Welcome to Chapter 11! In the digital landscape of 2025, securely connecting disparate networks and remote users is more critical than ever. This chapter dives deep into Virtual Private Networks (VPNs) using Palo Alto Networks Next-Generation Firewalls. You’ll learn how to establish secure, encrypted tunnels between locations (Site-to-Site VPNs) and enable individual users to connect securely from anywhere (Remote Access VPNs).
By the end of this chapter, you’ll have a solid understanding of VPN fundamentals, the specific components involved in configuring both Site-to-Site and Remote Access VPNs on a Palo Alto Networks firewall running PAN-OS 11.1 (the latest stable version at the time of writing, December 2025), and practical skills to implement them. We’ll cover the ‘what,’ ‘why,’ and ‘how’ of each configuration step, ensuring you grasp the underlying principles, not just the commands.
Before we begin, make sure you’re comfortable with basic network concepts, firewall interfaces, zones, and security policies, as covered in previous chapters. We’ll be building on that foundation to integrate VPNs seamlessly into your network architecture. Get ready to secure your inter-network and remote communications!
Core Concepts of VPNs
At its heart, a Virtual Private Network (VPN) creates a secure, encrypted “tunnel” over an untrusted network, like the internet. This tunnel makes it seem as though two connected points are directly linked, even if they are geographically far apart.
Why VPNs? The Need for Secure Connectivity
Imagine your company has two offices: one in New York and one in London. Both need to access shared resources (like a file server or an application database) securely. Sending this traffic directly over the internet is risky because it could be intercepted and read. A VPN solves this by:
- Confidentiality: Encrypting data so only authorized parties can read it.
- Integrity: Ensuring data hasn’t been tampered with in transit.
- Authentication: Verifying the identity of the communicating parties.
Palo Alto Networks firewalls excel at managing VPNs, offering robust features for both common types: Site-to-Site and Remote Access.
Site-to-Site VPNs: Connecting Networks
A Site-to-Site VPN connects two entire networks, typically between branch offices and a headquarters, or between your on-premises network and a cloud environment. Once established, all devices on one network can communicate securely with devices on the other network, as if they were on the same local network.
The industry standard protocol for Site-to-Site VPNs is IPsec (Internet Protocol Security). IPsec operates in two phases:
Phase 1: IKE (Internet Key Exchange) - The “Handshake”
IKE is like the initial secure handshake. Its main goal is to establish a secure channel (the IKE Security Association, or SA) where the two VPN peers can agree on encryption keys and parameters for Phase 2.
Key components in Phase 1:
- Authentication: How do the two firewalls prove their identity?
- Pre-shared Key (PSK): A secret password shared beforehand. Simple, but less scalable.
- Certificates: More secure and scalable, using digital certificates issued by a Certificate Authority.
- Encryption Algorithm: What method will be used to encrypt the handshake itself? (e.g., AES256)
- Authentication Algorithm: How will the integrity of the handshake messages be verified? (e.g., SHA256)
- Diffie-Hellman (DH) Group: A mathematical process to securely exchange cryptographic keys. Higher groups offer stronger security.
- Lifetime: How long will the Phase 1 SA remain valid before needing re-negotiation?
Phase 2: IPsec - The “Data Tunnel”
Once Phase 1 is complete, a secure tunnel (the IPsec SA) is established for the actual data traffic. Phase 2 defines how the user data will be protected.
Key components in Phase 2:
- Encryption Algorithm: How will the actual data payload be encrypted? (e.g., AES256)
- Authentication Algorithm: How will the integrity of the data payload be verified? (e.g., SHA256)
- Perfect Forward Secrecy (PFS): An optional but highly recommended feature. If the main IKE key is compromised, PFS ensures that past session keys are not compromised. This uses a separate DH exchange for Phase 2.
- Lifetime: How long will the Phase 2 SA remain valid? This is typically shorter than Phase 1.
- Proxy IDs (or Traffic Selectors): These define which specific networks or IP addresses are allowed to traverse the VPN tunnel. For example, “Source Network A to Destination Network B.” Both sides must agree on these.
Here’s a simplified flow of an IPsec Site-to-Site VPN setup:
Remote Access VPNs: Connecting Users
Remote Access VPNs allow individual users, like employees working from home or traveling, to securely connect their devices (laptops, phones) to the corporate network. Palo Alto Networks’ solution for this is GlobalProtect.
GlobalProtect is a comprehensive solution that includes:
- Portal: The central management point. Users connect to the portal to get configuration information (like a list of gateways), client software updates, and authentication settings.
