<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco VPN Behind PA-3220 in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/cisco-vpn-behind-pa-3220/m-p/511888#M106394</link>
    <description>&lt;P&gt;Hello there.&amp;nbsp;&amp;nbsp; Thank you for the clarification, and yet, the response could still be valid.&amp;nbsp; I am not sure how to do it, but there should be some vpn tunnel monitoring done on the VPN, from either side.&amp;nbsp; I think/understand that this thread may be thinking it is&amp;nbsp; is PANW issue, but it is not.&amp;nbsp;&amp;nbsp; If the session is indeed intact, then the PANW is doing its job and it is up the either the client or server side (from a TCP connection perspective) to send hellos/traffic/pings, whatever.&amp;nbsp;&amp;nbsp;&amp;nbsp; If the SPI gets out of sync and tearing down the port 500/4500 makes sense, but again, not sure that the PANW side needs to resolved as much as fixing the issue, being the Ciscos.&amp;nbsp; &lt;BR /&gt;&lt;BR /&gt;Another suggestion could be to modify the AppID to have a smaller timeout of 3600 secs (default) to something smaller (5 min?) so that you do not need to manually clear of the session tables.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 15 Aug 2022 17:43:00 GMT</pubDate>
    <dc:creator>S.Cantwell</dc:creator>
    <dc:date>2022-08-15T17:43:00Z</dc:date>
    <item>
      <title>Cisco VPN Behind PA-3220</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/cisco-vpn-behind-pa-3220/m-p/511852#M106380</link>
      <description>&lt;P&gt;We have a third-party that borrows our network to establish a VPN tunnel back to their office via a Cisco 881 ISR. We have it on a segregated guest network and it establishes an ike/ipsec tunnel back to their ASA over our internet connection.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Workstation --&amp;gt; Cisco 881 --&amp;gt; [Guest Network] --&amp;gt; Palo Alto FW --&amp;gt; Internet --&amp;gt; Cisco ASA&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Any time the network hiccups (or something loses power), the VPN drops and refuses to come back up for them until I go in the Session Browser on the PA and clear the stale sessions associated with the device. Rebooting the Cisco 881 does nothing. I've tried moving this device to another PA firewall (a 220) for them and the same thing happens on it. About once a week, I have to go manually clear the port 4500/500 sessions associated with their Cisco 881 IP from our firewall.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;They don't seem to have this issue with any similar setups they run and we don't have the issue with any other ipsec tunnels originated from inside our network. Any idea where we should start troubleshooting this?&lt;/P&gt;</description>
      <pubDate>Mon, 15 Aug 2022 15:12:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/cisco-vpn-behind-pa-3220/m-p/511852#M106380</guid>
      <dc:creator>phite_cpso</dc:creator>
      <dc:date>2022-08-15T15:12:29Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco VPN Behind PA-3220</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/cisco-vpn-behind-pa-3220/m-p/511865#M106386</link>
      <description>&lt;P&gt;Good Day&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You should consider seting up path monitoring on the VPN tunnel, so that there can be some icmp "hello" that will keep the tunnel up.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/vpns/set-up-site-to-site-vpn/set-up-tunnel-monitoring/define-a-tunnel-monitoring-profile#id65829b80-de86-4094-bd4f-96a41cff629f" target="_blank"&gt;https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/vpns/set-up-site-to-site-vpn/set-up-tunnel-monitoring/define-a-tunnel-monitoring-profile#id65829b80-de86-4094-bd4f-96a41cff629f&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 15 Aug 2022 15:42:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/cisco-vpn-behind-pa-3220/m-p/511865#M106386</guid>
      <dc:creator>S.Cantwell</dc:creator>
      <dc:date>2022-08-15T15:42:39Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco VPN Behind PA-3220</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/cisco-vpn-behind-pa-3220/m-p/511870#M106391</link>
      <description>I think you misunderstood - the VPN endpoint is not our Palo Alto firewall, so we can't apply a tunnel monitoring profile to it. We don't control either side of the tunnel (it's coming from a Cisco ISR inside our network to an ASA outside the network). We just have to clear the connections in the PA's session table each time there's a blip on the network.&lt;BR /&gt;</description>
      <pubDate>Mon, 15 Aug 2022 15:57:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/cisco-vpn-behind-pa-3220/m-p/511870#M106391</guid>
      <dc:creator>phite_cpso</dc:creator>
      <dc:date>2022-08-15T15:57:38Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco VPN Behind PA-3220</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/cisco-vpn-behind-pa-3220/m-p/511888#M106394</link>
      <description>&lt;P&gt;Hello there.&amp;nbsp;&amp;nbsp; Thank you for the clarification, and yet, the response could still be valid.&amp;nbsp; I am not sure how to do it, but there should be some vpn tunnel monitoring done on the VPN, from either side.&amp;nbsp; I think/understand that this thread may be thinking it is&amp;nbsp; is PANW issue, but it is not.&amp;nbsp;&amp;nbsp; If the session is indeed intact, then the PANW is doing its job and it is up the either the client or server side (from a TCP connection perspective) to send hellos/traffic/pings, whatever.&amp;nbsp;&amp;nbsp;&amp;nbsp; If the SPI gets out of sync and tearing down the port 500/4500 makes sense, but again, not sure that the PANW side needs to resolved as much as fixing the issue, being the Ciscos.&amp;nbsp; &lt;BR /&gt;&lt;BR /&gt;Another suggestion could be to modify the AppID to have a smaller timeout of 3600 secs (default) to something smaller (5 min?) so that you do not need to manually clear of the session tables.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 15 Aug 2022 17:43:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/cisco-vpn-behind-pa-3220/m-p/511888#M106394</guid>
      <dc:creator>S.Cantwell</dc:creator>
      <dc:date>2022-08-15T17:43:00Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco VPN Behind PA-3220</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/cisco-vpn-behind-pa-3220/m-p/511890#M106396</link>
      <description>Yes, I do think this is ultimately a Cisco issue, just odd that it only seems to happen for this agency when behind our firewall - I suspect they may have a config issue, maybe something with NAT-T.&lt;BR /&gt;The AppID timeout doesn't really seem to matter - even at the default 3600s, the sessions stay in the table indefinitely in our PA until I clear it out. It'll be offline for hours or even a day before I clear it sometimes.&lt;BR /&gt;</description>
      <pubDate>Mon, 15 Aug 2022 17:47:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/cisco-vpn-behind-pa-3220/m-p/511890#M106396</guid>
      <dc:creator>phite_cpso</dc:creator>
      <dc:date>2022-08-15T17:47:38Z</dc:date>
    </item>
  </channel>
</rss>

