<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: IpSec VPN between Palo and Vyatta in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-between-palo-and-vyatta/m-p/255401#M72475</link>
    <description>&lt;P&gt;Hi!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I had similar case between PA-3020 (PanOS 8.1.6) and Cyberoam firewall.&lt;/P&gt;&lt;P&gt;Tunnel actually showed to be up (so phase 2 established), but no traffic was flowing through tunnel. I noticed in ikemgr.log (in debug mode) file following lines which hinted that some proposal is not suitable for this connection:&lt;/P&gt;&lt;P&gt;[PERR]: { : 5}: not matched&lt;BR /&gt;[PERR]: { : 5}: no suitable policy found.&lt;BR /&gt;[ERR ]: { : 5}: failed to pre-process packet.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We had SHA256 in use for phase 2 and we changed this for SHA1- after this tunnel worked correctly and traffic went through it properly.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Märt&lt;/P&gt;</description>
    <pubDate>Fri, 29 Mar 2019 13:54:04 GMT</pubDate>
    <dc:creator>mart_e</dc:creator>
    <dc:date>2019-03-29T13:54:04Z</dc:date>
    <item>
      <title>IpSec VPN between Palo and Vyatta</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-between-palo-and-vyatta/m-p/104383#M44684</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I try to configure an IPSec tunnel between PA-500 (version 7.1.4) and vyatta.&lt;/P&gt;&lt;P&gt;Config seem to be ok, phase 1 is ok but nego for phase 2 is block in "No Proposal chosen". I select in phase 2 all possibility given by the palo.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any body already succeed to do that ?&lt;/P&gt;&lt;P&gt;help .. please &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Vincent&lt;/P&gt;</description>
      <pubDate>Thu, 18 Aug 2016 16:34:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-between-palo-and-vyatta/m-p/104383#M44684</guid>
      <dc:creator>VinceM</dc:creator>
      <dc:date>2016-08-18T16:34:54Z</dc:date>
    </item>
    <item>
      <title>Re: IpSec VPN between Palo and Vyatta</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-between-palo-and-vyatta/m-p/104384#M44685</link>
      <description>&lt;P&gt;Hi Vince,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please could you post output of this command:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;gt; tail lines 50 mp-log ikemgr.log&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I believe your security policy permit IPSec&amp;nbsp;traffic&amp;nbsp;both directions.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thx,&lt;/P&gt;&lt;P&gt;Myky&lt;/P&gt;</description>
      <pubDate>Thu, 18 Aug 2016 16:46:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-between-palo-and-vyatta/m-p/104384#M44685</guid>
      <dc:creator>TranceforLife</dc:creator>
      <dc:date>2016-08-18T16:46:43Z</dc:date>
    </item>
    <item>
