<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: IPSEC site-to-site; passing ICMP only.. no other protocol (TCP/UDP) in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-site-to-site-passing-icmp-only-no-other-protocol-tcp-udp/m-p/155548#M51146</link>
    <description>&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Untitled.png" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/9118i85C2C70E5BDADDCA/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Untitled.png" alt="Untitled.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 08 May 2017 15:48:00 GMT</pubDate>
    <dc:creator>mpgioia</dc:creator>
    <dc:date>2017-05-08T15:48:00Z</dc:date>
    <item>
      <title>IPSEC site-to-site; passing ICMP only.. no other protocol (TCP/UDP)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-site-to-site-passing-icmp-only-no-other-protocol-tcp-udp/m-p/154806#M50965</link>
      <description>&lt;P&gt;I have an IPSEC-to-SITE.&lt;/P&gt;&lt;P&gt;IKE Phase 1 and Phase 2 are good/live.&lt;/P&gt;&lt;P&gt;Tunnel interface in right zone.&amp;nbsp; Routes fines.&lt;/P&gt;&lt;P&gt;Policy defined (app: any, service: any).&lt;/P&gt;&lt;P&gt;I can see the policy being hit when I generate icmp/pings.&amp;nbsp; And can get to the proxy id's/subnets on other side.&lt;/P&gt;&lt;P&gt;I can't get anything other than ICMP through though.. No other TCP/UDP layer traffic.. no logs generated from the same policy (which should be evoked because of the source/destination condition match's that work for ICMP) that should get hit... very strange... ?&lt;/P&gt;</description>
      <pubDate>Tue, 02 May 2017 07:03:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-site-to-site-passing-icmp-only-no-other-protocol-tcp-udp/m-p/154806#M50965</guid>
      <dc:creator>mpgioia</dc:creator>
      <dc:date>2017-05-02T07:03:56Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC site-to-site; passing ICMP only.. no other protocol (TCP/UDP)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-site-to-site-passing-icmp-only-no-other-protocol-tcp-udp/m-p/155251#M51073</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Are you using AES256GCM in phase 2 or could you share your settings? IKEv1 or v2?&lt;/P&gt;&lt;P&gt;You could also check if you have encryption/decryption errors. This can be done on the CLI with the following command:&lt;BR /&gt;show vpn flow tunnel-id &amp;lt;number&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This tunnel-id should be shown in the webui or with the command:&lt;BR /&gt;show vpn ipsec-sa tunnel &amp;lt;IPSEC-TUNNEL-NAME(:PROXY-ID-NAME)&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The question about AES256GCM I was asking becaus with that I was expeciencing exactly the same issue, just hadn't had enough time to dig deeper. I then simply changed to AES256CBC and everything was working.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Remo&lt;/P&gt;</description>
      <pubDate>Fri, 05 May 2017 13:58:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-site-to-site-passing-icmp-only-no-other-protocol-tcp-udp/m-p/155251#M51073</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2017-05-05T13:58:17Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC site-to-site; passing ICMP only.. no other protocol (TCP/UDP)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-site-to-site-passing-icmp-only-no-other-protocol-tcp-udp/m-p/155252#M51074</link>
      <description>&lt;P&gt;Great thing to check ! Thankyou !&lt;/P&gt;&lt;P&gt;But alas, no.. no errors, and i'm using CBC not GCM for AES256 Phase 2 cipher set.&lt;/P&gt;&lt;P&gt;IKEv1 by the way.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any other thoughts ?&lt;/P&gt;</description>
      <pubDate>Fri, 05 May 2017 14:04:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-site-to-site-passing-icmp-only-no-other-protocol-tcp-udp/m-p/155252#M51074</guid>
      <dc:creator>mpgioia</dc:creator>
      <dc:date>2017-05-05T14:04:12Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC site-to-site; passing ICMP only.. no other protocol (TCP/UDP)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-site-to-site-passing-icmp-only-no-other-protocol-tcp-udp/m-p/155254#M51076</link>
      <description>&lt;P&gt;Could you share all the IKE/IPSec parameters?&lt;/P&gt;&lt;P&gt;What gateway-vendor/gateway-typ is on the other side?&lt;/P&gt;</description>
      <pubDate>Fri, 05 May 2017 14:18:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-site-to-site-passing-icmp-only-no-other-protocol-tcp-udp/m-p/155254#M51076</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2017-05-05T14:18:29Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC site-to-site; passing ICMP only.. no other protocol (TCP/UDP)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-site-to-site-passing-icmp-only-no-other-protocol-tcp-udp/m-p/155262#M51078</link>
