In the Palo Alto Networks ecosystem, Tunnel interfaces are fundamental logical Layer 3 interfaces. Their primary role is to serve as the entry and exit point for traffic that needs to be routed through various types of Virtual Private Network (VPN) tunnels. These are not physical interfaces but rather software constructs within PAN-OS that enable secure and flexible network segmentation and connectivity. Understanding their configuration and behavior is critical for the PCNSE certification and effective firewall administration.
Tunnel interfaces are versatile and are used as the terminating points for:
tunnel.N
, where 'N' is a numerical identifier ranging from 1 to 9999. For example,
tunnel.1
,
tunnel.100
. This number is locally significant to the firewall.
Configuration is done in PAN-OS via Network > Interfaces > Tunnel .
Conceptual overview of a Palo Alto Networks Tunnel Interface and its key associations within PAN-OS.
Tunnel interfaces are the cornerstone of route-based IPsec VPNs on Palo Alto Networks firewalls. They provide a logical point to which traffic is routed before being encrypted and sent to the VPN peer.
0.0.0.0/0
, Remote:
0.0.0.0/0
, Protocol: Any. This allows routing decisions to control what traffic enters the tunnel.
192.168.1.0/24
, Remote:
10.10.0.0/16
. Mismatched Proxy IDs are a common cause of IKE Phase 2 failures.
0.0.0.0/0
) and interoperating with policy-based VPN peers (Proxy IDs must match specific subnets). Understand that the Tunnel Interface is the logical entry/exit point for traffic *before* encryption and *after* decryption.
tunnel.N
interface.
tunnel.N
interface.
tunnel.N
, e.g., 'VPN-Zone').
tunnel.N
is bound to an IPsec Tunnel configuration.
For inbound encrypted traffic, the process is reversed: decapsulation, decryption, then the original inner packet is passed to the tunnel interface, a new session is created for the inner packet, and it's processed by Security Policy (Source Zone: 'VPN-Zone', Destination Zone based on routing of the inner packet).
> show vpn ike-sa gateway <ike-gateway-name> // Verifies IKE Phase 1 status > show vpn ipsec-sa tunnel <ipsec-tunnel-name> // Verifies IKE Phase 2 status and Proxy IDs > test vpn ike-sa gateway <ike-gateway-name> // Tests IKE Phase 1 negotiation > test vpn ipsec-sa tunnel <ipsec-tunnel-name> // Tests IKE Phase 2 negotiation
Simplified IPsec outbound traffic processing flow in PAN-OS involving a Tunnel Interface.
GlobalProtect, Palo Alto Networks' comprehensive remote access solution, heavily relies on tunnel interfaces to secure connections from endpoints (laptops, mobile devices) to the corporate network.
GlobalProtect Gateway configuration is at Network > GlobalProtect > Gateways .
Simplified traffic flow for GlobalProtect in tunnel mode, highlighting the role of the tunnel interface on the Palo Alto Networks firewall and split tunneling.
Generic Routing Encapsulation (GRE), defined by RFC 2784, is a tunneling protocol developed by Cisco Systems that can encapsulate a wide variety of network layer protocol packet types inside virtual point-to-point links over an Internet Protocol network. Palo Alto Networks firewalls can terminate GRE tunnels, enabling specific routing paths for traffic.
While simpler than IPsec (as it lacks inherent encryption), GRE is useful for:
(Image shows a Palo Alto Networks firewall connecting via a GRE tunnel over the internet to a cloud service, with an internal client's traffic being routed through this tunnel.)
Understanding how PAN-OS processes GRE traffic is key:
When the firewall encapsulates traffic into a GRE tunnel (outbound from firewall's perspective):
tunnel.N
interface.
When the firewall decapsulates GRE traffic (inbound to firewall's perspective):
tunnel.N
interface that is configured to terminate this GRE traffic (e.g., `GRE-Zone`).
tunnel.N
interface) and its new destination zone (determined by the routing lookup for the inner packet).
GRE encapsulation adds overhead to packets:
This overhead reduces the effective MTU for the payload. If the physical interface MTU is 1500 bytes, the GRE tunnel's effective payload MTU becomes 1500 - 24 = 1476 bytes. PAN-OS automatically attempts to manage this for TCP traffic by adjusting the Maximum Segment Size (MSS) advertised during TCP handshakes traversing the tunnel.
Palo Alto Networks firewall processing flow for an incoming GRE packet, highlighting the dual policy checks.
This section details the steps to configure a basic GRE tunnel between a Palo Alto Networks firewall and a peer device.
tunnel.2
).
192.168.100.1/30
. The peer device's GRE tunnel interface should have an IP in the same subnet (e.g.,
192.168.100.2/30
).
