<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: IPSEC tunnel Intermittent disconnect between onprime PA-5250 and and VM PA hosted on Azure. in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-intermittent-disconnect-between-onprime-pa-5250-and/m-p/465280#M102564</link>
    <description>&lt;P&gt;Hi Steve, Thanks for the response. The issue is now resolved by activating Passive mode on Non dymantic firewall gateway. The remote gateway had dymanic IP address.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 11 Feb 2022 20:58:15 GMT</pubDate>
    <dc:creator>RishiLama</dc:creator>
    <dc:date>2022-02-11T20:58:15Z</dc:date>
    <item>
      <title>IPSEC tunnel Intermittent disconnect between onprime PA-5250 and and VM PA hosted on Azure.</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-intermittent-disconnect-between-onprime-pa-5250-and/m-p/463305#M102353</link>
      <description>&lt;P&gt;Hello all,&lt;/P&gt;&lt;P&gt;Need help.&lt;/P&gt;&lt;P&gt;We're experiencing unsual IPsec tunnel disconnect between our main firewall&amp;nbsp;PA-5250 and VM series hosted on Azure.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;PA-5250 - Version 8.01 - Static GW IP address 2.2.2.2&lt;/P&gt;&lt;P&gt;VM series VM:-&amp;nbsp;&amp;nbsp;&lt;SPAN&gt;10.0.7 - Azure01 - GW IP is dymanic representing 1.1.1.1 on logs.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;IPsec tunnel info check and verified are same on both firewall.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Proxy ID:- none&amp;nbsp;&lt;/P&gt;&lt;P&gt;Enable passive mode is disabled on both firewall.&amp;nbsp;&lt;/P&gt;&lt;P&gt;One firewall GW IP address is dymanic.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;VM series firewall.&amp;nbsp;&lt;/P&gt;&lt;P&gt;____________________________________________________&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;mp ikemgr.log 2022-01-29 12:33:19 2022-01-29 12:33:19.039 -0600 [INFO]: { 1: }: KA found: 1.1.1.1[4500]-&amp;gt;2.2.2.2[4500] (in_use=1)&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;mp ikemgr.log 2022-01-29 12:33:19 2022-01-29 12:33:19.040 -0600 [INFO]: { 1: }: Adding remote and local NAT-D payloads.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;mp ikemgr.log 2022-01-29 12:33:19 2022-01-29 12:33:19.040 -0600 [INFO]: { 1: }: Hashing 2.2.2.2[4500] with algo #6&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;mp ikemgr.log 2022-01-29 12:33:19 2022-01-29 12:33:19.040 -0600 [INFO]: { 1: }: Hashing 1.1.1.1[4500] with algo #6&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;mp ikemgr.log 2022-01-29 12:33:19 2022-01-29 12:33:19.040 -0600 [PNTF]: { 1: }: ====&amp;gt; PHASE-1 NEGOTIATION SUCCEEDED AS INITIATOR, AGGRESSIVE MODE &amp;lt;====&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;mp ikemgr.log 2022-01-29 12:33:19 ====&amp;gt; Established SA: 1.1.1.1[4500]-2.2.2.2[4500] cookie:ab3cecc374bafd02:0a6fef599a4197e8 lifetime 28800 Sec &amp;lt;====&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;mp ikemgr.log 2022-01-29 12:33:20 2022-01-29 12:33:20.000 -0600 [PNTF]: { 1: 1}: ====&amp;gt; PHASE-2 NEGOTIATION STARTED AS INITIATOR, (QUICK MODE) &amp;lt;====&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;mp ikemgr.log 2022-01-29 12:33:20 ====&amp;gt; Initiated SA: 1.1.1.1[4500]-2.2.2.2[4500] message id:0x96E53F93 &amp;lt;====&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;mp ikemgr.log 2022-01-29 12:33:20 2022-01-29 12:33:20.000 -0600 [INFO]: { : 1}: NAT detected -&amp;gt; UDP encapsulation (ENC_MODE 1-&amp;gt;3).