<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: VPN to Azure dropouts in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-to-azure-dropouts/m-p/100817#M44294</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Something weird &amp;nbsp;happening &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; When the&amp;nbsp;passive mode is enabled, Palo still initiating a VPN tunnel or when Liveness check disabled it is still tear down the tunnel. I am confused ))) Please post the Ike Gateway screen shot and the output of the ikemgr.log:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;gt;&amp;nbsp;tail lines 200 mp-log ikemgr.log&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;</description>
    <pubDate>Thu, 28 Jul 2016 15:07:44 GMT</pubDate>
    <dc:creator>TranceforLife</dc:creator>
    <dc:date>2016-07-28T15:07:44Z</dc:date>
    <item>
      <title>VPN to Azure dropouts</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-to-azure-dropouts/m-p/98936#M44162</link>
      <description>&lt;P&gt;I have searched high and low for this and found a few articles regarding IKE configuration and nothing seems to fix it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;PAN 3020 v7.0.5. IKE 2 VPN to Azure. The VPN works but around every 50 mintues the tunnel drops out for a few minutes then re-establishes. I have tried various different IKE and IPsec settings as per advice from Palo Alto articles, Microsoft Azure articles and settings from a comment against a Palo Alto article that the commentor said worked. No joy.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;From the Azure console there is no way of checking IPsec ettings.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any help would be good.&lt;/P&gt;</description>
      <pubDate>Wed, 20 Jul 2016 23:24:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-to-azure-dropouts/m-p/98936#M44162</guid>
      <dc:creator>dmann2</dc:creator>
      <dc:date>2016-07-20T23:24:08Z</dc:date>
    </item>
    <item>
      <title>Re: VPN to Azure dropouts</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-to-azure-dropouts/m-p/99121#M44169</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Just had a similar issue. Can you post your VPN settings so I can compare with my and tell you what I have changed to make it working? Please send a screenshot of the logs from the Monitoring tab&amp;gt; System. Both successful and unsuccessful.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;</description>
      <pubDate>Thu, 21 Jul 2016 13:41:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-to-azure-dropouts/m-p/99121#M44169</guid>
      <dc:creator>TranceforLife</dc:creator>
      <dc:date>2016-07-21T13:41:54Z</dc:date>
    </item>
    <item>
      <title>Re: VPN to Azure dropouts</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-to-azure-dropouts/m-p/99201#M44170</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Just a quick&amp;nbsp;update/tips on this:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- make sure Palo&amp;nbsp;in the "passive" mode. So it will not be able to initiate a VPN but we could not make it working when its disabled.&lt;/P&gt;&lt;P&gt;- IKEv2 initiate 2 tunnels: IKE tunnel ( old name of IKEv1 Phase 1) and CHILD_SA (old name of IKEv1 Phace 2). Default lifetime for &amp;nbsp;IKE Tunnel is &lt;SPAN&gt;86400 or&amp;nbsp;&lt;/SPAN&gt;28800 seconds (depends of&lt;SPAN&gt; the vendor)&lt;/SPAN&gt;&amp;nbsp;for CHILD_SA is 3600 seconds hence your tunnel will be always re-established every hour. But it&amp;nbsp;takes couple seconds not minutes.&amp;nbsp;&lt;/P&gt;&lt;P&gt;- disable&amp;nbsp;no-pfs&amp;nbsp;on IPSec Crypto&lt;/P&gt;&lt;P&gt;- disable "Liveness Check" on the IKE Gateway configuration.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Make sure that all other setting are compatible with Azure. Please see below:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;IPsec Parameters&lt;/P&gt;&lt;DIV class="note"&gt;&lt;STRONG&gt;Note:&lt;/STRONG&gt;&lt;P&gt;Although the values listed below are supported by the Azure VPN Gateway, currently there is no way for you to specify or select a specific combination from the Azure VPN Gateway. You must specify any constraints from the on-premises VPN device. In addition, you must clamp MSS at 1350.&lt;/P&gt;&lt;/DIV&gt;&lt;P&gt;IKE Phase 1 setup&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;STRONG&gt;Property&lt;/STRONG&gt;&lt;/TD&gt;&lt;TD&gt;&lt;STRONG&gt;Policy-based&lt;/STRONG&gt;&lt;/TD&gt;&lt;TD&gt;&lt;STRONG&gt;Route-based and Standard or High Performance VPN gateway&lt;/STRONG&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;IKE Version&lt;/TD&gt;&lt;TD&gt;IKEv1&lt;/TD&gt;&lt;TD&gt;IKEv2&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Diffie-Hellman Group&lt;/TD&gt;&lt;TD&gt;Group 2 (1024 bit)&lt;/TD&gt;&lt;TD&gt;Group 2 (1024 bit)&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Authentication Method&lt;/TD&gt;&lt;TD&gt;Pre-Shared Key&lt;/TD&gt;&lt;TD&gt;Pre-Shared Key&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Encryption Algorithms&lt;/TD&gt;&lt;TD&gt;AES256 AES128 3DES&lt;/TD&gt;&lt;TD&gt;AES256 3DES&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Hashing Algorithm&lt;/TD&gt;&lt;TD&gt;SHA1(SHA128)&lt;/TD&gt;&lt;TD&gt;SHA1(SHA128), SHA2(SHA256)&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Phase 1 Security Association (SA) Lifetime (Time)&lt;/TD&gt;&lt;TD&gt;28,800 seconds&lt;/TD&gt;&lt;TD&gt;10,800 seconds&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;IKE Phase 2 setup&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;STRONG&gt;Property&lt;/STRONG&gt;&lt;/TD&gt;&lt;TD&gt;&lt;STRONG&gt;Policy-based&lt;/STRONG&gt;&lt;/TD&gt;&lt;TD&gt;&lt;STRONG&gt;Route-based and Standard or High Performance VPN gateway&lt;/STRONG&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;IKE