Palo Alto Networks Tunnel Interfaces: Mastering IPsec, GRE, and GlobalProtect for PCNSE

Palo Alto Networks Tunnel Interfaces: The Foundation of Secure Connectivity

In the Palo Alto Networks ecosystem, Tunnel interfaces are fundamental logical Layer 3 interfaces. Their primary role is to serve as the entry and exit point for traffic that needs to be routed through various types of Virtual Private Network (VPN) tunnels. These are not physical interfaces but rather software constructs within PAN-OS that enable secure and flexible network segmentation and connectivity. Understanding their configuration and behavior is critical for the PCNSE certification and effective firewall administration.

Tunnel interfaces are versatile and are used as the terminating points for:

Core Characteristics and Configuration in PAN-OS

PCNSE/PCNSA Exam Note (Palo Alto Networks): Expect questions on the requirements for tunnel interface configuration, especially the mandatory assignment to a Virtual Router and Security Zone. Understand that without these, traffic will not flow. Also, know why IP addressing is critical for dynamic routing and tunnel monitoring.

Configuration is done in PAN-OS via Network > Interfaces > Tunnel .

Conceptual overview of a Palo Alto Networks Tunnel Interface and its key associations within PAN-OS.

Conceptual overview of a Palo Alto Networks Tunnel Interface and its key associations within PAN-OS.

Deep Dive: Tunnel Interfaces in Palo Alto Networks IPsec VPNs

Tunnel interfaces are the cornerstone of route-based IPsec VPNs on Palo Alto Networks firewalls. They provide a logical point to which traffic is routed before being encrypted and sent to the VPN peer.

Key Palo Alto Networks Components for IPsec VPNs

  1. IKE Gateway (Phase 1):
    • Configured under Network > Network Profiles > IKE Crypto (for crypto profiles) and Network > IKE Gateways .
    • Defines parameters for IKE Phase 1 negotiation: authentication method (Pre-Shared Key or Certificate), Diffie-Hellman group, encryption, hashing algorithms, and Dead Peer Detection (DPD) or tunnel monitoring.
    • Specifies local and peer identification (IP address, FQDN, User FQDN).
  2. IPsec Crypto Profile (Phase 2 Proposal):
    • Configured under Network > Network Profiles > IPsec Crypto .
    • Defines encryption and authentication algorithms (e.g., AES-256, SHA256), and the Encapsulating Security Payload (ESP) protocol for IKE Phase 2. Perfect Forward Secrecy (PFS) using DH groups can also be enabled here.
  3. Tunnel Interface (Logical Interface):
    • As described above, assigned to a Virtual Router and Security Zone.
    • Can have an IP address (highly recommended for route-based VPNs).
  4. IPsec Tunnel Configuration (Phase 2 Policy):
    • Configured under Network > IPsec Tunnels .
    • This is where everything ties together:
      • It references the IKE Gateway configured in step 1.
      • It references the Tunnel Interface created in step 3.
      • It selects an IPsec Crypto Profile for Phase 2 parameters.
      • Proxy IDs (Critical for "Interesting Traffic"):
        • In a route-based VPN, typically set to Local: 0.0.0.0/0 , Remote: 0.0.0.0/0 , Protocol: Any. This allows routing decisions to control what traffic enters the tunnel.
        • When connecting to a policy-based VPN peer (a device that uses specific network definitions, not routes, to define VPN traffic), you MUST configure Proxy IDs to match the peer's encryption domain. For example, Local: 192.168.1.0/24 , Remote: 10.10.0.0/16 . Mismatched Proxy IDs are a common cause of IKE Phase 2 failures.
        • Multiple Proxy IDs can be configured if needed to match a peer with multiple specific encryption domains.
      • Tunnel Monitor (Optional but Recommended): Allows the firewall to send probes (typically pings) to an IP address on the remote side of the tunnel. If replies are not received, the firewall can mark the tunnel as down and potentially reroute traffic or trigger alerts. The source IP for the monitor is often the local Tunnel Interface IP.
PCNSE/PCNSA Exam Note (Palo Alto Networks): Be very clear on the difference between route-based VPNs (Proxy ID usually 0.0.0.0/0 ) and interoperating with policy-based VPN peers (Proxy IDs must match specific subnets). Understand that the Tunnel Interface is the logical entry/exit point for traffic *before* encryption and *after* decryption.
Gotcha! (Palo Alto Networks): A common mistake is misconfiguring Proxy IDs when connecting to a third-party policy-based VPN. If Phase 1 completes but Phase 2 fails with "NO_PROPOSAL_CHOSEN" or similar errors, check Proxy IDs on both sides meticulously. PAN-OS system logs (filtered for `iked`) are invaluable here.

