Site-to-Site VPN with Static Routing (2024)

Site-to-Site VPN with Static Routing

Updated on

Apr 4, 2024

Focus

Download PDF

Updated on

Apr 4, 2024

Focus

  1. Home
  2. Network Security
  3. Site-to-Site VPN Configuration Examples
  4. Site-to-Site VPN with Static Routing

Download PDF

Network Security

Table of Contents

Previous Site-to-Site VPN Configuration Examples
Next Site-to-Site VPN with OSPF

Where Can I Use This?

What Do I Need?

  • PAN-OS

No license required

The following example shows a VPN connection between two sites that use static routes. Without dynamic routing, the tunnel interfaces on VPN Peer A and VPN Peer B don’t require an IP address because the firewall automatically uses the tunnel interface as the next hop for routing traffic across the sites. However, to enable tunnel monitoring, a static IP address has been assigned to each tunnel interface.

Site-to-Site VPN with Static Routing (1)

  1. Configure a Layer 3 interface.

    This interface is used for the IKE phase-1 tunnel.

    1. Select

      Network

      Interfaces

      Ethernet

      andthen select the interface you want to configure for VPN.

    2. Select

      Layer3

      from the

      InterfaceType

      .

    3. On the

      Config

      tab, select the

      SecurityZone

      to which the interface belongs:

      • The interface must be accessible from a zone outsideof your trust network. Consider creating a dedicated VPN zone forvisibility and control over your VPN traffic.

      • If you haven’t yet created the zone, select

        New Zone

        from the

        Security Zone

        , define a

        Name

        for the new zone, and then click

        OK

        .

    4. Select the

      Virtual Router

      touse.

    5. To assign an IP address to the interface, select the

      IPv4

      tab,click

      Add

      in the IP section, and enter theIP address and network mask to assign to the interface, for example 192.168.210.26/24.

    6. To save the interface configuration, click

      OK

      .

      In this example, the configuration for VPN Peer A is:

      • Interface

        —ethernet1/7

      • Security Zone

        —untrust

      • Virtual Router

        —default

      • IPv4

        —192.168.210.26/24

      Theconfiguration for VPN Peer B is:

  2. Create a tunnel interface and attach it to a virtualrouter and security zone.

    1. Select

      Network

      Interfaces

      Tunnel

      andclick

      Add

      .

    2. In the

      Interface Name

      field,specify a numeric suffix, such as

      .1

      .

    3. On the

      Config

      tab, expand the

      SecurityZone

      to define the zone as follows:

      • To use your trust zone as the termination pointfor the tunnel, select the zone.

      • (

        Recommended

        ) To create a separate zone for VPN tunnel termination, click

        New Zone

        . In the Zone dialog, define a

        Name

        for a new zone (for example vpn-tun), and then click

        OK

        .

    4. Select the

      Virtual Router

      .

    5. (

      Optional

      ) Assign an IP address to the tunnelinterface, select the

      IPv4

      or

      IPv6

      tab,click

      Add

      in the IP section, and enter theIP address and network mask to assign to the interface.

      With static routes, the tunnel interface doesn’t require an IP address. For traffic that is destined to a specified subnet/IP address, the tunnel interface will automatically become the next hop. Consider adding an IP address if you want to enable tunnel monitoring.

    6. To save the interface configuration, click

      OK

      .

      In this example, the configuration for VPN Peer A is:

      • Interface

        —tunnel.10

      • Security Zone

        —vpn_tun

      • Virtual Router

        —default

      • IPv4

        —172.19.9.2/24

      Theconfiguration for VPN Peer B is:

      • Interface

        —tunnel.11

      • Security Zone

        —vpn_tun

      • Virtual Router

        —default

      • IPv4

        —192.168.69.2/24

  3. Configure a static route, on the virtual router, to thedestination subnet.

    1. Select

      Network

      Virtual Router

      and click therouter you defined in the prior step.

    2. Select

      Static Route

      , click

      Add

      ,and enter a new route to access the subnet that is at the otherend of the tunnel.

      In this example, the configuration for VPN Peer A is:

      • Destination

        —192.168.69.0/24

      • Interface

        —tunnel.10

      Theconfiguration for VPN Peer B is:

      • Destination

        —172.19.9.0/24

      • Interface

        —tunnel.11

  4. Set up the crypto profiles (IKE Crypto profile for phase 1 and IPSec Crypto profile for phase 2).

    Complete this task on both peers and make sure to set identical values.

    1. Select

      Network

      Network Profiles

      IKE Crypto

      . In this example, we use the default profile.

