<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: IPSEC VPN with Cisco ISR in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-with-cisco-isr/m-p/36668#M26963</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Brandon&lt;/P&gt;&lt;P&gt;There are no special tricks for the Phase 1 to come up, only for Phase2- If you are not using VTI interfaces on the cisco router, i.e route based VPN, you must configure proxy-ids on the PAN device. Can you also look at the phase1 logs on the cisco side? "&lt;STRONG&gt;debug crypto isakmp" ?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Thx&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Jerish&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 23 May 2011 22:07:38 GMT</pubDate>
    <dc:creator>jpa</dc:creator>
    <dc:date>2011-05-23T22:07:38Z</dc:date>
    <item>
      <title>IPSEC VPN with Cisco ISR</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-with-cisco-isr/m-p/36667#M26962</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm trying to set up a site-to-site VPN tunnel with an outside company from a PA-4050 on our side to a Cisco 3925 ISR.&amp;nbsp; We can't can't get phase 1 to come up, though we're confident that the relevant settings (PSK, encryption, etc..) match up.&amp;nbsp; We've tried different encryption settings, but the connection just times out on both ends.&amp;nbsp; Before I go too crazy with it, I'm wondering if anyone has any experience going from a PA to a Cisco ISR, and if there is a trick, or if they just don't work together.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for any insight you might have.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Brandon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 23 May 2011 20:20:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-with-cisco-isr/m-p/36667#M26962</guid>
      <dc:creator>bowings</dc:creator>
      <dc:date>2011-05-23T20:20:54Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC VPN with Cisco ISR</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-with-cisco-isr/m-p/36668#M26963</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Brandon&lt;/P&gt;&lt;P&gt;There are no special tricks for the Phase 1 to come up, only for Phase2- If you are not using VTI interfaces on the cisco router, i.e route based VPN, you must configure proxy-ids on the PAN device. Can you also look at the phase1 logs on the cisco side? "&lt;STRONG&gt;debug crypto isakmp" ?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Thx&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Jerish&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 23 May 2011 22:07:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-with-cisco-isr/m-p/36668#M26963</guid>
      <dc:creator>jpa</dc:creator>
      <dc:date>2011-05-23T22:07:38Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC VPN with Cisco ISR</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-with-cisco-isr/m-p/36669#M26964</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That's as I figured, but I thought I'd ask.&amp;nbsp; This is a policy-based VPN, so I do have the proxy IDs configured.&amp;nbsp; But as you say, that should only affect phase 2.&amp;nbsp; I don't have access to the Cisco, but it's a good idea to ask them to run "debug crypto isakmp".&amp;nbsp; Chances are we're just mismatched on something.&amp;nbsp; Because we're in different time zones I wanted to make sure I wasn't running into an incompatibility before we spend a lot of time on the phone digging too much into the configs.&amp;nbsp; Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 23 May 2011 22:15:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-with-cisco-isr/m-p/36669#M26964</guid>
      <dc:creator>bowings</dc:creator>
      <dc:date>2011-05-23T22:15:53Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC VPN with Cisco ISR</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-with-cisco-isr/m-p/36670#M26965</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You can also look at the system logs on PAN side with subtype of "VPN". Check for any Phase1 errors. Most the of the meaningful error messages will be on the IPSec responder side&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 23 May 2011 22:43:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-with-cisco-isr/m-p/36670#M26965</guid>
      <dc:creator>jpa</dc:creator>
      <dc:date>2011-05-23T22:43:28Z</dc:date>
    </item>
  </channel>
</rss>

