<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: unknown ikev2 peer - PA1420 running PAN-OS 11.0.1-h1 in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/unknown-ikev2-peer-pa1420-running-pan-os-11-0-1-h1/m-p/564079#M2043</link>
    <description>&lt;P&gt;You can add security policy&lt;/P&gt;
&lt;P&gt;Source zone - WAN&lt;/P&gt;
&lt;P&gt;Destination zone - WAN&lt;/P&gt;
&lt;P&gt;Source IP - Your and your peer IPs that terminate IPSec&lt;/P&gt;
&lt;P&gt;Destination IP - Your and your peer IPs that terminate IPSec&lt;/P&gt;
&lt;P&gt;Application - ipsec&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;And at the end of the ruleset "block any" rule.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;IPSec works because of "intrazone-default" rule permitting same zone traffic.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Be careful when you add "block any" rule because you might have other traffic relying on this intrazone-default rule.&lt;/P&gt;</description>
    <pubDate>Thu, 02 Nov 2023 12:23:33 GMT</pubDate>
    <dc:creator>Raido_Rattameister</dc:creator>
    <dc:date>2023-11-02T12:23:33Z</dc:date>
    <item>
      <title>unknown ikev2 peer - PA1420 running PAN-OS 11.0.1-h1</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/unknown-ikev2-peer-pa1420-running-pan-os-11-0-1-h1/m-p/563887#M2036</link>
      <description>&lt;P&gt;So, i have this type of errors in my logs and i really dont know how to tackle them.&lt;/P&gt;
&lt;P&gt;No other info, like for example who is the peer that generates this event, like i used to get on an older PA device also running an older PANOS version&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Manu_P_0-1698843190615.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/54814i1C3ADED998DA8090/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="Manu_P_0-1698843190615.png" alt="Manu_P_0-1698843190615.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Any ideas?&lt;/P&gt;</description>
      <pubDate>Wed, 01 Nov 2023 12:55:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/unknown-ikev2-peer-pa1420-running-pan-os-11-0-1-h1/m-p/563887#M2036</guid>
      <dc:creator>Manu_P</dc:creator>
      <dc:date>2023-11-01T12:55:10Z</dc:date>
    </item>
    <item>
      <title>Re: unknown ikev2 peer - PA1420 running PAN-OS 11.0.1-h1</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/unknown-ikev2-peer-pa1420-running-pan-os-11-0-1-h1/m-p/563924#M2040</link>
      <description>&lt;P&gt;You will get rid of noise coming from internet by permitting incoming VPN only from your peer IPs.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To figure out what IP is trying to connect you need to look into&amp;nbsp;ikemgr.log log by using commands below&lt;/P&gt;
&lt;P&gt;less mp-log ikemgr.log&lt;/P&gt;
&lt;P&gt;tail follow yes mp-log ikemgr.log (updates log output in real time)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 01 Nov 2023 17:33:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/unknown-ikev2-peer-pa1420-running-pan-os-11-0-1-h1/m-p/563924#M2040</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2023-11-01T17:33:38Z</dc:date>
    </item>
    <item>
      <title>Re: unknown ikev2 peer - PA1420 running PAN-OS 11.0.1-h1</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/unknown-ikev2-peer-pa1420-running-pan-os-11-0-1-h1/m-p/564063#M2041</link>
      <description>&lt;P&gt;Thanks, that did it (not doing much ike troubleshooting so i forgot about that log)&lt;/P&gt;
&lt;P&gt;Still, i wished PanOS to display that info in the system monitor logs&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Anyway, you said this:&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;"You will get rid of noise coming from internet by permitting incoming VPN only from your peer IPs"&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;How? i did not set an explicit rule to allow incoming vpn - i assumed the firewall did that behind the scene&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Or do you mean to setup an explicit deny all incoming ike rule, with exception for an address group containing all my ike-gateways-ip-addresses?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 02 Nov 2023 09:54:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/unknown-ikev2-peer-pa1420-running-pan-os-11-0-1-h1/m-p/564063#M2041</guid>
      <dc:creator>Manu_P</dc:creator>
      <dc:date>2023-11-02T09:54:55Z</dc:date>
    </item>
    <item>
      <title>Re: unknown ikev2 peer - PA1420 running PAN-OS 11.0.1-h1</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/unknown-ikev2-peer-pa1420-running-pan-os-11-0-1-h1/m-p/564079#M2043</link>
      <description>&lt;P&gt;You can add security policy&lt;/P&gt;
&lt;P&gt;Source zone - WAN&lt;/P&gt;
&lt;P&gt;Destination zone - WAN&lt;/P&gt;
&lt;P&gt;Source IP - Your and your peer IPs that terminate IPSec&lt;/P&gt;
&lt;P&gt;Destination IP - Your and your peer IPs that terminate IPSec&lt;/P&gt;
&lt;P&gt;Application - ipsec&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;And at the end of the ruleset "block any" rule.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;IPSec works because of "intrazone-default" rule permitting same zone traffic.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Be careful when you add "block any" rule because you might have other traffic relying on this intrazone-default rule.&lt;/P&gt;</description>
      <pubDate>Thu, 02 Nov 2023 12:23:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/unknown-ikev2-peer-pa1420-running-pan-os-11-0-1-h1/m-p/564079#M2043</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2023-11-02T12:23:33Z</dc:date>
    </item>
  </channel>
</rss>

