<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic PA to Cisco 5505 VPN tunnel in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/pa-to-cisco-5505-vpn-tunnel/m-p/6862#M5045</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;When trying to configure a site to site VPN tunnel from a PA 3020 to a Cisco 5505 firewal I am getting th following messages on the Cisco firewall&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;received encrypted packet with no matching sa dropping&lt;/P&gt;&lt;P&gt;all ipsec proposals found unacceptable&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 04 Jun 2014 19:51:04 GMT</pubDate>
    <dc:creator>infotech</dc:creator>
    <dc:date>2014-06-04T19:51:04Z</dc:date>
    <item>
      <title>PA to Cisco 5505 VPN tunnel</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-to-cisco-5505-vpn-tunnel/m-p/6862#M5045</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;When trying to configure a site to site VPN tunnel from a PA 3020 to a Cisco 5505 firewal I am getting th following messages on the Cisco firewall&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;received encrypted packet with no matching sa dropping&lt;/P&gt;&lt;P&gt;all ipsec proposals found unacceptable&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 04 Jun 2014 19:51:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-to-cisco-5505-vpn-tunnel/m-p/6862#M5045</guid>
      <dc:creator>infotech</dc:creator>
      <dc:date>2014-06-04T19:51:04Z</dc:date>
    </item>
    <item>
      <title>Re: PA to Cisco 5505 VPN tunnel</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-to-cisco-5505-vpn-tunnel/m-p/6863#M5046</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Infotech,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could you please clear the IKE and IPSec security association (SA) on both firewalls and then initiate the tunnel once again. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For example, in PAN FW: &lt;/P&gt;&lt;P style="margin-bottom: .0001pt; background: white;"&gt;&lt;SPAN style="font-size: 8.0pt; font-family: 'Courier New'; color: #3b3b3b;"&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;clear&lt;/SPAN&gt; &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;vpn&lt;/SPAN&gt; &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;ike&lt;/SPAN&gt;-&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;sa&lt;/SPAN&gt; gateway XXXXX&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="background: white;"&gt;&lt;SPAN style="font-size: 8.0pt; font-family: 'Courier New'; color: #3b3b3b;"&gt;Delete IKEv1 IKE SA: Total 1 gateways found.&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="background: white;"&gt;&lt;SPAN style="font-size: 10.0pt; font-family: 'Helvetica','sans-serif'; color: #3b3b3b;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P style="background: white;"&gt;&lt;SPAN style="font-size: 8.0pt; font-family: 'Courier New'; color: #3b3b3b;"&gt;&amp;gt; &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;clear&lt;/SPAN&gt; &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;vpn&lt;/SPAN&gt; &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;ipsec&lt;/SPAN&gt;-&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;sa&lt;/SPAN&gt; tunnel XXXXXX&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="background: white;"&gt;&lt;SPAN style="font-size: 8.0pt; font-family: 'Courier New'; color: #3b3b3b;"&gt;Delete IKEv1 IPSec SA: Total 1 tunnels found.