Version&lt;/TD&gt;&lt;TD&gt;IKEv1&lt;/TD&gt;&lt;TD&gt;IKEv2&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Hashing Algorithm&lt;/TD&gt;&lt;TD&gt;SHA1(SHA128)&lt;/TD&gt;&lt;TD&gt;SHA1(SHA128)&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Phase 2 Security Association (SA) Lifetime (Time)&lt;/TD&gt;&lt;TD&gt;3,600 seconds&lt;/TD&gt;&lt;TD&gt;3,600 seconds&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Phase 2 Security Association (SA) Lifetime (Throughput)&lt;/TD&gt;&lt;TD&gt;102,400,000 KB&lt;/TD&gt;&lt;TD&gt;-&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;IPsec SA Encryption &amp;amp; Authentication Offers (in the order of preference)&lt;/TD&gt;&lt;TD&gt;1. ESP-AES256 2. ESP-AES128 3. ESP-3DES 4. N/A&lt;/TD&gt;&lt;TD&gt;See &lt;EM&gt;Route-based Gateway IPsec Security Association (SA) Offers&lt;/EM&gt;(below)&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Perfect Forward Secrecy (PFS)&lt;/TD&gt;&lt;TD&gt;No&lt;/TD&gt;&lt;TD&gt;Yes (DH Group1, 2, 5, 14, 24)&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Dead Peer Detection&lt;/TD&gt;&lt;TD&gt;Not supported&lt;/TD&gt;&lt;TD&gt;Supported&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;After doing all this tunnel still stable for the past 3 days.&lt;/P&gt;&lt;P&gt;You can clear the tunnel couple times to see if everything is working correctly:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;gt; clear vpn ike-sa gateway (for IKE Tunnel)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;gt; clear vpn ipsec-sa tunnel (for CHILD_SA)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope it helps!&lt;/P&gt;</description>
      <pubDate>Thu, 21 Jul 2016 21:40:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-to-azure-dropouts/m-p/99201#M44170</guid>
      <dc:creator>TranceforLife</dc:creator>
      <dc:date>2016-07-21T21:40:56Z</dc:date>
    </item>
    <item>
      <title>Re: VPN to Azure dropouts</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-to-azure-dropouts/m-p/99365#M44175</link>
      <description>&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Dropout for a couple of minutes" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/4914i004A30AE72A3D48E/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Dropout.JPG" alt="Dropout.JPG" /&gt;&lt;/span&gt;﻿&lt;/P&gt;</description>
      <pubDate>Fri, 22 Jul 2016 04:25:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-to-azure-dropouts/m-p/99365#M44175</guid>
      <dc:creator>dmann2</dc:creator>
      <dc:date>2016-07-22T04:25:38Z</dc:date>
    </item>
    <item>
      <title>Re: VPN to Azure dropouts</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-to-azure-dropouts/m-p/99377#M44176</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The first thing I have noticed that you Palo&amp;nbsp;device not in the "Passive" mode. Try&amp;nbsp;to configure/modify config using my settings and get back, please.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;All the best&lt;/P&gt;</description>
      <pubDate>Fri, 22 Jul 2016 10:57:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-to-azure-dropouts/m-p/99377#M44176</guid>
      <dc:creator>TranceforLife</dc:creator>
      <dc:date>2016-07-22T10:57:48Z</dc:date>
    </item>
    <item>
      <title>Re: VPN to Azure dropouts</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-to-azure-dropouts/m-p/99682#M44209</link>
      <description>&lt;P&gt;I noticed that first log entry myself as the PAN tries to start the SA negotiation as intitator but it is definitely in passive mode.&lt;/P&gt;</description>
      <pubDate>Sun, 24 Jul 2016 22:17:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-to-azure-dropouts/m-p/99682#M44209</guid>
      <dc:creator>dmann2</dc:creator>
      <dc:date>2016-07-24T22:17:12Z</dc:date>
    </item>
    <item>
      <title>Re: VPN to Azure dropouts</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-to-azure-dropouts/m-p/99765#M44212</link>
      <description>&lt;P&gt;Did you commit the changes?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="passive.PNG" style="width: 598px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/4929iC0F09F12F30D05E1/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="passive.PNG" alt="passive.PNG" /&gt;&lt;/span&gt;﻿&lt;/P&gt;</description>
      <pubDate>Mon, 25 Jul 2016 06:59:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-to-azure-dropouts/m-p/99765#M44212</guid>
      <dc:creator>TranceforLife</dc:creator>
      <dc:date>2016-07-25T06:59:21Z</dc:date>
    </item>
    <item>
      <title>Re: VPN to Azure dropouts</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-to-azure-dropouts/m-p/100010#M44234</link>
      <description>&lt;P&gt;It has been passive for quite a while now having commited multiple changes over the last few weeks.&lt;/P&gt;</description>
      <pubDate>Mon, 25 Jul 2016 21:47:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-to-azure-dropouts/m-p/100010#M44234</guid>
      <dc:creator>dmann2</dc:creator>
      <dc:date>2016-07-25T21:47:26Z</dc:date>
    </item>
    <item>
      <title>Re: VPN to Azure dropouts</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-to-azure-dropouts/m-p/100029#M44237</link>
      <description>&lt;P&gt;Very strange. What are the latest logs suggests? Did you try my suggestions? Our VPN still stable, fingers crossed &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 25 Jul 2016 22:51:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-to-azure-dropouts/m-p/100029#M44237</guid>
      <dc:creator>TranceforLife</dc:creator>
      <dc:date>2016-07-25T22:51:15Z</dc:date>
    </item>
    <item>
      <title>Re: VPN to Azure dropouts</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-to-azure-dropouts/m-p/100030#M44238</link>
