<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Issues with phase 1 of ipsec in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/issues-with-phase-1-of-ipsec/m-p/542561#M111125</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;Can you change the ikemgr logging level to 'dump' and get the logs?&lt;/P&gt;
&lt;P&gt;It will give more details.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 18 May 2023 02:35:18 GMT</pubDate>
    <dc:creator>akuzhuppilly</dc:creator>
    <dc:date>2023-05-18T02:35:18Z</dc:date>
    <item>
      <title>Issues with phase 1 of ipsec</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/issues-with-phase-1-of-ipsec/m-p/542407#M111104</link>
      <description>&lt;P&gt;Hi, i've been having an issue with getting the phase 1 of our ipsec tunnel to a customer up who is using a watchguard firewall.&lt;BR /&gt;&lt;BR /&gt;As far as i can see our phase 1 settings match up, but i keep getting the no proposal chosen error in the logs.&lt;BR /&gt;&lt;BR /&gt;I've attached screenshots of the settings and also a packet capture receive result.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;I've been a bit stumped as to what is causing this, any help is appreciated.&lt;BR /&gt;&lt;BR /&gt;Frame 1: 606 bytes on wire (4848 bits), 606 bytes captured (4848 bits)&lt;BR /&gt;Encapsulation type: Ethernet (1)&lt;BR /&gt;Arrival Time: May 16, 2023 18:26:15.435886000 AUS Eastern Standard Time&lt;BR /&gt;[Time shift for this packet: 0.000000000 seconds]&lt;BR /&gt;Epoch Time: 1684225575.435886000 seconds&lt;BR /&gt;[Time delta from previous captured frame: 0.000000000 seconds]&lt;BR /&gt;[Time delta from previous displayed frame: 0.000000000 seconds]&lt;BR /&gt;[Time since reference or first frame: 0.000000000 seconds]&lt;BR /&gt;Frame Number: 1&lt;BR /&gt;Frame Length: 606 bytes (4848 bits)&lt;BR /&gt;Capture Length: 606 bytes (4848 bits)&lt;BR /&gt;[Frame is marked: False]&lt;BR /&gt;[Frame is ignored: False]&lt;BR /&gt;[Protocols in frame: eth:ethertype:ip:udp:isakmp]&lt;BR /&gt;[Coloring Rule Name: UDP]&lt;BR /&gt;[Coloring Rule String: udp]&lt;BR /&gt;Ethernet II, Src: JuniperN_0a:88:02 (ec:94:d5:0a:88:02), Dst: PaloAlto_e0:40:46 (b4:0c:25:e0:40:46)&lt;BR /&gt;Destination: PaloAlto_e0:40:46 (b4:0c:25:e0:40:46)&lt;BR /&gt;Address: PaloAlto_e0:40:46 (b4:0c:25:e0:40:46)&lt;BR /&gt;.... ..0. .... .... .... .... = LG bit: Globally unique address (factory default)&lt;BR /&gt;.... ...0 .... .... .... .... = IG bit: Individual address (unicast)&lt;BR /&gt;Source: JuniperN_0a:88:02 (ec:94:d5:0a:88:02)&lt;BR /&gt;Address: JuniperN_0a:88:02 (ec:94:d5:0a:88:02)&lt;BR /&gt;.... ..0. .... .... .... .... = LG bit: Globally unique address (factory default)&lt;BR /&gt;.... ...0 .... .... .... .... = IG bit: Individual address (unicast)&lt;BR /&gt;Type: IPv4 (0x0800)&lt;BR /&gt;Internet Protocol Version 4, Src: 82.134.94.166, Dst: 203.62.215.80&lt;BR /&gt;0100 .... = Version: 4&lt;BR /&gt;.... 