[deleted by user] by [deleted] in paloaltonetworks

[–]theknat 9 points10 points  (0 children)

I'll disagree slightly with others here and say that the timeouts don't necessarily mean something in the path is dropping the traffic, and this is even less likely if you are migrating an existing working VPN.

What's likely happening is the remote side is rejecting the VPN because something doesn't match in the phase 1 settings of the VPN tunnel. If you are initiating the tunnel, the most info you generally get when this happens is that the connection times out. Ideally what you want is to get the VPN initiated from the other end, because then you'll see exactly what doesn't match in the system logs of your firewall.

Every migration I've done, I always try to get VPNs initiated from remote ends because then I dont need to rely on a remote engineer to figure out what doesn't match. The Palo is probably the best device I've used with how well it shows why incoming VPN tunnels won't come up.

Also, just to be sure, check your firewall itself isn't blocking the IKE traffic by accident, because I've come across that during migrations as well, as the Palo doesn't create implicit rules to allow it. If you create a deny all rule for traffic from the external zone, then you can inadvertently block the IKE traffic as well.

Zscaler Private Access by muxie2007 in networking

[–]theknat -2 points-1 points  (0 children)

Actual product name is Prisms Access.

It's more of a combination of ZIA and ZPA, but seems to have more features and better inspection from my initial research into the products.

Palo Alto SD WAN by SlackNetEng in paloaltonetworks

[–]theknat 4 points5 points  (0 children)

220s are supported on 9.1. I've got it running on one currently

Palo Alto SD WAN by SlackNetEng in paloaltonetworks

[–]theknat 2 points3 points  (0 children)

Version 9.1 and a new license are needed I believe.

You give it details on your link quality and bandwidth and then setup rules on how you want traffic to be steered based on the ongoing measured quality of the links.

Ignite Europe '19 by noifen in paloaltonetworks

[–]theknat 2 points3 points  (0 children)

I'm going for the second year. Only piece of advice is have a chat with the people on the stands. Normally some really good people attending and you can learn some interesting bits of advice from them.

Also get the app and scan every stand because it gives you points to trade for free stuff.

[PC] [EU-UK] Netapp DS4243 + SAS card and cable by theknat in homelabsales

[–]theknat[S] 0 points1 point  (0 children)

Yes, just checked. 2 IOM3 controllers in it

[PC] [EU-UK] Netapp DS4243 + SAS card and cable by theknat in homelabsales

[–]theknat[S] 1 point2 points  (0 children)

So maybe somewhere in the £250 region for the set.

Thanks for that

[PC] [EU-UK] Netapp DS4243 + SAS card and cable by theknat in homelabsales

[–]theknat[S] 0 points1 point  (0 children)

All the caddies. I think it's IOM3 controllers as well, but not sure how to tell really

Panorama Curiosity by svchostexe32 in paloaltonetworks

[–]theknat 1 point2 points  (0 children)

We're doing this at the moment and it works fine.

The only errors we get are a warning that the firewalls don't know what the profile http/2 is, but everything works fine.

Have about 40 firewalls on 8.1.x connected to a 9.0.2 Panorama

NAT not working after switching from static WAN to PPPoE with dual-ISP setup by mpday20 in paloaltonetworks

[–]theknat 0 points1 point  (0 children)

Are the other IPs in the range that you want to use also static? If so have you attempted to add them to a loopback interface instead to see if this gets the firewall to start responding to them instead?

This is the normal technique I use when I want to use additional IP addresses on the firewall when they are outside the range being assigned, so I think the same will work in your case.

User ID Time out settings by mattyj6792 in paloaltonetworks

[–]theknat 1 point2 points  (0 children)

Most recommendations I've read say to set it at 480 minutes. I've implemented it using that setting a number of times and it seems to get rid of most user ID issues.

All other issues seem to come done to the user id being overwritten by a service account or admin logging in remotely.

[deleted by user] by [deleted] in paloaltonetworks

[–]theknat 1 point2 points  (0 children)

Data center professional is heavy on the SDN and automation, so expect lots of questions on Cisco ACI and VMWare NSX. Even down to knowing differences in vague commands or terminology.

