<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: IKE protocol notification message received: INVALID-SPI (11). in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ike-protocol-notification-message-received-invalid-spi-11/m-p/156298#M51309</link>
    <description>&lt;P&gt;Proxy ID's are exactly matching ASA and i'm working with same Proxy ID's for Two years.&lt;/P&gt;&lt;P&gt;DPD, is disables on most of the Tunnels.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;VPN tunnels with PAN in both side are ok and stable&lt;/P&gt;&lt;P&gt;only tunnels with ASA on the other side is haveving this flapping issue with INvaldi SPI error since yesterday.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 11 May 2017 22:08:59 GMT</pubDate>
    <dc:creator>Ammar</dc:creator>
    <dc:date>2017-05-11T22:08:59Z</dc:date>
    <item>
      <title>IKE protocol notification message received: INVALID-SPI (11).</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ike-protocol-notification-message-received-invalid-spi-11/m-p/156253#M51295</link>
      <description>&lt;P&gt;Dears,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have a site to site VPN between PAN 7.1.6 and Cisco ASA 8.2.5, I'm receiving a lot of Invalid SPI error. I tried to reset the VPN many times and still having the same issue. This issue by the way is casusing a lot of packet dropes in the VPN&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;'IKE protocol notification message received: INVALID-SPI (11).'&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Did any one faced a similer issue or have an idea on how to mitigate such issue ?&lt;/P&gt;</description>
      <pubDate>Thu, 11 May 2017 18:12:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ike-protocol-notification-message-received-invalid-spi-11/m-p/156253#M51295</guid>
      <dc:creator>Ammar</dc:creator>
      <dc:date>2017-05-11T18:12:48Z</dc:date>
    </item>
    <item>
      <title>Re: IKE protocol notification message received: INVALID-SPI (11).</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ike-protocol-notification-message-received-invalid-spi-11/m-p/156278#M51301</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please post an output of the below command:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;gt; tail lines 50 mp-log ikemgr.log&lt;/P&gt;</description>
      <pubDate>Thu, 11 May 2017 20:14:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ike-protocol-notification-message-received-invalid-spi-11/m-p/156278#M51301</guid>
      <dc:creator>TranceforLife</dc:creator>
      <dc:date>2017-05-11T20:14:59Z</dc:date>
    </item>
    <item>
      <title>Re: IKE protocol notification message received: INVALID-SPI (11).</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ike-protocol-notification-message-received-invalid-spi-11/m-p/156295#M51306</link>
      <description>&lt;P&gt;The output of the command:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2017-05-11 23:12:11 [INFO]: SADB_ADD ul_proto=255 src=196.3.15.6[500] dst=37.200.227.2[500] satype=ESP samode=tunl spi=0x82DA0798 authtype=SHA1 enctype=AES256 enclen=32 lifetime soft time=23699 bytes=4718592000 hard time=28800 bytes=4718592000&lt;BR /&gt;2017-05-11 23:12:11 [INFO]: IPsec-SA established: ESP/Tunnel 37.200.227.2[500]-&amp;gt;196.3.15.6[500] spi=2404262458(0x8f4e223a)&lt;BR /&gt;2017-05-11 23:12:11 [PROTO_NOTIFY]: ====&amp;gt; IPSEC KEY INSTALLATION SUCCEEDED &amp;lt;====&lt;BR /&gt;====&amp;gt; Installed SA: 196.3.15.6[500]-37.200.227.2[500] SPI:0x8F4E223A/0x82DA0798 lifetime 28800 Sec lifesize 4608000 KB &amp;lt;====&lt;BR /&gt;2017-05-11 23:12:11 [INFO]: keymirror add start ++++++++++++++++&lt;BR /&gt;2017-05-11 23:12:11 [INFO]: keymirror add for gw 0x62, tn 165, selfSPI 8F4E223A, retcode 0.&lt;BR /&gt;2017-05-11 23:12:12 [INFO]: keymirror del start ----------------&lt;BR /&gt;2017-05-11 23:12:12 [INFO]: keymirror del for gw 62, tn 165, selfSPI DE59D8F2, retcode 0.