<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: IPSEC tunnel Phase-2 in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-phase-2/m-p/539718#M110721</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/15603"&gt;@Raido_Rattameister&lt;/a&gt;&amp;nbsp;, Peer end engineer team confirmed that phase-2 lifespan is set for 1 hour only.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Also they have observed one more thing whenever the tunnel goes down, we are using test commands ( both for gateway and ipsec tunnel) to manually bring up the tunnel. We are seeing our phase-1 IKE-SA is being refreshed with newer-spi, but at the peer end which is cisco router 1000 there were multiple SA being generated( older SA is not terminating until they clear it manually)&lt;/P&gt;</description>
    <pubDate>Fri, 21 Apr 2023 14:42:00 GMT</pubDate>
    <dc:creator>Sujanya</dc:creator>
    <dc:date>2023-04-21T14:42:00Z</dc:date>
    <item>
      <title>IPSEC tunnel Phase-2</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-phase-2/m-p/539574#M110684</link>
      <description>&lt;P&gt;We have created an tunnel with SAP and as per their suggestion we have disabled tunnel monitoring, keepalive settings from our end. It is IKEV2 tunnel.&lt;BR /&gt;&lt;BR /&gt;We noticed that after sometime due to traffic not flowing suddenly Phase-2 is going down, as soon as it goes down we were seeing the issue in connectivity.&lt;BR /&gt;&lt;BR /&gt;As soon as manually trigger the tunnel and if the tunnel comes up, connectivity works again. Any suggestion here.&lt;/P&gt;</description>
      <pubDate>Thu, 20 Apr 2023 16:52:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-phase-2/m-p/539574#M110684</guid>
      <dc:creator>Sujanya</dc:creator>
      <dc:date>2023-04-20T16:52:52Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC tunnel Phase-2</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-phase-2/m-p/539578#M110687</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;Its only a guess, but I think it could be the other side dropping the tunnel due to lack of traffic? I typically use keep alives for this, not sure why they require it disabled.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Thu, 20 Apr 2023 17:07:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-phase-2/m-p/539578#M110687</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2023-04-20T17:07:54Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC tunnel Phase-2</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-phase-2/m-p/539584#M110689</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/27580"&gt;@OtakarKlier&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks for responding. We are not able to ping the customer gateway and as well as network as ping is not allowed from them. Will the keepalive still works in that situation.&lt;/P&gt;</description>
      <pubDate>Thu, 20 Apr 2023 17:27:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-phase-2/m-p/539584#M110689</guid>
      <dc:creator>Sujanya</dc:creator>
      <dc:date>2023-04-20T17:27:19Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC tunnel Phase-2</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-phase-2/m-p/539600#M110694</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;The keepalive should still send a ping even if they drop or block it on their end. Meaning that there is traffic on the tunnel. But sounds like their side that might be dropping it? What do the logs state for the tunnel?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Thu, 20 Apr 2023 19:11:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-phase-2/m-p/539600#M110694</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2023-04-20T19:11:26Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC tunnel Phase-2</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-phase-2/m-p/539681#M110710</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/27580"&gt;@OtakarKlier&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks for your response. We also noticing that there is no ike-phase-1 delete message being send from Palo-Alto to peer end device.&lt;BR /&gt;&lt;BR /&gt;Whenever we were seeing 1 IKE SA has been created at Palo-Alto , there would be multiple IKE-SA is visible at the peer Cisco router end.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Apr 2023 09:13:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-phase-2/m-p/539681#M110710</guid>
      <dc:creator>Sujanya</dc:creator>
      <dc:date>2023-04-21T09:13:23Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC tunnel Phase-2</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-phase-2/m-p/539695#M110713</link>
      <description>&lt;P&gt;How come can you see issues with connectivity if there is no traffic on the tunnel?&lt;/P&gt;
&lt;P&gt;"&lt;SPAN&gt;traffic not flowing suddenly Phase-2 is going down, as soon as it goes down we were seeing the issue in connectivity"&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;If you see issues with connectivity it means you do have traffic on the tunnel.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;This points to either different Phase1/2 timeout values or their side pulling down tunnel due DPD/Liveness check.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Apr 2023 12:38:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-phase-2/m-p/539695#M110713</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2023-04-21T12:38:50Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC tunnel Phase-2</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-phase-2/m-p/539701#M110715</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/15603"&gt;@Raido_Rattameister&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Yes we can see via GUI that IPSEC tunnel info is showing red but the IKE Info is showing always green. In this situation if any traffic has been initiated by backend server communication is allowed with no return traffic.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;There is no keepalive and tunnel monitor is enabled at both the ends. The interested traffic is the telnet traffic which will be randomly initiated by user.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Apr 2023 13:16:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-phase-2/m-p/539701#M110715</guid>
      <dc:creator>Sujanya</dc:creator>
      <dc:date>2023-04-21T13:16:06Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC tunnel Phase-2</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-phase-2/m-p/539702#M110716</link>
      <description>&lt;P&gt;If peer site does not reply to pings then it would be best to shut down tunnel monitor.&lt;/P&gt;
