<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Remote VPN gateway - IKE intitiator drop on Palo FW in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/remote-vpn-gateway-ike-intitiator-drop-on-palo-fw/m-p/617689#M122016</link>
    <description>&lt;P&gt;Hi all,&lt;/P&gt;
&lt;P&gt;so a weird issue..&amp;nbsp;&lt;/P&gt;
&lt;P&gt;i have a pa1410 with multiple VPNs all working happy days.&lt;/P&gt;
&lt;P&gt;I have one client with a linux software based FW (cant recall fw vendor)&lt;/P&gt;
&lt;P&gt;we are using same ike/ipsec settings both ends all is good..&lt;/P&gt;
&lt;P&gt;if i initiate vpn (test vpn ike-sa gateway xxxx) from Palo side, the VPN comes up and all is working..&lt;/P&gt;
&lt;P&gt;however if client initiates phase1 nothing happens..&lt;/P&gt;
&lt;P&gt;Palo FW packet capture shows their ike being dropped on the Palo for some&amp;nbsp; reason and cannot figure out why. nothing in the logs either with session start enabled on my deny rules for tshooting this issue.&lt;/P&gt;
&lt;P&gt;in ikemgr.log i also see nothing..&lt;/P&gt;
&lt;P&gt;I have tried setting my ike gateway in passive mode but no luck also.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;any ideas?&lt;/P&gt;
&lt;P&gt;thanks in adv&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 14 Nov 2024 10:17:46 GMT</pubDate>
    <dc:creator>PA_nts</dc:creator>
    <dc:date>2024-11-14T10:17:46Z</dc:date>
    <item>
      <title>Remote VPN gateway - IKE intitiator drop on Palo FW</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/remote-vpn-gateway-ike-intitiator-drop-on-palo-fw/m-p/617689#M122016</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;
&lt;P&gt;so a weird issue..&amp;nbsp;&lt;/P&gt;
&lt;P&gt;i have a pa1410 with multiple VPNs all working happy days.&lt;/P&gt;
&lt;P&gt;I have one client with a linux software based FW (cant recall fw vendor)&lt;/P&gt;
&lt;P&gt;we are using same ike/ipsec settings both ends all is good..&lt;/P&gt;
&lt;P&gt;if i initiate vpn (test vpn ike-sa gateway xxxx) from Palo side, the VPN comes up and all is working..&lt;/P&gt;
&lt;P&gt;however if client initiates phase1 nothing happens..&lt;/P&gt;
&lt;P&gt;Palo FW packet capture shows their ike being dropped on the Palo for some&amp;nbsp; reason and cannot figure out why. nothing in the logs either with session start enabled on my deny rules for tshooting this issue.&lt;/P&gt;
&lt;P&gt;in ikemgr.log i also see nothing..&lt;/P&gt;
&lt;P&gt;I have tried setting my ike gateway in passive mode but no luck also.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;any ideas?&lt;/P&gt;
&lt;P&gt;thanks in adv&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 14 Nov 2024 10:17:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/remote-vpn-gateway-ike-intitiator-drop-on-palo-fw/m-p/617689#M122016</guid>
      <dc:creator>PA_nts</dc:creator>
      <dc:date>2024-11-14T10:17:46Z</dc:date>
    </item>
    <item>
      <title>Re: Remote VPN gateway - IKE intitiator drop on Palo FW</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/remote-vpn-gateway-ike-intitiator-drop-on-palo-fw/m-p/617826#M122023</link>
      <description>&lt;P&gt;Hello, I have found out that the Linux GP client has issues with it at times. I have suggested having the Linux users use "openConnect" which is a free download software. Below is the way that we have the users log into the VPN on it and it seems to work without any issues.&lt;/P&gt;
&lt;P&gt;Just need to see what way works for you on it.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;sudo apt install globalprotect-openconnect&lt;/P&gt;
&lt;P&gt;sudo openconnect --protocol=gp -u &lt;A href="mailto:username@&amp;lt;Domain" target="_blank"&gt;username@&amp;lt;Domain&lt;/A&gt;&amp;nbsp;Info&amp;gt; vpn.*.*/gateway or&lt;BR /&gt;sudo openconnect --protocol=gp -u username vpn.*.*/&lt;SPAN&gt;gateway&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 14 Nov 2024 19:07:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/remote-vpn-gateway-ike-intitiator-drop-on-palo-fw/m-p/617826#M122023</guid>
      <dc:creator>jmckinzie</dc:creator>
      <dc:date>2024-11-14T19:07:07Z</dc:date>
    </item>
    <item>
      <title>Re: Remote VPN gateway - IKE intitiator drop on Palo FW</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/remote-vpn-gateway-ike-intitiator-drop-on-palo-fw/m-p/618052#M122025</link>
      <description>&lt;P&gt;Forgot to add.. this is related to S2S VPN and not globalprotect ssl vpn.&lt;/P&gt;</description>
