<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Site to Site VPN IPSec issue between PA and Azure in VM-Series in the Public Cloud</title>
    <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/site-to-site-vpn-ipsec-issue-between-pa-and-azure/m-p/154935#M48</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp;My guess is that you need an alternative authentication method in the IKE gateway setup: Local Identification portion.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You can use email or fqdn and as long as they match on both sides it doesn't matter what it is...&lt;/P&gt;&lt;P&gt;The guess is here that NAT is breaking IKE&lt;/P&gt;</description>
    <pubDate>Tue, 02 May 2017 21:57:50 GMT</pubDate>
    <dc:creator>niyengar</dc:creator>
    <dc:date>2017-05-02T21:57:50Z</dc:date>
    <item>
      <title>Site to Site VPN IPSec issue between PA and Azure</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/site-to-site-vpn-ipsec-issue-between-pa-and-azure/m-p/149421#M33</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have some problem to configure a VPN between my Palo Alto and Azure.&lt;/P&gt;&lt;P&gt;I follow this tutorial : &lt;A href="https://live.paloaltonetworks.com/t5/Configuration-Articles/How-to-Configure-VPN-Tunnel-Between-a-Palo-Alto-Networks/ta-p/59065" target="_blank"&gt;https://live.paloaltonetworks.com/t5/Configuration-Articles/How-to-Configure-VPN-Tunnel-Between-a-Palo-Alto-Networks/ta-p/59065&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So I have this configuration:&lt;/P&gt;&lt;P&gt;&lt;U&gt;Tunnel Interface:&lt;/U&gt; It’s an IP in /32 include in the subnet of the Azure gateway (in /29)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;U&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Interface Tunnel.PNG" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/8437iB8F728EDCF9E1229/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Interface Tunnel.PNG" alt="Interface Tunnel.PNG" /&gt;&lt;/span&gt;&lt;/U&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;U&gt;IKE Gateway: &lt;/U&gt;My firewall is behind NAT&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="IKE Gateway General.PNG" style="width: 602px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/8439i3D707A07831BDCE8/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="IKE Gateway General.PNG" alt="IKE Gateway General.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;U&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="IKE Gateway Advanced Options.PNG" style="width: 603px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/8438i6B073F7A273D878B/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="IKE Gateway Advanced Options.PNG" alt="IKE Gateway Advanced Options.PNG" /&gt;&lt;/span&gt;&lt;/U&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;U&gt;IKE Crypto Profile:&lt;/U&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;U&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="IKE Crypto Profile.PNG" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/8440iB659E89A988EE4F0/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="IKE Crypto Profile.PNG" alt="IKE Crypto Profile.PNG" /&gt;&lt;/span&gt;&lt;/U&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;U&gt;IPsec Crypto Profile:&lt;/U&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;U&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="IPSec crypto profile.PNG" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/8441iDF0BD478F4A0C5A2/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="IPSec crypto profile.PNG" alt="IPSec crypto profile.PNG" /&gt;&lt;/span&gt;&lt;/U&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;U&gt;IPsec Tunnel:&lt;/U&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;U&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="IPSec Tunnel General.PNG" style="width: 721px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/8443i85AA5136A2DD708D/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="IPSec Tunnel General.PNG" alt="IPSec Tunnel General.PNG" /&gt;&lt;/span&gt;&lt;/U&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;U&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="IPSec Tunnel Proxy ID.PNG" style="width: 720px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/8442i05BBA540321A3FE1/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="IPSec Tunnel Proxy ID.PNG" alt="IPSec Tunnel Proxy ID.PNG" /&gt;&lt;/span&gt;&lt;/U&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;U&gt;Static Route:&lt;/U&gt; Destination address is my server subnet&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Route Static Srv.PNG" style="width: 485px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/8444iB0D8C0263E6B28E1/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Route Static Srv.PNG" alt="Route Static Srv.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Status of the IPsec tunnels are red (so Phase 1 and Phase 2 of the negotiation don’t succeed):&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="IPSec Tunnel Status.PNG" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/8445i9220EFB35DB53BD7/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="IPSec Tunnel Status.PNG" alt="IPSec Tunnel Status.