<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: IPSec traffic being treated as &amp;quot;ciscovpn&amp;quot; applicatoin in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-traffic-being-treated-as-quot-ciscovpn-quot-applicatoin/m-p/79648#M43245</link>
    <description>&lt;P&gt;Anyone?&lt;/P&gt;</description>
    <pubDate>Wed, 08 Jun 2016 09:24:06 GMT</pubDate>
    <dc:creator>allarm</dc:creator>
    <dc:date>2016-06-08T09:24:06Z</dc:date>
    <item>
      <title>IPSec traffic being treated as "ciscovpn" applicatoin</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-traffic-being-treated-as-quot-ciscovpn-quot-applicatoin/m-p/78908#M43067</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Having an issue with IPSec tunnels. Sometimes (not all the time), phase 1 can't be established because IKE traffic is being treated as "ciscovpn" instead of ike and being discarded. Once I clear the session, the next session establishes correctly and works perfectly fine. Both sides of ipsec tunnel are terminated on Cisco routers. Is there anything we can do about it (aside from allowing ciscovpn application)?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Details:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;--------------------------------------------------------------------------------
ID          Application    State   Type Flag  Src[Sport]/Zone/Proto (translated IP[Port])
Vsys                                          Dst[Dport]/Zone (translated IP[Port])
--------------------------------------------------------------------------------
8889         ciscovpn       DISCARD FLOW  NS   x.x.x.x[500]/LAN-CORP/17  (y.y.y.y[500])
vsys1                                          z.z.z.z[500]/UNTRUST-L3  (z.z.z.z[500])

&amp;gt; clear session id 8889

--------------------------------------------------------------------------------
ID Application State Type Flag Src[Sport]/Zone/Proto (translated IP[Port])
Vsys Dst[Dport]/Zone (translated IP[Port])
--------------------------------------------------------------------------------
27654 ipsec-esp ACTIVE FLOW NS x.x.x.x[20033]/LAN-CORP/50 (y.y.y.y[20033])
vsys1 z.z.z.z[20033]/UNTRUST-L3 (z.z.z.z[20033])
26671 ike ACTIVE FLOW NS x.x.x.x[500]/LAN-CORP/17 (y.y.y.y[500])
vsys1 z.z.z.z[500]/UNTRUST-L3 (z.z.z.z[500])&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 01 Jun 2016 09:23:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-traffic-being-treated-as-quot-ciscovpn-quot-applicatoin/m-p/78908#M43067</guid>
      <dc:creator>allarm</dc:creator>
      <dc:date>2016-06-01T09:23:30Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec traffic being treated as "ciscovpn" applicatoin</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-traffic-being-treated-as-quot-ciscovpn-quot-applicatoin/m-p/78948#M43082</link>
      <description>&lt;P&gt;We can create rule based on source ip and destination ip and port number instead of application. If application is causing issues.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;One single rule will have source ip add x,y and destination as x,y and underservice tab we can specifiy udp port 500.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Here x,y are the ip address of the IPSec peers.&lt;/P&gt;</description>
      <pubDate>Wed, 01 Jun 2016 15:30:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-traffic-being-treated-as-quot-ciscovpn-quot-applicatoin/m-p/78948#M43082</guid>
      <dc:creator>pankaku</dc:creator>
      <dc:date>2016-06-01T15:30:32Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec traffic being treated as "ciscovpn" applicatoin</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-traffic-being-treated-as-quot-ciscovpn-quot-applicatoin/m-p/78988#M43093</link>
      <description>&lt;P&gt;Well, why would we have L7 firewall then? &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As from I see, this issue is quite old and have not been fixed for quite a long period of time. Is it possible to have a response from Palo Alto engineers on this? Or maybe there is a way to create a feature request/bug report which I don't know?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;ps&lt;/P&gt;
&lt;P&gt;I am the topic starter, had to switch between accounts, sorry for this mess.&lt;/P&gt;</description>
      <pubDate>Thu, 02 Jun 2016 01:27:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-traffic-being-treated-as-quot-ciscovpn-quot-applicatoin/m-p/78988#M43093</guid>
      <dc:creator>allarm</dc:creator>
      <dc:date>2016-06-02T01:27:17Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec traffic being treated as "ciscovpn" applicatoin</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-traffic-being-treated-as-quot-ciscovpn-quot-applicatoin/m-p/79648#M43245</link>
      <description>&lt;P&gt;Anyone?&lt;/P&gt;</description>
      <pubDate>Wed, 08 Jun 2016 09:24:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-traffic-being-treated-as-quot-ciscovpn-quot-applicatoin/m-p/79648#M43245</guid>
      <dc:creator>allarm</dc:creator>
      <dc:date>2016-06-08T09:24:06Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec traffic being treated as "ciscovpn" applicatoin</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-traffic-being-treated-as-quot-ciscovpn-quot-applicatoin/m-p/79651#M43246</link>