- Gateway: The actual VPN termination point. User traffic flows through the gateway to access corporate resources.
- Agent (Client Software): Software installed on the user’s device that handles the VPN connection, authentication, and policy enforcement.
How GlobalProtect Works (Simplified):
- A user’s GlobalProtect Agent connects to the Portal.
- The Portal authenticates the user (e.g., via username/password, multi-factor authentication).
- Upon successful authentication, the Portal provides the Agent with a list of available Gateways and policies.
- The Agent then connects to an appropriate Gateway, establishing an encrypted tunnel.
- Traffic from the user’s device flows securely through the Gateway into the corporate network.
GlobalProtect offers advanced features like pre-logon VPN, host information profiling (HIP) for granular access control based on device posture, and seamless user experience.
Step-by-Step Implementation: Site-to-Site IPsec VPN
Let’s configure a basic Site-to-Site IPsec VPN between two Palo Alto Networks firewalls. For this example, we’ll assume two firewalls, “Branch-FW” and “HQ-FW,” each with an external interface connected to the internet and an internal interface connected to their respective LANs.
Scenario:
- HQ-FW:
- External IP: 203.0.113.1
- Internal LAN: 10.0.1.0/24
- Branch-FW:
- External IP: 198.51.100.1
- Internal LAN: 10.0.2.0/24
- Pre-shared Key (PSK):
MySuperSecretPSK2025!
PAN-OS Version Note: We’ll be using the GUI for configuration, applicable to PAN-OS 11.1, which builds upon previous versions with minor UI/feature enhancements.
Step 1: Create IKE Crypto Profile (Phase 1)
This profile defines the encryption, authentication, DH group, and lifetime for the IKE Phase 1 negotiation.
- Navigate to Network > IPSec Crypto Profiles.
- Click Add.
- Name:
IKE-Profile-AES256-SHA256-DH14(or similar descriptive name) - IKEv2 Mode: Enable (modern best practice)
- DH Group:
group14(or higher, e.g., group19, group20) - Encryption:
aes-256-cbc - Authentication:
sha256 - Lifetime:
8 hours(or28800 seconds)
Explanation:
- IKEv2: The modern, more robust version of IKE. Always prefer IKEv2.
- DH Group 14: A commonly accepted strong group for key exchange.
- AES-256-CBC: Strong symmetric encryption for the IKE channel.
- SHA256: Cryptographic hash function for integrity.
- Lifetime: How long the IKE SA remains valid. After this, a new IKE SA will be negotiated.
Repeat this configuration on both HQ-FW and Branch-FW, ensuring all parameters match exactly.
Step 2: Create IPSec Crypto Profile (Phase 2)
This profile defines the encryption, authentication, PFS, and lifetime for the IPsec Phase 2 data tunnel.
- Navigate to Network > IPSec Crypto Profiles.
- Click Add.
- Name:
IPSec-Profile-AES256-SHA256-PFS-DH14 - IPSec Protocol:
ESP(Encapsulating Security Payload - encrypts and authenticates payload) - Encryption:
aes-256-cbc - Authentication:
sha256 - DH Group (PFS):
group14(Match Phase 1 DH group for PFS) - Lifetime:
1 hour(or3600 seconds)
Explanation:
- ESP: The standard choice for IPsec, providing both encryption and integrity.
- AES-256-CBC & SHA256: Again, strong choices for data protection.
- PFS (Perfect Forward Secrecy) with DH Group 14: Crucial for security. It means that a compromise of the IKE key won’t compromise past IPsec session keys.
- Lifetime: The IPsec SA lifetime. This is usually shorter than IKE Phase 1 lifetime.
Repeat this configuration on both HQ-FW and Branch-FW, ensuring all parameters match exactly.
Step 3: Configure IKE Gateway
The IKE Gateway defines the VPN peers, authentication method, and references the IKE Crypto Profile.
- Navigate to Network > IKE Gateways.
- Click Add.