&lt;BR /&gt;2017-05-11 23:12:12 [PROTO_NOTIFY]: ====&amp;gt; IPSEC KEY DELETED &amp;lt;====&lt;BR /&gt;====&amp;gt; Deleted SA: 196.3.15.6[500]-37.200.227.2[500] SPI:0xDE59D8F2/0x895B2115 &amp;lt;====&lt;BR /&gt;2017-05-11 23:12:12 [INFO]: SADB_DELETE ul_proto=0 src=196.3.15.6[500] dst=37.200.227.2[500] satype=ESP spi=0xDE59D8F2&lt;BR /&gt;2017-05-11 23:12:12 [INFO]: received PFKEY_DELETE seq=0 satype=ESP spi=0xDE59D8F2&lt;BR /&gt;2017-05-11 23:12:13 [PROTO_NOTIFY]: ====&amp;gt; PHASE-2 NEGOTIATION STARTED AS RESPONDER, (QUICK MODE) &amp;lt;====&lt;BR /&gt;====&amp;gt; Initiated SA: 196.3.15.6[500]-37.200.227.2[500] message id:0x53707D24 &amp;lt;====&lt;BR /&gt;2017-05-11 23:12:13 [PROTO_NOTIFY]: ====&amp;gt; PHASE-2 NEGOTIATION SUCCEEDED AS RESPONDER, (QUICK MODE) &amp;lt;====&lt;BR /&gt;====&amp;gt; Established SA: 196.3.15.6[500]-37.200.227.2[500] message id:0x53707D24, SPI:0x88E48F13/0x45A3A41B &amp;lt;====&lt;BR /&gt;2017-05-11 23:12:13 [INFO]: SADB_UPDATE ul_proto=255 src=37.200.227.2[500] dst=196.3.15.6[500] satype=ESP samode=tunl spi=0x88E48F13 authtype=SHA1 enctype=AES256 enclen=32 lifetime soft time=28800 bytes=4718592000 hard time=28800 bytes=4718592000&lt;BR /&gt;2017-05-11 23:12:13 [INFO]: SADB_ADD ul_proto=255 src=196.3.15.6[500] dst=37.200.227.2[500] satype=ESP samode=tunl spi=0x45A3A41B authtype=SHA1 enctype=AES256 enclen=32 lifetime soft time=24717 bytes=4718592000 hard time=28800 bytes=4718592000&lt;BR /&gt;2017-05-11 23:12:13 [INFO]: IPsec-SA established: ESP/Tunnel 37.200.227.2[500]-&amp;gt;196.3.15.6[500] spi=2296680211(0x88e48f13)&lt;BR /&gt;2017-05-11 23:12:13 [PROTO_NOTIFY]: ====&amp;gt; IPSEC KEY INSTALLATION SUCCEEDED &amp;lt;====&lt;BR /&gt;====&amp;gt; Installed SA: 196.3.15.6[500]-37.200.227.2[500] SPI:0x88E48F13/0x45A3A41B lifetime 28800 Sec lifesize 4608000 KB &amp;lt;====&lt;BR /&gt;2017-05-11 23:12:13 [INFO]: keymirror add start ++++++++++++++++&lt;BR /&gt;2017-05-11 23:12:13 [INFO]: keymirror add for gw 0x62, tn 238, selfSPI 88E48F13, retcode 0.&lt;BR /&gt;2017-05-11 23:12:13 [INFO]: keymirror del start ----------------&lt;BR /&gt;2017-05-11 23:12:13 [INFO]: keymirror del for gw 62, tn 238, selfSPI BED9420E, retcode 0.&lt;BR /&gt;2017-05-11 23:12:13 [PROTO_NOTIFY]: ====&amp;gt; IPSEC KEY DELETED &amp;lt;====&lt;BR /&gt;====&amp;gt; Deleted SA: 196.3.15.6[500]-37.200.227.2[500] SPI:0xBED9420E/0x6676265D &amp;lt;====&lt;BR /&gt;2017-05-11 23:12:13 [INFO]: SADB_DELETE ul_proto=0 src=196.3.15.6[500] dst=37.200.227.2[500] satype=ESP spi=0xBED9420E&lt;BR /&gt;2017-05-11 23:12:13 [INFO]: received PFKEY_DELETE seq=0 satype=ESP spi=0xBED9420E&lt;BR /&gt;2017-05-11 23:12:15 [PROTO_NOTIFY]: ====&amp;gt; PHASE-2 NEGOTIATION STARTED AS RESPONDER, (QUICK MODE) &amp;lt;====&lt;BR /&gt;====&amp;gt; Initiated SA: 196.3.15.6[500]-37.200.227.2[500] message id:0x53573711 &amp;lt;====&lt;BR /&gt;2017-05-11 23:12:15 [PROTO_NOTIFY]: ====&amp;gt; PHASE-2 NEGOTIATION SUCCEEDED AS RESPONDER, (QUICK MODE) &amp;lt;====&lt;BR /&gt;====&amp;gt; Established SA: 196.3.15.6[500]-37.200.227.2[500] message id:0x53573711, SPI:0xAB25A184/0x4B96A1DB &amp;lt;====&lt;BR /&gt;2017-05-11 23:12:15 [INFO]: SADB_UPDATE ul_proto=255 src=37.200.227.2[500] dst=196.3.15.6[500] satype=ESP samode=tunl spi=0xAB25A184 authtype=SHA1 enctype=AES256 enclen=32 lifetime soft time=28800 bytes=4718592000 hard time=28800 bytes=4718592000&lt;BR /&gt;2017-05-11 23:12:15 [INFO]: SADB_ADD ul_proto=255 src=196.3.15.6[500] dst=37.200.227.2[500] satype=ESP samode=tunl spi=0x4B96A1DB authtype=SHA1 enctype=AES256 enclen=32 lifetime soft time=24531 bytes=4718592000 hard time=28800 bytes=4718592000&lt;BR /&gt;2017-05-11 23:12:15 [INFO]: IPsec-SA established: ESP/Tunnel 37.200.227.2[500]-&amp;gt;196.3.15.6[500] spi=2871370116(0xab25a184)&lt;BR /&gt;2017-05-11 23:12:15 [PROTO_NOTIFY]: ====&amp;gt; IPSEC KEY INSTALLATION SUCCEEDED &amp;lt;====&lt;BR /&gt;====&amp;gt; Installed SA: 196.3.15.6[500]-37.200.227.2[500] SPI:0xAB25A184/0x4B96A1DB lifetime 28800 Sec lifesize 4608000 KB &amp;lt;====&lt;BR /&gt;2017-05-11 23:12:15 [INFO]: keymirror add start ++++++++++++++++&lt;BR /&gt;2017-05-11 23:12:15 [INFO]: keymirror add for gw 0x62, tn 239, selfSPI AB25A184, retcode 0.