<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic VPN Encryption/Authentication key's for Wireshark Decryption in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-encryption-authentication-key-s-for-wireshark-decryption/m-p/35142#M25816</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It is possible to debug ESP packet's in Wireshark but to do so I will need to obtain the encryption key and the authentication key for the given VPN from my Palo Alto 5050. As an example - In Linux it's possible to get this information by running the command 'ip xfrm state':&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;gw205:/ # ip xfrm state&lt;/P&gt;&lt;P&gt;src 192.168.140.200 dst 192.168.140.205&lt;/P&gt;&lt;P&gt;&amp;nbsp; proto esp spi 0x0879355b reqid 16421 mode tunnel&lt;/P&gt;&lt;P&gt;&amp;nbsp; replay-window 32 flag noecn nopmtudisc af-unspec&lt;/P&gt;&lt;P&gt; &lt;SPAN style="color: #ff0000;"&gt; auth hmac(sha1) 0xb8dd42a1c505bed19c2bf23cef00e5d8223c2a5b&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;&amp;nbsp; enc cbc(des3_ede) 0xae76ea430b10c72c882c4aeab2283444c54f913d87f5e109&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;src 192.168.140.205 dst 192.168.140.200&lt;/P&gt;&lt;P&gt;&amp;nbsp; proto esp spi 0x1c0d7b38 reqid 16421 mode tunnel&lt;/P&gt;&lt;P&gt;&amp;nbsp; replay-window 32 flag noecn nopmtudisc af-unspec&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;&amp;nbsp; auth hmac(sha1) 0xc364660133b04a4f20e52000dbe4a6ba154c09c1&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;&amp;nbsp; enc cbc(des3_ede) 0x39e87c9ca500616b36f2f0d3c7fb688621d7bbf31414abbd&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does anyone know how can I obtain this information from my Palo Alto 5050? I have tried all of the show vpn / ike-sa / ipsec-sa commands but none of them show me what I need.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For reference, here is a link to the Wireshark guide that I have been using:&lt;/P&gt;&lt;P&gt;&lt;A href="http://ask.wireshark.org/questions/12019/how-can-i-decrypt-ikev1-andor-esp-packets" title="http://ask.wireshark.org/questions/12019/how-can-i-decrypt-ikev1-andor-esp-packets"&gt;How can I decrypt IKEv1 and/or ESP packets ? - Wireshark Q&amp;amp;A&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;James.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 04 Apr 2014 09:21:26 GMT</pubDate>
    <dc:creator>debsPal0</dc:creator>
    <dc:date>2014-04-04T09:21:26Z</dc:date>
    <item>
      <title>VPN Encryption/Authentication key's for Wireshark Decryption</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-encryption-authentication-key-s-for-wireshark-decryption/m-p/35142#M25816</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It is possible to debug ESP packet's in Wireshark but to do so I will need to obtain the encryption key and the authentication key for the given VPN from my Palo Alto 5050. As an example - In Linux it's possible to get this information by running the command 'ip xfrm state':&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;gw205:/ # ip xfrm state&lt;/P&gt;&lt;P&gt;src 192.168.140.200 dst 192.168.140.205&lt;/P&gt;&lt;P&gt;&amp;nbsp; proto esp spi 0x0879355b reqid 16421 mode tunnel&lt;/P&gt;&lt;P&gt;&amp;nbsp; replay-window 32 flag noecn nopmtudisc af-unspec&lt;/P&gt;&lt;P&gt; &lt;SPAN style="color: #ff0000;"&gt; auth hmac(sha1) 0xb8dd42a1c505bed19c2bf23cef00e5d8223c2a5b&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;&amp;nbsp; enc cbc(des3_ede) 0xae76ea430b10c72c882c4aeab2283444c54f913d87f5e109&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;src 192.168.140.205 dst 192.168.140.200&lt;/P&gt;&lt;P&gt;&amp;nbsp; proto esp spi 0x1c0d7b38 reqid 16421 mode tunnel&lt;/P&gt;&lt;P&gt;&amp;nbsp; replay-window 32 flag noecn nopmtudisc af-unspec&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;&amp;nbsp; auth hmac(sha1) 0xc364660133b04a4f20e52000dbe4a6ba154c09c1&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #ff0000;"&gt;&amp;nbsp; enc cbc(des3_ede) 0x39e87c9ca500616b36f2f0d3c7fb688621d7bbf31414abbd&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does anyone know how can I obtain this information from my Palo Alto 5050? I have tried all of the show vpn / ike-sa / ipsec-sa commands but none of them show me what I need.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For reference, here is a link to the Wireshark guide that I have been using:&lt;/P&gt;&lt;P&gt;&lt;A href="http://ask.wireshark.org/questions/12019/how-can-i-decrypt-ikev1-andor-esp-packets" title="http://ask.wireshark.org/questions/12019/how-can-i-decrypt-ikev1-andor-esp-packets"&gt;How can I decrypt IKEv1 and/or ESP packets ? - Wireshark Q&amp;amp;A&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;James.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 04 Apr 2014 09:21:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-encryption-authentication-key-s-for-wireshark-decryption/m-p/35142#M25816</guid>
      <dc:creator>debsPal0</dc:creator>
      <dc:date>2014-04-04T09:21:26Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Encryption/Authentication key's for Wireshark Decryption</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-encryption-authentication-key-s-for-wireshark-decryption/m-p/35143#M25817</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can anyone help with this one?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 10 Apr 2014 12:31:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-encryption-authentication-key-s-for-wireshark-decryption/m-p/35143#M25817</guid>
      <dc:creator>debsPal0</dc:creator>
      <dc:date>2014-04-10T12:31:01Z</dc:date>
    </item>
  </channel>
</rss>

