Vigyata.AI
Is this your channel?

#paloaltofirewalltraining | Day 38| Palo Alto Site-to-Site VPN Explained in Detail

2.4K views· 69 likes· 14:41· Jun 22, 2025

🛍️ Products Mentioned (2)

Join this channel to get access to perks: https://www.youtube.com/channel/UCBujQdd5rBRg7n70vy7YmAQ/join Please checkout my new video on What is Site-to-Site VPN concept. If you like this video give it a thumps up and subscribe my channel for more video. Have any question put it on comment section Recommend Video https://youtu.be/GG_-mY5dK1s Recommend Link (Playlist for EVE-NG LAB Setup) https://www.youtube.com/playlist?list=PLaUiizP3D7fPMmUQqS5QKX_FVSoMP68Z5 Palo Alto Certification information URL: https://www.paloaltonetworks.com/services/education For Palo Alto Documentation https://docs.paloaltonetworks.com/ Please follow me Instagram : https://www.instagram.com/bikashtech Twitter : https://twitter.com/Bikashshaw82 E-mail ID : bikashshaw261@gmail.com #Paloaltotraining ##bikashtech #paloaltofirewalltraining #paloaltonetworks #paloaltotraining #paloaltovpn #vpn #ike #ipsec

About This Video

Hello friends, welcome back—this is Day 38 of my PCNSA series, and in this video I go deeper into Palo Alto Site-to-Site VPN by explaining how the VPN tunnel is actually built. In my previous video I covered VPN basics like hashing and encryption, so here I focus on the real negotiation part: what components are required, what Phase 1 is, what IKE/ISAKMP means (same concept, different terms), and why Phase 2 is needed. I also explain Main Mode vs Aggressive Mode—Main Mode uses 6 messages and Aggressive uses 3, and in packet capture you can literally see which messages are clear text and which become encrypted. Then I break down Phase 1 step-by-step using the initiator/responder flow: encryption, hashing, authentication, and DH proposals go first, and if policies don’t match you’ll see “no matching policy” behavior. After that, Diffie-Hellman public keys are exchanged, both sides calculate the same shared key, and that key is used to encrypt the authentication part (pre-shared key or certificate) to verify you’re building VPN to the right device. Finally, I explain Phase 2 as the data phase—how your actual traffic gets encrypted/authenticated—plus why PFS (DH in Phase 2) adds an extra layer of security. I also cover the idea of rekey and lifetimes so keys keep changing over time without impacting users.

Frequently Asked Questions

🎬 More from Bikash's Tech