<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Avaya 9611G/4610SW VPN to PA-500 in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/avaya-9611g-4610sw-vpn-to-pa-500/m-p/44511#M32671</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I&amp;nbsp; did not quite get what you meant by"the phase 1 connection occurs using Global-protect Portal/Gateway". The errors that your are seeing are due to IPSEC tunnels and you can get rid of those errors by configuring Proxy IDS in the IPSEC tunnel configuration. Let me know if I am missing something.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 06 Nov 2012 20:14:54 GMT</pubDate>
    <dc:creator>sdurga</dc:creator>
    <dc:date>2012-11-06T20:14:54Z</dc:date>
    <item>
      <title>Avaya 9611G/4610SW VPN to PA-500</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/avaya-9611g-4610sw-vpn-to-pa-500/m-p/44510#M32670</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Has anyone had success connecting Avaya IP phones via VPN to PA devices?&amp;nbsp; I am able to complete IKE Phase 1 authentication, but fail Phase 2 due to local/remote proxy IDs not found:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; 'IKE phase-2 negotiation failed when processing proxy ID. cannot find matching phase-2 tunnel for received proxy ID. received local id: 192.168.50.0/24 type IPv4_subnet protocol 0 port 0, received remote id: 172.16.33.2/32 type IPv4_address protocol 0 port 0.' )&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm not sure where to configure the phase 2 parameters as the phase 1 connection occurs using a Global-Protect Portal/Gateway.&amp;nbsp; The remote ID matches the address received by the client from the G-P Gateway pool.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you have had any success with these devices, please help!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Steve&lt;/P&gt;&lt;P&gt;First Annapolis&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 06 Nov 2012 19:34:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/avaya-9611g-4610sw-vpn-to-pa-500/m-p/44510#M32670</guid>
      <dc:creator>itmanager</dc:creator>
      <dc:date>2012-11-06T19:34:16Z</dc:date>
    </item>
    <item>
      <title>Re: Avaya 9611G/4610SW VPN to PA-500</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/avaya-9611g-4610sw-vpn-to-pa-500/m-p/44511#M32671</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I&amp;nbsp; did not quite get what you meant by"the phase 1 connection occurs using Global-protect Portal/Gateway". The errors that your are seeing are due to IPSEC tunnels and you can get rid of those errors by configuring Proxy IDS in the IPSEC tunnel configuration. Let me know if I am missing something.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 06 Nov 2012 20:14:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/avaya-9611g-4610sw-vpn-to-pa-500/m-p/44511#M32671</guid>
      <dc:creator>sdurga</dc:creator>
      <dc:date>2012-11-06T20:14:54Z</dc:date>
    </item>
    <item>
      <title>Re: Avaya 9611G/4610SW VPN to PA-500</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/avaya-9611g-4610sw-vpn-to-pa-500/m-p/44512#M32672</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;IMG alt="GatewayPh1.jpg" class="jiveImage" src="https://live.paloaltonetworks.com/legacyfs/online/4707_GatewayPh1.jpg" style="width: 450px; height: 288px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Above is an image of our G-P gateway settings.&amp;nbsp; The Group Name = IKE ID for phase 1, Group Password = Pre-shared Key.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The G-P gateway with these settings is processing phase 1 authentication successfully.&amp;nbsp; I cannot setup an ipsec tunnel config associated with the G-P gateway as it is not recognized as an IKE gateway on the PA-500.&amp;nbsp; So my question is, what Phase 2 settings is the PA-500 looking for (DH Group, Encryption Algorithm, Authentication Algorithm), and where are they set?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hopefully that adds some clarity.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 06 Nov 2012 21:35:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/avaya-9611g-4610sw-vpn-to-pa-500/m-p/44512#M32672</guid>
      <dc:creator>itmanager</dc:creator>
