<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Site to Site VPN with error Failed SA in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-vpn-with-error-failed-sa/m-p/133996#M47286</link>
    <description>&lt;P&gt;Just as an FYI it's always easier in these types of situations to have the PA be the responder instead of the initiator. The ikemgr.log will help determine where things are actually getting held up.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 21 Dec 2016 14:44:23 GMT</pubDate>
    <dc:creator>BPry</dc:creator>
    <dc:date>2016-12-21T14:44:23Z</dc:date>
    <item>
      <title>Site to Site VPN with error Failed SA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-vpn-with-error-failed-sa/m-p/133969#M47277</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have configured a site to site vpn between palo alto and cisco ASA. However, both sites are static and PA is the intiator, ACL is configured properly on Cisco side but I got the error:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;"IKE Phase-2 negotiation is failed as initiator, quick mode, Failed SA: 213.42.x.x [4500] - 185.141.x.x [4500] message id:xxxxx. Due to negotiation timeout".&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Proxy IDs on PA is:- Local: 10.12.20.11 Remote: 192.168.248.215&lt;/P&gt;&lt;P&gt;ACL on Cisco: access-list TEST extended permit ip object NETWORK_OBJ_192.168.248.215 object TEST_OBJECT&lt;/P&gt;&lt;P&gt;Where TEST_OBJECT is 10.12.20.11&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I tried a different transform-set on both sides but still the same.&lt;/P&gt;&lt;P&gt;Currently on PA: 3des-SHA1-DH5 life time 1 day&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Currently on Cisco:&lt;/P&gt;&lt;P&gt;crypto map FEWA_IPSEC_MAP 4 match address TEST&lt;/P&gt;&lt;P&gt;crypto map FEWA_IPSEC_MAP 4 set pfs group5&lt;BR /&gt;crypto map FEWA_IPSEC_MAP 4 set peer 213.42.x.x&lt;BR /&gt;crypto map FEWA_IPSEC_MAP 4 set ikev1 transform-set ESP-3DES-SHA-TRANS&lt;BR /&gt;crypto map FEWA_IPSEC_MAP 4 set security-association lifetime seconds 86400&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-3DES-SHA-TRANS esp-3des esp-sha-hmac&lt;/P&gt;&lt;P&gt;Usually when I troubleshoot cisco side I don't have the transform-set ending with TRANS but as the client said its just a "name" for the transform-set. Can anyone with Cisco experience confirm this?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Sharief&lt;/P&gt;</description>
      <pubDate>Thu, 22 Dec 2016 12:55:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-vpn-with-error-failed-sa/m-p/133969#M47277</guid>
      <dc:creator>MohamedSharief</dc:creator>
      <dc:date>2016-12-22T12:55:25Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site VPN with error Failed SA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-vpn-with-error-failed-sa/m-p/133977#M47278</link>
      <description>&lt;P&gt;Logs on Cisco (responder):&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;5|Dec 20 2016|15:10:06|713119|||||Group = 213.42.x.x, IP = 213.42.x.x, PHASE 1 COMPLETED&lt;/P&gt;&lt;P&gt;6|Dec 20 2016|15:10:06|113009|||||AAA retrieved default group policy (DfltGrpPolicy) for user = 213.42.x.x&lt;/P&gt;&lt;P&gt;6|Dec 20 2016|15:10:06|713905|||||Group = 213.42.x.x, IP = 213.42.x.x, Floating NAT-T from 213.42.x.x port 500 to 213.42.x.x port 4500&lt;/P&gt;&lt;P&gt;6|Dec 20 2016|15:10:06|713172|||||Group = 213.42.x.x, IP = 213.42.x.x, Automatic NAT Detection Status:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Remote end&amp;nbsp;&amp;nbsp; IS&amp;nbsp;&amp;nbsp; behind a NAT device&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; This&amp;nbsp;&amp;nbsp; end&amp;nbsp;&amp;nbsp; IS&amp;nbsp;&amp;nbsp; behind a NAT device&lt;/P&gt;&lt;P&gt;5|Dec 20 2016|15:09:47|713904|||||IP = 213.42.x.x, Received encrypted packet with no matching SA, dropping&lt;/P&gt;&lt;P&gt;5|Dec 20 2016|15:09:39|713904|||||IP = 213.42.x.x, Received encrypted packet with no