<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Trouble with IPSec-SA in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/trouble-with-ipsec-sa/m-p/152773#M50489</link>
    <description>&lt;P&gt;Palo Alto uses route based VPN. So it uses routing table to decide where to send packets to.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you are setting up VPN with Peer that uses Policy based VPN then encryption domain is used at their side what traffic should be sent into tunnel.&lt;/P&gt;&lt;P&gt;As config has to match at both ends Palo uses ProxyID inside IPSec config to match encryption domain.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So first thing is to check if you have ProxyID configured (Network &amp;gt; IPSec Tunnels &amp;gt; Name of tunnel).&lt;/P&gt;</description>
    <pubDate>Mon, 17 Apr 2017 03:17:30 GMT</pubDate>
    <dc:creator>Raido_Rattameister</dc:creator>
    <dc:date>2017-04-17T03:17:30Z</dc:date>
    <item>
      <title>Trouble with IPSec-SA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/trouble-with-ipsec-sa/m-p/152727#M50480</link>
      <description>&lt;P&gt;The partner company requires that I translate all packets to them so they appear to come from one public IP address. In monitoring on the PAN I can see that the packet passes and the source address is translated. The problem is that the tunnel is not coming up. I've been using the article at the bottom to try and figure things out.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If I run &amp;gt; test vpn ike-sa gateway &amp;lt;name&amp;gt; - the IKE portion comes up on both side - we both see that.&amp;nbsp;&lt;/P&gt;&lt;P&gt;But no traffic can appear to get from one side to the other and the IPSecSA does not come up.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But tryng to get the tunnel up just by simulating some traffic from one of the sites in the local encryp domain is failing:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2017-04-15 19:13:25 [INFO]: IPsec-SA request for 6.6.2.20 queued since no phase1 found&lt;BR /&gt;====&amp;gt; Initiated SA: 8.8.236.54[500]-6.6.2.20[500] cookie:2800de12dd714ac5:0000000000000000 &amp;lt;====&lt;BR /&gt;====&amp;gt; Established SA: 8.8.236.54[500]-6.6.2.20[500] cookie:2800de12dd714ac5:37eaf345dc0b7e26 lifetime 28800 Sec &amp;lt;====&lt;BR /&gt;====&amp;gt; Initiated SA: 8.8.236.54[500]-6.6.2.20[500] message id:0x83A79855 &amp;lt;====&lt;BR /&gt;====&amp;gt; Expired SA: 8.8.236.54[500]-6.6.2.20[500] cookie:2800de12dd714ac5:37eaf345dc0b7e26 &amp;lt;====&lt;BR /&gt;====&amp;gt; Expired SA: 8.8.236.54[500]-6.6.2.20[500] cookie:2800de12dd714ac5:37eaf345dc0b7e26 &amp;lt;====&lt;BR /&gt;====&amp;gt; Expired SA: 8.8.236.54[500]-6.6.2.20[500] cookie:2800de12dd714ac5:37eaf345dc0b7e26 &amp;lt;====&lt;BR /&gt;====&amp;gt; Failed SA: 8.8.236.54[500]-6.6.2.20[500] message id:0x83A79855 &amp;lt;==== Due to negotiation timeout.&lt;BR /&gt;====&amp;gt; Expired SA: 8.8.236.54[500]-6.6.2.20[500] cookie:2800de12dd714ac5:37eaf345dc0b7e26 &amp;lt;====&lt;BR /&gt;====&amp;gt; Deleted SA: 8.8.236.54[500]-6.6.2.20[500] cookie:2800de12dd714ac5:37eaf345dc0b7e26 &amp;lt;====&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;And debug&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;19:33:11.536704 IP 6.6.2.20.500 &amp;gt; 8.8.236.54.500: isakmp: phase 1 R ident&lt;BR /&gt;19:33:11.541671 IP 8.8.236.54.500 &amp;gt; 6.6.2.20.500: isakmp: phase 1 I ident&lt;BR /&gt;19:33:11.595754 IP 6.6.2.20.500 &amp;gt; 8.8.236.54.500: isakmp: phase 