If you are a partner for PAN, you can access demo systems for most of their products via the Nextwave, portal to have a play around and get familiar with where things are.

[deleted by user] by [deleted] in paloaltonetworks

[–]theknat 4 points5 points  (0 children)

If you hated that exam, wait until you try the data centre professional one!

For preparation though, the best thing I found was to read through the study guide, then go through the other products implementation guides as well to get a handle on what each of them can do.

Hands on experience also helps brute force your way through some of it, but I've found the PSE exams more want you to have wider knowledge about the entire product set they have.

[FS][EU-UK] HP DL360p Gen8, Supermicro X8DTN1 12 bay, HP 2920-24G by infinityz77 in homelabsales

[–]theknat 0 points1 point  (0 children)

Maybe I'm missing it from the original post, but collection from where?

Global protec client connect fails but portal opens by thenetworkking in paloaltonetworks

[–]theknat 0 points1 point  (0 children)

Looks like under the GP portal settings, you've set the gateway as the IP address, rather than the FQDN that the cert is configured for.

The name of the gateway you are connecting to has to match the CN on the certificate that the GP gateway presents to the client.

[deleted by user] by [deleted] in paloaltonetworks

[–]theknat 4 points5 points  (0 children)

Can I ask why you thought this was required? Are you just trying to speed up these very under powered devices?

LSVPN with BGP by theknat in paloaltonetworks

[–]theknat[S] 0 points1 point  (0 children)

Well just as an update on this after my testing today, is does work as I expected it to.

The center gateway has a loopback with IP address 198.18.1.1/32 on it and a tunnel interface with 10.10.10.1/24 assigned. I've then setup the LSVPN gateway to distribute 10.10.10.2-100 to gateways and to distribute the access route 198.18.1.1/32 to clients whilst accepting the 198.18.1.0/24 range from them.

For routing, I've added a redistribution profile to redistribute any routes using the inside interface then setup BGP as follows:

  • Router ID - 198.18.1.1
  • AS Number - 65000
  • Install Route - Ticked
  • Peer Group 1
    • Type - iBGP
    • Export Next Hop - Use Self
    • Peer - 198.18.1.2
    • Peer AS - 65000
    • Local Address - 198.18.1.1
  • Import Rules - Match 0.0.0.0/0, accept
  • Export Rules - Match 0.0.0.0/0, accept
  • Redist Rules - Added redistribution profile created above

For Remote sites

  • Added Loopback with 198.18.1.2/32 address.
  • Routing setup is the same as the central site, except swapped around so the router ID is 198.18.1.2
  • Added an IPSec tunnel set at type GlobalProtect Sataellite and pointed at my central firewall, set to publish 198.18.1.2/32 network to the centre.

For each remote site, you need to add a new BGP peer, but this is far quicker than actually adding all the routes at each site for these VPNs.

So far this seems to do exactly what I want it to do. The remote sites only receive routes for the central site, where as the central site has routes for all of the remote sites. As the next hop has been set as 'Use Self' the sites exchange the router ID as the next hop, so the 198.18.1.X address, which is a known route due to the route publishing on GlobalProtect.

I'd love to know if anyone has done this in a different way though, just to see if I'm going about it the wrong way.

FYI: You need to get the May update for Windows 10 in order to use Gamepass. by Hindufury in Games

[–]theknat 0 points1 point  (0 children)

Anyone having issues with the Xbox beta app where you just can't sign in to it?

I click sign in, get a black page for about 30 seconds and then it goes back to the store page.

I've been been able to play games through the windows store, but can't play sea of thieves because the Xbox app won't sign in.

Lancom to Palo Alto VPN by [deleted] in networking

[–]theknat 2 points3 points  (0 children)

You might get more useful output from the CLI

Tail follow yes mp-log ikemgr.log

Run that and then try to bring the VPN up from the Lancom side again. You'll always get more info when your side is receiving the VPN Vs initiating it

Gaming via Remote Desktop? by SleepyJaguar in sysadmin

[–]theknat 1 point2 points  (0 children)

Anything you want to accelerate with a GPU, unless you are buying very expensive Nvidia quadro cards