      <description>&lt;P&gt;PAN to Cisco ASA&lt;/P&gt;&lt;P&gt;Phase 1&lt;/P&gt;&lt;P&gt;IKEv1 only&lt;/P&gt;&lt;P&gt;Exchange mode = auto&lt;/P&gt;&lt;P&gt;IKE crypto = aes256cbc, SHA1, DH group2&lt;/P&gt;&lt;P&gt;Phase 2&lt;/P&gt;&lt;P&gt;Type = Autokey&lt;/P&gt;&lt;P&gt;Proxy IDs are set.&lt;/P&gt;&lt;P&gt;Near: 192.168.74.0/24, Far: 172.29.17.128/25&lt;/P&gt;&lt;P&gt;Near: 192.168.75.0/24, Far: 172.29.17.128/25&lt;/P&gt;&lt;P&gt;Near: 192.168.76.0/24, Far: 172.29.17.128/25&lt;/P&gt;&lt;P&gt;IPSEC crypto = ESP, aes256cbc, SHA, DH group2&lt;/P&gt;&lt;P&gt;Tied to tunnel.1, trust zone, route set to reach 172.29.17.128/25&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Policy set to allow&lt;/P&gt;&lt;P&gt;NAT rule in place to exempt NAT for this specific source and destination (otherwise it hits the bottom-most source NAT dynamic ip and port for internet access for the near side networks)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;All the IKE/IPSEC stuff and policy is fine because ping gets there.&lt;/P&gt;&lt;P&gt;I can disable the tunnel and ping stops.&amp;nbsp; And monitor shows my policy I designed for this being hit with the icmp.&amp;nbsp; But can't get any L4 traffic over there.&amp;nbsp; Show session shows nothing also..&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Need anything else ?&lt;/P&gt;</description>
      <pubDate>Fri, 05 May 2017 14:29:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-site-to-site-passing-icmp-only-no-other-protocol-tcp-udp/m-p/155262#M51078</guid>
      <dc:creator>mpgioia</dc:creator>
      <dc:date>2017-05-05T14:29:52Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC site-to-site; passing ICMP only.. no other protocol (TCP/UDP)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-site-to-site-passing-icmp-only-no-other-protocol-tcp-udp/m-p/155265#M51080</link>
      <description>&lt;P&gt;I'd try to source the ping as something other than an interface, and then check static routes to the subnets on the other side. It sounds like the traffic doesn't know how to get across perhaps. I'd recheck the ASA's interesting traffic/subnets from the Palo are set right.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 05 May 2017 14:43:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-site-to-site-passing-icmp-only-no-other-protocol-tcp-udp/m-p/155265#M51080</guid>
      <dc:creator>ChrisRussell</dc:creator>
      <dc:date>2017-05-05T14:43:27Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC site-to-site; passing ICMP only.. no other protocol (TCP/UDP)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-site-to-site-passing-icmp-only-no-other-protocol-tcp-udp/m-p/155266#M51081</link>
      <description>&lt;P&gt;I agree....Traffic logging only appears when session established.&lt;/P&gt;&lt;P&gt;So any furfy of not seeing at least my TCP SYN's/my side of the traffic getting over I shouldn't get hung up on.. because the session is not established.. that's why I'm not seeing any traffic. ( I originally.. .erroneously .. was getting hung up on why I couldn't see at my TCP leg making it's way over in the traffic logs.. but no session.. that's why )&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've gone through my config on near side to death.. I think it is the other side.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But then... ICMP gets there and back.. so if it was fundamental routing.. even ICMP wouldn't get there ?&lt;/P&gt;</description>
      <pubDate>Fri, 05 May 2017 14:48:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-site-to-site-passing-icmp-only-no-other-protocol-tcp-udp/m-p/155266#M51081</guid>
      <dc:creator>mpgioia</dc:creator>
      <dc:date>2017-05-05T14:48:17Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC site-to-site; passing ICMP only.. no other protocol (TCP/UDP)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-site-to-site-passing-icmp-only-no-other-protocol-tcp-udp/m-p/155272#M51085</link>
      <description>&lt;P&gt;You could also enable "Session Start" log so you will also see logs for not established sessions.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But as you describe this setup, and when you don't see any encryption/decryption errors I would also definately check the other side (make someone check the other side). Maybe the other side has access-lists in place which only allow icmp?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What you could still check is the system log, if the ASA tries to setup a new phase 2 tunnel for tcp traffic while sending only icmp to the existing one. Not really likely but a while ago I had a cisco-router admin who somhow managed to configure his router to setup different phase 2 tunnels for every source/destination/port constellation.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;With the routing I think you're absolutely right. If there is a routing problem also icmp would fail.&lt;/P&gt;</description>