IPsec Traffic Flow with Tunnel Interfaces

  1. An outbound packet arrives at the firewall.
  2. A route lookup in the Virtual Router determines the egress interface is a tunnel.N interface.
  3. The packet is notionally passed to the tunnel.N interface.
  4. Security Policy lookup occurs: Source Zone (e.g., 'Trust') to Destination Zone (the zone of tunnel.N , e.g., 'VPN-Zone').
  5. If allowed by policy, the firewall identifies that tunnel.N is bound to an IPsec Tunnel configuration.
  6. The firewall checks if an IKE Phase 2 Security Association (SA) matching the packet's source/destination (as per Proxy ID) exists.
    • If no SA, and IKE Phase 1 SA is up, it initiates IKE Phase 2 negotiation.
    • If IKE Phase 1 is down, it initiates IKE Phase 1 negotiation.
  7. Once the IPsec SA is established, the original packet is encrypted and encapsulated according to the IPsec Crypto Profile (ESP).
  8. The new, encrypted packet (with an outer IP header matching the IKE Gateway local/peer IPs) is routed out the physical interface defined in the IKE Gateway.

For inbound encrypted traffic, the process is reversed: decapsulation, decryption, then the original inner packet is passed to the tunnel interface, a new session is created for the inner packet, and it's processed by Security Policy (Source Zone: 'VPN-Zone', Destination Zone based on routing of the inner packet).

> show vpn ike-sa gateway <ike-gateway-name>  // Verifies IKE Phase 1 status
> show vpn ipsec-sa tunnel <ipsec-tunnel-name> // Verifies IKE Phase 2 status and Proxy IDs
> test vpn ike-sa gateway <ike-gateway-name>   // Tests IKE Phase 1 negotiation
> test vpn ipsec-sa tunnel <ipsec-tunnel-name> // Tests IKE Phase 2 negotiation
 
Simplified IPsec outbound traffic processing flow in PAN-OS involving a Tunnel Interface.

Simplified IPsec outbound traffic processing flow in PAN-OS involving a Tunnel Interface.

Deep Dive: Tunnel Interfaces in Palo Alto Networks GlobalProtect

GlobalProtect, Palo Alto Networks' comprehensive remote access solution, heavily relies on tunnel interfaces to secure connections from endpoints (laptops, mobile devices) to the corporate network.

PCNSE/PCNSA Exam Note (Palo Alto Networks): Understand that the tunnel interface assigned to a GlobalProtect Gateway is the logical termination point. Be familiar with split tunneling concepts (access routes, excludes, application-based) and how they influence traffic flow. Remember that GlobalProtect traffic is subject to Security Policy based on the tunnel interface's zone.

GlobalProtect Gateway configuration is at Network > GlobalProtect > Gateways .

Simplified traffic flow for GlobalProtect in tunnel mode, highlighting the role of the tunnel interface on the Palo Alto Networks firewall and split tunneling.

Simplified traffic flow for GlobalProtect in tunnel mode, highlighting the role of the tunnel interface on the Palo Alto Networks firewall and split tunneling.

Deep Dive: Palo Alto Networks GRE Tunnels

Generic Routing Encapsulation (GRE), defined by RFC 2784, is a tunneling protocol developed by Cisco Systems that can encapsulate a wide variety of network layer protocol packet types inside virtual point-to-point links over an Internet Protocol network. Palo Alto Networks firewalls can terminate GRE tunnels, enabling specific routing paths for traffic.

While simpler than IPsec (as it lacks inherent encryption), GRE is useful for:

Diagram of a GRE tunnel connecting a firewall to a cloud service across the internet (Image shows a Palo Alto Networks firewall connecting via a GRE tunnel over the internet to a cloud service, with an internal client's traffic being routed through this tunnel.)