&lt;BR /&gt;2017-05-11 23:12:16 [INFO]: keymirror del start ----------------&lt;BR /&gt;2017-05-11 23:12:16 [INFO]: keymirror del for gw 62, tn 239, selfSPI D27B0ECA, retcode 0.&lt;BR /&gt;2017-05-11 23:12:16 [PROTO_NOTIFY]: ====&amp;gt; IPSEC KEY DELETED &amp;lt;====&lt;BR /&gt;====&amp;gt; Deleted SA: 196.3.15.6[500]-37.200.227.2[500] SPI:0xD27B0ECA/0xEF3B3C45 &amp;lt;====&lt;BR /&gt;2017-05-11 23:12:16 [INFO]: SADB_DELETE ul_proto=0 src=196.3.15.6[500] dst=37.200.227.2[500] satype=ESP spi=0xD27B0ECA&lt;BR /&gt;2017-05-11 23:12:16 [INFO]: received PFKEY_DELETE seq=0 satype=ESP spi=0xD27B0ECA&lt;BR /&gt;2017-05-11 23:12:18 [PROTO_NOTIFY]: notification message 11:INVALID-SPI, doi=1 proto_id=3 spi=27f42f2f(size=4).&lt;BR /&gt;2017-05-11 23:12:24 [PROTO_NOTIFY]: notification message 11:INVALID-SPI, doi=1 proto_id=3 spi=27f42f2f(size=4).&lt;BR /&gt;2017-05-11 23:12:36 [PROTO_NOTIFY]: notification message 11:INVALID-SPI, doi=1 proto_id=3 spi=728a83a3(size=4).&lt;BR /&gt;2017-05-11 23:12:36 [PROTO_NOTIFY]: notification message 36136:R-U-THERE, doi=1 proto_id=1 spi=ab1b78c39120cd9e 7be127d67dcd5923 (size=16).&lt;/P&gt;</description>
      <pubDate>Thu, 11 May 2017 21:17:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ike-protocol-notification-message-received-invalid-spi-11/m-p/156295#M51306</guid>
      <dc:creator>Ammar</dc:creator>
      <dc:date>2017-05-11T21:17:21Z</dc:date>
    </item>
    <item>
      <title>Re: IKE protocol notification message received: INVALID-SPI (11).</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ike-protocol-notification-message-received-invalid-spi-11/m-p/156296#M51307</link>
      <description>&lt;P&gt;by the way i'm facing VPN disconnections with all IPSEC with ASA on the other side.&lt;/P&gt;</description>
      <pubDate>Thu, 11 May 2017 21:53:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ike-protocol-notification-message-received-invalid-spi-11/m-p/156296#M51307</guid>
      <dc:creator>Ammar</dc:creator>
      <dc:date>2017-05-11T21:53:56Z</dc:date>
    </item>
    <item>
      <title>Re: IKE protocol notification message received: INVALID-SPI (11).</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ike-protocol-notification-message-received-invalid-spi-11/m-p/156297#M51308</link>
      <description>&lt;P&gt;How are your proxy id's settings looks like? Are they matching? DPD setting &amp;nbsp;(timers) should also match. Can you please confirm this&lt;/P&gt;</description>
      <pubDate>Thu, 11 May 2017 22:01:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ike-protocol-notification-message-received-invalid-spi-11/m-p/156297#M51308</guid>
      <dc:creator>TranceforLife</dc:creator>
      <dc:date>2017-05-11T22:01:21Z</dc:date>
    </item>
    <item>
      <title>Re: IKE protocol notification message received: INVALID-SPI (11).</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ike-protocol-notification-message-received-invalid-spi-11/m-p/156298#M51309</link>
      <description>&lt;P&gt;Proxy ID's are exactly matching ASA and i'm working with same Proxy ID's for Two years.&lt;/P&gt;&lt;P&gt;DPD, is disables on most of the Tunnels.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;VPN tunnels with PAN in both side are ok and stable&lt;/P&gt;&lt;P&gt;only tunnels with ASA on the other side is haveving this flapping issue with INvaldi SPI error since yesterday.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 11 May 2017 22:08:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ike-protocol-notification-message-received-invalid-spi-11/m-p/156298#M51309</guid>
      <dc:creator>Ammar</dc:creator>
      <dc:date>2017-05-11T22:08:59Z</dc:date>
    </item>
    <item>