      <title>Re: IpSec VPN between Palo and Vyatta</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-between-palo-and-vyatta/m-p/104386#M44686</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thx in advance for your help.&lt;/P&gt;&lt;P&gt;Here the requested log.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;=~=~=~=~=~=~=~=~=~=~=~= PuTTY log 2016.08.18 18:48:36 =~=~=~=~=~=~=~=~=~=~=~=&lt;BR /&gt;tail &amp;#27;[Kadmin@PADC(active)&amp;gt; tail lines &amp;#27;[Kadmin@PADC(active)&amp;gt; tail lines 50 &amp;#27;[Kadmin@PADC(active)&amp;gt; tail lines 50 mp-log &amp;#27;[Kadmin@PADC(active)&amp;gt; tail lines 50 mp-log ikemgr.log&lt;BR /&gt;2016-08-18 18:46:42 [PROTO_ERR]: not matched&lt;BR /&gt;2016-08-18 18:46:42 [PROTO_ERR]: no suitable policy found.&lt;BR /&gt;2016-08-18 18:46:42 [INTERNAL_ERR]: failed to pre-process packet.&lt;BR /&gt;2016-08-18 18:46:52 [PROTO_NOTIFY]: ====&amp;gt; PHASE-2 NEGOTIATION STARTED AS RESPONDER, (QUICK MODE) &amp;lt;====&lt;BR /&gt;====&amp;gt; Initiated SA: 185.42.31.XXX[500]-31.193.53.XX[500] message id:0xEE340F87 &amp;lt;====&lt;BR /&gt;2016-08-18 18:46:52 [PROTO_ERR]: not matched&lt;BR /&gt;2016-08-18 18:46:52 [PROTO_ERR]: no suitable policy found.&lt;BR /&gt;2016-08-18 18:46:52 [INTERNAL_ERR]: failed to pre-process packet.&lt;BR /&gt;2016-08-18 18:47:12 [PROTO_NOTIFY]: ====&amp;gt; PHASE-2 NEGOTIATION STARTED AS RESPONDER, (QUICK MODE) &amp;lt;====&lt;BR /&gt;====&amp;gt; Initiated SA: 185.42.31.XXX[500]-31.193.53.XX[500] message id:0xEE340F87 &amp;lt;====&lt;BR /&gt;2016-08-18 18:47:12 [PROTO_ERR]: not matched&lt;BR /&gt;2016-08-18 18:47:12 [PROTO_ERR]: no suitable policy found.&lt;BR /&gt;2016-08-18 18:47:12 [INTERNAL_ERR]: failed to pre-process packet.&lt;BR /&gt;2016-08-18 18:47:12.795 +0200 ikemgr: panike_daemon phase 1 started, config size 33890&lt;BR /&gt;2016-08-18 18:47:12.828 +0200 ikemgr: panike_daemon phase 1 step 2 finished&lt;BR /&gt;2016-08-18 18:47:13.114 +0200 ikemgr: panike_daemon phase 1 step 4 finished&lt;BR /&gt;2016-08-18 18:47:13.114 +0200 pan IKE cfg phase-1 triggered.&lt;BR /&gt;2016-08-18 18:47:13 [INFO]: loading new config from /tmp/.njHLK5&lt;BR /&gt;2016-08-18 18:47:15.541 +0200 ikemgr: panike_daemon phase 1 step 5 finished&lt;BR /&gt;2016-08-18 18:47:15.541 +0200 ikemgr: panike_daemon phase 1 config change detected&lt;BR /&gt;2016-08-18 18:47:15.541 +0200 ikemgr: panike_daemon phase 1 finished with status 1&lt;BR /&gt;2016-08-18 18:47:44.823 +0200 ikemgr: panike_daemon phase 2 started&lt;BR /&gt;2016-08-18 18:47:44.823 +0200 pan IKE cfg phase-2 triggered.&lt;BR /&gt;2016-08-18 18:47:44 [INFO]: IKE gateway EOLAS changed, deleting SA&lt;BR /&gt;2016-08-18 18:47:44 [INFO]: ====&amp;gt; PHASE-1 SA DELETED &amp;lt;====&lt;BR /&gt;====&amp;gt; Deleted SA: 185.42.31.XXX[500]-31.193.53.XX[500] cookie:e30ae825f46753b9:9b520bc54bb0cad0 &amp;lt;====&lt;BR /&gt;2016-08-18 18:47:44.826 +0200 ikemgr: panike_daemon phase 2 finished&lt;BR /&gt;2016-08-18 18:47:44 [PROTO_ERR]: Informational exchange received from unknown peer.&lt;BR /&gt;2016-08-18 18:47:52 [PROTO_NOTIFY]: ====&amp;gt; PHASE-1 NEGOTIATION STARTED AS RESPONDER, MAIN MODE &amp;lt;====&lt;BR /&gt;====&amp;gt; Initiated SA: 185.42.31.XXX[500]-31.193.53.XX[500] cookie:b751989c866b52b4:7a4c9758629b8b91 &amp;lt;====&lt;BR /&gt;2016-08-18 18:47:52 [INFO]: received Vendor ID: CISCO-UNITY&lt;BR /&gt;2016-08-18 18:47:52 [INFO]: received Vendor ID: draft-ietf-ipsra-isakmp-xauth-06.txt&lt;BR /&gt;2016-08-18 18:47:52 [INFO]: received Vendor ID: DPD&lt;BR /&gt;2016-08-18 18:47:52 [PROTO_NOTIFY]: ====&amp;gt; PHASE-1 NEGOTIATION SUCCEEDED AS RESPONDER, MAIN MODE &amp;lt;====&lt;BR /&gt;====&amp;gt; Established SA: 185.42.31.XXX[500]-31.193.53.XX[500] cookie:b751989c866b52b4:7a4c9758629b8b91 lifetime 28800 Sec &amp;lt;====&lt;BR /&gt;2016-08-18 18:47:52 [PROTO_NOTIFY]: ====&amp;gt; PHASE-2 NEGOTIATION STARTED AS RESPONDER, (QUICK MODE) &amp;lt;====&lt;BR /&gt;====&amp;gt; Initiated SA: 185.42.31.XXX[500]-31.193.53.XX[500] message id:0x93765356 &amp;lt;====&lt;BR /&gt;2016-08-18 18:47:52 [PROTO_ERR]: not matched&lt;BR /&gt;2016-08-18 18:47:52 [PROTO_ERR]: no suitable policy found.