      <dc:date>2012-11-06T21:35:31Z</dc:date>
    </item>
    <item>
      <title>Re: Avaya 9611G/4610SW VPN to PA-500</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/avaya-9611g-4610sw-vpn-to-pa-500/m-p/44513#M32673</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Currently Avaya's VPN client is not supported with Global protect yet, based on 'Section 10' of this document: &lt;A href="https://live.paloaltonetworks.com/docs/DOC-2568"&gt;Troubleshooting GlobalProtect, PAN-OS 4.1&lt;/A&gt;&lt;/P&gt;&lt;P&gt;You may try configuring an site-to-site IPsec tunnel for dynamic remote peer IP's to see if that helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Aditi&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Dec 2012 07:18:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/avaya-9611g-4610sw-vpn-to-pa-500/m-p/44513#M32673</guid>
      <dc:creator>apasupulati</dc:creator>
      <dc:date>2012-12-12T07:18:02Z</dc:date>
    </item>
    <item>
      <title>Re: Avaya 9611G/4610SW VPN to PA-500</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/avaya-9611g-4610sw-vpn-to-pa-500/m-p/44514#M32674</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Maybe I am using an older version of firmware than you but my GP Gateway configuration window doesn't show fields for Group Name and password. I am using &lt;SPAN style="color: #000000; font-family: Tahoma, Arial, Helvetica, sans-serif; font-size: 11px; background-color: #ffffff;"&gt;4.0.8&lt;/SPAN&gt;. Any ideas?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Dec 2012 18:01:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/avaya-9611g-4610sw-vpn-to-pa-500/m-p/44514#M32674</guid>
      <dc:creator>mario11584</dc:creator>
      <dc:date>2012-12-12T18:01:29Z</dc:date>
    </item>
    <item>
      <title>Re: Avaya 9611G/4610SW VPN to PA-500</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/avaya-9611g-4610sw-vpn-to-pa-500/m-p/44515#M32675</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I can't even get my Avaya 9602L unit to complete phase 1. I've configured the IKE ID as Group Name and the PSK as Group Password, but which VPN Vendor are you using, auth type, and IKE ID type?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 22 Apr 2013 23:08:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/avaya-9611g-4610sw-vpn-to-pa-500/m-p/44515#M32675</guid>
      <dc:creator>mario11584</dc:creator>
      <dc:date>2013-04-22T23:08:37Z</dc:date>
    </item>
    <item>
      <title>Re: Avaya 9611G/4610SW VPN to PA-500</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/avaya-9611g-4610sw-vpn-to-pa-500/m-p/44516#M32676</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;These are the settings we use in our 46xxsettings.txt file (see the Avaya config doc for code translations and note some values are set &lt;EM&gt;generic&lt;/EM&gt; as they cannot be shared publicly):&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;SET NVIKECONFIGMODE 1&lt;/P&gt;&lt;P&gt;SET NVIKEDHGRP 2&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;SET NVIKEID &lt;/SPAN&gt;&lt;EM&gt;&lt;A class="jive-link-email-small" href="mailto:name@domain.com"&gt;name@domain.com&lt;/A&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;SET NVIKEIDTYPE 11&lt;/P&gt;&lt;P&gt;SET NVIKEP1AUTHALG 2&lt;/P&gt;&lt;P&gt;SET NVIKEP1ENCALG 1&lt;/P&gt;&lt;P&gt;SET NVIKEP1LIFESEC 43200&lt;/P&gt;&lt;P&gt;SET NVIKEP2AUTHALG 2&lt;/P&gt;&lt;P&gt;SET NVIKEP2ENCALG 1&lt;/P&gt;&lt;P&gt;SET NVIKEP2LIFESEC 43200&lt;/P&gt;&lt;P&gt;SET NVIKEPSK psk&lt;/P&gt;&lt;P&gt;SET NVIKEEXCHGMODE 1&lt;/P&gt;&lt;P&gt;SET NVMCIPADD &lt;EM&gt;callserverip&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;SET NVPFSDHGRP 0&lt;/P&gt;&lt;P&gt;SET NVSGIP &lt;EM&gt;GPgatewayip&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;SET NVVPNAUTHTYPE 4&lt;/P&gt;&lt;P&gt;SET NVVPNMODE 1&lt;/P&gt;&lt;P&gt;SET NVVPNPSWDTYPE 1&lt;/P&gt;&lt;P&gt;SET NVVPNSVENDOR 4&lt;/P&gt;&lt;P&gt;SET NVVPNUSERTYPE 1&lt;/P&gt;&lt;P&gt;SET NVXAUTH 1&lt;/P&gt;&lt;P&gt;SET VPNPROC 2&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 23 Apr 2013 12:31:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/avaya-9611g-4610sw-vpn-to-pa-500/m-p/44516#M32676</guid>
      <dc:creator>itmanager</dc:creator>
      <dc:date>2013-04-23T12:31:54Z</dc:date>
    </item>
    <item>
      <title>Re: Avaya 9611G/4610SW VPN to PA-500</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/avaya-9611g-4610sw-vpn-to-pa-500/m-p/44517#M32677</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;To date have you been able to successfully connect?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My problem seems to be with the "SET NVIKEIDTYPE". The PA logs show a mismatch key ID when my Avaya phone tries to connect. Where is that configured on the phone and more importantly, within Global Protect? Is it possible? I know where in an IPsec tunnel.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It's kind of disappointing that phones that are so widely used like Avaya are not supported on these firewalls.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm hoping these posts and thoughts will help others successfully connect so the knowledge can be shared. &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://live.paloaltonetworks.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 Jun 2013 22:49:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/avaya-9611g-4610sw-vpn-to-pa-500/m-p/44517#M32677</guid>
      <dc:creator>mario11584</dc:creator>
      <dc:date>2013-06-11T22:49:47Z</dc:date>
    </item>
    <item>
      <title>Re: Avaya 9611G/4610SW VPN to PA-500</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/avaya-9611g-4610sw-vpn-to-pa-500/m-p/44518#M32678</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Did you ever try to change over to a Site-to-Site IPsec tunnel style config on the PA? I would think the Avaya might need to support X-Auth in order to be a "normal" IPSec client.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Try building an IKE Gateway and an IPSec tunnel on the PA, and configure Proxy-IDs as well.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have you seen this thread by the way?&lt;/P&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://live.paloaltonetworks.com/message/22530#22530" title="https://live.paloaltonetworks.com/message/22530"&gt;https://live.paloaltonetworks.com/message/21633&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Jun 2013 01:18:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/avaya-9611g-4610sw-vpn-to-pa-500/m-p/44518#M32678</guid>
      <dc:creator>ericgearhart</dc:creator>
      <dc:date>2013-06-12T01:18:42Z</dc:date>
    </item>
    <item>
      <title>Re: Avaya 9611G/4610SW VPN to PA-500</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/avaya-9611g-4610sw-vpn-to-pa-500/m-p/44519#M32679</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I've thought of doing this but building an IPSec tunnel for each remote user would be unmanageable. This is why we have been attempting to go the GlobalProtect route, but I'm losing hope that it will ever work. The firewall is trying to match a KeyID. The Avaya seems to be sending this KeyID to the PA and I think the PA isn't sure what to do with it. I don't configure a KeyID on my Mac when setting up a VPN or within the GlobalProtect software, so I think this is more of an issue with how Avaya manages the connectiong and not the Palo Alto.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 17 Jun 2013 21:16:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/avaya-9611g-4610sw-vpn-to-pa-500/m-p/44519#M32679</guid>
      <dc:creator>mario11584</dc:creator>
      <dc:date>2013-06-17T21:16:23Z</dc:date>
    </item>
    <item>
      <title>Re: Avaya 9611G/4610SW VPN to PA-500</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/avaya-9611g-4610sw-vpn-to-pa-500/m-p/44520#M32680</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We currently have 5 or 6 9611G models operating without issue.&amp;nbsp; What model are you working with?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On the phone itself, our settings of note are:&lt;/P&gt;&lt;P&gt;VPN Vendor is set to Other&lt;/P&gt;&lt;P&gt;Encapsulation is set to 4500-4500 (this caused issues if set otherwise)&lt;/P&gt;&lt;P&gt;IKE ID is KEY_ID&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We never had any success with the 4600 series IP phones, so if you are using these, you may be out of luck.&amp;nbsp; As long as you have the VPN version of the firmware on the 9600s, you can navigate the settings by pressing * to program and then VPN for the access code, or the default Avaya security code of 27238.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 18 Jun 2013 13:51:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/avaya-9611g-4610sw-vpn-to-pa-500/m-p/44520#M32680</guid>
