPNs STEP 1 | Configure the Layer 3 interfaces on each firewall. 1. Select Network > Interfaces > Ethernet and then select the interface you want to configure for VPN. 2. Select Layer3 from the Interface Type. 3. On the Config tab, select the Security Zone to which the interface belongs: • The interface must be accessi...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,032
VPNs STEP 3 | Set up the IKE Gateway. With pre-shared keys, to add authentication scrutiny when setting up the IKE phase-1 tunnel, you can set up Local and Peer Identification attributes and a corresponding value that is matched in the IKE negotiation process. 1. Select Network > Network Profiles > IKE Gateway. 2. Clic...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,033
VPNs STEP 4 | Create a tunnel interface and attach it to a virtual router and security zone. 1. Select Network > Interfaces > Tunnel and click Add. 2. In the Interface Name field, specify a numeric suffix, say, .41. 3. On the Config tab, expand the Security Zone to define the zone as follows: • To use your trust zone a...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,034
VPNs STEP 6 | Set up the static route and the OSPF configuration on the virtual router and attach the OSPF areas with the appropriate interfaces on the firewall. 1. On VPN Peer B, select Network > Virtual Routers, and select the default router or add a new router. 2. Select Static Routes and Add the tunnel IP address a...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,035
VPNs STEP 8 | Set up the IPSec Tunnel. 1. Select Network > IPSec Tunnels. 2. Click Add and configure the options in the General tab. In this example, the configuration for VPN Peer A is: • Tunnel Interface—tunnel.41 • Type—Auto Key • IKE Gateway—Select the IKE Gateway defined above. • IPSec Crypto Profile—Select the IK...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,036
VPNs STEP 10 | Verify OSPF adjacencies and routes from the CLI. Verify that both the firewalls can see each other as neighbors with full status. Also confirm that the IP address of the VPN peer’s tunnel interface and the OSPF Router ID. Use the following CLI commands on each VPN peer. • show routing protocol ospf neigh...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,037
VPNs PAN-OS® Administrator’s Guide Version 10.2 1038 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,038
Large Scale VPN (LSVPN) The GlobalProtect Large Scale VPN (LSVPN) feature on the Palo Alto Networks next-generation firewall simplifies the deployment of traditional hub and spoke VPNs, enabling you to quickly deploy enterprise networks with several branch offices with a minimum amount of configuration required on the ...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,039
Large Scale VPN (LSVPN) LSVPN Overview GlobalProtect provides a complete infrastructure for managing secure access to corporate resources from your remote sites. This infrastructure includes the following components: • GlobalProtect Portal—Provides the management functions for your GlobalProtect LSVPN infrastructure. E...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,040
Large Scale VPN (LSVPN) Create Interfaces and Zones for the LSVPN You must configure the following interfaces and zones for your LSVPN infrastructure: • GlobalProtect portal—Requires a Layer 3 interface for GlobalProtect satellites to connect to. If the portal and gateway are on the same firewall, they can use the same...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,041
Large Scale VPN (LSVPN) STEP 2 | On the firewall(s) hosting GlobalProtect gateway(s), configure the logical tunnel interface that will terminate VPN tunnels established by the GlobalProtect satellites. IP addresses are not required on the tunnel interface unless you plan to use dynamic routing. However, assigning an IP...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,042
Large Scale VPN (LSVPN) Enable SSL Between GlobalProtect LSVPN Components All interaction between the GlobalProtect components occurs over an SSL/TLS connection. Therefore, you must generate and/or install the required certificates before configuring each component so that you can reference the appropriate certificate(...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,043
Large Scale VPN (LSVPN) STEP 1 | On the firewall hosting the GlobalProtect portal, create the root CA certificate for signing the certificates of the GlobalProtect components. Create a Self-Signed Root CA Certificate: 1. Select Device > Certificate Management > Certificates > Device Certificates and click Generate. 2. ...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,044
Large Scale VPN (LSVPN) STEP 3 | Deploy the self-signed server certificates to the gateways. Best Practices: • Export the self-signed server certificates issued by the root CA from the portal and import them onto the gateways. • Be sure to issue a unique server certificate for each gateway. • The Common Name (CN) and, ...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,045
Large Scale VPN (LSVPN) STEP 4 | Import the root CA certificate used to issue server certificates for the LSVPN components. You must import the root CA certificate onto all gateways and satellites. For security reasons, make sure you export the certificate only, and not the associated private key. 1. Download the root ...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,046