      <description>&lt;P&gt;Can you take some screenshots of your config and I will match that and see how it goes? I can't find much info on the log entires except what you have already suggested.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If I match what you have it might improve.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for your input.&lt;/P&gt;</description>
      <pubDate>Mon, 25 Jul 2016 22:54:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-to-azure-dropouts/m-p/100030#M44238</guid>
      <dc:creator>dmann2</dc:creator>
      <dc:date>2016-07-25T22:54:15Z</dc:date>
    </item>
    <item>
      <title>Re: VPN to Azure dropouts</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-to-azure-dropouts/m-p/100033#M44239</link>
      <description>&lt;P&gt;Sorry don't&amp;nbsp;have a direct access to the box but my config listed below:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;IKEv2&lt;BR /&gt;Diffie-Hellman Group Group 2&lt;BR /&gt;Authentication Method SHA1&lt;BR /&gt;Encryption Algorithms AES256, 3DES&lt;BR /&gt;Phase 1 Security Association (SA) Lifetime (Time) 28,800 seconds&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;CHILD_SA&lt;BR /&gt;Encryption Algorithms AES128, 3DES&lt;BR /&gt;Authentication Method SHA1&lt;BR /&gt;Phase 2 Security Association (SA) Lifetime (Time) 3,600 seconds&lt;BR /&gt;Perfect Forward Secrecy (PFS) no-pfs&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;</description>
      <pubDate>Mon, 25 Jul 2016 23:09:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-to-azure-dropouts/m-p/100033#M44239</guid>
      <dc:creator>TranceforLife</dc:creator>
      <dc:date>2016-07-25T23:09:56Z</dc:date>
    </item>
    <item>
      <title>Re: VPN to Azure dropouts</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-to-azure-dropouts/m-p/100044#M44241</link>
      <description>&lt;P&gt;It is just passed the 1 hour mark, since making changes to match yours,&amp;nbsp;where we were dropping packets before and the tunnel has stayed up. The negotiation seemed to run smoothly.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Fingers crossed.&lt;/P&gt;</description>
      <pubDate>Tue, 26 Jul 2016 00:28:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-to-azure-dropouts/m-p/100044#M44241</guid>
      <dc:creator>dmann2</dc:creator>
      <dc:date>2016-07-26T00:28:13Z</dc:date>
    </item>
    <item>
      <title>Re: VPN to Azure dropouts</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-to-azure-dropouts/m-p/100122#M44243</link>
      <description>&lt;P&gt;It looks as though it is dropping 4 or 5 packets every hour or so.&lt;/P&gt;</description>
      <pubDate>Tue, 26 Jul 2016 03:57:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-to-azure-dropouts/m-p/100122#M44243</guid>
      <dc:creator>dmann2</dc:creator>
      <dc:date>2016-07-26T03:57:31Z</dc:date>
    </item>
    <item>
      <title>Re: VPN to Azure dropouts</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-to-azure-dropouts/m-p/100188#M44245</link>
      <description>&lt;P&gt;I am not sure but it could be because&amp;nbsp;of the tunnel rekeying. But l don't&amp;nbsp;know if 4-5packets acceptable or not&lt;/P&gt;</description>
      <pubDate>Tue, 26 Jul 2016 06:47:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-to-azure-dropouts/m-p/100188#M44245</guid>
      <dc:creator>TranceforLife</dc:creator>
      <dc:date>2016-07-26T06:47:20Z</dc:date>
    </item>
    <item>
      <title>Re: VPN to Azure dropouts</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-to-azure-dropouts/m-p/100196#M44246</link>
      <description>&lt;P&gt;More info&amp;nbsp;here:&lt;/P&gt;&lt;P&gt;&lt;A href="https://tools.ietf.org/html/draft-jenkins-ipsec-rekeying-03#section-2.2.1.2" target="_blank"&gt;https://tools.ietf.org/html/draft-jenkins-ipsec-rekeying-03#section-2.2.1.2&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 26 Jul 2016 07:07:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-to-azure-dropouts/m-p/100196#M44246</guid>
      <dc:creator>TranceforLife</dc:creator>
      <dc:date>2016-07-26T07:07:41Z</dc:date>
    </item>
    <item>
      <title>Re: VPN to Azure dropouts</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-to-azure-dropouts/m-p/100625#M44267</link>
      <description>&lt;P&gt;A bit more info for anyone watching.&lt;/P&gt;&lt;P&gt;It doesn't happen every time the tunnel is re-negotiated (every hour). In some cases there are no dropped packets. At various times I get the following sequence of events. The dropped packets seem to occur following these events. There is around a 10 second period of dropped packets between the event "IKEV2 IKE SA is down as determined by DPD" and the successful re-negotiation.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="dpd.JPG" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/4961i1BA91D254225C297/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="dpd.JPG" alt="dpd.JPG" /&gt;&lt;/span&gt;﻿&lt;/P&gt;&lt;P&gt;I'm not sure why it is starting a negotiation as initiator when in passive mode.&lt;/P&gt;&lt;P&gt;There is no setting for DPD when in "IKEV2 only mode" on the IKE Gateway.&lt;/P&gt;</description>
      <pubDate>Wed, 27 Jul 2016 01:36:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-to-azure-dropouts/m-p/100625#M44267</guid>
      <dc:creator>dmann2</dc:creator>
      <dc:date>2016-07-27T01:36:04Z</dc:date>
    </item>
    <item>