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;To test and send data through the VPN, I try to connect in RDP to a VM in Azure. But my PC can’t access to the server.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The firewall can’t ping the public IP of Azure. With a traceroute, I can see that packets go on Internet.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is system logs from the firewall with “vpn” as a filter:&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Log system VPN.PNG" style="width: 741px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/8446iEAC55622DA4D6BF9/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Log system VPN.PNG" alt="Log system VPN.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;In traffic log, the application is “incomplete” with end session reason “aged-out”:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Log Traffic vers SRv.PNG" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/8447iF161A22CE314A6EE/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Log Traffic vers SRv.PNG" alt="Log Traffic vers SRv.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;Results with some commands in the CLI:&lt;/P&gt;&lt;P&gt;&lt;EM&gt;show vpn ike-sa gateway GW-IKE-Azure&lt;/EM&gt;&amp;nbsp;= “IKE gateway GW-IKE-Azure not found”&lt;/P&gt;&lt;P&gt;&lt;EM&gt;test vpn ike-sa gateway GW-IKE-Azure&lt;/EM&gt;&amp;nbsp;= “Initiate IKE SA: Total 1 gateways found. 1 ike sa found”&lt;/P&gt;&lt;P&gt;&lt;EM&gt;show session all filter application ike =&lt;/EM&gt;&amp;nbsp;“No Active Sessions”&lt;/P&gt;&lt;P&gt;&lt;EM&gt;debug ike pcap on&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;view-pcap no-dns-lookup yes no-port-lookup yes debug-pcap ikemgr.pcap =&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="debug ike pcap on.PNG" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/8448i92D737D9C3BA86BC/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="debug ike pcap on.PNG" alt="debug ike pcap on.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;The Azure configuration is:&lt;/P&gt;&lt;P&gt;The connection is configured as Site-to-Site connection&lt;/P&gt;&lt;P&gt;The address range is in /23 with 2 subnet: one in /24 (for VMs) and the second in /29 (for the subnet gateway).&lt;/P&gt;&lt;P&gt;I have a VM subnet with one server install.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Have you got any idea to solve the problem?&lt;/P&gt;&lt;P&gt;Thank you in advance for your help.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 24 Mar 2017 14:20:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/site-to-site-vpn-ipsec-issue-between-pa-and-azure/m-p/149421#M33</guid>
      <dc:creator>informatiq</dc:creator>
      <dc:date>2017-03-24T14:20:58Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site VPN IPSec issue between PA and Azure</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/site-to-site-vpn-ipsec-issue-between-pa-and-azure/m-p/149480#M34</link>
      <description>&lt;P&gt;Can you follow this for IKEv2 and let me know if it works:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/Integration-Articles/Configuring-IKEv2-IPsec-VPN-for-Microsoft-Azure-Environment/ta-p/60340" target="_blank"&gt;https://live.paloaltonetworks.com/t5/Integration-Articles/Configuring-IKEv2-IPsec-VPN-for-Microsoft-Azure-Environment/ta-p/60340&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;There doesn't seem to be much difference between the two...you may need to uncheck the liveliness check and&amp;nbsp;the DH group to no-pfs.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 24 Mar 2017 20:58:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/site-to-site-vpn-ipsec-issue-between-pa-and-azure/m-p/149480#M34</guid>
      <dc:creator>narayan</dc:creator>
      <dc:date>2017-03-24T20:58:11Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site VPN IPSec issue between PA and Azure</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/site-to-site-vpn-ipsec-issue-between-pa-and-azure/m-p/149598#M35</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for your answer.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I make modifications, but it doesn't work. I have the same error message in systems logs :&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="erreur.PNG" style="width: 469px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/8489i8B4A1A579B6446D7/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="erreur.PNG" alt="erreur.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 27 Mar 2017 07:30:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/site-to-site-vpn-ipsec-issue-between-pa-and-azure/m-p/149598#M35</guid>
      <dc:creator>informatiq</dc:creator>
      <dc:date>2017-03-27T07:30:14Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site VPN IPSec issue between PA and Azure</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/site-to-site-vpn-ipsec-issue-between-pa-and-azure/m-p/149676#M36</link>
