All documents

VPN Site-to-Site

    VPN Site-to-Site Configuration with Palo Alto
    VPN Site-to-Site Configuration with Palo Alto
    Updated on 31 Oct 2025

    You must ensure the following conditions are met:

    • The VPN Site-to-Site service is set up on the FPT Cloud Portal.

    • A Palo Alto firewall is installed and enabled on the customer's side.

    • The Palo Alto firewall has been configured with three IP addresses: Management (Public IP) - WAN (Public IP) - LAN.

    Step 1: Configure VPN Site-to-Site

    Access and create the VPN Site-to-Site on https://console.fptcloud.com/

    -Create a Customer Gateway:

    • Remote private network: LAN subnet range for peering with Palo Alto

    • Remote IP public: Public IP address of Palo Alto

    -Create a VPN Connection:

    A VPN connection includes three main sections:

    • General Information (contains general connection details)

    • Remote VPN Information (contains encryption and customer-side information)

    • Dead Peer Detection (number of automatic retries if the connection encounters issues)

    Section 1: General Information

    Note: The Pre-shared key value should be saved for configuration on Palo Alto.

    Section 2: Remote VPN Information

    When selecting the provider “Palo Alto,” the system automatically fills in the IKE and IPsec information as follows: For IKE:

    • Encryption algorithm: aes-256

    • Authorization algorithm: sha256

    • IKE version: ikev2

    • Lifetime units: seconds

    • Lifetime value: 28800

    • DH Group: GROUP_14

    • Phase 1 negotiation mode: main

    For IPsec:

    • Encapsulation mode: tunnel

    • Encryption algorithm: aes-256

    • Authorization algorithm: sha256

    • Lifetime units: seconds

    • Lifetime value: 3600

    • Perfect forward secrecy (PFS): GROUP_14

    • Transform protocol: esp

    Section 3: Dead Peer Detection

    Enter the Delay and Max failure values, then click Create VPN Connection.

    Step 2: Configure IPsec on Palo Alto

    • Log in to Palo Alto via the Management IP: file

    • Click Add and activate the Palo Alto Zone. file

    • Create a Virtual Router on Palo Alto and click OK. file

    • Create WAN and LAN interfaces (for example, ethernet1/1 and ethernet1/2). file file file file

    • Create an IKE Crypto profile. file

    • Create an IPSec Crypto profile. file

    • Go to IPsec Tunnels:

    -In the General tab, enter Peer Address as the IP from FPT created in Step 1 (e.g., 103.176.147.48). file -In the Advanced Options tab, fill in the required details: file   - Create GlobalProtect IPSec: file

    • Create IPSec Tunnels: file file file

    Step 3: Configure Firewall and Routing on Palo Alto

    To configure the firewall and routing on Palo Alto, follow the example below:

    • Open any firewall policy.

    file file file

    Depending on your environment, configure the source and destination according to the rule.

    • Configure routing between the two subnets 30.30.30.0/24 and 80.80.80.0/24 (adjust according to your actual source and destination networks).

    file

    At this point, you can open the Terminal / Command Line to test network connectivity using ping.