- Name:
IKE-Gateway-to-Branch(on HQ-FW) /IKE-Gateway-to-HQ(on Branch-FW) - Version:
IKEv2 only mode - Address Type:
IPv4 - Interface: Select the external (internet-facing) interface (e.g.,
ethernet1/1orethernet1/2depending on your setup). - Local IP Address: The external IP of this firewall (e.g.,
203.0.113.1on HQ-FW). - Peer IP Address: The external IP of the remote firewall (e.g.,
198.51.100.1on HQ-FW). - Pre-shared Key: Enter
MySuperSecretPSK2025!(must match exactly on both sides). - Local Identification:
IP Addressand enter this firewall’s external IP. - Peer Identification:
IP Addressand enter remote firewall’s external IP. - IKE Crypto Profile: Select
IKE-Profile-AES256-SHA256-DH14. - Enable Passive Mode: (Leave unchecked for active initiation, or check if this side should only respond)
Explanation:
- Local/Peer IP Address: Defines who is talking to whom.
- Pre-shared Key: The shared secret for authentication.
- Local/Peer Identification: How the firewalls identify themselves to each other during IKE negotiation. Using IP addresses is common for simple setups. For more complex setups or certificate-based authentication, you might use FQDNs.
Repeat this, swapping local and peer IPs, on both HQ-FW and Branch-FW.
Step 4: Create a Tunnel Interface
An IPsec tunnel needs a logical interface to bind to, similar to a physical Ethernet interface. This is a Tunnel Interface.
- Navigate to Network > Interfaces > Tunnel.
- Click Add.
- Interface Name:
tunnel.10(or any available tunnel number) - Virtual Router: Select your default Virtual Router (e.g.,
default). - Zone: Create a new zone for your VPN traffic, e.g.,
VPN-Zone. This is a best practice to apply granular security policies to VPN traffic. - IP Address: Assign a unique, unused IP address from a dedicated subnet (e.g.,
169.254.10.1/30on HQ-FW,169.254.10.2/30on Branch-FW). This acts as the internal IP for the tunnel endpoint.
Explanation:
- Tunnel Interface: A virtual interface that represents the VPN tunnel. Traffic routed to this interface will be encrypted and sent over the VPN.
- Virtual Router: Associates the tunnel with your routing table.
- Zone: CRITICAL! Placing the tunnel interface in a dedicated zone allows you to write specific security policies for traffic entering and exiting the VPN tunnel, enforcing a Zero Trust approach.
- IP Address: While not strictly required for IPsec (sometimes unnumbered tunnels are used), assigning an IP helps with troubleshooting and routing. The
/30ensures only two usable IPs, one for each end.
Repeat on both HQ-FW and Branch-FW, using tunnel.10 for both and assigning unique IPs from the same /30 subnet.
Step 5: Configure IPSec Tunnel
This is where you bring everything together: the IKE Gateway, IPSec Crypto Profile, and Tunnel Interface.
- Navigate to Network > IPSec Tunnels.
- Click Add.
- Name:
IPSec-Tunnel-to-Branch(on HQ-FW) /IPSec-Tunnel-to-HQ(on Branch-FW) - Tunnel Interface: Select
tunnel.10. - Type:
Auto Key(uses IKE to generate keys) - IKE Gateway: Select
IKE-Gateway-to-Branch(on HQ-FW). - IPSec Crypto Profile: Select
IPSec-Profile-AES256-SHA256-PFS-DH14. - Proxy IDs: This is where you define the networks that will use the tunnel.
- Click Add.
- Local:
10.0.1.0/24(HQ LAN) - Remote:
10.0.2.0/24(Branch LAN) - Protocol:
any(or specific protocols if needed) - Port:
any(or specific ports if needed)
Explanation:
- Proxy IDs: This is a common point of failure if not configured identically on both sides. They tell the firewall which traffic should be encrypted and sent over this specific tunnel. Both ends must agree on the local and remote networks. On HQ, Local is HQ LAN, Remote is Branch LAN. On Branch, Local is Branch LAN, Remote is HQ LAN.
Repeat on both HQ-FW and Branch-FW, ensuring the Local and Remote Proxy IDs are inverted.
Step 6: Configure Static Routes
Your firewalls need to know that the remote network is reachable via the tunnel interface.
- Navigate to Network > Virtual Routers > default (or your VR) > Static Routes.
- Click Add.
- Name:
Route-to-Branch-LAN(on HQ-FW) - Destination:
10.0.2.0/24(Branch LAN) - Interface:
tunnel.10 - Next Hop:
None(for tunnel interfaces, you don’t typically specify a next hop IP, as the tunnel itself is the path).
Explanation:
- This route tells the HQ-FW that any traffic destined for the
10.0.2.0/24network should be sent out throughtunnel.10. The IPsec tunnel will then encrypt and transport that traffic.
Repeat on Branch-FW, creating a route for 10.0.1.0/24 via tunnel.10.