matching SA, dropping&lt;/P&gt;&lt;P&gt;5|Dec 20 2016|15:09:34|713904|||||IP = 213.42.x.x, Received encrypted packet with no matching SA, dropping&lt;/P&gt;&lt;P&gt;5|Dec 20 2016|15:09:31|713904|||||IP = 213.42.x.x, Received encrypted packet with no matching SA, dropping&lt;/P&gt;&lt;P&gt;4|Dec 20 2016|15:09:29|113019|||||Group = 213.42.x.x, Username = 213.42.x.x, IP = 213.42.x.x, Session disconnected. Session Type: LAN-to-LAN, Duration: 0h:00m:00s, Bytes xmt: 0, Bytes rcv: 0, Reason: Phase 2 Mismatch&lt;/P&gt;&lt;P&gt;5|Dec 20 2016|15:09:29|713259|||||Group = 213.42.x.x, IP = 213.42.x.x, Session is being torn down. Reason: Phase 2 Mismatch&lt;/P&gt;&lt;P&gt;3|Dec 20 2016|15:09:29|713902|||||Group = 213.42.x.x, IP = 213.42.x.x, Removing peer from correlator table failed, no match!&lt;/P&gt;&lt;P&gt;3|Dec 20 2016|15:09:29|713902|||||Group = 213.42.x.x, IP = 213.42.x.x, QM FSM error (P2 struct &amp;amp;0x00007fff985da760, mess id 0xa5f29183)!&lt;/P&gt;&lt;P&gt;5|Dec 20 2016|15:09:29|713904|||||Group = 213.42.x.x, IP = 213.42.x.x, All IPSec SA proposals found unacceptable!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;Regards,&lt;/P&gt;&lt;P&gt;Sharief&lt;/P&gt;</description>
      <pubDate>Wed, 21 Dec 2016 12:07:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-vpn-with-error-failed-sa/m-p/133977#M47278</guid>
      <dc:creator>MohamedSharief</dc:creator>
      <dc:date>2016-12-21T12:07:55Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site VPN with error Failed SA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-vpn-with-error-failed-sa/m-p/133979#M47279</link>
      <description>&lt;P&gt;H,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://blog.webernetz.net/2014/01/27/ipsec-site-to-site-vpn-palo-alto-cisco-asa/" target="_blank"&gt;https://blog.webernetz.net/2014/01/27/ipsec-site-to-site-vpn-palo-alto-cisco-asa/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do you have your Proxy ID configured on PA?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Due to negotiation timeout &amp;gt; indicated Proxy ID issue&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://live.paloaltonetworks.com/t5/Management-Articles/IPSec-VPN-Error-IKE-Phase-2-Negotiation-is-Failed-as-Initiator/ta-p/60725" target="_blank"&gt;https://live.paloaltonetworks.com/t5/Management-Articles/IPSec-VPN-Error-IKE-Phase-2-Negotiation-is-Failed-as-Initiator/ta-p/60725&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thx,&lt;/P&gt;&lt;P&gt;Myky&lt;/P&gt;</description>
      <pubDate>Wed, 21 Dec 2016 12:16:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-vpn-with-error-failed-sa/m-p/133979#M47279</guid>
      <dc:creator>TranceforLife</dc:creator>
      <dc:date>2016-12-21T12:16:22Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site VPN with error Failed SA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-vpn-with-error-failed-sa/m-p/133980#M47280</link>
      <description>&lt;P&gt;Hi TranceForLife,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yes. Local: 10.20.12.11 Remote: 192.168.248.215&lt;/P&gt;</description>
      <pubDate>Wed, 21 Dec 2016 12:17:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-vpn-with-error-failed-sa/m-p/133980#M47280</guid>
      <dc:creator>MohamedSharief</dc:creator>
      <dc:date>2016-12-21T12:17:30Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site VPN with error Failed SA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-vpn-with-error-failed-sa/m-p/133981#M47281</link>
      <description>&lt;P&gt;Oh missed that bit. Ok. Can you put PA in passive mode and get &lt;SPAN&gt;ikemgr.log&lt;/SPAN&gt; ? So palo will be responder . Also can you post&amp;nbsp;&lt;SPAN&gt;ikemgr.log file output&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 21 Dec 2016 12:21:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-vpn-with-error-failed-sa/m-p/133981#M47281</guid>
      <dc:creator>TranceforLife</dc:creator>
