<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Azure VPN Connection issues in VM-Series in the Public Cloud</title>
    <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/azure-vpn-connection-issues/m-p/595365#M2218</link>
    <description>&lt;P&gt;Hi All,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Appreciate any help with an Azure VPN connection. I have a couple that works but this one is problematic.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have configured to match the Azure configuration so my end:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;IKE: AES-256-CBC, SHA256, Group 14 and Key 8Hrs&lt;/P&gt;
&lt;P&gt;IPSEC:&amp;nbsp; AES-256-CBC, SHA256, No-PFS and key 27000secs.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Gateway: Their Peer IP, My Peer IP, PSK, IKEv2 mode, Passive Mode enabled and Liveness unticked. IKE config selected.&lt;/P&gt;
&lt;P&gt;IPSec Tunnels: Tunnel interface assigned, IKE Gateway and IPSec Profile selected.Proxy ID's assigned.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Policy:&amp;nbsp; Peer IPs permitted on outside interface as bi-directional rule.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Issue: Phase 1 and Phase 2 not coming up.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I look at cli for sessions from peer IP and this is what I see:&lt;/P&gt;
&lt;P&gt;show session all filter source "peer"&lt;/P&gt;
&lt;P&gt;--------------------------------------------------------------------------------&lt;BR /&gt;ID Application State Type Flag Src[Sport]/Zone/Proto (translated IP[Port])&lt;BR /&gt;Vsys Dst[Dport]/Zone (translated IP[Port])&lt;BR /&gt;--------------------------------------------------------------------------------&lt;BR /&gt;1593311 ike ACTIVE FLOW "remote_peer"[500]/Firewall_Untrust_Internet/17 ("remote_peer"[500])&lt;BR /&gt;vsys2 "local_peer"[500]/Firewall_Untrust_Internet ("local_peer"[500])&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I look at the state of the IKE gateway:&lt;/P&gt;
&lt;P&gt;show vpn ike-sa gateway IKEGW-0001&lt;/P&gt;
&lt;P&gt;There is no IKEv1 phase-1 SA found.&lt;/P&gt;
&lt;P&gt;There is no IKEv1 phase-2 SA found.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;IKEv2 SAs&lt;BR /&gt;Gateway ID Peer-Address Gateway Name Role SN Algorithm Established Expiration Xt Child ST&lt;BR /&gt;---------- ------------ ------------ ---- -- --------- ----------- ---------- -- ----- --&lt;BR /&gt;19 "Remote_Peer" IKEGW-0001 Resp 43895 PSK/DH14/A256/SHA256 0 0 INIT sent&lt;BR /&gt;19 "Remote_Peer" IKEGW-0001 Resp 43896 PSK/DH14/A256/SHA256 0 0 INIT sent&lt;BR /&gt;19 "Remote_Peer" IKEGW-0001 Resp 43897 PSK/DH14/A256/SHA256 0 0 INIT sent&lt;BR /&gt;19 "Remote_Peer" IKEGW-0001 Resp 43898 PSK/DH14/A256/SHA256 0 0 INIT sent&lt;BR /&gt;19 "Remote_Peer" IKEGW-0001 Resp 43899 PSK/DH14/A256/SHA256 0 0 INIT sent&lt;BR /&gt;Show IKEv2 SA: Total 17 gateways found. 5 ike sa found.