      <title>Re: VPN to Azure dropouts</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-to-azure-dropouts/m-p/100699#M44269</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;DPD it is actually for IKEv1, Liveness check is a new term for IKEv2. Please disable this future:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="liveness check.PNG" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/4966i79C16147A622FC36/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="liveness check.PNG" alt="liveness check.PNG" /&gt;&lt;/span&gt;﻿&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.paloaltonetworks.com/documentation/70/pan-os/pan-os/vpns/site-to-site-vpn-concepts" target="_blank"&gt;https://www.paloaltonetworks.com/documentation/70/pan-os/pan-os/vpns/site-to-site-vpn-concepts&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Just to confirm you do have a security policy configured as &amp;nbsp;bi-directional&amp;nbsp;for Azure peer.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Good question why it is still initiating a tunnel&amp;nbsp;when in passive mode.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;</description>
      <pubDate>Wed, 27 Jul 2016 06:59:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-to-azure-dropouts/m-p/100699#M44269</guid>
      <dc:creator>TranceforLife</dc:creator>
      <dc:date>2016-07-27T06:59:57Z</dc:date>
    </item>
    <item>
      <title>Re: VPN to Azure dropouts</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-to-azure-dropouts/m-p/100773#M44286</link>
      <description>&lt;P&gt;I definitely have the Liveness box unchecked on the IKE gateway but when I look at the window that lists the IKE Gateways under Liveness for this gateway it has "default".&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Your info on liveness check certainly&amp;nbsp;describes what is happening according to the log entries.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Security policies are good.&lt;/P&gt;</description>
      <pubDate>Wed, 27 Jul 2016 23:37:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-to-azure-dropouts/m-p/100773#M44286</guid>
      <dc:creator>dmann2</dc:creator>
      <dc:date>2016-07-27T23:37:32Z</dc:date>
    </item>
    <item>
      <title>Re: VPN to Azure dropouts</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-to-azure-dropouts/m-p/100817#M44294</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Something weird &amp;nbsp;happening &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; When the&amp;nbsp;passive mode is enabled, Palo still initiating a VPN tunnel or when Liveness check disabled it is still tear down the tunnel. I am confused ))) Please post the Ike Gateway screen shot and the output of the ikemgr.log:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;gt;&amp;nbsp;tail lines 200 mp-log ikemgr.log&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;</description>
      <pubDate>Thu, 28 Jul 2016 15:07:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-to-azure-dropouts/m-p/100817#M44294</guid>
      <dc:creator>TranceforLife</dc:creator>
      <dc:date>2016-07-28T15:07:44Z</dc:date>
    </item>
    <item>
      <title>Re: VPN to Azure dropouts</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-to-azure-dropouts/m-p/100849#M44301</link>
      <description>&lt;P&gt;Yes weird.&lt;/P&gt;&lt;P&gt;It seems I cant attach a txt file so I''l copy the log here.&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Gateway.JPG" style="width: 601px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/5001i147E1BE876920D21/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Gateway.JPG" alt="Gateway.JPG" /&gt;&lt;/span&gt;﻿&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Gateway2.JPG" style="width: 599px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/5000iC805FAE32B579A92/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Gateway2.JPG" alt="Gateway2.JPG" /&gt;&lt;/span&gt;﻿&lt;/P&gt;&lt;P&gt;I think 3:19:42 to 3:19:58 in the first re-negotiation in this log&amp;nbsp;is the time where It would drop packets.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2016-07-29 03:14:22 [PROTO_NOTIFY]: ====&amp;gt; IKEv2 CHILD SA NEGOTIATION STARTED AS INITIATOR, rekey &amp;lt;====&lt;BR /&gt;====&amp;gt; Initiated SA: 138.44.5.6[500]-13.75.156.231[500] message id:0x00000000 parent SN:465 &amp;lt;====&lt;BR /&gt;2016-07-29 03:19:41 [PROTO_ERR]: 465:138.44.5.6[500] - 13.75.156.231[500]:(nil):retransmission count exceeded the limit&lt;BR /&gt;2016-07-29 03:19:41 [INFO]: 465:138.44.5.6[500] - 13.75.156.231[500]:(nil):aborting IKEv2 SA Azure-IKE-Gateway:465&lt;BR /&gt;2016-07-29 03:19:41 [INFO]: SADB_DELETE ul_proto=255 src=13.75.156.231[0] dst=138.44.5.6[0] satype=ESP spi=0xBB1B49E4&lt;BR /&gt;2016-07-29 03:19:41 [INFO]: received PFKEY_DELETE seq=0 satype=ESP spi=0xBB1B49E4&lt;BR /&gt;2016-07-29 03:19:41 [PROTO_NOTIFY]: ====&amp;gt; IPSEC KEY DELETED &amp;lt;====&lt;BR /&gt;====&amp;gt; Deleted SA: 138.44.5.6[500]-13.75.156.231[500] SPI:0xBB1B49E4/0x2D0DC3C4 &amp;lt;====&lt;BR /&gt;2016-07-29 03:19:41 [INFO]: SADB_DELETE ul_proto=255 src=138.44.5.6[0] dst=13.75.156.231[0] satype=ESP spi=0x2D0DC3C4&lt;BR /&gt;2016-07-29 03:19:41 [INFO]: received PFKEY_DELETE seq=0 satype=ESP spi=0x2D0DC3C4&lt;BR /&gt;2016-07-29 03:19:41.376 +1000 IKEv2 liveness {Azure-IKE-Gateway:465-R}: DPD down, rekey vpn tunnel &amp;lt;Azure-IPsec-Tunnel(Azure-IKE-Gateway)&amp;gt;, SA state ESTABLISHED&lt;BR /&gt;2016-07-29 03:19:41 [INFO]: passive mode is specified for IKE gateway Azure-IKE-Gateway.&lt;BR /&gt;2016-07-29 03:19:42 [INFO]: keymirror del start ----------------&lt;BR /&gt;2016-07-29 03:19:42 [INFO]: keymirror del for gw 1, tn 1, selfSPI BB1B49E4, retcode 0.