      <dc:date>2016-12-21T12:21:25Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site VPN with error Failed SA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-vpn-with-error-failed-sa/m-p/133982#M47282</link>
      <description>&lt;P&gt;Hi TranceForLife,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Client want PA to be the initiator only. They cannot initiate from Cisco side.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ikemgr.log will be posted soon.&lt;/P&gt;</description>
      <pubDate>Wed, 21 Dec 2016 12:32:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-vpn-with-error-failed-sa/m-p/133982#M47282</guid>
      <dc:creator>MohamedSharief</dc:creator>
      <dc:date>2016-12-21T12:32:23Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site VPN with error Failed SA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-vpn-with-error-failed-sa/m-p/133996#M47286</link>
      <description>&lt;P&gt;Just as an FYI it's always easier in these types of situations to have the PA be the responder instead of the initiator. The ikemgr.log will help determine where things are actually getting held up.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 21 Dec 2016 14:44:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-vpn-with-error-failed-sa/m-p/133996#M47286</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2016-12-21T14:44:23Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site VPN with error Failed SA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-vpn-with-error-failed-sa/m-p/134175#M47309</link>
      <description>&lt;P&gt;Hi BPry,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yes I know that but things doesn't work like that here, if the client (cirtical government entity) said he want us to be the initiator then that's it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Below is the ikemgr.log he sent to me:&lt;/P&gt;&lt;P&gt;admin@DC-FW01(active)&amp;gt; tail follow yes mp-log ikemgr.log&lt;BR /&gt;4f9020db 78c9ff8e 464ffb6c 7b9d0d7a c8a994df 45e3c063 6e53b252 250b51a0&lt;BR /&gt;38d09ca4 9dc1b5f2 61f58a4e db939b4c 94f8628e d179a88f 79efdd98&lt;BR /&gt;2016-12-13 13:35:32 [DEBUG]: isakmp_inf.c:807:isakmp_info_send_common(): sendto Information notify.&lt;BR /&gt;2016-12-13 13:35:32 [DEBUG]: oakley.c:3345:oakley_delivm(): IV freed&lt;BR /&gt;2016-12-13 13:35:32 [DEBUG]: isakmp_inf.c:1577:isakmp_info_recv_r_u(): received a valid R-U-THERE, ACK sent&lt;BR /&gt;2016-12-13 13:35:32 [PROTO_NOTIFY]: isakmp_inf.c:1161:isakmp_info_recv_n(): notification message 36136:R-U-THERE, doi=1 proto_id=1 spi=6bcbcec39d54fe73 f93698142a05fcbe (size=16).&lt;BR /&gt;2016-12-13 13:35:35.342 +0400 debug: ifmon_request_put(daemon/panike_sysd_if.c:1391): 16 write to pipe: debug_level&lt;BR /&gt;2016-12-13 13:35:35.342 +0400 debug: ifmon_request_get(daemon/panike_sysd_if.c:1407): 16 read from pipe, msg type 1&lt;BR /&gt;2016-12-13 13:35:35.342 +0400 debug: pan_msg_process(daemon/panike_sysd_if.c:1529): request from pipe: debug_level&lt;BR /&gt;2016-12-13 13:35:35 [INFO]: panike_sysd_impl.c:206:panike_debug_level_cb(): panike_debug_level_cb 5 =&amp;gt; 0&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Sharief&lt;/P&gt;</description>
      <pubDate>Thu, 22 Dec 2016 07:27:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-vpn-with-error-failed-sa/m-p/134175#M47309</guid>
      <dc:creator>MohamedSharief</dc:creator>
      <dc:date>2016-12-22T07:27:48Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site VPN with error Failed SA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-vpn-with-error-failed-sa/m-p/134177#M47311</link>
      <description>&lt;P&gt;Check if Cisco is maybe trying to initiate route based or GRE type of tunnel.&lt;/P&gt;</description>
      <pubDate>Thu, 22 Dec 2016 07:36:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-vpn-with-error-failed-sa/m-p/134177#M47311</guid>
      <dc:creator>santonic</dc:creator>
