<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Unable to Connect IPSec VPN Tunnel in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/unable-to-connect-ipsec-vpn-tunnel/m-p/521703#M108096</link>
    <description>&lt;P&gt;Need assistance to connect a VPN IPSec Tunnel between PA and Cisco 4300 Series. Everything seems to be configured on both sides, but when I check logs on the PA-CLI, it shows this log:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;IPsec-SA request for 150.220.213.178 queued since no phase1 found&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;2022-11-17 10:49:19.353 -0600 [PNTF]: { 1: }: ====&amp;gt; PHASE-1 NEGOTIATION STARTED AS INITIATOR, MAIN MODE &amp;lt;====&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;====&amp;gt; Initiated SA: 70.248.29.2[500]-150.220.213.178[500] cookie:e70d77589b7877bb:0000000000&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Where Do I check for Phase 1? I think it is the IKE Gateways, which it is already configured.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Fri, 18 Nov 2022 15:42:31 GMT</pubDate>
    <dc:creator>yjimenez</dc:creator>
    <dc:date>2022-11-18T15:42:31Z</dc:date>
    <item>
      <title>Unable to Connect IPSec VPN Tunnel</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/unable-to-connect-ipsec-vpn-tunnel/m-p/521703#M108096</link>
      <description>&lt;P&gt;Need assistance to connect a VPN IPSec Tunnel between PA and Cisco 4300 Series. Everything seems to be configured on both sides, but when I check logs on the PA-CLI, it shows this log:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;IPsec-SA request for 150.220.213.178 queued since no phase1 found&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;2022-11-17 10:49:19.353 -0600 [PNTF]: { 1: }: ====&amp;gt; PHASE-1 NEGOTIATION STARTED AS INITIATOR, MAIN MODE &amp;lt;====&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;====&amp;gt; Initiated SA: 70.248.29.2[500]-150.220.213.178[500] cookie:e70d77589b7877bb:0000000000&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Where Do I check for Phase 1? I think it is the IKE Gateways, which it is already configured.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 18 Nov 2022 15:42:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/unable-to-connect-ipsec-vpn-tunnel/m-p/521703#M108096</guid>
      <dc:creator>yjimenez</dc:creator>
      <dc:date>2022-11-18T15:42:31Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to Connect IPSec VPN Tunnel</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/unable-to-connect-ipsec-vpn-tunnel/m-p/521740#M108105</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/255864"&gt;@yjimenez&lt;/a&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;thanks for posting in LIVEcommunity!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To me this looks like standard log when Firewall initiates phase 1 to remove peer. The fact that this says: "&lt;SPAN&gt;queued since no phase1 found&lt;/SPAN&gt;" indicates this is a new session rather than configuration is missing. Is there any further log after this entry? If there is a response, then there should be logs indicating what phase 1 parameters were received from remote peer. If there is no response or traffic is blocked in between, this log entry will be repeated as PA tries to establish phase 1.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regarding your question, yes the phase 1 configuration is under: "IKE Gateways".&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Kind Regards&lt;/P&gt;
&lt;P&gt;Pavel&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 18 Nov 2022 21:11:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/unable-to-connect-ipsec-vpn-tunnel/m-p/521740#M108105</guid>
      <dc:creator>PavelK</dc:creator>
      <dc:date>2022-11-18T21:11:54Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to Connect IPSec VPN Tunnel</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/unable-to-connect-ipsec-vpn-tunnel/m-p/521743#M108107</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;Also Cisco devices dont tend to bring up VPN tunnels unless told to do so, ie sending traffic, etc. I would try to ping something from one side of the tunnel to the other and see what happens.&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Fri, 18 Nov 2022 22:01:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/unable-to-connect-ipsec-vpn-tunnel/m-p/521743#M108107</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2022-11-18T22:01:04Z</dc:date>
    </item>
  </channel>
</rss>

