<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Tunnel in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/tunnel/m-p/28689#M20927</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;MTU where do you set that on PA and Cisco?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 20 Jun 2014 19:34:38 GMT</pubDate>
    <dc:creator>infotech</dc:creator>
    <dc:date>2014-06-20T19:34:38Z</dc:date>
    <item>
      <title>Tunnel</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/tunnel/m-p/28667#M20905</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have a vpn tunnel that works fine most of the time and then is just goes down for no reason any suggestion&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 18 Jun 2014 15:13:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/tunnel/m-p/28667#M20905</guid>
      <dc:creator>infotech</dc:creator>
      <dc:date>2014-06-18T15:13:40Z</dc:date>
    </item>
    <item>
      <title>Re: Tunnel</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/tunnel/m-p/28668#M20906</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Infotech,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there any continuous traffic flowing through that IPsec tunnel..? Or did you identify a &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;pattern i.e&lt;/SPAN&gt; after every 8 Hrs or 24 Hrs the tunnel is going down.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 18 Jun 2014 15:30:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/tunnel/m-p/28668#M20906</guid>
      <dc:creator>HULK</dc:creator>
      <dc:date>2014-06-18T15:30:42Z</dc:date>
    </item>
    <item>
      <title>Re: Tunnel</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/tunnel/m-p/28669#M20907</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;there isn't continuous traffic flowing down the tunnel. I haven't identifiy a specific pattern but it does seem to go down int he afternoon and is up again the next morning. I would be so concerned but none of the other tunnels configured similiar configuration and traffic &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 18 Jun 2014 15:45:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/tunnel/m-p/28669#M20907</guid>
      <dc:creator>infotech</dc:creator>
      <dc:date>2014-06-18T15:45:57Z</dc:date>
    </item>
    <item>
      <title>Re: Tunnel</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/tunnel/m-p/28670#M20908</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;When there is no traffic traversing the tunnel, the tunnel will go down after it times out.&lt;/P&gt;&lt;P&gt;You can select an arbitrary private /30 network, and configure the IP addresses to the Tunnel Interfaces at the end of both tunnels.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Example:&lt;/P&gt;&lt;P&gt;172.16.0.0/30&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;IP on Tunnel Interface Endpoint A:&lt;/P&gt;&lt;P&gt;172.16.0.1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;IP on Tunnel Interface Endpoint Z&lt;/P&gt;&lt;P&gt;172.16.0.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If one of the two endpoints is the tunnel initiator, go to that endpoint. Select (Network&amp;gt; IPSec Tunnels: &amp;lt;Your Tunnel&amp;gt;)&lt;/P&gt;&lt;P&gt;(If the initiator was "Endpoint A" in our example...)&lt;/P&gt;&lt;P&gt;Once opened, mark the checkbox for "Tunnel Monitor". Enter the IP address of Endpoint Z. You can leave the Profile on None.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This will cause ICMP packets to be sent every few seconds, thus maintaining the tunnel up at all times.&lt;/P&gt;&lt;P&gt;You don't need to configure Tunnel Monitor at both ends, unless you need it. In some cases configuring it at both ends can cause the tunnel to flap.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 19 Jun 2014 00:44:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/tunnel/m-p/28670#M20908</guid>
      <dc:creator>mivaldi</dc:creator>
      <dc:date>2014-06-19T00:44:18Z</dc:date>
    </item>
    <item>
      <title>Re: Tunnel</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/tunnel/m-p/28671#M20909</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;But shouldn't I be able to bring it back up by doing a test and shouldn't the other used tunnels with the same configuration do the same thing?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 19 Jun 2014 12:53:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/tunnel/m-p/28671#M20909</guid>
      <dc:creator>infotech</dc:creator>
      <dc:date>2014-06-19T12:53:58Z</dc:date>
    </item>
    <item>
      <title>Re: Tunnel</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/tunnel/m-p/28672#M20910</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;They should do the same thing, unless a single packet traverses the tunnel before the tunnel times out, thereby keeping the tunnel alive.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 19 Jun 2014 15:44:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/tunnel/m-p/28672#M20910</guid>
      <dc:creator>mivaldi</dc:creator>
      <dc:date>2014-06-19T15:44:17Z</dc:date>
    </item>
    <item>
      <title>Re: Tunnel</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/tunnel/m-p/28673#M20911</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I've had this problem before too. I worked through this doc (&lt;A href="https://live.paloaltonetworks.com/docs/DOC-1323"&gt;Dead Peer Detection and Tunnel Monitoring&lt;/A&gt;) and it seemed to help. Tunnel monitoring will use pings over the tunnel to monitor the other side. The ping traffic will keep the tunnel up.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 19 Jun 2014 15:53:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/tunnel/m-p/28673#M20911</guid>
      <dc:creator>mario11584</dc:creator>
      <dc:date>2014-06-19T15:53:29Z</dc:date>
    </item>
    <item>
      <title>Re: Tunnel</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/tunnel/m-p/28674#M20912</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So shouldn't I be able to bring the tunnel back up by doing a test?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 19 Jun 2014 15:53:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/tunnel/m-p/28674#M20912</guid>
      <dc:creator>infotech</dc:creator>
      <dc:date>2014-06-19T15:53:34Z</dc:date>
    </item>
    <item>