CRITICAL (Palo Alto Networks): Standard GRE tunnels (PAN-OS type `GRE`) do NOT provide encryption or confidentiality. If security is required, GRE traffic must be sent over an IPsec tunnel (GRE over IPsec), or the "Enable IPsec" option with "Add GRE Encapsulation" must be used within an IPsec Tunnel configuration, effectively creating GRE over IPsec on the same tunnel interface.

GRE Traffic Handling and Policy in PAN-OS

Understanding how PAN-OS processes GRE traffic is key:

When the firewall encapsulates traffic into a GRE tunnel (outbound from firewall's perspective):

When the firewall decapsulates GRE traffic (inbound to firewall's perspective):

PCNSE/PCNSA Exam Note (Palo Alto Networks): Be very clear about the two policy lookups for incoming GRE traffic: one for the outer GRE packet (physical ingress zone to tunnel interface zone) and another for the inner, decapsulated packet (tunnel interface zone to its final destination zone post-routing).

MTU and MSS Considerations for GRE

GRE encapsulation adds overhead to packets:

This overhead reduces the effective MTU for the payload. If the physical interface MTU is 1500 bytes, the GRE tunnel's effective payload MTU becomes 1500 - 24 = 1476 bytes. PAN-OS automatically attempts to manage this for TCP traffic by adjusting the Maximum Segment Size (MSS) advertised during TCP handshakes traversing the tunnel.

Gotcha! (Palo Alto Networks): Fragmentation issues can occur if MSS is not handled correctly, especially if intermediate devices have smaller MTUs or if ICMP "Packet too big" messages are blocked. While PAN-OS helps, understanding MTU/MSS is crucial for troubleshooting performance problems over GRE tunnels.

Palo Alto Networks GRE Limitations

Palo Alto Networks firewall processing flow for an incoming GRE packet, highlighting the dual policy checks.

Palo Alto Networks firewall processing flow for an incoming GRE packet, highlighting the dual policy checks.

Configuration: Creating a Standard GRE Tunnel in PAN-OS

This section details the steps to configure a basic GRE tunnel between a Palo Alto Networks firewall and a peer device.

  1. Step 1: Create a Tunnel Interface
    1. Navigate to Network > Interfaces > Tunnel .
    2. Click Add at the bottom.
    3. Interface Name: Enter a unique tunnel number (e.g., tunnel.2 ).
    4. Config Tab:
      • Virtual Router: Select the Virtual Router this tunnel interface will belong to (e.g., `default`). This is mandatory for routing.
      • Security Zone: Click Add and select an existing zone or create a new zone (e.g., `GRE_Zone` or `VPN_Zone`). This zone will be used for Security policies governing traffic to/from this tunnel. This is mandatory.
      • (Multi-VSYS) Virtual System: Assign to the correct VSYS if applicable.
    5. IPv4 Tab (or IPv6):
      • (Optional but Highly Recommended) Click Add and assign an IP address and netmask to this tunnel interface. This IP is used for routing protocols over GRE, tunnel monitoring/keepalives, and as a next-hop target. Example: 192.168.100.1/30 . The peer device's GRE tunnel interface should have an IP in the same subnet (e.g., 192.168.100.2/30 ).

      Configuring the Tunnel Interface properties: Virtual Router, Security Zone, IP Address (Image shows PAN-OS GUI for configuring a tunnel interface: assigning tunnel.2 to virtual router 'default', security zone 'VPN_Zone', and IP address 192.168.100.1/30.)