&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; background: white;"&gt;&lt;SPAN style="font-size: 8.0pt; font-family: 'Courier New'; color: #3b3b3b;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; background: white;"&gt;&lt;SPAN style="font-size: 8.0pt; font-family: 'Courier New'; color: #3b3b3b;"&gt;&amp;gt; &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;test&lt;/SPAN&gt; &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;vpn&lt;/SPAN&gt; &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;ike&lt;/SPAN&gt;-&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;sa&lt;/SPAN&gt; gateway XXXXXX&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="background: white;"&gt;&lt;SPAN style="font-size: 8.0pt; font-family: 'Courier New'; color: #3b3b3b;"&gt;Initiate IKE SA: Total 1 gateways found. 1 &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;ike&lt;/SPAN&gt; &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;sa&lt;/SPAN&gt; &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;found&lt;/SPAN&gt;.&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="background: white;"&gt;&lt;SPAN style="font-size: 10.0pt; font-family: 'Helvetica','sans-serif'; color: #3b3b3b;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P style="background: white;"&gt;&lt;SPAN style="font-size: 8.0pt; font-family: 'Courier New'; color: #3b3b3b;"&gt;&amp;gt; &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;test&lt;/SPAN&gt; &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;vpn&lt;/SPAN&gt; &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;ipsec&lt;/SPAN&gt;-&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;sa&lt;/SPAN&gt; tunnel XXXXXX&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="background: white;"&gt;&lt;SPAN style="font-size: 8.0pt; font-family: 'Courier New'; color: #3b3b3b;"&gt;Initiate IPSec SA: Total 1 tunnels found. 1 &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;ipsec&lt;/SPAN&gt; &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;sa&lt;/SPAN&gt; &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;found&lt;/SPAN&gt;.&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; background: white;"&gt;&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; background: white;"&gt;Also, verify if there &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;are&lt;/SPAN&gt; any IKE session in discard state between the gateways.&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; background: white;"&gt;&lt;/P&gt;&lt;P style="margin-bottom: .0001pt; background: white;"&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 04 Jun 2014 19:57:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-to-cisco-5505-vpn-tunnel/m-p/6863#M5046</guid>
      <dc:creator>HULK</dc:creator>
      <dc:date>2014-06-04T19:57:42Z</dc:date>
    </item>
    <item>
      <title>Re: PA to Cisco 5505 VPN tunnel</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-to-cisco-5505-vpn-tunnel/m-p/6864#M5047</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I cleared on the PA side but have to lookup how to do it on the Cisco side&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is what I got when I did the test vpn ipsec-sa tunnel&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Initiate IPSec SA: Total 12 tunnels found. 12 ipsec sa found.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 04 Jun 2014 20:46:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-to-cisco-5505-vpn-tunnel/m-p/6864#M5047</guid>
      <dc:creator>infotech</dc:creator>
      <dc:date>2014-06-04T20:46:24Z</dc:date>
    </item>
    <item>
