<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: VPN strange behaviour in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-strange-behaviour/m-p/44843#M32923</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi COS,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I´ve also seen such frozen ike and ipsec sessions sometimes, but only with older PANOS version (most of the time 4.1.x versions). No obvious reason for this issue...you can open a TAC case, but this is imo only helpful if you are able to run several cli commands (show session id .... for the frozen session, show vpn ....,&amp;nbsp; tech-support-file) while the session is in this frozen state.&lt;/P&gt;&lt;P&gt;However there is no obvious bug-ID in the current release notes 5.0.11 regarding this particular behavior I would suggest an update to one of the latest 5.0.x versions (5.0.10 is at this time very stable in my opinion).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best regards,&lt;/P&gt;&lt;P&gt;Ulrich&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 31 Mar 2014 12:59:56 GMT</pubDate>
    <dc:creator>indup089</dc:creator>
    <dc:date>2014-03-31T12:59:56Z</dc:date>
    <item>
      <title>VPN strange behaviour</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-strange-behaviour/m-p/44836#M32916</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have&amp;nbsp; configured a VPN between JUNIPER SSG550 and PA-3020 (5.0.5) but this VPN is not going up. Yesterday I was configuring this VPN almost 4 hours until finally vpn went up &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://live.paloaltonetworks.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt; but i checked this morning the vpn state and its down again and nobody has changed the config ...weird.... I have checked the VPN config and i have created the VPN again and the VPN is not going up now &lt;img id="smileysad" class="emoticon emoticon-smileysad" src="https://live.paloaltonetworks.com/i/smilies/16x16_smiley-sad.png" alt="Smiley Sad" title="Smiley Sad" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;====&amp;gt; Initiated SA: 126.51.38.50[500]-85.111.55.10[500] cookie:39e59d4fd22fc29a:0000000000000000 &amp;lt;====&lt;/P&gt;&lt;P&gt;2014-03-07 12:40:33 [PROTO_NOTIFY]: ====&amp;gt; PHASE-1 NEGOTIATION FAILED AS INITIATOR, MAIN MODE &amp;lt;====&lt;/P&gt;&lt;P&gt;====&amp;gt; Failed SA: 126.51.38.50[500]-85.111.55.10[500] cookie:39e59d4fd22fc29a:0000000000000000 &amp;lt;==== Due to timeout.&lt;/P&gt;&lt;P&gt;2014-03-07 12:40:33 [INFO]: ====&amp;gt; PHASE-1 SA DELETED &amp;lt;====&lt;/P&gt;&lt;P&gt;====&amp;gt; Deleted SA: 126.57.38.50[500]-85.111.55.10[500] cookie:39e59d4fd22fc29a:0000000000000000 &amp;lt;====&lt;/P&gt;&lt;P&gt;2014-03-07 12:40:36 [INFO]: IPsec-SA request for 85.238.28.10 queued since no phase1 found&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;2014-03-07 12:40:36 [PROTO_NOTIFY]: ====&amp;gt; PHASE-1 NEGOTIATION STARTED AS INITIATOR, MAIN MODE &amp;lt;====&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;====&amp;gt; Initiated SA: 126.57.38.50[500]-85.111.55.10[500] cookie:2fa8ed99f184af97:0000000000000000 &amp;lt;====&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;2014-03-07 12:41:28 [PROTO_NOTIFY]: ====&amp;gt; PHASE-1 NEGOTIATION FAILED AS INITIATOR, MAIN MODE &amp;lt;====&lt;/P&gt;&lt;P&gt;====&amp;gt; Failed SA: 126.57.38.50[500]-85.111.55.10[500] cookie:2fa8ed99f184af97:0000000000000000 &amp;lt;==== Due to timeout.&lt;/P&gt;&lt;P&gt;2014-03-07 12:41:28 [INFO]: ====&amp;gt; PHASE-1 SA DELETED &amp;lt;====&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have similiar VPN configured between this juniper and PA and its working with the same config.......&lt;/P&gt;&lt;P&gt;it seems like phase1 is up but i cant see the green light in NETWORK-IPSEC TUNNELS&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any advice?????&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 07 Mar 2014 12:47:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-strange-behaviour/m-p/44836#M32916</guid>
      <dc:creator>SOC_CSG</dc:creator>
      <dc:date>2014-03-07T12:47:07Z</dc:date>
    </item>
    <item>
      <title>Re: VPN strange behaviour</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-strange-behaviour/m-p/44837#M32917</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello COS,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From the above mentioned logs, it's looking like IPSec phase-1 started as an initiator, but the second packet didn't receive by the PAN firewall. Out of total 6 messages for PHASE-1 &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;( &lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;main mode), the 2nd message should be received from the responder with" responder cookies".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The PAN firewall will wait for a particular time for that&amp;nbsp; " message-2 with responder cookie", if not, then it will delete the Security-Association keys (SA).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hence there could be multiple reason behind this failure:&lt;/P&gt;&lt;P&gt;1. Could you please verify if both firewalls are having an &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;untrust&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;-to-&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;untrust&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt; security policy to allow IKE.&lt;/P&gt;&lt;P&gt;2. Verify if the same packet has been received by the Juniper-FW also and tried sending Message-2.