<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: VPN to Azure dropouts in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-to-azure-dropouts/m-p/101433#M44510</link>
    <description>&lt;P&gt;Update from Support:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Just wanted to give you an update after doing further research, the problem may not lies with Microsoft Azure but instead it is likely a bug on PAN OS 7.0.5 where PAN doesn't send a delete SA packet during a Child SA rekeying (phase 2) in IKEv2. This happens when PAN is the initiator for Child SA rekey (Phase 2) so the workaround to this is still the same as what was indicated in my previous email which is to increase Phase 2 lifetime on PAN from 3600s to a value that is longer then MS Azure Phase 2 lifetime. With this approach, Microsoft Azure will always be the initiator for phase 2 rekeying process.&lt;/EM&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have set &amp;nbsp;the phase 2 lifetime at 5400 secs and it seems stable.&lt;/P&gt;</description>
    <pubDate>Tue, 09 Aug 2016 01:24:30 GMT</pubDate>
    <dc:creator>dmann2</dc:creator>
    <dc:date>2016-08-09T01:24:30Z</dc:date>
    <item>
      <title>VPN to Azure dropouts</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-to-azure-dropouts/m-p/98936#M44162</link>
      <description>&lt;P&gt;I have searched high and low for this and found a few articles regarding IKE configuration and nothing seems to fix it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;PAN 3020 v7.0.5. IKE 2 VPN to Azure. The VPN works but around every 50 mintues the tunnel drops out for a few minutes then re-establishes. I have tried various different IKE and IPsec settings as per advice from Palo Alto articles, Microsoft Azure articles and settings from a comment against a Palo Alto article that the commentor said worked. No joy.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;From the Azure console there is no way of checking IPsec ettings.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any help would be good.&lt;/P&gt;</description>
      <pubDate>Wed, 20 Jul 2016 23:24:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-to-azure-dropouts/m-p/98936#M44162</guid>
      <dc:creator>dmann2</dc:creator>
      <dc:date>2016-07-20T23:24:08Z</dc:date>
    </item>
    <item>
      <title>Re: VPN to Azure dropouts</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-to-azure-dropouts/m-p/99121#M44169</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Just had a similar issue. Can you post your VPN settings so I can compare with my and tell you what I have changed to make it working? Please send a screenshot of the logs from the Monitoring tab&amp;gt; System. Both successful and unsuccessful.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;</description>
      <pubDate>Thu, 21 Jul 2016 13:41:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-to-azure-dropouts/m-p/99121#M44169</guid>
      <dc:creator>TranceforLife</dc:creator>
      <dc:date>2016-07-21T13:41:54Z</dc:date>
    </item>
    <item>
      <title>Re: VPN to Azure dropouts</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-to-azure-dropouts/m-p/99201#M44170</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Just a quick&amp;nbsp;update/tips on this:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- make sure Palo&amp;nbsp;in the "passive" mode. So it will not be able to initiate a VPN but we could not make it working when its disabled.&lt;/P&gt;&lt;P&gt;- IKEv2 initiate 2 tunnels: IKE tunnel ( old name of IKEv1 Phase 1) and CHILD_SA (old name of IKEv1 Phace 2). Default lifetime for &amp;nbsp;IKE Tunnel is &lt;SPAN&gt;86400 or&amp;nbsp;&lt;/SPAN&gt;28800 seconds (depends of&lt;SPAN&gt; the vendor)&lt;/SPAN&gt;&amp;nbsp;for CHILD_SA is 3600 seconds hence your tunnel will be always re-established every hour. But it&amp;nbsp;takes couple seconds not minutes.&amp;nbsp;&lt;/P&gt;&lt;P&gt;- disable&amp;nbsp;no-pfs&amp;nbsp;on IPSec Crypto&lt;/P&gt;&lt;P&gt;- disable "Liveness Check" on the IKE Gateway configuration.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Make sure that all other setting are compatible with Azure. Please see below:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;IPsec Parameters&lt;/P&gt;&lt;DIV class="note"&gt;&lt;STRONG&gt;Note:&lt;/STRONG&gt;&lt;P&gt;Although the values listed below are supported by the Azure VPN Gateway, currently there is no way for you to specify or select a specific combination from the Azure VPN Gateway. You must specify any constraints from the on-premises VPN device. In addition, you must clamp MSS at 1350.&lt;/P&gt;&lt;/DIV&gt;&lt;P&gt;IKE Phase 1 setup&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;STRONG&gt;Property&lt;/STRONG&gt;&lt;/TD&gt;&lt;TD&gt;&lt;STRONG&gt;Policy-based&lt;/STRONG&gt;&lt;/TD&gt;&lt;TD&gt;&lt;STRONG&gt;Route-based and Standard or High Performance VPN gateway&lt;/STRONG&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;IKE Version&lt;/TD&gt;&lt;TD&gt;IKEv1&lt;/TD&gt;&lt;TD&gt;IKEv2&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Diffie-Hellman Group&lt;/TD&gt;&lt;TD&gt;Group 2 (1024 bit)&lt;/TD&gt;&lt;TD&gt;Group 2 (1024 bit)&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Authentication Method&lt;/TD&gt;&lt;TD&gt;Pre-Shared Key&lt;/TD&gt;&lt;TD&gt;Pre-Shared Key&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Encryption Algorithms&lt;/TD&gt;&lt;TD&gt;AES256 AES128 3DES&lt;/TD&gt;&lt;TD&gt;AES256 3DES&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Hashing Algorithm&lt;/TD&gt;&lt;TD&gt;SHA1(SHA128)&lt;/TD&gt;&lt;TD&gt;SHA1(SHA128), SHA2(SHA256)&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Phase 1 Security Association (SA) Lifetime (Time)&lt;/TD&gt;&lt;TD&gt;28,800 seconds&lt;/TD&gt;&lt;TD&gt;10,800 seconds&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;IKE Phase 2 