<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Tracking down source of ike-nego-p1-fail-common log entry in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/tracking-down-source-of-ike-nego-p1-fail-common-log-entry/m-p/67495#M39556</link>
    <description>&lt;P&gt;This is harmless but annoying to see in the logs.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;These messages probably mean that someone has mis-configured a VPN attempt to your address. &amp;nbsp;Likely this is a left over from an old connection you had or the previous user of your ip address.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I would do the ip look and contact the owner of the ip address. &amp;nbsp;then ask for the IT group and get that old VPN removed.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 30 Oct 2015 10:24:44 GMT</pubDate>
    <dc:creator>pulukas</dc:creator>
    <dc:date>2015-10-30T10:24:44Z</dc:date>
    <item>
      <title>Tracking down source of ike-nego-p1-fail-common log entry</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/tracking-down-source-of-ike-nego-p1-fail-common-log-entry/m-p/67426#M39523</link>
      <description>&lt;P&gt;&lt;FONT face="arial,helvetica,sans-serif" size="2"&gt;We have connected several branch offices using PA200 and PA500 with ipsec tunnels to a PA3020 at our corporate office.&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="arial,helvetica,sans-serif" size="2"&gt;&amp;nbsp;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="arial,helvetica,sans-serif" size="2"&gt;The corporate server is registering similare errors twice every 3 seconds. The error:&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="arial,helvetica,sans-serif" size="2"&gt;&lt;SPAN style="font: 11px/normal Tahoma, Arial, Helvetica, sans-serif; text-align: left; color: rgb(90, 110, 122); text-transform: none; text-indent: 0px; letter-spacing: normal; word-spacing: 0px; float: none; display: inline !important; white-space: normal; widows: 1; font-size-adjust: none; font-stretch: normal; background-color: rgb(255, 255, 255); -webkit-text-stroke-width: 0px;"&gt;IKE phase-1 negotiation is failed. Couldn't find configuration for IKE phase-1 request for peer IP xxx.xxx.xxx.xxx[52402], ID ipaddr:yyy.yyy.yyy.yyy.&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="arial,helvetica,sans-serif" size="2"&gt;&lt;SPAN style="font: 11px/normal Tahoma, Arial, Helvetica, sans-serif; text-align: left; color: rgb(90, 110, 122); text-transform: none; text-indent: 0px; letter-spacing: normal; word-spacing: 0px; float: none; display: inline !important; white-space: normal; widows: 1; font-size-adjust: none; font-stretch: normal; background-color: rgb(255, 255, 255); -webkit-text-stroke-width: 0px;"&gt;and&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="arial,helvetica,sans-serif" size="2"&gt;&lt;SPAN style="font: 11px/normal Tahoma, Arial, Helvetica, sans-serif; text-align: left; color: rgb(90, 110, 122); text-transform: none; text-indent: 0px; letter-spacing: normal; word-spacing: 0px; float: none; display: inline !important; white-space: normal; widows: 1; font-size-adjust: none; font-stretch: normal; background-color: rgb(255, 255, 255); -webkit-text-stroke-width: 0px;"&gt;IKE phase-1 negotiation is failed. Couldn't find configuration for IKE phase-1 request for peer IP xxx.xxx.xxx.xxx[24211], ID ipaddr:yyy.yyy.yyy.yyy.&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="arial,helvetica,sans-serif" size="2"&gt;The only difference is the number&amp;nbsp;in brackets following the peer IP&amp;nbsp;address.&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="arial,helvetica,sans-serif" size="2"&gt;&lt;SPAN style="font: 11px/normal Tahoma, Arial, Helvetica, sans-serif; text-align: left; color: rgb(90, 110, 122); text-transform: none; text-indent: 0px; letter-spacing: normal; word-spacing: 0px; float: none; display: inline !important; white-space: normal; widows: 1; font-size-adjust: none; font-stretch: normal; background-color: rgb(255, 255, 255); -webkit-text-stroke-width: 0px;"&gt;We have a remote site with an IP address of xxx.xxx.xxx.xxx but its tunnels are up and the yyy.yyy.yyy.yyy sddress cannot be found anywhere in the configurations.&amp;nbsp; The yyy.yyy.yyy.yyy IP address cannot be located in the corporate firewall either.&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="arial,helvetica,sans-serif" size="2"&gt;&lt;SPAN style="font: 11px/normal Tahoma, Arial, Helvetica, sans-serif; text-align: left; color: rgb(90, 110, 122); text-transform: none; text-indent: 0px; letter-spacing: normal; word-spacing: 0px; float: none; display: inline !important; white-space: normal; widows: 1; font-size-adjust: none; font-stretch: normal; background-color: rgb(255, 255, 255); -webkit-text-stroke-width: 0px;"&gt;How can I determine where the request iscoming from so I can stop it?&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="arial,helvetica,sans-serif" size="2"&gt;&lt;SPAN style="font: 11px/normal Tahoma, Arial, Helvetica, sans-serif; text-align: left; color: rgb(90, 110, 122); text-transform: none; text-indent: 0px; letter-spacing: normal; word-spacing: 0px; float: none; display: inline !important; white-space: normal; widows: 1; font-size-adjust: none; font-stretch: normal; background-color: rgb(255, 255, 255); -webkit-text-stroke-width: 0px;"&gt;What do the numbers in the brackets following the peer IP address mean?&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT face="arial,helvetica,sans-serif" size="2"&gt;&lt;SPAN style="font: 11px/normal Tahoma, Arial, Helvetica, sans-serif; text-align: left; color: rgb(90, 110, 122); text-transform: none; text-indent: 0px; letter-spacing: normal; word-spacing: 0px; float: none; display: inline !important; white-space: normal; widows: 1; font-size-adjust: none; font-stretch: normal; background-color: rgb(255, 255, 255); -webkit-text-stroke-width: 0px;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 28 Oct 2015 23:11:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/tracking-down-source-of-ike-nego-p1-fail-common-log-entry/m-p/67426#M39523</guid>