&lt;BR /&gt;2016-07-29 03:19:58 [PROTO_WARN]: 0:138.44.5.6[500] - 13.75.156.231[500]:0x8fe7ba0:message to a nonexistent ike_sa&lt;BR /&gt;2016-07-29 03:19:59 [PROTO_WARN]: 0:138.44.5.6[500] - 13.75.156.231[500]:0x8efc240:message to a nonexistent ike_sa&lt;BR /&gt;2016-07-29 03:20:00 [PROTO_WARN]: 0:138.44.5.6[500] - 13.75.156.231[500]:0x8f13fa0:message to a nonexistent ike_sa&lt;BR /&gt;2016-07-29 03:20:01 [PROTO_WARN]: 0:138.44.5.6[500] - 13.75.156.231[500]:0x8efc240:message to a nonexistent ike_sa&lt;BR /&gt;2016-07-29 03:20:05 [PROTO_NOTIFY]: ====&amp;gt; IKEv2 IKE SA NEGOTIATION STARTED AS RESPONDER, non-rekey &amp;lt;====&lt;BR /&gt;====&amp;gt; Initiated SA: 138.44.5.6[500]-13.75.156.231[500] SPI:8200c742bac96fe4:290a5d6bbc4c4ccf SN:466 &amp;lt;====&lt;BR /&gt;2016-07-29 03:20:05 [PROTO_WARN]: 466:138.44.5.6[500] - 13.75.156.231[500]:0x8f13fa0:ignoring unauthenticated notify payload (NAT_DETECTION_SOURCE_IP)&lt;BR /&gt;2016-07-29 03:20:05 [PROTO_WARN]: 466:138.44.5.6[500] - 13.75.156.231[500]:0x8f13fa0:ignoring unauthenticated notify payload (NAT_DETECTION_DESTINATION_IP)&lt;BR /&gt;2016-07-29 03:20:05 [PROTO_WARN]: 466:138.44.5.6[500] - 13.75.156.231[500]:0x8f13fa0:vendor id payload ignored&lt;BR /&gt;2016-07-29 03:20:05 [PROTO_WARN]: 466:138.44.5.6[500] - 13.75.156.231[500]:0x8f13fa0:vendor id payload ignored&lt;BR /&gt;2016-07-29 03:20:05 [PROTO_WARN]: 466:138.44.5.6[500] - 13.75.156.231[500]:0x8f13fa0:vendor id payload ignored&lt;BR /&gt;2016-07-29 03:20:05 [PROTO_WARN]: 466:138.44.5.6[500] - 13.75.156.231[500]:0x8f13fa0:vendor id payload ignored&lt;BR /&gt;2016-07-29 03:20:05 [INFO]: 466:138.44.5.6[500] - 13.75.156.231[500]:0x8fe64c8:authentication result: success&lt;BR /&gt;2016-07-29 03:20:05 [PROTO_NOTIFY]: ====&amp;gt; IKEv2 CHILD SA NEGOTIATION STARTED AS RESPONDER, non-rekey &amp;lt;====&lt;BR /&gt;====&amp;gt; Initiated SA: 138.44.5.6[500]-13.75.156.231[500] message id:0x00000001 parent SN:466 &amp;lt;====&lt;BR /&gt;2016-07-29 03:20:05 [INTERNAL_WARN]: selector Azure-IPsec-Tunnel(Azure-IKE-Gateway)_out src is ambiguous, using the first one of the expanded addresses&lt;BR /&gt;2016-07-29 03:20:05 [INTERNAL_WARN]: selector Azure-IPsec-Tunnel(Azure-IKE-Gateway)_out dst is ambiguous, using the first one of the expanded addresses&lt;BR /&gt;2016-07-29 03:20:05.294 +1000 IKEv2 TS {Azure-IKE-Gateway:466-R}: TS matching for configured selector Azure-IPsec-Tunnel(Azure-IKE-Gateway)_out 0.0.0.0[0]/0-0.0.0.0[0]/0 proto 0&lt;BR /&gt;2016-07-29 03:20:05.294 +1000 .. check local TS (num 2, TS0 is not specific) against selector 0:0.0.0.0[0]/0&lt;BR /&gt;2016-07-29 03:20:05.294 +1000 ... TS 0: ts type mismtach, selector is not IPv6&lt;BR /&gt;2016-07-29 03:20:05.294 +1000 ... TS 1: exact match&lt;BR /&gt;2016-07-29 03:20:05.294 +1000 ... result: local TS = 0.0.0.0[0]/0&lt;BR /&gt;2016-07-29 03:20:05.294 +1000 .. check remote TS (num 2, TS0 is not specific) against selector 0:0.0.0.0[0]/0&lt;BR /&gt;2016-07-29 03:20:05.294 +1000 ... TS 0: ts type mismtach, selector is not IPv6&lt;BR /&gt;2016-07-29 03:20:05.294 +1000 ... TS 1: exact match&lt;BR /&gt;2016-07-29 03:20:05.294 +1000 ... result: remote TS = 0.0.0.0[0]/0&lt;BR /&gt;2016-07-29 03:20:05.294 +1000 - IKEv2 TS {Azure-IKE-Gateway:466-R}: TS matching result: TS_l match(=), TS_r match(=) *&lt;BR /&gt;2016-07-29 03:20:05.294 +1000 *** IKEv2 TS {Azure-IKE-Gateway:466-R}: selector chosen Azure-IPsec-Tunnel(Azure-IKE-Gateway)_out: tid 1&lt;BR /&gt;2016-07-29 03:20:05 [INFO]: SADB_UPDATE ul_proto=255 src=13.75.156.231[500] dst=138.44.5.6[500] satype=ESP samode=tunl spi=0xA445D650 authtype=SHA1 enctype=3DES enclen=24 lifetime soft time=2965 bytes=0 hard time=3600 bytes=0&lt;BR /&gt;2016-07-29 03:20:05 [INFO]: SADB_ADD ul_proto=255 src=138.44.5.6[500] dst=13.75.156.231[500] satype=ESP samode=tunl spi=0x9969D73C authtype=SHA1 enctype=3DES enclen=24 lifetime soft time=3175 bytes=0 hard time=3600 bytes=0&lt;BR /&gt;2016-07-29 03:20:05.294 +1000 sadb ts: port 0:65535 IP 0.0.0.0-&amp;gt;255.255.255.255 proto:0 len:16&lt;BR /&gt;2016-07-29 03:20:05.294 +1000 sadb ts: port 0:65535 IP 0.0.0.0-&amp;gt;255.255.255.255 proto:0 len:16&lt;BR /&gt;2016-07-29 03:20:05 [PROTO_NOTIFY]: ====&amp;gt; IPSEC KEY INSTALLATION SUCCEEDED &amp;lt;====&lt;BR /&gt;====&amp;gt; Installed SA: 138.44.5.6[500]-13.75.156.231[500] SPI:0xA445D650/0x9969D73C lifetime 3600 Sec lifesize unlimited &amp;lt;====&lt;BR /&gt;2016-07-29 03:20:05 [PROTO_NOTIFY]: ====&amp;gt; IKEv2 CHILD SA NEGOTIATION SUCCEEDED AS RESPONDER, non-rekey &amp;lt;====&lt;BR /&gt;====&amp;gt; Established SA: 138.44.5.6[500]-13.75.156.231[500] message id:0x00000001, SPI:0xA445D650/0x9969D73C parent SN:466 &amp;lt;====&lt;BR /&gt;2016-07-29 03:20:05 [PROTO_NOTIFY]: ====&amp;gt; IKEv2 IKE SA NEGOTIATION SUCCEEDED AS RESPONDER, non-rekey &amp;lt;====&lt;BR /&gt;====&amp;gt; Established SA: 138.44.5.6[500]-13.75.156.231[500] SPI:8200c742bac96fe4:290a5d6bbc4c4ccf SN:466 lifetime 28800 Sec &amp;lt;====&lt;BR /&gt;2016-07-29 03:20:05 [INFO]: keymirror add start ++++++++++++++++&lt;BR /&gt;2016-07-29 03:20:05 [INFO]: keymirror add for gw 0x1, tn 1, selfSPI A445D650, retcode 0.&lt;BR /&gt;2016-07-29 04:12:59 [PROTO_NOTIFY]: ====&amp;gt; IKEv2 CHILD SA NEGOTIATION STARTED AS INITIATOR, rekey &amp;lt;====&lt;BR /&gt;====&amp;gt; Initiated SA: 138.44.5.6[500]-13.75.156.231[500] message id:0x00000000 parent SN:466 &amp;lt;====&lt;BR /&gt;2016-07-29 04:15:53 [PROTO_NOTIFY]: ====&amp;gt; IKEv2 CHILD SA NEGOTIATION STARTED AS RESPONDER, rekey &amp;lt;====&lt;BR /&gt;====&amp;gt; Initiated SA: 138.44.5.6[500]-13.75.156.231[500] message id:0x0000000C parent SN:466 &amp;lt;====&lt;BR /&gt;2016-07-29 04:15:53 [INTERNAL_WARN]: selector Azure-IPsec-Tunnel(Azure-IKE-Gateway)_out src is ambiguous, using the first one of the expanded addresses&lt;BR /&gt;2016-07-29 04:15:53 [INTERNAL_WARN]: selector Azure-IPsec-Tunnel(Azure-IKE-Gateway)_out dst is ambiguous, using the first one of the expanded addresses&lt;BR /&gt;2016-07-29 04:15:53.175 +1000 IKEv2 TS {Azure-IKE-Gateway:466-R}: TS matching for configured selector Azure-IPsec-Tunnel(Azure-IKE-Gateway)_out 0.0.0.0[0]/0-0.0.0.0[0]/0 proto 0&lt;BR /&gt;2016-07-29 04:15:53.175 +1000 .. check local TS (num 2, TS0 is not specific) against selector 0:0.0.0.0[0]/0&lt;BR /&gt;2016-07-29 04:15:53.175 +1000 ... TS 0: ts type mismtach, selector is not IPv6&lt;BR /&gt;2016-07-29 04:15:53.175 +1000 ... TS 1: exact match&lt;BR /&gt;2016-07-29 04:15:53.175 +1000 ... result: local TS = 0.0.0.0[0]/0&lt;BR /&gt;2016-07-29 04:15:53.175 +1000 .. check remote TS (num 2, TS0 is not