      <pubDate>Fri, 15 Nov 2024 06:13:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/remote-vpn-gateway-ike-intitiator-drop-on-palo-fw/m-p/618052#M122025</guid>
      <dc:creator>PA_nts</dc:creator>
      <dc:date>2024-11-15T06:13:08Z</dc:date>
    </item>
    <item>
      <title>Re: Remote VPN gateway - IKE intitiator drop on Palo FW</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/remote-vpn-gateway-ike-intitiator-drop-on-palo-fw/m-p/618078#M122026</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/306035"&gt;@PA_nts&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I suggest you to run a flow basic debuging:&amp;nbsp;&lt;A href="https://live.paloaltonetworks.com/t5/general-articles/tips-amp-tricks-flow-basic-debugging/ta-p/545999" target="_blank" rel="noopener"&gt;https://live.paloaltonetworks.com/t5/general-articles/tips-amp-tricks-flow-basic-debugging/ta-p/545999&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 15 Nov 2024 06:24:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/remote-vpn-gateway-ike-intitiator-drop-on-palo-fw/m-p/618078#M122026</guid>
      <dc:creator>CosminM</dc:creator>
      <dc:date>2024-11-15T06:24:25Z</dc:date>
    </item>
    <item>
      <title>Re: Remote VPN gateway - IKE intitiator drop on Palo FW</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/remote-vpn-gateway-ike-intitiator-drop-on-palo-fw/m-p/618125#M122027</link>
      <description>&lt;P&gt;In the packet capture if you are seeing the packets are captured on the drop stage.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;you can see the drop reasons using global counters. refer below kbs&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 10.0pt;" lang="en-US"&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000CloNCAS" target="_blank"&gt;&lt;SPAN&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000CloNCAS&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 10.0pt;" lang="en-US"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 10.0pt;" lang="en-US"&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClXOCA0" target="_blank"&gt;&lt;SPAN&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClXOCA0&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 15 Nov 2024 06:39:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/remote-vpn-gateway-ike-intitiator-drop-on-palo-fw/m-p/618125#M122027</guid>
      <dc:creator>Edsnow</dc:creator>
      <dc:date>2024-11-15T06:39:08Z</dc:date>
    </item>
    <item>
      <title>Re: Remote VPN gateway - IKE intitiator drop on Palo FW</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/remote-vpn-gateway-ike-intitiator-drop-on-palo-fw/m-p/618420#M122028</link>
      <description>&lt;P&gt;thanks for feedback.. issue fixed.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Did the global filters and found the following drop reason...&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;flow_policy_nat_land 1 0 drop flow session Session setup: source NAT IP allocation result in LAND attack&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Then looked at my NAT rules and found my DNAT to be misconfiguration.. ouch &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;it had src zone set to 'any' with source net 'any' to dst zone 'untrust' zone and hide nat behind egress interface IP..&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;changed the sources from any to stipulate my internal network zones and networks, did a commit and issue solved.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;cheers all!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 15 Nov 2024 08:47:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/remote-vpn-gateway-ike-intitiator-drop-on-palo-fw/m-p/618420#M122028</guid>
      <dc:creator>PA_nts</dc:creator>
      <dc:date>2024-11-15T08:47:39Z</dc:date>
    </item>
    <item>
      <title>Re: Remote VPN gateway - IKE intitiator drop on Palo FW</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/remote-vpn-gateway-ike-intitiator-drop-on-palo-fw/m-p/995818#M122282</link>
      <description>&lt;P&gt;Please accept as a solution if the reply resolve the issue.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 30 Nov 2024 16:36:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/remote-vpn-gateway-ike-intitiator-drop-on-palo-fw/m-p/995818#M122282</guid>
      <dc:creator>Edsnow</dc:creator>
      <dc:date>2024-11-30T16:36:27Z</dc:date>
    </item>
  </channel>
</rss>