      <title>Re: PA to Cisco 5505 VPN tunnel</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-to-cisco-5505-vpn-tunnel/m-p/6865#M5048</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Looks like you might have mismatch between the proposals configured between the two devices . Make sure the proposals chosen on both sides are matching ( Encryption, Authentication, DH Group , life time and life size)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Jun 2014 04:23:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-to-cisco-5505-vpn-tunnel/m-p/6865#M5048</guid>
      <dc:creator>knarra1</dc:creator>
      <dc:date>2014-06-05T04:23:11Z</dc:date>
    </item>
    <item>
      <title>Re: PA to Cisco 5505 VPN tunnel</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-to-cisco-5505-vpn-tunnel/m-p/6866#M5049</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That was my first thought and I could be missing something but they look the same as far as I can tell. It looks like to me it is failing on phase 2 any suggestion on where else to look on the PA or the Cisco I would appreciate&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Jun 2014 12:57:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-to-cisco-5505-vpn-tunnel/m-p/6866#M5049</guid>
      <dc:creator>infotech</dc:creator>
      <dc:date>2014-06-05T12:57:00Z</dc:date>
    </item>
    <item>
      <title>Re: PA to Cisco 5505 VPN tunnel</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-to-cisco-5505-vpn-tunnel/m-p/6867#M5050</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Have you reviewed the IKE log on the 3020&lt;/P&gt;&lt;P&gt;from the CLI&lt;/P&gt;&lt;P&gt;less mp-log ikemgr.log&lt;/P&gt;&lt;P&gt;What do you have set for your proxy-ids on your 3020?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Jun 2014 13:18:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-to-cisco-5505-vpn-tunnel/m-p/6867#M5050</guid>
      <dc:creator>jcostello</dc:creator>
      <dc:date>2014-06-05T13:18:36Z</dc:date>
    </item>
    <item>
      <title>Re: PA to Cisco 5505 VPN tunnel</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-to-cisco-5505-vpn-tunnel/m-p/6868#M5051</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here is the result of running less mp-log ikemge.log&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2014-06-04 21:11:32 [INFO]: ====&amp;gt; PHASE-1 SA LIFETIME EXPIRED &amp;lt;====&lt;/P&gt;&lt;P&gt;====&amp;gt; Expired SA: 66.94.196.107[500]-66.94.196.108[500] cookie:00299ee1552db716:80142a8d6f5a61d8 &amp;lt;====&lt;/P&gt;&lt;P&gt;2014-06-04 21:11:42 [INFO]: ====&amp;gt; PHASE-1 SA LIFETIME EXPIRED &amp;lt;====&lt;/P&gt;&lt;P&gt;====&amp;gt; Expired SA: 66.94.196.107[500]-66.94.196.108[500] cookie:00299ee1552db716:80142a8d6f5a61d8 &amp;lt;====&lt;/P&gt;&lt;P&gt;2014-06-04 21:11:45 [PROTO_NOTIFY]: notification message 36136:R-U-THERE, doi=1 proto_id=1 spi=69d80199e1a26574 e572d79797571b2d (size=16).&lt;/P&gt;&lt;P&gt;2014-06-04 21:11:52 [INFO]: ====&amp;gt; PHASE-1 SA LIFETIME EXPIRED &amp;lt;====&lt;/P&gt;&lt;P&gt;====&amp;gt; Expired SA: 66.94.196.107[500]-66.94.196.108[500] cookie:00299ee1552db716:80142a8d6f5a61d8 &amp;lt;====&lt;/P&gt;&lt;P&gt;2014-06-04 21:12:01 [PROTO_NOTIFY]: ====&amp;gt; PHASE-2 NEGOTIATION FAILED AS INITIATOR, (QUICK MODE) &amp;lt;====&lt;/P&gt;&lt;P&gt;====&amp;gt; Failed SA: 66.94.196.107[500]-66.94.196.108[500] message id:0x17F5E673 &amp;lt;==== Due to negotiation timeout.