AWS Site-to-Site VPN Configuration Guide for Palo Alto Firewalls

This article guides you through configuring a Site-to-Site VPN between an AWS Transit Gateway with a VPN attachment and a Palo Alto Firewall. It will also cover exchanging IPv4 routes using BGP to minimize manual effort and control routing advertising using BGP policies. We recommend you use BGP-capable devices, when available, because the BGP protocol offers robust capabilities to assist failover to the second VPN tunnel if the first tunnel goes down.

This guide covers:

Pre-requisites

Note: the outside IPv4 address can be private if it is behind a Network Address Translation (NAT) device. In that case, the VPN traffic will use UDP port 4500 instead of the traditional UDP port 500. Further configuration will be required to support using a private IP address that is not covered in this guide.

Guide Architecture Overview

Figure 1: An overview of the architecture used in this guide

The above diagram summarizes the architecture used in this guide. In the guide, we have 3 VPCs configured with IPv4 CIDRs. The 3 VPCs are attached to the transit gateway. Each VPC has applications running on port 80 with no access to the internet. The VPC CIDR blocks are configured as follows: VPC A - 10.1.0.0/16, VPC B - 10.2.0.0/16, VPC C - 10.3.0.0/16. The on-premises environment is configured with a CIDR block of 172.31.0.0/16.

Part 1: Configure the Customer Gateway on AWS console

Select Create customer gateway: