<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: IP Sec VPN Paloalto - Mikrotik in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ip-sec-vpn-paloalto-mikrotik/m-p/261616#M74168</link>
    <description>&lt;P&gt;I have a problem with phase 1 IKE in the Main mode (6 messages):&lt;/P&gt;&lt;P&gt;1.&amp;nbsp; Ike polices exchange - 2 messages -Ok&lt;/P&gt;&lt;P&gt;2.&amp;nbsp;&amp;nbsp;DH algorithm - created shared secret - created SKEYID - skeyid_a, skeyid_e,skeyid_d&amp;nbsp;&lt;/P&gt;&lt;P&gt;3.&amp;nbsp; Peer Authentication - pre-shared key&amp;nbsp;and I thinking here a problem in a log -&amp;nbsp;key acquire&lt;STRONG&gt; ignored due to throttling, but why I don't know &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Just peers can't authenticate each other&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 20 May 2019 10:24:09 GMT</pubDate>
    <dc:creator>Tarczynski-SA</dc:creator>
    <dc:date>2019-05-20T10:24:09Z</dc:date>
    <item>
      <title>IP Sec VPN Paloalto - Mikrotik</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ip-sec-vpn-paloalto-mikrotik/m-p/261346#M74096</link>
      <description>&lt;P&gt;Hi!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have a situation that is doing my head in, and I need some help.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have an installation which looks like this&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;"A" end - Palo Alto Active/Passive cluster, public IP for IPSec VPN termination&lt;/P&gt;&lt;P&gt;"B" end - Mikrotik&amp;nbsp;public IP for IPSec VPN termination&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;IPSec Tunnel not work.&amp;nbsp;&lt;/P&gt;&lt;P&gt;The police 1 phase is accepted. But what this?&lt;/P&gt;&lt;P&gt;&lt;FONT color="#FF0000"&gt;&lt;STRONG&gt;2019-05-16 14:31:43.017 +0200 [DEBG]: { 15: 39}: keyacquire ignored due to throttling (39 sec ago).&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;See debug palo:&lt;/P&gt;&lt;P&gt;2019-05-16 07:49:29.372 +0200 [DEBG]: { 15: }: begin.&lt;BR /&gt;2019-05-16 07:49:29.372 +0200 [DEBG]: { 15: }: seen nptype=1(sa)&lt;BR /&gt;2019-05-16 07:49:29.372 +0200 [DEBG]: { 15: }: seen nptype=13(vid)&lt;BR /&gt;2019-05-16 07:49:29.372 +0200 [DEBG]: { 15: }: seen nptype=13(vid)&lt;BR /&gt;2019-05-16 07:49:29.372 +0200 [DEBG]: { 15: }: succeed.&lt;BR /&gt;2019-05-16 07:49:29.372 +0200 [INFO]: { 15: }: received Vendor ID: CISCO-UNITY&lt;BR /&gt;2019-05-16 07:49:29.372 +0200 [INFO]: { 15: }: received Vendor ID: DPD&lt;BR /&gt;2019-05-16 07:49:29.372 +0200 [DEBG]: { 15: }: remote supports DPD&lt;BR /&gt;2019-05-16 07:49:29.372 +0200 [DEBG]: { 15: }: total SA len=56&lt;BR /&gt;2019-05-16 07:49:29.372 +0200 [DEBG]: { 15: }: begin.&lt;BR /&gt;2019-05-16 07:49:29.372 +0200 [DEBG]: { 15: }: seen nptype=2(prop)&lt;BR /&gt;2019-05-16 07:49:29.372 +0200 [DEBG]: { 15: }: succeed.&lt;BR /&gt;2019-05-16 07:49:29.372 +0200 [DEBG]: { 15: }: proposal #1 len=48&lt;BR /&gt;2019-05-16 07:49:29.372 +0200 [DEBG]: { 15: }: begin.&lt;BR /&gt;2019-05-16 07:49:29.372 +0200 [DEBG]: { 15: }: seen nptype=3(trns)&lt;BR /&gt;2019-05-16 07:49:29.372 +0200 [DEBG]: { 15: }: succeed.