&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;mp ikemgr.log 2022-01-29 12:33:43 2022-01-29 12:33:43.000 -0600 [PNTF]: { : 1}: ====&amp;gt; IPSEC KEY LIFETIME EXPIRED &amp;lt;====&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;mp ikemgr.log 2022-01-29 12:33:43 ====&amp;gt; Expired SA: 1.1.1.1[4500]-2.2.2.2[4500] SPI:0xBA57B398/0xEE2C91E1 &amp;lt;====&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;mp ikemgr.log 2022-01-29 12:33:43 2022-01-29 12:33:43.000 -0600 [PNTF]: { : 1}: ====&amp;gt; IPSEC KEY DELETED &amp;lt;====&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;mp ikemgr.log 2022-01-29 12:33:43 ====&amp;gt; Deleted SA: 1.1.1.1[4500]-2.2.2.2[4500] SPI:0xBA57B398/0xEE2C91E1 &amp;lt;====&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;mp ikemgr.log 2022-01-29 12:33:43 2022-01-29 12:33:43.000 -0600 [INFO]: { 1: 1}: SADB_DELETE proto=0 src=1.1.1.1[4500] dst=2.2.2.2[4500] ESP spi=0xBA57B398&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;mp ikemgr.log 2022-01-29 12:33:43 2022-01-29 12:33:43.001 -0600 [INFO]: { 1: 1}: SPI BA57B398 removed by IPSec lifetime, return 0 0.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;mp ikemgr.log 2022-01-29 12:33:45 2022-01-29 12:33:45.000 -0600 [PWRN]: { : 1}: phase-2 sa purge mismatch SPI:0x00000000/0xEE2C91E1.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;mp ikemgr.log 2022-01-29 12:33:50 2022-01-29 12:33:50.000 -0600 [PNTF]: { : 1}: ====&amp;gt; PHASE-2 NEGOTIATION FAILED AS INITIATOR, (QUICK MODE) &amp;lt;====&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;mp ikemgr.log 2022-01-29 12:33:50 ====&amp;gt; Failed SA: 1.1.1.1[4500]-2.2.2.2[4500] message id:0x96E53F93 &amp;lt;==== Due to negotiation timeout.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;mp ikemgr.log 2022-01-29 12:33:54 2022-01-29 12:33:54.264 -0600 [PNTF]: { 1: 1}: ====&amp;gt; PHASE-2 NEGOTIATION STARTED AS INITIATOR, (QUICK MODE) &amp;lt;====&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;mp ikemgr.log 2022-01-29 12:33:54 ====&amp;gt; Initiated SA: 1.1.1.1[4500]-2.2.2.2[4500] message id:0xB73A56D5 &amp;lt;====&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;mp ikemgr.log 2022-01-29 12:33:54 2022-01-29 12:33:54.264 -0600 [INFO]: { : 1}: NAT detected -&amp;gt; UDP encapsulation (ENC_MODE 1-&amp;gt;3).&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;mp ikemgr.log 2022-01-29 12:34:20 2022-01-29 12:34:20.000 -0600 [INFO]: { 1: }: ====&amp;gt; PHASE-1 SA DELETED &amp;lt;====&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;________________________________________________________________________________________________________&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Main firewall logs.