      <dc:creator>itmanager</dc:creator>
      <dc:date>2013-06-18T13:51:48Z</dc:date>
    </item>
    <item>
      <title>Re: Avaya 9611G/4610SW VPN to PA-500</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/avaya-9611g-4610sw-vpn-to-pa-500/m-p/44521#M32681</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I got you, I was more or less suggesting that just to see if it'd work at all, I understand that's not really a palatable long term solution.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 18 Jun 2013 14:19:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/avaya-9611g-4610sw-vpn-to-pa-500/m-p/44521#M32681</guid>
      <dc:creator>ericgearhart</dc:creator>
      <dc:date>2013-06-18T14:19:56Z</dc:date>
    </item>
    <item>
      <title>Re: Avaya 9611G/4610SW VPN to PA-500</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/avaya-9611g-4610sw-vpn-to-pa-500/m-p/44522#M32682</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the response and the help. That's good to hear you have some working. I was beginning to think it wasn't possible. We are using the 9620L model. I changed the Encapsulation to 4500-4500 as you suggested. It wasn't previously set that way though. Didn't seem to do the trick unfortunately. The firewall shows me the error I have attached. I am not sure how to configure the KeyID in the PA's Global Protect configurations to match the phone. How did you handle that?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 18 Jun 2013 14:50:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/avaya-9611g-4610sw-vpn-to-pa-500/m-p/44522#M32682</guid>
      <dc:creator>mario11584</dc:creator>
      <dc:date>2013-06-18T14:50:48Z</dc:date>
    </item>
    <item>
      <title>Re: Avaya 9611G/4610SW VPN to PA-500</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/avaya-9611g-4610sw-vpn-to-pa-500/m-p/44523#M32683</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Well, I finally threw in the towel. After many days (probably more like weeks) of troubleshooting and testing we just decided to purchase a firewall from a different vendor. From firewall install to working phone was about 3 hours. Too bad I couldn't get this working on Palo Alto, that's one of the reasons we bought them. Thanks to those who offered help.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 03 Jul 2013 20:33:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/avaya-9611g-4610sw-vpn-to-pa-500/m-p/44523#M32683</guid>
      <dc:creator>mario11584</dc:creator>
      <dc:date>2013-07-03T20:33:39Z</dc:date>
    </item>
    <item>
      <title>Re: Avaya 9611G/4610SW VPN to PA-500</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/avaya-9611g-4610sw-vpn-to-pa-500/m-p/44524#M32684</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;Hi - did you try disabling "Skip Auth on IKE Rekey" under the Gateway --&amp;gt; Client Configuration --&amp;gt; Tunnel Settings&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 20 Dec 2013 03:23:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/avaya-9611g-4610sw-vpn-to-pa-500/m-p/44524#M32684</guid>
      <dc:creator>Retired Member</dc:creator>
      <dc:date>2013-12-20T03:23:15Z</dc:date>
    </item>
    <item>
      <title>Re: Avaya 9611G/4610SW VPN to PA-500</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/avaya-9611g-4610sw-vpn-to-pa-500/m-p/44525#M32685</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello, was there every any discussion about making GlobalProtect compatible with the Avaya phones. Just recently tried it with the settings discussed in the forums, but could not get past Phase 1.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 09 Jan 2015 19:10:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/avaya-9611g-4610sw-vpn-to-pa-500/m-p/44525#M32685</guid>
      <dc:creator>kashanakins</dc:creator>
      <dc:date>2015-01-09T19:10:59Z</dc:date>
    </item>
    <item>
