{"id":7826,"date":"2015-01-07T16:00:45","date_gmt":"2015-01-08T00:00:45","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=7826"},"modified":"2015-12-11T09:38:55","modified_gmt":"2015-12-11T17:38:55","slug":"set-ipsec-tunnel-pan-os-6-1","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2015\/01\/set-ipsec-tunnel-pan-os-6-1\/","title":{"rendered":"How To Set Up an IPSec Tunnel In PAN-OS 6.1"},"content":{"rendered":"<p>As you deploy a Palo Alto Networks firewall, the IPSec tunnel configuration allows you to authenticate and\/or encrypt data (IP packet) as it traverses across the tunnel.<\/p>\n<p><!--more--><\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/documentation\/61\/pan-os\/pan-os\/vpns\/set-up-an-ipsec-tunnel.html\" target=\"_blank\">Head here<\/a> for step-by-step instructions in the PAN-OS 6.1 Administrator's Guide.<\/p>\n<p>And while you're at it, be sure to <a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2014\/11\/9-new-features-topics-check-pan-os-6-1\/\" target=\"_blank\">check out<\/a> 9 New Features and Topics to Check Out in PAN-OS 6.1.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As you deploy a Palo Alto Networks firewall, the IPSec tunnel configuration allows you to authenticate and\/or encrypt data (IP packet) as it traverses across the tunnel.<\/p>\n","protected":false},"author":77,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[587],"tags":[861,1001],"coauthors":[711],"class_list":["post-7826","post","type-post","status-publish","format-standard","hentry","category-technical-documentation","tag-pan-os-6-1","tag-tips-and-tricks"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/7826","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/77"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=7826"}],"version-history":[{"count":3,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/7826\/revisions"}],"predecessor-version":[{"id":11400,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/7826\/revisions\/11400"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=7826"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=7826"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=7826"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=7826"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}