    6. Click OK .
  2. Step 2: Configure the GRE Tunnel Parameters
    1. Navigate to Network > GRE Tunnels .
    2. Click Add .
    3. Name: Enter a descriptive name for this GRE tunnel configuration (e.g., `GRE_to_Cloud_Service`).
    4. Interface: Select the physical or loopback interface on the firewall that will be the source of the outer GRE IP packets (e.g., your external-facing interface like ethernet1/1 , or a loopback interface).
    5. Local Address:
      • Type: Select IP .
      • Address: Choose the IP address of the interface selected above (e.g., the public IP of ethernet1/1 ). This is the source IP of the outer GRE packet.
    6. Peer Address: Enter the public/reachable IP address of the remote GRE endpoint (the device at the other end of the tunnel). This is the destination IP of the outer GRE packet.
    7. Tunnel Interface: Select the logical tunnel interface created in Step 1 (e.g., tunnel.2 ). This links the GRE encapsulation parameters to the logical routing interface.
    8. TTL (Time To Live): Default is 64. Adjust if necessary, though default is usually fine.
    9. Copy ToS Header (Optional): Check this if you want the ToS (Type of Service) byte from the inner packet's IP header to be copied to the outer GRE IP header. This can help preserve QoS markings across the GRE tunnel if intermediate devices honor ToS.
    10. Configuring the GRE Tunnel parameters: Name, Local/Peer IP, Physical/Tunnel Interface (Image shows PAN-OS GUI for GRE Tunnel configuration: Name 'GRE-to-Branch', Interface 'ethernet1/1', Local IP '1.1.1.1', Peer IP '2.2.2.2', Tunnel Interface 'tunnel.2'.)

  3. Step 3: (Best Practice) Enable Keep Alive for GRE
    1. In the same GRE Tunnel configuration window (from Step 2), check the Enable Keep Alive box.
    2. GRE Keepalives are proprietary to Palo Alto Networks and may not interoperate with all third-party devices. They work by sending GRE packets (using the same source/destination IPs as the data packets) and expecting responses.
    3. Interval: How often to send keepalive probes (default: 10 seconds).
    4. Retry: Number of consecutive missed keepalives before declaring the tunnel down (default: 3).
    5. Hold Timer: This is a Palo Alto Networks specific timer. When a GRE tunnel that was down comes back up (keepalives succeed), the firewall waits for this hold timer duration (default: 5 * Interval = 50 seconds) before considering the tunnel fully operational and potentially re-installing routes through it. This helps prevent route flapping if the tunnel is unstable. If set to 0, the tunnel is used immediately upon keepalives succeeding.
    6. When keepalives fail beyond the retry count, PAN-OS will bring the associated logical tunnel.N interface administratively down. This allows routing protocols or static route monitoring to detect the failure and reroute traffic.
  4. Click OK to save the GRE Tunnel configuration.
  5. Step 4: Configure Routing
    • To direct traffic through the newly created GRE tunnel, you need to configure routing.
    • Static Route: Navigate to Network > Virtual Routers > (select your VR) > Static Routes .
      • Add a route for the destination network(s) on the other side of the GRE tunnel.
      • Set the Interface to your GRE tunnel interface (e.g., tunnel.2 ).
      • Set the Next Hop typically to the IP address assigned to the peer's GRE tunnel interface (e.g., 192.168.100.2 if your local tunnel.2 is 192.168.100.1 ). If the tunnel interface is unnumbered, you might select 'None' for next hop type if supported by the specific PAN-OS version and scenario (less common for GRE).
    • Dynamic Routing (OSPF/BGP):
      • If using OSPF, enable OSPF on the GRE tunnel.N interface and ensure it's in the correct OSPF area. Adjacencies will form over the tunnel IPs.
      • If using BGP, configure BGP neighbors using the GRE tunnel interface IPs.
  6. Step 5: Configure Security Policies
    • As discussed in "GRE Traffic Handling", ensure you have Security policies:
      1. To allow the incoming GRE protocol (IP protocol 47 or application `gre`) from the zone of your physical ingress interface to the zone of your GRE tunnel interface.
      2. To allow the decapsulated (inner) traffic from the zone of your GRE tunnel interface to its destination zone within your network.
      3. To allow outbound traffic from its source zone to the zone of your GRE tunnel interface.
  7. Step 6: Commit Changes
    • Click Commit in the PAN-OS GUI to apply the configuration.
  8. Step 7: Configure the Peer Device
    • Ensure the remote GRE endpoint is configured with compatible settings (peer/local IPs reversed, same tunnel interface IP subnet if used, etc.).
  9. Step 8: Verify Connectivity and Status
    • CLI Commands:
      > show interface tunnel.N  // Check if tunnel interface is up/up and keepalive status
      > ping source <local_tunnel_interface_IP> host <peer_tunnel_interface_IP> // Test reachability over tunnel
      > show routing route type static // Verify static routes
      > show routing fib-lookup virtual-router <vr_name> ip <destination_ip_across_tunnel> // Test routing path
      > show counter interface tunnel.N // Check packet counters
      > show session all filter tunnel <tunnel.N> // View active sessions through tunnel
           