setup&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;STRONG&gt;Property&lt;/STRONG&gt;&lt;/TD&gt;&lt;TD&gt;&lt;STRONG&gt;Policy-based&lt;/STRONG&gt;&lt;/TD&gt;&lt;TD&gt;&lt;STRONG&gt;Route-based and Standard or High Performance VPN gateway&lt;/STRONG&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;IKE Version&lt;/TD&gt;&lt;TD&gt;IKEv1&lt;/TD&gt;&lt;TD&gt;IKEv2&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Hashing Algorithm&lt;/TD&gt;&lt;TD&gt;SHA1(SHA128)&lt;/TD&gt;&lt;TD&gt;SHA1(SHA128)&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Phase 2 Security Association (SA) Lifetime (Time)&lt;/TD&gt;&lt;TD&gt;3,600 seconds&lt;/TD&gt;&lt;TD&gt;3,600 seconds&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Phase 2 Security Association (SA) Lifetime (Throughput)&lt;/TD&gt;&lt;TD&gt;102,400,000 KB&lt;/TD&gt;&lt;TD&gt;-&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;IPsec SA Encryption &amp;amp; Authentication Offers (in the order of preference)&lt;/TD&gt;&lt;TD&gt;1. ESP-AES256 2. ESP-AES128 3. ESP-3DES 4. N/A&lt;/TD&gt;&lt;TD&gt;See &lt;EM&gt;Route-based Gateway IPsec Security Association (SA) Offers&lt;/EM&gt;(below)&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Perfect Forward Secrecy (PFS)&lt;/TD&gt;&lt;TD&gt;No&lt;/TD&gt;&lt;TD&gt;Yes (DH Group1, 2, 5, 14, 24)&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;Dead Peer Detection&lt;/TD&gt;&lt;TD&gt;Not supported&lt;/TD&gt;&lt;TD&gt;Supported&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;After doing all this tunnel still stable for the past 3 days.&lt;/P&gt;&lt;P&gt;You can clear the tunnel couple times to see if everything is working correctly:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;gt; clear vpn ike-sa gateway (for IKE Tunnel)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;gt; clear vpn ipsec-sa tunnel (for CHILD_SA)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope it helps!&lt;/P&gt;</description>
      <pubDate>Thu, 21 Jul 2016 21:40:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-to-azure-dropouts/m-p/99201#M44170</guid>
      <dc:creator>TranceforLife</dc:creator>
      <dc:date>2016-07-21T21:40:56Z</dc:date>
    </item>
    <item>
      <title>Re: VPN to Azure dropouts</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-to-azure-dropouts/m-p/99365#M44175</link>
      <description>&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Dropout for a couple of minutes" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/4914i004A30AE72A3D48E/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Dropout.JPG" alt="Dropout.JPG" /&gt;&lt;/span&gt;﻿&lt;/P&gt;</description>
      <pubDate>Fri, 22 Jul 2016 04:25:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-to-azure-dropouts/m-p/99365#M44175</guid>
      <dc:creator>dmann2</dc:creator>
      <dc:date>2016-07-22T04:25:38Z</dc:date>
    </item>
    <item>
      <title>Re: VPN to Azure dropouts</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-to-azure-dropouts/m-p/99377#M44176</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The first thing I have noticed that you Palo&amp;nbsp;device not in the "Passive" mode. Try&amp;nbsp;to configure/modify config using my settings and get back, please.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;All the best&lt;/P&gt;</description>
      <pubDate>Fri, 22 Jul 2016 10:57:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-to-azure-dropouts/m-p/99377#M44176</guid>
      <dc:creator>TranceforLife</dc:creator>
      <dc:date>2016-07-22T10:57:48Z</dc:date>
    </item>
    <item>
      <title>Re: VPN to Azure dropouts</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-to-azure-dropouts/m-p/99682#M44209</link>
      <description>&lt;P&gt;I noticed that first log entry myself as the PAN tries to start the SA negotiation as intitator but it is definitely in passive mode.&lt;/P&gt;</description>
      <pubDate>Sun, 24 Jul 2016 22:17:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-to-azure-dropouts/m-p/99682#M44209</guid>
      <dc:creator>dmann2</dc:creator>
      <dc:date>2016-07-24T22:17:12Z</dc:date>
    </item>
    <item>
      <title>Re: VPN to Azure dropouts</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-to-azure-dropouts/m-p/99765#M44212</link>
      <description>&lt;P&gt;Did you commit the changes?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="passive.PNG" style="width: 598px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/4929iC0F09F12F30D05E1/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="passive.PNG" alt="passive.PNG" /&gt;&lt;/span&gt;﻿&lt;/P&gt;</description>
      <pubDate>Mon, 25 Jul 2016 06:59:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-to-azure-dropouts/m-p/99765#M44212</guid>
      <dc:creator>TranceforLife</dc:creator>
      <dc:date>2016-07-25T06:59:21Z</dc:date>
    </item>
    <item>
      <title>Re: VPN to Azure dropouts</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-to-azure-dropouts/m-p/100010#M44234</link>
      <description>&lt;P&gt;It has been passive for quite a while now having commited multiple changes over the last few weeks.&lt;/P&gt;</description>
      <pubDate>Mon, 25 Jul 2016 21:47:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-to-azure-dropouts/m-p/100010#M44234</guid>
      <dc:creator>dmann2</dc:creator>
      <dc:date>2016-07-25T21:47:26Z</dc:date>
    </item>
    <item>
      <title>Re: VPN to Azure dropouts</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-to-azure-dropouts/m-p/100029#M44237</link>
      <description>&lt;P&gt;Very strange. What are the latest logs suggests? Did you try my suggestions? Our VPN still stable, fingers crossed &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 25 Jul 2016 22:51:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-to-azure-dropouts/m-p/100029#M44237</guid>
      <dc:creator>TranceforLife</dc:creator>
      <dc:date>2016-07-25T22:51:15Z</dc:date>
    </item>
    <item>