specific) against selector 0:0.0.0.0[0]/0&lt;BR /&gt;2016-07-29 04:15:53.175 +1000 ... TS 0: ts type mismtach, selector is not IPv6&lt;BR /&gt;2016-07-29 04:15:53.175 +1000 ... TS 1: exact match&lt;BR /&gt;2016-07-29 04:15:53.175 +1000 ... result: remote TS = 0.0.0.0[0]/0&lt;BR /&gt;2016-07-29 04:15:53.175 +1000 - IKEv2 TS {Azure-IKE-Gateway:466-R}: TS matching result: TS_l match(=), TS_r match(=) *&lt;BR /&gt;2016-07-29 04:15:53.175 +1000 *** IKEv2 TS {Azure-IKE-Gateway:466-R}: selector chosen Azure-IPsec-Tunnel(Azure-IKE-Gateway)_out: tid 1&lt;BR /&gt;2016-07-29 04:15:53 [INFO]: SADB_UPDATE ul_proto=255 src=13.75.156.231[500] dst=138.44.5.6[500] satype=ESP samode=tunl spi=0xB9AC02C2 authtype=SHA1 enctype=3DES enclen=24 lifetime soft time=3140 bytes=0 hard time=3600 bytes=0&lt;BR /&gt;2016-07-29 04:15:53 [INFO]: SADB_ADD ul_proto=255 src=138.44.5.6[500] dst=13.75.156.231[500] satype=ESP samode=tunl spi=0x946BF430 authtype=SHA1 enctype=3DES enclen=24 lifetime soft time=3177 bytes=0 hard time=3600 bytes=0&lt;BR /&gt;2016-07-29 04:15:53.175 +1000 sadb ts: port 0:65535 IP 0.0.0.0-&amp;gt;255.255.255.255 proto:0 len:16&lt;BR /&gt;2016-07-29 04:15:53.175 +1000 sadb ts: port 0:65535 IP 0.0.0.0-&amp;gt;255.255.255.255 proto:0 len:16&lt;BR /&gt;2016-07-29 04:15:53 [PROTO_NOTIFY]: ====&amp;gt; IPSEC KEY INSTALLATION SUCCEEDED &amp;lt;====&lt;BR /&gt;====&amp;gt; Installed SA: 138.44.5.6[500]-13.75.156.231[500] SPI:0xB9AC02C2/0x946BF430 lifetime 3600 Sec lifesize unlimited &amp;lt;====&lt;BR /&gt;2016-07-29 04:15:53 [PROTO_NOTIFY]: ====&amp;gt; IKEv2 CHILD SA NEGOTIATION SUCCEEDED AS RESPONDER, rekey &amp;lt;====&lt;BR /&gt;====&amp;gt; Established SA: 138.44.5.6[500]-13.75.156.231[500] message id:0x0000000C, SPI:0xB9AC02C2/0x946BF430 parent SN:466 &amp;lt;====&lt;BR /&gt;2016-07-29 04:15:53 [INFO]: keymirror add start ++++++++++++++++&lt;BR /&gt;2016-07-29 04:15:53 [INFO]: keymirror add for gw 0x1, tn 1, selfSPI B9AC02C2, retcode 0.&lt;BR /&gt;2016-07-29 04:15:53 [INFO]: 466:138.44.5.6[500] - 13.75.156.231[500]:(nil):delete proto ESP spi 0x9969D73C&lt;BR /&gt;2016-07-29 04:15:53 [PROTO_NOTIFY]: ====&amp;gt; IPSEC KEY DELETED &amp;lt;====&lt;BR /&gt;====&amp;gt; Deleted SA: 138.44.5.6[500]-13.75.156.231[500] SPI:0xA445D650/0x9969D73C &amp;lt;====&lt;BR /&gt;2016-07-29 04:15:53 [INFO]: SADB_DELETE ul_proto=255 src=138.44.5.6[0] dst=13.75.156.231[0] satype=ESP spi=0x9969D73C&lt;BR /&gt;2016-07-29 04:15:53 [INFO]: received PFKEY_DELETE seq=0 satype=ESP spi=0x9969D73C&lt;BR /&gt;2016-07-29 04:15:53 [INFO]: SADB_DELETE ul_proto=255 src=13.75.156.231[0] dst=138.44.5.6[0] satype=ESP spi=0xA445D650&lt;BR /&gt;2016-07-29 04:15:53 [INFO]: received PFKEY_DELETE seq=0 satype=ESP spi=0xA445D650&lt;BR /&gt;2016-07-29 04:15:53 [INFO]: keymirror del start ----------------&lt;BR /&gt;2016-07-29 04:15:53 [INFO]: keymirror del for gw 1, tn 1, selfSPI A445D650, retcode 0.&lt;BR /&gt;2016-07-29 04:16:10 [PROTO_ERR]: 466:138.44.5.6[500] - 13.75.156.231[500]:(nil):received Notify payload protocol 0 type 12345&lt;BR /&gt;2016-07-29 04:16:10 [PROTO_NOTIFY]: ====&amp;gt; IKEv2 CHILD SA NEGOTIATION FAILED AS INITIATOR, rekey &amp;lt;====&lt;BR /&gt;====&amp;gt; Failed SA: 138.44.5.6[500]-13.75.156.231[500] message id:0x00000000 parent SN:466 &amp;lt;==== Error code 111&lt;BR /&gt;2016-07-29 05:08:49 [PROTO_NOTIFY]: ====&amp;gt; IKEv2 CHILD SA NEGOTIATION STARTED AS INITIATOR, rekey &amp;lt;====&lt;BR /&gt;====&amp;gt; Initiated SA: 138.44.5.6[500]-13.75.156.231[500] message id:0x00000000 parent SN:466 &amp;lt;====&lt;BR /&gt;2016-07-29 05:11:38 [PROTO_NOTIFY]: ====&amp;gt; IKEv2 CHILD SA NEGOTIATION STARTED AS RESPONDER, rekey &amp;lt;====&lt;BR /&gt;====&amp;gt; Initiated SA: 138.44.5.6[500]-13.75.156.231[500] message id:0x00000012 parent SN:466 &amp;lt;====&lt;BR /&gt;2016-07-29 05:11:38 [INTERNAL_WARN]: selector Azure-IPsec-Tunnel(Azure-IKE-Gateway)_out src is ambiguous, using the first one of the expanded addresses&lt;BR /&gt;2016-07-29 05:11:38 [INTERNAL_WARN]: selector Azure-IPsec-Tunnel(Azure-IKE-Gateway)_out dst is ambiguous, using the first one of the expanded addresses&lt;BR /&gt;2016-07-29 05:11:38.501 +1000 IKEv2 TS {Azure-IKE-Gateway:466-R}: TS matching for configured selector Azure-IPsec-Tunnel(Azure-IKE-Gateway)_out 0.0.0.0[0]/0-0.0.0.0[0]/0 proto 0&lt;BR /&gt;2016-07-29 05:11:38.501 +1000 .. check local TS (num 2, TS0 is not specific) against selector 0:0.0.0.0[0]/0&lt;BR /&gt;2016-07-29 05:11:38.501 +1000 ... TS 0: ts type mismtach, selector is not IPv6&lt;BR /&gt;2016-07-29 05:11:38.501 +1000 ... TS 1: exact match&lt;BR /&gt;2016-07-29 05:11:38.501 +1000 ... result: local TS = 0.0.0.0[0]/0&lt;BR /&gt;2016-07-29 05:11:38.501 +1000 .. check remote TS (num 2, TS0 is not specific) against selector 0:0.0.0.0[0]/0&lt;BR /&gt;2016-07-29 05:11:38.501 +1000 ... TS 0: ts type mismtach, selector is not IPv6&lt;BR /&gt;2016-07-29 05:11:38.501 +1000 ... TS 1: exact match&lt;BR /&gt;2016-07-29 05:11:38.501 +1000 ... result: remote TS = 0.0.0.0[0]/0&lt;BR /&gt;2016-07-29 05:11:38.501 +1000 - IKEv2 TS {Azure-IKE-Gateway:466-R}: TS matching result: TS_l match(=), TS_r match(=) *&lt;BR /&gt;2016-07-29 05:11:38.501 +1000 *** IKEv2 TS {Azure-IKE-Gateway:466-R}: selector chosen Azure-IPsec-Tunnel(Azure-IKE-Gateway)_out: tid 1&lt;BR /&gt;2016-07-29 05:11:38 [INFO]: SADB_UPDATE ul_proto=255 src=13.75.156.231[500] dst=138.44.5.6[500] satype=ESP samode=tunl spi=0xF30D6381 authtype=SHA1 enctype=3DES enclen=24 lifetime soft time=3203 bytes=0 hard time=3600 bytes=0&lt;BR /&gt;2016-07-29 05:11:38 [INFO]: SADB_ADD ul_proto=255 src=138.44.5.6[500] dst=13.75.156.231[500] satype=ESP samode=tunl spi=0xAE2BA4DC authtype=SHA1 enctype=3DES enclen=24 lifetime soft time=2913 bytes=0 hard time=3600 bytes=0&lt;BR /&gt;2016-07-29 05:11:38.501 +1000 sadb ts: port 0:65535 IP 0.0.0.0-&amp;gt;255.255.255.255 proto:0 len:16&lt;BR /&gt;2016-07-29 05:11:38.501 +1000 sadb ts: port 0:65535 IP 0.0.0.0-&amp;gt;255.255.255.255 proto:0 len:16&lt;BR /&gt;2016-07-29 05:11:38 [PROTO_NOTIFY]: ====&amp;gt; IPSEC KEY INSTALLATION SUCCEEDED &amp;lt;====&lt;BR /&gt;====&amp;gt; Installed SA: 138.44.5.6[500]-13.75.156.231[500] SPI:0xF30D6381/0xAE2BA4DC lifetime 3600 Sec lifesize unlimited &amp;lt;====&lt;BR /&gt;2016-07-29 05:11:38 [PROTO_NOTIFY]: ====&amp;gt; IKEv2 CHILD SA NEGOTIATION SUCCEEDED AS RESPONDER, rekey &amp;lt;====&lt;BR /&gt;====&amp;gt; Established SA: 138.44.5.6[500]-13.75.156.231[500] message id:0x00000012, SPI:0xF30D6381/0xAE2BA4DC parent SN:466 &amp;lt;====&lt;BR /&gt;2016-07-29 05:11:38 [INFO]: keymirror add start ++++++++++++++++&lt;BR /&gt;2016-07-29 05:11:38 [INFO]: keymirror add for gw 0x1, tn 1, selfSPI F30D6381, retcode 0.