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am tailing the IKE Manager log to see what is going on:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;2024-08-20 15:27:02.283 +0100 [INFO]: { 19: }: passive mode is specified for IKE gateway IKEGW-0001&lt;BR /&gt;2024-08-20 15:27:02.418 +0100 [INFO]: { 19: }: received IKE request "Remote_Peer"[500] to "Local_Peer"[500], found IKE gateway IKEGW-0001&lt;BR /&gt;2024-08-20 15:27:02.418 +0100 [PNTF]: { 19: }: ====&amp;gt; IKEv2 IKE SA NEGOTIATION STARTED AS RESPONDER, non-rekey; gateway IKEGW-LINC-0001-Cirdan &amp;lt;====&lt;BR /&gt;====&amp;gt; Initiated SA: 5.255.48.251[500]-"Remote_Peer"[500] SPI:371ac746e7d5a8b0:e49716e42da7a08c SN:43900 &amp;lt;====&lt;BR /&gt;2024-08-20 15:27:02.418 +0100 [DEBG]: { 19: }: received Notify type NAT_DETECTION_SOURCE_IP&lt;BR /&gt;2024-08-20 15:27:02.418 +0100 [PWRN]: { 19: }: "Local_Peer"[500] - "Remote_Peer"[500]:0x56510c70bdf0 ignoring unauthenticated notify payload (NAT_DETECTION_SOURCE_IP)&lt;BR /&gt;2024-08-20 15:27:02.418 +0100 [DEBG]: { 19: }: received Notify type NAT_DETECTION_DESTINATION_IP&lt;BR /&gt;2024-08-20 15:27:02.418 +0100 [PWRN]: { 19: }: "Local_Peer"[500] - "Remote_Peer"[500]:0x56510c70bdf0 ignoring unauthenticated notify payload (NAT_DETECTION_DESTINATION_IP)&lt;BR /&gt;2024-08-20 15:27:02.418 +0100 [PWRN]: { 19: }: "Local_Peer"[500] - "Remote_Peer"[500]:0x56510c70bdf0 vendor id payload ignored&lt;BR /&gt;2024-08-20 15:27:02.418 +0100 [PWRN]: { 19: }: "Local_Peer"[500] - "Remote_Peer"[500]:0x56510c70bdf0 vendor id payload ignored&lt;BR /&gt;2024-08-20 15:27:02.418 +0100 [PWRN]: { 19: }: "Local_Peer"[500] - "Remote_Peer"[500]:0x56510c70bdf0 vendor id payload ignored&lt;BR /&gt;2024-08-20 15:27:02.419 +0100 [PWRN]: { 19: }: "Local_Peer"[500] - "Remote_Peer"[500]:0x56510c70bdf0 vendor id payload ignored&lt;BR /&gt;2024-08-20 15:27:02.419 +0100 [DEBG]: { 19: }: see whether there's matching transform&lt;BR /&gt;2024-08-20 15:27:02.419 +0100 [DEBG]: { 19: }: found same ID(12,12). compare attributes&lt;BR /&gt;2024-08-20 15:27:02.419 +0100 [DEBG]: { 19: }: OK; advance to next of my transform type&lt;BR /&gt;2024-08-20 15:27:02.419 +0100 [DEBG]: { 19: }: see whether there's matching transform&lt;BR /&gt;2024-08-20 15:27:02.419 +0100 [DEBG]: { 19: }: found same ID(5,5). compare attributes&lt;BR /&gt;2024-08-20 15:27:02.419 +0100 [DEBG]: { 19: }: OK; advance to next of my transform type&lt;BR /&gt;2024-08-20 15:27:02.419 +0100 [DEBG]: { 19: }: see whether there's matching transform&lt;BR /&gt;2024-08-20 15:27:02.419 +0100 [DEBG]: { 19: }: found same ID(12,12). compare attributes&lt;BR /&gt;2024-08-20 15:27:02.419 +0100 [DEBG]: { 19: }: OK; advance to next of my transform type&lt;BR /&gt;2024-08-20 15:27:02.419 +0100 [DEBG]: { 19: }: see whether there's matching transform&lt;BR /&gt;2024-08-20 15:27:02.419 +0100 [DEBG]: { 19: }: found same ID(14,14). compare attributes&lt;BR /&gt;2024-08-20 15:27:02.419 +0100 [DEBG]: { 19: }: OK; advance to next of my transform type&lt;BR /&gt;2024-08-20 15:27:02.419 +0100 [DEBG]: { 19: }: success&lt;BR /&gt;2024-08-20 15:27:02.419 +0100 [DEBG]: { 19: }: update request message_id 0x0&lt;BR /&gt;2024-08-20 15:27:07.889 +0100 [INFO]: { 19: }: passive mode is specified for IKE gateway IKEGW-0001&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am asking remote end to check they are receiving return traffic and arranging another session to resolve the issue but any help/advice will be grateful.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Can anyone see anything incorrect? Across my infrastructure I have around 200 VPNs configured with around 10 that are Azure with no issue - just never seen one this painful to establish before.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Adrian&lt;/P&gt;</description>
    <pubDate>Tue, 20 Aug 2024 14:34:34 GMT</pubDate>
    <dc:creator>a.jones</dc:creator>
    <dc:date>2024-08-20T14:34:34Z</dc:date>
    <item>
