<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: IPSec VPN Issue in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-issue/m-p/42284#M31073</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;mikand wrote:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you have a pre-conf and post-conf to compare on what the differences are?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In case the upgrade changes vpn tunnels to loopback interfaces instead of physical interfaces or something like that?&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;well, i had a look on the config before and after and i see quite some differences in the config ouput. I don't know if this is relevant but the information in the config is the same, but the order in which this is configured is different. I have attached a textfile where you can see the diffences.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 30 Apr 2012 11:58:41 GMT</pubDate>
    <dc:creator>tobias</dc:creator>
    <dc:date>2012-04-30T11:58:41Z</dc:date>
    <item>
      <title>IPSec VPN Issue</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-issue/m-p/42279#M31068</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;on a PA 2020 running 4.1.0 is a VPN Gateway configured. A client PA 500 running 4.1.0 with dynamic WAN IP is configured as peer. Both devices can reach each other. In system log is a succesfull phase 1 and phase 2 and a succesfull ipsec connection. After that, a IPSec SA delete message appears and the IPSec key will be deleted. From this time the connection starts again with phase 2.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does anyone have any ideas?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards from Germany&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Robert&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;(newest log entries first)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;TABLE border="0" cellpadding="0" cellspacing="0" width="1081"&gt;&lt;COLGROUP&gt;&lt;COL style="width: 811pt;" width="1081" /&gt; &lt;/COLGROUP&gt; &lt;TBODY&gt;&lt;TR style="height: 12.75pt;"&gt;&lt;TD height="17" style="height: 12.75pt; width: 811pt;" width="1081"&gt;IPSec key&amp;nbsp;&amp;nbsp; deleted. Deleted SA: 217.68.167.208[500]-212.122.61.23[500]&amp;nbsp;&amp;nbsp; SPI:0xBF6E041B/0xCCA91B0D.&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 12.75pt;"&gt;&lt;TD height="17" style="height: 12.75pt;"&gt;IKE protocol IPSec SA delete message&amp;nbsp;&amp;nbsp; sent to peer. SPI:0xBF6E041B.&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 12.75pt;"&gt;&lt;TD height="17" style="height: 12.75pt;"&gt;IPSec key installed. Installed SA:&amp;nbsp;&amp;nbsp; 217.68.167.208[500]-212.122.61.23[500] SPI:0x993E8A98/0xB4BA9B3F lifetime&amp;nbsp;&amp;nbsp; 3600 Sec lifesize unlimited.&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 12.75pt;"&gt;&lt;TD height="17" style="height: 12.75pt;"&gt;IKE phase-2 negotiation is succeeded as&amp;nbsp;&amp;nbsp; initiator, quick mode. Established SA: 217.68.167.208[500]-212.122.61.23[500]&amp;nbsp;&amp;nbsp; message id:0x3C2F0929, SPI:0x993E8A98/0xB4BA9B3F.&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 12.75pt;"&gt;&lt;TD height="17" style="height: 12.75pt;"&gt;IKE phase-2 negotiation is started as&amp;nbsp;&amp;nbsp; initiator, quick mode. Initiated SA: 217.68.167.208[500]-212.122.61.23[500]&amp;nbsp;&amp;nbsp; message id:0x3C2F0929.&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 12.75pt;"&gt;&lt;TD height="17" style="height: 12.75pt;"&gt;IPSec key deleted. Deleted SA:&amp;nbsp;&amp;nbsp; 217.68.167.208[500]-212.122.61.23[500] SPI:0xF09CB8C7/0xFDD307C5.&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 12.75pt;"&gt;&lt;TD height="17" style="height: 12.75pt;"&gt;IKE protocol IPSec SA delete message&amp;nbsp;&amp;nbsp; sent to peer. SPI:0xF09CB8C7.&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 12.75pt;"&gt;&lt;TD height="17" style="height: 12.75pt;"&gt;IPSec key installed. Installed SA:&amp;nbsp;&amp;nbsp; 217.68.167.208[500]-212.122.61.23[500] SPI:0xBF6E041B/0xCCA91B0D lifetime&amp;nbsp;&amp;nbsp; 3600 Sec lifesize unlimited.&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 12.75pt;"&gt;&lt;TD height="17" style="height: 12.75pt;"&gt;IKE phase-2 negotiation is succeeded as&amp;nbsp;&amp;nbsp; initiator, quick mode. Established SA: 217.68.167.208[500]-212.122.61.23[500]&amp;nbsp;&amp;nbsp; message id:0x921F14E7, SPI:0xBF6E041B/0xCCA91B0D.&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 12.75pt;"&gt;&lt;TD height="17" style="height: 12.75pt;"&gt;IKE phase-2 negotiation is started as&amp;nbsp;&amp;nbsp; initiator, quick mode. Initiated SA: 217.68.167.208[500]-212.122.61.23[500]&amp;nbsp;&amp;nbsp; message id:0x921F14E7.&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 12.75pt;"&gt;&lt;TD height="17" style="height: 12.75pt;"&gt;IPSec key deleted. Deleted SA:&amp;nbsp;&amp;nbsp; 217.68.167.208[500]-212.122.61.23[500] SPI:0xE56D34C4/0xBC5294AA.&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 12.75pt;"&gt;&lt;TD height="17" style="height: 12.75pt;"&gt;IKE protocol IPSec SA delete message&amp;nbsp;&amp;nbsp; sent to peer. SPI:0xE56D34C4.&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 12.75pt;"&gt;&lt;TD height="17" style="height: 12.75pt;"&gt;IPSec key installed. Installed SA:&amp;nbsp;&amp;nbsp; 217.68.167.208[500]-212.122.61.23[500] SPI:0xF09CB8C7/0xFDD307C5 lifetime&amp;nbsp;&amp;nbsp; 3600 Sec lifesize unlimited.