&lt;P&gt;Otherwise Palo thinks that tunnel is down as no tunnel monitor replies.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If there is interesting traffic then phase 2 is negotiated and tunnel stays up (or comes up if down).&lt;/P&gt;
&lt;P&gt;If you really need tunnel to stay up even if no interesting traffic and remote side is configured not to reply to pings then configure extra fake static route let's say /32 to one of IPs at remote side with ping interval 60 (it is biggest you can set).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Apr 2023 13:22:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-phase-2/m-p/539702#M110716</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2023-04-21T13:22:36Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC tunnel Phase-2</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-phase-2/m-p/539713#M110719</link>
      <description>&lt;P&gt;Actually there is no tunnel-monitor or Keepalive configured at both the end. We have kept the continues ping as well from the backend server to the other end IP address to keep the tunnel active. But exactly after 1 hour ( lifespan set for IPSEC phase 2 ) tunnel went down and we started getting timeout for tunnel.&lt;BR /&gt;&lt;BR /&gt;After I using the below two commands , tunnel came up again and ping started working fine.&lt;/P&gt;
&lt;P style="margin: 0in; font-family: 'Courier New'; font-size: 9.0pt; color: black;"&gt;&lt;SPAN&gt;test vpn ike-sa gateway &amp;lt;gateway_name&amp;gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: 'Courier New'; font-size: 9.0pt; color: black;"&gt;&lt;SPAN&gt;show vpn ike-sa gateway &amp;lt;gateway_name&amp;gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: 'Courier New'; font-size: 9.0pt; color: black;"&gt;&lt;SPAN&gt;test vpn ipsec-sa tunnel &amp;lt;tunnel_name&amp;gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: 'Courier New'; font-size: 9.0pt; color: black;"&gt;&lt;SPAN&gt;show vpn ipsec-sa tunnel &amp;lt;tunnel_name&amp;gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Apr 2023 14:27:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-phase-2/m-p/539713#M110719</guid>
      <dc:creator>Sujanya</dc:creator>
      <dc:date>2023-04-21T14:27:19Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC tunnel Phase-2</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-phase-2/m-p/539715#M110720</link>
      <description>&lt;P&gt;On Palo side default Phase 2 timeout is 1 hour.&lt;/P&gt;
&lt;P&gt;Seems like VPN settings don't match on both sides.&lt;/P&gt;
&lt;P&gt;Other side probably has longer than 1 hour timeout set for Phase 2.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Apr 2023 14:31:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-phase-2/m-p/539715#M110720</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2023-04-21T14:31:06Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC tunnel Phase-2</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-phase-2/m-p/539718#M110721</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/15603"&gt;@Raido_Rattameister&lt;/a&gt;&amp;nbsp;, Peer end engineer team confirmed that phase-2 lifespan is set for 1 hour only.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Also they have observed one more thing whenever the tunnel goes down, we are using test commands ( both for gateway and ipsec tunnel) to manually bring up the tunnel. We are seeing our phase-1 IKE-SA is being refreshed with newer-spi, but at the peer end which is cisco router 1000 there were multiple SA being generated( older SA is not terminating until they clear it manually)&lt;/P&gt;</description>
      <pubDate>Fri, 21 Apr 2023 14:42:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-phase-2/m-p/539718#M110721</guid>
      <dc:creator>Sujanya</dc:creator>
      <dc:date>2023-04-21T14:42:00Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC tunnel Phase-2</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-phase-2/m-p/539721#M110722</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/15603"&gt;@Raido_Rattameister&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Also we noticed that even though we are pushing the DHgroup value as 16 from Panorama , Palo-alto firewall taking the configuration at its end as DH14. and as per the communication with Cisco router end we asked them to keep the tunnel parameters as 16. Do you feel will it case any issue.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Apr 2023 15:34:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-phase-2/m-p/539721#M110722</guid>
      <dc:creator>Sujanya</dc:creator>
      <dc:date>2023-04-21T15:34:47Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC tunnel Phase-2</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-phase-2/m-p/539728#M110723</link>
      <description>&lt;P&gt;You can enable debug on this VPN tunnel and&amp;nbsp;ikemgr.log shows what timeouts other peer negotiates with.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClcKCAS" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClcKCAS&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Set Palo side to be passive so other side initiates connection.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Apr 2023 15:54:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-phase-2/m-p/539728#M110723</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2023-04-21T15:54:11Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC tunnel Phase-2</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-phase-2/m-p/539946#M110760</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/15603"&gt;@Raido_Rattameister&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The issue was fixed when we set the DHGroup value as 14 in the other end as well.&lt;BR /&gt;&lt;BR /&gt;One Thing to notice and need clarity is, Will Palo-Alto with 440 model and PAN-OS version 10.1.6-h6 will not supports DHGroup 16 ??? I was able to see only 1,2,5,14, 19 and 20&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 24 Apr 2023 14:39:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-phase-2/m-p/539946#M110760</guid>
      <dc:creator>Sujanya</dc:creator>
      <dc:date>2023-04-24T14:39:23Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC tunnel Phase-2</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-phase-2/m-p/539956#M110763</link>
      <description>&lt;P&gt;10.2 has DH group 16.&lt;/P&gt;</description>
      <pubDate>Mon, 24 Apr 2023 16:14:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-phase-2/m-p/539956#M110763</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2023-04-24T16:14:54Z</dc:date>
    </item>
  </channel>
</rss>