      <title>Re: IKE protocol notification message received: INVALID-SPI (11).</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ike-protocol-notification-message-received-invalid-spi-11/m-p/156299#M51310</link>
      <description>&lt;P&gt;Can you turn on debug to and post detailed logs please:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;gt; debug ike global on debug&lt;/P&gt;&lt;P&gt;&amp;gt; tail lines 50 mp-log ikemgr.log&lt;/P&gt;&lt;P&gt;&amp;gt; debug ike global on normal&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What has changed since yesterday? Pinging experts&lt;/P&gt;&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/15603"&gt;@Raido_Rattameister&lt;/a&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/10238"&gt;@santonic&lt;/a&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 11 May 2017 22:19:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ike-protocol-notification-message-received-invalid-spi-11/m-p/156299#M51310</guid>
      <dc:creator>TranceforLife</dc:creator>
      <dc:date>2017-05-11T22:19:38Z</dc:date>
    </item>
    <item>
      <title>Re: IKE protocol notification message received: INVALID-SPI (11).</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ike-protocol-notification-message-received-invalid-spi-11/m-p/156300#M51311</link>
      <description>&lt;P&gt;nothing changed since yesterday. VPNs start flapping and making invalid SPI's suddenly. i tried many times to clear and re-initae phase1/2 and it is not solving the issues.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Below is the output of the debug&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;017-05-12 00:24:19 [DEBUG]: isakmp.c:1076:isakmp_handler():&lt;BR /&gt;ecf11b57 0e2169a4 6811d477 4daf87fa 08100501 061f6af2 0000004c 6b708b02&lt;BR /&gt;7fb7c9b7 b21999bb 97d209dc 124f53ea abadb25d a15a8096 b4472dca 69492c15&lt;BR /&gt;c9ce9d8c 825930a0 e9ccfcbf&lt;BR /&gt;2017-05-12 00:24:19 [DEBUG]: isakmp_inf.c:147:isakmp_info_recv(): receive Information.&lt;BR /&gt;2017-05-12 00:24:19 [DEBUG]: oakley.c:3285:oakley_newiv2(): compute IV for phase2&lt;BR /&gt;2017-05-12 00:24:19 [DEBUG]: oakley.c:3286:oakley_newiv2(): phase1 last IV:&lt;BR /&gt;2017-05-12 00:24:19 [DEBUG]: oakley.c:3287:oakley_newiv2():&lt;BR /&gt;7e308bb0 e98cf67c 313f58d6 8905368e 061f6af2&lt;BR /&gt;2017-05-12 00:24:19 [DEBUG]: algorithm.c:432:alg_oakley_hashdef(): hash(sha1)&lt;BR /&gt;2017-05-12 00:24:19 [DEBUG]: algorithm.c:575:alg_oakley_encdef(): encryption(aes)&lt;BR /&gt;2017-05-12 00:24:19 [DEBUG]: oakley.c:3320:oakley_newiv2(): phase2 IV computed:&lt;BR /&gt;2017-05-12 00:24:19 [DEBUG]: oakley.c:3321:oakley_newiv2():&lt;BR /&gt;16642745 6538b8ca 6149ca00 0de65355&lt;BR /&gt;2017-05-12 00:24:19 [DEBUG]: oakley.c:3367:oakley_do_decrypt(): begin decryption.&lt;BR /&gt;2017-05-12 00:24:19 [DEBUG]: algorithm.c:575:alg_oakley_encdef(): encryption(aes)&lt;BR /&gt;2017-05-12 00:24:19 [DEBUG]: oakley.c:3381:oakley_do_decrypt(): IV was saved for next processing:&lt;BR /&gt;2017-05-12 00:24:19 [DEBUG]: oakley.c:3383:oakley_do_decrypt():&lt;BR /&gt;69492c15 c9ce9d8c 825930a0 e9ccfcbf&lt;BR /&gt;2017-05-12 00:24:19 [DEBUG]: algorithm.c:575:alg_oakley_encdef(): encryption(aes)&lt;BR /&gt;2017-05-12 00:24:19 [DEBUG]: oakley.c:3418:oakley_do_decrypt(): with key:&lt;BR /&gt;2017-05-12 00:24:19 [DEBUG]: oakley.c:3419:oakley_do_decrypt():&lt;BR /&gt;75f46e88 8d518f70 9ab77070 975a9c5e 8c845ba6 e76c6dc0 7996f617 5342164b&lt;BR /&gt;2017-05-12 00:24:19 [DEBUG]: oakley.c:3424:oakley_do_decrypt(): decrypted payload by IV:&lt;BR /&gt;2017-05-12 00:24:19 [DEBUG]: oakley.c:3425:oakley_do_decrypt():&lt;BR /&gt;16642745 6538b8ca 6149ca00 0de65355&lt;BR /&gt;2017-05-12 00:24:19 [DEBUG]: oakley.c:3427:oakley_do_decrypt(): decrypted payload, but not trimed.&lt;BR /&gt;2017-05-12 00:24:19 [DEBUG]: oakley.c:3429:oakley_do_decrypt():&lt;BR /&gt;0b000018 9fbfea03 b973f072 9c240c7b 39f00f03 7be11c3e 00000010 00000001&lt;BR /&gt;0304000b 728a83a3 00000000 00000000&lt;BR /&gt;2017-05-12 00:24:19 [DEBUG]: oakley.c:3438:oakley_do_decrypt(): padding len=0&lt;BR /&gt;2017-05-12 00:24:19 [DEBUG]: oakley.c:3470:oakley_do_decrypt(): decrypted.