How To Do an IPSec VPN Configuration Between PAN Firewall and Cisco ASA
Darshan K. Doshi describes how to configure IPSec VPN between Palo Alto and Cisco ASA. Read more …
Step by Step Guide: IPSec VPN Configuration
Between a PAN Firewall and Cisco ASA
To keep your business online and ensure critical devices, such as Check Point firewalls, meet operational excellence standards it is helpful to compare your environment to a third party data set. As part of the Indeni Automation Platform, customers have access to Indeni Insight which benchmarks adoption of the Check Point capabilities and user behavior to adhere to ITIL best practices.
+++
Overview:
This document describes the step by step guide on how to configure IPSec VPN and assumes the Palo Alto Firewall has at least 2 interfaces in Layer 3 mode. If you find this article helpful check out how you can automate your PAN network with Indeni.
High Level Diagram:
IP schema specification:
Steps to be followed on Palo Alto Networks Firewall for IPSec VPN Configuration
Go to Network > Tunnel Interface to create a new tunnel interface and assign the following parameters:
Name: tunnel.1
Virtual router: default
Please refer this article if you need any help to configure Virtual Router on Palo Alto Networks.
Zone: (select the layer 3 internal zone from which the traffic will originate)
Please refer this article if you need any help to configure Layer 3 interface on Palo Alto Networks.
Note: If the tunnel interface is in a zone different from the zone where the traffic will originate or depart, then a policy will need to be created to allow the traffic to flow from the source zone to the zone containing the tunnel interface.
Configure IPSec Phase – 1 configuration
To Network > Network Profiles > IKE Crypto Profile and define IKE Crypto (IKEv1 Phase-1) parameters.
(These parameters must match on the Cisco ASA firewall for the IKE Phase-1 negotiation to be successful)