&lt;BR /&gt;2016-07-29 05:11:38 [INFO]: 466:138.44.5.6[500] - 13.75.156.231[500]:(nil):delete proto ESP spi 0x946BF430&lt;BR /&gt;2016-07-29 05:11:38 [PROTO_NOTIFY]: ====&amp;gt; IPSEC KEY DELETED &amp;lt;====&lt;BR /&gt;====&amp;gt; Deleted SA: 138.44.5.6[500]-13.75.156.231[500] SPI:0xB9AC02C2/0x946BF430 &amp;lt;====&lt;BR /&gt;2016-07-29 05:11:38 [INFO]: SADB_DELETE ul_proto=255 src=138.44.5.6[0] dst=13.75.156.231[0] satype=ESP spi=0x946BF430&lt;BR /&gt;2016-07-29 05:11:38 [INFO]: received PFKEY_DELETE seq=0 satype=ESP spi=0x946BF430&lt;BR /&gt;2016-07-29 05:11:38 [INFO]: SADB_DELETE ul_proto=255 src=13.75.156.231[0] dst=138.44.5.6[0] satype=ESP spi=0xB9AC02C2&lt;BR /&gt;2016-07-29 05:11:38 [INFO]: received PFKEY_DELETE seq=0 satype=ESP spi=0xB9AC02C2&lt;BR /&gt;2016-07-29 05:11:38 [INFO]: keymirror del start ----------------&lt;BR /&gt;2016-07-29 05:11:38 [INFO]: keymirror del for gw 1, tn 1, selfSPI B9AC02C2, retcode 0.&lt;BR /&gt;2016-07-29 05:12:00 [PROTO_ERR]: 466:138.44.5.6[500] - 13.75.156.231[500]:(nil):received Notify payload protocol 0 type 12345&lt;BR /&gt;2016-07-29 05:12:00 [PROTO_NOTIFY]: ====&amp;gt; IKEv2 CHILD SA NEGOTIATION FAILED AS INITIATOR, rekey &amp;lt;====&lt;BR /&gt;====&amp;gt; Failed SA: 138.44.5.6[500]-13.75.156.231[500] message id:0x00000001 parent SN:466 &amp;lt;==== Error code 111&lt;BR /&gt;2016-07-29 06:00:11 [PROTO_NOTIFY]: ====&amp;gt; IKEv2 CHILD SA NEGOTIATION STARTED AS INITIATOR, rekey &amp;lt;====&lt;BR /&gt;====&amp;gt; Initiated SA: 138.44.5.6[500]-13.75.156.231[500] message id:0x00000000 parent SN:466 &amp;lt;====&lt;BR /&gt;2016-07-29 06:00:11 [INFO]: SADB_UPDATE ul_proto=255 src=13.75.156.231[500] dst=138.44.5.6[500] satype=ESP samode=tunl spi=0xD8014654 authtype=SHA1 enctype=3DES enclen=24 lifetime soft time=3230 bytes=0 hard time=3600 bytes=0&lt;BR /&gt;2016-07-29 06:00:11 [INFO]: SADB_ADD ul_proto=255 src=138.44.5.6[500] dst=13.75.156.231[500] satype=ESP samode=tunl spi=0xFF5EF270 authtype=SHA1 enctype=3DES enclen=24 lifetime soft time=3009 bytes=0 hard time=3600 bytes=0&lt;BR /&gt;2016-07-29 06:00:11.389 +1000 sadb ts: port 0:65535 IP 0.0.0.0-&amp;gt;255.255.255.255 proto:0 len:16&lt;BR /&gt;2016-07-29 06:00:11.389 +1000 sadb ts: port 0:65535 IP 0.0.0.0-&amp;gt;255.255.255.255 proto:0 len:16&lt;BR /&gt;2016-07-29 06:00:11 [PROTO_NOTIFY]: ====&amp;gt; IPSEC KEY INSTALLATION SUCCEEDED &amp;lt;====&lt;BR /&gt;====&amp;gt; Installed SA: 138.44.5.6[500]-13.75.156.231[500] SPI:0xD8014654/0xFF5EF270 lifetime 3600 Sec lifesize unlimited &amp;lt;====&lt;BR /&gt;2016-07-29 06:00:11 [PROTO_NOTIFY]: ====&amp;gt; IKEv2 CHILD SA NEGOTIATION SUCCEEDED AS INITIATOR, rekey &amp;lt;====&lt;BR /&gt;====&amp;gt; Established SA: 138.44.5.6[500]-13.75.156.231[500] message id:0x00000002, SPI:0xD8014654/0xFF5EF270 parent SN:466 &amp;lt;====&lt;BR /&gt;2016-07-29 06:00:11 [INFO]: keymirror add start ++++++++++++++++&lt;BR /&gt;2016-07-29 06:00:11 [INFO]: keymirror add for gw 0x1, tn 1, selfSPI D8014654, retcode 0.&lt;BR /&gt;2016-07-29 06:00:11 [INFO]: keymirror del start ----------------&lt;BR /&gt;2016-07-29 06:00:11 [INFO]: keymirror del for gw 1, tn 1, selfSPI F30D6381, retcode 0.&lt;BR /&gt;2016-07-29 06:00:11 [INFO]: SADB_DELETE ul_proto=255 src=13.75.156.231[0] dst=138.44.5.6[0] satype=ESP spi=0xF30D6381&lt;BR /&gt;2016-07-29 06:00:11 [INFO]: received PFKEY_DELETE seq=0 satype=ESP spi=0xF30D6381&lt;BR /&gt;2016-07-29 06:00:11 [PROTO_NOTIFY]: ====&amp;gt; IPSEC KEY DELETED &amp;lt;====&lt;BR /&gt;====&amp;gt; Deleted SA: 138.44.5.6[500]-13.75.156.231[500] SPI:0xF30D6381/0xAE2BA4DC &amp;lt;====&lt;BR /&gt;2016-07-29 06:00:11 [INFO]: SADB_DELETE ul_proto=255 src=138.44.5.6[0] dst=13.75.156.231[0] satype=ESP spi=0xAE2BA4DC&lt;BR /&gt;2016-07-29 06:00:11 [INFO]: received PFKEY_DELETE seq=0 satype=ESP spi=0xAE2BA4DC&lt;BR /&gt;2016-07-29 06:05:11 [INFO]: 466:138.44.5.6[500] - 13.75.156.231[500]:(nil):delete proto ESP spi 0xAE2BA4DC&lt;BR /&gt;2016-07-29 06:05:11 [PROTO_WARN]: 466:138.44.5.6[500] - 13.75.156.231[500]:(nil):can't find sa for proto ESP spi 0xAE2BA4DC&lt;BR /&gt;2016-07-29 06:11:07 [PROTO_NOTIFY]: ====&amp;gt; IKEv2 IKE SA NEGOTIATION STARTED AS RESPONDER, rekey &amp;lt;====&lt;BR /&gt;====&amp;gt; Initiated SA: 138.44.5.6[500]-13.75.156.231[500] SPI:7b6ad57db0e66afd:af6028d3c14c9faa SN:467 &amp;lt;====&lt;BR /&gt;2016-07-29 06:11:07.404 +1000 &amp;gt;&amp;gt;&amp;gt; IKEv2 rekey {Azure-IKE-Gateway:467-R}: adopt children SA from IKE SA 466&lt;BR /&gt;2016-07-29 06:11:07.404 +1000 IKEv2 rekey {Azure-IKE-Gateway:467-R}: child SA 196717 is adopted, tid 1, state MATURE&lt;BR /&gt;2016-07-29 06:11:07 [PROTO_NOTIFY]: ====&amp;gt; IKEv2 IKE SA NEGOTIATION SUCCEEDED AS RESPONDER, rekey &amp;lt;====&lt;BR /&gt;====&amp;gt; Established SA: 138.44.5.6[500]-13.75.156.231[500] SPI:7b6ad57db0e66afd:af6028d3c14c9faa SN:467 lifetime 28800 Sec &amp;lt;====&lt;BR /&gt;2016-07-29 06:11:07 [INFO]: 466:138.44.5.6[500] - 13.75.156.231[500]:(nil):received DELETE IKE_SA&lt;BR /&gt;2016-07-29 06:11:07.420 +1000 IKEv2 {Azure-IKE-Gateway:466-R}: received DELETE IKE_SA, SA state ESTABLISHED, SPI 