&lt;/P&gt;&lt;P&gt;3. Run &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;below&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt; mentioned CLI command:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; background: white;"&gt;&lt;SPAN style="font-size: 10pt; font-family: 'Courier New'; color: #3b3b3b;"&gt;&amp;gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;show&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt; &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;vpn&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt; &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;ipsec&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;-&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;sa&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt; tunnel &amp;lt;tunnel name&amp;gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 8.5pt; font-family: 'Courier New'; color: #3b3b3b;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; background: white;"&gt;&lt;SPAN style="font-size: 8.5pt; font-family: 'Courier New'; color: #3b3b3b;"&gt;&amp;gt; &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;show&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt; &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;vpn&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt; &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;ike&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;-&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;sa&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt; gateway&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; background: white;"&gt;&lt;SPAN style="font-size: 8.0pt; font-family: 'Courier New'; color: #3b3b3b;"&gt;&amp;gt; &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;clear&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt; &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;vpn&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt; &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;ike&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;-&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;sa&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt; gateway XXXXX&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="background-color: white;"&gt;&lt;SPAN style="font-size: 8.0pt; font-family: 'Courier New'; color: #3b3b3b;"&gt;Delete IKEv1 IKE SA: Total 1 gateways found.&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="background-color: white;"&gt;&lt;/P&gt;&lt;P style="background-color: white;"&gt;&lt;SPAN style="font-size: 8.0pt; font-family: 'Courier New'; color: #3b3b3b;"&gt;&amp;gt; &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;clear&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt; &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;vpn&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt; &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;ipsec&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;-&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;sa&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt; tunnel XXXXXX&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="background-color: white;"&gt;&lt;SPAN style="font-size: 8.0pt; font-family: 'Courier New'; color: #3b3b3b;"&gt;Delete IKEv1 IPSec SA: Total 1 tunnels found.&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; background: white;"&gt;&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; background: white;"&gt;&lt;SPAN style="font-size: 8.0pt; font-family: 'Courier New'; color: #3b3b3b;"&gt;&amp;gt; &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;test&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt; &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;vpn&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt; &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;ike&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;-&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;sa&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt; gateway XXXXXX&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="background-color: white;"&gt;&lt;SPAN style="font-size: 8.0pt; font-family: 'Courier New'; color: #3b3b3b;"&gt;Initiate IKE SA: Total 1 gateways found. 1 &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;ike&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt; &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;sa&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt; &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;found&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;.&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="background-color: white;"&gt;&lt;/P&gt;&lt;P style="background-color: white;"&gt;&lt;SPAN style="font-size: 8.0pt; font-family: 'Courier New'; color: #3b3b3b;"&gt;&amp;gt; &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;test&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt; &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;vpn&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt; &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;ipsec&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;-&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;sa&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt; tunnel XXXXXX&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="background-color: white;"&gt;&lt;SPAN style="font-size: 8.0pt; font-family: 'Courier New'; color: #3b3b3b;"&gt;Initiate IPSec SA: Total 1 tunnels found. 1 &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;ipsec&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt; &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;sa&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt; &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;found&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;.