    2. Select

      Network

      Network Profiles

      IPSec Crypto

      . In this example, we use the default profile.

  5. Set up the IKE Gateway.

    1. Select

      Network

      Network Profiles

      IKE Gateway

      .

    2. Click

      Add

      and configure theoptions in the

      General

      tab.

      In this example, the configuration for VPN Peer A is:

      • Interface

        —ethernet1/7

      • Local IP address

        —192.168.210.26/24

      • Peer IP type/address

        —static/192.168.210.120

      • Preshared keys

        —enter a value

      • Local identification

        —None; this meansthat the local IP address will be used as the local identificationvalue.

      • The configuration for VPN Peer B is:

      • Interface

        —ethernet1/11

      • Local IP address

        —192.168.210.120/24

      • Peer IP type/address

        —static/192.168.210.26

      • Preshared keys

        —enter same value ason Peer A

      • Local identification

        —None

    3. Select

      Advanced Phase 1 Options

      andselect the IKE Crypto profile you created earlier to use for IKEphase 1.

  6. Set up the IPSec Tunnel.

    1. Select

      Network

      IPSec Tunnels

      .

    2. Click

      Add

      and configure theoptions in the

      General

      tab.

      In this example, the configuration for VPN Peer A is:

      • Tunnel Interface

        —tunnel.10

      • Type

        —Auto Key

      • IKE Gateway

        —Select the IKE Gatewaydefined above.

      • IPSec Crypto Profile

        —Select the IPSec Crypto profile defined in step 4.

      Theconfiguration for VPN Peer B is:

      • TunnelInterface

        —tunnel.11

      • Type

        —Auto Key

      • IKE Gateway

        —Select the IKE Gatewaydefined above.

      • IPSec Crypto Profile

        —Select the IPSec crypto defined in step 4.

    3. (

      Optional

      ) Select

      Show AdvancedOptions

      , select

      Tunnel Monitor

      ,and specify a Destination IP address to ping for verifying connectivity.Typically, the tunnel interface IP address for the VPN Peer is used.

    4. (

      Optional

      ) To define the action on failureto establish connectivity, see Definea Tunnel Monitoring Profile.

  7. Create policy rules to allow traffic between the sites (subnets).

    1. Select

      Policies

      Security

      .

    2. Create rules to allow traffic between the untrust and the vpn-tun zone and the vpn-tun and the untrust zone for traffic originating from specified source and destination IP addresses.

  8. Commit any pending configuration changes.

    Click

    Commit

    .

  9. Troubleshoot Your IPSec VPN Tunnel Connection.

    See also Viewthe Status of the Tunnels.

"); adBlockNotification.append($( "Thanks for visiting https://docs.paloaltonetworks.com. To improve your experience when accessing content across our site, please add the domain to the allow list on your ad blocker application." )); let adBlockNotificationClose = $("x"); adBlockNotification.prepend(adBlockNotificationClose) $('body').append(adBlockNotification); setTimeout(function (e) { adBlockNotification.addClass('open'); }, 10); adBlockNotificationClose.on('click', function (e) { adBlockNotification.removeClass('open'); }) } }, 5000)

Previous Site-to-Site VPN Configuration Examples
Next Site-to-Site VPN with OSPF

Recommended For You

{{ if(( raw.pantechdoctype != "techdocsAuthoredContentPage" && raw.objecttype != "Knowledge" && raw.pancommonsourcename != "TD pan.dev Docs")) { }} {{ if (raw.panbooktype) { }} {{ if (raw.panbooktype.indexOf('PANW Yellow Theme') != -1){ }}

{{ } else if (raw.panbooktype.indexOf('PANW Green Theme') != -1){ }}

{{ } else if (raw.panbooktype.indexOf('PANW Blue Theme') != -1){ }}

{{ } else { }}

{{ } }} {{ } else { }}

{{ } }} {{ } else { }} {{ if (raw.pantechdoctype == "pdf"){ }}

{{ } else if (raw.objecttype == "Knowledge") { }}

{{ } else if (raw.pancommonsourcename == "TD pan.dev Docs") { }}

{{ } else if (raw.pancommonsourcename == "LIVEcommunity Public") { }}

{{ } else { }}

{{ } }} {{ } }}

{{ if (raw.pancommonsourcename == "LIVEcommunity Public") { }}

{{ if (raw.pantechdoctype == "pdf"){ }}

{{ } }}

{{ } else { }}

{{ if (raw.pantechdoctype == "pdf"){ }}

{{ } }}

{{ } }}

{{ if (raw.pancommonsourcename != "TD pan.dev Docs"){ }} {{ if (raw.pandevdocsosversion){ }} {{ } else { }} {{ if ((_.size(raw.panosversion)>0) && !(_.isNull(raw.panconversationid )) && (!(_.isEmpty(raw.panconversationid ))) && !(_.isNull(raw.otherversions ))) { }} (See other versions) {{ } }} {{ } }} {{ } }}

