<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ike policy in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ike-policy/m-p/25500#M18598</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Infotech,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You may configure Max 3 IKE-crypto profile on PAN and at least one should be matched with CISCO.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 01 Aug 2014 16:00:43 GMT</pubDate>
    <dc:creator>HULK</dc:creator>
    <dc:date>2014-08-01T16:00:43Z</dc:date>
    <item>
      <title>ike policy</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ike-policy/m-p/25495#M18593</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What part of the configuration on the PA matching what is called the ike policy on the Cisco?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 01 Aug 2014 14:04:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ike-policy/m-p/25495#M18593</guid>
      <dc:creator>infotech</dc:creator>
      <dc:date>2014-08-01T14:04:11Z</dc:date>
    </item>
    <item>
      <title>Re: ike policy</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ike-policy/m-p/25496#M18594</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Infotech,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It can be configured on following location. Let me know if you have further questions.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="IKE.PNG" class="image-0 jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/14801_IKE.PNG" style="height: 323px; width: 620px;" /&gt;&lt;/P&gt;&lt;P&gt;Regard,&lt;/P&gt;&lt;P&gt;Hardik Shah&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 01 Aug 2014 14:30:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ike-policy/m-p/25496#M18594</guid>
      <dc:creator>hshah</dc:creator>
      <dc:date>2014-08-01T14:30:30Z</dc:date>
    </item>
    <item>
      <title>Re: ike policy</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ike-policy/m-p/25497#M18595</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Infotech,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ike policy defines different security parameter you are using for your IKE profile. On PAN &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;firewall it's&lt;/SPAN&gt; IKE-crypto.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="ike-profile-1.jpg" class="image-1 jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/14803_ike-profile-1.jpg" style="height: 286px; width: 620px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Once, you will configure the IKE profile, then as a second step, you need to configure &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;a&lt;/SPAN&gt; IKE-gateway. It &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;will included&lt;/SPAN&gt; local IP, peer IP, exit interface, preshared key, Peer ID type etc.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="ike-gateway..jpg" class="jive-image image-2" src="https://live.paloaltonetworks.com/legacyfs/online/14804_ike-gateway..jpg" style="height: auto;" /&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 01 Aug 2014 14:52:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ike-policy/m-p/25497#M18595</guid>
      <dc:creator>HULK</dc:creator>
      <dc:date>2014-08-01T14:52:48Z</dc:date>
    </item>
    <item>
      <title>Re: ike policy</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ike-policy/m-p/25498#M18596</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;There seem to be more than one policy on the ike policies on the cisco how do I know which one matches the PA?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 01 Aug 2014 15:55:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ike-policy/m-p/25498#M18596</guid>
      <dc:creator>infotech</dc:creator>
      <dc:date>2014-08-01T15:55:51Z</dc:date>
    </item>
    <item>
      <title>Re: ike policy</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ike-policy/m-p/25499#M18597</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Infotech,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;During the phase 1 negotiation, both gateways will exchange their IKE-crypto details and the common profile would be chosen for &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;tunnel&lt;/SPAN&gt;.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 01 Aug 2014 15:58:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ike-policy/m-p/25499#M18597</guid>
      <dc:creator>HULK</dc:creator>
      <dc:date>2014-08-01T15:58:56Z</dc:date>
    </item>
    <item>
      <title>Re: ike policy</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ike-policy/m-p/25500#M18598</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Infotech,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You may configure Max 3 IKE-crypto profile on PAN and at least one should be matched with CISCO.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 01 Aug 2014 16:00:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ike-policy/m-p/25500#M18598</guid>
      <dc:creator>HULK</dc:creator>
      <dc:date>2014-08-01T16:00:43Z</dc:date>
    </item>
    <item>
      <title>Re: ike policy</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ike-policy/m-p/25501#M18599</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Unless there is des setup on the cisco and it doesn't appear to be available on the PA.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 01 Aug 2014 16:04:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ike-policy/m-p/25501#M18599</guid>
      <dc:creator>infotech</dc:creator>
      <dc:date>2014-08-01T16:04:19Z</dc:date>
    </item>
    <item>
      <title>Re: ike policy</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ike-policy/m-p/25502#M18600</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Infotech,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;DES is not secure, we only support 3DES and above protocols.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Hardik Shah&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 01 Aug 2014 16:22:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ike-policy/m-p/25502#M18600</guid>
      <dc:creator>hshah</dc:creator>
      <dc:date>2014-08-01T16:22:22Z</dc:date>
    </item>
    <item>
      <title>Re: ike policy</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ike-policy/m-p/25503#M18601</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I understand that but the cisco is old and I think it may have that option still trying to figure out what ike policy and priorities are and how they relate to the PA&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 01 Aug 2014 16:26:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ike-policy/m-p/25503#M18601</guid>
      <dc:creator>infotech</dc:creator>
      <dc:date>2014-08-01T16:26:02Z</dc:date>
    </item>
    <item>
      <title>Re: ike policy</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ike-policy/m-p/25504#M18602</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;PAN firewall supports bellow mentioned encryption technology for IPsec Phase 1 negotiation:&lt;/P&gt;&lt;P&gt;&lt;IMG alt="encryption-tech.jpg" class="image-0 jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/14805_encryption-tech.jpg" style="height: auto;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 01 Aug 2014 16:27:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ike-policy/m-p/25504#M18602</guid>
      <dc:creator>HULK</dc:creator>
      <dc:date>2014-08-01T16:27:31Z</dc:date>