&lt;BR /&gt;2019-05-16 07:49:29.372 +0200 [DEBG]: { 15: }: transform #1 len=40&lt;BR /&gt;2019-05-16 07:49:29.372 +0200 [DEBG]: { 15: }: type=Life Type, flag=0x8000, lorv=seconds&lt;BR /&gt;2019-05-16 07:49:29.372 +0200 [DEBG]: { 15: }: type=Life Duration, flag=0x0000, lorv=4&lt;BR /&gt;2019-05-16 07:49:29.372 +0200 [DEBG]: { 15: }: type=Encryption Algorithm, flag=0x8000, lorv=AES&lt;BR /&gt;2019-05-16 07:49:29.372 +0200 [DEBG]: { 15: }: encryption(aes)&lt;BR /&gt;2019-05-16 07:49:29.372 +0200 [DEBG]: { 15: }: type=Key Length, flag=0x8000, lorv=256&lt;BR /&gt;2019-05-16 07:49:29.372 +0200 [DEBG]: { 15: }: type=Authentication Method, flag=0x8000, lorv=PSK&lt;BR /&gt;2019-05-16 07:49:29.372 +0200 [DEBG]: { 15: }: type=Hash Algorithm, flag=0x8000, lorv=SHA512&lt;BR /&gt;2019-05-16 07:49:29.372 +0200 [DEBG]: { 15: }: type=Group Description, flag=0x8000, lorv=DH14&lt;BR /&gt;2019-05-16 07:49:29.372 +0200 [DEBG]: { 15: }: pair 1:&lt;BR /&gt;2019-05-16 07:49:29.372 +0200 [DEBG]: { 15: }: 0xffdc0145e0: next=(nil) tnext=(nil)&lt;BR /&gt;2019-05-16 07:49:29.372 +0200 [DEBG]: { 15: }: proposal #1: 1 transform&lt;BR /&gt;2019-05-16 07:49:29.372 +0200 [DEBG]: { 15: }: prop#=1, prot-id=ISAKMP, spi-size=0, #trns=1&lt;BR /&gt;2019-05-16 07:49:29.372 +0200 [DEBG]: { 15: }: trns#=1, trns-id=IKE&lt;BR /&gt;2019-05-16 07:49:29.372 +0200 [DEBG]: { 15: }: type=Life Type, flag=0x8000, lorv=seconds&lt;BR /&gt;2019-05-16 07:49:29.372 +0200 [DEBG]: { 15: }: type=Life Duration, flag=0x0000, lorv=4&lt;BR /&gt;2019-05-16 07:49:29.372 +0200 [DEBG]: { 15: }: type=Encryption Algorithm, flag=0x8000, lorv=AES&lt;BR /&gt;2019-05-16 07:49:29.372 +0200 [DEBG]: { 15: }: type=Key Length, flag=0x8000, lorv=256&lt;BR /&gt;2019-05-16 07:49:29.372 +0200 [DEBG]: { 15: }: type=Authentication Method, flag=0x8000, lorv=PSK&lt;BR /&gt;2019-05-16 07:49:29.372 +0200 [DEBG]: { 15: }: type=Hash Algorithm, flag=0x8000, lorv=SHA512&lt;BR /&gt;2019-05-16 07:49:29.372 +0200 [DEBG]: { 15: }: type=Group Description, flag=0x8000, lorv=DH14&lt;BR /&gt;2019-05-16 07:49:29.372 +0200 [DEBG]: { 15: }: Compared: DB:Peer&lt;BR /&gt;2019-05-16 07:49:29.372 +0200 [DEBG]: { 15: }: (lifetime = 86400:86400)&lt;BR /&gt;2019-05-16 07:49:29.372 +0200 [DEBG]: { 15: }: (lifebyte = 0:0)&lt;BR /&gt;2019-05-16 07:49:29.372 +0200 [DEBG]: { 15: }: enctype = AES:AES&lt;BR /&gt;2019-05-16 07:49:29.372 +0200 [DEBG]: { 15: }: (encklen = 256:256)&lt;BR /&gt;...skipping...&lt;BR /&gt;2019-05-16 14:31:24.421 +0200 [DEBG]: { 15: }: pair 1:&lt;BR /&gt;2019-05-16 14:31:24.421 +0200 [DEBG]: { 15: }: 0xffdc00f7e0: next=(nil) tnext=(nil)&lt;BR /&gt;2019-05-16 14:31:24.421 +0200 [DEBG]: { 15: }: proposal #1: 1 transform&lt;BR /&gt;2019-05-16 14:31:24.421 +0200 [DEBG]: { 15: }: prop#=1, prot-id=ISAKMP, spi-size=0, #trns=1&lt;BR /&gt;2019-05-16 14:31:24.421 +0200 [DEBG]: { 15: }: trns#=1, trns-id=IKE&lt;BR /&gt;2019-05-16 14:31:24.421 +0200 [DEBG]: { 15: }: type=Life Type, flag=0x8000, lorv=seconds&lt;BR /&gt;2019-05-16 14:31:24.421 +0200 [DEBG]: { 15: }: type=Life Duration, flag=0x0000, lorv=4&lt;BR /&gt;2019-05-16 14:31:24.421 +0200 [DEBG]: { 15: }: type=Encryption Algorithm, flag=0x8000, lorv=AES&lt;BR /&gt;2019-05-16 14:31:24.421 +0200 [DEBG]: { 15: }: type=Key Length, flag=0x8000, lorv=256&lt;BR /&gt;2019-05-16 14:31:24.421 +0200 [DEBG]: { 15: }: type=Authentication Method, flag=0x8000, lorv=PSK&lt;BR /&gt;2019-05-16 14:31:24.421 +0200 [DEBG]: { 15: }: type=Hash Algorithm, flag=0x8000, lorv=SHA512&lt;BR /&gt;2019-05-16 14:31:24.421 +0200 [DEBG]: { 15: }: type=Group Description, flag=0x8000, lorv=DH14&lt;BR /&gt;2019-05-16 14:31:24.421 +0200 [DEBG]: { 15: }: Compared: DB:Peer&lt;BR /&gt;2019-05-16 14:31:24.421 +0200 [DEBG]: { 15: }: (lifetime = 86400:86400)&lt;BR /&gt;2019-05-16 14:31:24.421 +0200 [DEBG]: { 15: }: (lifebyte = 0:0)&lt;BR /&gt;2019-05-16 14:31:24.421 +0200 [DEBG]: { 15: }: enctype = AES:AES&lt;BR /&gt;2019-05-16 14:31:24.421 +0200 [DEBG]: { 15: }: (encklen = 256:256)&lt;BR /&gt;2019-05-16 14:31:24.421 +0200 [DEBG]: { 15: }: hashtype = SHA512:SHA512&lt;BR /&gt;2019-05-16 14:31:24.421 +0200 [DEBG]: { 15: }: authmethod = PSK:PSK&lt;BR /&gt;2019-05-16 14:31:24.421 +0200 [DEBG]: { 15: }: dh_group = DH14:DH14&lt;BR /&gt;2019-05-16 14:31:24.421 +0200 [DEBG]: { 15: }: an acceptable proposal found.&lt;BR /&gt;2019-05-16 14:31:24.421 +0200 [DEBG]: { 15: }: PH1 state changed: 1 to 2 @ph1_set_next_state&lt;BR /&gt;2019-05-16 14:31:24.421 +0200 [DEBG]: { 15: }: add payload of len 56, next type 13(vid)&lt;BR /&gt;2019-05-16 14:31:24.421 +0200 [DEBG]: { 15: }: add payload of len 16, next type 13(vid)&lt;BR /&gt;2019-05-16 14:31:24.421 +0200 [DEBG]: { 15: }: add payload of len 16, next type 13(vid)&lt;BR /&gt;2019-05-16 14:31:24.421 +0200 [DEBG]: { 15: }: add payload of len 16, next type 0(none)&lt;BR /&gt;2019-05-16 14:31:24.421 +0200 [DEBG]: { 15: }: 148 bytes from 1.1.1.1[500] to 2.2.2.2[500]&lt;BR /&gt;2019-05-16 14:31:24.421 +0200 [DEBG]: { 15: }: resend phase1 packet 2190b5cc95b5f4d2:060325efd628efe4, retry 0&lt;BR /&gt;2019-05-16 14:31:24.421 +0200 [DEBG]: { 15: }: add packet caf8ad1a:20 size 128, rcp 2&lt;BR /&gt;2019-05-16 14:31:24.421 +0200 [DEBG]: { 15: }: PH1 state changed: 2 to 3 @ph1_set_next_state&lt;BR /&gt;2019-05-16 14:31:24.421 +0200 [DEBG]: { 15: 39}: keyacquire ignored due to throttling (20 sec ago).&lt;BR /&gt;2019-05-16 14:31:25.027 +0200 [DEBG]: { 15: }: 148 bytes from 1.1.1.1[500] to 2.2.2.2[500]&lt;BR /&gt;2019-05-16 14:31:25.027 +0200 [DEBG]: { 15: }: resend phase1 packet 2190b5cc95b5f4d2:060325efd628efe4, retry 1&lt;BR /&gt;2019-05-16 14:31:26.026 +0200 [DEBG]: { 15: }: 148 bytes from 1.1.1.1[500] to 2.2.2.2[500]&lt;BR /&gt;2019-05-16 14:31:26.027 +0200 [DEBG]: { 15: }: resend phase1 packet a0f4050f26c4283d:b4e9fdfcd28f3714, retry 5&lt;BR /&gt;2019-05-16 14:31:27.016 +0200 [DEBG]: { 15: }: 148 bytes from 1.1.1.1[500] to 2.2.2.2[500]&lt;BR /&gt;2019-05-16 14:31:27.017 +0200 [DEBG]: { 15: }: resend phase1 packet 2190b5cc95b5f4d2:060325efd628efe4, retry 2&lt;BR /&gt;2019-05-16 14:31:30.026 +0200 [DEBG]: { 15: }: 148 bytes from 1.1.1.1[500] to 2.2.2.2[500]&lt;BR /&gt;2019-05-16 14:31:30.027 +0200 [DEBG]: { 15: }: resend phase1 packet 2190b5cc95b5f4d2:060325efd628efe4, retry 3&lt;BR /&gt;2019-05-16 14:31:30.027 +0200 [DEBG]: { 15: }: del packet 3c19046c:20 size 128, rcp 1&lt;BR /&gt;2019-05-16 14:31:34.425 +0200 [INFO]: the packet is retransmitted from 2.2.2.2[500] to 1.1.1.1[500].&lt;BR /&gt;2019-05-16 14:31:34.425 +0200 [DEBG]: { 15: 39}: keyacquire ignored due to throttling (30 sec ago).&lt;BR /&gt;2019-05-16 14:31:35.027 +0200 [DEBG]: { 15: }: 148 bytes from 1.1.1.1[500] to 2.2.2.2[500]&lt;BR /&gt;2019-05-16 14:31:35.027 +0200 [DEBG]: { 15: }: resend phase1 packet 2190b5cc95b5f4d2:060325efd628efe4, retry 4&lt;BR /&gt;2019-05-16 14:31:39.027 +0200 [PNTF]: { 15: }: ====&amp;gt; PHASE-1 NEGOTIATION FAILED AS RESPONDER, MAIN MODE &amp;lt;====&lt;BR /&gt;====&amp;gt; Failed SA: 1.1.1.1[500]-2.2.2.2[500] cookie:a0f4050f26c4283d:b4e9fdfcd28f3714 &amp;lt;==== Due to timeout.