      <title>Re: VPN to Azure dropouts</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-to-azure-dropouts/m-p/100030#M44238</link>
      <description>&lt;P&gt;Can you take some screenshots of your config and I will match that and see how it goes? I can't find much info on the log entires except what you have already suggested.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If I match what you have it might improve.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for your input.&lt;/P&gt;</description>
      <pubDate>Mon, 25 Jul 2016 22:54:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-to-azure-dropouts/m-p/100030#M44238</guid>
      <dc:creator>dmann2</dc:creator>
      <dc:date>2016-07-25T22:54:15Z</dc:date>
    </item>
    <item>
      <title>Re: VPN to Azure dropouts</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-to-azure-dropouts/m-p/100033#M44239</link>
      <description>&lt;P&gt;Sorry don't&amp;nbsp;have a direct access to the box but my config listed below:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;IKEv2&lt;BR /&gt;Diffie-Hellman Group Group 2&lt;BR /&gt;Authentication Method SHA1&lt;BR /&gt;Encryption Algorithms AES256, 3DES&lt;BR /&gt;Phase 1 Security Association (SA) Lifetime (Time) 28,800 seconds&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;CHILD_SA&lt;BR /&gt;Encryption Algorithms AES128, 3DES&lt;BR /&gt;Authentication Method SHA1&lt;BR /&gt;Phase 2 Security Association (SA) Lifetime (Time) 3,600 seconds&lt;BR /&gt;Perfect Forward Secrecy (PFS) no-pfs&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;</description>
      <pubDate>Mon, 25 Jul 2016 23:09:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-to-azure-dropouts/m-p/100033#M44239</guid>
      <dc:creator>TranceforLife</dc:creator>
      <dc:date>2016-07-25T23:09:56Z</dc:date>
    </item>
    <item>
      <title>Re: VPN to Azure dropouts</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-to-azure-dropouts/m-p/100044#M44241</link>
      <description>&lt;P&gt;It is just passed the 1 hour mark, since making changes to match yours,&amp;nbsp;where we were dropping packets before and the tunnel has stayed up. The negotiation seemed to run smoothly.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Fingers crossed.&lt;/P&gt;</description>
      <pubDate>Tue, 26 Jul 2016 00:28:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-to-azure-dropouts/m-p/100044#M44241</guid>
      <dc:creator>dmann2</dc:creator>
      <dc:date>2016-07-26T00:28:13Z</dc:date>
    </item>
    <item>
      <title>Re: VPN to Azure dropouts</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-to-azure-dropouts/m-p/100122#M44243</link>
      <description>&lt;P&gt;It looks as though it is dropping 4 or 5 packets every hour or so.&lt;/P&gt;</description>
      <pubDate>Tue, 26 Jul 2016 03:57:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-to-azure-dropouts/m-p/100122#M44243</guid>
      <dc:creator>dmann2</dc:creator>
      <dc:date>2016-07-26T03:57:31Z</dc:date>
    </item>
    <item>
      <title>Re: VPN to Azure dropouts</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-to-azure-dropouts/m-p/100188#M44245</link>
      <description>&lt;P&gt;I am not sure but it could be because&amp;nbsp;of the tunnel rekeying. But l don't&amp;nbsp;know if 4-5packets acceptable or not&lt;/P&gt;</description>
      <pubDate>Tue, 26 Jul 2016 06:47:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-to-azure-dropouts/m-p/100188#M44245</guid>
      <dc:creator>TranceforLife</dc:creator>
      <dc:date>2016-07-26T06:47:20Z</dc:date>
    </item>
    <item>
      <title>Re: VPN to Azure dropouts</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-to-azure-dropouts/m-p/100196#M44246</link>
      <description>&lt;P&gt;More info&amp;nbsp;here:&lt;/P&gt;&lt;P&gt;&lt;A href="https://tools.ietf.org/html/draft-jenkins-ipsec-rekeying-03#section-2.2.1.2" target="_blank"&gt;https://tools.ietf.org/html/draft-jenkins-ipsec-rekeying-03#section-2.2.1.2&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 26 Jul 2016 07:07:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-to-azure-dropouts/m-p/100196#M44246</guid>
      <dc:creator>TranceforLife</dc:creator>
      <dc:date>2016-07-26T07:07:41Z</dc:date>
    </item>
    <item>
      <title>Re: VPN to Azure dropouts</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-to-azure-dropouts/m-p/100625#M44267</link>
      <description>&lt;P&gt;A bit more info for anyone watching.&lt;/P&gt;&lt;P&gt;It doesn't happen every time the tunnel is re-negotiated (every hour). In some cases there are no dropped packets. At various times I get the following sequence of events. The dropped packets seem to occur following these events. There is around a 10 second period of dropped packets between the event "IKEV2 IKE SA is down as determined by DPD" and the successful re-negotiation.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="dpd.JPG" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/4961i1BA91D254225C297/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="dpd.JPG" alt="dpd.JPG" /&gt;&lt;/span&gt;﻿&lt;/P&gt;&lt;P&gt;I'm not sure why it is starting a negotiation as initiator when in passive mode.&lt;/P&gt;&lt;P&gt;There is no setting for DPD when in "IKEV2 only mode" on the IKE Gateway.&lt;/P&gt;</description>
      <pubDate>Wed, 27 Jul 2016 01:36:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-to-azure-dropouts/m-p/100625#M44267</guid>
      <dc:creator>dmann2</dc:creator>
      <dc:date>2016-07-27T01:36:04Z</dc:date>
    </item>
    <item>
