Site-to-Site VPN with Static Routing (2024)

Site-to-Site VPN with Static Routing

Updated on

Apr 4, 2024

Focus

Download PDF

Updated on

Apr 4, 2024

Focus

  1. Home
  2. Network Security
  3. Site-to-Site VPN Configuration Examples
  4. Site-to-Site VPN with Static Routing

Download PDF

Network Security

Table of Contents

Previous Site-to-Site VPN Configuration Examples
Next Site-to-Site VPN with OSPF

Where Can I Use This?

What Do I Need?

  • PAN-OS

No license required

The following example shows a VPN connection between two sites that use static routes. Without dynamic routing, the tunnel interfaces on VPN Peer A and VPN Peer B don’t require an IP address because the firewall automatically uses the tunnel interface as the next hop for routing traffic across the sites. However, to enable tunnel monitoring, a static IP address has been assigned to each tunnel interface.

Site-to-Site VPN with Static Routing (1)

  1. Configure a Layer 3 interface.

    This interface is used for the IKE phase-1 tunnel.

    1. Select

      Network

      Interfaces

      Ethernet

      andthen select the interface you want to configure for VPN.

    2. Select

      Layer3

      from the

      InterfaceType

      .

    3. On the

      Config

      tab, select the

      SecurityZone

      to which the interface belongs:

      • The interface must be accessible from a zone outsideof your trust network. Consider creating a dedicated VPN zone forvisibility and control over your VPN traffic.

      • If you haven’t yet created the zone, select

        New Zone

        from the

        Security Zone

        , define a

        Name

        for the new zone, and then click

        OK

        .

    4. Select the

      Virtual Router

      touse.

    5. To assign an IP address to the interface, select the

      IPv4

      tab,click

      Add

      in the IP section, and enter theIP address and network mask to assign to the interface, for example 192.168.210.26/24.

    6. To save the interface configuration, click

      OK

      .

      In this example, the configuration for VPN Peer A is:

      • Interface

        —ethernet1/7

      • Security Zone

        —untrust

      • Virtual Router

        —default

      • IPv4

        —192.168.210.26/24

      Theconfiguration for VPN Peer B is:

  2. Create a tunnel interface and attach it to a virtualrouter and security zone.

    1. Select

      Network

      Interfaces

      Tunnel

      andclick

      Add

      .

    2. In the

      Interface Name

      field,specify a numeric suffix, such as

      .1

      .

    3. On the

      Config

      tab, expand the

      SecurityZone

      to define the zone as follows:

      • To use your trust zone as the termination pointfor the tunnel, select the zone.

      • (

        Recommended

        ) To create a separate zone for VPN tunnel termination, click

        New Zone

        . In the Zone dialog, define a

        Name

        for a new zone (for example vpn-tun), and then click

        OK

        .

    4. Select the

      Virtual Router

      .

    5. (

      Optional

      ) Assign an IP address to the tunnelinterface, select the

      IPv4

      or

      IPv6

      tab,click

      Add

      in the IP section, and enter theIP address and network mask to assign to the interface.

      With static routes, the tunnel interface doesn’t require an IP address. For traffic that is destined to a specified subnet/IP address, the tunnel interface will automatically become the next hop. Consider adding an IP address if you want to enable tunnel monitoring.

    6. To save the interface configuration, click

      OK

      .

      In this example, the configuration for VPN Peer A is:

      • Interface

        —tunnel.10

      • Security Zone

        —vpn_tun

      • Virtual Router

        —default

      • IPv4

        —172.19.9.2/24

      Theconfiguration for VPN Peer B is:

      • Interface

        —tunnel.11

      • Security Zone

        —vpn_tun

      • Virtual Router

        —default

      • IPv4

        —192.168.69.2/24

  3. Configure a static route, on the virtual router, to thedestination subnet.

    1. Select

      Network

      Virtual Router

      and click therouter you defined in the prior step.

    2. Select

      Static Route

      , click

      Add

      ,and enter a new route to access the subnet that is at the otherend of the tunnel.

      In this example, the configuration for VPN Peer A is:

      • Destination

        —192.168.69.0/24

      • Interface

        —tunnel.10

      Theconfiguration for VPN Peer B is:

      • Destination

        —172.19.9.0/24

      • Interface

        —tunnel.11

  4. Set up the crypto profiles (IKE Crypto profile for phase 1 and IPSec Crypto profile for phase 2).

    Complete this task on both peers and make sure to set identical values.

