<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Palo Alto Site to Site VPN ipsec tunnel up but unable to ping Source to destination in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/palo-alto-site-to-site-vpn-ipsec-tunnel-up-but-unable-to-ping/m-p/1254032#M6923</link>
    <description>&lt;P&gt;If the traffic was ping or DNS then "aged-out" is the normal end reason (for any ICMP or UDP protocol traffic really). TCP traffic should normally end in a "tcp-fin", thought you may also see "tcp-rst" or "aged-out" depending on the application and server. If you see both "packets sent" and "packets received" in the logs then traffic is likely making it through.&lt;/P&gt;</description>
    <pubDate>Thu, 14 May 2026 15:37:16 GMT</pubDate>
    <dc:creator>Adrian_Jensen</dc:creator>
    <dc:date>2026-05-14T15:37:16Z</dc:date>
    <item>
      <title>Palo Alto Site to Site VPN ipsec tunnel up but unable to ping Source to destination</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/palo-alto-site-to-site-vpn-ipsec-tunnel-up-but-unable-to-ping/m-p/1253916#M6913</link>
      <description>&lt;P&gt;Dear Team,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When I am doing implement Site to Site VPN&amp;nbsp; ipsec tunnel then tunnel status is down &amp;amp; Ike gateways is down after&amp;nbsp;test commands manually trigger negotiation, then all up. But still source to destination unable to ping.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Already on virtual router point to tunnel interface for all traffic on both firewall. On security policies allow both zone on both firewall but still same. Allow ICMP on tunnel interface &amp;amp; other physical interface. Please help what should i do next.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;All configuration are attached for your reference.&lt;/P&gt;</description>
      <pubDate>Wed, 13 May 2026 09:35:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/palo-alto-site-to-site-vpn-ipsec-tunnel-up-but-unable-to-ping/m-p/1253916#M6913</guid>
      <dc:creator>surya_sapui</dc:creator>
      <dc:date>2026-05-13T09:35:32Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto Site to Site VPN ipsec tunnel up but unable to ping Source to destination</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/palo-alto-site-to-site-vpn-ipsec-tunnel-up-but-unable-to-ping/m-p/1253935#M6916</link>
      <description>&lt;P&gt;Do you have an IP setup on the tunnel interface attached to the IPSec tunnel? This is not required but helpful to diagnosis if the tunnel is passing traffic (used for CLI tests to verify ping responds on the tunnel from the far side and used in tunnel monitoring if wanted).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Do you see packets being encrypted/decrypted going across the IPSec tunnel between your sites? Network-&amp;gt;IPSec Tunnels-&amp;gt;Tunnel info, you should see "PKT ENCAP" and "PKT DECAP". These are packets encapsulated/decapsulated in the IPSec to send/receive across the tunnel.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Do you have a NAT rule? It may be NAT'ing the traffic before being put into the IPSec tunnel.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Turn on full logging with "log at session start" as well as end and examine the start/end logs to see if your destination is changing. Also turn on logging on the built-in inter/intrazone-default rules (Policies-&amp;gt;Security-&amp;gt;[default-rule-name]-&amp;gt;Override and then enable logging in the rule) to see if something unexpected is occurring.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 13 May 2026 17:35:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/palo-alto-site-to-site-vpn-ipsec-tunnel-up-but-unable-to-ping/m-p/1253935#M6916</guid>
      <dc:creator>Adrian_Jensen</dc:creator>
      <dc:date>2026-05-13T17:35:15Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto Site to Site VPN ipsec tunnel up but unable to ping Source to destination</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/palo-alto-site-to-site-vpn-ipsec-tunnel-up-but-unable-to-ping/m-p/1253960#M6919</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;Check the logs as to why the traffic is not making it. Could be a missing Security Policy.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Wed, 13 May 2026 21:32:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/palo-alto-site-to-site-vpn-ipsec-tunnel-up-but-unable-to-ping/m-p/1253960#M6919</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2026-05-13T21:32:57Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto Site to Site VPN ipsec tunnel up but unable to ping Source to destination</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/palo-alto-site-to-site-vpn-ipsec-tunnel-up-but-unable-to-ping/m-p/1254018#M6922</link>
      <description>&lt;P&gt;hello, Issue resolved when I am adding default route in virtual router including tunnel route. But still in monitor traffic show aged out session end reason.&lt;/P&gt;</description>
      <pubDate>Thu, 14 May 2026 10:38:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/palo-alto-site-to-site-vpn-ipsec-tunnel-up-but-unable-to-ping/m-p/1254018#M6922</guid>
      <dc:creator>surya_sapui</dc:creator>
      <dc:date>2026-05-14T10:38:24Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto Site to Site VPN ipsec tunnel up but unable to ping Source to destination</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/palo-alto-site-to-site-vpn-ipsec-tunnel-up-but-unable-to-ping/m-p/1254032#M6923</link>
      <description>&lt;P&gt;If the traffic was ping or DNS then "aged-out" is the normal end reason (for any ICMP or UDP protocol traffic really). TCP traffic should normally end in a "tcp-fin", thought you may also see "tcp-rst" or "aged-out" depending on the application and server. If you see both "packets sent" and "packets received" in the logs then traffic is likely making it through.&lt;/P&gt;</description>
      <pubDate>Thu, 14 May 2026 15:37:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/palo-alto-site-to-site-vpn-ipsec-tunnel-up-but-unable-to-ping/m-p/1254032#M6923</guid>
      <dc:creator>Adrian_Jensen</dc:creator>
      <dc:date>2026-05-14T15:37:16Z</dc:date>
    </item>
  </channel>
</rss>