      <title>Re: VPN to Azure dropouts</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-to-azure-dropouts/m-p/100699#M44269</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;DPD it is actually for IKEv1, Liveness check is a new term for IKEv2. Please disable this future:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="liveness check.PNG" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/4966i79C16147A622FC36/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="liveness check.PNG" alt="liveness check.PNG" /&gt;&lt;/span&gt;﻿&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.paloaltonetworks.com/documentation/70/pan-os/pan-os/vpns/site-to-site-vpn-concepts" target="_blank"&gt;https://www.paloaltonetworks.com/documentation/70/pan-os/pan-os/vpns/site-to-site-vpn-concepts&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Just to confirm you do have a security policy configured as &amp;nbsp;bi-directional&amp;nbsp;for Azure peer.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Good question why it is still initiating a tunnel&amp;nbsp;when in passive mode.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;</description>
      <pubDate>Wed, 27 Jul 2016 06:59:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-to-azure-dropouts/m-p/100699#M44269</guid>
      <dc:creator>TranceforLife</dc:creator>
      <dc:date>2016-07-27T06:59:57Z</dc:date>
    </item>
    <item>
      <title>Re: VPN to Azure dropouts</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-to-azure-dropouts/m-p/100773#M44286</link>
      <description>&lt;P&gt;I definitely have the Liveness box unchecked on the IKE gateway but when I look at the window that lists the IKE Gateways under Liveness for this gateway it has "default".&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Your info on liveness check certainly&amp;nbsp;describes what is happening according to the log entries.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Security policies are good.&lt;/P&gt;</description>
      <pubDate>Wed, 27 Jul 2016 23:37:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-to-azure-dropouts/m-p/100773#M44286</guid>
      <dc:creator>dmann2</dc:creator>
      <dc:date>2016-07-27T23:37:32Z</dc:date>
    </item>
    <item>
      <title>Re: VPN to Azure dropouts</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-to-azure-dropouts/m-p/100817#M44294</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Something weird &amp;nbsp;happening &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; When the&amp;nbsp;passive mode is enabled, Palo still initiating a VPN tunnel or when Liveness check disabled it is still tear down the tunnel. I am confused ))) Please post the Ike Gateway screen shot and the output of the ikemgr.log:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;gt;&amp;nbsp;tail lines 200 mp-log ikemgr.log&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;</description>
      <pubDate>Thu, 28 Jul 2016 15:07:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-to-azure-dropouts/m-p/100817#M44294</guid>
      <dc:creator>TranceforLife</dc:creator>
      <dc:date>2016-07-28T15:07:44Z</dc:date>
    </item>
    <item>
      <title>Re: VPN to Azure dropouts</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-to-azure-dropouts/m-p/100849#M44301</link>
      <description>&lt;P&gt;Yes weird.&lt;/P&gt;&lt;P&gt;It seems I cant attach a txt file so I''l copy the log here.&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Gateway.JPG" style="width: 601px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/5001i147E1BE876920D21/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Gateway.JPG" alt="Gateway.JPG" /&gt;&lt;/span&gt;﻿&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Gateway2.JPG" style="width: 599px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/5000iC805FAE32B579A92/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Gateway2.JPG" alt="Gateway2.JPG" /&gt;&lt;/span&gt;﻿&lt;/P&gt;&lt;P&gt;I think 3:19:42 to 3:19:58 in the first re-negotiation in this log&amp;nbsp;is the time where It would drop packets.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2016-07-29 03:14:22 [PROTO_NOTIFY]: ====&amp;gt; IKEv2 CHILD SA NEGOTIATION STARTED AS INITIATOR, rekey &amp;lt;====&lt;BR /&gt;====&amp;gt; Initiated SA: 138.44.5.6[500]-13.75.156.231[500] message id:0x00000000 parent SN:465 &amp;lt;====&lt;BR /&gt;2016-07-29 03:19:41 [PROTO_ERR]: 465:138.44.5.6[500] - 13.75.156.231[500]:(nil):retransmission count exceeded the limit&lt;BR /&gt;2016-07-29 03:19:41 [INFO]: 465:138.44.5.6[500] - 13.75.156.231[500]:(nil):aborting IKEv2 SA Azure-IKE-Gateway:465&lt;BR /&gt;2016-07-29 03:19:41 [INFO]: SADB_DELETE ul_proto=255 src=13.75.156.231[0] dst=138.44.5.6[0] satype=ESP spi=0xBB1B49E4&lt;BR /&gt;2016-07-29 03:19:41 [INFO]: received PFKEY_DELETE seq=0 satype=ESP spi=0xBB1B49E4&lt;BR /&gt;2016-07-29 03:19:41 [PROTO_NOTIFY]: ====&amp;gt; IPSEC KEY DELETED &amp;lt;====&lt;BR /&gt;====&amp;gt; Deleted SA: 138.44.5.6[500]-13.75.156.231[500] SPI:0xBB1B49E4/0x2D0DC3C4 &amp;lt;====&lt;BR /&gt;2016-07-29 03:19:41 [INFO]: SADB_DELETE ul_proto=255 src=138.44.5.6[0] dst=13.75.156.231[0] satype=ESP spi=0x2D0DC3C4&lt;BR /&gt;2016-07-29 03:19:41 [INFO]: received PFKEY_DELETE seq=0 satype=ESP spi=0x2D0DC3C4&lt;BR /&gt;2016-07-29 03:19:41.376 +1000 IKEv2 liveness {Azure-IKE-Gateway:465-R}: DPD down, rekey vpn tunnel &amp;lt;Azure-IPsec-Tunnel(Azure-IKE-Gateway)&amp;gt;, SA state ESTABLISHED&lt;BR /&gt;2016-07-29 03:19:41 [INFO]: passive mode is specified for IKE gateway Azure-IKE-Gateway.&lt;BR /&gt;2016-07-29 03:19:42 [INFO]: keymirror del start ----------------&lt;BR /&gt;2016-07-29 03:19:42 [INFO]: keymirror del for gw 1, tn 1, selfSPI BB1B49E4, retcode 0.