<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: PA to ASA Proxy-ID Mismatch in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/pa-to-asa-proxy-id-mismatch/m-p/211556#M61714</link>
    <description>&lt;P&gt;Hi Remo,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;After updating our firewall cluster to 7.1.16, the issue with ProxyID mismatch has been resolved. Thanks for the help!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;-josh&lt;/P&gt;</description>
    <pubDate>Tue, 24 Apr 2018 16:22:31 GMT</pubDate>
    <dc:creator>cenduit_jgolden</dc:creator>
    <dc:date>2018-04-24T16:22:31Z</dc:date>
    <item>
      <title>PA to ASA Proxy-ID Mismatch</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-to-asa-proxy-id-mismatch/m-p/208252#M60969</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have a standard IPSec tunnel one of our smaller sites with a strange issue related to the Proxy-IDs defined on the PA side of the tunnel. Our ASA side (10.7.0.0/16) is set to inherit all policy settings from the PA side, and our PA defines the "policies" with the Proxy-ID. Normal behavior with a policy based firewall (ASA) and a route based firewall (PA).&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The issue is that while two of the networks defined on the PA side Proxy IDs are match the tunnel details on the ASA, the third network does not. Traffic from the 10.0.0.0/8 and 192.168.0.0/16 supernets is allowed over the tunnel without issue; however, the 172.16.0.0/12 supernet shows up on the ASA's as a smaller, but valid, subnet within the 172.16.0.0/12 supernet and only to one specific host. This is preventing anything in our 172 networks from accessing the site&amp;nbsp;due to a mismatch in the negotiated session.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;A quick note. Our PA is using SW version 7.1.10. In this version, we have seen some "ghosting" where some changes are not properly removed from the config file; as in objects still existing after removal, routes existing after removal, etc, so this may be related. We are upgrading this OS during our next maintenance window to 7.1.16.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Screenshots are below. I have also used proxy-ID local 0.0.0.0/0 but the results remain unchanged.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="PA_Proxy-ID_Details.PNG" style="width: 719px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/14585i03062D28E3136860/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="PA_Proxy-ID_Details.PNG" alt="PA_Proxy-ID_Details.PNG" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="All of the networks match the PaloAlto Proxy-IDs except for the 172 network." style="width: 725px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/14588i83BC06AFA796DFD9/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="ASA_Ses_Details.PNG" alt="All of the networks match the PaloAlto Proxy-IDs except for the 172 network." /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;All of the networks match the PaloAlto Proxy-IDs except for the 172 network.&lt;/span&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ASA_Ses_Details.PNG" style="width: 0px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/14586i48D0E5C9773092B2/image-size/small/is-moderation-mode/true?v=v2&amp;amp;px=200" width="0" height="0" role="button" title="ASA_Ses_Details.PNG" alt="ASA_Ses_Details.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;Thank you!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- Edit: a word&lt;/P&gt;</description>
      <pubDate>Fri, 30 Mar 2018 17:15:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-to-asa-proxy-id-mismatch/m-p/208252#M60969</guid>
      <dc:creator>cenduit_jgolden</dc:creator>
      <dc:date>2018-03-30T17:15:17Z</dc:date>
    </item>
    <item>
      <title>Re: PA to ASA Proxy-ID Mismatch</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-to-asa-proxy-id-mismatch/m-p/208283#M60972</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/85075"&gt;@cenduit_jgolden&lt;/a&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Probably the only solution for you is upgrading to something higher than 7.1.10. The issue you are facing is fixed in 7.1.11.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;PAN-77127
Fixed&amp;nbsp;an&amp;nbsp;issue&amp;nbsp;where&amp;nbsp;the&amp;nbsp;firewall&amp;nbsp;reduced&amp;nbsp;the&amp;nbsp;range&amp;nbsp;of&amp;nbsp;local&amp;nbsp;and&amp;nbsp;remote&lt;BR /&gt;IKEv2&amp;nbsp;traffic selectors&amp;nbsp;in&amp;nbsp;a&amp;nbsp;way&amp;nbsp;that&amp;nbsp;disrupted&amp;nbsp;traffic&amp;nbsp;in&amp;nbsp;a&amp;nbsp;VPN&amp;nbsp;tunnel&lt;BR /&gt;that&amp;nbsp;a&amp;nbsp;Cisco&amp;nbsp;Adaptive&amp;nbsp;Security&amp;nbsp;Appliance&amp;nbsp;(ASA)&amp;nbsp;initiated.&lt;/PRE&gt;&lt;P&gt;&lt;BR /&gt;So upgradin to 7.1.16 is a good idea, that will solve the issue.&lt;/P&gt;&lt;P&gt;(&lt;A href="https://www.paloaltonetworks.com/documentation/71/pan-os/pan-os-release-notes/pan-os-7-1-11-addressed-issues#_11590" target="_blank"&gt;https://www.paloaltonetworks.com/documentation/71/pan-os/pan-os-release-notes/pan-os-7-1-11-addressed-issues#_11590&lt;/A&gt;).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Another workaround would be changing the tunnel to IKEv1.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;(Ok, there is a very little chance that you have found another problem, but I am pretty sure that your issue is fixed after the upgrade becaue I had exactly the same issue a while ago)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Remo&lt;/P&gt;</description>
      <pubDate>Fri, 30 Mar 2018 17:13:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-to-asa-proxy-id-mismatch/m-p/208283#M60972</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2018-03-30T17:13:29Z</dc:date>
    </item>
    <item>
      <title>Re: PA to ASA Proxy-ID Mismatch</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-to-asa-proxy-id-mismatch/m-p/208284#M60973</link>
      <description>&lt;P&gt;Thanks for the insight Remo. I'll monitor this and update the post once we have upgraded.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cheers!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;-josh&lt;/P&gt;</description>
      <pubDate>Fri, 30 Mar 2018 17:16:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-to-asa-proxy-id-mismatch/m-p/208284#M60973</guid>
      <dc:creator>cenduit_jgolden</dc:creator>
      <dc:date>2018-03-30T17:16:23Z</dc:date>
    </item>
    <item>
      <title>Re: PA to ASA Proxy-ID Mismatch</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-to-asa-proxy-id-mismatch/m-p/211556#M61714</link>
      <description>&lt;P&gt;Hi Remo,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;After updating our firewall cluster to 7.1.16, the issue with ProxyID mismatch has been resolved. Thanks for the help!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;-josh&lt;/P&gt;</description>
      <pubDate>Tue, 24 Apr 2018 16:22:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-to-asa-proxy-id-mismatch/m-p/211556#M61714</guid>
      <dc:creator>cenduit_jgolden</dc:creator>
      <dc:date>2018-04-24T16:22:31Z</dc:date>
    </item>
  </channel>
</rss>