    • If keepalives are enabled and working, the `show interface tunnel.N` command will indicate the tunnel state as "Up". If keepalives fail, it will show as "Down".
PCNSE/PCNSA Exam Note (Palo Alto Networks): Know the key components of GRE Tunnel configuration: defining the physical interface and local/peer IPs (outer headers), and linking this to a logical tunnel interface (which has its own zone and optional IP for inner routing). Understanding GRE keepalives and their role in interface status is also important.

Advanced Configuration: GRE over IPsec Tunnel Using Loopback Interfaces

This scenario is common when you need the robust security of IPsec combined with the flexibility of GRE (e.g., for running dynamic routing protocols that don't work well directly over IPsec, or for transporting multicast traffic). Using loopback interfaces as the GRE tunnel endpoints provides stable IP addresses that are not tied to physical interface IPs, which might change. The IPsec tunnel encrypts the GRE traffic.

Essentially, you create two tunnels:

  1. An IPsec tunnel between the firewalls' physical/external IPs (or other loopbacks dedicated for IPsec).
  2. A GRE tunnel whose source and destination IPs are loopback interfaces on each firewall. The traffic for this GRE tunnel (i.e., packets sourced from one loopback to the other) is then routed *through* the established IPsec tunnel.

Example Topology:

GRE over IPsec using Loopback Interfaces. User traffic is GRE encapsulated (using loopback IPs as GRE endpoints), and then this GRE packet is IPsec encapsulated (using physical IPs as IPsec endpoints).

GRE over IPsec using Loopback Interfaces. User traffic is GRE encapsulated (using loopback IPs as GRE endpoints), and then this GRE packet is IPsec encapsulated (using physical IPs as IPsec endpoints).

Procedure (Palo Alto Networks Focus):
  1. Configure Base IPsec Tunnel (e.g., tunnel.1 ):
    • Set up a standard route-based IPsec tunnel between FW-A ( 1.1.1.1 ) and FW-B ( 2.2.2.2 ).
    • Assign tunnel.1 on FW-A IP 192.168.1.1/30 and on FW-B IP 192.168.1.2/30 .
    • Ensure this IPsec tunnel (IKE Phase 1 & Phase 2) is UP. Proxy IDs for this IPsec tunnel should typically be 0.0.0.0/0 (Local and Remote) if its purpose is to carry various routed traffic, including the GRE packets.
    • Zone: Assign tunnel.1 to a suitable zone (e.g., `IPSEC_Transit_Zone`).
    CRITICAL (Palo Alto Networks): For this method, you do NOT check "Add GRE Encapsulation" within this base IPsec Tunnel configuration ( Network > IPsec Tunnels > tunnel.1 config ). That option is for when the *same* tunnel interface (e.g., tunnel.1 ) handles both IPsec and GRE termination, and the GRE endpoints are the IPsec tunnel physical IPs. Here, we are building a GRE tunnel *on top of* an IPsec tunnel using different logical interfaces.
  2. Configure Loopback Interfaces (e.g., loopback.1 ):
    • On FW-A: Create loopback.1 , assign IP 10.20.20.1/32 . Assign to Virtual Router (e.g., `default`) and a Security Zone (e.g., `LOOPBACK_Zone` or `TRUST_Zone` - consider the security implications of this zone).
    • On FW-B: Create loopback.1 , assign IP 10.30.30.1/32 . Assign to VR and Zone similarly.
    • Configuring loopback interface IP address on FW-A (Image shows PAN-OS GUI for configuring loopback.1 on FW-A with IP 10.20.20.1/32, assigned to virtual router 'default' and security zone 'Trust'.)