      <pubDate>Fri, 05 May 2017 15:25:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-site-to-site-passing-icmp-only-no-other-protocol-tcp-udp/m-p/155272#M51085</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2017-05-05T15:25:50Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC site-to-site; passing ICMP only.. no other protocol (TCP/UDP)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-site-to-site-passing-icmp-only-no-other-protocol-tcp-udp/m-p/155275#M51087</link>
      <description>&lt;P&gt;Yeah, thats why i recommended sourcing pings from something other than whatever interface its pinging from now.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ping source &amp;lt;pick an IP on palo side subnet&amp;gt; host &amp;lt;pick an IP on ASA side subnet&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If pings throughtout the local subnet are reachable on the remote subnet then it has to be some sort of policy/services issue I'd think. I just always start at routing and work from there.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 05 May 2017 15:34:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-site-to-site-passing-icmp-only-no-other-protocol-tcp-udp/m-p/155275#M51087</guid>
      <dc:creator>ChrisRussell</dc:creator>
      <dc:date>2017-05-05T15:34:12Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC site-to-site; passing ICMP only.. no other protocol (TCP/UDP)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-site-to-site-passing-icmp-only-no-other-protocol-tcp-udp/m-p/155280#M51089</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;@AXI_IIEN_Remo wrote:&lt;BR /&gt;&lt;P&gt;You could also enable "Session Start" log so you will also see logs for not established sessions.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But as you describe this setup, and when you don't see any encryption/decryption errors I would also definately check the other side (make someone check the other side). Maybe the other side has access-lists in place which only allow icmp?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What you could still check is the system log, if the ASA tries to setup a new phase 2 tunnel for tcp traffic while sending only icmp to the existing one. Not really likely but a while ago I had a cisco-router admin who somhow managed to configure his router to setup different phase 2 tunnels for every source/destination/port constellation.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;With the routing I think you're absolutely right. If there is a routing problem also icmp would fail.&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yeh am logging at Session Start and End.&lt;/P&gt;&lt;P&gt;Don't see nothing..&lt;/P&gt;&lt;P&gt;I'll check the other side.. Thanks guys.&lt;/P&gt;</description>
      <pubDate>Fri, 05 May 2017 15:49:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-site-to-site-passing-icmp-only-no-other-protocol-tcp-udp/m-p/155280#M51089</guid>
      <dc:creator>mpgioia</dc:creator>
      <dc:date>2017-05-05T15:49:12Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC site-to-site; passing ICMP only.. no other protocol (TCP/UDP)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-site-to-site-passing-icmp-only-no-other-protocol-tcp-udp/m-p/155283#M51091</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;@chris.russell wrote:&lt;BR /&gt;&lt;P&gt;Yeah, thats why i recommended sourcing pings from something other than whatever interface its pinging from now.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Educate me here. ... what do you mean by this ? &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Right now, I'm on a near end proxy-id/policy source address.. (like an actual machine in this subnet.. remotely) pinging to proxy-id/policy destination address (this I'm not on remotely.. but have been told in confidence by far end representative it's there and live.. obviously..)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;See.. now i'm stressing again that it's my side again if 'Session Start' is ticked in logging on my policy and I don't see my traffic-half/side on the way to the far end.. when I technicaly should right ?&lt;/P&gt;</description>
      <pubDate>Fri, 05 May 2017 15:56:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-site-to-site-passing-icmp-only-no-other-protocol-tcp-udp/m-p/155283#M51091</guid>
      <dc:creator>mpgioia</dc:creator>
