<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to handle invalid ipsec tunnels? in Expedition Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/expedition-discussions/how-to-handle-invalid-ipsec-tunnels/m-p/253356#M1282</link>
    <description>&lt;P&gt;Thank you for the quick response!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;How do you undo an existing import if you want to reimport the same configuration that has the preshare keys?&amp;nbsp; The previous one I imported has ***** as the preshare key.&amp;nbsp; Or do I just need to recreate the project?&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 16:20:40 GMT</pubDate>
    <dc:creator>rhap4boy</dc:creator>
    <dc:date>2019-03-12T16:20:40Z</dc:date>
    <item>
      <title>How to handle invalid ipsec tunnels?</title>
      <link>https://live.paloaltonetworks.com/t5/expedition-discussions/how-to-handle-invalid-ipsec-tunnels/m-p/253244#M1278</link>
      <description>&lt;P&gt;Trying to migrate from Cisco ASA to Palo Alto using Expedition.&lt;/P&gt;
&lt;P&gt;These two are being flagged as Invalid IPSec Tunnels. (Some IP addresses has been renamed)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;object network obj-X1.X1.X1.X1&lt;BR /&gt;host X1.X1.X1.X1&lt;BR /&gt;object network NETWORK_OBJ_192.168.169.0_24_02&lt;BR /&gt;subnet 192.168.169.0 255.255.255.0&lt;BR /&gt;object network obj-10.0.0.141&lt;BR /&gt;host 10.0.0.141&lt;BR /&gt;object network obj-X1.X1.X1.X1&lt;BR /&gt;host X1.X1.X1.X1&lt;/P&gt;
&lt;P&gt;nat (inside,outside) source static obj-10.0.0.141 obj-10.0.0.141 destination static obj-X1.X1.X1.X1 obj-X1.X1.X1.X1&lt;BR /&gt;nat (inside,outside) source static NETWORK_OBJ_10.0.0.10 10.6.0.10 destination static NETWORK_OBJ_192.168.169.0_24 NETWORK_OBJ_192.168.169.0_24&lt;BR /&gt;nat (inside,outside) source static 10.6.0.10 10.6.0.10 destination static NETWORK_OBJ_192.168.169.0_24 NETWORK_OBJ_192.168.169.0_24 no-proxy-arp route-lookup&lt;BR /&gt;nat (inside,outside) source static obj-10.0.0.237 obj-10.6.0.15 destination static NETWORK_OBJ_192.168.169.0_24_01 NETWORK_OBJ_192.168.169.0_24_01&lt;BR /&gt;nat (inside,outside) source static obj-10.6.0.15 obj-10.6.0.15 destination static NETWORK_OBJ_192.168.169.0_24_01 NETWORK_OBJ_192.168.169.0_24_01 no-proxy-arp route-lookup&lt;BR /&gt;nat (inside,outside) source static obj-10.0.0.238 obj-10.6.0.25 destination static NETWORK_OBJ_192.168.169.0_24_02 NETWORK_OBJ_192.168.169.0_24_02&lt;BR /&gt;nat (inside,outside) source static obj-10.6.0.25 obj-10.6.0.25 destination static NETWORK_OBJ_192.168.169.0_24_02 NETWORK_OBJ_192.168.169.0_24_02 no-proxy-arp route-lookup&lt;/P&gt;
&lt;P&gt;access-list outside_cryptoABC extended permit ip object obj-10.0.0.141 object obj-X1.X1.X1.X1 log &lt;BR /&gt;access-list outside_cryptoABC extended permit icmp object obj-10.0.0.141 object obj-X1.X1.X1.X1 log &lt;BR /&gt;access-list outside_cryptomap_4 extended permit ip object NETWORK_OBJ_10.6.0.0 object NETWORK_OBJ_192.168.169.0_2&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto map outside_map 1 match address outside_cryptomap_4&lt;BR /&gt;crypto map outside_map 1 set pfs &lt;BR /&gt;crypto map outside_map 1 set peer X2.X2.X2.X2&lt;BR /&gt;crypto map outside_map 1 set ikev1 transform-set ESP-AES-128-SHA ESP-AES-128-MD5 ESP-AES-192-SHA ESP-AES-192-MD5 ESP-AES-256-SHA ESP-AES-256-MD5 ESP-3DES-SHA ESP-3DES-MD5 ESP-DES-SHA ESP-DES-MD5&lt;BR /&gt;crypto map outside_map 1 set ikev2 ipsec-proposal AES256 AES192 AES 3DES&lt;BR /&gt;crypto map outside_map 5 match address outside_cryptoABC&lt;BR /&gt;crypto map outside_map 5 set peer X3.X3.X3.X3 &lt;BR /&gt;crypto map outside_map 5 set ikev1 transform-set ESP-AES-256-SHA&lt;BR /&gt;crypto map outside_map interface outside&lt;BR /&gt;crypto ca trustpool policy&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Any ideas why? and how to fix?&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 05:48:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/expedition-discussions/how-to-handle-invalid-ipsec-tunnels/m-p/253244#M1278</guid>