&lt;BR /&gt;2016-07-29 03:19:58 [PROTO_WARN]: 0:138.44.5.6[500] - 13.75.156.231[500]:0x8fe7ba0:message to a nonexistent ike_sa&lt;BR /&gt;2016-07-29 03:19:59 [PROTO_WARN]: 0:138.44.5.6[500] - 13.75.156.231[500]:0x8efc240:message to a nonexistent ike_sa&lt;BR /&gt;2016-07-29 03:20:00 [PROTO_WARN]: 0:138.44.5.6[500] - 13.75.156.231[500]:0x8f13fa0:message to a nonexistent ike_sa&lt;BR /&gt;2016-07-29 03:20:01 [PROTO_WARN]: 0:138.44.5.6[500] - 13.75.156.231[500]:0x8efc240:message to a nonexistent ike_sa&lt;BR /&gt;2016-07-29 03:20:05 [PROTO_NOTIFY]: ====&amp;gt; IKEv2 IKE SA NEGOTIATION STARTED AS RESPONDER, non-rekey &amp;lt;====&lt;BR /&gt;====&amp;gt; Initiated SA: 138.44.5.6[500]-13.75.156.231[500] SPI:8200c742bac96fe4:290a5d6bbc4c4ccf SN:466 &amp;lt;====&lt;BR /&gt;2016-07-29 03:20:05 [PROTO_WARN]: 466:138.44.5.6[500] - 13.75.156.231[500]:0x8f13fa0:ignoring unauthenticated notify payload (NAT_DETECTION_SOURCE_IP)&lt;BR /&gt;2016-07-29 03:20:05 [PROTO_WARN]: 466:138.44.5.6[500] - 13.75.156.231[500]:0x8f13fa0:ignoring unauthenticated notify payload (NAT_DETECTION_DESTINATION_IP)&lt;BR /&gt;2016-07-29 03:20:05 [PROTO_WARN]: 466:138.44.5.6[500] - 13.75.156.231[500]:0x8f13fa0:vendor id payload ignored&lt;BR /&gt;2016-07-29 03:20:05 [PROTO_WARN]: 466:138.44.5.6[500] - 13.75.156.231[500]:0x8f13fa0:vendor id payload ignored&lt;BR /&gt;2016-07-29 03:20:05 [PROTO_WARN]: 466:138.44.5.6[500] - 13.75.156.231[500]:0x8f13fa0:vendor id payload ignored&lt;BR /&gt;2016-07-29 03:20:05 [PROTO_WARN]: 466:138.44.5.6[500] - 13.75.156.231[500]:0x8f13fa0:vendor id payload ignored&lt;BR /&gt;2016-07-29 03:20:05 [INFO]: 466:138.44.5.6[500] - 13.75.156.231[500]:0x8fe64c8:authentication result: success&lt;BR /&gt;2016-07-29 03:20:05 [PROTO_NOTIFY]: ====&amp;gt; IKEv2 CHILD SA NEGOTIATION STARTED AS RESPONDER, non-rekey &amp;lt;====&lt;BR /&gt;====&amp;gt; Initiated SA: 138.44.5.6[500]-13.75.156.231[500] message id:0x00000001 parent SN:466 &amp;lt;====&lt;BR /&gt;2016-07-29 03:20:05 [INTERNAL_WARN]: selector Azure-IPsec-Tunnel(Azure-IKE-Gateway)_out src is ambiguous, using the first one of the expanded addresses&lt;BR /&gt;2016-07-29 03:20:05 [INTERNAL_WARN]: selector Azure-IPsec-Tunnel(Azure-IKE-Gateway)_out dst is ambiguous, using the first one of the expanded addresses&lt;BR /&gt;2016-07-29 03:20:05.294 +1000 IKEv2 TS {Azure-IKE-Gateway:466-R}: TS matching for configured selector Azure-IPsec-Tunnel(Azure-IKE-Gateway)_out 0.0.0.0[0]/0-0.0.0.0[0]/0 proto 0&lt;BR /&gt;2016-07-29 03:20:05.294 +1000 .. check local TS (num 2, TS0 is not specific) against selector 0:0.0.0.0[0]/0&lt;BR /&gt;2016-07-29 03:20:05.294 +1000 ... TS 0: ts type mismtach, selector is not IPv6&lt;BR /&gt;2016-07-29 03:20:05.294 +1000 ... TS 1: exact match&lt;BR /&gt;2016-07-29 03:20:05.294 +1000 ... result: local TS = 0.0.0.0[0]/0&lt;BR /&gt;2016-07-29 03:20:05.294 +1000 .. check remote TS (num 2, TS0 is not specific) against selector 0:0.0.0.0[0]/0&lt;BR /&gt;2016-07-29 03:20:05.294 +1000 ... TS 0: ts type mismtach, selector is not IPv6&lt;BR /&gt;2016-07-29 03:20:05.294 +1000 ... TS 1: exact match&lt;BR /&gt;2016-07-29 03:20:05.294 +1000 ... result: remote TS = 0.0.0.0[0]/0&lt;BR /&gt;2016-07-29 03:20:05.294 +1000 - IKEv2 TS {Azure-IKE-Gateway:466-R}: TS matching result: TS_l match(=), TS_r match(=) *&lt;BR /&gt;2016-07-29 03:20:05.294 +1000 *** IKEv2 TS {Azure-IKE-Gateway:466-R}: selector chosen Azure-IPsec-Tunnel(Azure-IKE-Gateway)_out: tid 1&lt;BR /&gt;2016-07-29 03:20:05 [INFO]: SADB_UPDATE ul_proto=255 src=13.75.156.231[500] dst=138.44.5.6[500] satype=ESP samode=tunl spi=0xA445D650 authtype=SHA1 enctype=3DES enclen=24 lifetime soft time=2965 bytes=0 hard time=3600 bytes=0&lt;BR /&gt;2016-07-29 03:20:05 [INFO]: SADB_ADD ul_proto=255 src=138.44.5.6[500] dst=13.75.156.231[500] satype=ESP samode=tunl spi=0x9969D73C authtype=SHA1 enctype=3DES enclen=24 lifetime soft time=3175 bytes=0 hard time=3600 bytes=0&lt;BR /&gt;2016-07-29 03:20:05.294 +1000 sadb ts: port 0:65535 IP 0.0.0.0-&amp;gt;255.255.255.255 proto:0 len:16&lt;BR /&gt;2016-07-29 03:20:05.294 +1000 sadb ts: port 0:65535 IP 0.0.0.0-&amp;gt;255.255.255.255 proto:0 len:16&lt;BR /&gt;2016-07-29 03:20:05 [PROTO_NOTIFY]: ====&amp;gt; IPSEC KEY INSTALLATION SUCCEEDED &amp;lt;====&lt;BR /&gt;====&amp;gt; Installed SA: 138.44.5.6[500]-13.75.156.231[500] SPI:0xA445D650/0x9969D73C lifetime 3600 Sec lifesize unlimited &amp;lt;====&lt;BR /&gt;2016-07-29 03:20:05 [PROTO_NOTIFY]: ====&amp;gt; IKEv2 CHILD SA NEGOTIATION SUCCEEDED AS RESPONDER, non-rekey &amp;lt;====&lt;BR /&gt;====&amp;gt; Established SA: 138.44.5.6[500]-13.75.156.231[500] message id:0x00000001, SPI:0xA445D650/0x9969D73C parent SN:466 &amp;lt;====&lt;BR /&gt;2016-07-29 03:20:05 [PROTO_NOTIFY]: ====&amp;gt; IKEv2 IKE SA NEGOTIATION SUCCEEDED AS RESPONDER, non-rekey &amp;lt;====&lt;BR /&gt;====&amp;gt; Established SA: 138.44.5.6[500]-13.75.156.231[500] SPI:8200c742bac96fe4:290a5d6bbc4c4ccf SN:466 lifetime 28800 Sec &amp;lt;====&lt;BR /&gt;2016-07-29 03:20:05 [INFO]: keymirror add start ++++++++++++++++&lt;BR /&gt;2016-07-29 03:20:05 [INFO]: keymirror add for gw 0x1, tn 1, selfSPI A445D650, retcode 0.&lt;BR /&gt;2016-07-29 04:12:59 [PROTO_NOTIFY]: ====&amp;gt; IKEv2 CHILD SA NEGOTIATION STARTED AS INITIATOR, rekey &amp;lt;====&lt;BR /&gt;====&amp;gt; Initiated SA: 138.44.5.6[500]-13.75.156.231[500] message id:0x00000000 parent SN:466 &amp;lt;====&lt;BR /&gt;2016-07-29 04:15:53 [PROTO_NOTIFY]: ====&amp;gt; IKEv2 CHILD SA NEGOTIATION STARTED AS RESPONDER, rekey &amp;lt;====&lt;BR /&gt;====&amp;gt; Initiated SA: 138.44.5.6[500]-13.75.156.231[500] message id:0x0000000C parent SN:466 &amp;lt;====&lt;BR /&gt;2016-07-29 04:15:53 [INTERNAL_WARN]: selector Azure-IPsec-Tunnel(Azure-IKE-Gateway)_out src is ambiguous, using the first one of the expanded addresses&lt;BR /&gt;2016-07-29 04:15:53 [INTERNAL_WARN]: selector Azure-IPsec-Tunnel(Azure-IKE-Gateway)_out dst is ambiguous, using the first one of the expanded addresses&lt;BR /&gt;2016-07-29 04:15:53.175 +1000 IKEv2 TS {Azure-IKE-Gateway:466-R}: TS matching for configured selector Azure-IPsec-Tunnel(Azure-IKE-Gateway)_out 0.0.0.0[0]/0-0.0.0.0[0]/0 proto 0&lt;BR /&gt;2016-07-29 04:15:53.175 +1000 .. check local TS (num 2, TS0 is not specific) against selector 0:0.0.0.0[0]/0&lt;BR /&gt;2016-07-29 04:15:53.175 +1000 ... TS 0: ts type mismtach, selector is not IPv6&lt;BR /&gt;2016-07-29 04:15:53.175 +1000 ... TS 1: exact match&lt;BR /&gt;2016-07-29 04:15:53.175 +1000 ... result: local TS = 0.0.0.0[0]/0&lt;BR /&gt;2016-07-29 04:15:53.175 +1000 .. check remote TS (num 2, TS0 is not specific) against selector 0:0.0.0.0[0]/0&lt;BR /&gt;2016-07-29 04:15:53.175 +1000 ... TS 0: ts type mismtach, selector is not IPv6&lt;BR /&gt;2016-07-29 04:15:53.175 +1000 ... TS 1: exact match&lt;BR /&gt;2016-07-29 04:15:53.175 +1000 ... result: remote TS = 0.0.0.0[0]/0&lt;BR /&gt;2016-07-29 04:15:53.175 +1000 - IKEv2 TS {Azure-IKE-Gateway:466-R}: TS matching result: TS_l match(=), TS_r match(=) *&lt;BR /&gt;2016-07-29 04:15:53.175 +1000 *** IKEv2 TS {Azure-IKE-Gateway:466-R}: selector chosen Azure-IPsec-Tunnel(Azure-IKE-Gateway)_out: tid 1&lt;BR /&gt;2016-07-29 04:15:53 [INFO]: SADB_UPDATE ul_proto=255 src=13.75.156.231[500] dst=138.44.5.6[500] satype=ESP samode=tunl spi=0xB9AC02C2 authtype=SHA1 enctype=3DES enclen=24 lifetime soft time=3140 bytes=0 hard time=3600 bytes=0&lt;BR /&gt;2016-07-29 04:15:53 [INFO]: SADB_ADD ul_proto=255 src=138.44.5.6[500] dst=13.75.156.231[500] satype=ESP samode=tunl spi=0x946BF430 authtype=SHA1 enctype=3DES enclen=24 lifetime soft time=3177 bytes=0 hard time=3600 bytes=0&lt;BR /&gt;2016-07-29 04:15:53.175 +1000 sadb ts: port 0:65535 IP 0.0.0.0-&amp;gt;255.255.255.255 proto:0 len:16&lt;BR /&gt;2016-07-29 04:15:53.175 +1000 sadb ts: port 0:65535 IP 0.0.0.0-&amp;gt;255.255.255.255 proto:0 len:16&lt;BR /&gt;2016-07-29 04:15:53 [PROTO_NOTIFY]: ====&amp;gt; IPSEC KEY INSTALLATION SUCCEEDED &amp;lt;====&lt;BR /&gt;====&amp;gt; Installed SA: 138.44.5.6[500]-13.75.156.231[500] SPI:0xB9AC02C2/0x946BF430 lifetime 3600 Sec lifesize unlimited &amp;lt;====&lt;BR /&gt;2016-07-29 04:15:53 [PROTO_NOTIFY]: ====&amp;gt; IKEv2 CHILD SA NEGOTIATION SUCCEEDED AS RESPONDER, rekey &amp;lt;====&lt;BR /&gt;====&amp;gt; Established SA: 138.44.5.6[500]-13.75.156.231[500] message id:0x0000000C, SPI:0xB9AC02C2/0x946BF430 parent SN:466 &amp;lt;====&lt;BR /&gt;2016-07-29 04:15:53 [INFO]: keymirror add start ++++++++++++++++&lt;BR /&gt;2016-07-29 04:15:53 [INFO]: keymirror add for gw 0x1, tn 1, selfSPI B9AC02C2, retcode 0.&lt;BR /&gt;2016-07-29 04:15:53 [INFO]: 466:138.44.5.6[500] - 13.75.156.231[500]:(nil):delete proto ESP spi 0x9969D73C&lt;BR /&gt;2016-07-29 04:15:53 [PROTO_NOTIFY]: ====&amp;gt; IPSEC KEY DELETED &amp;lt;====&lt;BR /&gt;====&amp;gt; Deleted SA: 138.44.5.6[500]-13.75.156.231[500] SPI:0xA445D650/0x9969D73C &amp;lt;====&lt;BR /&gt;2016-07-29 04:15:53 [INFO]: SADB_DELETE ul_proto=255 src=138.44.5.6[0] dst=13.75.156.231[0] satype=ESP spi=0x9969D73C&lt;BR /&gt;2016-07-29 04:15:53 [INFO]: received PFKEY_DELETE seq=0 satype=ESP spi=0x9969D73C&lt;BR /&gt;2016-07-29 04:15:53 [INFO]: SADB_DELETE ul_proto=255 src=13.75.156.231[0] dst=138.44.5.6[0] satype=ESP spi=0xA445D650&lt;BR /&gt;2016-07-29 04:15:53 [INFO]: received PFKEY_DELETE seq=0 satype=ESP spi=0xA445D650&lt;BR /&gt;2016-07-29 04:15:53 [INFO]: keymirror del start ----------------&lt;BR /&gt;2016-07-29 04:15:53 [INFO]: keymirror del for gw 1, tn 1, selfSPI A445D650, retcode 0.&lt;BR /&gt;2016-07-29 04:16:10 [PROTO_ERR]: 466:138.44.5.6[500] - 13.75.156.231[500]:(nil):received Notify payload protocol 0 type 12345&lt;BR /&gt;2016-07-29 04:16:10 [PROTO_NOTIFY]: ====&amp;gt; IKEv2 CHILD SA NEGOTIATION FAILED AS INITIATOR, rekey &amp;lt;====&lt;BR /&gt;====&amp;gt; Failed SA: 138.44.5.6[500]-13.75.156.231[500] message id:0x00000000 parent SN:466 &amp;lt;==== Error code 111&lt;BR /&gt;2016-07-29 05:08:49 [PROTO_NOTIFY]: ====&amp;gt; IKEv2 CHILD SA NEGOTIATION STARTED AS INITIATOR, rekey &amp;lt;====&lt;BR /&gt;====&amp;gt; Initiated SA: 138.44.5.6[500]-13.75.156.231[500] message id:0x00000000 parent SN:466 &amp;lt;====&lt;BR /&gt;2016-07-29 05:11:38 [PROTO_NOTIFY]: ====&amp;gt; IKEv2 CHILD SA NEGOTIATION STARTED AS RESPONDER, rekey &amp;lt;====&lt;BR /&gt;====&amp;gt; Initiated SA: 138.44.5.6[500]-13.75.156.231[500] message id:0x00000012 parent SN:466 &amp;lt;====&lt;BR /&gt;2016-07-29 05:11:38 [INTERNAL_WARN]: selector Azure-IPsec-Tunnel(Azure-IKE-Gateway)_out src is ambiguous, using the first one of the expanded addresses&lt;BR /&gt;2016-07-29 05:11:38 [INTERNAL_WARN]: selector Azure-IPsec-Tunnel(Azure-IKE-Gateway)_out dst is ambiguous, using the first one of the expanded addresses&lt;BR /&gt;2016-07-29 05:11:38.501 +1000 IKEv2 TS {Azure-IKE-Gateway:466-R}: TS matching for configured selector Azure-IPsec-Tunnel(Azure-IKE-Gateway)_out 0.0.0.0[0]/0-0.0.0.0[0]/0 proto 0&lt;BR /&gt;2016-07-29 05:11:38.501 +1000 .. check local TS (num 2, TS0 is not specific) against selector 0:0.0.0.0[0]/0&lt;BR /&gt;2016-07-29 05:11:38.501 +1000 ... TS 0: ts type mismtach, selector is not IPv6&lt;BR /&gt;2016-07-29 05:11:38.501 +1000 ... TS 1: exact match&lt;BR /&gt;2016-07-29 05:11:38.501 +1000 ... result: local TS = 0.0.0.0[0]/0&lt;BR /&gt;2016-07-29 05:11:38.501 +1000 .. check remote TS (num 2, TS0 is not specific) against selector 0:0.0.0.0[0]/0&lt;BR /&gt;2016-07-29 05:11:38.501 +1000 ... TS 0: ts type mismtach, selector is not IPv6&lt;BR /&gt;2016-07-29 05:11:38.501 +1000 ... TS 1: exact match&lt;BR /&gt;2016-07-29 05:11:38.501 +1000 ... result: remote TS = 0.0.0.0[0]/0&lt;BR /&gt;2016-07-29 05:11:38.501 +1000 - IKEv2 TS {Azure-IKE-Gateway:466-R}: TS matching result: TS_l match(=), TS_r match(=) *&lt;BR /&gt;2016-07-29 05:11:38.501 +1000 *** IKEv2 TS {Azure-IKE-Gateway:466-R}: selector chosen Azure-IPsec-Tunnel(Azure-IKE-Gateway)_out: tid 1&lt;BR /&gt;2016-07-29 05:11:38 [INFO]: SADB_UPDATE ul_proto=255 src=13.75.156.231[500] dst=138.44.5.6[500] satype=ESP samode=tunl spi=0xF30D6381 authtype=SHA1 enctype=3DES enclen=24 lifetime soft time=3203 bytes=0 hard time=3600 bytes=0&lt;BR /&gt;2016-07-29 05:11:38 [INFO]: SADB_ADD ul_proto=255 src=138.44.5.6[500] dst=13.75.156.231[500] satype=ESP samode=tunl spi=0xAE2BA4DC authtype=SHA1 enctype=3DES enclen=24 lifetime soft time=2913 bytes=0 hard time=3600 bytes=0&lt;BR /&gt;2016-07-29 05:11:38.501 +1000 sadb ts: port 0:65535 IP 0.0.0.0-&amp;gt;255.255.255.255 proto:0 len:16&lt;BR /&gt;2016-07-29 05:11:38.501 +1000 sadb ts: port 0:65535 IP 0.0.0.0-&amp;gt;255.255.255.255 proto:0 len:16&lt;BR /&gt;2016-07-29 05:11:38 [PROTO_NOTIFY]: ====&amp;gt; IPSEC KEY INSTALLATION SUCCEEDED &amp;lt;====&lt;BR /&gt;====&amp;gt; Installed SA: 138.44.5.6[500]-13.75.156.231[500] SPI:0xF30D6381/0xAE2BA4DC lifetime 3600 Sec lifesize unlimited &amp;lt;====&lt;BR /&gt;2016-07-29 05:11:38 [PROTO_NOTIFY]: ====&amp;gt; IKEv2 CHILD SA NEGOTIATION SUCCEEDED AS RESPONDER, rekey &amp;lt;====&lt;BR /&gt;====&amp;gt; Established SA: 138.44.5.6[500]-13.75.156.231[500] message id:0x00000012, SPI:0xF30D6381/0xAE2BA4DC parent SN:466 &amp;lt;====&lt;BR /&gt;2016-07-29 05:11:38 [INFO]: keymirror add start ++++++++++++++++&lt;BR /&gt;2016-07-29 05:11:38 [INFO]: keymirror add for gw 0x1, tn 1, selfSPI F30D6381, retcode 0.