0101 = Header Length: 20 bytes (5)&lt;BR /&gt;Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)&lt;BR /&gt;0000 00.. = Differentiated Services Codepoint: Default (0)&lt;BR /&gt;.... ..00 = Explicit Congestion Notification: Not ECN-Capable Transport (0)&lt;BR /&gt;Total Length: 592&lt;BR /&gt;Identification: 0xa966 (43366)&lt;BR /&gt;000. .... = Flags: 0x0&lt;BR /&gt;0... .... = Reserved bit: Not set&lt;BR /&gt;.0.. .... = Don't fragment: Not set&lt;BR /&gt;..0. .... = More fragments: Not set&lt;BR /&gt;...0 0000 0000 0000 = Fragment Offset: 0&lt;BR /&gt;Time to Live: 53&lt;BR /&gt;Protocol: UDP (17)&lt;BR /&gt;Header Checksum: 0x867b [validation disabled]&lt;BR /&gt;[Header checksum status: Unverified]&lt;BR /&gt;Source Address: 82.134.94.166&lt;BR /&gt;Destination Address: 203.62.215.80&lt;BR /&gt;User Datagram Protocol, Src Port: 500, Dst Port: 500&lt;BR /&gt;Source Port: 500&lt;BR /&gt;Destination Port: 500&lt;BR /&gt;Length: 572&lt;BR /&gt;Checksum: 0xe35d [unverified]&lt;BR /&gt;[Checksum Status: Unverified]&lt;BR /&gt;[Stream index: 0]&lt;BR /&gt;[Timestamps]&lt;BR /&gt;[Time since first frame: 0.000000000 seconds]&lt;BR /&gt;[Time since previous frame: 0.000000000 seconds]&lt;BR /&gt;UDP payload (564 bytes)&lt;BR /&gt;Internet Security Association and Key Management Protocol&lt;BR /&gt;Initiator SPI: 6a0111cdd6da6b20&lt;BR /&gt;Responder SPI: 0000000000000000&lt;BR /&gt;Next payload: Security Association (33)&lt;BR /&gt;Version: 2.0&lt;BR /&gt;0010 .... = MjVer: 0x2&lt;BR /&gt;.... 0000 = MnVer: 0x0&lt;BR /&gt;Exchange type: IKE_SA_INIT (34)&lt;BR /&gt;Flags: 0x08 (Initiator, No higher version, Request)&lt;BR /&gt;.... 1... = Initiator: Initiator&lt;BR /&gt;...0 .... = Version: No higher version&lt;BR /&gt;..0. .... = Response: Request&lt;BR /&gt;Message ID: 0x00000000&lt;BR /&gt;Length: 564&lt;BR /&gt;Payload: Security Association (33)&lt;BR /&gt;Next payload: Key Exchange (34)&lt;BR /&gt;0... .... = Critical Bit: Not critical&lt;BR /&gt;.000 0000 = Reserved: 0x00&lt;BR /&gt;Payload length: 244&lt;BR /&gt;Payload: Proposal (2) # 1&lt;BR /&gt;Next payload: Proposal (2)&lt;BR /&gt;Reserved: 00&lt;BR /&gt;Payload length: 36&lt;BR /&gt;Proposal number: 1&lt;BR /&gt;Protocol ID: IKE (1)&lt;BR /&gt;SPI Size: 0&lt;BR /&gt;Proposal transforms: 3&lt;BR /&gt;Payload: Transform (3)&lt;BR /&gt;Next payload: Transform (3)&lt;BR /&gt;Reserved: 00&lt;BR /&gt;Payload length: 12&lt;BR /&gt;Transform Type: Encryption Algorithm (ENCR) (1)&lt;BR /&gt;Reserved: 00&lt;BR /&gt;Transform ID (ENCR): AES-GCM with a 16 octet ICV (20)&lt;BR /&gt;Transform Attribute (t=14,l=2): Key Length: 256&lt;BR /&gt;1... .... .... .... = Format: Type/Value (TV)&lt;BR /&gt;Type: Key Length (14)&lt;BR /&gt;Value: 0100&lt;BR /&gt;Key Length: 256&lt;BR /&gt;Payload: Transform (3)&lt;BR /&gt;Next payload: Transform (3)&lt;BR /&gt;Reserved: 