(Image shows PAN-OS GUI for configuring a tunnel interface: assigning tunnel.2 to virtual router 'default', security zone 'VPN_Zone', and IP address 192.168.100.1/30.)
ethernet1/1
, or a loopback interface).
IP
.
ethernet1/1
). This is the source IP of the outer GRE packet.
tunnel.2
). This links the GRE encapsulation parameters to the logical routing interface.
(Image shows PAN-OS GUI for GRE Tunnel configuration: Name 'GRE-to-Branch', Interface 'ethernet1/1', Local IP '1.1.1.1', Peer IP '2.2.2.2', Tunnel Interface 'tunnel.2'.)
tunnel.N
interface administratively down. This allows routing protocols or static route monitoring to detect the failure and reroute traffic.
tunnel.2
).
192.168.100.2
if your local
tunnel.2
is
192.168.100.1
). If the tunnel interface is unnumbered, you might select 'None' for next hop type if supported by the specific PAN-OS version and scenario (less common for GRE).
tunnel.N
interface and ensure it's in the correct OSPF area. Adjacencies will form over the tunnel IPs.
> show interface tunnel.N // Check if tunnel interface is up/up and keepalive status > ping source <local_tunnel_interface_IP> host <peer_tunnel_interface_IP> // Test reachability over tunnel > show routing route type static // Verify static routes > show routing fib-lookup virtual-router <vr_name> ip <destination_ip_across_tunnel> // Test routing path > show counter interface tunnel.N // Check packet counters > show session all filter tunnel <tunnel.N> // View active sessions through tunnel
This scenario is common when you need the robust security of IPsec combined with the flexibility of GRE (e.g., for running dynamic routing protocols that don't work well directly over IPsec, or for transporting multicast traffic). Using loopback interfaces as the GRE tunnel endpoints provides stable IP addresses that are not tied to physical interface IPs, which might change. The IPsec tunnel encrypts the GRE traffic.
Essentially, you create two tunnels:
Example Topology:
1.1.1.1
(on
ethernet1/1
)
tunnel.1
(IP:
192.168.1.1/30
)
loopback.1
(IP:
10.20.20.1/32
)
tunnel.2
(IP:
172.16.2.1/30
, optional, for routing over GRE)
2.2.2.2
(on
ethernet1/1
)
tunnel.1
(IP:
192.168.1.2/30
)
loopback.1
(IP:
10.30.30.1/32
)
tunnel.2
(IP:
172.16.2.2/30
, optional, for routing over GRE)
GRE over IPsec using Loopback Interfaces. User traffic is GRE encapsulated (using loopback IPs as GRE endpoints), and then this GRE packet is IPsec encapsulated (using physical IPs as IPsec endpoints).
Procedure (Palo Alto Networks Focus):
tunnel.1
):
1.1.1.1
) and FW-B (
2.2.2.2
).
tunnel.1
on FW-A IP
192.168.1.1/30
and on FW-B IP
192.168.1.2/30
.
0.0.0.0/0
(Local and Remote) if its purpose is to carry various routed traffic, including the GRE packets.
tunnel.1
to a suitable zone (e.g., `IPSEC_Transit_Zone`).
Network > IPsec Tunnels > tunnel.1 config
). That option is for when the *same* tunnel interface (e.g.,
tunnel.1
) handles both IPsec and GRE termination, and the GRE endpoints are the IPsec tunnel physical IPs. Here, we are building a GRE tunnel *on top of* an IPsec tunnel using different logical interfaces.
loopback.1
):
loopback.1
, assign IP
10.20.20.1/32
. Assign to Virtual Router (e.g., `default`) and a Security Zone (e.g., `LOOPBACK_Zone` or `TRUST_Zone` - consider the security implications of this zone).
loopback.1
, assign IP
10.30.30.1/32
. Assign to VR and Zone similarly.
(Image shows PAN-OS GUI for configuring loopback.1 on FW-A with IP 10.20.20.1/32, assigned to virtual router 'default' and security zone 'Trust'.)
10.30.30.1/32
(FW-B's loopback), Interface
tunnel.1
(IPsec tunnel IF), Next Hop
192.168.1.2
(FW-B's
tunnel.1
IP).
10.20.20.1/32
(FW-A's loopback), Interface
tunnel.1
(IPsec tunnel IF), Next Hop
192.168.1.1
(FW-A's
tunnel.1
IP).
