<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: AWS changing aes for ike and ipsec doesnt allow traffic to pass in VM-Series in the Public Cloud</title>
    <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-changing-aes-for-ike-and-ipsec-doesnt-allow-traffic-to-pass/m-p/249089#M515</link>
    <description>&lt;P&gt;I've never seen any issue like that with our VM-Series firewalls. I don't deal with the Physical firewalls but the IPsec/IKE enginee should be the same.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Have you tried clearing the tunnel and reestabling the IPsec tunnel? if so and that didn't resolve the issue I would suggest opening up a case with support.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 06 Feb 2019 22:08:19 GMT</pubDate>
    <dc:creator>jperry1</dc:creator>
    <dc:date>2019-02-06T22:08:19Z</dc:date>
    <item>
      <title>AWS changing aes for ike and ipsec doesnt allow traffic to pass</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-changing-aes-for-ike-and-ipsec-doesnt-allow-traffic-to-pass/m-p/249040#M510</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;We have a successful tunnels to our VPC and traffic is passing. We used the AWS downloaded cofing to guide us on the PAN side. Now when I change the ike and ipsec settings to different ciphers, say from aes128 to aes256 the tunnel stays up and is extablished but we cannot pass traffic.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Anyone else run into this?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance!&lt;/P&gt;</description>
      <pubDate>Wed, 06 Feb 2019 17:43:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-changing-aes-for-ike-and-ipsec-doesnt-allow-traffic-to-pass/m-p/249040#M510</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2019-02-06T17:43:59Z</dc:date>
    </item>
    <item>
      <title>Re: AWS changing aes for ike and ipsec doesnt allow traffic to pass</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-changing-aes-for-ike-and-ipsec-doesnt-allow-traffic-to-pass/m-p/249086#M513</link>
      <description>&lt;P&gt;What version of PAN-OS software are you running on the firewall? is a it a VM-Series firewall or a physical firewall?&lt;/P&gt;</description>
      <pubDate>Wed, 06 Feb 2019 22:01:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-changing-aes-for-ike-and-ipsec-doesnt-allow-traffic-to-pass/m-p/249086#M513</guid>
      <dc:creator>jperry1</dc:creator>
      <dc:date>2019-02-06T22:01:08Z</dc:date>
    </item>
    <item>
      <title>Re: AWS changing aes for ike and ipsec doesnt allow traffic to pass</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-changing-aes-for-ike-and-ipsec-doesnt-allow-traffic-to-pass/m-p/249087#M514</link>
      <description>&lt;P&gt;On our side we are running a physical PAN with 8.0.14 code. On the AWS side its the built in AWS connectors.&lt;/P&gt;</description>
      <pubDate>Wed, 06 Feb 2019 22:02:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-changing-aes-for-ike-and-ipsec-doesnt-allow-traffic-to-pass/m-p/249087#M514</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2019-02-06T22:02:37Z</dc:date>
    </item>
    <item>
      <title>Re: AWS changing aes for ike and ipsec doesnt allow traffic to pass</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-changing-aes-for-ike-and-ipsec-doesnt-allow-traffic-to-pass/m-p/249089#M515</link>
      <description>&lt;P&gt;I've never seen any issue like that with our VM-Series firewalls. I don't deal with the Physical firewalls but the IPsec/IKE enginee should be the same.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Have you tried clearing the tunnel and reestabling the IPsec tunnel? if so and that didn't resolve the issue I would suggest opening up a case with support.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 06 Feb 2019 22:08:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-changing-aes-for-ike-and-ipsec-doesnt-allow-traffic-to-pass/m-p/249089#M515</guid>
      <dc:creator>jperry1</dc:creator>
      <dc:date>2019-02-06T22:08:19Z</dc:date>
    </item>
    <item>
      <title>Re: AWS changing aes for ike and ipsec doesnt allow traffic to pass</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-changing-aes-for-ike-and-ipsec-doesnt-allow-traffic-to-pass/m-p/249265#M516</link>
      <description>&lt;P&gt;Thanks for the suggestion. It didnt worl so I opened a support case. I'll post the solution when we find one.&lt;/P&gt;</description>
      <pubDate>Thu, 07 Feb 2019 16:38:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-changing-aes-for-ike-and-ipsec-doesnt-allow-traffic-to-pass/m-p/249265#M516</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2019-02-07T16:38:33Z</dc:date>
    </item>
    <item>
      <title>Re: AWS changing aes for ike and ipsec doesnt allow traffic to pass</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-changing-aes-for-ike-and-ipsec-doesnt-allow-traffic-to-pass/m-p/249266#M517</link>
      <description>&lt;P&gt;Did you set proper MTU set on the tunnel? 1427&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 07 Feb 2019 16:42:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-changing-aes-for-ike-and-ipsec-doesnt-allow-traffic-to-pass/m-p/249266#M517</guid>
      <dc:creator>hsong</dc:creator>
      <dc:date>2019-02-07T16:42:45Z</dc:date>
    </item>
    <item>
      <title>Re: AWS changing aes for ike and ipsec doesnt allow traffic to pass</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-changing-aes-for-ike-and-ipsec-doesnt-allow-traffic-to-pass/m-p/249268#M518</link>
      <description>&lt;P&gt;Yep as well as leaving it default. No Joy.&lt;/P&gt;</description>
      <pubDate>Thu, 07 Feb 2019 16:46:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-changing-aes-for-ike-and-ipsec-doesnt-allow-traffic-to-pass/m-p/249268#M518</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2019-02-07T16:46:52Z</dc:date>
    </item>
    <item>
      <title>Re: AWS changing aes for ike and ipsec doesnt allow traffic to pass</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-changing-aes-for-ike-and-ipsec-doesnt-allow-traffic-to-pass/m-p/249307#M519</link>
      <description>&lt;P&gt;Ok so wierd settings, who knows where the real issue is since AWS is a blackbox.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;IKE settings:&lt;/P&gt;&lt;P&gt;These are OK as aes-256-cbc, sha256, DH group14&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;IPsec settings:&lt;/P&gt;&lt;P&gt;aes-256-cbc, &lt;STRONG&gt;sha1&lt;/STRONG&gt;, DH group 14.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So it was the SHA version on the IPSec config that was causing the issues. Wont do sha256 but still estabilishes the tunnel.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Gotta love interoperatability....&lt;/P&gt;</description>
      <pubDate>Thu, 07 Feb 2019 18:47:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/aws-changing-aes-for-ike-and-ipsec-doesnt-allow-traffic-to-pass/m-p/249307#M519</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2019-02-07T18:47:37Z</dc:date>
    </item>
  </channel>
</rss>