&lt;BR /&gt;2017-05-12 00:24:19 [DEBUG]: oakley.c:3471:oakley_do_decrypt():&lt;BR /&gt;ecf11b57 0e2169a4 6811d477 4daf87fa 08100501 061f6af2 0000004c 0b000018&lt;BR /&gt;9fbfea03 b973f072 9c240c7b 39f00f03 7be11c3e 00000010 00000001 0304000b&lt;BR /&gt;728a83a3 00000000 00000000&lt;BR /&gt;2017-05-12 00:24:19 [DEBUG]: oakley.c:3345:oakley_delivm(): IV freed&lt;BR /&gt;2017-05-12 00:24:19 [DEBUG]: oakley.c:696:oakley_compute_hash1(): HASH with:&lt;BR /&gt;2017-05-12 00:24:19 [DEBUG]: oakley.c:697:oakley_compute_hash1():&lt;BR /&gt;061f6af2 00000010 00000001 0304000b 728a83a3&lt;BR /&gt;2017-05-12 00:24:19 [DEBUG]: algorithm.c:515:alg_oakley_hmacdef(): hmac(hmac_sha1)&lt;BR /&gt;2017-05-12 00:24:19 [DEBUG]: oakley.c:706:oakley_compute_hash1(): HASH computed:&lt;BR /&gt;2017-05-12 00:24:19 [DEBUG]: oakley.c:707:oakley_compute_hash1():&lt;BR /&gt;9fbfea03 b973f072 9c240c7b 39f00f03 7be11c3e&lt;BR /&gt;2017-05-12 00:24:19 [DEBUG]: isakmp_inf.c:262:isakmp_info_recv(): hash validated.&lt;BR /&gt;2017-05-12 00:24:19 [DEBUG]: ikev1.c:2876:isakmp_parsewoh(): begin.&lt;BR /&gt;2017-05-12 00:24:19 [DEBUG]: ikev1.c:2903:isakmp_parsewoh(): seen nptype=8(hash)&lt;BR /&gt;2017-05-12 00:24:19 [DEBUG]: ikev1.c:2903:isakmp_parsewoh(): seen nptype=11(notify)&lt;BR /&gt;2017-05-12 00:24:19 [DEBUG]: ikev1.c:2942:isakmp_parsewoh(): succeed.&lt;BR /&gt;2017-05-12 00:24:19 [PROTO_NOTIFY]: isakmp_inf.c:1161:isakmp_info_recv_n(): notification message 11:INVALID-SPI, doi=1 proto_id=3 spi=728a83a3(size=4).&lt;/P&gt;</description>
      <pubDate>Thu, 11 May 2017 22:28:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ike-protocol-notification-message-received-invalid-spi-11/m-p/156300#M51311</guid>
      <dc:creator>Ammar</dc:creator>
      <dc:date>2017-05-11T22:28:53Z</dc:date>
    </item>
    <item>
      <title>Re: IKE protocol notification message received: INVALID-SPI (11).</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ike-protocol-notification-message-received-invalid-spi-11/m-p/156301#M51312</link>
      <description>&lt;P&gt;Enable the debug and reset the&amp;nbsp;tunnel so&amp;nbsp;all info will be captured:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;gt; test vpn ipsec-sa tunnel (your tunnel to ASA)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do you know&amp;nbsp;if something is changed on the ASA &amp;nbsp;end?&lt;/P&gt;</description>
      <pubDate>Thu, 11 May 2017 22:36:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ike-protocol-notification-message-received-invalid-spi-11/m-p/156301#M51312</guid>
      <dc:creator>TranceforLife</dc:creator>
      <dc:date>2017-05-11T22:36:32Z</dc:date>
    </item>
    <item>
      <title>Re: IKE protocol notification message received: INVALID-SPI (11).</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ike-protocol-notification-message-received-invalid-spi-11/m-p/156302#M51313</link>
      <description>&lt;P&gt;i'm managing also ASA's and nothing changed on them.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;gt; test vpn ipsec-sa tunnel EB-Tunnel&lt;/P&gt;&lt;P&gt;Initiate 27 IPSec SA for tunnel EB-Tunnel.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;debug result&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ahmed@EGY-PAN1(active)&amp;gt; tail lines 50 mp-log ikemgr.log&lt;BR /&gt;03b82e6b 5d9ebfa7 aac3cfc1 d383b28b 1c7d2f24 32852e74 aa6d81db fe34f90c&lt;BR /&gt;e7037f6a 55eea2c6 56&lt;BR /&gt;2017-05-12 00:45:51 [DEBUG]: algorithm.c:515:alg_oakley_hmacdef(): hmac(hmac_sha1)&lt;BR /&gt;2017-05-12 00:45:51 [DEBUG]: algorithm.c:715:alg_ipsec_encdef(): encryption(aes)&lt;BR /&gt;2017-05-12 00:45:51 [DEBUG]: oakley.c:438:oakley_compute_keymat_x(): encklen=256 authklen=160&lt;BR /&gt;2017-05-12 00:45:51 [DEBUG]: oakley.c:445:oakley_compute_keymat_x(): generating 640 bits of key (dupkeymat=4)&lt;BR /&gt;2017-05-12 00:45:51 [DEBUG]: oakley.c:463:oakley_compute_keymat_x(): generating K1...K4 for KEYMAT.