{{ } }}{{ if (raw.pantechdoctype == "bookDetailPage"){ }}

{{ } }}{{ if (raw.pantechdoctype == "bookLandingPage"){ }}

{{ } }}{{ if (raw.pantechdoctype == "productLanding"){ }}

{{ } }}{{ if (raw.pantechdoctype == "techdocsAuthoredContentPage"){ }}

{{ } }}{{ if (raw.pantechdoctype == "pdf"){ }}

{{ } }}

© 2024 Palo Alto Networks, Inc. All rights reserved.

Site-to-Site VPN with Static Routing (2024)
Top Articles
Insistence to live separately from in-laws on whimsical grounds amounts to cruelty: Delhi HC 
42 top Ethereum Companies and Startups in United States in September 2024
Swimgs Yuzzle Wuzzle Yups Wits Sadie Plant Tune 3 Tabs Winnie The Pooh Halloween Bob The Builder Christmas Autumns Cow Dog Pig Tim Cook’s Birthday Buff Work It Out Wombats Pineview Playtime Chronicles Day Of The Dead The Alpha Baa Baa Twinkle
Hannaford Weekly Flyer Manchester Nh
Wordscapes Level 5130 Answers
DEA closing 2 offices in China even as the agency struggles to stem flow of fentanyl chemicals
Caroline Cps.powerschool.com
Tabler Oklahoma
The Many Faces of the Craigslist Killer
Aktuelle Fahrzeuge von Autohaus Schlögl GmbH & Co. KG in Traunreut
Truck Toppers For Sale Craigslist
finaint.com
Kvta Ventura News
Images of CGC-graded Comic Books Now Available Using the CGC Certification Verification Tool
Katherine Croan Ewald
R Personalfinance
Craigslist Missoula Atv
CDL Rostermania 2023-2024 | News, Rumors & Every Confirmed Roster
Scout Shop Massapequa
Menards Eau Claire Weekly Ad
Georgia Cash 3 Midday-Lottery Results & Winning Numbers
Dr Ayad Alsaadi
‘The Boogeyman’ Review: A Minor But Effectively Nerve-Jangling Stephen King Adaptation
Japanese Mushrooms: 10 Popular Varieties and Simple Recipes - Japan Travel Guide MATCHA
Imouto Wa Gal Kawaii - Episode 2
Aspenx2 Newburyport
Netwerk van %naam%, analyse van %nb_relaties% relaties
Https E22 Ultipro Com Login Aspx
Soul Eater Resonance Wavelength Tier List
Possum Exam Fallout 76
Chicago Pd Rotten Tomatoes
Gina's Pizza Port Charlotte Fl
Cbs Trade Value Chart Week 10
Workboy Kennel
Fox And Friends Mega Morning Deals July 2022
Pnc Bank Routing Number Cincinnati
Terrier Hockey Blog
Craigslist Lakeside Az
Studentvue Columbia Heights
Latest Nigerian Music (Next 2020)
Costco Gas Foster City
Gamestop Store Manager Pay
Booknet.com Contract Marriage 2
'The Nun II' Ending Explained: Does the Immortal Valak Die This Time?
My Gsu Portal
Access to Delta Websites for Retirees
Washington Craigslist Housing
Spn 3464 Engine Throttle Actuator 1 Control Command
Definition of WMT
Sj Craigs
Electronics coupons, offers & promotions | The Los Angeles Times
Coldestuknow
Latest Posts
Article information

Author: Rubie Ullrich

Last Updated:

Views: 5501

Rating: 4.1 / 5 (72 voted)

Reviews: 95% of readers found this page helpful

Author information

Name: Rubie Ullrich

Birthday: 1998-02-02

Address: 743 Stoltenberg Center, Genovevaville, NJ 59925-3119

Phone: +2202978377583

Job: Administration Engineer

Hobby: Surfing, Sailing, Listening to music, Web surfing, Kitesurfing, Geocaching, Backpacking

Introduction: My name is Rubie Ullrich, I am a enthusiastic, perfect, tender, vivacious, talented, famous, delightful person who loves writing and wants to share my knowledge and understanding with you.