00&lt;BR /&gt;Payload length: 8&lt;BR /&gt;Transform Type: Pseudo-random Function (PRF) (2)&lt;BR /&gt;Reserved: 00&lt;BR /&gt;Transform ID (PRF): PRF_HMAC_SHA2_256 (5)&lt;BR /&gt;Payload: Transform (3)&lt;BR /&gt;Next payload: NONE / No Next Payload (0)&lt;BR /&gt;Reserved: 00&lt;BR /&gt;Payload length: 8&lt;BR /&gt;Transform Type: Diffie-Hellman Group (D-H) (4)&lt;BR /&gt;Reserved: 00&lt;BR /&gt;Transform ID (D-H): 384-bit random ECP group (20)&lt;BR /&gt;Payload: Proposal (2) # 2&lt;BR /&gt;Next payload: Proposal (2)&lt;BR /&gt;Reserved: 00&lt;BR /&gt;Payload length: 36&lt;BR /&gt;Proposal number: 2&lt;BR /&gt;Protocol ID: IKE (1)&lt;BR /&gt;SPI Size: 0&lt;BR /&gt;Proposal transforms: 3&lt;BR /&gt;Payload: Transform (3)&lt;BR /&gt;Next payload: Transform (3)&lt;BR /&gt;Reserved: 00&lt;BR /&gt;Payload length: 12&lt;BR /&gt;Transform Type: Encryption Algorithm (ENCR) (1)&lt;BR /&gt;Reserved: 00&lt;BR /&gt;Transform ID (ENCR): AES-GCM with a 16 octet ICV (20)&lt;BR /&gt;Transform Attribute (t=14,l=2): Key Length: 192&lt;BR /&gt;1... .... .... .... = Format: Type/Value (TV)&lt;BR /&gt;Type: Key Length (14)&lt;BR /&gt;Value: 00c0&lt;BR /&gt;Key Length: 192&lt;BR /&gt;Payload: Transform (3)&lt;BR /&gt;Next payload: Transform (3)&lt;BR /&gt;Reserved: 00&lt;BR /&gt;Payload length: 8&lt;BR /&gt;Transform Type: Pseudo-random Function (PRF) (2)&lt;BR /&gt;Reserved: 00&lt;BR /&gt;Transform ID (PRF): PRF_HMAC_SHA2_256 (5)&lt;BR /&gt;Payload: Transform (3)&lt;BR /&gt;Next payload: NONE / No Next Payload (0)&lt;BR /&gt;Reserved: 00&lt;BR /&gt;Payload length: 8&lt;BR /&gt;Transform Type: Diffie-Hellman Group (D-H) (4)&lt;BR /&gt;Reserved: 00&lt;BR /&gt;Transform ID (D-H): 384-bit random ECP group (20)&lt;BR /&gt;Payload: Proposal (2) # 3&lt;BR /&gt;Next payload: Proposal (2)&lt;BR /&gt;Reserved: 00&lt;BR /&gt;Payload length: 36&lt;BR /&gt;Proposal number: 3&lt;BR /&gt;Protocol ID: IKE (1)&lt;BR /&gt;SPI Size: 0&lt;BR /&gt;Proposal transforms: 3&lt;BR /&gt;Payload: Transform (3)&lt;BR /&gt;Next payload: Transform (3)&lt;BR /&gt;Reserved: 00&lt;BR /&gt;Payload length: 12&lt;BR /&gt;Transform Type: Encryption Algorithm (ENCR) (1)&lt;BR /&gt;Reserved: 00&lt;BR /&gt;Transform ID (ENCR): AES-GCM with a 16 octet ICV (20)&lt;BR /&gt;Transform Attribute (t=14,l=2): Key Length: 128&lt;BR /&gt;1... .... .... .... = Format: Type/Value (TV)&lt;BR /&gt;Type: Key Length (14)&lt;BR /&gt;Value: 0080&lt;BR /&gt;Key Length: 128&lt;BR /&gt;Payload: Transform (3)&lt;BR /&gt;Next payload: Transform (3)&lt;BR /&gt;Reserved: 00&lt;BR /&gt;Payload length: 8&lt;BR /&gt;Transform Type: Pseudo-random Function (PRF) (2)&lt;BR /&gt;Reserved: 00&lt;BR /&gt;Transform ID (PRF): PRF_HMAC_SHA2_256 (5)&lt;BR /&gt;Payload: Transform (3)&lt;BR /&gt;Next payload: NONE / No Next Payload (0)&lt;BR /&gt;Reserved: 00&lt;BR /&gt;Payload length: 8&lt;BR /&gt;Transform Type: Diffie-Hellman Group (D-H) (4)&lt;BR /&gt;Reserved: 00&lt;BR /&gt;Transform ID (D-H): 384-bit random ECP group (20)&lt;BR /&gt;Payload: Proposal (2) # 4&lt;BR /&gt;Next payload: Proposal (2)&lt;BR /&gt;Reserved: 00&lt;BR /&gt;Payload length: 44&lt;BR /&gt;Proposal number: 4&lt;BR /&gt;Protocol ID: IKE (1)&lt;BR /&gt;SPI Size: 0&lt;BR /&gt;Proposal transforms: 4&lt;BR /&gt;Payload: Transform (3)&lt;BR /&gt;Next payload: Transform (3)&lt;BR /&gt;Reserved: 00&lt;BR /&gt;Payload length: 12&lt;BR /&gt;Transform Type: Encryption Algorithm (ENCR) (1)&lt;BR /&gt;Reserved: 00&lt;BR /&gt;Transform ID (ENCR): ENCR_AES_CBC (12)&lt;BR /&gt;Transform Attribute (t=14,l=2): Key Length: 256&lt;BR /&gt;1... .... .... .... = Format: Type/Value (TV)&lt;BR /&gt;Type: Key Length (14)&lt;BR /&gt;Value: 0100&lt;BR /&gt;Key Length: 256&lt;BR /&gt;Payload: Transform (3)&lt;BR /&gt;Next payload: Transform (3)&lt;BR /&gt;Reserved: 00&lt;BR /&gt;Payload length: 8&lt;BR /&gt;Transform Type: Pseudo-random Function (PRF) (2)&lt;BR /&gt;Reserved: 00&lt;BR /&gt;Transform ID (PRF): PRF_HMAC_SHA2_512 (7)&lt;BR /&gt;Payload: Transform (3)&lt;BR /&gt;Next payload: Transform (3)&lt;BR /&gt;Reserved: 00&lt;BR /&gt;Payload length: 8&lt;BR /&gt;Transform Type: Integrity Algorithm (INTEG) (3)&lt;BR /&gt;Reserved: 00&lt;BR /&gt;Transform ID (INTEG): AUTH_HMAC_SHA2_512_256 (14)&lt;BR /&gt;Payload: Transform (3)&lt;BR /&gt;Next payload: NONE / No Next Payload (0)&lt;BR /&gt;Reserved: 00&lt;BR /&gt;Payload length: 8&lt;BR /&gt;Transform Type: Diffie-Hellman Group (D-H) (4)&lt;BR /&gt;Reserved: 00&lt;BR /&gt;Transform ID (D-H): 384-bit random ECP group (20)&lt;BR /&gt;Payload: Proposal (2) # 5&lt;BR /&gt;Next payload: Proposal (2)&lt;BR /&gt;Reserved: 00&lt;BR /&gt;Payload length: 44&lt;BR /&gt;Proposal number: 5&lt;BR /&gt;Protocol ID: IKE (1)&lt;BR /&gt;SPI Size: 0&lt;BR /&gt;Proposal transforms: 4&lt;BR /&gt;Payload: Transform (3)&lt;BR /&gt;Next payload: Transform (3)&lt;BR /&gt;Reserved: 00&lt;BR /&gt;Payload length: 12&lt;BR /&gt;Transform Type: Encryption Algorithm (ENCR) (1)&lt;BR /&gt;Reserved: 00&lt;BR /&gt;Transform ID (ENCR): ENCR_AES_CBC (12)&lt;BR /&gt;Transform Attribute (t=14,l=2): Key Length: 256&lt;BR /&gt;1... .... .... .... = Format: Type/Value (TV)&lt;BR /&gt;Type: Key Length (14)&lt;BR /&gt;Value: 0100&lt;BR /&gt;Key Length: 256&lt;BR /&gt;Payload: Transform (3)&lt;BR /&gt;Next payload: Transform (3)&lt;BR /&gt;Reserved: 00&lt;BR /&gt;Payload length: 8&lt;BR /&gt;Transform Type: Pseudo-random Function (PRF) (2)&lt;BR /&gt;Reserved: 00&lt;BR /&gt;Transform ID (PRF): PRF_HMAC_SHA1 (2)&lt;BR /&gt;Payload: Transform (3)&lt;BR /&gt;Next payload: Transform (3)&lt;BR /&gt;Reserved: 00&lt;BR /&gt;Payload length: 8&lt;BR /&gt;Transform Type: Integrity Algorithm (INTEG) (3)&lt;BR /&gt;Reserved: 00&lt;BR /&gt;Transform ID (INTEG): AUTH_HMAC_SHA1_96 (2)&lt;BR /&gt;Payload: Transform (3)&lt;BR /&gt;Next payload: NONE / No Next