<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: site to site vpn issue in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-vpn-issue/m-p/14878#M10921</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey Satish,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;TO add to Samir's comment, if the encaps are incrementing but the decaps remain at 0 in the &lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;&amp;gt; show vpn flow tunnel-id &amp;lt;tunnel-id&amp;gt; command, then it might be an issue with the zones associated with actual tunnel traffic.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To understand this better, if the interface configured for IKE Gateway is Ethernet1/1 in the UNTRUST zone but the ESP packets actually travel in and out the firewall through Ethernet1/10 in the WAN zone, then that configuration would not work.&lt;/P&gt;&lt;P&gt;Both interfaces would need to be in the same zone for the tunnel to successfully forward traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;See &lt;A href="https://live.paloaltonetworks.com/docs/DOC-2301"&gt;VPN Tunnel Traffic Encapsulation Incrementing but no Decaps&lt;/A&gt; for more details on this issue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;tasonibare&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 19 Nov 2014 21:44:00 GMT</pubDate>
    <dc:creator>tasonibare</dc:creator>
    <dc:date>2014-11-19T21:44:00Z</dc:date>
    <item>
      <title>site to site vpn issue</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-vpn-issue/m-p/14870#M10913</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Friends,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have PAN-2020 with OS- 6.0.4, one side PAN and other end have juniper tunnel are showing Up but traffic is not passing Not Passing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Satish&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Nov 2014 16:33:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-vpn-issue/m-p/14870#M10913</guid>
      <dc:creator>Satish</dc:creator>
      <dc:date>2014-11-19T16:33:13Z</dc:date>
    </item>
    <item>
      <title>Re: site to site vpn issue</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-vpn-issue/m-p/14871#M10914</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi &lt;A href="https://live.paloaltonetworks.com/u1/27418"&gt;Satish&lt;/A&gt; ,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please check routing on both side. On Palo Alto side routing should say if you want reach remote subnet, exit out using tunnel interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="tunnel_route.JPG" class="image-0 jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/16951_tunnel_route.JPG" style="height: 313px; width: 620px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This should be taken care on remote side as well. Hope this helps. Thank you.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Nov 2014 16:38:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-vpn-issue/m-p/14871#M10914</guid>
      <dc:creator>ssharma</dc:creator>
      <dc:date>2014-11-19T16:38:14Z</dc:date>
    </item>
    <item>
      <title>Re: site to site vpn issue</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-vpn-issue/m-p/14872#M10915</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Satish,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You may check the IPSec phase-1 and phase-2 status if they are showing UP from CLI as well. You may clear the VPN tunnel once and try to re-negotiate the tunnel again.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;show&lt;/SPAN&gt;&lt;/SPAN&gt; &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;vpn&lt;/SPAN&gt;&lt;/SPAN&gt; &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;ipsec&lt;/SPAN&gt;&lt;/SPAN&gt;-&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;sa&lt;/SPAN&gt;&lt;/SPAN&gt; tunnel &amp;lt;tunnel name&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;gt; &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;show&lt;/SPAN&gt;&lt;/SPAN&gt; &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;vpn&lt;/SPAN&gt;&lt;/SPAN&gt; &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;ike&lt;/SPAN&gt;&lt;/SPAN&gt;-&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;sa&lt;/SPAN&gt;&lt;/SPAN&gt; gateway&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;gt; &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;clear&lt;/SPAN&gt;&lt;/SPAN&gt; &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;vpn&lt;/SPAN&gt;&lt;/SPAN&gt; &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;ike&lt;/SPAN&gt;&lt;/SPAN&gt;-&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;sa&lt;/SPAN&gt;&lt;/SPAN&gt; gateway XXXXX &amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt; clear the &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;ike&lt;/SPAN&gt;&lt;/SPAN&gt; SA's&lt;/P&gt;&lt;P&gt;Delete IKEv1 IKE SA: Total 1 gateways found.