      <title>Azure VPN Connection issues</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/azure-vpn-connection-issues/m-p/595365#M2218</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Appreciate any help with an Azure VPN connection. I have a couple that works but this one is problematic.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have configured to match the Azure configuration so my end:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;IKE: AES-256-CBC, SHA256, Group 14 and Key 8Hrs&lt;/P&gt;
&lt;P&gt;IPSEC:&amp;nbsp; AES-256-CBC, SHA256, No-PFS and key 27000secs.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Gateway: Their Peer IP, My Peer IP, PSK, IKEv2 mode, Passive Mode enabled and Liveness unticked. IKE config selected.&lt;/P&gt;
&lt;P&gt;IPSec Tunnels: Tunnel interface assigned, IKE Gateway and IPSec Profile selected.Proxy ID's assigned.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Policy:&amp;nbsp; Peer IPs permitted on outside interface as bi-directional rule.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Issue: Phase 1 and Phase 2 not coming up.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I look at cli for sessions from peer IP and this is what I see:&lt;/P&gt;
&lt;P&gt;show session all filter source "peer"&lt;/P&gt;
&lt;P&gt;--------------------------------------------------------------------------------&lt;BR /&gt;ID Application State Type Flag Src[Sport]/Zone/Proto (translated IP[Port])&lt;BR /&gt;Vsys Dst[Dport]/Zone (translated IP[Port])&lt;BR /&gt;--------------------------------------------------------------------------------&lt;BR /&gt;1593311 ike ACTIVE FLOW "remote_peer"[500]/Firewall_Untrust_Internet/17 ("remote_peer"[500])&lt;BR /&gt;vsys2 "local_peer"[500]/Firewall_Untrust_Internet ("local_peer"[500])&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I look at the state of the IKE gateway:&lt;/P&gt;
&lt;P&gt;show vpn ike-sa gateway IKEGW-0001&lt;/P&gt;
&lt;P&gt;There is no IKEv1 phase-1 SA found.&lt;/P&gt;
&lt;P&gt;There is no IKEv1 phase-2 SA found.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;IKEv2 SAs&lt;BR /&gt;Gateway ID Peer-Address Gateway Name Role SN Algorithm Established Expiration Xt Child ST&lt;BR /&gt;---------- ------------ ------------ ---- -- --------- ----------- ---------- -- ----- --&lt;BR /&gt;19 "Remote_Peer" IKEGW-0001 Resp 43895 PSK/DH14/A256/SHA256 0 0 INIT sent&lt;BR /&gt;19 "Remote_Peer" IKEGW-0001 Resp 43896 PSK/DH14/A256/SHA256 0 0 INIT sent&lt;BR /&gt;19 "Remote_Peer" IKEGW-0001 Resp 43897 PSK/DH14/A256/SHA256 0 0 INIT sent&lt;BR /&gt;19 "Remote_Peer" IKEGW-0001 Resp 43898 PSK/DH14/A256/SHA256 0 0 INIT sent&lt;BR /&gt;19 "Remote_Peer" IKEGW-0001 Resp 43899 PSK/DH14/A256/SHA256 0 0 INIT sent&lt;BR /&gt;Show IKEv2 SA: Total 17 gateways found. 5 ike sa found.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am tailing the IKE Manager log to see what is going on:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;2024-08-20 15:27:02.283 +0100 [INFO]: { 19: }: passive mode is specified for IKE gateway IKEGW-0001&lt;BR /&gt;2024-08-20 15:27:02.418 +0100 [INFO]: { 19: }: received IKE request "Remote_Peer"[500] to "Local_Peer"[500], found IKE gateway IKEGW-0001&lt;BR /&gt;2024-08-20 15:27:02.418 +0100 [PNTF]: { 19: }: ====&amp;gt; IKEv2 IKE SA NEGOTIATION STARTED AS RESPONDER, non-rekey; gateway IKEGW-LINC-0001-Cirdan &amp;lt;====&lt;BR /&gt;====&amp;gt; Initiated SA: 