<?xml version='1.0' encoding='UTF-8'?>
<response status="success">
  <need-tunnel>yes</need-tunnel>
  <ssl-tunnel-url>/ssl-tunnel-connect.sslvpn</ssl-tunnel-url>
  <portal>Gateway-Name</portal>
  <user>root</user>
  <lifetime>86400</lifetime>
  <timeout>3600</timeout>
  <disconnect-on-idle>3600</disconnect-on-idle>
  <bw-c2s>1000</bw-c2s>
  <bw-s2c>1000</bw-s2c>
  <gw-address>47.251.87.74</gw-address>
  <ip-address>47.251.87.74</ip-address>
  <netmask>255.255.255.255</netmask>
  <dns>
    <member>8.8.8.8</member>
    <member>4.4.4.4</member>
  </dns>
  <wins>
    <member>8.8.8.9</member>
    <member>4.4.4.5</member>
  </wins>
  <default-gateway>47.251.87.74</default-gateway>
  <mtu>0</mtu>
  <dns-suffix>
    <member>company.com</member>
    <member>company.internal</member>
    <member>stuff.company.com</member>
  </dns-suffix>
  <no-direct-access-to-local-network>no</no-direct-access-to-local-network>
  <access-routes>
    <member>10.0.0.0/8</member>
    <member>192.168.0.0/16</member>
    <!-- Normally, the DNS servers are explicitly listed here as /32 routes.
         0.0.0.0/0 is often included as the first member -->
  </access-routes>
  <exclude-access-routes>
    <!-- this was added in PanOS 8.0 -->
    <member>10.0.0.47/24</member>
    <member>10.0.0.48/24</member>
  </exclude-access-routes>
  <ipsec>
    <udp-port>4501</udp-port>
    <ipsec-mode>esp-tunnel</ipsec-mode>
    <enc-algo>aes-128-cbc</enc-algo>
    <hmac-algo>sha1</hmac-algo>
    <c2s-spi>0xEEADBEEF</c2s-spi>
    <s2c-spi>0xEEEDBACC</s2c-spi>
    <akey-s2c>
      <bits>160</bits>
      <val>6203e6c5a2bc57ca657b9da90ae1014efa63c976</val>
    </akey-s2c>
    <ekey-s2c>
      <bits>128</bits>
      <val>a2bc57ca657b9da90ae1014efa63c976</val>
    </ekey-s2c>
    <akey-c2s>
      <bits>160</bits>
      <val>6203e6c5a2bc57ca657b9da90ae1014efa63c976</val>
    </akey-c2s>
    <ekey-c2s>
      <bits>128</bits>
      <val>a2bc57ca657b9da90ae1014efa63c976</val>
    </ekey-c2s>
  </ipsec>
</response>