    1. Select

      Network

      Network Profiles

      IKE Crypto

      . In this example, we use the default profile.

    2. Select

      Network

      Network Profiles

      IPSec Crypto

      . In this example, we use the default profile.

  5. Set up the IKE Gateway.

    1. Select

      Network

      Network Profiles

      IKE Gateway

      .

    2. Click

      Add

      and configure theoptions in the

      General

      tab.

      In this example, the configuration for VPN Peer A is:

      • Interface

        —ethernet1/7

      • Local IP address

        —192.168.210.26/24

      • Peer IP type/address

        —static/192.168.210.120

      • Preshared keys

        —enter a value

      • Local identification

        —None; this meansthat the local IP address will be used as the local identificationvalue.

      • The configuration for VPN Peer B is:

      • Interface

        —ethernet1/11

      • Local IP address

        —192.168.210.120/24

      • Peer IP type/address

        —static/192.168.210.26

      • Preshared keys

        —enter same value ason Peer A

      • Local identification

        —None

    3. Select

      Advanced Phase 1 Options

      andselect the IKE Crypto profile you created earlier to use for IKEphase 1.

  6. Set up the IPSec Tunnel.

    1. Select

      Network

      IPSec Tunnels

      .

    2. Click

      Add

      and configure theoptions in the

      General

      tab.

      In this example, the configuration for VPN Peer A is:

      • Tunnel Interface

        —tunnel.10

      • Type

        —Auto Key

      • IKE Gateway

        —Select the IKE Gatewaydefined above.

      • IPSec Crypto Profile

        —Select the IPSec Crypto profile defined in step 4.

      Theconfiguration for VPN Peer B is:

      • TunnelInterface

        —tunnel.11

      • Type

        —Auto Key

      • IKE Gateway

        —Select the IKE Gatewaydefined above.

      • IPSec Crypto Profile

        —Select the IPSec crypto defined in step 4.

    3. (

      Optional

      ) Select

      Show AdvancedOptions

      , select

      Tunnel Monitor

      ,and specify a Destination IP address to ping for verifying connectivity.Typically, the tunnel interface IP address for the VPN Peer is used.

    4. (

      Optional

      ) To define the action on failureto establish connectivity, see Definea Tunnel Monitoring Profile.

  7. Create policy rules to allow traffic between the sites (subnets).

    1. Select

      Policies

      Security

      .

    2. Create rules to allow traffic between the untrust and the vpn-tun zone and the vpn-tun and the untrust zone for traffic originating from specified source and destination IP addresses.

  8. Commit any pending configuration changes.

    Click

    Commit

    .

  9. Troubleshoot Your IPSec VPN Tunnel Connection.

    See also Viewthe Status of the Tunnels.

"); adBlockNotification.append($( "Thanks for visiting https://docs.paloaltonetworks.com. To improve your experience when accessing content across our site, please add the domain to the allow list on your ad blocker application." )); let adBlockNotificationClose = $("x"); adBlockNotification.prepend(adBlockNotificationClose) $('body').append(adBlockNotification); setTimeout(function (e) { adBlockNotification.addClass('open'); }, 10); adBlockNotificationClose.on('click', function (e) { adBlockNotification.removeClass('open'); }) } }, 5000)

Previous Site-to-Site VPN Configuration Examples
Next Site-to-Site VPN with OSPF

Recommended For You

{{ if(( raw.pantechdoctype != "techdocsAuthoredContentPage" && raw.objecttype != "Knowledge" && raw.pancommonsourcename != "TD pan.dev Docs")) { }} {{ if (raw.panbooktype) { }} {{ if (raw.panbooktype.indexOf('PANW Yellow Theme') != -1){ }}