      <title>Re: Tunnel</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/tunnel/m-p/28675#M20913</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I will take a look at the document, Its just odd that is up until the afternoon goes down and then is back up the next morning. The other tunnels are configured the same an they don't do this. I was also trying to bring the tunnel back up by running a test and that didn't work either&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 19 Jun 2014 15:56:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/tunnel/m-p/28675#M20913</guid>
      <dc:creator>infotech</dc:creator>
      <dc:date>2014-06-19T15:56:34Z</dc:date>
    </item>
    <item>
      <title>Re: Tunnel</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/tunnel/m-p/28676#M20914</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I understand the frustration. I had the exact same problem. It was only occurring on one tunnel and not the others. Its like the others are saying, the tunnel is "dying" because there isn't any traffic traversing it so it times out. Why it can't renegotiate after the timeout and come back up is beyond me. The cure is to keep it from dying and tunnel monitoring should resolve that. It will need to rekey once in a while but that should be transparent and nobody should notice any interruption in the tunnel. Also, if phase 1 is going down, but phase 2 is up...your traffic should still be able to cross the tunnel. Phase 1 sets up the agreements needed for phase 2. Phase 2 is used to determine encryption parameters for bulk data encryption. Phase 2 is the important phase, although phase 2 doesn't exist without phase 1. I hope this helps a little.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 19 Jun 2014 16:04:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/tunnel/m-p/28676#M20914</guid>
      <dc:creator>mario11584</dc:creator>
      <dc:date>2014-06-19T16:04:51Z</dc:date>
    </item>
    <item>
      <title>Re: Tunnel</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/tunnel/m-p/28677#M20915</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Exactly Mario&lt;/P&gt;&lt;P&gt;On the other side is a cisco firewall and when it is not working it give me the an SA error and I have no idea why because I didn't change anything.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 19 Jun 2014 16:10:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/tunnel/m-p/28677#M20915</guid>
      <dc:creator>infotech</dc:creator>
      <dc:date>2014-06-19T16:10:22Z</dc:date>
    </item>
    <item>
      <title>Re: Tunnel</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/tunnel/m-p/28678#M20916</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If the initiator is the Palo Alto Networks firewall, you can bring the tunnel up with a test from the CLI like:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;gt; test vpn ike-sa gateway &amp;lt;gateway_name&amp;gt;&amp;nbsp; (will bring Phase 1 up) &lt;/P&gt;&lt;P&gt;&amp;gt; test vpn ipsec-sa tunnel &amp;lt;tunnel_name&amp;gt; (will bring Phase 2 up)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 19 Jun 2014 16:16:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/tunnel/m-p/28678#M20916</guid>
      <dc:creator>mivaldi</dc:creator>
      <dc:date>2014-06-19T16:16:19Z</dc:date>
    </item>
    <item>
      <title>Re: Tunnel</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/tunnel/m-p/28679#M20917</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes that what I was trying to do and it did not come up, I think mario hit it on the nail with the SA's&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 19 Jun 2014 16:25:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/tunnel/m-p/28679#M20917</guid>
      <dc:creator>infotech</dc:creator>
      <dc:date>2014-06-19T16:25:41Z</dc:date>
    </item>
    <item>
      <title>Re: Tunnel</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/tunnel/m-p/28680#M20918</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here is what I am seeing when the tunnel is up&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Parkway_IPSec_Tunnel5:DR_Networkactive&lt;/P&gt;&lt;P&gt;id 139&lt;BR /&gt;tunnel&amp;nbsp; Parkway_IPSec_Tunnel5:DR_Network&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; id:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 139&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; type:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; IPSec&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; gateway id:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 5&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; local ip:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 66.94.196.107&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; peer ip:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 66.94.196.108&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; inner interface:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; tunnel.5&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; outer interface:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ethernet1/3&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; state:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; active&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; session:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 184664&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; tunnel mtu:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1428&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; lifetime remain:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 20799 sec&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; latest rekey:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 8001 seconds ago&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; monitor:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; off&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; monitor packets seen:&amp;nbsp;&amp;nbsp; 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; monitor packets reply:&amp;nbsp; 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; en/decap context:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 100&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; local spi:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; B1874737&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; remote spi:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; CB7EC37F&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; key type:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; auto key&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; protocol:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ESP&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; auth algorithm:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; SHA1&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; enc&amp;nbsp; algorithm:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; AES256&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; proxy-id local ip:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.135.100.0/24&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; proxy-id remote ip:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 10.135.11.0/25&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; proxy-id protocol:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; proxy-id local port:&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; proxy-id remote port:&amp;nbsp;&amp;nbsp; 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; anti replay check:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; yes&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; copy tos:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; no&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; authentication errors:&amp;nbsp; 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; decryption errors:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; inner packet warnings:&amp;nbsp; 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; replay packets:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; packets received&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; when lifetime expired:0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; when lifesize expired:0&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; sending sequence:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 212815&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; receive sequence:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 200841&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 20 Jun 2014 13:38:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/tunnel/m-p/28680#M20918</guid>
      <dc:creator>infotech</dc:creator>
      <dc:date>2014-06-20T13:38:02Z</dc:date>
    </item>
    <item>
      <title>Re: Tunnel</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/tunnel/m-p/28681#M20919</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You said you're connecting the PA to an ASA? I would only recommend this for troubleshooting, but have you tried aggressive mode? When I used to work with ASAs, once upon a time, I found that different vendors didn't play well with ASAs (or vice versa, however you choose to look at it). I had to use aggressive mode. Which I don't recommend btw because they are less secure because plain text is used and reveals data about the endpoints. I'd say it's worth a shot though to see if that stabilizes the tunnel. Just a thought. Do you have other tunnels connecting to ASAs or just this one?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 20 Jun 2014 15:02:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/tunnel/m-p/28681#M20919</guid>
      <dc:creator>mario11584</dc:creator>
      <dc:date>2014-06-20T15:02:24Z</dc:date>
    </item>
    <item>
      <title>Re: Tunnel</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/tunnel/m-p/28682#M20920</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Correct the other tunnels I have are also connectingfrom PA to ASA 5505 and using main mode. I have not used aggressive mode for the reason you just stated. It appears to be a very regular pattern of going off in the afternoon and back on the next day.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 20 Jun 2014 15:05:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/tunnel/m-p/28682#M20920</guid>
      <dc:creator>infotech</dc:creator>
      <dc:date>2014-06-20T15:05:57Z</dc:date>
    </item>
    <item>
      <title>Re: Tunnel</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/tunnel/m-p/28683#M20921</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What do the PA logs show during this time. Can you tell from the logs who is disconnecting or dropping the tunnel?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 20 Jun 2014 15:10:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/tunnel/m-p/28683#M20921</guid>
      <dc:creator>mario11584</dc:creator>
      <dc:date>2014-06-20T15:10:16Z</dc:date>
    </item>
    <item>
      <title>Re: Tunnel</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/tunnel/m-p/28684#M20922</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have been trying to search for the time when it actually dropped but I havent; found it yet. Is there a way on the PA to determine who dropped the traffic?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 20 Jun 2014 15:15:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/tunnel/m-p/28684#M20922</guid>
      <dc:creator>infotech</dc:creator>
      <dc:date>2014-06-20T15:15:09Z</dc:date>
    </item>
    <item>
      <title>Re: Tunnel</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/tunnel/m-p/28685#M20923</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Under system logs, search using the filter "( subtype eq vpn )". I'm not sure what event you would be searching for but this should be a good start. Using this filter and searching during the time it goes down should help you find what you are looking for. Good luck!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 20 Jun 2014 15:41:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/tunnel/m-p/28685#M20923</guid>
      <dc:creator>mario11584</dc:creator>
      <dc:date>2014-06-20T15:41:49Z</dc:date>
    </item>
    <item>
      <title>Re: Tunnel</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/tunnel/m-p/28686#M20924</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I think this is when it is succeeding&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; and ( description contains 'IKE phase-2 negotiation is succeeded as responder, quick mode. Established SA: 66.94.196.107[500]-66.94.196.108[500] message id:0x1D8ADE40, SPI:0xB1874737/0xCB7EC37F.' )&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 20 Jun 2014 16:02:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/tunnel/m-p/28686#M20924</guid>
      <dc:creator>infotech</dc:creator>
      <dc:date>2014-06-20T16:02:48Z</dc:date>
    </item>
  </channel>
</rss>