Step 7: Configure Security Policies
Finally, you need security policies to allow traffic to flow between your internal LAN zones and your new VPN-Zone.
- Navigate to Policies > Security.
- Click Add.
Policy on HQ-FW:
- Name:
Allow-HQ-to-Branch-VPN - Source Zone:
LAN-Zone(your internal LAN zone) - Source Address:
10.0.1.0/24(oranyif broader access is desired) - Destination Zone:
VPN-Zone(your tunnel interface zone) - Destination Address:
10.0.2.0/24(Branch LAN) - Application:
any(or specific applications likeweb-browsing,ssh) - Service:
application-default(or specific ports) - Action:
Allow
Policy on Branch-FW:
- Name:
Allow-Branch-to-HQ-VPN - Source Zone:
LAN-Zone(your internal LAN zone) - Source Address:
10.0.2.0/24 - Destination Zone:
VPN-Zone - Destination Address:
10.0.1.0/24 - Application:
any - Service:
application-default - Action:
Allow
You will also need a policy on both firewalls to allow traffic from VPN-Zone to LAN-Zone if you want two-way communication.
Explanation:
- Security policies are essential. Even with a VPN tunnel established, traffic won’t flow until explicitly allowed by a security policy.
- By using a dedicated
VPN-Zone, you gain granular control over what traffic is permitted over the VPN.
Final Step: Commit Configuration
After all configurations, remember to click Commit at the top right of the GUI to apply the changes to the firewall.
Step-by-Step Implementation: Remote Access VPN (GlobalProtect)
Now let’s configure GlobalProtect to enable remote users to connect securely. We’ll focus on a basic setup with username/password authentication.
Scenario:
- HQ-FW:
- External IP: 203.0.113.1
- Internal LAN: 10.0.1.0/24
- GlobalProtect Pool: 172.16.10.0/24 (IPs assigned to remote users)
- Authentication: Local Database (for simplicity, but RADIUS/LDAP are common in production)
Step 1: Configure Authentication Profile
This profile defines how users will authenticate. For simplicity, we’ll use the firewall’s local user database. In a real-world scenario, you’d integrate with Active Directory (LDAP) or RADIUS.
- Navigate to Device > Authentication Profile.
- Click Add.
- Name:
GP-Local-Auth - Type:
Local Database - User Domain: Leave blank (for local users).
- Advanced Tab:
- Allow List: Add
all(or specific users/groups if you have them defined).
- Allow List: Add
Explanation:
- This profile tells GlobalProtect where to look for user credentials. Local database is good for testing but not scalable for many users.
Step 2: Create Local Users (if using Local Database)
If you’re using the local database, you need to create users.
- Navigate to Device > Local User Database > Users.
- Click Add.
- Username:
remoteuser1 - Password:
SecurePassword123! - Confirm Password:
SecurePassword123!
Explanation:
- These are the credentials remote users will use to log into GlobalProtect.
Step 3: Configure GlobalProtect Portal
The Portal serves as the initial contact point for GlobalProtect Agents.
- Navigate to Network > GlobalProtect > Portals.
- Click Add.
- Name:
HQ-Portal - Interface: Select your external (internet-facing) interface (e.g.,
ethernet1/1). - IP Address: The external IP of this firewall (e.g.,
203.0.113.1). - Authentication Tab:
- Client Authentication: Select
GP-Local-Auth. - Certificate Profile: Use
Nonefor now, but in production, you’d use a trusted server certificate for the portal.
- Client Authentication: Select
- Agent Tab:
- IPSec Tunnel Mode: Enable
- Generate user traffic logs: Enable
- Trusted Root CA: (Not needed for PSK, but for cert-based auth)
- Client Configuration: Click Add.
- Name:
Default-Client-Config - Authentication Profile:
GP-Local-Auth - User/User Group:
all - Gateway List: Click Add.
- Name:
HQ-Gateway-List - Priority:
10 - Address: Enter the IP address of your GlobalProtect Gateway (which will be the same external IP as the Portal for a simple setup:
203.0.113.1).
- Name:
- Name:
Explanation:
- Interface/IP: This is the public-facing IP where users will connect to the portal.
- Client Authentication: Links to the authentication profile we created.
- Client Configuration: Defines how the agent behaves and which gateways it can connect to. The Gateway List is crucial for directing agents to the actual VPN termination points.
Step 4: Configure GlobalProtect Gateway
The Gateway is where the VPN tunnel terminates and user traffic is processed.