&lt;BR /&gt;2019-05-16 14:31:39.027 +0200 [INFO]: { 15: }: ====&amp;gt; PHASE-1 SA DELETED &amp;lt;====&lt;BR /&gt;====&amp;gt; Deleted SA: 1.1.1.1[500]-2.2.2.2[500] cookie:a0f4050f26c4283d:b4e9fdfcd28f3714 &amp;lt;====&lt;BR /&gt;2019-05-16 14:31:43.017 +0200 [DEBG]: { 15: }: 148 bytes from 1.1.1.1[500] to 2.2.2.2[500]&lt;BR /&gt;2019-05-16 14:31:43.017 +0200 [DEBG]: { 15: }: resend phase1 packet 2190b5cc95b5f4d2:060325efd628efe4, retry 5&lt;BR /&gt;&lt;FONT color="#FF0000"&gt;&lt;STRONG&gt;2019-05-16 14:31:43.017 +0200 [DEBG]: { 15: 39}: keyacquire ignored due to throttling (39 sec ago).&lt;/STRONG&gt;&lt;/FONT&gt;&lt;BR /&gt;2019-05-16 14:31:44.422 +0200 [INFO]: the packet is retransmitted from 2.2.2.2[500] to 1.1.1.1[500].&lt;BR /&gt;2019-05-16 14:31:50.016 +0200 [DEBG]: { 15: }: del packet caf8ad1a:20 size 128, rcp 0&lt;BR /&gt;2019-05-16 14:31:54.425 +0200 [DEBG]: { 15: }: malformed cookie received. it has to be as the initiator. 2190b5cc95b5f4d2:060325efd628efe4&lt;BR /&gt;2019-05-16 14:31:56.027 +0200 [PNTF]: { 15: }: ====&amp;gt; PHASE-1 NEGOTIATION FAILED AS RESPONDER, MAIN MODE &amp;lt;====&lt;BR /&gt;====&amp;gt; Failed SA: 1.1.1.1[500]-2.2.2.2[500] cookie:2190b5cc95b5f4d2:060325efd628efe4 &amp;lt;==== Due to timeout.&lt;BR /&gt;2019-05-16 14:31:56.027 +0200 [INFO]: { 15: }: ====&amp;gt; PHASE-1 SA DELETED &amp;lt;====&lt;BR /&gt;====&amp;gt; Deleted SA: 1.1.1.1[500]-2.2.2.2[500] cookie:2190b5cc95b5f4d2:060325efd628efe4 &amp;lt;====&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 16 May 2019 12:47:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ip-sec-vpn-paloalto-mikrotik/m-p/261346#M74096</guid>
      <dc:creator>Tarczynski-SA</dc:creator>
      <dc:date>2019-05-16T12:47:14Z</dc:date>
    </item>
    <item>
      <title>Re: IP Sec VPN Paloalto - Mikrotik</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ip-sec-vpn-paloalto-mikrotik/m-p/261436#M74121</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/72617"&gt;@Tarczynski-SA&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;Do you by chance have multiple proxy-ids configured for this tunnel? When you have a lot of proxy-ids you'll sometimes see this message when the proxy-ids are all attempting to rekey depending on the number in use and the platform in question. It isn't that big of a deal as the system will simply perform a rekey for that proxy-id at a latter time.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 17 May 2019 03:44:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ip-sec-vpn-paloalto-mikrotik/m-p/261436#M74121</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2019-05-17T03:44:52Z</dc:date>
    </item>
    <item>
      <title>Re: IP Sec VPN Paloalto - Mikrotik</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ip-sec-vpn-paloalto-mikrotik/m-p/261439#M74123</link>
      <description>&lt;P&gt;I configured this tunnel in EVE-NG virtual environment and it works. I haven't any problems.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But in the real network didn't work.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;About proxy ID:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot_21.jpg" style="width: 726px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/20061i6DD0C99CE0A4EEF2/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="Screenshot_21.jpg" alt="Screenshot_21.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 17 May 2019 05:31:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ip-sec-vpn-paloalto-mikrotik/m-p/261439#M74123</guid>