&lt;BR /&gt;2016-07-29 05:11:38 [INFO]: 466:138.44.5.6[500] - 13.75.156.231[500]:(nil):delete proto ESP spi 0x946BF430&lt;BR /&gt;2016-07-29 05:11:38 [PROTO_NOTIFY]: ====&amp;gt; IPSEC KEY DELETED &amp;lt;====&lt;BR /&gt;====&amp;gt; Deleted SA: 138.44.5.6[500]-13.75.156.231[500] SPI:0xB9AC02C2/0x946BF430 &amp;lt;====&lt;BR /&gt;2016-07-29 05:11:38 [INFO]: SADB_DELETE ul_proto=255 src=138.44.5.6[0] dst=13.75.156.231[0] satype=ESP spi=0x946BF430&lt;BR /&gt;2016-07-29 05:11:38 [INFO]: received PFKEY_DELETE seq=0 satype=ESP spi=0x946BF430&lt;BR /&gt;2016-07-29 05:11:38 [INFO]: SADB_DELETE ul_proto=255 src=13.75.156.231[0] dst=138.44.5.6[0] satype=ESP spi=0xB9AC02C2&lt;BR /&gt;2016-07-29 05:11:38 [INFO]: received PFKEY_DELETE seq=0 satype=ESP spi=0xB9AC02C2&lt;BR /&gt;2016-07-29 05:11:38 [INFO]: keymirror del start ----------------&lt;BR /&gt;2016-07-29 05:11:38 [INFO]: keymirror del for gw 1, tn 1, selfSPI B9AC02C2, retcode 0.&lt;BR /&gt;2016-07-29 05:12:00 [PROTO_ERR]: 466:138.44.5.6[500] - 13.75.156.231[500]:(nil):received Notify payload protocol 0 type 12345&lt;BR /&gt;2016-07-29 05:12:00 [PROTO_NOTIFY]: ====&amp;gt; IKEv2 CHILD SA NEGOTIATION FAILED AS INITIATOR, rekey &amp;lt;====&lt;BR /&gt;====&amp;gt; Failed SA: 138.44.5.6[500]-13.75.156.231[500] message id:0x00000001 parent SN:466 &amp;lt;==== Error code 111&lt;BR /&gt;2016-07-29 06:00:11 [PROTO_NOTIFY]: ====&amp;gt; IKEv2 CHILD SA NEGOTIATION STARTED AS INITIATOR, rekey &amp;lt;====&lt;BR /&gt;====&amp;gt; Initiated SA: 138.44.5.6[500]-13.75.156.231[500] message id:0x00000000 parent SN:466 &amp;lt;====&lt;BR /&gt;2016-07-29 06:00:11 [INFO]: SADB_UPDATE ul_proto=255 src=13.75.156.231[500] dst=138.44.5.6[500] satype=ESP samode=tunl spi=0xD8014654 authtype=SHA1 enctype=3DES enclen=24 lifetime soft time=3230 bytes=0 hard time=3600 bytes=0&lt;BR /&gt;2016-07-29 06:00:11 [INFO]: SADB_ADD ul_proto=255 src=138.44.5.6[500] dst=13.75.156.231[500] satype=ESP samode=tunl spi=0xFF5EF270 authtype=SHA1 enctype=3DES enclen=24 lifetime soft time=3009 bytes=0 hard time=3600 bytes=0&lt;BR /&gt;2016-07-29 06:00:11.389 +1000 sadb ts: port 0:65535 IP 0.0.0.0-&amp;gt;255.255.255.255 proto:0 len:16&lt;BR /&gt;2016-07-29 06:00:11.389 +1000 sadb ts: port 0:65535 IP 0.0.0.0-&amp;gt;255.255.255.255 proto:0 len:16&lt;BR /&gt;2016-07-29 06:00:11 [PROTO_NOTIFY]: ====&amp;gt; IPSEC KEY INSTALLATION SUCCEEDED &amp;lt;====&lt;BR /&gt;====&amp;gt; Installed SA: 138.44.5.6[500]-13.75.156.231[500] SPI:0xD8014654/0xFF5EF270 lifetime 3600 Sec lifesize unlimited &amp;lt;====&lt;BR /&gt;2016-07-29 06:00:11 [PROTO_NOTIFY]: ====&amp;gt; IKEv2 CHILD SA NEGOTIATION SUCCEEDED AS INITIATOR, rekey &amp;lt;====&lt;BR /&gt;====&amp;gt; Established SA: 138.44.5.6[500]-13.75.156.231[500] message id:0x00000002, SPI:0xD8014654/0xFF5EF270 parent SN:466 &amp;lt;====&lt;BR /&gt;2016-07-29 06:00:11 [INFO]: keymirror add start ++++++++++++++++&lt;BR /&gt;2016-07-29 06:00:11 [INFO]: keymirror add for gw 0x1, tn 1, selfSPI D8014654, retcode 0.&lt;BR /&gt;2016-07-29 06:00:11 [INFO]: keymirror del start ----------------&lt;BR /&gt;2016-07-29 06:00:11 [INFO]: keymirror del for gw 1, tn 1, selfSPI F30D6381, retcode 0.&lt;BR /&gt;2016-07-29 06:00:11 [INFO]: SADB_DELETE ul_proto=255 src=13.75.156.231[0] dst=138.44.5.6[0] satype=ESP spi=0xF30D6381&lt;BR /&gt;2016-07-29 06:00:11 [INFO]: received PFKEY_DELETE seq=0 satype=ESP spi=0xF30D6381&lt;BR /&gt;2016-07-29 06:00:11 [PROTO_NOTIFY]: ====&amp;gt; IPSEC KEY DELETED &amp;lt;====&lt;BR /&gt;====&amp;gt; Deleted SA: 138.44.5.6[500]-13.75.156.231[500] SPI:0xF30D6381/0xAE2BA4DC &amp;lt;====&lt;BR /&gt;2016-07-29 06:00:11 [INFO]: SADB_DELETE ul_proto=255 src=138.44.5.6[0] dst=13.75.156.231[0] satype=ESP spi=0xAE2BA4DC&lt;BR /&gt;2016-07-29 06:00:11 [INFO]: received PFKEY_DELETE seq=0 satype=ESP spi=0xAE2BA4DC&lt;BR /&gt;2016-07-29 06:05:11 [INFO]: 466:138.44.5.6[500] - 13.75.156.231[500]:(nil):delete proto ESP spi 0xAE2BA4DC&lt;BR /&gt;2016-07-29 06:05:11 [PROTO_WARN]: 466:138.44.5.6[500] - 13.75.156.231[500]:(nil):can't find sa for proto ESP spi 0xAE2BA4DC&lt;BR /&gt;2016-07-29 06:11:07 [PROTO_NOTIFY]: ====&amp;gt; IKEv2 IKE SA NEGOTIATION STARTED AS RESPONDER, rekey &amp;lt;====&lt;BR /&gt;====&amp;gt; Initiated SA: 138.44.5.6[500]-13.75.156.231[500] SPI:7b6ad57db0e66afd:af6028d3c14c9faa SN:467 &amp;lt;====&lt;BR /&gt;2016-07-29 06:11:07.404 +1000 &amp;gt;&amp;gt;&amp;gt; IKEv2 rekey {Azure-IKE-Gateway:467-R}: adopt children SA from IKE SA 466&lt;BR /&gt;2016-07-29 06:11:07.404 +1000 IKEv2 rekey {Azure-IKE-Gateway:467-R}: child SA 196717 is adopted, tid 1, state MATURE&lt;BR /&gt;2016-07-29 06:11:07 [PROTO_NOTIFY]: ====&amp;gt; IKEv2 IKE SA NEGOTIATION SUCCEEDED AS RESPONDER, rekey &amp;lt;====&lt;BR /&gt;====&amp;gt; Established SA: 138.44.5.6[500]-13.75.156.231[500] SPI:7b6ad57db0e66afd:af6028d3c14c9faa SN:467 lifetime 28800 Sec &amp;lt;====&lt;BR /&gt;2016-07-29 06:11:07 [INFO]: 466:138.44.5.6[500] - 13.75.156.231[500]:(nil):received DELETE IKE_SA&lt;BR /&gt;2016-07-29 06:11:07.420 +1000 IKEv2 {Azure-IKE-Gateway:466-R}: received