(Image shows static route on FW-A: Dest 10.30.30.1/32, Interface tunnel.1, Next Hop 192.168.1.2.)
ping source 10.20.20.1 host 10.30.30.1
) to FW-B's loopback. This traffic should be encrypted by the IPsec tunnel.
tunnel.2
):
tunnel.2
. Assign to VR and a new Security Zone (e.g., `GRE_OVER_IPSEC_Zone`). Optionally assign an IP (e.g.,
172.16.2.1/30
). This IP is for traffic *inside* the GRE tunnel.
tunnel.2
similarly (e.g., IP
172.16.2.2/30
), same VR and Zone.
(Image shows PAN-OS GUI for tunnel.2 on FW-A: IP 172.16.2.1/30, VR 'default', Zone 'GRE_Zone'.)
loopback.1
(FW-A's loopback). This is the source interface for the GRE packet's outer header.
10.20.20.1
(FW-A's loopback IP).
10.30.30.1
(FW-B's loopback IP).
tunnel.2
(the logical GRE interface created in step 4).
10.20.20.1
and
10.30.30.1
and will also be encrypted by the underlying IPsec tunnel.
10.30.30.1
, Peer Address
10.20.20.1
, sourcing from its
loopback.1
, using its
tunnel.2
).
(Image shows GRE tunnel config on FW-A: Name 'GRE_via_IPsec', Interface 'loopback.1', Local IP '10.20.20.1', Peer IP '10.30.30.1', Tunnel Interface 'tunnel.2'.)
tunnel.2
):
tunnel.2
interface state should eventually go UP if keepalives are successful.
admin@FW-A> show interface tunnel.2
-------------------------------------------------------------------------------- Name: tunnel.2, ID: 258 Operation mode: layer3 Virtual router: default Interface MTU: 1476 (typically 1500 minus GRE/IP overhead; IPsec overhead is handled by tunnel.1) Interface IP address: 172.16.2.1/30 ... -------------------------------------------------------------------------------- GRE tunnel name: GRE_via_IPsec tunnel interface state: Up disabled: False ... keep alive enabled: True local-ip: 10.20.20.1 (FW-A loopback.1) peer-ip: 10.30.30.1 (FW-B loopback.1) local-phy-interface: loopback.1
tunnel.2
):
tunnel.2
.
tunnel.2
, Next Hop
172.16.2.2
(FW-B's
tunnel.2
IP).
tunnel.2
, Next Hop
172.16.2.1
(FW-A's
tunnel.2
IP).
172.16.2.0/30
network using
tunnel.2
on both firewalls.
(Image shows static route on FW-A: Dest 10.100.100.0/24, Interface tunnel.2, Next Hop 172.16.2.2.)
tunnel.1
):
Policies allowing traffic between the zone of
tunnel.1
and zones where loopbacks reside (if different), specifically for the GRE protocol (or IP protocol 47) if policy inspection is very granular here. Often, if loopbacks are in trusted zones and
tunnel.1
is also in a trusted-type zone, intrazone traffic might be allowed by default for the GRE packets sourced from/to loopbacks. However, explicit rules are clearer: Source Zone (of
loopback.1
), Destination Zone (of
tunnel.1
), Application `gre`, Allow. And vice-versa for return GRE traffic.
tunnel.2
):
Policies allowing the
actual user data
between its original source zone and the zone of
tunnel.2
, and from the zone of
tunnel.2
to its final destination zone.
show session all filter destination <LAN_B_Host_IP>
on FW-A. You should see:
lan_interface
, Egress
tunnel.2
(GRE tunnel).
10.20.20.1
, destination
10.30.30.1
) then being egressed via
tunnel.1
(IPsec tunnel).
admin@FW-A> show session id <session_id_for_LAN_A_to_LAN_B_ping>
Session 7632 c2s flow: source: 10.10.10.1 [LAN_Zone] // Host in LAN A dst: 10.100.100.1 // Host in LAN B proto: 1 (ICMP) ... egress interface tunnel.2 // Traffic egresses into GRE tunnel ... s2c flow: ... ingress interface tunnel.2 // Return traffic from GRE tunnel ...
show session all filter source 10.20.20.1 destination 10.30.30.1
, you would see these GRE packets (encapsulating the original user data) being egressed via
tunnel.1
(the IPsec tunnel).
tunnel.1
(for IPsec) and/or
tunnel.2
(for GRE payload), or more aggressive MSS clamping. The effective MTU for user data on
tunnel.2
will be physical MTU - IPsec overhead - GRE overhead.
Conceptual traffic flow for outbound (top) and inbound (bottom) traffic involving Palo Alto Networks tunnel interfaces. Note the distinct policy checks before encapsulation and after decapsulation. The actual implementation involves many more detailed steps within PAN-OS datapath.
High-level representation of traffic flow through a site-to-site VPN tunnel between two Palo Alto Networks firewalls. It highlights the role of tunnel interfaces (
tunnel.1
implied), routing, and security policy enforcement at both ends.