Payload (0)&lt;BR /&gt;Reserved: 00&lt;BR /&gt;Payload length: 8&lt;BR /&gt;Transform Type: Diffie-Hellman Group (D-H) (4)&lt;BR /&gt;Reserved: 00&lt;BR /&gt;Transform ID (D-H): 384-bit random ECP group (20)&lt;BR /&gt;Payload: Proposal (2) # 6&lt;BR /&gt;Next payload: NONE / No Next Payload (0)&lt;BR /&gt;Reserved: 00&lt;BR /&gt;Payload length: 44&lt;BR /&gt;Proposal number: 6&lt;BR /&gt;Protocol ID: IKE (1)&lt;BR /&gt;SPI Size: 0&lt;BR /&gt;Proposal transforms: 4&lt;BR /&gt;Payload: Transform (3)&lt;BR /&gt;Next payload: Transform (3)&lt;BR /&gt;Reserved: 00&lt;BR /&gt;Payload length: 12&lt;BR /&gt;Transform Type: Encryption Algorithm (ENCR) (1)&lt;BR /&gt;Reserved: 00&lt;BR /&gt;Transform ID (ENCR): ENCR_AES_CBC (12)&lt;BR /&gt;Transform Attribute (t=14,l=2): Key Length: 256&lt;BR /&gt;1... .... .... .... = Format: Type/Value (TV)&lt;BR /&gt;Type: Key Length (14)&lt;BR /&gt;Value: 0100&lt;BR /&gt;Key Length: 256&lt;BR /&gt;Payload: Transform (3)&lt;BR /&gt;Next payload: Transform (3)&lt;BR /&gt;Reserved: 00&lt;BR /&gt;Payload length: 8&lt;BR /&gt;Transform Type: Pseudo-random Function (PRF) (2)&lt;BR /&gt;Reserved: 00&lt;BR /&gt;Transform ID (PRF): PRF_HMAC_SHA2_384 (6)&lt;BR /&gt;Payload: Transform (3)&lt;BR /&gt;Next payload: Transform (3)&lt;BR /&gt;Reserved: 00&lt;BR /&gt;Payload length: 8&lt;BR /&gt;Transform Type: Integrity Algorithm (INTEG) (3)&lt;BR /&gt;Reserved: 00&lt;BR /&gt;Transform ID (INTEG): AUTH_HMAC_SHA2_384_192 (13)&lt;BR /&gt;Payload: Transform (3)&lt;BR /&gt;Next payload: NONE / No Next Payload (0)&lt;BR /&gt;Reserved: 00&lt;BR /&gt;Payload length: 8&lt;BR /&gt;Transform Type: Diffie-Hellman Group (D-H) (4)&lt;BR /&gt;Reserved: 00&lt;BR /&gt;Transform ID (D-H): 384-bit random ECP group (20)&lt;BR /&gt;Payload: Key Exchange (34)&lt;BR /&gt;Next payload: Nonce (40)&lt;BR /&gt;0... .... = Critical Bit: Not critical&lt;BR /&gt;.000 0000 = Reserved: 0x00&lt;BR /&gt;Payload length: 104&lt;BR /&gt;DH Group #: 384-bit random ECP group (20)&lt;BR /&gt;Reserved: 0000&lt;BR /&gt;Key Exchange Data: 43706ad558cb690e8384e4f50f70544d9ec325ec1c28fa488603aee93ad766ea8f3f1c52…&lt;BR /&gt;Payload: Nonce (40)&lt;BR /&gt;Next payload: Notify (41)&lt;BR /&gt;0... .... = Critical Bit: Not critical&lt;BR /&gt;.000 0000 = Reserved: 0x00&lt;BR /&gt;Payload length: 68&lt;BR /&gt;Nonce DATA: ac019f7c06b30dc654fe6329d8c70d05bbd67c673cc7c956e01ad9ee3b391ed17ca31fb3…&lt;BR /&gt;Payload: Notify (41) - NAT_DETECTION_SOURCE_IP&lt;BR /&gt;Next payload: Notify (41)&lt;BR /&gt;0... .... = Critical Bit: Not critical&lt;BR /&gt;.000 0000 = Reserved: 0x00&lt;BR /&gt;Payload length: 28&lt;BR /&gt;Protocol ID: RESERVED (0)&lt;BR /&gt;SPI Size: 0&lt;BR /&gt;Notify Message Type: NAT_DETECTION_SOURCE_IP (16388)&lt;BR /&gt;Notification DATA: 6532b44f0602bced66bc1d97d41e4e328c5afb1a&lt;BR /&gt;Payload: Notify (41) - NAT_DETECTION_DESTINATION_IP&lt;BR /&gt;Next payload: Vendor ID (43)&lt;BR /&gt;0... .... = Critical Bit: Not critical&lt;BR /&gt;.000 0000 = Reserved: 0x00&lt;BR /&gt;Payload length: 28&lt;BR /&gt;Protocol ID: RESERVED (0)&lt;BR /&gt;SPI Size: 0&lt;BR /&gt;Notify Message Type: NAT_DETECTION_DESTINATION_IP (16389)&lt;BR /&gt;Notification DATA: 4fc80883e00a06e245e15ef7b39b074df5958c71&lt;BR /&gt;Payload: Vendor ID (43) : Unknown Vendor ID&lt;BR /&gt;Next payload: NONE / No Next Payload (0)&lt;BR /&gt;0... .... = Critical Bit: Not critical&lt;BR /&gt;.000 0000 = Reserved: 0x00&lt;BR /&gt;Payload length: 64&lt;BR /&gt;Vendor ID: bfc22e9856ba993611c11e48a6d20807a95bedb393026a49e60fac327bb9601b566b3439…&lt;BR /&gt;Vendor ID: Unknown Vendor ID&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 17 May 2023 06:20:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/issues-with-phase-1-of-ipsec/m-p/542407#M111104</guid>
      <dc:creator>Nick_Leon</dc:creator>
      <dc:date>2023-05-17T06:20:38Z</dc:date>
    </item>
    <item>
      <title>Re: Issues with phase 1 of ipsec</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/issues-with-phase-1-of-ipsec/m-p/542466#M111116</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/237133"&gt;@Nick_Leon&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The no proposal error isn't limited to phase 1.&amp;nbsp; Did you check the IPSec settings as well :&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u000000wlDICAY" target="_blank" rel="noopener"&gt;IPSec Phase 2 Negotiation fails with "IKE protocol notification message received: received notify type NO_PROPOSAL_CHOSEN" - Authentication mismatch in Phase 2&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Some dump-level ikemgr logs might prove helpful as well to shed more light on the actual problem:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClivCAC" target="_blank" rel="noopener"&gt;How to Troubleshoot IPSec VPN connectivity issues&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hope this helps,&lt;/P&gt;
&lt;P&gt;-Kim.&lt;/P&gt;</description>
      <pubDate>Wed, 17 May 2023 12:31:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/issues-with-phase-1-of-ipsec/m-p/542466#M111116</guid>
      <dc:creator>kiwi</dc:creator>
      <dc:date>2023-05-17T12:31:29Z</dc:date>
    </item>
    <item>
      <title>Re: Issues with phase 1 of ipsec</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/issues-with-phase-1-of-ipsec/m-p/542561#M111125</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;Can you change the ikemgr logging level to 'dump' and get the logs?&lt;/P&gt;
&lt;P&gt;It will give more details.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 18 May 2023 02:35:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/issues-with-phase-1-of-ipsec/m-p/542561#M111125</guid>
      <dc:creator>akuzhuppilly</dc:creator>
      <dc:date>2023-05-18T02:35:18Z</dc:date>
    </item>
  </channel>
</rss>