&lt;BR /&gt;2016-08-18 18:47:52 [INTERNAL_ERR]: failed to pre-process packet.&lt;BR /&gt;2016-08-18 18:48:02 [PROTO_NOTIFY]: ====&amp;gt; PHASE-2 NEGOTIATION STARTED AS RESPONDER, (QUICK MODE) &amp;lt;====&lt;BR /&gt;====&amp;gt; Initiated SA: 185.42.31.XXX[500]-31.193.53.XX[500] message id:0x93765356 &amp;lt;====&lt;BR /&gt;2016-08-18 18:48:02 [PROTO_ERR]: not matched&lt;BR /&gt;2016-08-18 18:48:02 [PROTO_ERR]: no suitable policy found.&lt;BR /&gt;2016-08-18 18:48:02 [INTERNAL_ERR]: failed to pre-process packet.&lt;BR /&gt;2016-08-18 18:48:22 [PROTO_NOTIFY]: ====&amp;gt; PHASE-2 NEGOTIATION STARTED AS RESPONDER, (QUICK MODE) &amp;lt;====&lt;BR /&gt;====&amp;gt; Initiated SA: 185.42.31.XXX[500]-31.193.53.XX[500] message id:0x93765356 &amp;lt;====&lt;BR /&gt;2016-08-18 18:48:22 [PROTO_ERR]: not matched&lt;BR /&gt;2016-08-18 18:48:22 [PROTO_ERR]: no suitable policy found.&lt;BR /&gt;2016-08-18 18:48:22 [INTERNAL_ERR]: failed to pre-process packet.&lt;BR /&gt;admin@PADC(active)&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Ipsec is permit.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;V.&lt;/P&gt;</description>
      <pubDate>Thu, 18 Aug 2016 16:51:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-between-palo-and-vyatta/m-p/104386#M44686</guid>
      <dc:creator>VinceM</dc:creator>
      <dc:date>2016-08-18T16:51:17Z</dc:date>
    </item>
    <item>
      <title>Re: IpSec VPN between Palo and Vyatta</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-between-palo-and-vyatta/m-p/104392#M44688</link>
      <description>&lt;P&gt;Hi V,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks. Vyatta&amp;nbsp;side policy or route base VPN?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Below an example for route base config:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="http://vyos.net/wiki/VTI_with_Palo_Alto" target="_blank"&gt;http://vyos.net/wiki/VTI_with_Palo_Alto&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please can you make sure you do have&amp;nbsp;application permitted in your policy: &amp;nbsp;(ciscovpn, dtls, ipsec, ssl,&amp;nbsp;open-vpn)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thx,&lt;/P&gt;&lt;P&gt;Myky&lt;/P&gt;</description>
      <pubDate>Thu, 18 Aug 2016 18:06:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-between-palo-and-vyatta/m-p/104392#M44688</guid>
      <dc:creator>TranceforLife</dc:creator>
      <dc:date>2016-08-18T18:06:52Z</dc:date>
    </item>
    <item>
      <title>Re: IpSec VPN between Palo and Vyatta</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-between-palo-and-vyatta/m-p/104615#M44699</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thx for the template. The fact is f the VPN end on SonicWall, it works, on the palo it doesn't &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/P&gt;&lt;P&gt;All protocol needed are allowed (other VPN are ok)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Maybe MD5 ??? I will ask to change from MD5 to sha1 or more ...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Keep you in touch.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;V.&lt;/P&gt;</description>
