<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Update to 8.0.6 appears to have broken IPSec tunnel connections in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/update-to-8-0-6-appears-to-have-broken-ipsec-tunnel-connections/m-p/213631#M62130</link>
    <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/48998"&gt;@Andre_Magri&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;Have you verified within the XML that what's being displayed on the GUI is actually what's being read by the firewall?&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 08 May 2018 19:47:23 GMT</pubDate>
    <dc:creator>BPry</dc:creator>
    <dc:date>2018-05-08T19:47:23Z</dc:date>
    <item>
      <title>Update to 8.0.6 appears to have broken IPSec tunnel connections</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/update-to-8-0-6-appears-to-have-broken-ipsec-tunnel-connections/m-p/213583#M62115</link>
      <description>&lt;P&gt;Since our PA updated we've had a problem with one IPSec Tunnel not routing correctly. It appears to relate to just one Proxy ID but I've checked all and they're exactly the same as the PFSense box we're connecting to. Everything was fine until the update to 8.0.6.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've followed this KB...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/Management-Articles/IPSec-VPN-Error-IKE-Phase-2-Negotiation-is-Failed-as-Initiator/ta-p/60725" target="_blank"&gt;https://live.paloaltonetworks.com/t5/Management-Articles/IPSec-VPN-Error-IKE-Phase-2-Negotiation-is-Failed-as-Initiator/ta-p/60725&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;..but both ProxyIDs are perfect. The message we're getting is..&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;IKEv2 child SA negotiation is failed as initiator, non-rekey. Failed SA: (LOCAL IP)[500]-(DEST IP)[500] message id:0x000021F0. Error code 19&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;If I head into "tail follow yes mp-log ikemgr.log" I get ....&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;2018-05-08 15:20:26.680 +0100 [PERR]: { 6: }: received Notify payload protocol 0 type TS_UNACCEPTABLE&lt;BR /&gt;2018-05-08 15:20:26.680 +0100 [PNTF]: { 6: }: ====&amp;gt; IKEv2 CHILD SA NEGOTIATION FAILED AS INITIATOR, non-rekey; gateway IKE-Harrogate &amp;lt;====&lt;BR /&gt;====&amp;gt; Failed SA: (LOCAL IP)[500]-(REMOTE IP)[500] message id:0x00001B7C parent SN:1450 &amp;lt;==== Error code 19&lt;BR /&gt;2018-05-08 15:20:27.793 +0100 [PWRN]: { 6: }: 38 is not a child notify type&lt;BR /&gt;2018-05-08 15:20:27.793 +0100 [PERR]: { 6: }: received Notify payload protocol 0 type TS_UNACCEPTABLE&lt;BR /&gt;2018-05-08 15:20:27.793 +0100 [PNTF]: { 6: }: ====&amp;gt; IKEv2 CHILD SA NEGOTIATION FAILED AS INITIATOR, non-rekey; gateway IKE-Harrogate &amp;lt;====&lt;BR /&gt;====&amp;gt; Failed SA: (LOCAL IP)[500]-(REMOTE IP)[500] message id:0x00001B7D parent SN:1450 &amp;lt;==== Error code 19&lt;BR /&gt;2018-05-08 15:20:27.959 +0100 [PWRN]: { 6: }: 38 is not a child notify type&lt;BR /&gt;2018-05-08 15:20:27.959 +0100 [PERR]: { 6: }: received Notify payload protocol 0 type TS_UNACCEPTABLE&lt;BR /&gt;2018-05-08 15:20:27.959 +0100 [PNTF]: { 6: }: ====&amp;gt; IKEv2 CHILD SA NEGOTIATION FAILED AS INITIATOR, non-rekey; gateway IKE-Harrogate &amp;lt;====&lt;BR /&gt;====&amp;gt; Failed SA: (LOCAL IP)[500]-(REMOTE IP)[500] message id:0x00001B7E parent SN:1450 &amp;lt;==== Error code 19&lt;BR /&gt;2018-05-08 15:20:30.758 +0100 [PWRN]: { 6: }: 38 is not a child notify type&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;Anyone know what I'm doing wrong here?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here's the debug logs...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;2018-05-08 16:15:05.430 +0100  [DEBG]: ===
2018-05-08 16:15:05.430 +0100  [DEBG]: 76 bytes message received from (DEST IP)[500]
2018-05-08 16:15:05.430 +0100  [DEBG]: {    6:     }: response exch type 36
2018-05-08 16:15:05.430 +0100  [DEBG]: {    6:     }: update response message_id 0x235d
2018-05-08 16:15:05.430 +0100  [DEBG]: {    6:     }: received notify type TS_UNACCEPTABLE
2018-05-08 16:15:05.430 +0100  [DEBG]: {    6:     }: ikev2_process_child_notify(0x14b8230, 0x7f6b037d8c10), notify type TS_UNACCEPTABLE
2018-05-08 16:15:05.430 +0100  [PWRN]: {    6:     }: 38 is not a child notify type
2018-05-08 16:15:05.430 +0100  [PERR]: {    6:     }: received Notify payload protocol 0 type TS_UNACCEPTABLE
2018-05-08 16:15:05.430 +0100  [PNTF]: {    6:     }: ====&amp;gt; IKEv2 CHILD SA NEGOTIATION FAILED AS INITIATOR, non-rekey; gateway IKE-Harrogate &amp;lt;====
                                                      ====&amp;gt; Failed SA: (LOCAL IP)[500]-(DEST IP)[500] message id:0x0000235D parent SN:1450 &amp;lt;==== Error code 19
2018-05-08 16:15:06.614 +0100  [DEBG]: processing isakmp packet
2018-05-08 16:15:06.614 +0100  [DEBG]: ===&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 08 May 2018 15:18:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/update-to-8-0-6-appears-to-have-broken-ipsec-tunnel-connections/m-p/213583#M62115</guid>