  3. Route Loopbacks Over the IPsec Tunnel:
    • This is crucial: the firewalls must know how to reach each other's loopback IPs via the IPsec tunnel.
    • On FW-A: Add a static route: Destination 10.30.30.1/32 (FW-B's loopback), Interface tunnel.1 (IPsec tunnel IF), Next Hop 192.168.1.2 (FW-B's tunnel.1 IP).
    • On FW-B: Add a static route: Destination 10.20.20.1/32 (FW-A's loopback), Interface tunnel.1 (IPsec tunnel IF), Next Hop 192.168.1.1 (FW-A's tunnel.1 IP).
    • Configuring static route on FW-A for FW-B's loopback via IPsec tunnel.1 (Image shows static route on FW-A: Dest 10.30.30.1/32, Interface tunnel.1, Next Hop 192.168.1.2.)

    • Verify: Ping from FW-A's loopback ( ping source 10.20.20.1 host 10.30.30.1 ) to FW-B's loopback. This traffic should be encrypted by the IPsec tunnel.
  4. Create GRE Tunnel Interface (e.g., tunnel.2 ):
    • On FW-A: Create tunnel.2 . Assign to VR and a new Security Zone (e.g., `GRE_OVER_IPSEC_Zone`). Optionally assign an IP (e.g., 172.16.2.1/30 ). This IP is for traffic *inside* the GRE tunnel.
    • On FW-B: Create tunnel.2 similarly (e.g., IP 172.16.2.2/30 ), same VR and Zone.
    • Configuring the GRE tunnel interface (tunnel.2) on FW-A (Image shows PAN-OS GUI for tunnel.2 on FW-A: IP 172.16.2.1/30, VR 'default', Zone 'GRE_Zone'.)

  5. Configure GRE Tunnel Parameters Using Loopbacks:
    • Navigate to Network > GRE Tunnels and Add a new GRE tunnel configuration.
    • On FW-A:
      • Interface: Select loopback.1 (FW-A's loopback). This is the source interface for the GRE packet's outer header.
      • Local Address: IP 10.20.20.1 (FW-A's loopback IP).
      • Peer Address: IP 10.30.30.1 (FW-B's loopback IP).
      • Tunnel Interface: Select tunnel.2 (the logical GRE interface created in step 4).
      • Enable Keep Alive (recommended). Note: GRE keepalives are sent between 10.20.20.1 and 10.30.30.1 and will also be encrypted by the underlying IPsec tunnel.
    • Configure symmetrically on FW-B (Local Address 10.30.30.1 , Peer Address 10.20.20.1 , sourcing from its loopback.1 , using its tunnel.2 ).
    • Configuring GRE tunnel parameters on FW-A using loopback IPs as endpoints (Image shows GRE tunnel config on FW-A: Name 'GRE_via_IPsec', Interface 'loopback.1', Local IP '10.20.20.1', Peer IP '10.30.30.1', Tunnel Interface 'tunnel.2'.)

  6. Confirm GRE Tunnel Status ( tunnel.2 ):
    • Commit changes. The tunnel.2 interface state should eventually go UP if keepalives are successful.
    • CLI: admin@FW-A> show interface tunnel.2
    • --------------------------------------------------------------------------------
      Name: tunnel.2, ID: 258
      Operation mode: layer3
      Virtual router: default
      Interface MTU: 1476 (typically 1500 minus GRE/IP overhead; IPsec overhead is handled by tunnel.1)
      Interface IP address: 172.16.2.1/30
      ...
      --------------------------------------------------------------------------------
      GRE tunnel name:             GRE_via_IPsec
      tunnel interface state:      Up
      disabled:                    False
      ...
      keep alive enabled:          True
      local-ip:                    10.20.20.1  (FW-A loopback.1)
      peer-ip:                     10.30.30.1  (FW-B loopback.1)
      local-phy-interface:         loopback.1
         
  7. Route User Traffic Over the GRE Tunnel ( tunnel.2 ):
    • Now, direct the actual user traffic (e.g., from LAN A to LAN B) through the GRE tunnel interface tunnel.2 .
    • On FW-A: Static route for LAN B's network, Interface tunnel.2 , Next Hop 172.16.2.2 (FW-B's tunnel.2 IP).
    • On FW-B: Static route for LAN A's network, Interface tunnel.2 , Next Hop 172.16.2.1 (FW-A's tunnel.2 IP).
    • Alternatively, run a dynamic routing protocol (OSPF, BGP) over the 172.16.2.0/30 network using tunnel.2 on both firewalls.
    • Configuring static route on FW-A for user network 10.100.100.0/24 via GRE tunnel.2 (Image shows static route on FW-A: Dest 10.100.100.0/24, Interface tunnel.2, Next Hop 172.16.2.2.)