&lt;/P&gt;&lt;P&gt;2014-06-04 21:12:01 [INFO]: IPsec-SA request for 66.94.196.108 queued since no phase1 found&lt;/P&gt;&lt;P&gt;2014-06-04 21:12:01 [PROTO_NOTIFY]: ====&amp;gt; PHASE-1 NEGOTIATION STARTED AS INITIATOR, MAIN MODE &amp;lt;====&lt;/P&gt;&lt;P&gt;====&amp;gt; Initiated SA: 66.94.196.107[500]-66.94.196.108[500] cookie:880e62bac918006c:0000000000000000 &amp;lt;====&lt;/P&gt;&lt;P&gt;2014-06-04 21:12:01 [INFO]: received Vendor ID: FRAGMENTATION&lt;/P&gt;&lt;P&gt;2014-06-04 21:12:01 [INFO]: received Vendor ID: CISCO-UNITY&lt;/P&gt;&lt;P&gt;2014-06-04 21:12:01 [INFO]: received Vendor ID: draft-ietf-ipsra-isakmp-xauth-06.txt&lt;/P&gt;&lt;P&gt;2014-06-04 21:12:01 [INFO]: received Vendor ID: DPD&lt;/P&gt;&lt;P&gt;2014-06-04 21:12:01 [PROTO_NOTIFY]: ====&amp;gt; PHASE-1 NEGOTIATION SUCCEEDED AS INITIATOR, MAIN MODE &amp;lt;====&lt;/P&gt;&lt;P&gt;====&amp;gt; Established SA: 66.94.196.107[500]-66.94.196.108[500] cookie:880e62bac918006c:454780c80ace55a4 lifetime 28800 Sec &amp;lt;====&lt;/P&gt;&lt;P&gt;2014-06-04 21:12:01 [PROTO_NOTIFY]: ====&amp;gt; PHASE-2 NEGOTIATION STARTED AS INITIATOR, (QUICK MODE) &amp;lt;====&lt;/P&gt;&lt;P&gt;====&amp;gt; Initiated SA: 66.94.196.107[500]-66.94.196.108[500] message id:0x23521A9E &amp;lt;====&lt;/P&gt;&lt;P&gt;2014-06-04 21:12:01 [PROTO_NOTIFY]: notification message 14:NO-PROPOSAL-CHOSEN, doi=1 proto_id=3 spi=880e62bac918006c 454780c80ace55a4 (size=16).&lt;/P&gt;&lt;P&gt;2014-06-04 21:12:02 [INFO]: ====&amp;gt; PHASE-1 SA LIFETIME EXPIRED &amp;lt;====&lt;/P&gt;&lt;P&gt;====&amp;gt; Expired SA: 66.94.196.107[500]-66.94.196.108[500] cookie:00299ee1552db716:80142a8d6f5a61d8 &amp;lt;====&lt;/P&gt;&lt;P&gt;2014-06-04 21:12:02 [INFO]: ====&amp;gt; PHASE-1 SA DELETED &amp;lt;====&lt;/P&gt;&lt;P&gt;====&amp;gt; Deleted SA: 66.94.196.107[500]-66.94.196.108[500] cookie:00299ee1552db716:80142a8d6f5a61d8 &amp;lt;====&lt;/P&gt;&lt;P&gt;2014-06-04 21:12:02 [INFO]: ====&amp;gt; PHASE-1 SA LIFETIME EXPIRED &amp;lt;====&lt;/P&gt;&lt;P&gt;====&amp;gt; Expired SA: 66.94.196.107[500]-66.94.196.108[500] cookie:880e62bac918006c:454780c80ace55a4 &amp;lt;====&lt;/P&gt;&lt;P&gt;2014-06-04 21:12:06 [PROTO_NOTIFY]: notification message 36136:R-U-THERE, doi=1 proto_id=1 spi=25802d7bf6eca062 ba158c53d96c1487 (size=16).&lt;/P&gt;&lt;P&gt;2014-06-04 21:12:12 [INFO]: ====&amp;gt; PHASE-1 SA LIFETIME EXPIRED &amp;lt;====&lt;/P&gt;&lt;P&gt;====&amp;gt; Expired SA: 66.94.196.107[500]-66.94.196.108[500] cookie:880e62bac918006c:454780c80ace55a4 &amp;lt;====&lt;/P&gt;&lt;P&gt;2014-06-04 21:12:22 [INFO]: ====&amp;gt; PHASE-1 SA LIFETIME EXPIRED &amp;lt;====&lt;/P&gt;&lt;P&gt;====&amp;gt; Expired SA: 66.94.196.107[500]-66.94.196.108[500] cookie:880e62bac918006c:454780c80ace55a4 &amp;lt;====&lt;/P&gt;&lt;P&gt;2014-06-04 21:12:31 [PROTO_NOTIFY]: ====&amp;gt; PHASE-2 NEGOTIATION FAILED AS INITIATOR, (QUICK MODE) &amp;lt;====&lt;/P&gt;&lt;P&gt;====&amp;gt; Failed SA: 66.94.196.107[500]-66.94.196.108[500] message id:0x23521A9E &amp;lt;==== Due to negotiation timeout.&lt;/P&gt;&lt;P&gt;2014-06-04 21:12:32 [INFO]: ====&amp;gt; PHASE-1 SA LIFETIME EXPIRED &amp;lt;====&lt;/P&gt;&lt;P&gt;====&amp;gt; Expired SA: 66.94.196.107[500]-66.94.196.108[500] cookie:880e62bac918006c:454780c80ace55a4 &amp;lt;====&lt;/P&gt;&lt;P&gt;2014-06-04 21:12:32 [INFO]: ====&amp;gt; PHASE-1 SA DELETED &amp;lt;====&lt;/P&gt;&lt;P&gt;====&amp;gt; Deleted SA: 66.94.196.107[500]-66.94.196.108[500] cookie:880e62bac918006c:454780c80ace55a4 &amp;lt;====&lt;/P&gt;&lt;P&gt;2014-06-04 21:12:40 [INFO]: IPsec-SA request for 66.94.196.108 queued since no phase1 found&lt;/P&gt;&lt;P&gt;2014-06-04 21:12:40 [PROTO_NOTIFY]: ====&amp;gt; PHASE-1 NEGOTIATION STARTED AS INITIATOR, MAIN MODE &amp;lt;====&lt;/P&gt;&lt;P&gt;====&amp;gt; Initiated SA: 