8200c742bac96fe4:290a5d6bbc4c4ccf&lt;BR /&gt;2016-07-29 06:11:07 [INFO]: 466:138.44.5.6[500] - 13.75.156.231[500]:(nil):aborting IKEv2 SA Azure-IKE-Gateway:466&lt;BR /&gt;2016-07-29 06:50:20 [PROTO_NOTIFY]: ====&amp;gt; IKEv2 CHILD SA NEGOTIATION STARTED AS INITIATOR, rekey &amp;lt;====&lt;BR /&gt;====&amp;gt; Initiated SA: 138.44.5.6[500]-13.75.156.231[500] message id:0x00000000 parent SN:467 &amp;lt;====&lt;BR /&gt;2016-07-29 06:50:20 [INFO]: SADB_UPDATE ul_proto=255 src=13.75.156.231[500] dst=138.44.5.6[500] satype=ESP samode=tunl spi=0xD4531654 authtype=SHA1 enctype=3DES enclen=24 lifetime soft time=3200 bytes=0 hard time=3600 bytes=0&lt;BR /&gt;2016-07-29 06:50:20 [INFO]: SADB_ADD ul_proto=255 src=138.44.5.6[500] dst=13.75.156.231[500] satype=ESP samode=tunl spi=0x58A1452E authtype=SHA1 enctype=3DES enclen=24 lifetime soft time=2997 bytes=0 hard time=3600 bytes=0&lt;BR /&gt;2016-07-29 06:50:20.392 +1000 sadb ts: port 0:65535 IP 0.0.0.0-&amp;gt;255.255.255.255 proto:0 len:16&lt;BR /&gt;2016-07-29 06:50:20.392 +1000 sadb ts: port 0:65535 IP 0.0.0.0-&amp;gt;255.255.255.255 proto:0 len:16&lt;BR /&gt;2016-07-29 06:50:20 [PROTO_NOTIFY]: ====&amp;gt; IPSEC KEY INSTALLATION SUCCEEDED &amp;lt;====&lt;BR /&gt;====&amp;gt; Installed SA: 138.44.5.6[500]-13.75.156.231[500] SPI:0xD4531654/0x58A1452E lifetime 3600 Sec lifesize unlimited &amp;lt;====&lt;BR /&gt;2016-07-29 06:50:20 [PROTO_NOTIFY]: ====&amp;gt; IKEv2 CHILD SA NEGOTIATION SUCCEEDED AS INITIATOR, rekey &amp;lt;====&lt;BR /&gt;====&amp;gt; Established SA: 138.44.5.6[500]-13.75.156.231[500] message id:0x00000000, SPI:0xD4531654/0x58A1452E parent SN:467 &amp;lt;====&lt;BR /&gt;2016-07-29 06:50:20 [INFO]: keymirror add start ++++++++++++++++&lt;BR /&gt;2016-07-29 06:50:20 [INFO]: keymirror add for gw 0x1, tn 1, selfSPI D4531654, retcode 0.&lt;BR /&gt;2016-07-29 06:50:21 [INFO]: keymirror del start ----------------&lt;BR /&gt;2016-07-29 06:50:21 [INFO]: keymirror del for gw 1, tn 1, selfSPI D8014654, retcode 0.&lt;BR /&gt;2016-07-29 06:50:21 [INFO]: SADB_DELETE ul_proto=255 src=13.75.156.231[0] dst=138.44.5.6[0] satype=ESP spi=0xD8014654&lt;BR /&gt;2016-07-29 06:50:21 [INFO]: received PFKEY_DELETE seq=0 satype=ESP spi=0xD8014654&lt;BR /&gt;2016-07-29 06:50:21 [PROTO_NOTIFY]: ====&amp;gt; IPSEC KEY DELETED &amp;lt;====&lt;BR /&gt;====&amp;gt; Deleted SA: 138.44.5.6[500]-13.75.156.231[500] SPI:0xD8014654/0xFF5EF270 &amp;lt;====&lt;BR /&gt;2016-07-29 06:50:21 [INFO]: SADB_DELETE ul_proto=255 src=138.44.5.6[0] dst=13.75.156.231[0] satype=ESP spi=0xFF5EF270&lt;BR /&gt;2016-07-29 06:50:21 [INFO]: received PFKEY_DELETE seq=0 satype=ESP spi=0xFF5EF270&lt;BR /&gt;2016-07-29 06:55:19 [INFO]: 467:138.44.5.6[500] - 13.75.156.231[500]:(nil):delete proto ESP spi 0xFF5EF270&lt;BR /&gt;2016-07-29 06:55:19 [PROTO_WARN]: 467:138.44.5.6[500] - 13.75.156.231[500]:(nil):can't find sa for proto ESP spi 0xFF5EF270&lt;BR /&gt;2016-07-29 07:40:17 [PROTO_NOTIFY]: ====&amp;gt; IKEv2 CHILD SA NEGOTIATION STARTED AS INITIATOR, rekey &amp;lt;====&lt;BR /&gt;====&amp;gt; Initiated SA: 138.44.5.6[500]-13.75.156.231[500] message id:0x00000000 parent SN:467 &amp;lt;====&lt;BR /&gt;2016-07-29 07:40:17 [INFO]: SADB_UPDATE ul_proto=255 src=13.75.156.231[500] dst=138.44.5.6[500] satype=ESP samode=tunl spi=0xC9083D8E authtype=SHA1 enctype=3DES enclen=24 lifetime soft time=3058 bytes=0 hard time=3600 bytes=0&lt;BR /&gt;2016-07-29 07:40:17 [INFO]: SADB_ADD ul_proto=255 src=138.44.5.6[500] dst=13.75.156.231[500] satype=ESP samode=tunl spi=0xDAA11134 authtype=SHA1 enctype=3DES enclen=24 lifetime soft time=2893 bytes=0 hard time=3600 bytes=0&lt;BR /&gt;2016-07-29 07:40:17.390 +1000 sadb ts: port 0:65535 IP 0.0.0.0-&amp;gt;255.255.255.255 proto:0 len:16&lt;BR /&gt;2016-07-29 07:40:17.390 +1000 sadb ts: port 0:65535 IP 0.0.0.0-&amp;gt;255.255.255.255 proto:0 len:16&lt;BR /&gt;2016-07-29 07:40:17 [PROTO_NOTIFY]: ====&amp;gt; IPSEC KEY INSTALLATION SUCCEEDED &amp;lt;====&lt;BR /&gt;====&amp;gt; Installed SA: 138.44.5.6[500]-13.75.156.231[500] SPI:0xC9083D8E/0xDAA11134 lifetime 3600 Sec lifesize unlimited &amp;lt;====&lt;BR /&gt;2016-07-29 07:40:17 [PROTO_NOTIFY]: ====&amp;gt; IKEv2 CHILD SA NEGOTIATION SUCCEEDED AS INITIATOR, rekey &amp;lt;====&lt;BR /&gt;====&amp;gt; Established SA: 138.44.5.6[500]-13.75.156.231[500] message id:0x00000001, SPI:0xC9083D8E/0xDAA11134 parent SN:467 &amp;lt;====&lt;BR /&gt;2016-07-29 07:40:17 [INFO]: keymirror add start ++++++++++++++++&lt;BR /&gt;2016-07-29 07:40:17 [INFO]: keymirror add for gw 0x1, tn 1, selfSPI C9083D8E, retcode 0.&lt;BR /&gt;2016-07-29 07:40:17 [INFO]: keymirror del start ----------------&lt;BR /&gt;2016-07-29 07:40:17 [INFO]: keymirror del for gw 1, tn 1, selfSPI D4531654, retcode 0.&lt;BR /&gt;2016-07-29 07:40:17 [INFO]: SADB_DELETE ul_proto=255 src=13.75.156.231[0] dst=138.44.5.6[0] satype=ESP spi=0xD4531654&lt;BR /&gt;2016-07-29 07:40:17 [INFO]: received PFKEY_DELETE seq=0 satype=ESP spi=0xD4531654&lt;BR /&gt;2016-07-29 07:40:17 [PROTO_NOTIFY]: ====&amp;gt; IPSEC KEY DELETED &amp;lt;====&lt;BR /&gt;====&amp;gt; Deleted SA: 138.44.5.6[500]-13.75.156.231[500] SPI:0xD4531654/0x58A1452E &amp;lt;====&lt;BR /&gt;2016-07-29 07:40:17 [INFO]: SADB_DELETE ul_proto=255 src=138.44.5.6[0] dst=13.75.156.231[0] satype=ESP spi=0x58A1452E&lt;BR /&gt;2016-07-29 07:40:17 [INFO]: received PFKEY_DELETE seq=0 satype=ESP spi=0x58A1452E&lt;BR /&gt;2016-07-29 07:45:14 [INFO]: 467:138.44.5.6[500] - 13.75.156.231[500]:(nil):delete proto ESP spi 0x58A1452E&lt;BR /&gt;2016-07-29 07:45:14 [PROTO_WARN]: 467:138.44.5.6[500] - 13.75.156.231[500]:(nil):can't find sa for proto ESP spi 0x58A1452E&lt;/P&gt;</description>
      <pubDate>Thu, 28 Jul 2016 22:59:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-to-azure-dropouts/m-p/100849#M44301</guid>
      <dc:creator>dmann2</dc:creator>
      <dc:date>2016-07-28T22:59:27Z</dc:date>
    </item>
  </channel>
</rss>