      <dc:creator>BDS_Vince</dc:creator>
      <dc:date>2015-10-28T23:11:42Z</dc:date>
    </item>
    <item>
      <title>Re: Tracking down source of ike-nego-p1-fail-common log entry</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/tracking-down-source-of-ike-nego-p1-fail-common-log-entry/m-p/67455#M39533</link>
      <description>&lt;P&gt;So you're saying yyy.yyy.yyy.yyy is not a part of your public IP range at your remote office?&lt;/P&gt;</description>
      <pubDate>Thu, 29 Oct 2015 15:53:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/tracking-down-source-of-ike-nego-p1-fail-common-log-entry/m-p/67455#M39533</guid>
      <dc:creator>RFalconer</dc:creator>
      <dc:date>2015-10-29T15:53:19Z</dc:date>
    </item>
    <item>
      <title>Re: Tracking down source of ike-nego-p1-fail-common log entry</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/tracking-down-source-of-ike-nego-p1-fail-common-log-entry/m-p/67472#M39545</link>
      <description>&lt;P&gt;That is correct.&amp;nbsp; xxx.xxx.xxx.xxx is already connected but we don't know where the request from yyy.yyy.yyy.yyy is coming from.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 29 Oct 2015 19:00:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/tracking-down-source-of-ike-nego-p1-fail-common-log-entry/m-p/67472#M39545</guid>
      <dc:creator>BDS_Vince</dc:creator>
      <dc:date>2015-10-29T19:00:21Z</dc:date>
    </item>
    <item>
      <title>Re: Tracking down source of ike-nego-p1-fail-common log entry</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/tracking-down-source-of-ike-nego-p1-fail-common-log-entry/m-p/67477#M39549</link>
      <description>&lt;P&gt;If you want to know the company that owns the IP address, you can do whois to get more info.&lt;/P&gt;
&lt;P&gt;You could also just block it on your internet router.&lt;/P&gt;</description>
      <pubDate>Thu, 29 Oct 2015 20:46:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/tracking-down-source-of-ike-nego-p1-fail-common-log-entry/m-p/67477#M39549</guid>
      <dc:creator>RFalconer</dc:creator>
      <dc:date>2015-10-29T20:46:52Z</dc:date>
    </item>
    <item>
      <title>Re: Tracking down source of ike-nego-p1-fail-common log entry</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/tracking-down-source-of-ike-nego-p1-fail-common-log-entry/m-p/67479#M39550</link>
      <description>&lt;P&gt;Unfortunately the PA3050 is our internet router......&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Your suggestion is that&amp;nbsp;I create a drop/deny rule for the IP address.&amp;nbsp; Does that&amp;nbsp;rule get evaluated&amp;nbsp;before the IPsec connection is attempted?&lt;/P&gt;</description>
      <pubDate>Thu, 29 Oct 2015 20:51:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/tracking-down-source-of-ike-nego-p1-fail-common-log-entry/m-p/67479#M39550</guid>
      <dc:creator>BDS_Vince</dc:creator>
      <dc:date>2015-10-29T20:51:33Z</dc:date>
    </item>
    <item>
      <title>Re: Tracking down source of ike-nego-p1-fail-common log entry</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/tracking-down-source-of-ike-nego-p1-fail-common-log-entry/m-p/67483#M39552</link>
      <description>&lt;P&gt;I don't think an ACL will work for traffic destined to the untrust interface. A PBF policy might work. You can try matching the traffic and setting the policy to discard.&lt;/P&gt;
&lt;P&gt;Or your ISP might be able to block on their upstream equipment.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 29 Oct 2015 22:14:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/tracking-down-source-of-ike-nego-p1-fail-common-log-entry/m-p/67483#M39552</guid>
      <dc:creator>RFalconer</dc:creator>
      <dc:date>2015-10-29T22:14:42Z</dc:date>
    </item>
    <item>
      <title>Re: Tracking down source of ike-nego-p1-fail-common log entry</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/tracking-down-source-of-ike-nego-p1-fail-common-log-entry/m-p/67495#M39556</link>
      <description>&lt;P&gt;This is harmless but annoying to see in the logs.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;These messages probably mean that someone has mis-configured a VPN attempt to your address. &amp;nbsp;Likely this is a left over from an old connection you had or the previous user of your ip address.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I would do the ip look and contact the owner of the ip address. &amp;nbsp;then ask for the IT group and get that old VPN removed.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 30 Oct 2015 10:24:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/tracking-down-source-of-ike-nego-p1-fail-common-log-entry/m-p/67495#M39556</guid>
      <dc:creator>pulukas</dc:creator>
      <dc:date>2015-10-30T10:24:44Z</dc:date>
    </item>
  </channel>
</rss>

