<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: PA HA failover and IPSEC connection shows inactive in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/pa-ha-failover-and-ipsec-connection-shows-inactive/m-p/260045#M73700</link>
    <description>&lt;P&gt;Thanks for helping me out&lt;/P&gt;&lt;P&gt;Much appreicated!!!&lt;/P&gt;</description>
    <pubDate>Mon, 06 May 2019 22:52:48 GMT</pubDate>
    <dc:creator>MP18</dc:creator>
    <dc:date>2019-05-06T22:52:48Z</dc:date>
    <item>
      <title>PA HA failover and IPSEC connection shows inactive</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-ha-failover-and-ipsec-connection-shows-inactive/m-p/259907#M73659</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yesterday during PAN OS upgrade when Passive PA became active I saw that our IPSEC connections stopped working.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;CLI shows status as inactive&lt;/P&gt;&lt;P&gt;I did clear vpn command&lt;/P&gt;&lt;P&gt;test phase 1 and phase 2 still samething.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Only way to make this work was via restarting the remote device.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Need to know what config we can do on the current ipsec connection so VPN works seamlessly when ha failover happens?&lt;/P&gt;</description>
      <pubDate>Sun, 05 May 2019 15:06:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-ha-failover-and-ipsec-connection-shows-inactive/m-p/259907#M73659</guid>
      <dc:creator>MP18</dc:creator>
      <dc:date>2019-05-05T15:06:04Z</dc:date>
    </item>
    <item>
      <title>Re: PA HA failover and IPSEC connection shows inactive</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-ha-failover-and-ipsec-connection-shows-inactive/m-p/260031#M73692</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/75039"&gt;@MP18&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;Do you have 'replace protection' enabled on the IPSec Tunnel in question?&lt;/P&gt;&lt;P&gt;The reason it didn't come back up when you cleared it was because the remote device still believed the tunnel was active and the keys were valid. It would have come back naturally if it encountered a re-key event more than likely. If you could have access the remote device, clearing both ike-sa and ipsec-sa on either peer and letting it rebuild would have likely worked.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 06 May 2019 21:42:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-ha-failover-and-ipsec-connection-shows-inactive/m-p/260031#M73692</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2019-05-06T21:42:14Z</dc:date>
    </item>
    <item>
      <title>Re: PA HA failover and IPSEC connection shows inactive</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-ha-failover-and-ipsec-connection-shows-inactive/m-p/260032#M73693</link>
      <description>&lt;P&gt;Yes we have that enabled.&lt;/P&gt;&lt;P&gt;But same thing we also have enabled on Tunnel to Azure and it had no issues during failover.&lt;/P&gt;&lt;P&gt;Only 4 ping were lost.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Only way Tunnel came back was to reboot the remote device.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Clearing test ike and ipsec on PA were of no help.&lt;/P&gt;&lt;P&gt;Does this mean that everytime i do this i need to restart the remote device?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any other config i can use to avoid this?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 06 May 2019 21:47:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-ha-failover-and-ipsec-connection-shows-inactive/m-p/260032#M73693</guid>
      <dc:creator>MP18</dc:creator>
      <dc:date>2019-05-06T21:47:01Z</dc:date>
    </item>
    <item>
      <title>Re: PA HA failover and IPSEC connection shows inactive</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-ha-failover-and-ipsec-connection-shows-inactive/m-p/260034#M73695</link>
      <description>&lt;P&gt;But same thing we also have enabled on Tunnel to Azure and it had no issues during failover.&lt;/P&gt;&lt;P&gt;Only 4 ping were lost.&lt;/P&gt;&lt;P&gt;&lt;FONT color="#FF0000"&gt;Just because it is working on Azure doesn't mean it will work properly on this tunnel. Azure has a very odd default configuration if you've followed the listed PAN guide when setting up the tunnel.&amp;nbsp;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#000000"&gt;&lt;SPAN&gt;Only way Tunnel came back was to reboot the remote device.&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#FF0000"&gt;&lt;SPAN&gt;So to verify; you logged into the remote device and also cleared the ike-sa&amp;nbsp;and ipsec-sa&amp;nbsp;from the CLI prior to restarting the device? I would guess the answer here is no and the restart would have cleared that information and allowed the ends to negotiate the connection again.&amp;nbsp;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#000000"&gt;&lt;SPAN&gt;Clearing test ike and ipsec on PA were of no help.&lt;BR /&gt;&lt;FONT color="#FF0000"&gt;Clearing on one peer would do nothing to tell the peer device it needs to re-negotiate the tunnel.&amp;nbsp;&lt;/FONT&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#000000"&gt;&lt;SPAN&gt;Any other config i can use to avoid this?&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#FF0000"&gt;&lt;SPAN&gt;Configuring tunnel monitoring would have identified the issue and cleared both ends allowing them to re-negotiate.&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 06 May 2019 22:31:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-ha-failover-and-ipsec-connection-shows-inactive/m-p/260034#M73695</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2019-05-06T22:31:05Z</dc:date>
    </item>
    <item>
      <title>Re: PA HA failover and IPSEC connection shows inactive</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-ha-failover-and-ipsec-connection-shows-inactive/m-p/260042#M73697</link>
      <description>&lt;P&gt;So If i&amp;nbsp; confiure Tunnel Monitor on PA only and will it identify if tunnel is down?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do not know if other device supports tunnel monitor or not.&lt;/P&gt;</description>
      <pubDate>Mon, 06 May 2019 22:33:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-ha-failover-and-ipsec-connection-shows-inactive/m-p/260042#M73697</guid>
      <dc:creator>MP18</dc:creator>
      <dc:date>2019-05-06T22:33:45Z</dc:date>
    </item>
    <item>
      <title>Re: PA HA failover and IPSEC connection shows inactive</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-ha-failover-and-ipsec-connection-shows-inactive/m-p/260044#M73699</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/75039"&gt;@MP18&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;Correct. The firewall would then know that the tunnel isn't responding properly and will attempt to re-key the tunnel ahead of schedule.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 06 May 2019 22:50:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-ha-failover-and-ipsec-connection-shows-inactive/m-p/260044#M73699</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2019-05-06T22:50:08Z</dc:date>
    </item>
    <item>
      <title>Re: PA HA failover and IPSEC connection shows inactive</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-ha-failover-and-ipsec-connection-shows-inactive/m-p/260045#M73700</link>
      <description>&lt;P&gt;Thanks for helping me out&lt;/P&gt;&lt;P&gt;Much appreicated!!!&lt;/P&gt;</description>
      <pubDate>Mon, 06 May 2019 22:52:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-ha-failover-and-ipsec-connection-shows-inactive/m-p/260045#M73700</guid>
      <dc:creator>MP18</dc:creator>
      <dc:date>2019-05-06T22:52:48Z</dc:date>
    </item>
  </channel>
</rss>