  8. Security Policies:
    • For IPsec Tunnel ( tunnel.1 ): Policies allowing traffic between the zone of tunnel.1 and zones where loopbacks reside (if different), specifically for the GRE protocol (or IP protocol 47) if policy inspection is very granular here. Often, if loopbacks are in trusted zones and tunnel.1 is also in a trusted-type zone, intrazone traffic might be allowed by default for the GRE packets sourced from/to loopbacks. However, explicit rules are clearer: Source Zone (of loopback.1 ), Destination Zone (of tunnel.1 ), Application `gre`, Allow. And vice-versa for return GRE traffic.
    • For GRE Tunnel ( tunnel.2 ): Policies allowing the actual user data between its original source zone and the zone of tunnel.2 , and from the zone of tunnel.2 to its final destination zone.
  9. Verify End-to-End Traffic Flow:
    • Ping from a host in LAN A to a host in LAN B.
    • Use show session all filter destination <LAN_B_Host_IP> on FW-A. You should see:
      • Initial session: Ingress lan_interface , Egress tunnel.2 (GRE tunnel).
      • A second, related session (less obvious without deep packet inspection or specific logs for tunnel encapsulation): The GRE packet (source 10.20.20.1 , destination 10.30.30.1 ) then being egressed via tunnel.1 (IPsec tunnel).
    • admin@FW-A> show session id <session_id_for_LAN_A_to_LAN_B_ping>
      
      Session         7632
      c2s flow:
       source:      10.10.10.1 [LAN_Zone]  // Host in LAN A
       dst:         10.100.100.1          // Host in LAN B
       proto:       1 (ICMP)
       ...
       egress interface        tunnel.2     // Traffic egresses into GRE tunnel
       ...
      s2c flow:
       ...
       ingress interface       tunnel.2     // Return traffic from GRE tunnel
       ...
          
    • On FW-A, if you check sessions for traffic between loopback IPs: show session all filter source 10.20.20.1 destination 10.30.30.1 , you would see these GRE packets (encapsulating the original user data) being egressed via tunnel.1 (the IPsec tunnel).
Gotcha! (Palo Alto Networks): The most complex part of GRE over IPsec is the routing. Ensure: 1. The IPsec tunnel endpoints (physical IPs) can reach each other. 2. The GRE tunnel endpoints (loopback IPs) are routed via the IPsec tunnel interface. 3. The end-user traffic is routed via the GRE tunnel interface. MTU considerations are also more complex: IPsec adds overhead, then GRE adds more. PAN-OS typically handles MSS clamping, but if issues arise, MTU might need adjustment on tunnel.1 (for IPsec) and/or tunnel.2 (for GRE payload), or more aggressive MSS clamping. The effective MTU for user data on tunnel.2 will be physical MTU - IPsec overhead - GRE overhead.

Additional Palo Alto Networks Tunnel Concept Diagrams

Conceptual traffic flow for outbound (top) and inbound (bottom) traffic involving Palo Alto Networks tunnel interfaces. Note the distinct policy checks before encapsulation and after decapsulation. The actual implementation involves many more detailed steps within PAN-OS datapath.

Conceptual traffic flow for outbound (top) and inbound (bottom) traffic involving Palo Alto Networks tunnel interfaces. Note the distinct policy checks before encapsulation and after decapsulation. The actual implementation involves many more detailed steps within PAN-OS datapath.

High-level representation of traffic flow through a site-to-site VPN tunnel between two Palo Alto Networks firewalls. It highlights the role of tunnel interfaces (tunnel.1 implied), routing, and security policy enforcement at both ends.