      <dc:date>2016-12-22T07:36:49Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site VPN with error Failed SA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-vpn-with-error-failed-sa/m-p/134204#M47313</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Not sure if you have posted a full pahace 2 config:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;//IPsec phase 1 configuration (IKEv1)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;SPAN&gt;ciscoasa(config)# &lt;/SPAN&gt;&lt;SPAN&gt;crypto ikev1 policy 1&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ciscoasa(config-ikev1-policy)# &lt;/SPAN&gt;&lt;SPAN&gt;authentication pre-share&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ciscoasa(config-ikev1-policy)# &lt;/SPAN&gt;&lt;SPAN&gt;encryption aes-256&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ciscoasa(config-ikev1-policy)# &lt;/SPAN&gt;&lt;SPAN&gt;hash sha&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ciscoasa(config-ikev1-policy)# &lt;/SPAN&gt;&lt;SPAN&gt;group 5&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ciscoasa(config-ikev1-policy)# &lt;/SPAN&gt;&lt;SPAN&gt;lifetime 3600&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ciscoasa(config-ikev1-policy)# &lt;/SPAN&gt;&lt;SPAN&gt;exit&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ciscoasa(config)# crypto ikev1 enable outside&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;SPAN&gt;//Define transform-set using AES-256 and SHA-1&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;SPAN&gt;ciscoasa(config)# &lt;/SPAN&gt;&lt;SPAN&gt;crypto ipsec ikev1 transform-set aesset esp-aes-256 esp-sha-hmac&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;SPAN&gt;//Define access-list for local and remote network&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;SPAN&gt;ciscoasa(config)#&lt;/SPAN&gt;&lt;SPAN&gt; access-list ipsec_access_list extended permit ip 10.1.1.0 255.255.255.0 192.168.30.0 255.255.255.0&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;SPAN&gt;//IPsec phase 2 configuration&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;ciscoasa(config)# &lt;/SPAN&gt;&lt;SPAN&gt;crypto map ipsecmap 1 match address ipsec_access_list&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ciscoasa(config)# &lt;/SPAN&gt;&lt;SPAN&gt;crypto map ipsecmap 1 set peer 210.211.10.1&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ciscoasa(config)#&lt;/SPAN&gt;&lt;SPAN&gt; crypto map ipsecmap 1 set ikev1 transform-set aesset&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ciscoasa(config)# &lt;/SPAN&gt;&lt;SPAN&gt;crypto map ipsecmap 1 set pfs group5&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ciscoasa(config)# &lt;/SPAN&gt;&lt;SPAN&gt;crypto map ipsecmap 1 set security-association lifetime seconds 28800&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ciscoasa(config)# &lt;/SPAN&gt;&lt;SPAN&gt;crypto map ipsecmap interface outside&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Cannot see ACL (match address) TEST within your configuration.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;We definitely got Phase 2 mismatch so need to look here. And yes TRANS is just a name of the transform-set&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 22 Dec 2016 12:19:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-vpn-with-error-failed-sa/m-p/134204#M47313</guid>
      <dc:creator>TranceforLife</dc:creator>
      <dc:date>2016-12-22T12:19:59Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site VPN with error Failed SA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-vpn-with-error-failed-sa/m-p/134239#M47325</link>
      <description>&lt;P&gt;Hi TranceforLife,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Its is there but I forgot to copy it, sorry for that.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;ciscoasa(config)# &lt;/SPAN&gt;&lt;SPAN&gt;crypto map ipsecmap interface outside&lt;/SPAN&gt; &amp;lt;&amp;lt; this one is missing from the configurations I received from Cisco client.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Sharief&lt;/P&gt;</description>
