<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: IPSec tunnel not working in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/ipsec-tunnel-not-working/m-p/535393#M1064</link>
    <description>&lt;P&gt;I think &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/15603"&gt;@Raido_Rattameister&lt;/a&gt; suggested to you to switch the responder to be Palo Alto.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H1 class="slds-text-heading_large"&gt;How to make Palo Alto Networks firewalls Responder-only in an IPSec tunnel&lt;/H1&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClMZCA0" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClMZCA0&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You will have to do some investigations or debugs like after making Palo Alto responder if the error is not clear to enable IKE debug or check for global counter drops or packet captures if the traffic is even reaching the Palo Alto firewall at all or if a security policy on Palo Alto is dropping it:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClivCAC" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClivCAC&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClcKCAS" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClcKCAS&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000PORsCAO" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000PORsCAO&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/general-topics/knowledge-sharing-palo-alto-checking-for-drops-rejects-discards/td-p/402102" target="_blank"&gt;https://live.paloaltonetworks.com/t5/general-topics/knowledge-sharing-palo-alto-checking-for-drops-rejects-discards/td-p/402102&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 22 Mar 2023 12:00:11 GMT</pubDate>
    <dc:creator>nikoolayy1</dc:creator>
    <dc:date>2023-03-22T12:00:11Z</dc:date>
    <item>
      <title>IPSec tunnel not working</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/ipsec-tunnel-not-working/m-p/535303#M1056</link>
      <description>&lt;P&gt;Hi..&lt;/P&gt;
&lt;P&gt;I have IPSec tunnel between Palo alto 820 and Cyberoam firewall. But It's not getting up. Neither Phase 1 nor Phase 2. Even I am not reachable to other end public ip. Suggest me.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 22 Mar 2023 05:33:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/ipsec-tunnel-not-working/m-p/535303#M1056</guid>
      <dc:creator>HitendraP</dc:creator>
      <dc:date>2023-03-22T05:33:32Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec tunnel not working</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/ipsec-tunnel-not-working/m-p/535306#M1057</link>
      <description>&lt;P&gt;Initiate vpn from&amp;nbsp;&lt;SPAN&gt;Cyberoam&amp;nbsp;side towards Palo.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Do you see any sessions from Cyberoam&amp;nbsp;public IP in "Monitor &amp;gt; Traffic" or "Monitor &amp;gt; Session Browser" on Palo side?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;If yes check "Monitor &amp;gt; System" and use filter below. Do you see any errors that might reveal why tunnel don't come up?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;( subtype eq vpn )&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 22 Mar 2023 05:41:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/ipsec-tunnel-not-working/m-p/535306#M1057</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2023-03-22T05:41:04Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec tunnel not working</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/ipsec-tunnel-not-working/m-p/535315#M1058</link>
      <description>&lt;P&gt;Found this error in System log -&amp;nbsp; &amp;nbsp;IKE phase-1 negotiation is failed as initiator, main mode.&lt;/P&gt;</description>
      <pubDate>Wed, 22 Mar 2023 06:33:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/ipsec-tunnel-not-working/m-p/535315#M1058</guid>
      <dc:creator>HitendraP</dc:creator>
      <dc:date>2023-03-22T06:33:39Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec tunnel not working</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/ipsec-tunnel-not-working/m-p/535316#M1059</link>
      <description>&lt;P&gt;This error is not helpful as if Palo is "&lt;SPAN&gt;initiator" then you need to check logs at&amp;nbsp;Cyberoam&amp;nbsp;side.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Only recipient side will know why connection failed. Recipient will not share failure reason with initiator.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;If you want to analyze logs from Palo side you need to initiate connection from&amp;nbsp;Cyberoam towards Palo..&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 22 Mar 2023 06:36:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/ipsec-tunnel-not-working/m-p/535316#M1059</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2023-03-22T06:36:49Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec tunnel not working</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/ipsec-tunnel-not-working/m-p/535339#M1060</link>