      <title>Re: Avaya 9611G/4610SW VPN to PA-500</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/avaya-9611g-4610sw-vpn-to-pa-500/m-p/184757#M56626</link>
      <description>&lt;P&gt;In order to get the Avaya 96xx IP phones to connect to a GlobalProtect gateway, I found there are certain settings that need to be configured on the phone in order to make it work.&amp;nbsp; I spent about 3 days going through different configuration setups and what I found was that the phones will auto-negotiate the IKE Phase-1 parameters, but for some reason will not negotiate the Phase-2 parameters automatically.&amp;nbsp; The solution that worked for me was setting the following parameters in the 46xxsettings.txt file used to program the phones via http.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;SET NVVPNMODE 1&lt;/P&gt;&lt;P&gt;SET NVIKECONFIGMODE 1&lt;BR /&gt;SET NVIKEIDTYPE 11&lt;BR /&gt;SET NVIKEXCHGMODE 1&lt;/P&gt;&lt;P&gt;SET NVVPNAUTHTYPE 4&lt;/P&gt;&lt;P&gt;SET NVSGIP "vphone.yourdomain.com"&amp;nbsp; (I recommend using FQDN if possible.&amp;nbsp; Static IP can cause challenges later if ISP changes)&lt;/P&gt;&lt;P&gt;SET NVVPNPSWDTYPE 1&lt;/P&gt;&lt;P&gt;SET NVVPNENCAPS 0&lt;/P&gt;&lt;P&gt;SET NVIKEPSK "your-psk-password-here"&lt;/P&gt;&lt;P&gt;SET NVIKEID "vpnphone@yourdomain.com"&amp;nbsp; (This is also referred to as the Group Name)&lt;/P&gt;&lt;P&gt;SET NVIKEDHGRP 2&lt;/P&gt;&lt;P&gt;SET NVIKEP1ENCALG 0&lt;/P&gt;&lt;P&gt;SET NVIKEP1AUTHALG 0&lt;/P&gt;&lt;P&gt;SET NVIKEP2ENCALG 5&amp;nbsp; (manually sets Phase-2 IKE to aes-256)&lt;/P&gt;&lt;P&gt;SET NVIKEP2AUTHALG 2&amp;nbsp; (manually sets Phase-2 auth to SHA-1)&lt;/P&gt;&lt;P&gt;SET NVPFSDHGRP 0&amp;nbsp; (this is important - none of the P2 settings above would have any effect until PFS was disabled)&lt;/P&gt;&lt;P&gt;SET NVIKEP1LIFESEC 86400&amp;nbsp; (phone defaults to 432,000s, which is 5 days - I set here to 1 day or you can keep default)&lt;/P&gt;&lt;P&gt;SET NVIKEP2LIFESEC 86400&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This will work with the 96xx series of Avaya IP phones and I can provide additional details/notes in case anyone is looking to connect one over a VPN connection to a GlobalProtect gateway.&amp;nbsp; I had to migrate the configuration from a Juniper SSG firewall to Palo Alto PA-850 , which provided some challenges since there really is no Avaya documentation or support information available that discusses setting up a VPN phone on the Palo Alto platform.&amp;nbsp; Good Luck!!&lt;/P&gt;</description>
      <pubDate>Tue, 31 Oct 2017 15:18:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/avaya-9611g-4610sw-vpn-to-pa-500/m-p/184757#M56626</guid>
      <dc:creator>JBarbera-Medifast</dc:creator>
      <dc:date>2017-10-31T15:18:14Z</dc:date>
    </item>
    <item>
      <title>Re: Avaya 9611G/4610SW VPN to PA-500</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/avaya-9611g-4610sw-vpn-to-pa-500/m-p/315995#M81326</link>
      <description>&lt;P&gt;I was interested to read your post about connecting Avaya 96xx phones to a Global Protect Gateway ovewr VPN.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We are looking to do something similar and wondered if you could share your notes and in particular the configuration of the PA gateway?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Stuart&lt;/P&gt;</description>
      <pubDate>Thu, 12 Mar 2020 12:00:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/avaya-9611g-4610sw-vpn-to-pa-500/m-p/315995#M81326</guid>
      <dc:creator>Stuart_Walton</dc:creator>
      <dc:date>2020-03-12T12:00:52Z</dc:date>
    </item>
    <item>
      <title>Re: Avaya 9611G/4610SW VPN to PA-500</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/avaya-9611g-4610sw-vpn-to-pa-500/m-p/318487#M81761</link>
      <description>&lt;P&gt;Any information about this I am trying to do the VPN too&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 25 Mar 2020 13:13:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/avaya-9611g-4610sw-vpn-to-pa-500/m-p/318487#M81761</guid>
      <dc:creator>juanromero1</dc:creator>
      <dc:date>2020-03-25T13:13:13Z</dc:date>
    </item>
    <item>
      <title>Re: Avaya 9611G/4610SW VPN to PA-500</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/avaya-9611g-4610sw-vpn-to-pa-500/m-p/320119#M82017</link>