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;2022-01-29 12:41:47.024 -0800 [PNTF]: { 15: }: ====&amp;gt; PHASE-2 NEGOTIATION STARTED AS RESPONDER, (QUICK MODE) &amp;lt;====&lt;BR /&gt;ikemgr.log&lt;BR /&gt;2022-01-29 12:41:47&lt;BR /&gt;====&amp;gt; Initiated SA: 2.2.2.2[4500]-1.1.1.1[27387] message id:0x66FC9DFD &amp;lt;====&lt;BR /&gt;ikemgr.log&lt;BR /&gt;2022-01-29 12:41:47&lt;BR /&gt;2022-01-29 12:41:47.024 -0800 [INFO]: { 15: }: Adjusting peer's encmode UDP-Tunnel(3)-&amp;gt;Tunnel(1)&lt;BR /&gt;ikemgr.log&lt;BR /&gt;2022-01-29 12:41:47&lt;BR /&gt;2022-01-29 12:41:47.060 -0800 [PNTF]: { : 27}: ====&amp;gt; PHASE-2 NEGOTIATION SUCCEEDED AS RESPONDER, (QUICK MODE) &amp;lt;====&lt;BR /&gt;ikemgr.log&lt;BR /&gt;2022-01-29 12:41:47&lt;BR /&gt;====&amp;gt; Established SA: 2.2.2.2[4500]-1.1.1.1[27387] message id:0x66FC9DFD, SPI:0xE7255475/0xC6D72D68 &amp;lt;====&lt;/P&gt;&lt;P&gt;2022-01-29 13:11:14&lt;BR /&gt;2022-01-29 13:11:14.315 -0800 [PNTF]: { 16: }: ====&amp;gt; PHASE-2 NEGOTIATION STARTED AS RESPONDER, (QUICK MODE) &amp;lt;====&lt;BR /&gt;ikemgr.log&lt;BR /&gt;2022-01-29 13:11:14&lt;BR /&gt;====&amp;gt; Initiated SA: 2.2.2.2[4500]-1.1.1.1[9251] message id:0x166DFFE3 &amp;lt;====&lt;BR /&gt;ikemgr.log&lt;BR /&gt;2022-01-29 13:11:14&lt;BR /&gt;2022-01-29 13:11:14.315 -0800 [INFO]: { 16: }: Adjusting peer's encmode UDP-Tunnel(3)-&amp;gt;Tunnel(1)&lt;BR /&gt;ikemgr.log&lt;BR /&gt;2022-01-29 13:11:14&lt;BR /&gt;2022-01-29 13:11:14.349 -0800 [PNTF]: { : 28}: ====&amp;gt; PHASE-2 NEGOTIATION SUCCEEDED AS RESPONDER, (QUICK MODE) &amp;lt;====&lt;BR /&gt;ikemgr.log&lt;BR /&gt;2022-01-29 13:11:14&lt;BR /&gt;====&amp;gt; Established SA: 2.2.2.2[4500]-1.1.1.1[9251] message id:0x166DFFE3, SPI:0x9A6BF190/0x8DFEDBE1 &amp;lt;====&lt;BR /&gt;ikemgr.log&lt;BR /&gt;2022-01-29 13:11:14&lt;BR /&gt;2022-01-29 13:11:14.349 -0800 [INFO]: { 16: 28}: SADB_UPDATE proto=255 1.1.1.1[9251]=&amp;gt;2.2.2.2[4500] ESP tunl spi 0x9A6BF190 auth=SHA512 enc=AES256-GCM16/36 lifetime soft 3600/0 hard 3600/0&lt;BR /&gt;ikemgr.log&lt;BR /&gt;2022-01-29 13:11:14&lt;BR /&gt;2022-01-29 13:11:14.349 -0800 [INFO]: { 16: 28}: SADB_ADD proto=255 2.2.2.2[4500]=&amp;gt;1.1.1.1[9251] ESP tunl spi 0x8DFEDBE1 auth=SHA512 enc=AES256-GCM16/36 lifetime soft 2889/0 hard 3600/0&lt;BR /&gt;ikemgr.log&lt;BR /&gt;2022-01-29 13:11:14&lt;BR /&gt;2022-01-29 13:11:14.349 -0800 [INFO]: { 16: 28}: IPsec-SA established: ESP/Tunnel 1.1.1.1[9251]-&amp;gt;2.2.2.2[4500] spi=2590765456(0x9a6bf190)&lt;BR /&gt;ikemgr.log&lt;BR /&gt;2022-01-29 13:11:14&lt;BR /&gt;2022-01-29 13:11:14.349 -0800 [PNTF]: { : 28}: ====&amp;gt; IPSEC KEY INSTALLATION SUCCEEDED &amp;lt;====&lt;BR /&gt;ikemgr.log&lt;BR /&gt;2022-01-29 13:11:14&lt;BR /&gt;====&amp;gt; Installed SA: 2.2.2.2[4500]-1.1.1.1[9251] SPI:0x9A6BF190/0x8DFEDBE1 lifetime 3600 Sec lifesize unlimited &amp;lt;====&lt;BR /&gt;ikemgr.log&lt;BR /&gt;2022-01-29 13:11:14&lt;BR /&gt;2022-01-29 13:11:14.349 -0800 [INFO]: { 16: }: KA found: 2.2.2.2[4500]-&amp;gt;1.1.1.1[9251] (in_use=1)&lt;BR /&gt;ikemgr.log&lt;BR /&gt;2022-01-29 13:11:19&lt;BR /&gt;2022-01-29 13:11:19.033 -0800 [PNTF]: { 16: }: notification message 36136:R-U-THERE, doi=1 proto_id=1 spi=7a0f6094477007ea 51a6613506ffc6f6 (size=16).