Skip to main content

VPN Site-to-Site configuration with Palo Alto

Prerequisites

Ensure the following conditions are met before starting:

  • The VPN Site-to-Site service is set up on FPT Cloud Portal.
  • A Palo Alto firewall is installed and enabled on the customer side.
  • The Palo Alto firewall has three IP addresses configured: Management (Public IP), WAN (Public IP), and LAN.

Step 1: Configure VPN Site-to-Site on FPT Cloud Portal

Access https://console.fptcloud.com/ and create the VPN Site-to-Site.

Create a Customer Gateway:

  • Remote private network: LAN subnet range for peering with Palo Alto
  • Remote IP public: Public IP address of the Palo Alto firewall

Customer Gateway

Create a VPN Connection:

A VPN connection has three main sections:

  • General Information — basic connection details
  • Remote VPN Information — encryption and customer-side configuration
  • Dead Peer Detection — automatic retry settings

Section 1: General Information

General Information

note

Save the Pre-shared key value — you will need it when configuring Palo Alto.

Section 2: Remote VPN Information

Remote VPN Information

When selecting the provider Palo Alto, the system automatically fills in the IKE and IPsec settings:

IKE:

ParameterValue
Encryption algorithmaes-256
Authorization algorithmsha256
IKE versionikev2
Lifetime unitsseconds
Lifetime value28800
DH GroupGROUP_14
Phase 1 negotiation modemain

IPsec:

ParameterValue
Encapsulation modetunnel
Encryption algorithmaes-256
Authorization algorithmsha256
Lifetime unitsseconds
Lifetime value3600
Perfect Forward Secrecy (PFS)GROUP_14
Transform protocolesp

Section 3: Dead Peer Detection

Dead Peer Detection

Enter the Delay and Max failure values, then click Create VPN Connection.

Step 2: Configure IPsec on Palo Alto

  1. Log in to Palo Alto via the Management IP.

Login

  1. Click Add and activate the Palo Alto Zone.

Zone

  1. Create a Virtual Router and click OK.

Virtual Router

  1. Create WAN and LAN interfaces (for example, ethernet1/1 and ethernet1/2).

WAN interface LAN interface Interface config Interface result

  1. Create an IKE Crypto profile.

IKE Crypto

  1. Create an IPSec Crypto profile.

IPSec Crypto

  1. Go to IPsec Tunnels:

    • In the General tab, enter the Peer Address as the FPT Cloud IP from Step 1 (e.g., 103.176.147.48).

General tab

  • In the Advanced Options tab, fill in the required details.

Advanced Options

  • Create a GlobalProtect IPSec entry.

GlobalProtect IPSec

  1. Create the IPSec Tunnels.

IPSec Tunnel 1 IPSec Tunnel 2 IPSec Tunnel 3

Step 3: Configure firewall and routing on Palo Alto

  1. Open a firewall policy.

Firewall policy Policy config Policy result

Configure the source and destination according to your environment rules.

  1. Configure routing between the two subnets (e.g., 30.30.30.0/24 and 80.80.80.0/24). Adjust to match your actual source and destination networks.

Routing config

You can now open a terminal to test network connectivity using ping.