      <description>&lt;P&gt;Sure.&amp;nbsp; Here are some screenshots from my gateway configuration if that helps.&amp;nbsp; Don't forget you will need rules to allow traffic between zones and you will also need an internal route pointing to the Palo Alto firewall for whatever IP pool you assign that will issue IPs to the phones.&amp;nbsp;&lt;/P&gt;&lt;P&gt;For the interface, I have a public IP assigned to the loopback interface but you could also use your gateway interface, whatever is easier.&amp;nbsp; I have a block of IPs I use outside of the main gateway interface, which is why I am using loopback.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Avaya-GP-gateway1.jpg" style="width: 622px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/24838i05C7C17A84DDAA0B/image-dimensions/622x146/is-moderation-mode/true?v=v2" width="622" height="146" role="button" title="Avaya-GP-gateway1.jpg" alt="Avaya-GP-gateway1.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;For the authentication page, you can select an existing or create an SSL/TLS Service Profile.&amp;nbsp; For client authentication, you will want to set the OS type to X-Auth as shown here.&amp;nbsp; The next screenshot shows the Client Authentication settings.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Avaya-GP-gateway2.jpg" style="width: 733px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/24839i4A4B95563413B120/image-dimensions/733x346/is-moderation-mode/true?v=v2" width="733" height="346" role="button" title="Avaya-GP-gateway2.jpg" alt="Avaya-GP-gateway2.jpg" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Avaya-GP-gateway3.jpg" style="width: 738px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/24840iDF1934CAD3A50DCB/image-dimensions/738x434/is-moderation-mode/true?v=v2" width="738" height="434" role="button" title="Avaya-GP-gateway3.jpg" alt="Avaya-GP-gateway3.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For the GlobalProtect Agent tab, you'll select a tunnel interface, enable IPSec, enable X-Auth support and set the Group Name parameters as shown.&amp;nbsp; This is what will need to match in the Avaya configuration I detailed in my post above.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Avaya-GP-gateway4.jpg" style="width: 704px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/24841i18BC37654431AC67/image-dimensions/704x298/is-moderation-mode/true?v=v2" width="704" height="298" role="button" title="Avaya-GP-gateway4.jpg" alt="Avaya-GP-gateway4.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Next click on the Client Settings tab and setup the IP Pool you will assign to the phones.&amp;nbsp; You'll also need to split-tunnel your internal routes for the Avaya phone system and other user VoIP subnets.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Avaya-GP-gateway5.jpg" style="width: 709px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/24842i87692062F9F215C9/image-dimensions/709x334/is-moderation-mode/true?v=v2" width="709" height="334" role="button" title="Avaya-GP-gateway5.jpg" alt="Avaya-GP-gateway5.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm not 100% sure these settings are required unless you are doing FQDN for the Avaya system.&amp;nbsp; Our Telecom team has everything going to host IPs so we really don't use any DNS on the phones.&amp;nbsp; I just included for reference.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Avaya-GP-gateway6.jpg" style="width: 706px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/24843iA6EE11FFF5BA9D3C/image-dimensions/706x236/is-moderation-mode/true?v=v2" width="706" height="236" role="button" title="Avaya-GP-gateway6.jpg" alt="Avaya-GP-gateway6.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;That's really all there is to it really.&amp;nbsp; I setup a completely separate GP gateway just for the phones and I have all of my regular VPN users connecting on a different gateway but I also have a pool of public IPs to pull from where as that may not be an option.&lt;/P&gt;</description>
      <pubDate>Wed, 01 Apr 2020 21:05:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/avaya-9611g-4610sw-vpn-to-pa-500/m-p/320119#M82017</guid>
      <dc:creator>JBarbera-Medifast</dc:creator>
      <dc:date>2020-04-01T21:05:41Z</dc:date>
    </item>
  </channel>
</rss>