&lt;BR /&gt;2017-05-12 00:45:51 [DEBUG]: algorithm.c:515:alg_oakley_hmacdef(): hmac(hmac_sha1)&lt;BR /&gt;2017-05-12 00:45:51 [DEBUG]: algorithm.c:515:alg_oakley_hmacdef(): hmac(hmac_sha1)&lt;BR /&gt;2017-05-12 00:45:51 [DEBUG]: algorithm.c:515:alg_oakley_hmacdef(): hmac(hmac_sha1)&lt;BR /&gt;2017-05-12 00:45:51 [DEBUG]: oakley.c:524:oakley_compute_keymat_x():&lt;BR /&gt;92da37e6 c12465ab 81a54471 2c8a176c 5dbab54e 40c77cf7 beb6827b a0fe2e30&lt;BR /&gt;93cfe56f 120a7515 812cb12c e15e01e6 6972e00a 77cfb87b 618856b0 bf3fdcc5&lt;BR /&gt;e1d6f033 5509dfad 70a0c652 200d74ba&lt;BR /&gt;2017-05-12 00:45:51 [DEBUG]: oakley.c:405:oakley_compute_keymat_x(): KEYMAT compute with&lt;BR /&gt;2017-05-12 00:45:51 [DEBUG]: oakley.c:406:oakley_compute_keymat_x():&lt;BR /&gt;035cd631 519ebfa7 aac3cfc1 d383b28b 1c7d2f24 32852e74 aa6d81db fe34f90c&lt;BR /&gt;e7037f6a 55eea2c6 56&lt;BR /&gt;2017-05-12 00:45:51 [DEBUG]: algorithm.c:515:alg_oakley_hmacdef(): hmac(hmac_sha1)&lt;BR /&gt;2017-05-12 00:45:51 [DEBUG]: algorithm.c:715:alg_ipsec_encdef(): encryption(aes)&lt;BR /&gt;2017-05-12 00:45:51 [DEBUG]: oakley.c:438:oakley_compute_keymat_x(): encklen=256 authklen=160&lt;BR /&gt;2017-05-12 00:45:51 [DEBUG]: oakley.c:445:oakley_compute_keymat_x(): generating 640 bits of key (dupkeymat=4)&lt;BR /&gt;2017-05-12 00:45:51 [DEBUG]: oakley.c:463:oakley_compute_keymat_x(): generating K1...K4 for KEYMAT.&lt;BR /&gt;2017-05-12 00:45:51 [DEBUG]: algorithm.c:515:alg_oakley_hmacdef(): hmac(hmac_sha1)&lt;BR /&gt;2017-05-12 00:45:51 [DEBUG]: algorithm.c:515:alg_oakley_hmacdef(): hmac(hmac_sha1)&lt;BR /&gt;2017-05-12 00:45:51 [DEBUG]: algorithm.c:515:alg_oakley_hmacdef(): hmac(hmac_sha1)&lt;BR /&gt;2017-05-12 00:45:51 [DEBUG]: oakley.c:524:oakley_compute_keymat_x():&lt;BR /&gt;825feeb2 a88877da d8c7223b 3e4b6b40 ac77fdd1 4d5fffae d5a04cf7 21a5ac04&lt;BR /&gt;2790f019 574088ff a570bc0f 6cd4c0c8 75d61784 6c981861 7d024f4e 1779b5df&lt;BR /&gt;7cb69b4b 6c7d91c4 2b14766a 15c7a8ef&lt;BR /&gt;2017-05-12 00:45:51 [DEBUG]: oakley.c:333:oakley_compute_keymat(): KEYMAT computed.&lt;BR /&gt;2017-05-12 00:45:51 [PROTO_NOTIFY]: ikev1.c:2593:log_ph2established(): ====&amp;gt; PHASE-2 NEGOTIATION SUCCEEDED AS RESPONDER, (QUICK MODE) &amp;lt;====&lt;BR /&gt;====&amp;gt; Established SA: 196.3.15.6[500]-5.32.40.145[500] message id:0xE94D529A, SPI:0xB82E6B5D/0x5CD63151 &amp;lt;====&lt;BR /&gt;2017-05-12 00:45:51 [DEBUG]: isakmp_quick.c:1823:quick_r3prep(): call pk_sendupdate&lt;BR /&gt;2017-05-12 00:45:51 [DEBUG]: algorithm.c:715:alg_ipsec_encdef(): encryption(aes)&lt;BR /&gt;2017-05-12 00:45:51 [INFO]: ike_pfkey.c:490:sadb_log_add(): SADB_UPDATE ul_proto=255 src=5.32.40.145[500] dst=196.3.15.6[500] satype=ESP samode=tunl spi=0xB82E6B5D authtype=SHA1 enctype=AES256 enclen=32 lifetime soft time=28800 bytes=4718592000 hard time=28800 bytes=4718592000&lt;BR /&gt;2017-05-12 00:45:51 [DEBUG]: isakmp_quick.c:1828:quick_r3prep(): pfkey update sent.&lt;BR /&gt;2017-05-12 00:45:51 [DEBUG]: algorithm.c:715:alg_ipsec_encdef(): encryption(aes)&lt;BR /&gt;2017-05-12 00:45:51 [INFO]: ike_pfkey.c:490:sadb_log_add(): SADB_ADD ul_proto=255 src=196.3.15.6[500] dst=5.32.40.145[500] satype=ESP samode=tunl spi=0x5CD63151 authtype=SHA1 enctype=AES256 enclen=32 lifetime soft time=25146 bytes=4718592000 hard time=28800 bytes=4718592000&lt;BR /&gt;2017-05-12 00:45:51 [DEBUG]: pfkey.c:1215:ikev1_update_response(): pfkey UPDATE succeeded: ESP/Tunnel 5.32.40.145[500]-&amp;gt;196.3.15.6[500] spi=3090049885(0xb82e6b5d)&lt;BR /&gt;2017-05-12 00:45:51 [INFO]: pfkey.c:1220:ikev1_update_response(): IPsec-SA established: ESP/Tunnel 5.32.40.145[500]-&amp;gt;196.3.15.6[500] spi=3090049885(0xb82e6b5d)&lt;BR /&gt;2017-05-12 00:45:51 [PROTO_NOTIFY]: ikev1.c:2642:log_ipseckeyinstalled(): ====&amp;gt; IPSEC KEY INSTALLATION SUCCEEDED &amp;lt;====&lt;BR /&gt;====&amp;gt; Installed SA: 196.3.15.6[500]-5.32.40.145[500] SPI:0xB82E6B5D/0x5CD63151 lifetime 28800 Sec lifesize 4608000 KB &amp;lt;====&lt;BR /&gt;2017-05-12 00:45:51.038 +0200 debug: ifmon_request_put(daemon/panike_sysd_if.c:1391): 16 write to pipe: keymirror_add&lt;BR /&gt;2017-05-12 00:45:51 [DEBUG]: isakmp_quick.c:1835:quick_r3prep(): pfkey add sent.