High-level representation of traffic flow through a site-to-site VPN tunnel between two Palo Alto Networks firewalls. It highlights the role of tunnel interfaces ( tunnel.1 implied), routing, and security policy enforcement at both ends.

PCNSE Knowledge Check: Palo Alto Networks Tunnel & GRE Interfaces

1. On a Palo Alto Networks firewall, a tunnel interface (e.g., tunnel.1 ) must be assigned to which two of the following for it to forward traffic? (Choose two)





2. When configuring a route-based IPsec VPN on a Palo Alto Networks firewall, what are the typical Proxy ID settings in the IPsec Tunnel configuration for Local and Remote networks?




3. A GlobalProtect Gateway on a Palo Alto Networks firewall uses a tunnel interface (e.g., tunnel.10 ). If this tunnel.10 is assigned to the 'GP-VPN-Zone', and a connected GP client (IP 172.16.10.5 ) tries to access an internal server (IP 192.168.1.100 in 'TRUST-Zone'), what Security Policy evaluation occurs for this traffic *after* it is decrypted by the firewall?




4. What is the primary purpose of the 'Keep Alive' feature in a Palo Alto Networks GRE Tunnel configuration?




5. When a Palo Alto Networks firewall receives an inbound GRE packet on its external interface (Zone: Untrust), and the GRE tunnel is configured to terminate on tunnel.5 (Zone: GRE-VPN), which of the following Security Policy evaluations must occur for the *inner, decapsulated* packet to be forwarded to an internal network (Zone: Trust)?




6. In a GRE over IPsec setup using loopback interfaces as GRE endpoints, what is the typical role of the IPsec tunnel (e.g., tunnel.1 )?




7. Which Palo Alto Networks CLI command would you use to verify the operational status of IKE Phase 2 and the negotiated Proxy IDs for an IPsec tunnel named 'Site_To_Site_VPN'?




8. A Palo Alto Networks firewall has a GRE tunnel configured. The physical interface ethernet1/2 (Zone: UNTRUST) is the local GRE endpoint source. The logical tunnel.3 (Zone: GRE-ZONE) is assigned to this GRE configuration. Which Security Policy is required to allow the firewall to *receive* GRE packets from a peer?




9. What is the primary reason for assigning an IP address to a tunnel interface on a Palo Alto Networks firewall when using it for a route-based IPsec VPN?




10. In a Palo Alto Networks GlobalProtect configuration, what does "Split Tunnel - Access Routes" define?




11. When configuring a GRE tunnel in PAN-OS (Network > GRE Tunnels), the "Local Address" and "Peer Address" fields refer to:




12. What is a significant limitation of standard GRE tunnels that often leads to using GRE over IPsec?




13. If a Palo Alto Networks firewall needs to inspect GRE traffic that is passing *through* it (i.e., the firewall is not a GRE endpoint), what feature should be configured?




14. When setting up GRE over IPsec using loopback interfaces as GRE endpoints on Palo Alto Networks firewalls, how are the GRE packets (sourced from/to loopback IPs) directed into the IPsec tunnel?




15. True or False: A single Palo Alto Networks tunnel interface (e.g., tunnel.7 ) can be simultaneously assigned as the "Tunnel Interface" in both a GRE Tunnel configuration object (Network > GRE Tunnels) AND an IPsec Tunnel configuration object (Network > IPsec Tunnels).


16. What is the typical MTU of a GRE-encapsulated packet if the original packet had an MTU of 1500 bytes and standard IPv4 and GRE headers (no options) are added?




17. Which of these is NOT a direct function or characteristic of a Palo Alto Networks Tunnel Interface object itself (Network > Interfaces > Tunnel)?




18. A Palo Alto Networks firewall administrator notices that IKE Phase 1 for an IPsec tunnel completes successfully, but IKE Phase 2 fails with errors related to "NO_PROPOSAL_CHOSEN" or "TS_UNACCEPTABLE". The peer device is a policy-based VPN. What is the most likely cause on the Palo Alto Networks firewall?




19. When is the "Copy ToS Header" option in a Palo Alto Networks GRE Tunnel configuration useful?




20. What CLI command on a Palo Alto Networks firewall can be used to check if the routing table has a path for a specific destination IP address through a configured tunnel interface?