<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: IPSEC phase 2 rekey in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-phase-2-rekey/m-p/72130#M41002</link>
    <description>&lt;P&gt;I think we found a solution istead of defining IPSEC lifetime in 1 hour we set is as 3600 seconds instead.&lt;/P&gt;</description>
    <pubDate>Thu, 04 Feb 2016 09:42:25 GMT</pubDate>
    <dc:creator>glitch</dc:creator>
    <dc:date>2016-02-04T09:42:25Z</dc:date>
    <item>
      <title>IPSEC phase 2 rekey</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-phase-2-rekey/m-p/18471#M13495</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We are having problems with a site to site IPSEC VPN between a PA-500 and a Cisco ASA. The PA is always the initiator and the tunnel comes up and passes traffic just fine. The problem comes when the tunnel needs to rekey, basically it seems that the PA does not bother to renegotiate until between 30 and 120 seconds of the lifetime remains. Now this is fine if the lifetime is 10 minutes or less but in reality it works out that with a sensible lifetime in place the Cisco has dropped the Phase 2 tunnel (at 95% of the lifetime) long before the PA tries to rekey.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When the lifetime is set to a short time (12 minutes) the PA log shows either side initiating the negotiation depending on whether the PA has done it by 95% of lifetime or not. When the lifetime is longer the PA does not log any attempt by the ASA to initiate the negotiation - it seems almost as if it ignores any attempt to rekey if it falls outside of its window.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can anyone confirm what the Palo Alto policy is regarding IPSEC phase 2 tunnel rekey? Is anyone else having this problem?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Karl&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Feb 2015 17:25:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-phase-2-rekey/m-p/18471#M13495</guid>
      <dc:creator>Sigma</dc:creator>
      <dc:date>2015-02-10T17:25:54Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC phase 2 rekey</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-phase-2-rekey/m-p/18472#M13496</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Karl,&lt;/P&gt;&lt;P&gt;The best advice I can give is make sure your timeout values are identical on both devices. If you have say 8 hours on the PAN make sure its 8 hours on the Cisco. I think Cisco uses seconds so there may be some math involved. But make sure the phase 1 and 2 setting sare identical on both sides. I have VPNs from my PAN's tothe following other types of VPNs and they are all functional:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;McAfee Next Gen Firewall&lt;/P&gt;&lt;P&gt;Cisco ASA&lt;/P&gt;&lt;P&gt;Palo Alto&lt;/P&gt;&lt;P&gt;Juniper&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;All phases have to match otherwise you may not even establish in the first place. So if you change one side, you have to change the other.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Feb 2015 22:49:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-phase-2-rekey/m-p/18472#M13496</guid>
      <dc:creator>oklier</dc:creator>
      <dc:date>2015-02-10T22:49:20Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC phase 2 rekey</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-phase-2-rekey/m-p/18473#M13497</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We found some VPN stability issues when having an IPSec VPN to a Cisco ASA with DPD being enabled. We found intermittent disconnects as DPD was detecting the peer as "down" when it was not. I know DPD is part of phase 1 and not phase 2 but it is something you may want to test disabling.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 20 Feb 2015 07:11:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-phase-2-rekey/m-p/18473#M13497</guid>
      <dc:creator>ericv</dc:creator>
      <dc:date>2015-02-20T07:11:42Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC phase 2 rekey</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-phase-2-rekey/m-p/18474#M13498</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sigma,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In regards to your note on the missing logs, I would imagine we would see something, even if it fails as the responder.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you verify if there is any dropped packets on the firewall coming from that ASA?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Please do not forget to mark and 'Helpful' or 'Correct' replies.&lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 20 Feb 2015 17:11:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-phase-2-rekey/m-p/18474#M13498</guid>
      <dc:creator>mmmccorkle</dc:creator>
      <dc:date>2015-02-20T17:11:17Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC phase 2 rekey</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-phase-2-rekey/m-p/72057#M40989</link>
      <description>&lt;P&gt;I am having the exact same problems. Also ASA in the other end.&lt;/P&gt;
&lt;P&gt;We have tried disable DPD and pfs from IPsec.Still unstable.&lt;/P&gt;
&lt;P&gt;We are running version 6.1.7&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Has it been fixed in 6.1.9 or 7.0.4?&lt;/P&gt;</description>
      <pubDate>Wed, 03 Feb 2016 12:16:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-phase-2-rekey/m-p/72057#M40989</guid>
      <dc:creator>glitch</dc:creator>
      <dc:date>2016-02-03T12:16:56Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC phase 2 rekey</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-phase-2-rekey/m-p/72130#M41002</link>
      <description>&lt;P&gt;I think we found a solution istead of defining IPSEC lifetime in 1 hour we set is as 3600 seconds instead.&lt;/P&gt;</description>
      <pubDate>Thu, 04 Feb 2016 09:42:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-phase-2-rekey/m-p/72130#M41002</guid>
      <dc:creator>glitch</dc:creator>
      <dc:date>2016-02-04T09:42:25Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC phase 2 rekey</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-phase-2-rekey/m-p/590509#M117634</link>
      <description>&lt;P&gt;1 hour = 3600 seconds , so what is the difference ?&lt;/P&gt;</description>
      <pubDate>Wed, 26 Jun 2024 17:52:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-phase-2-rekey/m-p/590509#M117634</guid>
      <dc:creator>AnupamGaur_Nomios</dc:creator>
      <dc:date>2024-06-26T17:52:17Z</dc:date>
    </item>
  </channel>
</rss>

