<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: IPSec-ESP No matching record in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-esp-no-matching-record/m-p/33923#M24883</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Session type "TUNN" indicates an IPSec tunnel session. As soon as you will configure a VPN tunnel, the PAN firewall will assume a tunnel session for that address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 26 Aug 2014 23:01:53 GMT</pubDate>
    <dc:creator>HULK</dc:creator>
    <dc:date>2014-08-26T23:01:53Z</dc:date>
    <item>
      <title>IPSec-ESP No matching record</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-esp-no-matching-record/m-p/33911#M24871</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The last few weeks I have noticed a large amount of traffic on the Network Monitor coming from IPSec-ESP.&amp;nbsp; I moved several VPN tunnels off our old WatchGuard to our Palo Alto PA-3020 around the time this started.&amp;nbsp; When I click on the application itself to filter it I see that it cannot identify anything about the traffic.&amp;nbsp; Is this normal?&amp;nbsp; Shouldn't it at least be able to identify the source or destination of the traffic?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="ipsec.png" class="image-0 jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/15111_ipsec.png" style="height: 412px; width: 620px;" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Aug 2014 20:54:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-esp-no-matching-record/m-p/33911#M24871</guid>
      <dc:creator>ClintL</dc:creator>
      <dc:date>2014-08-26T20:54:30Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec-ESP No matching record</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-esp-no-matching-record/m-p/33912#M24872</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Clint,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ESP traffic is encrypted, hence, you would not be able to see the content of the packet. There might be an another possibility, if users are &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;conneting&lt;/SPAN&gt;&lt;/SPAN&gt; through any VPN client, in that case also, &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;firewall&lt;/SPAN&gt;&lt;/SPAN&gt; will identify as ESP traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Aug 2014 21:04:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-esp-no-matching-record/m-p/33912#M24872</guid>
      <dc:creator>HULK</dc:creator>
      <dc:date>2014-08-26T21:04:52Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec-ESP No matching record</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-esp-no-matching-record/m-p/33913#M24873</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey Hulk,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yeah that's what I figured but it just seems weird it can't even tell where it's coming from.&amp;nbsp; No VPN clients in this case.&amp;nbsp; Just regular VPN tunnels.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Aug 2014 21:07:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-esp-no-matching-record/m-p/33913#M24873</guid>
      <dc:creator>ClintL</dc:creator>
      <dc:date>2014-08-26T21:07:38Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec-ESP No matching record</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-esp-no-matching-record/m-p/33914#M24874</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Clint,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To get source and destination information of traffic, go to Monitor &amp;gt; Traffic &amp;gt; Type application "&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;IPSec-ESP&lt;/SPAN&gt;". You will find number of logs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You will have to take Educated guess to find out origin of the traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If Origin of the traffic is your own firewall, than dont worry its intended IPsec Traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If not than there should be something behind the firewall, try to locate IP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Hardik Shah&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Aug 2014 21:11:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-esp-no-matching-record/m-p/33914#M24874</guid>
      <dc:creator>hshah</dc:creator>
      <dc:date>2014-08-26T21:11:52Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec-ESP No matching record</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-esp-no-matching-record/m-p/33915#M24875</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Clint, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You are correct. The ACC report will not show the traffic details &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;i.e&lt;/SPAN&gt; source, destination etc. As HArdik said, you can filter traffic in Logs to get &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;details&lt;/SPAN&gt; information.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;FYI:&lt;/P&gt;&lt;P&gt;&lt;IMG alt="ipsec-esp.jpg" class="image-0 jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/15125_ipsec-esp.jpg" style="height: 148px; width: 620px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Aug 2014 21:20:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-esp-no-matching-record/m-p/33915#M24875</guid>
      <dc:creator>HULK</dc:creator>
      <dc:date>2014-08-26T21:20:36Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec-ESP No matching record</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-esp-no-matching-record/m-p/33916#M24876</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That's the thing is I see absolutely nothing with that application type that matches today's traffic and nothing in the amount I am seeing.&amp;nbsp; The latest entry filtering by that app is six days ago.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="15126" alt="ipsec2.png" class="image-0 jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/15126_ipsec2.png" style="height: 165px; width: 620px;" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Aug 2014 21:29:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-esp-no-matching-record/m-p/33916#M24876</guid>
      <dc:creator>ClintL</dc:creator>
      <dc:date>2014-08-26T21:29:18Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec-ESP No matching record</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-esp-no-matching-record/m-p/33917#M24877</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Clint.leatherman,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What version of PAN-OS are you running?&lt;/P&gt;&lt;P&gt;Are the VPN tunnel interfaces in a separate zone or part of your untrust zone?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;David&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Aug 2014 22:10:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-esp-no-matching-record/m-p/33917#M24877</guid>
      <dc:creator>dmaynard</dc:creator>
      <dc:date>2014-08-26T22:10:26Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec-ESP No matching record</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-esp-no-matching-record/m-p/33918#M24878</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey David,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We are running 6.0.3 and the tunnel interfaces are in their own zone.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Aug 2014 22:13:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-esp-no-matching-record/m-p/33918#M24878</guid>
