<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>article Nominated Discussion: Creating an IPSEC Tunnel to ASA in General Articles</title>
    <link>https://live.paloaltonetworks.com/t5/general-articles/nominated-discussion-creating-an-ipsec-tunnel-to-asa/ta-p/525976</link>
    <description>&lt;DIV class="lia-message-template-content-zone"&gt;
&lt;P&gt;This article is based on a discussion, "&lt;A href="https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-to-asa-peerid-issues/m-p/27375" target="_self"&gt;IPSEC Tunnel to ASA&lt;/A&gt;".&amp;nbsp;Read on to see the solution!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;I am setting up an IPSec tunnel to an ASA. I am getting an error message about the PEERID type only allowing IP but receiving FQDN. Per the other KB article, I changed the PAN Exchange mode to Aggressive.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Now the PAN received an FQDN of the ASA side and gave listed the FQDN in the system logs.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;My question.. where in the ASA can you configure PEER and LOCAL ID in the Phase1 settings? I am not seeing that option so I cannot figure out how the PAN is getting the FQDN.&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;H3&gt;&amp;nbsp;&lt;/H3&gt;
&lt;H2&gt;&lt;FONT color="#FF6600"&gt;&lt;STRONG&gt;Accepted Solution:&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H2&gt;
&lt;OL&gt;
&lt;LI&gt;Configure PA Firewall (Network &amp;gt; IKE Gateways &amp;gt; Configure IKE Gateway), as in the example below. Ensure that the Local and Peer Identification match with the Cisco Router.&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="JayGolf_0-1672890762567.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/46738iD299857499C049D2/image-size/medium?v=v2&amp;amp;px=400" role="button" title="JayGolf_0-1672890762567.png" alt="JayGolf_0-1672890762567.png" /&gt;&lt;/span&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;BR /&gt;&lt;STRONG&gt;Note:&lt;/STRONG&gt; Use Aggressive Exchange Mode and Enable Passive Mode if the other end is a Dynamic IP. Choose a local and peer Identification for IKE phase 1 and match this to the Cisco Router Configuration.&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;LI&gt;With the Cisco router in VTI mode, configure IKE Gateway (see example below).&amp;nbsp; Again, ensure that the Local and Peer Identification match with the Palo Alto Networks firewall.&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="JayGolf_1-1672890762568.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/46739iF0B54441CBD25D02/image-size/medium?v=v2&amp;amp;px=400" role="button" title="JayGolf_1-1672890762568.png" alt="JayGolf_1-1672890762568.png" /&gt;&lt;/span&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;BR /&gt;&lt;BR /&gt;With the Cisco router in equivalent Crypto Map mode, configure IKE Gateway (see example below).&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="JayGolf_2-1672890762568.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/46737iCC84FFB07BC474D8/image-size/medium?v=v2&amp;amp;px=400" role="button" title="JayGolf_2-1672890762568.png" alt="JayGolf_2-1672890762568.png" /&gt;&lt;/span&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;owner: &lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClHVCA0" target="_self"&gt;jlunario&lt;/A&gt;&lt;/P&gt;
&lt;/DIV&gt;</description>
    <pubDate>Thu, 05 Jan 2023 15:40:51 GMT</pubDate>
    <dc:creator>JayGolf</dc:creator>
    <dc:date>2023-01-05T15:40:51Z</dc:date>
    <item>
      <title>Nominated Discussion: Creating an IPSEC Tunnel to ASA</title>
      <link>https://live.paloaltonetworks.com/t5/general-articles/nominated-discussion-creating-an-ipsec-tunnel-to-asa/ta-p/525976</link>
      <description>&lt;DIV class="lia-message-template-content-zone"&gt;
&lt;P&gt;This article is based on a discussion, "&lt;A href="https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-to-asa-peerid-issues/m-p/27375" target="_self"&gt;IPSEC Tunnel to ASA&lt;/A&gt;".&amp;nbsp;Read on to see the solution!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;BLOCKQUOTE&gt;
&lt;P&gt;I am setting up an IPSec tunnel to an ASA. I am getting an error message about the PEERID type only allowing IP but receiving FQDN. Per the other KB article, I changed the PAN Exchange mode to Aggressive.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Now the PAN received an FQDN of the ASA side and gave listed the FQDN in the system logs.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;My question.. where in the ASA can you configure PEER and LOCAL ID in the Phase1 settings? I am not seeing that option so I cannot figure out how the PAN is getting the FQDN.&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;H3&gt;&amp;nbsp;&lt;/H3&gt;
&lt;H2&gt;&lt;FONT color="#FF6600"&gt;&lt;STRONG&gt;Accepted Solution:&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H2&gt;
&lt;OL&gt;
&lt;LI&gt;Configure PA Firewall (Network &amp;gt; IKE Gateways &amp;gt; Configure IKE Gateway), as in the example below. Ensure that the Local and Peer Identification match with the Cisco Router.&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="JayGolf_0-1672890762567.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/46738iD299857499C049D2/image-size/medium?v=v2&amp;amp;px=400" role="button" title="JayGolf_0-1672890762567.png" alt="JayGolf_0-1672890762567.png" /&gt;&lt;/span&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;BR /&gt;&lt;STRONG&gt;Note:&lt;/STRONG&gt; Use Aggressive Exchange Mode and Enable Passive Mode if the other end is a Dynamic IP. Choose a local and peer Identification for IKE phase 1 and match this to the Cisco Router Configuration.&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;LI&gt;With the Cisco router in VTI mode, configure IKE Gateway (see example below).&amp;nbsp; Again, ensure that the Local and Peer Identification match with the Palo Alto Networks firewall.&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="JayGolf_1-1672890762568.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/46739iF0B54441CBD25D02/image-size/medium?v=v2&amp;amp;px=400" role="button" title="JayGolf_1-1672890762568.png" alt="JayGolf_1-1672890762568.png" /&gt;&lt;/span&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;BR /&gt;&lt;BR /&gt;With the Cisco router in equivalent Crypto Map mode, configure IKE Gateway (see example below).&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="JayGolf_2-1672890762568.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/46737iCC84FFB07BC474D8/image-size/medium?v=v2&amp;amp;px=400" role="button" title="JayGolf_2-1672890762568.png" alt="JayGolf_2-1672890762568.png" /&gt;&lt;/span&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;owner: &lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClHVCA0" target="_self"&gt;jlunario&lt;/A&gt;&lt;/P&gt;
&lt;/DIV&gt;</description>
      <pubDate>Thu, 05 Jan 2023 15:40:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-articles/nominated-discussion-creating-an-ipsec-tunnel-to-asa/ta-p/525976</guid>
      <dc:creator>JayGolf</dc:creator>
      <dc:date>2023-01-05T15:40:51Z</dc:date>
    </item>
  </channel>
</rss>