&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 12.75pt;"&gt;&lt;TD height="17" style="height: 12.75pt;"&gt;IKE phase-2 negotiation is succeeded as&amp;nbsp;&amp;nbsp; initiator, quick mode. Established SA: 217.68.167.208[500]-212.122.61.23[500]&amp;nbsp;&amp;nbsp; message id:0x593A6173, SPI:0xF09CB8C7/0xFDD307C5.&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 12.75pt;"&gt;&lt;TD height="17" style="height: 12.75pt;"&gt;IKE phase-2 negotiation is started as&amp;nbsp;&amp;nbsp; initiator, quick mode. Initiated SA: 217.68.167.208[500]-212.122.61.23[500]&amp;nbsp;&amp;nbsp; message id:0x593A6173.&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Dec 2011 13:48:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-issue/m-p/42279#M31068</guid>
      <dc:creator>Retired Member</dc:creator>
      <dc:date>2011-12-16T13:48:30Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec VPN Issue</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-issue/m-p/42280#M31069</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;do you have a Monitor configured too? I tough I read something about a problem with ipsec and monitors.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 19 Dec 2011 11:13:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-issue/m-p/42280#M31069</guid>
      <dc:creator>gsteiner</dc:creator>
      <dc:date>2011-12-19T11:13:49Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec VPN Issue</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-issue/m-p/42281#M31070</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Robert,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;does your problem still exist? Do you have a solution?&lt;/P&gt;&lt;P&gt;I have the same problem with a vpn tunnel to/from a AVM Fritzbox 7330. The problem only occur when the tunnel monitor is active.&lt;/P&gt;&lt;P&gt;Our PA2050 is running software version 4.1.3 .&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any ideas or solutions????&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kind regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sascha&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Mar 2012 12:51:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-issue/m-p/42281#M31070</guid>
      <dc:creator>Retired Member</dc:creator>
      <dc:date>2012-03-02T12:51:31Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec VPN Issue</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-issue/m-p/42282#M31071</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i had excactly the same Problem today morning. Since the VPN setup wasn't productive yet i decided to delete the complete ipsec and ike setup for the vpns having this problem, before opening a case with Palo Alto Networks. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That did the trick. The vpns are now stable. My assumption is that this had to do with the upgrade from 4.0.5 to 4.1.3, because the vpns where created before the upgrade and every vpn i created after the upgrade also work fine. The Problem did not affect every vpn. Out of about 30 vpns only two where affected. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps sombody &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://live.paloaltonetworks.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 Apr 2012 08:36:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-issue/m-p/42282#M31071</guid>
      <dc:creator>tobias</dc:creator>
      <dc:date>2012-04-27T08:36:37Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec VPN Issue</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-issue/m-p/42283#M31072</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Do you have a pre-conf and post-conf to compare on what the differences are?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In case the upgrade changes vpn tunnels to loopback interfaces instead of physical interfaces or something like that?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 28 Apr 2012 11:22:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-issue/m-p/42283#M31072</guid>
      <dc:creator>mikand</dc:creator>
      <dc:date>2012-04-28T11:22:16Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec VPN Issue</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-issue/m-p/42284#M31073</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;mikand wrote:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you have a pre-conf and post-conf to compare on what the differences are?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In case the upgrade changes vpn tunnels to loopback interfaces instead of physical interfaces or something like that?&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;well, i had a look on the config before and after and i see quite some differences in the config ouput. I don't know if this is relevant but the information in the config is the same, but the order in which this is configured is different. I have attached a textfile where you can see the diffences.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 30 Apr 2012 11:58:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-issue/m-p/42284#M31073</guid>
      <dc:creator>tobias</dc:creator>
      <dc:date>2012-04-30T11:58:41Z</dc:date>
    </item>
  </channel>
</rss>

