Basic LSVPN Configuration with Static Routing
Table of Contents
Expand All
|
Collapse All
Next-Generation Firewall Docs
-
PAN-OS 11.1 & Later
- PAN-OS 11.1 & Later
- PAN-OS 11.0 (EoL)
- PAN-OS 10.2
- PAN-OS 10.1
-
- Tap Interfaces
-
- Layer 2 and Layer 3 Packets over a Virtual Wire
- Port Speeds of Virtual Wire Interfaces
- LLDP over a Virtual Wire
- Aggregated Interfaces for a Virtual Wire
- Virtual Wire Support of High Availability
- Zone Protection for a Virtual Wire Interface
- VLAN-Tagged Traffic
- Virtual Wire Subinterfaces
- Configure Virtual Wires
- Configure a PPPoE Client on a Subinterface
- Configure an IPv6 PPPoE Client
- Configure an Aggregate Interface Group
- Configure Bonjour Reflector for Network Segmentation
- Use Interface Management Profiles to Restrict Access
-
- DHCP Overview
- Firewall as a DHCP Server and Client
- Firewall as a DHCPv6 Client
- DHCP Messages
- Dynamic IPv6 Addressing on the Management Interface
- Configure an Interface as a DHCP Server
- Configure an Interface as a DHCPv4 Client
- Configure an Interface as a DHCPv6 Client with Prefix Delegation
- Configure the Management Interface as a DHCP Client
- Configure the Management Interface for Dynamic IPv6 Address Assignment
- Configure an Interface as a DHCP Relay Agent
-
- DNS Overview
- DNS Proxy Object
- DNS Server Profile
- Multi-Tenant DNS Deployments
- Configure a DNS Proxy Object
- Configure a DNS Server Profile
- Use Case 1: Firewall Requires DNS Resolution
- Use Case 2: ISP Tenant Uses DNS Proxy to Handle DNS Resolution for Security Policies, Reporting, and Services within its Virtual System
- Use Case 3: Firewall Acts as DNS Proxy Between Client and Server
- DNS Proxy Rule and FQDN Matching
-
- NAT Rule Capacities
- Dynamic IP and Port NAT Oversubscription
- Dataplane NAT Memory Statistics
-
- Translate Internal Client IP Addresses to Your Public IP Address (Source DIPP NAT)
- Create a Source NAT Rule with Persistent DIPP
- PAN-OS
- Strata Cloud Manager
- Enable Clients on the Internal Network to Access your Public Servers (Destination U-Turn NAT)
- Enable Bi-Directional Address Translation for Your Public-Facing Servers (Static Source NAT)
- Configure Destination NAT with DNS Rewrite
- Configure Destination NAT Using Dynamic IP Addresses
- Modify the Oversubscription Rate for DIPP NAT
- Reserve Dynamic IP NAT Addresses
- Disable NAT for a Specific Host or Interface
-
- Network Packet Broker Overview
- How Network Packet Broker Works
- Prepare to Deploy Network Packet Broker
- Configure Transparent Bridge Security Chains
- Configure Routed Layer 3 Security Chains
- Network Packet Broker HA Support
- User Interface Changes for Network Packet Broker
- Limitations of Network Packet Broker
- Troubleshoot Network Packet Broker
-
- Enable Advanced Routing
- Logical Router Overview
- Configure a Logical Router
- Create a Static Route
- Configure BGP on an Advanced Routing Engine
- Create BGP Routing Profiles
- Create Filters for the Advanced Routing Engine
- Configure OSPFv2 on an Advanced Routing Engine
- Create OSPF Routing Profiles
- Configure OSPFv3 on an Advanced Routing Engine
- Create OSPFv3 Routing Profiles
- Configure RIPv2 on an Advanced Routing Engine
- Create RIPv2 Routing Profiles
- Create BFD Profiles
- Configure IPv4 Multicast
- Configure MSDP
- Create Multicast Routing Profiles
- Create an IPv4 MRoute
-
-
PAN-OS 11.2
- PAN-OS 11.2
- PAN-OS 11.1
- PAN-OS 11.0 (EoL)
- PAN-OS 10.2
- PAN-OS 10.1
- PAN-OS 10.0 (EoL)
- PAN-OS 9.1 (EoL)
- PAN-OS 9.0 (EoL)
- PAN-OS 8.1 (EoL)
- Cloud Management and AIOps for NGFW
Something went wrong please try again later
End-of-Life (EoL)
Basic LSVPN Configuration with Static Routing
This quick config shows the fastest way to
get up and running with LSVPN. In this example, a single firewall at
the corporate headquarters site is configured as both a portal and
a gateway. Satellites can be quickly and easily deployed with minimal
configuration for optimized scalability.