      <description>&lt;P&gt;Since it is a tunnel between 2 cisco devices, the behavior may be similar to 'ciscovpn' client traffic which is why it could hit on that application instead of simply 'IKE'&lt;/P&gt;
&lt;P&gt;You could either add the application to your security policy to allow it through, or if you believe the AppID is not working as expected, you can open a support case with TAC and the content team will take a look at the session's packetcaptures and update the application if possible&lt;/P&gt;</description>
      <pubDate>Wed, 08 Jun 2016 09:30:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-traffic-being-treated-as-quot-ciscovpn-quot-applicatoin/m-p/79651#M43246</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2016-06-08T09:30:45Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec traffic being treated as "ciscovpn" applicatoin</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-traffic-being-treated-as-quot-ciscovpn-quot-applicatoin/m-p/79653#M43247</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;All feature requests need to go via your local SE. &amp;nbsp;&lt;/P&gt;
&lt;P&gt;They can create the FR for you and can add votes to it to add more weight to it.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As for bug reports, these can only be opened by TAC via a support case. &amp;nbsp;If you are planning to open a support case then I'd recommend to have some PCAPs ready so the engineers can investigate the payload.&lt;/P&gt;</description>
      <pubDate>Wed, 08 Jun 2016 10:07:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-traffic-being-treated-as-quot-ciscovpn-quot-applicatoin/m-p/79653#M43247</guid>
      <dc:creator>kiwi</dc:creator>
      <dc:date>2016-06-08T10:07:05Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec traffic being treated as "ciscovpn" applicatoin</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-traffic-being-treated-as-quot-ciscovpn-quot-applicatoin/m-p/79692#M43248</link>
      <description>The problem is that the behavior isn't uniform. Most of the time this traffic is being treated as ike and sometimes it starts being treated as ciscovpn and we have to clear the session to let ipsec terminators negotiate again.</description>
      <pubDate>Wed, 08 Jun 2016 09:59:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-traffic-being-treated-as-quot-ciscovpn-quot-applicatoin/m-p/79692#M43248</guid>
      <dc:creator>allarm</dc:creator>
      <dc:date>2016-06-08T09:59:04Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec traffic being treated as "ciscovpn" applicatoin</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-traffic-being-treated-as-quot-ciscovpn-quot-applicatoin/m-p/79693#M43249</link>
      <description>Please remove personal data from your message. Not sure why did it get in your reply, could be a problem with my account, but anyway.</description>
      <pubDate>Wed, 08 Jun 2016 10:00:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-traffic-being-treated-as-quot-ciscovpn-quot-applicatoin/m-p/79693#M43249</guid>
      <dc:creator>allarm</dc:creator>
      <dc:date>2016-06-08T10:00:36Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec traffic being treated as "ciscovpn" applicatoin</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-traffic-being-treated-as-quot-ciscovpn-quot-applicatoin/m-p/79698#M43251</link>
      <description>&lt;P&gt;The fact this behavior isn't uniform would be a good reason to open a support case and have TAC investigate. you'd need to try and get a packetcapture of the moment the session is identified as ciscovpn, which may take some time, but then the content team will be able to use that data to finetune the AppID&lt;/P&gt;</description>
      <pubDate>Wed, 08 Jun 2016 10:19:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-traffic-being-treated-as-quot-ciscovpn-quot-applicatoin/m-p/79698#M43251</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2016-06-08T10:19:30Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec traffic being treated as "ciscovpn" applicatoin</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-traffic-being-treated-as-quot-ciscovpn-quot-applicatoin/m-p/80522#M43277</link>
      <description>&lt;P&gt;I recently ran into a similiar issue with sflow traffics got identifed as bittorrent application. &amp;nbsp; &amp;nbsp;I provided show session, external packet capture, debug log, clear session. &amp;nbsp; The issue is addressed via a threat signature updated.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 08 Jun 2016 21:51:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-traffic-being-treated-as-quot-ciscovpn-quot-applicatoin/m-p/80522#M43277</guid>
      <dc:creator>nextgenhappines</dc:creator>
      <dc:date>2016-06-08T21:51:28Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec traffic being treated as "ciscovpn" applicatoin</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-traffic-being-treated-as-quot-ciscovpn-quot-applicatoin/m-p/80719#M43281</link>
      <description>&lt;P&gt;Thanks, will try it.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 09 Jun 2016 01:38:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-traffic-being-treated-as-quot-ciscovpn-quot-applicatoin/m-p/80719#M43281</guid>
      <dc:creator>allarm</dc:creator>
      <dc:date>2016-06-09T01:38:24Z</dc:date>
    </item>
  </channel>
</rss>

