<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic IPSEC Phase-1 fails as initiator but not as responder in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-phase-1-fails-as-initiator-but-not-as-responder/m-p/5835#M4261</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello support community,&lt;BR /&gt;I'm using a PAN 3020 A/P cluster on the perimeter running 6.0.9.&amp;nbsp; At all of my remote sites I have a cisco ASA that uses IPSEC tunnels to connect back to the main network.&amp;nbsp; The IPSEC tunnel configuration (IKE phase 1, IKE phase 2, and peer IDs) are consistent across my remote sites (best to my knowledge).&amp;nbsp; Out of my 8 IPSEC tunnels, when I try to initiate the tunnel to one site I receive the following in the system logs where X is the remote peer and Y is the local peer: "received unencrypted Notify payload (NO-PROPOSAL-CHOSEN) from IP X.X.X.X[500] to Y.Y.Y.Y[500], ignored."&amp;nbsp; I then get: "IKE phase-1 negotiation is failed as initiator, main mode. Failed SA: Y.Y.Y.Y[500]-72.28.162.32[500] cookie:cbf02ee495115ae1:0000000000000000. Due to timeout.'&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the PAN is the responder, the tunnel comes up: "IKE phase-1 negotiation is succeeded as responder, main mode. Established SA: Y.Y.Y.Y[500]-X.X.X.X[20796] cookie:2790c31cdce7deae:05a5f962eee2989b lifetime 86400 Sec."&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Looking at the interpret-vpn-error-messages.html page, I would think if there was a proposal mismatch in the IKE Crypto profile, it would fail as both initiator and responder. I've verified the isakmp policy on the cisco side matches what's configured in the IKE Crypto policy, and I've verified the firewall is allowing the traffic via security policy.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any ideas why I'm failing as an initiator?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 01 Apr 2015 01:08:52 GMT</pubDate>
    <dc:creator>dan731028</dc:creator>
    <dc:date>2015-04-01T01:08:52Z</dc:date>
    <item>
      <title>IPSEC Phase-1 fails as initiator but not as responder</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-phase-1-fails-as-initiator-but-not-as-responder/m-p/5835#M4261</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello support community,&lt;BR /&gt;I'm using a PAN 3020 A/P cluster on the perimeter running 6.0.9.&amp;nbsp; At all of my remote sites I have a cisco ASA that uses IPSEC tunnels to connect back to the main network.&amp;nbsp; The IPSEC tunnel configuration (IKE phase 1, IKE phase 2, and peer IDs) are consistent across my remote sites (best to my knowledge).&amp;nbsp; Out of my 8 IPSEC tunnels, when I try to initiate the tunnel to one site I receive the following in the system logs where X is the remote peer and Y is the local peer: "received unencrypted Notify payload (NO-PROPOSAL-CHOSEN) from IP X.X.X.X[500] to Y.Y.Y.Y[500], ignored."&amp;nbsp; I then get: "IKE phase-1 negotiation is failed as initiator, main mode. Failed SA: Y.Y.Y.Y[500]-72.28.162.32[500] cookie:cbf02ee495115ae1:0000000000000000. Due to timeout.'&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the PAN is the responder, the tunnel comes up: "IKE phase-1 negotiation is succeeded as responder, main mode. Established SA: Y.Y.Y.Y[500]-X.X.X.X[20796] cookie:2790c31cdce7deae:05a5f962eee2989b lifetime 86400 Sec."&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Looking at the interpret-vpn-error-messages.html page, I would think if there was a proposal mismatch in the IKE Crypto profile, it would fail as both initiator and responder. I've verified the isakmp policy on the cisco side matches what's configured in the IKE Crypto policy, and I've verified the firewall is allowing the traffic via security policy.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any ideas why I'm failing as an initiator?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 Apr 2015 01:08:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-phase-1-fails-as-initiator-but-not-as-responder/m-p/5835#M4261</guid>
      <dc:creator>dan731028</dc:creator>
      <dc:date>2015-04-01T01:08:52Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC Phase-1 fails as initiator but not as responder</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-phase-1-fails-as-initiator-but-not-as-responder/m-p/5836#M4262</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Dan,&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;IPSec Interoperability Between Palo Alto Firewalls and Cisco ASA &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Please find the below link for the Ipsec VPN configuration :-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://live.paloaltonetworks.com/docs/DOC-2579"&gt;https://live.paloaltonetworks.com/docs/DOC-2579&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://live.paloaltonetworks.com/docs/DOC-6791" style="font-size: 10pt; line-height: 1.5em;"&gt;https://live.paloaltonetworks.com/docs/DOC-6791&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 11.0pt; font-family: 'Calibri','sans-serif'; color: #1f497d;"&gt;Kindly let us know if&amp;nbsp; any further support is required.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Satish&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 Apr 2015 05:00:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-phase-1-fails-as-initiator-but-not-as-responder/m-p/5836#M4262</guid>
      <dc:creator>Satish</dc:creator>
      <dc:date>2015-04-01T05:00:01Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC Phase-1 fails as initiator but not as responder</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-phase-1-fails-as-initiator-but-not-as-responder/m-p/5837#M4263</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Since you know the actual crypto settings are correct, I would suspect one of these:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There is some kind of firewall blocking your request as initiator to the ASA interface.&amp;nbsp; But as a responder you match the session created by the ASA so it works.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The Cisco configuration has the initiator only command in the configuration so it will not respond.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 01 Apr 2015 10:14:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-phase-1-fails-as-initiator-but-not-as-responder/m-p/5837#M4263</guid>
      <dc:creator>pulukas</dc:creator>
      <dc:date>2015-04-01T10:14:27Z</dc:date>
    </item>
  </channel>
</rss>