66.94.196.107[500]-66.94.196.108[500] cookie:588677c88a7381ca:0000000000000000 &amp;lt;====&lt;/P&gt;&lt;P&gt;2014-06-04 21:12:40 [INFO]: received Vendor ID: FRAGMENTATION&lt;/P&gt;&lt;P&gt;2014-06-04 21:12:40 [INFO]: received Vendor ID: CISCO-UNITY&lt;/P&gt;&lt;P&gt;2014-06-04 21:12:40 [INFO]: received Vendor ID: draft-ietf-ipsra-isakmp-xauth-06.txt&lt;/P&gt;&lt;P&gt;2014-06-04 21:12:40 [INFO]: received Vendor ID: DPD&lt;/P&gt;&lt;P&gt;2014-06-04 21:12:40 [PROTO_NOTIFY]: ====&amp;gt; PHASE-1 NEGOTIATION SUCCEEDED AS INITIATOR, MAIN MODE &amp;lt;====&lt;/P&gt;&lt;P&gt;====&amp;gt; Established SA: 66.94.196.107[500]-66.94.196.108[500] cookie:588677c88a7381ca:ed7b7952f6d3b488 lifetime 28800 Sec &amp;lt;====&lt;/P&gt;&lt;P&gt;2014-06-04 21:12:40 [PROTO_NOTIFY]: ====&amp;gt; PHASE-2 NEGOTIATION STARTED AS INITIATOR, (QUICK MODE) &amp;lt;====&lt;/P&gt;&lt;P&gt;====&amp;gt; Initiated SA: 66.94.196.107[500]-66.94.196.108[500] message id:0xA0ED9187 &amp;lt;====&lt;/P&gt;&lt;P&gt;2014-06-04 21:12:40 [PROTO_NOTIFY]: notification message 14:NO-PROPOSAL-CHOSEN, doi=1 proto_id=3 spi=588677c88a7381ca ed7b7952f6d3b488 (size=16).&lt;/P&gt;&lt;P&gt;2014-06-04 21:12:41 [INFO]: ====&amp;gt; PHASE-1 SA LIFETIME EXPIRED &amp;lt;====&lt;/P&gt;&lt;P&gt;====&amp;gt; Expired SA: 66.94.196.107[500]-66.94.196.108[500] cookie:588677c88a7381ca:ed7b7952f6d3b488 &amp;lt;====&lt;/P&gt;&lt;P&gt;2014-06-04 21:12:51 [INFO]: ====&amp;gt; PHASE-1 SA LIFETIME EXPIRED &amp;lt;====&lt;/P&gt;&lt;P&gt;====&amp;gt; Expired SA: 66.94.196.107[500]-66.94.196.108[500] cookie:588677c88a7381ca:ed7b7952f6d3b488 &amp;lt;====&lt;/P&gt;&lt;P&gt;2014-06-04 21:13:01 [INFO]: ====&amp;gt; PHASE-1 SA LIFETIME EXPIRED &amp;lt;====&lt;/P&gt;&lt;P&gt;====&amp;gt; Expired SA: 66.94.196.107[500]-66.94.196.108[500] cookie:588677c88a7381ca:ed7b7952f6d3b488 &amp;lt;====&lt;/P&gt;&lt;P&gt;2014-06-04 21:13:10 [PROTO_NOTIFY]: ====&amp;gt; PHASE-2 NEGOTIATION FAILED AS INITIATOR, (QUICK MODE) &amp;lt;====&lt;/P&gt;&lt;P&gt;====&amp;gt; Failed SA: 66.94.196.107[500]-66.94.196.108[500] message id:0xA0ED9187 &amp;lt;==== Due to negotiation timeout.&lt;/P&gt;&lt;P&gt;2014-06-04 21:13:11 [INFO]: ====&amp;gt; PHASE-1 SA LIFETIME EXPIRED &amp;lt;====&lt;/P&gt;&lt;P&gt;0%&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Jun 2014 13:25:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-to-cisco-5505-vpn-tunnel/m-p/6868#M5051</guid>
      <dc:creator>infotech</dc:creator>
      <dc:date>2014-06-05T13:25:14Z</dc:date>
    </item>
    <item>
      <title>Re: PA to Cisco 5505 VPN tunnel</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-to-cisco-5505-vpn-tunnel/m-p/6869#M5052</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Phase 2 Mismatch&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;notification message 14:NO-PROPOSAL-CHOSEN&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;What is the transform set on the ASA for this network?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;What is your corresponding IPSEC policy on the 3020?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;&lt;A href="https://live.paloaltonetworks.com/docs/DOC-1328"&gt;Sample IPSec Tunnel Configuration - Palo Alto Networks Firewall to Cisco ASA&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Jun 2014 13:49:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-to-cisco-5505-vpn-tunnel/m-p/6869#M5052</guid>
      <dc:creator>jcostello</dc:creator>
      <dc:date>2014-06-05T13:49:13Z</dc:date>
    </item>
    <item>