The
following workflow shows the steps for setting up this basic configuration:
- Configure
a Layer 3 interface.In this example, the Layer 3 interface on the portal/gateway requires the following configuration:
- Interface—ethernet1/11
- Security Zone—lsvpn-tun
- IPv4—203.0.113.11/24
- On
the firewall(s) hosting GlobalProtect gateway(s), configure the
logical tunnel interface that will terminate VPN tunnels established
by the GlobalProtect satellites.To enable visibility into users and groups connecting over the VPN, enable User-ID in the zone where the VPN tunnels terminate.In this example, the Tunnel interface on the portal/gateway requires the following configuration:
- Interface—tunnel.1
- Security Zone—lsvpn-tun
- Create the Security policy rule to enable traffic flow between the VPN zone where the tunnel terminates (lsvpn-tun) and the trust zone where the corporate applications reside (L3-Trust).
- Assign an SSL/TLS Service profile to the portal/gateway.
The profile must reference a self-signed server certificate.The certificate subject name must match the FQDN or IP address of the Layer 3 interface you create for the portal/gateway.
- On the firewall hosting the GlobalProtect portal, create the root CA certificate for signing the certificates of the GlobalProtect components. In this example, the root CA certificate, lsvpn-CA, will be used to issue the server certificate for the portal/gateway. In addition, the portal will use this root CA certificate to sign the CSRs from the satellites.
- Create
SSL/TLS service profiles for the GlobalProtect portal and gateways.Because the portal and gateway are on the same interface in this example, they can share an SSL/TLS Service profile that uses the same server certificate. In this example, the profile is named lsvpnserver.
- Create
a certificate profile.In this example, the certificate profile lsvpn-profile references the root CA certificate lsvpn-CA. The gateway will use this certificate profile to authenticate satellites attempting to establish VPN tunnels.
- Configure an authentication profile for the portal to
use if the satellite serial number is not available.
- Create one type of server profile on the
portal:
- You can use RADIUS to integrate with a Multi-Factor Authentication service.
- Add an LDAP server profile. If you use LDAP to connect to Active Directory (AD), create a separate LDAP server profile for every AD domain.
- Configure an authentication profile. In this example, the profile lsvpn-sat is used to authenticate satellites.
- Create one type of server profile on the
portal:
- Configure
GlobalProtect Gateways for LSVPN.Select NetworkGlobalProtectGateways and Add a configuration. This example requires the following gateway configuration:
- Interface—ethernet1/11
- IP Address—203.0.113.11/24
- SSL/TLS Server Profile—lsvpnserver
- Certificate Profile—lsvpn-profile
- Tunnel Interface—tunnel.1
- Primary DNS/Secondary DNS—4.2.2.1/4.2.2.2
- IP Pool—2.2.2.111-2.2.2.120
- Access Route—10.2.10.0/24
- Configure
the Portal.Select NetworkGlobalProtectPortal and Add a configuration. This example requires the following portal configuration:
- Interface—ethernet1/11
- IP Address—203.0.113.11/24
- SSL/TLS Server Profile—lsvpnserver
- Authentication Profile—lsvpn-sat
- Define
the Satellite Configurations.On the Satellite tab in the portal configuration, Add a Satellite configuration and a Trusted Root CA and specify the CA the portal will use to issue certificates for the satellites. In this example the required settings are as following:
- Gateway—203.0.113.11
- Issuing Certificate—lsvpn-CA
- Trusted Root CA—lsvpn-CA
- Prepare
the Satellite to Join the LSVPN.The satellite configuration in this example requires the following settings:Interface Configuration
- Layer 3 interface—ethernet1/1, 203.0.113.13/24
- Tunnel interface—tunnel.2
- Zone—lsvpnsat
Root CA Certificate from Portal- lsvpn-CA
IPSec Tunnel Configuration- Tunnel Interface—tunnel.2
- Portal Address—203.0.113.11
- Interface—ethernet1/1
- Local IP Address—203.0.113.13/24
- Publish all static and connected routes to Gateway—enabled