<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic IPSec Tunnel PAN to Cisco ASA - matching for phase 2 in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-pan-to-cisco-asa-matching-for-phase-2/m-p/155764#M51191</link>
    <description>&lt;P&gt;Do the proxy ID's on the pan side have to match the ACL defined crypto domain on the ASA? That is - suppose on the PAN side you had for phase II of the tunnel 192.168.1.0, 192.168.2.0 and 192.168.3.0 while the ASA side had only 192.168.1.0 and 192.168.2.0. Would phase II tunnel still come and allow traffic for the first two subnets? Or would both sides need to match precisely in order for phase 2 to successfully come up at all? Thank you.&lt;/P&gt;</description>
    <pubDate>Tue, 09 May 2017 16:26:28 GMT</pubDate>
    <dc:creator>palomed</dc:creator>
    <dc:date>2017-05-09T16:26:28Z</dc:date>
    <item>
      <title>IPSec Tunnel PAN to Cisco ASA - matching for phase 2</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-pan-to-cisco-asa-matching-for-phase-2/m-p/155764#M51191</link>
      <description>&lt;P&gt;Do the proxy ID's on the pan side have to match the ACL defined crypto domain on the ASA? That is - suppose on the PAN side you had for phase II of the tunnel 192.168.1.0, 192.168.2.0 and 192.168.3.0 while the ASA side had only 192.168.1.0 and 192.168.2.0. Would phase II tunnel still come and allow traffic for the first two subnets? Or would both sides need to match precisely in order for phase 2 to successfully come up at all? Thank you.&lt;/P&gt;</description>
      <pubDate>Tue, 09 May 2017 16:26:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-pan-to-cisco-asa-matching-for-phase-2/m-p/155764#M51191</guid>
      <dc:creator>palomed</dc:creator>
      <dc:date>2017-05-09T16:26:28Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec Tunnel PAN to Cisco ASA - matching for phase 2</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-pan-to-cisco-asa-matching-for-phase-2/m-p/155765#M51192</link>
      <description>&lt;P&gt;I think l had a &amp;nbsp;similar case some&amp;nbsp;time ago. Where customer added an additional subnet on one side but forgot to configure a proxy id. This was bringing a tunnel down. So yes proxy id`s &amp;nbsp;have to match, otherwise, the tunnel will be coming up/down (flapping). I always imagine a proxy id`s &amp;nbsp;as a additional authentication keys then should match on the both sides.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 09 May 2017 17:02:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-pan-to-cisco-asa-matching-for-phase-2/m-p/155765#M51192</guid>
      <dc:creator>TranceforLife</dc:creator>
      <dc:date>2017-05-09T17:02:27Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec Tunnel PAN to Cisco ASA - matching for phase 2</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-pan-to-cisco-asa-matching-for-phase-2/m-p/155767#M51193</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/37163"&gt;@TranceforLife&lt;/a&gt;&amp;nbsp;If you expect Proxy ID to give additional security then avoid using aggressive mode and stick to main... &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 09 May 2017 17:09:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-pan-to-cisco-asa-matching-for-phase-2/m-p/155767#M51193</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2017-05-09T17:09:41Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec Tunnel PAN to Cisco ASA - matching for phase 2</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-pan-to-cisco-asa-matching-for-phase-2/m-p/155777#M51196</link>
      <description>&lt;P&gt;Well it's not so much that I want extra security. I need to migrate the tunnel to a new data center and in the process we found defunct subnets, overlapping subnets etc etc. So I tried to clean up as best possible. But I was trying to determine if me and the partner are not entirely in-sync if the tunnel would still come up. Tunnel turn-up is always a nightmare. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 09 May 2017 17:59:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-tunnel-pan-to-cisco-asa-matching-for-phase-2/m-p/155777#M51196</guid>
      <dc:creator>palomed</dc:creator>
      <dc:date>2017-05-09T17:59:19Z</dc:date>
    </item>
  </channel>
</rss>