      <description>&lt;P&gt;I have just had a new error message:&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="error2.PNG" style="width: 469px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/8516iDE89FECB411544EE/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="error2.PNG" alt="error2.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 27 Mar 2017 14:50:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/site-to-site-vpn-ipsec-issue-between-pa-and-azure/m-p/149676#M36</guid>
      <dc:creator>informatiq</dc:creator>
      <dc:date>2017-03-27T14:50:24Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site VPN IPSec issue between PA and Azure</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/site-to-site-vpn-ipsec-issue-between-pa-and-azure/m-p/149776#M37</link>
      <description>&lt;P&gt;Heys,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Would be nice to see a full log output:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;gt;&amp;nbsp;tail lines 200 mp-log ikemgr.log&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It is been&amp;nbsp;some time since my last set-up but just a quick&amp;nbsp;update/tips on this:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- make sure Palo&amp;nbsp;in the "passive" mode. So it will not be able to initiate a VPN but we could not make it working when its disabled.&lt;/P&gt;&lt;P&gt;- IKEv2 initiate 2 tunnels: IKE tunnel ( old name of IKEv1 Phase 1) and CHILD_SA (old name of IKEv1 Phase 2). Default lifetime for &amp;nbsp;IKE Tunnel is &lt;SPAN&gt;86400 or&amp;nbsp;&lt;/SPAN&gt;28800 seconds (depends of&lt;SPAN&gt; the vendor)&lt;/SPAN&gt;&amp;nbsp;for CHILD_SA is 3600 seconds hence your tunnel will be always re-established every hour. But it&amp;nbsp;takes couple seconds not minutes.&amp;nbsp;&lt;/P&gt;&lt;P&gt;- disable&amp;nbsp;no-pfs&amp;nbsp;on IPSec Crypto&lt;/P&gt;&lt;P&gt;- disable "Liveness Check" on the IKE Gateway configuration.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Make sure that all other setting are compatible with Azure. Please see below:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;IPsec Parameters&lt;/P&gt;&lt;DIV class="note"&gt;&lt;STRONG&gt;Note:&lt;/STRONG&gt;&lt;P&gt;Although the values listed below are supported by the Azure VPN Gateway, currently there is no way for you to specify or select a specific combination from the Azure VPN Gateway. You must specify any constraints from the on-premises VPN device. In addition, you must clamp MSS at 1350.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;/DIV&gt;&lt;P&gt;IKE Phase 1 setup&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;STRONG&gt;Property&lt;/STRONG&gt;&lt;/TD&gt;&lt;TD&gt;&lt;STRONG&gt;Policy-based&lt;/STRONG&gt;&lt;/TD&gt;&lt;TD&gt;&lt;STRONG&gt;Route-based and Standard or High Performance VPN gateway&lt;/STRONG&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;IKE Version&lt;/TD&gt;&lt;TD&gt;IKEv1&lt;/TD&gt;&lt;TD&gt;IKEv2&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Diffie-Hellman Group&lt;/TD&gt;&lt;TD&gt;Group 2 (1024 bit)&lt;/TD&gt;&lt;TD&gt;Group 2 (1024 bit)&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Authentication Method&lt;/TD&gt;&lt;TD&gt;Pre-Shared Key&lt;/TD&gt;&lt;TD&gt;Pre-Shared Key&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Encryption Algorithms&lt;/TD&gt;&lt;TD&gt;AES256 AES128 3DES&lt;/TD&gt;&lt;TD&gt;AES256 3DES&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Hashing Algorithm&lt;/TD&gt;&lt;TD&gt;SHA1(SHA128)&lt;/TD&gt;&lt;TD&gt;SHA1(SHA128), SHA2(SHA256)&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Phase 1 Security Association (SA) Lifetime (Time)&lt;/TD&gt;&lt;TD&gt;28,800 seconds&lt;/TD&gt;&lt;TD&gt;10,800 seconds&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;IKE Phase 2 setup&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;STRONG&gt;Property&lt;/STRONG&gt;&lt;/TD&gt;&lt;TD&gt;&lt;STRONG&gt;Policy-based&lt;/STRONG&gt;&lt;/TD&gt;&lt;TD&gt;&lt;STRONG&gt;Route-based and Standard or High Performance VPN gateway&lt;/STRONG&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;IKE Version&lt;/TD&gt;&lt;TD&gt;IKEv1&lt;/TD&gt;&lt;TD&gt;IKEv2&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Hashing Algorithm&lt;/TD&gt;&lt;TD&gt;SHA1(SHA128)&lt;/TD&gt;&lt;TD&gt;SHA1(SHA128)&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Phase 2 Security Association (SA) Lifetime (Time)&lt;/TD&gt;&lt;TD&gt;3,600 seconds&lt;/TD&gt;&lt;TD&gt;3,600 seconds&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Phase 2 Security Association (SA) Lifetime (Throughput)&lt;/TD&gt;&lt;TD&gt;102,400,000 KB&lt;/TD&gt;&lt;TD&gt;-&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;IPsec SA Encryption &amp;amp; Authentication Offers (in the order of preference)&lt;/TD&gt;&lt;TD&gt;1. ESP-AES256 2. ESP-AES128 3. ESP-3DES 4. N/A&lt;/TD&gt;&lt;TD&gt;See &lt;EM&gt;Route-based Gateway IPsec Security Association (SA) Offers&lt;/EM&gt;(below)&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Perfect Forward Secrecy (PFS)&lt;/TD&gt;&lt;TD&gt;No&lt;/TD&gt;&lt;TD&gt;Yes (DH Group1, 2, 5, 14, 24)&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Dead Peer Detection&lt;/TD&gt;&lt;TD&gt;Not supported&lt;/TD&gt;&lt;TD&gt;Supported&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;After doing all this tunnel still stable for the past 3 days.