Vigyata.AI
Is this your channel?

Palo Alto Firewall Site to Site VPN Configuration Secrets Revealed

2.0K views· 46 likes· 25:19· Jul 6, 2025

🛍️ Products Mentioned (2)

Join this channel to get access to perks: https://www.youtube.com/channel/UCBujQdd5rBRg7n70vy7YmAQ/join Please checkout my new video on How NAT-T Works with Traffic flow in Detailed and what is the difference between IKEv1 vs IKEv2. If you like this video give it a thumps up and subscribe my channel for more video. Have any question put it on comment section Recommend Video https://youtu.be/xGfi4WgThMA Recommend Link (Playlist for EVE-NG LAB Setup) https://www.youtube.com/playlist?list=PLaUiizP3D7fPMmUQqS5QKX_FVSoMP68Z5 Palo Alto Certification information URL: https://www.paloaltonetworks.com/services/education For Palo Alto Documentation https://docs.paloaltonetworks.com/ Please follow me Instagram : https://www.instagram.com/bikashtech Twitter : https://twitter.com/Bikashshaw82 E-mail ID : bikashshaw261@gmail.com #Paloaltotraining ##bikashtech #paloaltofirewalltraining #paloaltonetworks #paloaltotraining #paloaltovpn #vpn #ike #ipsec

About This Video

Hello friends, welcome back to my PCNSA series—this is day 40, and in this video I’m doing a fully lab-oriented Site-to-Site IPsec VPN configuration on Palo Alto. Before jumping into the lab, I’m assuming you already watched my VPN foundation videos where I explained algorithms, negotiation, and how phase 1/phase 2 works. Here I take an easy topology (two sites, LAN subnets, public IPs, and an ISP in between) and I show you the exact flow I follow in real deployments so you can repeat it in your own lab and real-world scenarios. I start from the basics: hostname, Layer3 interfaces, zones (inside/outside), IP addressing, and very important—default route towards ISP on both firewalls. Then I build phase 1 using an IKE Crypto profile (I use default for simplicity), create the IKE Gateway with peer IP and pre-shared key, and explain options like passive mode, NAT traversal use-cases, main mode, and dead peer detection. After that, I configure phase 2 with an IPsec tunnel, bind it to a tunnel interface, define Proxy IDs (which subnets to encrypt), add static routes to send private traffic via the tunnel, and finally create bidirectional security policies. To verify, I generate ping traffic and show where to check phase 1 status, phase 2 status, and encapsulation/decapsulation counters to confirm encryption and decryption is happening both ways.

Frequently Asked Questions

🎬 More from Bikash's Tech