      <description>&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="HitendraP_0-1679473675146.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/48940i1C8B964C4EF5A89B/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="HitendraP_0-1679473675146.png" alt="HitendraP_0-1679473675146.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Error from Cyberoam firewall&lt;/P&gt;</description>
      <pubDate>Wed, 22 Mar 2023 08:28:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/ipsec-tunnel-not-working/m-p/535339#M1060</guid>
      <dc:creator>HitendraP</dc:creator>
      <dc:date>2023-03-22T08:28:18Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec tunnel not working</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/ipsec-tunnel-not-working/m-p/535393#M1064</link>
      <description>&lt;P&gt;I think &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/15603"&gt;@Raido_Rattameister&lt;/a&gt; suggested to you to switch the responder to be Palo Alto.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H1 class="slds-text-heading_large"&gt;How to make Palo Alto Networks firewalls Responder-only in an IPSec tunnel&lt;/H1&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClMZCA0" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClMZCA0&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You will have to do some investigations or debugs like after making Palo Alto responder if the error is not clear to enable IKE debug or check for global counter drops or packet captures if the traffic is even reaching the Palo Alto firewall at all or if a security policy on Palo Alto is dropping it:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClivCAC" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClivCAC&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClcKCAS" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClcKCAS&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000PORsCAO" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000PORsCAO&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/general-topics/knowledge-sharing-palo-alto-checking-for-drops-rejects-discards/td-p/402102" target="_blank"&gt;https://live.paloaltonetworks.com/t5/general-topics/knowledge-sharing-palo-alto-checking-for-drops-rejects-discards/td-p/402102&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 22 Mar 2023 12:00:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/ipsec-tunnel-not-working/m-p/535393#M1064</guid>
      <dc:creator>nikoolayy1</dc:creator>
      <dc:date>2023-03-22T12:00:11Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec tunnel not working</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/ipsec-tunnel-not-working/m-p/535397#M1065</link>
      <description>&lt;P&gt;Does&amp;nbsp;&lt;SPAN&gt;Cyberoam&amp;nbsp;have 1 or more WAN IPs?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;According to&amp;nbsp;&lt;A href="https://docs.sophos.com/nsg/sophos-firewall/17.5/Help/en-us/webhelp/onlinehelp/nsg/sfos/concepts/LogMessages.html" target="_blank" rel="noopener"&gt;https://docs.sophos.com/nsg/sophos-firewall/17.5/Help/en-us/webhelp/onlinehelp/nsg/sfos/concepts/LogMessages.html&lt;/A&gt;&amp;nbsp;error message&amp;nbsp;&lt;SPAN&gt;17842 shows success (&amp;lt;connectionname&amp;gt;, EST-P1-MM: Response to establishment request from &amp;lt;peeris&amp;gt; peer &amp;lt;peerrequesterip&amp;gt; successful) and error&amp;nbsp;17856 seems to mean that&amp;nbsp;Cyberoam&amp;nbsp;replied but did not get any answer after that (&amp;lt;connectionname&amp;gt;, EST-P1: max number of retransmissions &amp;lt;count&amp;gt; reached STATE_MAIN_I1. No response (or no acceptable response) to first IKE message.).&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So first suspicion is that Palo sends IKE packet to&amp;nbsp;&lt;SPAN&gt;Cyberoam&amp;nbsp;WAN IP1 and&amp;nbsp;Cyberoam&amp;nbsp;replies to Palo from WAN IP2.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;If this is the case then you need static route in&amp;nbsp;Cyberoam&amp;nbsp;to send return packets from WAN IP1 to Palo.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;If&amp;nbsp;Cyberoam&amp;nbsp; don't have 2 IPs then check that Palo firewall policy permits incoming IPSec traffic from&amp;nbsp;Cyberoam&amp;nbsp;IP and would not drop those packets.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 22 Mar 2023 12:26:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/ipsec-tunnel-not-working/m-p/535397#M1065</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2023-03-22T12:26:46Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec tunnel not working</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/ipsec-tunnel-not-working/m-p/535530#M1076</link>
      <description>&lt;P&gt;Hi;&lt;BR /&gt;On Monitor &amp;gt; Traffic, check if you have any deny traffic from/to public IP address of the remote site. &lt;BR /&gt;When it's about phase 1 of IPsec, most of the time is about IKE parameters or the traffic is may be denied somewhere&lt;/P&gt;</description>
      <pubDate>Thu, 23 Mar 2023 08:51:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/ipsec-tunnel-not-working/m-p/535530#M1076</guid>
      <dc:creator>LACOUSTICS</dc:creator>
      <dc:date>2023-03-23T08:51:10Z</dc:date>
    </item>
  </channel>
</rss>