&lt;BR /&gt;ikemgr.log&lt;BR /&gt;2022-01-29 13:11:30&lt;BR /&gt;2022-01-29 13:11:30.000 -0800 [PNTF]: { : 28}: ====&amp;gt; IPSEC KEY LIFETIME EXPIRED &amp;lt;====&lt;BR /&gt;ikemgr.log&lt;BR /&gt;2022-01-29 13:11:30&lt;BR /&gt;====&amp;gt; Expired SA: 2.2.2.2[4500]-1.1.1.1[9251] SPI:0xAE67200C/0xCE0E23E8 &amp;lt;====&lt;BR /&gt;ikemgr.log&lt;BR /&gt;2022-01-29 13:11:30&lt;BR /&gt;2022-01-29 13:11:30.000 -0800 [PNTF]: { : 28}: ====&amp;gt; IPSEC KEY DELETED &amp;lt;====&lt;BR /&gt;ikemgr.log&lt;BR /&gt;2022-01-29 13:11:30&lt;BR /&gt;====&amp;gt; Deleted SA: 2.2.2.2[4500]-1.1.1.1[9251] SPI:0xAE67200C/0xCE0E23E8 &amp;lt;====&lt;BR /&gt;ikemgr.log&lt;BR /&gt;2022-01-29 13:11:30&lt;BR /&gt;2022-01-29 13:11:30.000 -0800 [INFO]: { 16: 28}: SADB_DELETE proto=0 src=2.2.2.2[4500] dst=1.1.1.1[9251] ESP spi=0xAE67200C&lt;BR /&gt;ikemgr.log&lt;BR /&gt;2022-01-29 13:11:32&lt;BR /&gt;2022-01-29 13:11:32.000 -0800 [PWRN]: { : 28}: phase-2 sa purge mismatch SPI:0x00000000/0xCE0E23E8.&lt;BR /&gt;ikemgr.log&lt;BR /&gt;2022-01-29 13:39:57&lt;BR /&gt;2022-01-29 13:39:57.766 -0800 [INFO]: { 15: }: initiate negotiation to dynamic peer from IKE gateway Azure01-IKE is not allowed.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 04 Feb 2022 17:06:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-intermittent-disconnect-between-onprime-pa-5250-and/m-p/463305#M102353</guid>
      <dc:creator>RishiLama</dc:creator>
      <dc:date>2022-02-04T17:06:16Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC tunnel Intermittent disconnect between onprime PA-5250 and and VM PA hosted on Azure.</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-intermittent-disconnect-between-onprime-pa-5250-and/m-p/464253#M102474</link>
      <description>&lt;P&gt;Setup a VPN tunnel monitoring profile, which will provide pings at a 5 sec intervals, to keep the tunnel up.&lt;/P&gt;</description>
      <pubDate>Tue, 08 Feb 2022 15:55:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-intermittent-disconnect-between-onprime-pa-5250-and/m-p/464253#M102474</guid>
      <dc:creator>S.Cantwell</dc:creator>
      <dc:date>2022-02-08T15:55:19Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC tunnel Intermittent disconnect between onprime PA-5250 and and VM PA hosted on Azure.</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-intermittent-disconnect-between-onprime-pa-5250-and/m-p/465280#M102564</link>
      <description>&lt;P&gt;Hi Steve, Thanks for the response. The issue is now resolved by activating Passive mode on Non dymantic firewall gateway. The remote gateway had dymanic IP address.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 11 Feb 2022 20:58:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-intermittent-disconnect-between-onprime-pa-5250-and/m-p/465280#M102564</guid>
      <dc:creator>RishiLama</dc:creator>
      <dc:date>2022-02-11T20:58:15Z</dc:date>
    </item>
  </channel>
</rss>