      <title>Re: PA to Cisco 5505 VPN tunnel</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-to-cisco-5505-vpn-tunnel/m-p/6870#M5053</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;What is the transform set on the ASA for this network? ESP-AES-256-SHA (IKEv1) PFS-group1 (looking in the crypto maps)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;What is your corresponding IPSEC policy on the 3020? ESP-AES-Sha1 (ipsec crypto)&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Jun 2014 14:01:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-to-cisco-5505-vpn-tunnel/m-p/6870#M5053</guid>
      <dc:creator>infotech</dc:creator>
      <dc:date>2014-06-05T14:01:11Z</dc:date>
    </item>
    <item>
      <title>Re: PA to Cisco 5505 VPN tunnel</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-to-cisco-5505-vpn-tunnel/m-p/6871#M5054</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;IPSEC Crypto Profile on PA defaults to group-2 (group 1, group-2, group-5 and group-14 are available)&lt;/P&gt;&lt;P&gt;The ASA is indicating group 1&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Jun 2014 14:24:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-to-cisco-5505-vpn-tunnel/m-p/6871#M5054</guid>
      <dc:creator>jcostello</dc:creator>
      <dc:date>2014-06-05T14:24:46Z</dc:date>
    </item>
    <item>
      <title>Re: PA to Cisco 5505 VPN tunnel</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-to-cisco-5505-vpn-tunnel/m-p/6872#M5055</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have the ipsec crypto set to group 1&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Jun 2014 14:36:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-to-cisco-5505-vpn-tunnel/m-p/6872#M5055</guid>
      <dc:creator>infotech</dc:creator>
      <dc:date>2014-06-05T14:36:24Z</dc:date>
    </item>
    <item>
      <title>Re: PA to Cisco 5505 VPN tunnel</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-to-cisco-5505-vpn-tunnel/m-p/6873#M5056</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;From the 3020 CLI - please provide the output for your profile configured for IPSEC&lt;/P&gt;&lt;P&gt;set cli config-output-format set&lt;/P&gt;&lt;P&gt;configure&lt;/P&gt;&lt;P&gt;show network ike crypto-profiles ipsec-crypto-profiles&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;from the ASA&lt;/P&gt;&lt;P&gt;gather the line that starts with &lt;SPAN style="color: #3b3b3b; font-family: 'courier new', courier;"&gt;crypto ipsec transform-set&lt;/SPAN&gt; that is configured for the crypto map&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Jun 2014 15:03:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-to-cisco-5505-vpn-tunnel/m-p/6873#M5056</guid>
      <dc:creator>jcostello</dc:creator>
      <dc:date>2014-06-05T15:03:21Z</dc:date>
    </item>
    <item>
      <title>Re: PA to Cisco 5505 VPN tunnel</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-to-cisco-5505-vpn-tunnel/m-p/6874#M5057</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here is from the PA&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;[edit]&lt;BR /&gt;admin@PA-3020_DR# show network ike crypto-profiles ipsec-crypto-profiles profiles&lt;BR /&gt;[edit]&lt;BR /&gt;admin@PA-3020_DR# show network ike crypto-profiles ipsec-crypto-profiles&lt;BR /&gt;set network ike crypto-profiles ipsec-crypto-profiles default esp encryption [ aes128 3des ]&lt;BR /&gt;set network ike crypto-profiles ipsec-crypto-profiles default esp authentication sha1&lt;BR /&gt;set network ike crypto-profiles ipsec-crypto-profiles default dh-group group2&lt;BR /&gt;set network ike crypto-profiles ipsec-crypto-profiles default lifetime