DELETE IKE_SA, SA state ESTABLISHED, SPI 8200c742bac96fe4:290a5d6bbc4c4ccf&lt;BR /&gt;2016-07-29 06:11:07 [INFO]: 466:138.44.5.6[500] - 13.75.156.231[500]:(nil):aborting IKEv2 SA Azure-IKE-Gateway:466&lt;BR /&gt;2016-07-29 06:50:20 [PROTO_NOTIFY]: ====&amp;gt; IKEv2 CHILD SA NEGOTIATION STARTED AS INITIATOR, rekey &amp;lt;====&lt;BR /&gt;====&amp;gt; Initiated SA: 138.44.5.6[500]-13.75.156.231[500] message id:0x00000000 parent SN:467 &amp;lt;====&lt;BR /&gt;2016-07-29 06:50:20 [INFO]: SADB_UPDATE ul_proto=255 src=13.75.156.231[500] dst=138.44.5.6[500] satype=ESP samode=tunl spi=0xD4531654 authtype=SHA1 enctype=3DES enclen=24 lifetime soft time=3200 bytes=0 hard time=3600 bytes=0&lt;BR /&gt;2016-07-29 06:50:20 [INFO]: SADB_ADD ul_proto=255 src=138.44.5.6[500] dst=13.75.156.231[500] satype=ESP samode=tunl spi=0x58A1452E authtype=SHA1 enctype=3DES enclen=24 lifetime soft time=2997 bytes=0 hard time=3600 bytes=0&lt;BR /&gt;2016-07-29 06:50:20.392 +1000 sadb ts: port 0:65535 IP 0.0.0.0-&amp;gt;255.255.255.255 proto:0 len:16&lt;BR /&gt;2016-07-29 06:50:20.392 +1000 sadb ts: port 0:65535 IP 0.0.0.0-&amp;gt;255.255.255.255 proto:0 len:16&lt;BR /&gt;2016-07-29 06:50:20 [PROTO_NOTIFY]: ====&amp;gt; IPSEC KEY INSTALLATION SUCCEEDED &amp;lt;====&lt;BR /&gt;====&amp;gt; Installed SA: 138.44.5.6[500]-13.75.156.231[500] SPI:0xD4531654/0x58A1452E lifetime 3600 Sec lifesize unlimited &amp;lt;====&lt;BR /&gt;2016-07-29 06:50:20 [PROTO_NOTIFY]: ====&amp;gt; IKEv2 CHILD SA NEGOTIATION SUCCEEDED AS INITIATOR, rekey &amp;lt;====&lt;BR /&gt;====&amp;gt; Established SA: 138.44.5.6[500]-13.75.156.231[500] message id:0x00000000, SPI:0xD4531654/0x58A1452E parent SN:467 &amp;lt;====&lt;BR /&gt;2016-07-29 06:50:20 [INFO]: keymirror add start ++++++++++++++++&lt;BR /&gt;2016-07-29 06:50:20 [INFO]: keymirror add for gw 0x1, tn 1, selfSPI D4531654, retcode 0.&lt;BR /&gt;2016-07-29 06:50:21 [INFO]: keymirror del start ----------------&lt;BR /&gt;2016-07-29 06:50:21 [INFO]: keymirror del for gw 1, tn 1, selfSPI D8014654, retcode 0.&lt;BR /&gt;2016-07-29 06:50:21 [INFO]: SADB_DELETE ul_proto=255 src=13.75.156.231[0] dst=138.44.5.6[0] satype=ESP spi=0xD8014654&lt;BR /&gt;2016-07-29 06:50:21 [INFO]: received PFKEY_DELETE seq=0 satype=ESP spi=0xD8014654&lt;BR /&gt;2016-07-29 06:50:21 [PROTO_NOTIFY]: ====&amp;gt; IPSEC KEY DELETED &amp;lt;====&lt;BR /&gt;====&amp;gt; Deleted SA: 138.44.5.6[500]-13.75.156.231[500] SPI:0xD8014654/0xFF5EF270 &amp;lt;====&lt;BR /&gt;2016-07-29 06:50:21 [INFO]: SADB_DELETE ul_proto=255 src=138.44.5.6[0] dst=13.75.156.231[0] satype=ESP spi=0xFF5EF270&lt;BR /&gt;2016-07-29 06:50:21 [INFO]: received PFKEY_DELETE seq=0 satype=ESP spi=0xFF5EF270&lt;BR /&gt;2016-07-29 06:55:19 [INFO]: 467:138.44.5.6[500] - 13.75.156.231[500]:(nil):delete proto ESP spi 0xFF5EF270&lt;BR /&gt;2016-07-29 06:55:19 [PROTO_WARN]: 467:138.44.5.6[500] - 13.75.156.231[500]:(nil):can't find sa for proto ESP spi 0xFF5EF270&lt;BR /&gt;2016-07-29 07:40:17 [PROTO_NOTIFY]: ====&amp;gt; IKEv2 CHILD SA NEGOTIATION STARTED AS INITIATOR, rekey &amp;lt;====&lt;BR /&gt;====&amp;gt; Initiated SA: 138.44.5.6[500]-13.75.156.231[500] message id:0x00000000 parent SN:467 &amp;lt;====&lt;BR /&gt;2016-07-29 07:40:17 [INFO]: SADB_UPDATE ul_proto=255 src=13.75.156.231[500] dst=138.44.5.6[500] satype=ESP samode=tunl spi=0xC9083D8E authtype=SHA1 enctype=3DES enclen=24 lifetime soft time=3058 bytes=0 hard time=3600 bytes=0&lt;BR /&gt;2016-07-29 07:40:17 [INFO]: SADB_ADD ul_proto=255 src=138.44.5.6[500] dst=13.75.156.231[500] satype=ESP samode=tunl spi=0xDAA11134 authtype=SHA1 enctype=3DES enclen=24 lifetime soft time=2893 bytes=0 hard time=3600 bytes=0&lt;BR /&gt;2016-07-29 07:40:17.390 +1000 sadb ts: port 0:65535 IP 0.0.0.0-&amp;gt;255.255.255.255 proto:0 len:16&lt;BR /&gt;2016-07-29 07:40:17.390 +1000 sadb ts: port 0:65535 IP 0.0.0.0-&amp;gt;255.255.255.255 proto:0 len:16&lt;BR /&gt;2016-07-29 07:40:17 [PROTO_NOTIFY]: ====&amp;gt; IPSEC KEY INSTALLATION SUCCEEDED &amp;lt;====&lt;BR /&gt;====&amp;gt; Installed SA: 138.44.5.6[500]-13.75.156.231[500] SPI:0xC9083D8E/0xDAA11134 lifetime 3600 Sec lifesize unlimited &amp;lt;====&lt;BR /&gt;2016-07-29 07:40:17 [PROTO_NOTIFY]: ====&amp;gt; IKEv2 CHILD SA NEGOTIATION SUCCEEDED AS INITIATOR, rekey &amp;lt;====&lt;BR /&gt;====&amp;gt; Established SA: 138.44.5.6[500]-13.75.156.231[500] message id:0x00000001, SPI:0xC9083D8E/0xDAA11134 parent SN:467 &amp;lt;====&lt;BR /&gt;2016-07-29 07:40:17 [INFO]: keymirror add start ++++++++++++++++&lt;BR /&gt;2016-07-29 07:40:17 [INFO]: keymirror add for gw 0x1, tn 1, selfSPI C9083D8E, retcode 0.&lt;BR /&gt;2016-07-29 07:40:17 [INFO]: keymirror del start ----------------&lt;BR /&gt;2016-07-29 07:40:17 [INFO]: keymirror del for gw 1, tn 1, selfSPI D4531654, retcode 0.&lt;BR /&gt;2016-07-29 07:40:17 [INFO]: SADB_DELETE ul_proto=255 src=13.75.156.231[0] dst=138.44.5.6[0] satype=ESP spi=0xD4531654&lt;BR /&gt;2016-07-29 07:40:17 [INFO]: received PFKEY_DELETE seq=0 satype=ESP spi=0xD4531654&lt;BR /&gt;2016-07-29 07:40:17 [PROTO_NOTIFY]: ====&amp;gt; IPSEC KEY DELETED &amp;lt;====&lt;BR /&gt;====&amp;gt; Deleted SA: 138.44.5.6[500]-13.75.156.231[500] SPI:0xD4531654/0x58A1452E &amp;lt;====&lt;BR /&gt;2016-07-29 07:40:17 [INFO]: SADB_DELETE ul_proto=255 src=138.44.5.6[0] dst=13.75.156.231[0] satype=ESP spi=0x58A1452E&lt;BR /&gt;2016-07-29 07:40:17 [INFO]: received PFKEY_DELETE seq=0 satype=ESP spi=0x58A1452E&lt;BR /&gt;2016-07-29 07:45:14 [INFO]: 467:138.44.5.6[500] - 13.75.156.231[500]:(nil):delete proto ESP spi 0x58A1452E&lt;BR /&gt;2016-07-29 07:45:14 [PROTO_WARN]: 467:138.44.5.6[500] - 13.75.156.231[500]:(nil):can't find sa for proto ESP spi 0x58A1452E&lt;/P&gt;</description>
      <pubDate>Thu, 28 Jul 2016 22:59:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-to-azure-dropouts/m-p/100849#M44301</guid>
      <dc:creator>dmann2</dc:creator>
      <dc:date>2016-07-28T22:59:27Z</dc:date>
    </item>
  </channel>
</rss>