Large Scale VPN (LSVPN) the settings in the SCEP profile and automatically includes the serial number of the device in the subject of the client certificate. After receiving the client certificate from the enterprise PKI, the portal transparently deploys the client certificate to the satellite device. The satellite dev...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,047
Large Scale VPN (LSVPN) STEP 4 | (Optional) Configure cryptographic settings for the certificate. • Select the key length (Number of Bits) for the certificate. If the firewall is in FIPS-CC mode and the key generation algorithm is RSA. The RSA keys must be 2048 bits or larger. • Select the Digest for CSR which indicate...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,048
Large Scale VPN (LSVPN) Configure the Portal to Authenticate Satellites To register with the LSVPN, each satellite must establish an SSL/TLS connection with the portal. After establishing the connection, the portal authenticates the satellite to ensure that it is authorized to join the LSVPN. After successfully authent...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,049
Large Scale VPN (LSVPN) PAN-OS RELEASE SUPPORTED AUTHENTICATION METHOD While configuring the Username/ password and Satellite Cookie Authentication method, configure the satellite cookie expiration to a value more than the satellite upgrade time to avoid login failures. PAN-OS 10.2.8 and later 10.2 releases • Username/...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,050
Large Scale VPN (LSVPN) The following workflow describes how to set up the portal to authenticate satellites against an existing authentication service. STEP 1 | Set up local database authentication so that the satellite administrator can authenticate the satellite to the portal. 1. Select Device > Local User Database ...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,051
Large Scale VPN (LSVPN) Serial Number and IP Address Authentication Method Configured retry-interval (Default is 5 seconds) Serial Number IP Address in Allow List Satellite Cookie Established Authentication Method Enabled The retry￾interval value is greater than or equal to 5 Registered Allowed Will not be checked Seri...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,052
Large Scale VPN (LSVPN) In the LSVPN serial number and IP address authentication method, PAN-OS stores the configuration changes in the database internally. Therefore, the latest saved configuration is applied when you upgrade to or downgrade from this feature. Use the following workflow to authenticate the satellite u...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,053
Large Scale VPN (LSVPN) IP address that you want to exclude must be within the IP address range that you configured in the satellite-ip-allowlist. For example: username@hostname> set global-protect global-protect￾portal portal gp-portal-1 satellite-serialnumberip-auth satellite-ip-exclude-from range 192.0.2.0-192.0.2....
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,054
Large Scale VPN (LSVPN) IP Address Format IPv4 Address IPv6 Address 192.0.2.10-192.0.2.20 (HA deployments only) The added satellite IP address list is synchronized among the HA peers. • Ensure that Enable Config Sync (select Device > High Availability > General) is enabled on your HA configuration to configure the Seri...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,055
Large Scale VPN (LSVPN) When the Serial number and IP address Authentication is enabled and if the satellite authentication fails, then based on the retry interval, the satellite will retry the authentication process again. There is no fall back mechanism available to support Username/Password and Satellite Cookie base...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,056
Large Scale VPN (LSVPN) STEP 4 | (Optional) Use the following operational commands to disable, delete, or view information about the serial number and IP address authentication method. 1. Enter the following command to disable the serial number and IP address authentication method on the firewall. username@hostname> se...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,057
Large Scale VPN (LSVPN) (HA deployments only) The deleted satellite devices IP address from the satellite IP allow list is synchronized among the HA peers. 7. Enter the following command per portal to delete a satellite device IP address from the satellite IP exclude list. You can delete only the entries that are added...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,058
Large Scale VPN (LSVPN) Configure GlobalProtect Gateways for LSVPN Because the GlobalProtect configuration that the portal delivers to the satellites includes the list of gateways the satellite can connect to, it is a good idea to configure the gateways before configuring the portal. Before you can configure the Global...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,059
Large Scale VPN (LSVPN) STEP 3 | Specify how the gateway authenticates satellites attempting to establish tunnels. If you haven’t yet created an SSL/TLS Service profile for the gateway, see Deploy Server Certificates to the GlobalProtect LSVPN Components. If you haven’t set up the authentication profiles or certificate...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,060
Large Scale VPN (LSVPN) firewalls within your organization, you can typically use the default (predefined) profile, which uses ESP as the IPSec protocol, group2 for the DH group, AES-128-CBC for encryption, and SHA-1 for authentication. In the IPSec Crypto Profile drop-down, select default to use the predefined profile...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,061