hours 1&lt;BR /&gt;set network ike crypto-profiles ipsec-crypto-profiles Peoria_IPSec_Profile esp authentication sha1&lt;BR /&gt;set network ike crypto-profiles ipsec-crypto-profiles Peoria_IPSec_Profile esp encryption aes256&lt;BR /&gt;set network ike crypto-profiles ipsec-crypto-profiles Peoria_IPSec_Profile lifetime hours 8&lt;BR /&gt;set network ike crypto-profiles ipsec-crypto-profiles Peoria_IPSec_Profile dh-group group1&lt;BR /&gt;set network ike crypto-profiles ipsec-crypto-profiles Herget_Standard_IPSec_Crypto esp authentication sha1&lt;BR /&gt;set network ike crypto-profiles ipsec-crypto-profiles Herget_Standard_IPSec_Crypto esp encryption aes256&lt;BR /&gt;set network ike crypto-profiles ipsec-crypto-profiles Herget_Standard_IPSec_Crypto lifetime hours 1&lt;BR /&gt;set network ike crypto-profiles ipsec-crypto-profiles Herget_Standard_IPSec_Crypto dh-group group1&lt;BR /&gt;set network ike crypto-profiles ipsec-crypto-profiles Herget_Standard_IPSec_Crypto-1 esp authentication sha1&lt;BR /&gt;set network ike crypto-profiles ipsec-crypto-profiles Herget_Standard_IPSec_Crypto-1 esp encryption aes256&lt;BR /&gt;set network ike crypto-profiles ipsec-crypto-profiles Herget_Standard_IPSec_Crypto-1 lifetime hours 8&lt;BR /&gt;set network ike crypto-profiles ipsec-crypto-profiles Herget_Standard_IPSec_Crypto-1 dh-group group1&lt;BR /&gt;[edit]&lt;BR /&gt;admin@PA-3020_DR#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cisco - I am not 100% sure what you are asking me to do here so I just look in the ASDM under site to site vpn\configuration cryptop maps&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;transform set ikev1 ESP-AES-256-SHA&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Jun 2014 15:16:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-to-cisco-5505-vpn-tunnel/m-p/6874#M5057</guid>
      <dc:creator>infotech</dc:creator>
      <dc:date>2014-06-05T15:16:28Z</dc:date>
    </item>
    <item>
      <title>Re: PA to Cisco 5505 VPN tunnel</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-to-cisco-5505-vpn-tunnel/m-p/6875#M5058</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;On the ASA CLI or the configuration output I was looking for the assigned transform set&lt;/P&gt;&lt;P&gt;Which of the crypto profiles on the 3020 is assigned to the VPN that is having issues&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Jun 2014 17:48:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-to-cisco-5505-vpn-tunnel/m-p/6875#M5058</guid>
      <dc:creator>jcostello</dc:creator>
      <dc:date>2014-06-05T17:48:29Z</dc:date>
    </item>
    <item>
      <title>Re: PA to Cisco 5505 VPN tunnel</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-to-cisco-5505-vpn-tunnel/m-p/6876#M5059</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;right now its this one&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;set network ike crypto-profiles ipsec-crypto-profiles Herget_Standard_IPSec_Crypto lifetime hours 1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But I also tried this one too&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;set network ike crypto-profiles ipsec-crypto-profiles Herget_Standard_IPSec_Crypto-1 dh-group group1&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Jun 2014 19:38:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-to-cisco-5505-vpn-tunnel/m-p/6876#M5059</guid>
      <dc:creator>infotech</dc:creator>
      <dc:date>2014-06-05T19:38:00Z</dc:date>
    </item>
    <item>