5.255.48.251[500]-"Remote_Peer"[500] SPI:371ac746e7d5a8b0:e49716e42da7a08c SN:43900 &amp;lt;====&lt;BR /&gt;2024-08-20 15:27:02.418 +0100 [DEBG]: { 19: }: received Notify type NAT_DETECTION_SOURCE_IP&lt;BR /&gt;2024-08-20 15:27:02.418 +0100 [PWRN]: { 19: }: "Local_Peer"[500] - "Remote_Peer"[500]:0x56510c70bdf0 ignoring unauthenticated notify payload (NAT_DETECTION_SOURCE_IP)&lt;BR /&gt;2024-08-20 15:27:02.418 +0100 [DEBG]: { 19: }: received Notify type NAT_DETECTION_DESTINATION_IP&lt;BR /&gt;2024-08-20 15:27:02.418 +0100 [PWRN]: { 19: }: "Local_Peer"[500] - "Remote_Peer"[500]:0x56510c70bdf0 ignoring unauthenticated notify payload (NAT_DETECTION_DESTINATION_IP)&lt;BR /&gt;2024-08-20 15:27:02.418 +0100 [PWRN]: { 19: }: "Local_Peer"[500] - "Remote_Peer"[500]:0x56510c70bdf0 vendor id payload ignored&lt;BR /&gt;2024-08-20 15:27:02.418 +0100 [PWRN]: { 19: }: "Local_Peer"[500] - "Remote_Peer"[500]:0x56510c70bdf0 vendor id payload ignored&lt;BR /&gt;2024-08-20 15:27:02.418 +0100 [PWRN]: { 19: }: "Local_Peer"[500] - "Remote_Peer"[500]:0x56510c70bdf0 vendor id payload ignored&lt;BR /&gt;2024-08-20 15:27:02.419 +0100 [PWRN]: { 19: }: "Local_Peer"[500] - "Remote_Peer"[500]:0x56510c70bdf0 vendor id payload ignored&lt;BR /&gt;2024-08-20 15:27:02.419 +0100 [DEBG]: { 19: }: see whether there's matching transform&lt;BR /&gt;2024-08-20 15:27:02.419 +0100 [DEBG]: { 19: }: found same ID(12,12). compare attributes&lt;BR /&gt;2024-08-20 15:27:02.419 +0100 [DEBG]: { 19: }: OK; advance to next of my transform type&lt;BR /&gt;2024-08-20 15:27:02.419 +0100 [DEBG]: { 19: }: see whether there's matching transform&lt;BR /&gt;2024-08-20 15:27:02.419 +0100 [DEBG]: { 19: }: found same ID(5,5). compare attributes&lt;BR /&gt;2024-08-20 15:27:02.419 +0100 [DEBG]: { 19: }: OK; advance to next of my transform type&lt;BR /&gt;2024-08-20 15:27:02.419 +0100 [DEBG]: { 19: }: see whether there's matching transform&lt;BR /&gt;2024-08-20 15:27:02.419 +0100 [DEBG]: { 19: }: found same ID(12,12). compare attributes&lt;BR /&gt;2024-08-20 15:27:02.419 +0100 [DEBG]: { 19: }: OK; advance to next of my transform type&lt;BR /&gt;2024-08-20 15:27:02.419 +0100 [DEBG]: { 19: }: see whether there's matching transform&lt;BR /&gt;2024-08-20 15:27:02.419 +0100 [DEBG]: { 19: }: found same ID(14,14). compare attributes&lt;BR /&gt;2024-08-20 15:27:02.419 +0100 [DEBG]: { 19: }: OK; advance to next of my transform type&lt;BR /&gt;2024-08-20 15:27:02.419 +0100 [DEBG]: { 19: }: success&lt;BR /&gt;2024-08-20 15:27:02.419 +0100 [DEBG]: { 19: }: update request message_id 0x0&lt;BR /&gt;2024-08-20 15:27:07.889 +0100 [INFO]: { 19: }: passive mode is specified for IKE gateway IKEGW-0001&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am asking remote end to check they are receiving return traffic and arranging another session to resolve the issue but any help/advice will be grateful.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Can anyone see anything incorrect? Across my infrastructure I have around 200 VPNs configured with around 10 that are Azure with no issue - just never seen one this painful to establish before.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Adrian&lt;/P&gt;</description>
      <pubDate>Tue, 20 Aug 2024 14:34:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/azure-vpn-connection-issues/m-p/595365#M2218</guid>
      <dc:creator>a.jones</dc:creator>
      <dc:date>2024-08-20T14:34:34Z</dc:date>
    </item>
  </channel>
</rss>