&lt;BR /&gt;2017-05-12 00:45:51.039 +0200 debug: ifmon_request_get(daemon/panike_sysd_if.c:1407): 16 read from pipe, msg type 4&lt;BR /&gt;2017-05-12 00:45:51.039 +0200 debug: pan_msg_process(daemon/panike_sysd_if.c:1529): request from pipe: keymirror_add&lt;BR /&gt;2017-05-12 00:45:51 [INFO]: keymgr_keymirror.c:82:ike_do_keymirror_add(): keymirror add start ++++++++++++++++&lt;BR /&gt;2017-05-12 00:45:51.039 +0200 debug: keymgr_keydb_insert(ikemgr/keymgr_db.c:108): keymgr: key insert called for tid:1711276032&lt;BR /&gt;2017-05-12 00:45:51 [INFO]: keymgr_keymirror.c:86:ike_do_keymirror_add(): keymirror add for gw 0x45, tn 102, selfSPI B82E6B5D, retcode 0.&lt;/P&gt;</description>
      <pubDate>Thu, 11 May 2017 22:48:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ike-protocol-notification-message-received-invalid-spi-11/m-p/156302#M51313</guid>
      <dc:creator>Ammar</dc:creator>
      <dc:date>2017-05-11T22:48:35Z</dc:date>
    </item>
    <item>
      <title>Re: IKE protocol notification message received: INVALID-SPI (11).</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ike-protocol-notification-message-received-invalid-spi-11/m-p/156304#M51314</link>
      <description>&lt;P&gt;What if you apply commands below at ASA side to clear and resync SAs.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;clear crypto isakmp&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;clear crypto sa&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 12 May 2017 00:09:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ike-protocol-notification-message-received-invalid-spi-11/m-p/156304#M51314</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2017-05-12T00:09:34Z</dc:date>
    </item>
    <item>
      <title>Re: IKE protocol notification message received: INVALID-SPI (11).</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ike-protocol-notification-message-received-invalid-spi-11/m-p/156308#M51317</link>
      <description>&lt;P&gt;i have tried many times to clear SA's (Phase1/2) and re-initae the VPN's but the same error appreares again and again.&lt;/P&gt;</description>
      <pubDate>Fri, 12 May 2017 00:25:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ike-protocol-notification-message-received-invalid-spi-11/m-p/156308#M51317</guid>
      <dc:creator>Ammar</dc:creator>
      <dc:date>2017-05-12T00:25:53Z</dc:date>
    </item>
    <item>
      <title>Re: IKE protocol notification message received: INVALID-SPI (11).</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ike-protocol-notification-message-received-invalid-spi-11/m-p/156334#M51322</link>
      <description>&lt;P&gt;How does this behave? All traffic stops passing through that VPN? Does it recover eventually? Does it happen periodically?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Check time on both devices. And check SPIs for this tunnel on both sides when this error starts happening. Compare them if they match.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 12 May 2017 05:55:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ike-protocol-notification-message-received-invalid-spi-11/m-p/156334#M51322</guid>
      <dc:creator>santonic</dc:creator>
      <dc:date>2017-05-12T05:55:50Z</dc:date>
    </item>
    <item>
      <title>Re: IKE protocol notification message received: INVALID-SPI (11).</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ike-protocol-notification-message-received-invalid-spi-11/m-p/156356#M51326</link>