      <pubDate>Thu, 22 Dec 2016 12:54:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-vpn-with-error-failed-sa/m-p/134239#M47325</guid>
      <dc:creator>MohamedSharief</dc:creator>
      <dc:date>2016-12-22T12:54:01Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site VPN with error Failed SA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-vpn-with-error-failed-sa/m-p/134245#M47327</link>
      <description>&lt;P&gt;If the Cisco side of things doesn't specify which interface the crypto map is assigned to that is likely a very large part of your issue.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 22 Dec 2016 13:47:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-vpn-with-error-failed-sa/m-p/134245#M47327</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2016-12-22T13:47:19Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site VPN with error Failed SA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-vpn-with-error-failed-sa/m-p/134246#M47328</link>
      <description>&lt;P&gt;Dont&amp;nbsp;have much experience&amp;nbsp;on s2s vpn from the Cisco side but interesting that&amp;nbsp;P1 is coming&amp;nbsp;up Okay but l am with &amp;nbsp;you as it is actually &amp;nbsp;within Phase 2 configuration. &amp;nbsp;So P1 coming up no probs but P2 ....&lt;/P&gt;</description>
      <pubDate>Thu, 22 Dec 2016 14:42:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-vpn-with-error-failed-sa/m-p/134246#M47328</guid>
      <dc:creator>TranceforLife</dc:creator>
      <dc:date>2016-12-22T14:42:19Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site VPN with error Failed SA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-vpn-with-error-failed-sa/m-p/134259#M47329</link>
      <description>&lt;P&gt;Interesting points guys. Let me verify with ASA end.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Sharief&lt;/P&gt;</description>
      <pubDate>Thu, 22 Dec 2016 14:28:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-vpn-with-error-failed-sa/m-p/134259#M47329</guid>
      <dc:creator>MohamedSharief</dc:creator>
      <dc:date>2016-12-22T14:28:57Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site VPN with error Failed SA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-vpn-with-error-failed-sa/m-p/134578#M47363</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;crypto map FEWA_IPSEC_MAP interface outside &amp;lt;&amp;lt;&amp;lt; found this in the configurations so its not the reason.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Asked them to clear the SA from cisco side and try initiating traffic again from PA.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Sharief&lt;/P&gt;</description>
      <pubDate>Mon, 26 Dec 2016 06:40:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-vpn-with-error-failed-sa/m-p/134578#M47363</guid>
      <dc:creator>MohamedSharief</dc:creator>
      <dc:date>2016-12-26T06:40:46Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site VPN with error Failed SA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-vpn-with-error-failed-sa/m-p/134603#M47366</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Just a quick update. The client sent the "complete" configurations on ASA and we found the following:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;crypto ipsec ikev1 transform-set ESP-3DES-SHA-TRANS mode transport&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;PAN doesn't support transport mode and its only works with tunnel mode.&lt;/P&gt;&lt;P&gt;After removing this command the tunnel came up.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for your help.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Sharief&lt;/P&gt;</description>
      <pubDate>Mon, 26 Dec 2016 11:11:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-vpn-with-error-failed-sa/m-p/134603#M47366</guid>
      <dc:creator>MohamedSharief</dc:creator>
      <dc:date>2016-12-26T11:11:14Z</dc:date>
    </item>
  </channel>
</rss>