      <dc:date>2017-05-05T15:56:50Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC site-to-site; passing ICMP only.. no other protocol (TCP/UDP)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-site-to-site-passing-icmp-only-no-other-protocol-tcp-udp/m-p/155524#M51139</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;l do like this article:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/Management-Articles/How-to-Troubleshoot-IPSec-VPN-connectivity-issues/ta-p/59187" target="_blank"&gt;https://live.paloaltonetworks.com/t5/Management-Articles/How-to-Troubleshoot-IPSec-VPN-connectivity-issues/ta-p/59187&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Especially this part:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="decap.PNG" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/9112i28A33636EFB443C9/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="decap.PNG" alt="decap.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;exp:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="en.PNG" style="width: 577px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/9114iB8FCE9F55A49D58C/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="en.PNG" alt="en.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you don't see the session logs in the&amp;nbsp;monitoring tab to me it is a local issue (assumimng that the log is enabled for the policy, even for the default deny). If the&amp;nbsp;Palo receives the traffic and correctly encapsulation and putting it into the tunnel interface&amp;nbsp;you should see the traffic logs and something like "incomplete" in application tab and "aged-out" in the session end reason (assuming the traffic is not coming back. Very strange&amp;nbsp;that the ping is working)) did you try to run a PCAP on the firewall ? Create a filter for the other end destination ip and get PCAP. Check if any traffic is dropped by the&amp;nbsp;firewall.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 08 May 2017 14:10:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-site-to-site-passing-icmp-only-no-other-protocol-tcp-udp/m-p/155524#M51139</guid>
      <dc:creator>TranceforLife</dc:creator>
      <dc:date>2017-05-08T14:10:31Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC site-to-site; passing ICMP only.. no other protocol (TCP/UDP)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-site-to-site-passing-icmp-only-no-other-protocol-tcp-udp/m-p/155536#M51141</link>
      <description>&lt;P&gt;This is ridiculous.. and appreciate the pipe in &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/37163"&gt;@TranceforLife&lt;/a&gt;.&lt;/P&gt;&lt;P&gt;Yes, incrementing enc/dec packets.&lt;/P&gt;&lt;P&gt;And check this out.. when I run a PCAP,&amp;nbsp; and filter right down to a source of a /32 and a destination of a /32 (near and far end), all 4 stages of what it can pcap.. I literally get no files created when I try to, like, http/https browse.&amp;nbsp; Nothing.&lt;/P&gt;&lt;P&gt;I start my ping off to the dest.. bang files created.. &lt;span class="lia-unicode-emoji" title=":confused_face:"&gt;😕&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If it helps, at least on the far end/Cisco side I get a repeating,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;----------------------------------------------------------------------------------------------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;IPSEC: The decapsulated inner packet doesn't match the negotiated policy in the SA. &amp;nbsp;&lt;BR /&gt;The packet specifies its destination as pkt_daddr its source as pkt_saddr, and its protocol as pkt_prot.&lt;BR /&gt;The SA specifies its local proxy as id_daddr/id_dmask/id_dprot/id_dport and its remote proxy as id_saddr/id_smask/id_sprot/id_sport.&lt;/P&gt;&lt;P&gt;----------------------------------------------------------------------------------------------------------------------------------------------------------&lt;/P&gt;</description>
      <pubDate>Mon, 08 May 2017 14:38:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-site-to-site-passing-icmp-only-no-other-protocol-tcp-udp/m-p/155536#M51141</guid>
      <dc:creator>mpgioia</dc:creator>
      <dc:date>2017-05-08T14:38:52Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC site-to-site; passing ICMP only.. no other protocol (TCP/UDP)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-site-to-site-passing-icmp-only-no-other-protocol-tcp-udp/m-p/155537#M51142</link>
      <description>&lt;P&gt;Infact I just posted template Syslog output (or should I say.. all I received was the template syslog output from the rep on the other side..) i'll get the actual output/log line to see what the translated inner packet is.&lt;/P&gt;</description>
      <pubDate>Mon, 08 May 2017 14:42:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-site-to-site-passing-icmp-only-no-other-protocol-tcp-udp/m-p/155537#M51142</guid>
      <dc:creator>mpgioia</dc:creator>
      <dc:date>2017-05-08T14:42:48Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC site-to-site; passing ICMP only.. no other protocol (TCP/UDP)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-site-to-site-passing-icmp-only-no-other-protocol-tcp-udp/m-p/155541#M51143</link>