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You can clear the tunnel couple times to see if everything is working correctly:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;gt; clear vpn ike-sa gateway (for IKE Tunnel)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;gt; clear vpn ipsec-sa tunnel (for CHILD_SA)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope it helps!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;more info&amp;nbsp;here:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/General-Topics/VPN-to-Azure-dropouts/m-p/98936#M44162" target="_blank"&gt;https://live.paloaltonetworks.com/t5/General-Topics/VPN-to-Azure-dropouts/m-p/98936#M44162&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 27 Mar 2017 22:05:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/site-to-site-vpn-ipsec-issue-between-pa-and-azure/m-p/149776#M37</guid>
      <dc:creator>TranceforLife</dc:creator>
      <dc:date>2017-03-27T22:05:12Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site VPN IPSec issue between PA and Azure</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/site-to-site-vpn-ipsec-issue-between-pa-and-azure/m-p/154848#M47</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I need your help to configure a vpn between PA3020 and Azure with dynamic gateway.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have a problem "ike-nego-p1-fail "&amp;nbsp; --&amp;gt; ( description contains 'IKE phase-1 negotiation is failed as initiator, main mode. Failed SA: X.X.X.X[500]-X.X.X.X[500] cookie:6a4facbf0c032fc8:0000000000000000. Due to timeout.' )&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;and ( eventid eq ike-nego-p1-delete ) --&amp;gt; &amp;nbsp;and &amp;nbsp;and ( description contains 'IKE phase-1 SA is deleted SA: SA: X.X.X.X[500]-X.X.X.X[500] cookie:6a4facbf0c032fc8:0000000000000000.' )&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 02 May 2017 14:35:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/site-to-site-vpn-ipsec-issue-between-pa-and-azure/m-p/154848#M47</guid>
      <dc:creator>itounsi</dc:creator>
      <dc:date>2017-05-02T14:35:07Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site VPN IPSec issue between PA and Azure</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/site-to-site-vpn-ipsec-issue-between-pa-and-azure/m-p/154935#M48</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp;My guess is that you need an alternative authentication method in the IKE gateway setup: Local Identification portion.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You can use email or fqdn and as long as they match on both sides it doesn't matter what it is...&lt;/P&gt;&lt;P&gt;The guess is here that NAT is breaking IKE&lt;/P&gt;</description>
      <pubDate>Tue, 02 May 2017 21:57:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/site-to-site-vpn-ipsec-issue-between-pa-and-azure/m-p/154935#M48</guid>
      <dc:creator>niyengar</dc:creator>
      <dc:date>2017-05-02T21:57:50Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site VPN IPSec issue between PA and Azure</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/site-to-site-vpn-ipsec-issue-between-pa-and-azure/m-p/156209#M55</link>
      <description>&lt;P&gt;Make sure you have Layer 3 communication&amp;nbsp;between the&amp;nbsp;peer. Before setting up the&amp;nbsp;tunnel, please ping the remote peer ip.&amp;nbsp;If Layer 3 is good, make sure your policy is allowing ike,&amp;nbsp;IPSec&amp;nbsp;etc application on the untrust interface (zone).&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 11 May 2017 13:14:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/site-to-site-vpn-ipsec-issue-between-pa-and-azure/m-p/156209#M55</guid>
      <dc:creator>TranceforLife</dc:creator>
      <dc:date>2017-05-11T13:14:40Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site VPN IPSec issue between PA and Azure</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/site-to-site-vpn-ipsec-issue-between-pa-and-azure/m-p/160096#M68</link>
      <description>&lt;P&gt;Hi, I got question regarding 96415 fixed in 7.1.6. However, I am still seeing the issue in 7.1.6.&lt;/P&gt;&lt;P&gt;What should I do, should I upgrade to 8.0.0+Please assist. Thank you.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;96415&lt;/STRONG&gt;&lt;BR /&gt;Fixed an issue where the firewall failed to pass traffic in strongSwan and Azure IPSec tunnels while using IKEv2 because it did not send a Delete payload during a Phase 2 Child SA re-keying. With this fix, the firewall correctly sends a Delete payload during re-keying if it is the node that initiated the re-keying.&lt;/P&gt;</description>
      <pubDate>Wed, 07 Jun 2017 23:40:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/site-to-site-vpn-ipsec-issue-between-pa-and-azure/m-p/160096#M68</guid>
      <dc:creator>JennyHuang36</dc:creator>
      <dc:date>2017-06-07T23:40:56Z</dc:date>
    </item>
  </channel>
</rss>