      <pubDate>Fri, 19 Aug 2016 08:08:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-between-palo-and-vyatta/m-p/104615#M44699</guid>
      <dc:creator>VinceM</dc:creator>
      <dc:date>2016-08-19T08:08:16Z</dc:date>
    </item>
    <item>
      <title>Re: IpSec VPN between Palo and Vyatta</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-between-palo-and-vyatta/m-p/104617#M44700</link>
      <description>&lt;P&gt;Hello V,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Sure try to tweak IPSec crypto. Deffenetly something is not matching &amp;nbsp;with Phase 2. Proxy-ID etc.&amp;nbsp;&lt;/P&gt;&lt;P&gt;let me know how it goes. Sorry but l have never&amp;nbsp;configured VPN with Vyatta&lt;/P&gt;</description>
      <pubDate>Fri, 19 Aug 2016 08:28:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-between-palo-and-vyatta/m-p/104617#M44700</guid>
      <dc:creator>TranceforLife</dc:creator>
      <dc:date>2016-08-19T08:28:56Z</dc:date>
    </item>
    <item>
      <title>Re: IpSec VPN between Palo and Vyatta</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-between-palo-and-vyatta/m-p/104618#M44701</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Confirmed &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Change config from MD5 to SHA1 ... and now, IT WORKS &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope this info can be usefull for all.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;V.&lt;/P&gt;</description>
      <pubDate>Fri, 19 Aug 2016 08:36:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-between-palo-and-vyatta/m-p/104618#M44701</guid>
      <dc:creator>VinceM</dc:creator>
      <dc:date>2016-08-19T08:36:08Z</dc:date>
    </item>
    <item>
      <title>Re: IpSec VPN between Palo and Vyatta</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-between-palo-and-vyatta/m-p/104619#M44702</link>
      <description>&lt;P&gt;Good stuff! Thx for sharing this info&lt;/P&gt;</description>
      <pubDate>Fri, 19 Aug 2016 08:38:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-between-palo-and-vyatta/m-p/104619#M44702</guid>
      <dc:creator>TranceforLife</dc:creator>
      <dc:date>2016-08-19T08:38:20Z</dc:date>
    </item>
    <item>
      <title>Re: IpSec VPN between Palo and Vyatta</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-between-palo-and-vyatta/m-p/255401#M72475</link>
      <description>&lt;P&gt;Hi!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I had similar case between PA-3020 (PanOS 8.1.6) and Cyberoam firewall.&lt;/P&gt;&lt;P&gt;Tunnel actually showed to be up (so phase 2 established), but no traffic was flowing through tunnel. I noticed in ikemgr.log (in debug mode) file following lines which hinted that some proposal is not suitable for this connection:&lt;/P&gt;&lt;P&gt;[PERR]: { : 5}: not matched&lt;BR /&gt;[PERR]: { : 5}: no suitable policy found.&lt;BR /&gt;[ERR ]: { : 5}: failed to pre-process packet.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We had SHA256 in use for phase 2 and we changed this for SHA1- after this tunnel worked correctly and traffic went through it properly.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Märt&lt;/P&gt;</description>
      <pubDate>Fri, 29 Mar 2019 13:54:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-between-palo-and-vyatta/m-p/255401#M72475</guid>
      <dc:creator>mart_e</dc:creator>
      <dc:date>2019-03-29T13:54:04Z</dc:date>
    </item>
  </channel>
</rss>