      <description>&lt;P&gt;omg..&lt;/P&gt;&lt;P&gt;I think the 'decapsulated inner packet' is coming through on Cisco ASA as IPv6 ?!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Look at the log line at the end.. truncated off..&amp;nbsp; But the first parameter appears to be in IPv6 format ?&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Untitled.png" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/9116iE5FAAC61DAFEC261/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Untitled.png" alt="Untitled.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 08 May 2017 14:51:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-site-to-site-passing-icmp-only-no-other-protocol-tcp-udp/m-p/155541#M51143</guid>
      <dc:creator>mpgioia</dc:creator>
      <dc:date>2017-05-08T14:51:43Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC site-to-site; passing ICMP only.. no other protocol (TCP/UDP)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-site-to-site-passing-icmp-only-no-other-protocol-tcp-udp/m-p/155545#M51145</link>
      <description>&lt;P&gt;Can you please post the&amp;nbsp;magnified traffic log output from the&amp;nbsp;successful&amp;nbsp;ping requests.&lt;/P&gt;</description>
      <pubDate>Mon, 08 May 2017 15:41:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-site-to-site-passing-icmp-only-no-other-protocol-tcp-udp/m-p/155545#M51145</guid>
      <dc:creator>TranceforLife</dc:creator>
      <dc:date>2017-05-08T15:41:17Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC site-to-site; passing ICMP only.. no other protocol (TCP/UDP)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-site-to-site-passing-icmp-only-no-other-protocol-tcp-udp/m-p/155548#M51146</link>
      <description>&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Untitled.png" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/9118i85C2C70E5BDADDCA/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Untitled.png" alt="Untitled.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 08 May 2017 15:48:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-site-to-site-passing-icmp-only-no-other-protocol-tcp-udp/m-p/155548#M51146</guid>
      <dc:creator>mpgioia</dc:creator>
      <dc:date>2017-05-08T15:48:00Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC site-to-site; passing ICMP only.. no other protocol (TCP/UDP)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-site-to-site-passing-icmp-only-no-other-protocol-tcp-udp/m-p/155556#M51148</link>
      <description>&lt;P&gt;How to you forward the traffic with a static route or PBF? Traceroute output&lt;/P&gt;</description>
      <pubDate>Mon, 08 May 2017 16:02:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-site-to-site-passing-icmp-only-no-other-protocol-tcp-udp/m-p/155556#M51148</guid>
      <dc:creator>TranceforLife</dc:creator>
      <dc:date>2017-05-08T16:02:47Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC site-to-site; passing ICMP only.. no other protocol (TCP/UDP)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-site-to-site-passing-icmp-only-no-other-protocol-tcp-udp/m-p/155567#M51149</link>
      <description>&lt;P&gt;Static. default vr. to tunnel interface.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;From the 192.168.75.15 host (near end) below.&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Untitled.png" style="width: 671px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/9122i90585CB361A9B575/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Untitled.png" alt="Untitled.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 08 May 2017 16:15:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-site-to-site-passing-icmp-only-no-other-protocol-tcp-udp/m-p/155567#M51149</guid>
      <dc:creator>mpgioia</dc:creator>
      <dc:date>2017-05-08T16:15:28Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC site-to-site; passing ICMP only.. no other protocol (TCP/UDP)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-site-to-site-passing-icmp-only-no-other-protocol-tcp-udp/m-p/155570#M51151</link>
      <description>So a little recap: you can ping the host on the other side but you are not able to transfer tcp traffic over the tunnel, right? And the paloalto firewall is on your own side where you start the ping/tcp sessions? And in addition you don't see any traffic logs for tcp traffic?&lt;BR /&gt;&lt;BR /&gt;Did you try a flow basic to do a low level check whats happening on your side or if the traffic even arrives at your firewall?&lt;BR /&gt;&lt;A href="https://live.paloaltonetworks.com/t5/Featured-Articles/Getting-Started-Flow-Basic/ta-p/72556" target="_blank"&gt;https://live.paloaltonetworks.com/t5/Featured-Articles/Getting-Started-Flow-Basic/ta-p/72556&lt;/A&gt;</description>
      <pubDate>Mon, 08 May 2017 16:51:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-site-to-site-passing-icmp-only-no-other-protocol-tcp-udp/m-p/155570#M51151</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2017-05-08T16:51:41Z</dc:date>
    </item>
  </channel>
</rss>