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;gt; &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;clear&lt;/SPAN&gt;&lt;/SPAN&gt; &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;vpn&lt;/SPAN&gt;&lt;/SPAN&gt; &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;ipsec&lt;/SPAN&gt;&lt;/SPAN&gt;-&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;sa&lt;/SPAN&gt;&lt;/SPAN&gt; tunnel XXXXXX&lt;/P&gt;&lt;P&gt;Delete IKEv1 IPSec SA: Total 1 tunnels found.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;gt; &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;test&lt;/SPAN&gt;&lt;/SPAN&gt; &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;vpn&lt;/SPAN&gt;&lt;/SPAN&gt; &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;ike&lt;/SPAN&gt;&lt;/SPAN&gt;-&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;sa&lt;/SPAN&gt;&lt;/SPAN&gt; gateway XXXXXX&lt;/P&gt;&lt;P&gt;Initiate IKE SA: Total 1 gateways found. 1 &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;ike&lt;/SPAN&gt;&lt;/SPAN&gt; &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;sa&lt;/SPAN&gt;&lt;/SPAN&gt; &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;found&lt;/SPAN&gt;&lt;/SPAN&gt;.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;gt; &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;test&lt;/SPAN&gt;&lt;/SPAN&gt; &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;vpn&lt;/SPAN&gt;&lt;/SPAN&gt; &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;ipsec&lt;/SPAN&gt;&lt;/SPAN&gt;-&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;sa&lt;/SPAN&gt;&lt;/SPAN&gt; tunnel XXXXXX&lt;/P&gt;&lt;P&gt;Initiate IPSec SA: Total 1 tunnels found. 1 &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;ipsec&lt;/SPAN&gt;&lt;/SPAN&gt; &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;sa&lt;/SPAN&gt;&lt;/SPAN&gt; &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;found&lt;/SPAN&gt;&lt;/SPAN&gt;.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;gt; &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;show&lt;/SPAN&gt;&lt;/SPAN&gt; &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;vpn&lt;/SPAN&gt;&lt;/SPAN&gt; flow&amp;nbsp; &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;( &lt;/SPAN&gt;&lt;/SPAN&gt;get the tunnel ID from this command)&lt;/P&gt;&lt;P&gt;&amp;gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;show&lt;/SPAN&gt;&lt;/SPAN&gt; &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;vpn&lt;/SPAN&gt;&lt;/SPAN&gt; flow tunnel-id x&amp;nbsp; &amp;lt;&amp;lt; where x=id number from above display &amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt;&amp;gt; This command will show you, whether packets are &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;encap&lt;/SPAN&gt;&lt;/SPAN&gt; and sending through the tunnel with respective counter.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NOTE: &lt;/P&gt;&lt;P&gt;--- &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;make&lt;/SPAN&gt; sure you have static route configure on both &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;firewall&lt;/SPAN&gt; to route interesting traffic through &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;VPN tunnel&lt;/SPAN&gt; &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;( &lt;/SPAN&gt;as mentioned above by &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;ssharma&lt;/SPAN&gt;).&lt;/P&gt;&lt;P&gt;--- You have correct security policy in place&lt;SPAN class="GINGER_SOFTWARE_mark"&gt; ,&lt;/SPAN&gt; from VPN zone to outgoing zone.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Nov 2014 16:40:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-vpn-issue/m-p/14872#M10915</guid>
      <dc:creator>HULK</dc:creator>
      <dc:date>2014-11-19T16:40:16Z</dc:date>
    </item>
    <item>
      <title>Re: site to site vpn issue</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-vpn-issue/m-p/14873#M10916</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;2 helpful &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;document&lt;/SPAN&gt; for your reference: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--- &lt;A href="https://live.paloaltonetworks.com/docs/DOC-1236"&gt;CLI Commands to Status, Clear, Restore, and Monitor an IPSEC VPN Tunnel&lt;/A&gt;&lt;/P&gt;&lt;P&gt;--- &lt;A href="https://live.paloaltonetworks.com/docs/DOC-3671"&gt;How to Troubleshoot VPN Connectivity Issues&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Nov 2014 16:43:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-vpn-issue/m-p/14873#M10916</guid>
      <dc:creator>HULK</dc:creator>
      <dc:date>2014-11-19T16:43:49Z</dc:date>
    </item>
    <item>
      <title>Re: site to site vpn issue</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-vpn-issue/m-p/14874#M10917</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Hulk, every thing is look like correct but i am able to find out&amp;nbsp; issue. Regards Satish &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Nov 2014 17:33:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-vpn-issue/m-p/14874#M10917</guid>
      <dc:creator>Satish</dc:creator>
      <dc:date>2014-11-19T17:33:43Z</dc:date>
    </item>
    <item>