1 R ident&lt;BR /&gt;19:33:11.600478 IP 8.8.236.54.500 &amp;gt; 6.6.2.20.500: isakmp: phase 1 I ident&lt;BR /&gt;19:33:11.654048 IP 6.6.2.20.500 &amp;gt; 8.8.236.54.500: isakmp: phase 1 R ident&lt;BR /&gt;19:33:11.659052 IP 8.8.236.54.500 &amp;gt; 6.6.2.20.500: isakmp: phase 2/others I oakley-quick&lt;BR /&gt;19:33:11.659248 IP 6.6.2.20.500 &amp;gt; 8.8.236.54.500: isakmp: phase 2/others R inf&lt;BR /&gt;19:33:11.713226 IP 6.6.2.20.500 &amp;gt; 8.8.236.54.500: isakmp: phase 2/others R inf&lt;BR /&gt;19:33:11.713572 IP 6.6.2.20.500 &amp;gt; 8.8.236.54.500: isakmp: phase 2/others R inf&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;sho vpn flows seems to show everything stuck in init&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;142 IPSEC-Hooli-VPN:Hooli-1init off 8.8.236.54 6.6.2.20 tunnel.19&lt;BR /&gt;143 IPSEC-Hooli-VPN:Hooli-2init off 8.8.236.54 6.6.2.20 tunnel.19&lt;BR /&gt;144 IPSEC-Hooli-VPN:Hooli-3init off 8.8.236.54 6.6.2.20 tunnel.19&lt;BR /&gt;145 IPSEC-Hooli-VPN:Hooli-4init off 8.8.236.54 6.6.2.20 tunnel.19&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any other thoughts about how to see why the tunnel is not getting triggered although the security and nat policiy are working?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/Management-Articles/How-to-Troubleshoot-IPSec-VPN-connectivity-issues/ta-p/59187" target="_blank"&gt;https://live.paloaltonetworks.com/t5/Management-Articles/How-to-Troubleshoot-IPSec-VPN-connectivity-issues/ta-p/59187&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 16 Apr 2017 03:04:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/trouble-with-ipsec-sa/m-p/152727#M50480</guid>
      <dc:creator>palomed</dc:creator>
      <dc:date>2017-04-16T03:04:39Z</dc:date>
    </item>
    <item>
      <title>Re: Trouble with IPSec-SA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/trouble-with-ipsec-sa/m-p/152773#M50489</link>
      <description>&lt;P&gt;Palo Alto uses route based VPN. So it uses routing table to decide where to send packets to.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you are setting up VPN with Peer that uses Policy based VPN then encryption domain is used at their side what traffic should be sent into tunnel.&lt;/P&gt;&lt;P&gt;As config has to match at both ends Palo uses ProxyID inside IPSec config to match encryption domain.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So first thing is to check if you have ProxyID configured (Network &amp;gt; IPSec Tunnels &amp;gt; Name of tunnel).&lt;/P&gt;</description>
      <pubDate>Mon, 17 Apr 2017 03:17:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/trouble-with-ipsec-sa/m-p/152773#M50489</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2017-04-17T03:17:30Z</dc:date>
    </item>
    <item>
      <title>Re: Trouble with IPSec-SA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/trouble-with-ipsec-sa/m-p/152814#M50496</link>
      <description>&lt;P&gt;as&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/15603"&gt;@Raido_Rattameister&lt;/a&gt;&amp;nbsp;has mentioned already PROXY-ID is a very common issue for the Phase 2 failure.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do you know which firewall on the&amp;nbsp;other end?&lt;/P&gt;</description>
      <pubDate>Mon, 17 Apr 2017 12:51:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/trouble-with-ipsec-sa/m-p/152814#M50496</guid>
      <dc:creator>TranceforLife</dc:creator>
      <dc:date>2017-04-17T12:51:50Z</dc:date>
    </item>
  </channel>
</rss>