&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; background: white;"&gt;&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; background: white;"&gt;&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; background: white;"&gt;&lt;SPAN style="font-size: 8.0pt; font-family: 'Courier New'; color: #3b3b3b;"&gt;&amp;gt; &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;show&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt; &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;vpn&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt; flow&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.0pt; font-family: 'Courier New'; color: #3b3b3b; background: white;"&gt;&amp;gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;show&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt; &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;vpn&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt; flow tunnel-id x&lt;/SPAN&gt;&lt;SPAN style="font-size: 10.0pt; font-family: 'Helvetica','sans-serif'; color: #3b3b3b; background: white;"&gt;&amp;nbsp; &amp;lt;&amp;lt; where x=id number from above display&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.0pt; font-family: 'Helvetica','sans-serif'; color: #3b3b3b; background: white;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.0pt; font-family: 'Helvetica','sans-serif'; color: #3b3b3b; background: white;"&gt;Reference doc: &lt;A href="https://live.paloaltonetworks.com/docs/DOC-4758"&gt;IPSec Error: IKE Phase-1 Negotiation is Failed as Initiator, Main Mode. Due to Negotiation Timeout&lt;/A&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.0pt; font-family: 'Helvetica','sans-serif'; color: #3b3b3b; background: white;"&gt;&lt;A href="https://live.paloaltonetworks.com/docs/DOC-1236"&gt;CLI Commands to Status, Clear, Restore, and Monitor an IPSEC VPN Tunnel&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.0pt; font-family: 'Helvetica','sans-serif'; color: #3b3b3b; background: white;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.0pt; font-family: 'Helvetica','sans-serif'; color: #3b3b3b; background: white;"&gt;Please let us know the result.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.0pt; font-family: 'Helvetica','sans-serif'; color: #3b3b3b; background: white;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10.0pt; font-family: 'Helvetica','sans-serif'; color: #3b3b3b; background: white;"&gt;Thanks&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 07 Mar 2014 16:45:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-strange-behaviour/m-p/44837#M32917</guid>
      <dc:creator>HULK</dc:creator>
      <dc:date>2014-03-07T16:45:44Z</dc:date>
    </item>
    <item>
      <title>Re: VPN strange behaviour</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-strange-behaviour/m-p/44838#M32918</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;There are many reasons for the message "due to timeout"&lt;/P&gt;&lt;P&gt;Be sure nothing changed on both sides after tunnel was up&lt;/P&gt;&lt;P&gt;Also disable tunnel monitoring on SSG side.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 08 Mar 2014 07:17:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-strange-behaviour/m-p/44838#M32918</guid>
      <dc:creator>Retired Member</dc:creator>
      <dc:date>2014-03-08T07:17:43Z</dc:date>
    </item>
    <item>
      <title>Re: VPN strange behaviour</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-strange-behaviour/m-p/44839#M32919</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes both firewalls are allowing IKE between peers.........&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Its weird becasue if i do "test vpn ike-sa gateway XXXX"&lt;/P&gt;&lt;P&gt;i cant see the parapmether in phase1 "MAIN MoDe, 3des,sha1......"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;OK ill continue on monday....ill give you news.....thanks a lot&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 08 Mar 2014 11:44:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-strange-behaviour/m-p/44839#M32919</guid>
      <dc:creator>SOC_CSG</dc:creator>
      <dc:date>2014-03-08T11:44:02Z</dc:date>
    </item>
    <item>
      <title>Re: VPN strange behaviour</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-strange-behaviour/m-p/44840#M32920</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, im sure nothing was changed.....i think the VPN was up and becaouse of lifetime the&amp;nbsp; VPN was live for 8 hours and then died......&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i have enabled vpn monitor in both sides, disabled vpn monitor, enable NAT-T, disable NAT-T, with proxy-ID, without proxy-ID......i dont know what more i can try&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ill change to ANY ANY the policies between peers just in case.....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;illl give u news on monday thanks a lot for ur help &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://live.paloaltonetworks.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 08 Mar 2014 11:48:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-strange-behaviour/m-p/44840#M32920</guid>
      <dc:creator>SOC_CSG</dc:creator>
      <dc:date>2014-03-08T11:48:13Z</dc:date>
    </item>
    <item>