{{ } else if (raw.panbooktype.indexOf('PANW Green Theme') != -1){ }}

{{ } else if (raw.panbooktype.indexOf('PANW Blue Theme') != -1){ }}

{{ } else { }}

{{ } }} {{ } else { }}

{{ } }} {{ } else { }} {{ if (raw.pantechdoctype == "pdf"){ }}

{{ } else if (raw.objecttype == "Knowledge") { }}

{{ } else if (raw.pancommonsourcename == "TD pan.dev Docs") { }}

{{ } else if (raw.pancommonsourcename == "LIVEcommunity Public") { }}

{{ } else { }}

{{ } }} {{ } }}

{{ if (raw.pancommonsourcename == "LIVEcommunity Public") { }}

{{ if (raw.pantechdoctype == "pdf"){ }}

{{ } }}

{{ } else { }}

{{ if (raw.pantechdoctype == "pdf"){ }}

{{ } }}

{{ } }}

{{ if (raw.pancommonsourcename != "TD pan.dev Docs"){ }} {{ if (raw.pandevdocsosversion){ }} {{ } else { }} {{ if ((_.size(raw.panosversion)>0) && !(_.isNull(raw.panconversationid )) && (!(_.isEmpty(raw.panconversationid ))) && !(_.isNull(raw.otherversions ))) { }} (See other versions) {{ } }} {{ } }} {{ } }}

{{ } }}{{ if (raw.pantechdoctype == "bookDetailPage"){ }}

{{ } }}{{ if (raw.pantechdoctype == "bookLandingPage"){ }}

{{ } }}{{ if (raw.pantechdoctype == "productLanding"){ }}

{{ } }}{{ if (raw.pantechdoctype == "techdocsAuthoredContentPage"){ }}

{{ } }}{{ if (raw.pantechdoctype == "pdf"){ }}

{{ } }}

© 2024 Palo Alto Networks, Inc. All rights reserved.

Site-to-Site VPN with Static Routing (2024)
Top Articles
dYdX Chain Help Center
Créer un compte PCS en 2024
What Is Single Sign-on (SSO)? Meaning and How It Works? | Fortinet
Pollen Count Centreville Va
AllHere, praised for creating LAUSD’s $6M AI chatbot, files for bankruptcy
Mate Me If You May Sapir Englard Pdf
Mackenzie Rosman Leaked
Erika Kullberg Wikipedia
Beds From Rent-A-Center
Bluegabe Girlfriend
Rubfinder
Texas (TX) Powerball - Winning Numbers & Results
Audrey Boustani Age
123Moviescloud
How to Store Boiled Sweets
Evil Dead Rise Showtimes Near Regal Columbiana Grande
Pac Man Deviantart
SXSW Film & TV Alumni Releases – July & August 2024
Talbots.dayforce.com
Welcome to GradeBook
Utexas Iot Wifi
Fleet Farm Brainerd Mn Hours
Boxer Puppies For Sale In Amish Country Ohio
Znamy dalsze plany Magdaleny Fręch. Nie będzie nawet chwili przerwy
Egusd Lunch Menu
11526 Lake Ave Cleveland Oh 44102
Giantbodybuilder.com
UAE 2023 F&B Data Insights: Restaurant Population and Traffic Data
Why comparing against exchange rates from Google is wrong
The Latest: Trump addresses apparent assassination attempt on X
Delta Rastrear Vuelo
6465319333
Strange World Showtimes Near Regal Edwards West Covina
Serenity Of Lathrop - Manteca Photos
Craigslist Gigs Wichita Ks
What Does Code 898 Mean On Irs Transcript
Barstool Sports Gif
Man Stuff Idaho
Lacy Soto Mechanic
Ucsc Sip 2023 College Confidential
Rush Copley Swim Lessons
Quiktrip Maple And West
Child care centers take steps to avoid COVID-19 shutdowns; some require masks for kids
9:00 A.m. Cdt
Jackerman Mothers Warmth Part 3
Bbwcumdreams
Makemkv Key April 2023
Appsanywhere Mst
Service Changes and Self-Service Options
Loss Payee And Lienholder Addresses And Contact Information Updated Daily Free List Bank Of America
Latest Posts
Article information

Author: Rubie Ullrich

Last Updated:

Views: 5501

Rating: 4.1 / 5 (72 voted)

Reviews: 95% of readers found this page helpful

Author information

Name: Rubie Ullrich

Birthday: 1998-02-02

Address: 743 Stoltenberg Center, Genovevaville, NJ 59925-3119

Phone: +2202978377583

Job: Administration Engineer

Hobby: Surfing, Sailing, Listening to music, Web surfing, Kitesurfing, Geocaching, Backpacking

Introduction: My name is Rubie Ullrich, I am a enthusiastic, perfect, tender, vivacious, talented, famous, delightful person who loves writing and wants to share my knowledge and understanding with you.