Configure IPSec VPN Tunnels (Site-to-Site)
    
    Learn how to configure a site-to-site IPSec VPN tunnel.
    
  
    
  
| Where Can I Use This? | What Do I Need? | 
|---|
    
  
 
  
To set up site-to-site VPN:
- Make sure that your Ethernet interfaces, virtual routers, and zones are
                    configured properly. For more information, see
                     Configure Interfaces and
                    Zones- . 
- Create your tunnel interfaces. Ideally, put the tunnel interfaces in a separate
                    zone, so that tunneled traffic can use different policy rules. 
- Set up static routes or assign routing protocols to redirect traffic to the VPN
                    tunnels. To support dynamic routing (OSPF, BGP, RIP are supported), you must
                    assign an IP address to the tunnel interface. 
- Define IKE gateways for establishing communication between the peers across each
                    end of the VPN tunnel; also define the cryptographic profile that specifies the
                    protocols and algorithms for identification, authentication, and encryption to
                    be used for setting up VPN tunnels in IKEv1 Phase 1. See  Set
                        Up an IKE Gateway-  and
                         Define IKE Crypto
                        Profiles- . 
- Define Security policies to filter and inspect the traffic. - 
    
    - If there’s a deny rule at the end of the security rulebase, intrazone traffic
                        is blocked unless otherwise allowed. Rules to allow IKE and IPSec
                        applications must be explicitly included above the deny rule. 
 - 
    
    - If your VPN traffic is passing through (not originating or terminating on) a
                        PA-7000 Series or PA-5200 Series firewall, configure a bidirectional
                        Security policy rule to allow the ESP or AH traffic in both directions. 
 
When these tasks are complete, the tunnel is ready for use. Traffic destined for the
            zones/addresses defined in a policy rule is automatically routed properly based on the
            destination route in the routing table, and handled as VPN traffic. For a few examples
            on site-to-site VPN, see 
Site-to-Site VPN
                .