Palo Alto Networks firewalls exclusively support route-based VPNs and do not natively support policy-based VPNs . However, they can interoperate with policy-based VPN peers by configuring appropriate Proxy IDs .
In a route-based VPN:
This approach provides flexibility and scalability, especially in complex network topologies.
While Palo Alto firewalls do not support policy-based VPNs, they can establish VPN tunnels with policy-based peers by configuring Proxy IDs that match the remote peer's traffic selectors. This ensures both ends agree on the traffic to be encrypted.
Proxy-ID for VPNs Between Palo Alto Networks and Firewalls with Policy-based VPNs
Feature | Route-Based VPNs | Policy-Based VPNs |
---|---|---|
Tunnel Interface | Required | Not used |
Routing Decision | Based on routing table | Based on security policy |
Dynamic Routing Support | Supported | Not supported |
NAT Support | Supported | Limited |
Scalability | High | Limited due to multiple SAs |
Configuration Complexity | Moderate | Higher due to multiple policies |
Vendor Support | Palo Alto Networks, Juniper SRX | Cisco ASA (pre-9.7), Check Point |
show vpn tunnel
- Verify tunnel interface status
show route
- Check routing table for correct routes
show security policy
- Confirm security policies are applied correctly
show vpn ike sa
- Check IKE Security Associations
show vpn ipsec sa
- Verify IPsec Security Associations
show vpn tunnel
- Even though not used, verify tunnel interface configuration
show security policy
- Confirm policy-based traffic selectors match Proxy IDs
show vpn ike sa
- Check IKE Security Associations
show vpn ipsec sa
- Verify IPsec Security Associations