      <description>&lt;P&gt;i'm seeing this log once the problem started&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;iph1-&amp;gt;ivm == NULL&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 12 May 2017 09:40:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ike-protocol-notification-message-received-invalid-spi-11/m-p/156356#M51326</guid>
      <dc:creator>Ammar</dc:creator>
      <dc:date>2017-05-12T09:40:59Z</dc:date>
    </item>
    <item>
      <title>Re: IKE protocol notification message received: INVALID-SPI (11).</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ike-protocol-notification-message-received-invalid-spi-11/m-p/383744#M89990</link>
      <description>&lt;P&gt;I'm also facing this issue. Was a solution found for this?&lt;/P&gt;</description>
      <pubDate>Thu, 04 Feb 2021 02:39:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ike-protocol-notification-message-received-invalid-spi-11/m-p/383744#M89990</guid>
      <dc:creator>Aayush_Sibal</dc:creator>
      <dc:date>2021-02-04T02:39:57Z</dc:date>
    </item>
    <item>
      <title>Re: IKE protocol notification message received: INVALID-SPI (11).</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ike-protocol-notification-message-received-invalid-spi-11/m-p/390000#M90677</link>
      <description>&lt;P&gt;I've had this issue since December and have multiple tickets open with Palo and Rackspace where our ASA is terminated on the other end. Both parties have had multiple engineers looking into this and I still can't get it resolved. Really hoping to find a fix ASAP as it cuts off the tunnel and causes outages.&lt;/P&gt;</description>
      <pubDate>Tue, 09 Mar 2021 14:04:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ike-protocol-notification-message-received-invalid-spi-11/m-p/390000#M90677</guid>
      <dc:creator>athalman</dc:creator>
      <dc:date>2021-03-09T14:04:55Z</dc:date>
    </item>
    <item>
      <title>Re: IKE protocol notification message received: INVALID-SPI (11).</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ike-protocol-notification-message-received-invalid-spi-11/m-p/520634#M107898</link>
      <description>&lt;P&gt;Hi everyone, we also have the same problem. On one side we have an ASA and on the others side a Palo Alto fw. Randomly a tunnel vpn flapping. From Asa we have this loggin:&lt;/P&gt;
&lt;P&gt;IKEv1 was unsuccessful at setting up a tunnel. Map Tag = xyz. Map Sequence Number = x.&lt;/P&gt;
&lt;P&gt;Tunnel Manager has failed to establish an L2L SA. All configured IKE versions failed to establish the tunnel. Map Tag= xyz. Map Sequence Number = x.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;and from Palo Alto we have this loggin:&lt;/P&gt;
&lt;P&gt;IKE protocol notification message received: INVALID-SPI (11)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Was a solution found for this?&lt;/P&gt;</description>
      <pubDate>Tue, 08 Nov 2022 11:03:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ike-protocol-notification-message-received-invalid-spi-11/m-p/520634#M107898</guid>
      <dc:creator>lucagerm11</dc:creator>
      <dc:date>2022-11-08T11:03:44Z</dc:date>
    </item>
    <item>
      <title>Re: IKE protocol notification message received: INVALID-SPI (11).</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ike-protocol-notification-message-received-invalid-spi-11/m-p/520645#M107907</link>
      <description>&lt;P&gt;Hey Ammar,&lt;/P&gt;
&lt;P&gt;I had this exact same problem for months on one of my tunnels! Palo to ASA as well. I could have sworn it was an ISP issue, but turns out it was an upgrade on the Palo side that fixed the problem. I went from 9.1.9 to 10.1.5-h2 and that fixed my issue. Haven’t had an Invalid SPI error since.&lt;/P&gt;</description>
      <pubDate>Tue, 08 Nov 2022 14:13:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ike-protocol-notification-message-received-invalid-spi-11/m-p/520645#M107907</guid>
      <dc:creator>athalman</dc:creator>
      <dc:date>2022-11-08T14:13:31Z</dc:date>
    </item>
  </channel>
</rss>