      <dc:creator>ClintL</dc:creator>
      <dc:date>2014-08-26T22:13:58Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec-ESP No matching record</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-esp-no-matching-record/m-p/33919#M24879</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Clint,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there any active session present on this PAN FW..? You may apply below mentioned CLI command:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;gt; &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;show&lt;/SPAN&gt; session all filter &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;protocol&lt;/SPAN&gt; 50&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ACC will give you the live session information, where traffic log will give you session information at the start or end.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Aug 2014 22:21:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-esp-no-matching-record/m-p/33919#M24879</guid>
      <dc:creator>HULK</dc:creator>
      <dc:date>2014-08-26T22:21:49Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec-ESP No matching record</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-esp-no-matching-record/m-p/33920#M24880</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes I see about ten entries.&amp;nbsp; If I filter the traffic monitor by the VPN zone I can see traffic destined for the different proxy-IDs.&amp;nbsp; I only see that large amount of traffic classified as IPSec-ESP 2-3 times per day, sometimes early in the morning when no one is here.&amp;nbsp; I have a feeling it is some backup job running on our SQL databases to a remote site but I just want to be sure.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="ipsec3.png" class="image-1 jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/15138_ipsec3.png" style="height: 215px; width: 620px;" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Aug 2014 22:53:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-esp-no-matching-record/m-p/33920#M24880</guid>
      <dc:creator>ClintL</dc:creator>
      <dc:date>2014-08-26T22:53:30Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec-ESP No matching record</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-esp-no-matching-record/m-p/33921#M24881</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hulk is correct where the ACC will show you active sessions information and the traffic log will only show traffic information based on security rule log at start or end(default)?&lt;/P&gt;&lt;P&gt;So you would not see logs in traffic till session ends(tunnel goes down).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Following document explains better what you are seeing.&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/docs/DOC-3318"&gt;ACC Data is not in Sync with Traffic Logs&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;To determine what source/destination is causing traffic would need to look at ACC with source/destination zone for VPN at times you are seeing spike in traffic. &lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;Regards,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;David&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Aug 2014 22:57:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-esp-no-matching-record/m-p/33921#M24881</guid>
      <dc:creator>dmaynard</dc:creator>
      <dc:date>2014-08-26T22:57:17Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec-ESP No matching record</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-esp-no-matching-record/m-p/33922#M24882</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Clint,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you see the session type, it is "TUNN". So, this is not the FLOW session, which actually passes traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Aug 2014 22:58:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-esp-no-matching-record/m-p/33922#M24882</guid>
      <dc:creator>HULK</dc:creator>
      <dc:date>2014-08-26T22:58:43Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec-ESP No matching record</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-esp-no-matching-record/m-p/33923#M24883</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Session type "TUNN" indicates an IPSec tunnel session. As soon as you will configure a VPN tunnel, the PAN firewall will assume a tunnel session for that address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Aug 2014 23:01:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-esp-no-matching-record/m-p/33923#M24883</guid>
      <dc:creator>HULK</dc:creator>
      <dc:date>2014-08-26T23:01:53Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec-ESP No matching record</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-esp-no-matching-record/m-p/33924#M24884</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks guys.&amp;nbsp; This clarifies a lot.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One more question.&amp;nbsp; When you say the tunnel going down to see the traffic do you mean completely down or does the Palo count the rekey as the tunnel going down even though it is just a moment or two?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Aug 2014 23:04:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-esp-no-matching-record/m-p/33924#M24884</guid>
      <dc:creator>ClintL</dc:creator>
      <dc:date>2014-08-26T23:04:27Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec-ESP No matching record</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-esp-no-matching-record/m-p/33925#M24885</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;While it will be completely down. &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;Rekey&lt;/SPAN&gt; is a part of the IPSec algorithm, hence it would not be considered for session end &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;( &lt;/SPAN&gt;according to my understanding&lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://live.paloaltonetworks.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&amp;nbsp; )&lt;/SPAN&gt;.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Aug 2014 23:24:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-esp-no-matching-record/m-p/33925#M24885</guid>
      <dc:creator>HULK</dc:creator>
      <dc:date>2014-08-26T23:24:18Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec-ESP No matching record</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-esp-no-matching-record/m-p/33926#M24886</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Clint,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rekey takes hardly couple of second, which will not turn down IPsec Session. Hence its not considered to be tunnel down.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tunnel down means firewall has Network or Transport layer issues to reach peer or no interesting traffic for long time.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;&lt;P&gt;Hardik Shah&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Aug 2014 23:26:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-esp-no-matching-record/m-p/33926#M24886</guid>
      <dc:creator>hshah</dc:creator>
      <dc:date>2014-08-26T23:26:55Z</dc:date>
    </item>
  </channel>
</rss>

