Quick Guide
FAQs
VPN Site-to-Site (new version)
You must ensure the following conditions are met:
The VPN Site-to-Site service is set up on the FPT Cloud Portal.
A Palo Alto firewall is installed and enabled on the customer's side.
The Palo Alto firewall has been configured with three IP addresses: Management (Public IP) - WAN (Public IP) - LAN.
Access and create the VPN Site-to-Site on https://console.fptcloud.com/
-Create a Customer Gateway:
Remote private network: LAN subnet range for peering with Palo Alto
Remote IP public: Public IP address of Palo Alto

-Create a VPN Connection:
A VPN connection includes three main sections:
General Information (contains general connection details)
Remote VPN Information (contains encryption and customer-side information)
Dead Peer Detection (number of automatic retries if the connection encounters issues)
Section 1: General Information

Note: The Pre-shared key value should be saved for configuration on Palo Alto.
Section 2: Remote VPN Information

When selecting the provider “Palo Alto,” the system automatically fills in the IKE and IPsec information as follows: For IKE:
Encryption algorithm: aes-256
Authorization algorithm: sha256
IKE version: ikev2
Lifetime units: seconds
Lifetime value: 28800
DH Group: GROUP_14
Phase 1 negotiation mode: main
For IPsec:
Encapsulation mode: tunnel
Encryption algorithm: aes-256
Authorization algorithm: sha256
Lifetime units: seconds
Lifetime value: 3600
Perfect forward secrecy (PFS): GROUP_14
Transform protocol: esp
Section 3: Dead Peer Detection

Enter the Delay and Max failure values, then click Create VPN Connection.
Log in to Palo Alto via the Management IP:

Click Add and activate the Palo Alto Zone.

Create a Virtual Router on Palo Alto and click OK.

Create WAN and LAN interfaces (for example, ethernet1/1 and ethernet1/2).

Create an IKE Crypto profile.

Create an IPSec Crypto profile.

Go to IPsec Tunnels:
-In the General tab, enter Peer Address as the IP from FPT created in Step 1 (e.g., 103.176.147.48).
-In the Advanced Options tab, fill in the required details:
- Create GlobalProtect IPSec:

To configure the firewall and routing on Palo Alto, follow the example below:

Depending on your environment, configure the source and destination according to the rule.

At this point, you can open the Terminal / Command Line to test network connectivity using ping.