Palo Alto Networks firewalls exclusively support route-based VPNs and do not natively support policy-based VPNs . However, they can interoperate with policy-based VPN peers by configuring appropriate Proxy IDs .
In a route-based VPN:
This approach provides flexibility and scalability, especially in complex network topologies.
While Palo Alto Networks firewalls do not support policy-based VPNs, they can establish VPN tunnels with policy-based peers by configuring Proxy IDs that match the remote peer's traffic selectors. This ensures that both ends of the VPN tunnel agree on the traffic to be encrypted and transmitted through the tunnel.
For detailed guidance on configuring Proxy IDs for interoperability with policy-based VPNs, refer to the following resource:
Feature | Route-Based VPNs | Policy-Based VPNs |
---|---|---|
Tunnel Interface | Required | Not used |
Routing Decision | Based on routing table | Based on security policy/access list |
Dynamic Routing Support | Supported | Not supported |
NAT Support | Supported | Limited |
Scalability | High | Limited due to multiple SAs/policies |
Configuration Complexity | Moderate (routing + tunnel setup) | Can be higher with many specific policies |
Vendor Support Examples | Palo Alto Networks, Juniper SRX, Cisco (VTI) | Cisco ASA (pre-9.7 without VTI), Check Point (traditional mode) |
Troubleshooting VPNs involves checking connectivity, IKE (Internet Key Exchange) phases, IPsec SAs (Security Associations), routing, and security policies. Below are common commands for different VPN types and vendors.
On Palo Alto Networks firewalls, troubleshooting typically involves CLI commands and reviewing logs in the WebUI.
show vpn ike-sa gateway
This command displays the status of IKE Phase 1 Security Associations. Look for a `ST_ACTIVE` state.
show vpn ipsec-sa tunnel
This command shows the status of IPsec Phase 2 SAs. Verify SPIs (Security Parameter Index) and encapsulation/decapsulation counters.
test vpn ike-gateway
test vpn ipsec-sa tunnel
These commands can help diagnose negotiation issues.
show interface tunnel.
Ensure the tunnel interface is up and configured correctly.
show routing route
Confirm that routes are directing traffic destined for the remote network through the tunnel interface.
debug ike pcap start
debug ike pcap stop
view-pcap debug-pcap ikemgr.pcap
debug flow basic
show counter global filter packet-filter yes delta yes | match tunnel
These commands can help capture and analyze IKE and IPsec packet flows.
Policy-based VPNs often rely on crypto maps or specific VPN policies. Commands vary significantly by vendor.
show crypto ipsec sa
: Displays IPsec SAs. Look for active SAs matching your crypto map, and check #pkts encaps/decaps.
show crypto ikev1 sa
or
show crypto ikev2 sa
: Displays IKE SAs. Check for QM_IDLE (Phase 1 complete, Phase 2 active) or MM_ACTIVE (Phase 1 active).
debug crypto condition peer
debug crypto ikev1
or
debug crypto ikev2
(use with caution, can be very verbose)
packet-tracer input inside tcp
detailed
: Simulates traffic flow.
vpn tu
: (TunnelUtil) Utility to manage and view VPN tunnels and SAs.
fw monitor -e 'accept host(
);'
: Captures traffic to/from the VPN peer (use specific filters).
General VPN Troubleshooting Flow
VPN IKE Phase 1 & Phase 2 Negotiation with Troubleshooting Notes