      <dc:creator>Andre_Magri</dc:creator>
      <dc:date>2018-05-08T15:18:07Z</dc:date>
    </item>
    <item>
      <title>Re: Update to 8.0.6 appears to have broken IPSec tunnel connections</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/update-to-8-0-6-appears-to-have-broken-ipsec-tunnel-connections/m-p/213631#M62130</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/48998"&gt;@Andre_Magri&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;Have you verified within the XML that what's being displayed on the GUI is actually what's being read by the firewall?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 08 May 2018 19:47:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/update-to-8-0-6-appears-to-have-broken-ipsec-tunnel-connections/m-p/213631#M62130</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2018-05-08T19:47:23Z</dc:date>
    </item>
    <item>
      <title>Re: Update to 8.0.6 appears to have broken IPSec tunnel connections</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/update-to-8-0-6-appears-to-have-broken-ipsec-tunnel-connections/m-p/326123#M83129</link>
      <description>&lt;P&gt;Are you saying there could be a significant difference between what's being viewed in the GUI as to whats being read in the XML ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am seeing the same behavior on version 9.0.5.&lt;/P&gt;&lt;P&gt;The tunnel seems to run initially, but after a while the PA is unable to initiate new SA's.&lt;/P&gt;</description>
      <pubDate>Tue, 05 May 2020 12:00:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/update-to-8-0-6-appears-to-have-broken-ipsec-tunnel-connections/m-p/326123#M83129</guid>
      <dc:creator>JanPou</dc:creator>
      <dc:date>2020-05-05T12:00:43Z</dc:date>
    </item>
    <item>
      <title>Re: Update to 8.0.6 appears to have broken IPSec tunnel connections</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/update-to-8-0-6-appears-to-have-broken-ipsec-tunnel-connections/m-p/326157#M83137</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/131992"&gt;@JanPou&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;Could you open a new discussion with your exact issue and troubleshooting steps that you have done. If your tunnel is coming online at all, it's not the same as referenced in this post.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 05 May 2020 14:33:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/update-to-8-0-6-appears-to-have-broken-ipsec-tunnel-connections/m-p/326157#M83137</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2020-05-05T14:33:48Z</dc:date>
    </item>
    <item>
      <title>Re: Update to 8.0.6 appears to have broken IPSec tunnel connections</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/update-to-8-0-6-appears-to-have-broken-ipsec-tunnel-connections/m-p/329926#M83697</link>
      <description>&lt;P&gt;had a similar issue ended up being SHA256-CBC was chosen on palo side, added / switched to SHA-256-GCM and it came right up.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 26 May 2020 18:25:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/update-to-8-0-6-appears-to-have-broken-ipsec-tunnel-connections/m-p/329926#M83697</guid>
      <dc:creator>jkim12</dc:creator>
      <dc:date>2020-05-26T18:25:54Z</dc:date>
    </item>
    <item>
      <title>Re: Update to 8.0.6 appears to have broken IPSec tunnel connections</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/update-to-8-0-6-appears-to-have-broken-ipsec-tunnel-connections/m-p/331714#M83955</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43439"&gt;@jkim12&lt;/a&gt;&amp;nbsp; - Why did you have to add SHA-256-GCM, did you do that in the remote side as well?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards!&lt;/P&gt;</description>
      <pubDate>Thu, 04 Jun 2020 21:22:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/update-to-8-0-6-appears-to-have-broken-ipsec-tunnel-connections/m-p/331714#M83955</guid>
      <dc:creator>AlexandroDelAngel</dc:creator>
      <dc:date>2020-06-04T21:22:30Z</dc:date>
    </item>
    <item>
      <title>Re: Update to 8.0.6 appears to have broken IPSec tunnel connections</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/update-to-8-0-6-appears-to-have-broken-ipsec-tunnel-connections/m-p/331715#M83956</link>
      <description>&lt;P&gt;AES-256 wasn't selectable in the pfsense config they showed me for CBC or GCM so just on the palo side manually selected AES-256-GCM and added AES-256-CBC as secondary ( although not needed) and it came right up.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 04 Jun 2020 21:30:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/update-to-8-0-6-appears-to-have-broken-ipsec-tunnel-connections/m-p/331715#M83956</guid>
      <dc:creator>jkim12</dc:creator>
      <dc:date>2020-06-04T21:30:04Z</dc:date>
    </item>
  </channel>
</rss>