      <dc:creator>Tarczynski-SA</dc:creator>
      <dc:date>2019-05-17T05:31:54Z</dc:date>
    </item>
    <item>
      <title>Re: IP Sec VPN Paloalto - Mikrotik</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ip-sec-vpn-paloalto-mikrotik/m-p/261520#M74138</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I would verify the proxy ID's from the other side. If they dont match exactly, then they wont work.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Fri, 17 May 2019 15:57:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ip-sec-vpn-paloalto-mikrotik/m-p/261520#M74138</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2019-05-17T15:57:31Z</dc:date>
    </item>
    <item>
      <title>Re: IP Sec VPN Paloalto - Mikrotik</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ip-sec-vpn-paloalto-mikrotik/m-p/261538#M74146</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/72617"&gt;@Tarczynski-SA&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;I'd agree with&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/27580"&gt;@OtakarKlier&lt;/a&gt;&amp;nbsp; here and say that something is likely misconfigured. With just one set of proxy IDs I wouldn't expect to see any throttling unless you have multiple IPSec Tunnels configured besides this one already.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 17 May 2019 19:53:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ip-sec-vpn-paloalto-mikrotik/m-p/261538#M74146</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2019-05-17T19:53:26Z</dc:date>
    </item>
    <item>
      <title>Re: IP Sec VPN Paloalto - Mikrotik</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ip-sec-vpn-paloalto-mikrotik/m-p/261616#M74168</link>
      <description>&lt;P&gt;I have a problem with phase 1 IKE in the Main mode (6 messages):&lt;/P&gt;&lt;P&gt;1.&amp;nbsp; Ike polices exchange - 2 messages -Ok&lt;/P&gt;&lt;P&gt;2.&amp;nbsp;&amp;nbsp;DH algorithm - created shared secret - created SKEYID - skeyid_a, skeyid_e,skeyid_d&amp;nbsp;&lt;/P&gt;&lt;P&gt;3.&amp;nbsp; Peer Authentication - pre-shared key&amp;nbsp;and I thinking here a problem in a log -&amp;nbsp;key acquire&lt;STRONG&gt; ignored due to throttling, but why I don't know &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Just peers can't authenticate each other&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 20 May 2019 10:24:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ip-sec-vpn-paloalto-mikrotik/m-p/261616#M74168</guid>
      <dc:creator>Tarczynski-SA</dc:creator>
      <dc:date>2019-05-20T10:24:09Z</dc:date>
    </item>
    <item>
      <title>Re: IP Sec VPN Paloalto - Mikrotik</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ip-sec-vpn-paloalto-mikrotik/m-p/262181#M74295</link>
      <description>&lt;P&gt;Just as the wrong pre-shared key on phase 1 -&amp;nbsp;&lt;STRONG&gt;2019-05-16 14:31:43.017 +0200 [DEBG]: { 15: 39}: key acquire ignored due to throttling&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;SPAN&gt;Thanks.&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 24 May 2019 10:54:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ip-sec-vpn-paloalto-mikrotik/m-p/262181#M74295</guid>
      <dc:creator>Tarczynski-SA</dc:creator>
      <dc:date>2019-05-24T10:54:12Z</dc:date>
    </item>
  </channel>
</rss>

