General Articles
LIVEcommunity's General Articles area is home to how-to resources, technical documentation, and discussions with Accepted Solutions that turn into articles related to all Palo Alto Networks products.
cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
Announcements
Please sign in to see details of an important advisory in our Customer Advisories area.
About General Articles
LIVEcommunity's General Articles area is home to how-to resources, technical documentation, and discussions with Accepted Solutions that turn into articles related to all Palo Alto Networks products.
This Nominated Discussion Article is based on the post "B2B VPN IKEv2 Fail with Amazon Private Cloud Peer" by @pnelson which he answered himself.  Thanks for sharing your experience with the community !   Setting up a VPN with a vendor. It came up the first time and test data was passed. It was a couple of weeks after testing before the tunnel would actually be used. When that time came we could not get the tunnel up. IKEv2 fails. I know nothing changed on my end and the vendor makes the same claim. The vendor is using Amazon virtual private cloud firewall. I am using an on-prem PA-3250 HA pair (active/passive) inside of my Internet perimeter with 96 perfectly happy B2B VPNs running. We have tried everything to get the tunnel back up including tearing down the config on both peers and rebuilding from scratch, my side using a new tunnel interface.   The vendor has to initiate the tunnel as the tunneled host on my side only sends stateful replies, the vendor always sends the SYN, so my side is always the IKEv2 responder.   The IKEv2 initiator request comes in and my side responds. SPIs are established so we have peer-to-peer communication. No issues with NAT-T.   I have attached a packet capture of an IKEv2 exchange (4 packets) and a system log of the failure (2 lines). Digging into the packets I see key exchange and it looks like the Phase 1 proposal is correct. Would someone take a look and educate me on what I'm missing?   I think I have found the issue. The initiating peer has an incorrect peer ID for my side (responder) as revealed by CLI 'less mp-log ikemgr.log'. It gives more detail than the GUI system log. My vendor counterpart is on the other side of the globe so I'm not sure when he will be attempting the correction.   This issue has been resolved. On my side I had to set the local peer ID to my firewall interface's public NAT address, not the native address. IKEv2 still wouldn't come up so the vendor changed his proposal from being specific to throwing many combinations my way. After that Phase 1 & Phase 2 came up instantly.  
View full article
This Nominated Discussion Article is based on the post "Given Tunnel Interface IP is wrong but still tunnel is up".
View full article
This Nominated Discussion Article is based on the post "Bring Down IPsec Tunnel Manually" by @j.nepomuceno and responded to by @TomYoung and @Raido_Rattameister . Read on to see the discussion and solution!     I am troubleshooting an issue where I need to bring down the IPsec tunnel manually, what is the best way to do this in GUI or CLI? Thanks   Depending on whether you want to bounce the tunnel or actually disable it, you have different options.   The following CLI commands will tear down the VPN tunnel (phase1 & phase2 respectively): Phase 1 > clear vpn ike-sa gateway <gw-name>​ Phase 2 > clear vpn ipsec-sa tunnel <tunnel-name>​   Follow these steps to clear (bounce) a tunnel using the GUI: Phase 1 Goto Network > IPsec tunnels and select your tunnel Click IKE-Info At the bottom, click the action you want (Refresh or Restart)   Phase 2 Goto Network > IPsec tunnels and select your tunnel Click Tunnel-Info At the bottom, click the action you want (Refresh or Restart)   Instead of bouncing, you can also choose to disable/enable IKE gateways or IPsec tunnels.   Enable/Disable an IKE Gateway Go to Network  > Network Profiles > IKE Gateways and select the gateway in question.   Click Enable/Disable at the bottom of the screen   Enable/Disable an IPsec tunnel Go to Network  > IPSec Tunnels and select the tunnel in question Click Enable/Disable at the bottom of the screen   For more information: Refresh or Restart an IKE Gateway or IPSec Tunnel How to check Status, Clear, Restore, and Monitor an IPSEC VPN Tunnel Enable or Disable an IKE Gateway or IPSec Tunnel How to Troubleshoot IPSec VPN connectivity issues
View full article
  • 183 Posts
  • 263 Subscriptions
Customer Advisories

Your security posture is important to us. If you’re a Palo Alto Networks customer, be sure to login to see the latest critical announcements and updates in our Customer Advisories area.

Learn how to subscribe to and receive email notifications here.

Listen to PANCast

PANCast is a Palo Alto Networks podcast that provides actionable insights to customers, helping you maximize your investment while improving your cybersecurity posture.

Labels
Top Contributors