      <title>Re: site to site vpn issue</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-vpn-issue/m-p/14875#M10918</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Satish,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Run a continuous ping from behind the firewall. Check the session on the firewall :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;show session all filter source &amp;lt;local ip&amp;gt; destination &amp;lt;peer ip&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You should see ping session, check if the interface are correct. Meaning it should ingress from your ethernet interface and must egress out tunnel interface. If that is correct, then run following :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;gt; show vpn flow tunnel-id &amp;lt;tunnel-id&amp;gt; | match bytes&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Run following commands multiple times, and check if the encap and decap packets/bytes are incrementing. Hope this helps. Thank you.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Nov 2014 17:46:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-vpn-issue/m-p/14875#M10918</guid>
      <dc:creator>ssharma</dc:creator>
      <dc:date>2014-11-19T17:46:01Z</dc:date>
    </item>
    <item>
      <title>Re: site to site vpn issue</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-vpn-issue/m-p/14876#M10919</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Dud.., Let me check and get back to you. Regards Satish&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Nov 2014 17:48:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-vpn-issue/m-p/14876#M10919</guid>
      <dc:creator>Satish</dc:creator>
      <dc:date>2014-11-19T17:48:36Z</dc:date>
    </item>
    <item>
      <title>Re: site to site vpn issue</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-vpn-issue/m-p/14877#M10920</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi &lt;A href="https://live.paloaltonetworks.com/u1/27418"&gt;Satish&lt;/A&gt; ,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you check Nat Traversal under Network - &amp;gt; IKE Gateway -&amp;gt; Nat Traversal, commit the changes and see if that makes any difference. Thank you.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Nov 2014 19:09:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-vpn-issue/m-p/14877#M10920</guid>
      <dc:creator>ssharma</dc:creator>
      <dc:date>2014-11-19T19:09:40Z</dc:date>
    </item>
    <item>
      <title>Re: site to site vpn issue</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-vpn-issue/m-p/14878#M10921</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey Satish,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;TO add to Samir's comment, if the encaps are incrementing but the decaps remain at 0 in the &lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;&amp;gt; show vpn flow tunnel-id &amp;lt;tunnel-id&amp;gt; command, then it might be an issue with the zones associated with actual tunnel traffic.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To understand this better, if the interface configured for IKE Gateway is Ethernet1/1 in the UNTRUST zone but the ESP packets actually travel in and out the firewall through Ethernet1/10 in the WAN zone, then that configuration would not work.&lt;/P&gt;&lt;P&gt;Both interfaces would need to be in the same zone for the tunnel to successfully forward traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;See &lt;A href="https://live.paloaltonetworks.com/docs/DOC-2301"&gt;VPN Tunnel Traffic Encapsulation Incrementing but no Decaps&lt;/A&gt; for more details on this issue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;tasonibare&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Nov 2014 21:44:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-vpn-issue/m-p/14878#M10921</guid>
      <dc:creator>tasonibare</dc:creator>
      <dc:date>2014-11-19T21:44:00Z</dc:date>
    </item>
    <item>
      <title>Re: site to site vpn issue</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-vpn-issue/m-p/14879#M10922</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Friends&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After reviewing the configuration bye Tech Team gentleman (&lt;SPAN style="color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 11px; background-color: #ecf3ea;"&gt;Rafal&lt;/SPAN&gt;). he suggested to get rid of the firewall SNATing and DNATing traffic originated or targeted to firewall and put the public IP directly on the loopback interface. This greatly simplifies the configuration and I can be causing IPSEC issues. After we've committed the change both proxy ids came up properly and traffic was passing on both of them. Thanks Refal&amp;nbsp; &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://live.paloaltonetworks.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&amp;nbsp; &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://live.paloaltonetworks.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Satish&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 24 Nov 2014 09:37:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-vpn-issue/m-p/14879#M10922</guid>
      <dc:creator>Satish</dc:creator>
      <dc:date>2014-11-24T09:37:30Z</dc:date>
    </item>
  </channel>
</rss>

