<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Getting crazy with Ipsec-tunnel in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/getting-crazy-with-ipsec-tunnel/m-p/33880#M24847</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello everyone,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i'm trying a couple of days to establish an IPsec-tunnel to my amazon VPC with our PA-500.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can do what ever i want the tunnel will not get up. The log file said:&lt;/P&gt;&lt;P&gt;2011-10-31 14:11:06 [DEBUG]: ikev1.c:1427:isakmp_ph1resend(): resend phase1 packet 3a1053711a202504:0000000000000000&lt;BR /&gt;2011-10-31 14:11:27 [PROTO_NOTIFY]: ikev1.c:2168:log_ph1negofailed(): ====&amp;gt; PHASE-1 NEGOTIATION FAILED AS INITIATOR, MAIN MODE &amp;lt;====&lt;BR /&gt;====&amp;gt; Failed SA: 82.xx.xx.xx[500]-87.xx.xx.xx[500] cookie:3a1053711a202504:0000000000000000 &amp;lt;==== Due to timeout.&lt;BR /&gt;2011-10-31 14:11:27 [INFO]: ikev1.c:2216:log_ph1deleted(): ====&amp;gt; PHASE-1 SA DELETED &amp;lt;====&lt;BR /&gt;====&amp;gt; Deleted SA: 82.xx.xx.xx[500]-87.xx.xx.xx[500] cookie:3a1053711a202504:0000000000000000i &amp;lt;====&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could anyone help me or send me a valid example configuration for Amazon VPC.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in Advance&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 31 Oct 2011 13:22:53 GMT</pubDate>
    <dc:creator>clinit_owner</dc:creator>
    <dc:date>2011-10-31T13:22:53Z</dc:date>
    <item>
      <title>Getting crazy with Ipsec-tunnel</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/getting-crazy-with-ipsec-tunnel/m-p/33880#M24847</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello everyone,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i'm trying a couple of days to establish an IPsec-tunnel to my amazon VPC with our PA-500.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can do what ever i want the tunnel will not get up. The log file said:&lt;/P&gt;&lt;P&gt;2011-10-31 14:11:06 [DEBUG]: ikev1.c:1427:isakmp_ph1resend(): resend phase1 packet 3a1053711a202504:0000000000000000&lt;BR /&gt;2011-10-31 14:11:27 [PROTO_NOTIFY]: ikev1.c:2168:log_ph1negofailed(): ====&amp;gt; PHASE-1 NEGOTIATION FAILED AS INITIATOR, MAIN MODE &amp;lt;====&lt;BR /&gt;====&amp;gt; Failed SA: 82.xx.xx.xx[500]-87.xx.xx.xx[500] cookie:3a1053711a202504:0000000000000000 &amp;lt;==== Due to timeout.&lt;BR /&gt;2011-10-31 14:11:27 [INFO]: ikev1.c:2216:log_ph1deleted(): ====&amp;gt; PHASE-1 SA DELETED &amp;lt;====&lt;BR /&gt;====&amp;gt; Deleted SA: 82.xx.xx.xx[500]-87.xx.xx.xx[500] cookie:3a1053711a202504:0000000000000000i &amp;lt;====&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could anyone help me or send me a valid example configuration for Amazon VPC.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in Advance&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 31 Oct 2011 13:22:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/getting-crazy-with-ipsec-tunnel/m-p/33880#M24847</guid>
      <dc:creator>clinit_owner</dc:creator>
      <dc:date>2011-10-31T13:22:53Z</dc:date>
    </item>
    <item>
      <title>Re: Getting crazy with Ipsec-tunnel</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/getting-crazy-with-ipsec-tunnel/m-p/33881#M24848</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Checked if your security policy is blocking port 500.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 31 Oct 2011 14:25:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/getting-crazy-with-ipsec-tunnel/m-p/33881#M24848</guid>
      <dc:creator>friento</dc:creator>
      <dc:date>2011-10-31T14:25:58Z</dc:date>
    </item>
    <item>
      <title>Re: Getting crazy with Ipsec-tunnel</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/getting-crazy-with-ipsec-tunnel/m-p/33882#M24849</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If you have an explicit deny rule in your rulebase, you will need an explicit allow rule for untrust zone to untrust zone for ike and ipsec application. Otherwise, to get more verbose details in your syslog, have the remote peer initiate the traffic as your current syslog output is not descriptive enough to give us insight to your issue. Otherwise, share your ike/ipsec crypto for both PAN and remote peer to get you more assistance&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Renato&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 31 Oct 2011 14:29:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/getting-crazy-with-ipsec-tunnel/m-p/33882#M24849</guid>
      <dc:creator>gswcowboy</dc:creator>
      <dc:date>2011-10-31T14:29:04Z</dc:date>
    </item>
    <item>
      <title>Re: Getting crazy with Ipsec-tunnel</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/getting-crazy-with-ipsec-tunnel/m-p/33883#M24850</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;the security policy is not blocking the port.&lt;/P&gt;&lt;P&gt;if i ping the ec2 instance the paloalto want to&lt;/P&gt;&lt;P&gt;establish the connecting, but always get the timeout failure.&lt;/P&gt;&lt;P&gt;Bad luck for me if nobody have a sample conf.... &lt;img id="smileysad" class="emoticon emoticon-smileysad" src="https://live.paloaltonetworks.com/i/smilies/16x16_smiley-sad.png" alt="Smiley Sad" title="Smiley Sad" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 02 Nov 2011 13:07:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/getting-crazy-with-ipsec-tunnel/m-p/33883#M24850</guid>
      <dc:creator>clinit_owner</dc:creator>
      <dc:date>2011-11-02T13:07:36Z</dc:date>
    </item>
    <item>
      <title>Re: Getting crazy with Ipsec-tunnel</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/getting-crazy-with-ipsec-tunnel/m-p/33884#M24851</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I would revisit ike config as it looks like you are failing on p1. If all else fail open ticket to support, they can help you.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 02 Nov 2011 14:03:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/getting-crazy-with-ipsec-tunnel/m-p/33884#M24851</guid>
      <dc:creator>friento</dc:creator>
      <dc:date>2011-11-02T14:03:29Z</dc:date>
    </item>
    <item>
      <title>Re: Getting crazy with Ipsec-tunnel</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/getting-crazy-with-ipsec-tunnel/m-p/33885#M24852</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It would behoove you to have the remote peer initiate the traffic so that you can get more precise information from the syslogs as to why phase 1 is failing. It's all about matching phase1/phase2 crypto maps and at this point, we don't have much to go on. Otherwise, please open a case with Support so we can provide further assistance.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 02 Nov 2011 14:09:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/getting-crazy-with-ipsec-tunnel/m-p/33885#M24852</guid>
      <dc:creator>gswcowboy</dc:creator>
      <dc:date>2011-11-02T14:09:22Z</dc:date>
    </item>
  </channel>
</rss>