- Navigate to Network > GlobalProtect > Gateways.
- Click Add.
- Name:
HQ-Gateway - Interface: Select your external (internet-facing) interface (e.g.,
ethernet1/1). - IP Address: The external IP of this firewall (e.g.,
203.0.113.1). - Authentication Tab:
- Client Authentication: Select
GP-Local-Auth. - Certificate Profile: (Not needed for PSK)
- Client Authentication: Select
- Agent Tab:
- Tunnel Interface: Select a new tunnel interface, e.g.,
tunnel.20. (Create this underNetwork > Interfaces > Tunnelfirst, similar to the Site-to-Site example, but no IP needed for GlobalProtect tunnel interfaces). Assign it to a new zone, e.g.,GP-Zone. - Client IP Pool: Click Add.
- Name:
GP-User-Pool - IP Pool:
172.16.10.0/24(This is the range of IPs remote users will get).
- Name:
- Access Route: Click Add.
- Destination:
10.0.1.0/24(Your internal corporate LAN). This tells the agent what networks are reachable through the VPN.
- Destination:
- Tunnel Interface: Select a new tunnel interface, e.g.,
Explanation:
- Tunnel Interface: This is where the decrypted user traffic will exit the gateway into your internal network. It must be in a new zone for security policy enforcement.
- Client IP Pool: The range of IP addresses assigned to connected GlobalProtect users.
- Access Route: This tells the GlobalProtect client which networks are accessible via the VPN tunnel. Without this, users won’t know how to reach your internal resources.
Step 5: Configure Security Policies for GlobalProtect
You need policies to allow GlobalProtect users to access your internal network.
- Navigate to Policies > Security.
- Click Add.
- Name:
Allow-GP-Users-to-LAN - Source Zone:
GP-Zone(your GlobalProtect tunnel interface zone) - Source Address:
172.16.10.0/24(your GlobalProtect IP pool) - Destination Zone:
LAN-Zone(your internal LAN zone) - Destination Address:
10.0.1.0/24(your internal LAN) - Application:
any(or specific applications) - Service:
application-default - Action:
Allow
Explanation:
- Similar to Site-to-Site, security policies govern traffic flow. This policy allows traffic from your remote users (in
GP-Zonewith IPs from172.16.10.0/24) to reach your internal network.
Final Step: Commit Configuration
Don’t forget to Commit your changes!
Mini-Challenge: Extend Your Site-to-Site VPN
You’ve successfully set up a Site-to-Site VPN between HQ and Branch. Now, HQ has added a new server subnet, 10.0.3.0/24, and devices in the Branch office need to access it.
Challenge: Modify the existing Site-to-Site VPN configuration on both HQ-FW and Branch-FW to allow traffic between the Branch LAN (10.0.2.0/24) and the new HQ Server LAN (10.0.3.0/24).
Hint: Think about which specific configuration element defines what traffic is allowed through the tunnel. Don’t forget routing and security policies!
What to observe/learn: This exercise reinforces the concept of Proxy IDs (or Traffic Selectors) and how they control the scope of the VPN tunnel. It also highlights the need to update routing and security policies when network topology changes.
Common Pitfalls & Troubleshooting
VPNs can be tricky! Here are common issues and how to approach them:
Phase 1/Phase 2 Mismatches (Site-to-Site):
- Symptom: VPN status shows “Phase 1 down” or “Phase 2 down” in Network > IPSec Tunnels.
- Cause: Mismatched IKE/IPSec Crypto Profile parameters (encryption, auth, DH group, lifetime) or incorrect Pre-shared Key/Certificate. Proxy IDs are a common Phase 2 mismatch.
- Troubleshooting:
- Go to Monitor > System Logs and filter for
subtype eq vpn. Look for “IKE phase 1 negotiation failed” or “IPSec phase 2 negotiation failed” messages. - Use the CLI:
show vpn ike-saandshow vpn ipsec-sato see the status. - Double-check every parameter in your IKE and IPSec Crypto Profiles, IKE Gateway, and IPSec Tunnel (especially Proxy IDs) on both firewalls. They must match exactly.
- Go to Monitor > System Logs and filter for
Routing Issues (Site-to-Site & Remote Access):
- Symptom: VPN is up, but users can’t reach resources on the remote network.
- Cause: Missing or incorrect static routes, or asymmetric routing (traffic takes a different path back).