Large Scale VPN (LSVPN) STEP 8 | (Optional) Define what routes, if any, the gateway will accept from satellites. By default, the gateway will not add any routes satellites advertise to its routing table. If you do not want the gateway to accept routes from satellites, you do not need to complete this step. 1. To enable...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,062
Large Scale VPN (LSVPN) Configure the GlobalProtect Portal for LSVPN The GlobalProtect portal provides the management functions for your GlobalProtect LSVPN. Every satellite system that participates in the LSVPN receives configuration information from the portal, including information about available gateways as well a...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,063
Large Scale VPN (LSVPN) STEP 2 | Specify the network information to enable satellites to connect to the portal. If you haven’t yet created the network interface for the portal, see Create Interfaces and Zones for the LSVPN for instructions. 1. Select the Interface that satellites will use for ingress access to the port...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,064
Large Scale VPN (LSVPN) satellite configuration to deploy. As with security rule evaluation, the portal looks for a match starting from the top of the list. When it finds a match, it delivers the corresponding configuration to the satellite. For example, the following figure shows a network in which some branch offices...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,065
Large Scale VPN (LSVPN) Therefore, more specific configurations must precede more general ones. See Step 5 for instructions on ordering the list of satellite configurations. Specify the match criteria for the satellite configuration as follows: • To restrict this configuration to satellites with specific serial numbers...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,066
Large Scale VPN (LSVPN) STEP 5 | Arrange the satellite configurations so that the proper configuration is deployed to each satellite. • To move a satellite configuration up on the list of configurations, select the configuration and click Move Up. • To move a satellite configuration down on the list of configurations, ...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,067
Large Scale VPN (LSVPN) Prepare the Satellite to Join the LSVPN To participate in the LSVPN, the satellites require a minimal amount of configuration. Because the required configuration is minimal, you can pre-configure the satellites before shipping them to your branch offices for installation. STEP 1 | Configure a La...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,068
Large Scale VPN (LSVPN) STEP 3 | If you generated the portal server certificate using a Root CA that is not trusted by the satellites (for example, if you used self-signed certificates), import the root CA certificate used to issue the portal server certificate. The root CA certificate is required to enable the satelli...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,069
Large Scale VPN (LSVPN) STEP 5 | (Optional) Configure the satellite to publish local routes to the gateway. Pushing routes to the gateway enables traffic to the subnets local to the satellite via the gateway. However, you must also configure the gateway to accept the routes as detailed in Configure GlobalProtect Gatewa...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,070
Large Scale VPN (LSVPN) Verify the LSVPN Configuration After configuring the portal, gateways, and satellites, verify that the satellites are able to connect to the portal and gateway and establish VPN tunnels with the gateway(s). STEP 1 | Verify satellite connectivity with portal. From the firewall hosting the portal,...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,071
Large Scale VPN (LSVPN) LSVPN Quick Configs The following sections provide step-by-step instructions for configuring some common GlobalProtect LSVPN deployments: • Basic LSVPN Configuration with Static Routing • Advanced LSVPN Configuration with Dynamic Routing • Advanced LSVPN Configuration with iBGP Basic LSVPN Confi...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,072
Large Scale VPN (LSVPN) STEP 3 | Create the Security policy rule to enable traffic flow between the VPN zone where the tunnel terminates (lsvpn-tun) and the trust zone where the corporate applications reside (L3- Trust). See Create a Security Policy Rule. STEP 4 | Assign an SSL/TLS Service profile to the portal/gateway...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,073
Large Scale VPN (LSVPN) STEP 8 | Configure the Portal. Select Network > GlobalProtect > Portal and Add a configuration. This example requires the following portal configuration: • Interface—ethernet1/11 • IP Address—203.0.113.11/24 • SSL/TLS Server Profile—lsvpnserver • Authentication Profile—lsvpn-sat STEP 9 | Define ...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,074
Large Scale VPN (LSVPN) • Manual assignment of IP addresses to tunnel interfaces on all gateways and satellites. • Configuration of OSPF point-to-multipoint (P2MP) on the virtual router on all gateways and satellites. In addition, as part of the OSPF configuration on each gateway, you must manually define the tunnel IP...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,075
Large Scale VPN (LSVPN) STEP 2 | Configure the dynamic routing protocol on the gateway. To configure OSPF on the gateway: 1. Select Network > Virtual Routers and select the virtual router associated with your VPN interfaces. 2. On the Areas tab, click Add to create the backbone area, or, if it is already configured, cl...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,076