    </item>
    <item>
      <title>Re: ike policy</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ike-policy/m-p/25505#M18603</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Are you saying that aes128 is compatible with des?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 01 Aug 2014 16:35:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ike-policy/m-p/25505#M18603</guid>
      <dc:creator>infotech</dc:creator>
      <dc:date>2014-08-01T16:35:29Z</dc:date>
    </item>
    <item>
      <title>Re: ike policy</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ike-policy/m-p/25506#M18604</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No, &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;i&lt;/SPAN&gt; mean to say, you have following option to choose for IKE-encryption. It should be identical on both gateways &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;( &lt;/SPAN&gt;PAN---- Cisco).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 01 Aug 2014 16:38:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ike-policy/m-p/25506#M18604</guid>
      <dc:creator>HULK</dc:creator>
      <dc:date>2014-08-01T16:38:32Z</dc:date>
    </item>
    <item>
      <title>Re: ike policy</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ike-policy/m-p/25507#M18605</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Unless you want to set the PA to does and that option is not available&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 01 Aug 2014 16:44:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ike-policy/m-p/25507#M18605</guid>
      <dc:creator>infotech</dc:creator>
      <dc:date>2014-08-01T16:44:35Z</dc:date>
    </item>
    <item>
      <title>Re: ike policy</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ike-policy/m-p/25508#M18606</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Since PAN does not support DES, you need to change CISCO IKE-crypto policy accordingly.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 01 Aug 2014 16:54:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ike-policy/m-p/25508#M18606</guid>
      <dc:creator>HULK</dc:creator>
      <dc:date>2014-08-01T16:54:40Z</dc:date>
    </item>
    <item>
      <title>Re: ike policy</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ike-policy/m-p/25509#M18607</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yeah there is one part I the cisco side I am trying to verify. The ike policies look like they match but there is something called ike policy priority and I am not 100% sure how to verify that&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 01 Aug 2014 16:56:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ike-policy/m-p/25509#M18607</guid>
      <dc:creator>infotech</dc:creator>
      <dc:date>2014-08-01T16:56:31Z</dc:date>
    </item>
    <item>
      <title>Re: ike policy</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ike-policy/m-p/25510#M18608</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;As per my understanding, It's only relevant if you have multiple IKE policies. The lowest numbered one is checked first. If it matches the IKE properties (policies) on the other end, it's used. Otherwise, it moves down the priority list to see if the other policies match.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Related Cisco &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;Disciussion&lt;/SPAN&gt;: &lt;A href="https://supportforums.cisco.com/discussion/11254861/question-related-ike-policy-priority" title="https://supportforums.cisco.com/discussion/11254861/question-related-ike-policy-priority"&gt;https://supportforums.cisco.com/discussion/11254861/question-related-ike-policy-priority&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 01 Aug 2014 17:17:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ike-policy/m-p/25510#M18608</guid>
      <dc:creator>HULK</dc:creator>
      <dc:date>2014-08-01T17:17:57Z</dc:date>
    </item>
    <item>
      <title>Re: ike policy</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ike-policy/m-p/25511#M18609</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yeah there are 3 or 4 ike policies with different priorities&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 01 Aug 2014 17:22:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ike-policy/m-p/25511#M18609</guid>
      <dc:creator>infotech</dc:creator>
      <dc:date>2014-08-01T17:22:58Z</dc:date>
    </item>
    <item>
      <title>Re: ike policy</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ike-policy/m-p/25512#M18610</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;For the tunnel to form, both devices must agree on at least one ike policy. You can specify multiple ike policies, or crypto settings, and as long as both devices have at least one match, they will use that match to form the tunnel. The priorities on the Cisco side allow you to specify which policies you want the Cisco device to try using first - if the other side's policy matches then great - otherwise move down to the next policy based on priority. It is simply a way to show preference for a specific policy.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For example, it allows you to always use 3des if the other side supports it, and if not, then negotiate AES128, etc...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With PA, in the IKE Crypto profile, you can specify multiple options for DH group, authentication, and encryption. By doing so, you are telling the PA to utilize any combination of the settings specified to form the tunnel. As long as the peer device has a policy that matches one of those combinations, the devices will use that match and the tunnel will form.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 01 Aug 2014 19:32:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ike-policy/m-p/25512#M18610</guid>
      <dc:creator>jtyler</dc:creator>
      <dc:date>2014-08-01T19:32:11Z</dc:date>
    </item>
    <item>
      <title>Re: ike policy</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ike-policy/m-p/25513#M18611</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Mostly its the cisco side that I am having problem figuring out, it looks as thought everything matches and the tunnel comes up for an extended period of time and then drops until the cisco initiates a new tunnel&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 01 Aug 2014 19:45:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ike-policy/m-p/25513#M18611</guid>
      <dc:creator>infotech</dc:creator>
      <dc:date>2014-08-01T19:45:14Z</dc:date>
    </item>
    <item>
      <title>Re: ike policy</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ike-policy/m-p/25514#M18612</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It sounds like you are hitting phase 2 lifetime and tunnel drops due to lack of traffic across the tunnel. PANOS defaults to 1 hour for ipsec-sa 2 lifetime. Have you checked with Cisco to see what is their ipsec SA lifetime?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Based on your last comment, seems that tunnel is functioning as expected. You may want to also check with Cisco to see if they have a way to keep their tunnels always up.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 01 Aug 2014 22:47:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ike-policy/m-p/25514#M18612</guid>
      <dc:creator>Retired Member</dc:creator>
      <dc:date>2014-08-01T22:47:15Z</dc:date>
    </item>
  </channel>
</rss>