- Troubleshooting:
- On the firewall, use
show routing routeto verify routes for the remote networks point to the correct tunnel interface. - Use
pingandtraceroutefrom devices behind the firewall to diagnose connectivity. - Check Monitor > Traffic Logs to see if traffic is hitting the firewall and what action is being taken. Is it being dropped, or forwarded out the wrong interface?
- On the firewall, use
Security Policy Blocks:
- Symptom: VPN is up, routing is correct, but traffic is still blocked.
- Cause: Missing or overly restrictive security policies.
- Troubleshooting:
- Check Monitor > Traffic Logs. Filter by source/destination IP and look for
denyactions. The “Rule” column will tell you which policy is blocking it. - Ensure you have policies allowing traffic from your
VPN-ZoneorGP-Zoneto your internalLAN-Zone, and potentially vice-versa. Remember App-ID and User-ID might also be at play!
- Check Monitor > Traffic Logs. Filter by source/destination IP and look for
GlobalProtect Client Connectivity:
- Symptom: GlobalProtect client can’t connect, or shows “Connecting…” indefinitely.
- Cause: Incorrect Portal/Gateway address, firewall rules blocking UDP 4501 or TCP 443, authentication failures, or certificate issues.
- Troubleshooting:
- Verify the GlobalProtect Portal and Gateway addresses entered by the user.
- Check Monitor > GlobalProtect > System Logs and Monitor > GlobalProtect > Tunnel Logs on the firewall.
- On the client, check the GlobalProtect client logs (often found in
C:\ProgramData\PaloAlto Networks\GlobalProtect\PanGPS.logon Windows). - Ensure security policies allow inbound traffic on your external interface for GlobalProtect (TCP 443 for Portal, UDP 4501 for Gateway).
Summary
Congratulations! You’ve navigated the complexities of VPNs on Palo Alto Networks firewalls. Here are the key takeaways from this chapter:
- VPNs provide secure, encrypted tunnels over untrusted networks for confidentiality, integrity, and authentication.
- Site-to-Site VPNs connect entire networks, typically using IPsec with two phases: IKE (Phase 1) for key exchange and IPsec (Phase 2) for data protection.
- Key Site-to-Site components include IKE Crypto Profiles, IPSec Crypto Profiles, IKE Gateways, IPSec Tunnels, Tunnel Interfaces, Static Routes, and Security Policies.
- Proxy IDs are critical for defining which specific networks are allowed to traverse a Site-to-Site IPsec tunnel and must match on both ends.
- Remote Access VPNs connect individual users to the corporate network, with Palo Alto Networks’ solution being GlobalProtect.
- GlobalProtect consists of a Portal (for client configuration and initial authentication), Gateway (for VPN termination), and Agent (client software).
- Configuring GlobalProtect involves setting up Authentication Profiles, Portal, Gateway, Client IP Pools, Access Routes, Tunnel Interfaces, and Security Policies.
- Dedicated VPN Zones (e.g.,
VPN-Zone,GP-Zone) are a best practice for granular security policy enforcement. - Common troubleshooting steps involve checking firewall logs (
Monitor > System Logs,Monitor > Traffic Logs,Monitor > GlobalProtect logs), CLI commands (show vpn ike-sa,show vpn ipsec-sa,show routing route), and verifying configuration parameters meticulously.
You now have the foundational knowledge and practical steps to deploy secure VPN solutions for both inter-network and remote user connectivity. In the next chapter, we’ll explore advanced security features like App-ID and User-ID in greater detail, building on the network and policy concepts we’ve covered so far.
References
- Palo Alto Networks. (2025). PAN-OS Administrator’s Guide for 11.1. https://docs.paloaltonetworks.com/pan-os
- Palo Alto Networks. (2025). Set Up an IPSec VPN Tunnel. https://docs.paloaltonetworks.com/pan-os/11-1/pan-os-admin/vpns/set-up-an-ipsec-vpn-tunnel
- Palo Alto Networks. (2025). GlobalProtect Administrator’s Guide. https://docs.paloaltonetworks.com/globalprotect
- Palo Alto Networks. (2025). GlobalProtect Portal Configuration. https://docs.paloaltonetworks.com/globalprotect/11-1/globalprotect-admin-guide/globalprotect-portals/configure-the-portal
- Palo Alto Networks. (2025). GlobalProtect Gateway Configuration. https://docs.paloaltonetworks.com/globalprotect/11-1/globalprotect-admin-guide/globalprotect-gateways/configure-the-gateway
This page is AI-assisted and reviewed. It references official documentation and recognized resources where relevant.