Large Scale VPN (LSVPN) Advanced LSVPN Configuration with iBGP This use case illustrates how GlobalProtect LSVPN securely connects distributed office locations with primary and disaster recovery data centers that house critical applications for users and how internal border gateway protocol (iBGP) eases deployment and ...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,077
Large Scale VPN (LSVPN) STEP 1 | Create Interfaces and Zones for the LSVPN. Portal and Primary gateway: • Zone: LSVPN-Untrust-Primary • Interface: ethernet1/21 • IPv4: 172.16.22.1/24 • Zone: L3-Trust • Interface: ethernet1/23 • IPv4: 200.99.0.1/16 Backup gateway: • Zone: LSVPN-Untrust-Primary • Interface: ethernet1/5 •...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,078
Large Scale VPN (LSVPN) STEP 3 | Enable SSL Between GlobalProtect LSVPN Components. The gateway uses the self-signed root certificate authority (CA) to issue certificates for the satellites in a GlobalProtect LSVPN. Because one firewall houses the portal and primary gateway, a single certificate is used for authenticat...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,079
Large Scale VPN (LSVPN) single satellite configuration is needed. Satellites are matched based on their serial numbers, so no satellites will need to authenticate as a user. 6. On Satellite > Network Settings, define the pool of IP address to assign to the tunnel interface on the satellite once the VPN connection is es...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,080
Large Scale VPN (LSVPN) STEP 6 | Prepare the Satellite to Join the LSVPN. The configuration shown is a sample of a single satellite. Repeat this configuration each time you add a new satellite to the LSVPN deployment. 1. Configure a tunnel interface as the tunnel endpoint for the VPN connection to the gateways. 2. Set ...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,081
Large Scale VPN (LSVPN) STEP 8 | Verify the LSVPN Configuration. STEP 9 | (Optional) Add a new site to the LSVPN deployment. 1. Select Network > GlobalProtect > Portals > GlobalProtect Portal > Satellite Configuration > GlobalProtect Satellite > Devices to add the serial number of the new satellite to the GlobalProtect...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,082
Policy Policies allow you to enforce rules and take action. The different types of policy rules that you can create on the firewall are: Security, NAT, Quality of Service (QoS), Policy Based Forwarding (PBF), Decryption, Application Override, Authentication, Denial of Service (DoS), and Zone protection policies. All th...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,083
Policy • Identify Users Connected through a Proxy Server • Policy-Based Forwarding • Application Override Policy • Test Policy Rules PAN-OS® Administrator’s Guide Version 10.2 1084 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,084
Policy Policy Types The Palo Alto Networks next-generation firewall supports a variety of policy types that work together to safely enable applications on your network. For all policy types, when you Enforce Policy Rule Description, Tag, and Audit Comment, you can use the audit comment archive to view how a policy rule...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,085
Policy Policy Type Description DoS Protection Identify potential denial-of-service (DoS) attacks and take protective action in response to rule matches. For more details, see DoS Protection Profiles. PAN-OS® Administrator’s Guide Version 10.2 1086 ©2025 Palo Alto Networks, Inc.
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,086
Policy Security Policy Security policy protects network assets from threats and disruptions and helps to optimally allocate network resources for enhancing productivity and efficiency in business processes. On a Palo Alto Networks firewall, individual Security policy rules determine whether to block or allow a session ...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,087
Policy Required/ Optional Field Description Name A label (up to 63 characters) that identifies the rule. UUID The Universally Unique Identifier (UUID) is a distinct 32-character string that permanently identifies rules so that you can track a rule regardless of any changes to it, such as the name. Rule Type Specifies w...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,088
Policy Required/ Optional Field Description unresponsive to the user. For more details, see Security Policy Actions. Tag A keyword or phrase that allows you to filter security rules. This is handy when you have defined many rules and wish to then review those that are tagged with a keyword such as IT-sanctioned applica...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,089
Policy Required/ Optional Field Description To block or allow traffic based on URL category, you must apply a URL Filtering profile to the security policy rules. Define the URL Category as Any and attach a URL Filtering profile to the security policy. See Set Up a Basic Security Policy for information on using the defa...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf
1,090
Policy helpful for data center firewalls serving many devices. You won’t have to manage an unnecessarily large number of address objects to cover all the matching IP addresses or use less restrictive Security policy rules than you need due to IP address capacity constraints. For example, suppose you use the IPv4 addres...
https://docs.paloaltonetworks.com/content/dam/techdocs/en_US/pdf/pan-os/10-2/pan-os-admin/pan-os-admin.pdf