<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Multiple IKE crypto profiles on individual interfaces for multiple IPSEC tunnels in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/multiple-ike-crypto-profiles-on-individual-interfaces-for/m-p/474192#M103353</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In 2021 we ran into the issue where it seemed between PA-OS 8.1.x and 9.0.x/9.1.x Palo began either via a feature or bug introduced began enforcing the scenario in the subject line and began dropping tunnels after upgrading and causing issues with HA pairs.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/vpns/set-up-site-to-site-vpn/define-cryptographic-profiles/define-ike-crypto-profiles.html" target="_blank" rel="noopener"&gt;Define IKE Crypto Profiles (paloaltonetworks.com)&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;At the time Palo identified the above documentation which appeared to not be enforced until a certain checkpoint in firmware versions.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We've performed an upgrade today on a Palo unit which had the above mentioned scenario and after moving to N-1 in the 9.1.x family, we did not identify the same issue occurring. I've been digging through the release notes to try and find where this scenario may have been referenced for enforcement or a fix, however have not been able to confirm a specific scenario beyond:&lt;/P&gt;&lt;P&gt;&lt;A title="https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-release-notes/pan-os-9-1-addressed-issues/pan-os-9-1-11-addressed-issues.html" href="https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-release-notes/pan-os-9-1-addressed-issues/pan-os-9-1-11-addressed-issues.html" target="_blank" rel="noopener noreferrer"&gt;PAN-OS 9.1.11 Addressed Issues (paloaltonetworks.com)&lt;/A&gt;&lt;/P&gt;&lt;P&gt;PAN-116515 but I believe this may be a slightly different scenario.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Just checking to see if there have been any confirmation that this bug or feature has been resolved/reverted in a recent firmware release? Hoping this may be the case as we can get along with upgrading some environments which have been holding off due to issues getting moving on migrating tunnels or modifying IKE crypto profiles to match on partner sides.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 18 Mar 2022 02:12:49 GMT</pubDate>
    <dc:creator>Z33Z</dc:creator>
    <dc:date>2022-03-18T02:12:49Z</dc:date>
    <item>
      <title>Multiple IKE crypto profiles on individual interfaces for multiple IPSEC tunnels</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/multiple-ike-crypto-profiles-on-individual-interfaces-for/m-p/474192#M103353</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In 2021 we ran into the issue where it seemed between PA-OS 8.1.x and 9.0.x/9.1.x Palo began either via a feature or bug introduced began enforcing the scenario in the subject line and began dropping tunnels after upgrading and causing issues with HA pairs.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/vpns/set-up-site-to-site-vpn/define-cryptographic-profiles/define-ike-crypto-profiles.html" target="_blank" rel="noopener"&gt;Define IKE Crypto Profiles (paloaltonetworks.com)&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;At the time Palo identified the above documentation which appeared to not be enforced until a certain checkpoint in firmware versions.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We've performed an upgrade today on a Palo unit which had the above mentioned scenario and after moving to N-1 in the 9.1.x family, we did not identify the same issue occurring. I've been digging through the release notes to try and find where this scenario may have been referenced for enforcement or a fix, however have not been able to confirm a specific scenario beyond:&lt;/P&gt;&lt;P&gt;&lt;A title="https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-release-notes/pan-os-9-1-addressed-issues/pan-os-9-1-11-addressed-issues.html" href="https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-release-notes/pan-os-9-1-addressed-issues/pan-os-9-1-11-addressed-issues.html" target="_blank" rel="noopener noreferrer"&gt;PAN-OS 9.1.11 Addressed Issues (paloaltonetworks.com)&lt;/A&gt;&lt;/P&gt;&lt;P&gt;PAN-116515 but I believe this may be a slightly different scenario.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Just checking to see if there have been any confirmation that this bug or feature has been resolved/reverted in a recent firmware release? Hoping this may be the case as we can get along with upgrading some environments which have been holding off due to issues getting moving on migrating tunnels or modifying IKE crypto profiles to match on partner sides.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 18 Mar 2022 02:12:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/multiple-ike-crypto-profiles-on-individual-interfaces-for/m-p/474192#M103353</guid>
      <dc:creator>Z33Z</dc:creator>
      <dc:date>2022-03-18T02:12:49Z</dc:date>
    </item>
    <item>
      <title>Re: Multiple IKE crypto profiles on individual interfaces for multiple IPSEC tunnels</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/multiple-ike-crypto-profiles-on-individual-interfaces-for/m-p/475438#M103458</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/210564"&gt;@Z33Z&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Interesting.&amp;nbsp; Did you get confirmation that the behavior you saw was an actual bug ?&lt;/P&gt;
&lt;P&gt;Without that information it's going to be difficult to confirm if a certain behavior has been 'fixed' since then.&lt;/P&gt;
&lt;P&gt;If you have a case# from back then I would reach out to support and get a confirmation on bug/fix.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Cheers,&lt;/P&gt;
&lt;P&gt;-Kiwi.&lt;/P&gt;
&lt;DIV id="ConnectiveDocSignExtentionInstalled" data-extension-version="1.0.4"&gt;&amp;nbsp;&lt;/DIV&gt;</description>
      <pubDate>Thu, 24 Mar 2022 08:28:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/multiple-ike-crypto-profiles-on-individual-interfaces-for/m-p/475438#M103458</guid>
      <dc:creator>kiwi</dc:creator>
      <dc:date>2022-03-24T08:28:55Z</dc:date>
    </item>
  </channel>
</rss>