      <title>Re: PA to Cisco 5505 VPN tunnel</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-to-cisco-5505-vpn-tunnel/m-p/6877#M5060</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;can you grab and clean up (replace any public IPs with something else i.e replace the Cisco address with Cisco-Address) the following from the 3020&lt;/P&gt;&lt;P&gt;show network tunnel ipsec (only need the lines for the tunnel having issues)&lt;/P&gt;&lt;P&gt;show network ike crypto-profiles ike-crypto-profiles&lt;/P&gt;&lt;P&gt; show network ike gateway (only need the gateway associated with this connection)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From the ASA - connect to ssh or console&lt;/P&gt;&lt;P&gt;show run&lt;/P&gt;&lt;P&gt;find the related Cisco command from this article - &lt;A href="https://live.paloaltonetworks.com/docs/DOC-1328"&gt;Sample IPSec Tunnel Configuration - Palo Alto Networks Firewall to Cisco ASA&lt;/A&gt; for the VPN&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Jun 2014 20:20:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-to-cisco-5505-vpn-tunnel/m-p/6877#M5060</guid>
      <dc:creator>jcostello</dc:creator>
      <dc:date>2014-06-05T20:20:01Z</dc:date>
    </item>
    <item>
      <title>Re: PA to Cisco 5505 VPN tunnel</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-to-cisco-5505-vpn-tunnel/m-p/6878#M5061</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This may take me awhile&lt;/P&gt;&lt;P&gt;I tried to do a&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;show network ike crypto-profiles ike-crypto-profiles&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;on the 3020 it gave me an invalid syntax&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Jun 2014 20:54:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-to-cisco-5505-vpn-tunnel/m-p/6878#M5061</guid>
      <dc:creator>infotech</dc:creator>
      <dc:date>2014-06-05T20:54:10Z</dc:date>
    </item>
    <item>
      <title>Re: PA to Cisco 5505 VPN tunnel</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-to-cisco-5505-vpn-tunnel/m-p/6879#M5062</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;try just &lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; font-size: 12px; background-color: #f6f6f6;"&gt;show network ike crypto-profiles&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Jun 2014 12:32:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-to-cisco-5505-vpn-tunnel/m-p/6879#M5062</guid>
      <dc:creator>jcostello</dc:creator>
      <dc:date>2014-06-06T12:32:27Z</dc:date>
    </item>
    <item>
      <title>Re: PA to Cisco 5505 VPN tunnel</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-to-cisco-5505-vpn-tunnel/m-p/6880#M5063</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I do not find an option for show network on the PA 3020 unless I am in the wrong place in the cli&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Jun 2014 12:51:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-to-cisco-5505-vpn-tunnel/m-p/6880#M5063</guid>
      <dc:creator>infotech</dc:creator>
      <dc:date>2014-06-06T12:51:17Z</dc:date>
    </item>
    <item>
      <title>Re: PA to Cisco 5505 VPN tunnel</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-to-cisco-5505-vpn-tunnel/m-p/6881#M5064</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;are you in configure mode?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Jun 2014 13:22:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-to-cisco-5505-vpn-tunnel/m-p/6881#M5064</guid>
      <dc:creator>jcostello</dc:creator>
      <dc:date>2014-06-06T13:22:39Z</dc:date>
    </item>
  </channel>
</rss>