      <title>Re: VPN strange behaviour</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-strange-behaviour/m-p/44841#M32921</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;&lt;STRONG style="font-style: inherit; font-family: inherit;"&gt;2014-03-07 12:40:36 [PROTO_NOTIFY]: ====&amp;gt; PHASE-1 NEGOTIATION STARTED AS INITIATOR, MAIN MODE &amp;lt;====&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;&lt;STRONG style="font-style: inherit; font-family: inherit;"&gt;====&amp;gt; Initiated SA: 126.57.38.50[500]-85.111.55.10[500] cookie:2fa8ed99f184af97:0000000000000000 &amp;lt;====&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;&lt;STRONG style="font-style: inherit; font-family: inherit;"&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;This could be for following reasons:&lt;/P&gt;&lt;P style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;1. PAN device is sending out UDP 500 packet to start phase 1. But it is not received on SSG side. &lt;/P&gt;&lt;P style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;2. SSG received PAN UDP 500 packet, but is not sending out 2nd message with responder cookie.&lt;/P&gt;&lt;P style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;3. SSG received PAN UDP 500 packet and sent 2nd message with responder cookie. But it is not reaching PAN device.&lt;/P&gt;&lt;P style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;4. SSG sent 2nd message and PAN device received it. But did not recognize it for some reason.&lt;/P&gt;&lt;P style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;&lt;STRONG style="font-style: inherit; font-family: inherit;"&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;Best thing to do in this case is to narrow down which side is having a problem. I would suggest running packet captures on both PAN side as well as SSG side filtering for UDP 500 packets. What you are looking for is to see if PAN is sending IKE packet and on SSG side make sure IKE is received. If PAN side shows IKE is sent but SSG side never sees the packet, then you have an issue on your provider side possibly blocking UDP port 500.&lt;/P&gt;&lt;P style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;&lt;/P&gt;&lt;P style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;Just remember for any VPN troubleshooting you always want to look at both sides of the tunnel. So let us know what SSG is seeing as well.&lt;/P&gt;&lt;P style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;&lt;STRONG style="font-style: inherit; font-family: inherit;"&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;-Richard&lt;STRONG style="font-style: inherit; font-family: inherit;"&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #3b3b3b;"&gt;&lt;STRONG style="font-style: inherit; font-family: inherit;"&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 10 Mar 2014 02:47:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-strange-behaviour/m-p/44841#M32921</guid>
      <dc:creator>Retired Member</dc:creator>
      <dc:date>2014-03-10T02:47:28Z</dc:date>
    </item>
    <item>
      <title>Re: VPN strange behaviour</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-strange-behaviour/m-p/44842#M32922</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I just checked and i have seen in MONITOR-&amp;gt;SESSION BROWSER that we had a session ike and ipsec frozen, i deleted this session and the VPN its up NOW.....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;why VPN session was stuck???? what reasons can be do this????&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks a lot&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 10 Mar 2014 16:28:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-strange-behaviour/m-p/44842#M32922</guid>
      <dc:creator>SOC_CSG</dc:creator>
      <dc:date>2014-03-10T16:28:46Z</dc:date>
    </item>
    <item>
      <title>Re: VPN strange behaviour</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-strange-behaviour/m-p/44843#M32923</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi COS,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I´ve also seen such frozen ike and ipsec sessions sometimes, but only with older PANOS version (most of the time 4.1.x versions). No obvious reason for this issue...you can open a TAC case, but this is imo only helpful if you are able to run several cli commands (show session id .... for the frozen session, show vpn ....,&amp;nbsp; tech-support-file) while the session is in this frozen state.&lt;/P&gt;&lt;P&gt;However there is no obvious bug-ID in the current release notes 5.0.11 regarding this particular behavior I would suggest an update to one of the latest 5.0.x versions (5.0.10 is at this time very stable in my opinion).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best regards,&lt;/P&gt;&lt;P&gt;Ulrich&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 31 Mar 2014 12:59:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-strange-behaviour/m-p/44843#M32923</guid>
      <dc:creator>indup089</dc:creator>
      <dc:date>2014-03-31T12:59:56Z</dc:date>
    </item>
    <item>
      <title>Re: VPN strange behaviour</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-strange-behaviour/m-p/44844#M32924</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Is an upgrade to PANOS 5.0.11 possible? At least for the PA-VM this upgrade&amp;nbsp; was recommended by the TAC in my case. I run ScreenOS 6.3.0R14 currently on my Netscreen side.&lt;/P&gt;&lt;P&gt;I use vpn-monitor on the ScreenOS side.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 01 Apr 2014 21:25:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-strange-behaviour/m-p/44844#M32924</guid>
      <dc:creator>Unibw</dc:creator>
      <dc:date>2014-04-01T21:25:55Z</dc:date>
    </item>
  </channel>
</rss>