      <dc:creator>rhap4boy</dc:creator>
      <dc:date>2019-03-12T05:48:09Z</dc:date>
    </item>
    <item>
      <title>Re: How to handle invalid ipsec tunnels?</title>
      <link>https://live.paloaltonetworks.com/t5/expedition-discussions/how-to-handle-invalid-ipsec-tunnels/m-p/253277#M1279</link>
      <description>&lt;P&gt;Some causes of the VPN tunnels being flagged as invalid are below:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;-No preshare key. To remediate open the IKE gateway config and enter the preshare key&lt;/P&gt;
&lt;P&gt;-No crypto assigned to the IKE or IPSec. To remediate check and add the crypto for the IKE and IPSec if none entered.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 09:08:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/expedition-discussions/how-to-handle-invalid-ipsec-tunnels/m-p/253277#M1279</guid>
      <dc:creator>sjanita</dc:creator>
      <dc:date>2019-03-12T09:08:15Z</dc:date>
    </item>
    <item>
      <title>Re: How to handle invalid ipsec tunnels?</title>
      <link>https://live.paloaltonetworks.com/t5/expedition-discussions/how-to-handle-invalid-ipsec-tunnels/m-p/253356#M1282</link>
      <description>&lt;P&gt;Thank you for the quick response!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;How do you undo an existing import if you want to reimport the same configuration that has the preshare keys?&amp;nbsp; The previous one I imported has ***** as the preshare key.&amp;nbsp; Or do I just need to recreate the project?&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 16:20:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/expedition-discussions/how-to-handle-invalid-ipsec-tunnels/m-p/253356#M1282</guid>
      <dc:creator>rhap4boy</dc:creator>
      <dc:date>2019-03-12T16:20:40Z</dc:date>
    </item>
    <item>
      <title>Re: How to handle invalid ipsec tunnels?</title>
      <link>https://live.paloaltonetworks.com/t5/expedition-discussions/how-to-handle-invalid-ipsec-tunnels/m-p/253390#M1285</link>
      <description>&lt;P&gt;you can import multiple config into the same project.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Expedition control which config is being displayed by using the file selector drop down in the lower right hand corner. This is useful if you are merging or collapsing configs for example.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In your case if you have already made changes to the original ASA file imported you can then merge your changes (minus the IPSec vpn configs) into your base config (Attached is a default PanOS 8.1 base config you can use) then make change to the newly imported confnig (with the preshare keys) and only merge the VPN configs from the new file into your base config.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Expedition is a config editor that allows you to move config snippets by using the Export --&amp;gt; Merge option.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 20:10:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/expedition-discussions/how-to-handle-invalid-ipsec-tunnels/m-p/253390#M1285</guid>
      <dc:creator>sjanita</dc:creator>
      <dc:date>2019-03-12T20:10:28Z</dc:date>
    </item>
  </channel>
</rss>

