<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: IPSEC VPN tunnel monotor showing down in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-tunnel-monotor-showing-down/m-p/281305#M75946</link>
    <description>&lt;P&gt;All traffic will be encrypted inside the tunnel. Get the PCAP from the server side, check for ICMP traffic and if it arrives, ensure your server responses to the requests.&lt;/P&gt;</description>
    <pubDate>Tue, 06 Aug 2019 12:56:35 GMT</pubDate>
    <dc:creator>myky</dc:creator>
    <dc:date>2019-08-06T12:56:35Z</dc:date>
    <item>
      <title>IPSEC VPN tunnel monotor showing down</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-tunnel-monotor-showing-down/m-p/280722#M75874</link>
      <description>&lt;P&gt;We have configured Tunnel Monitor for IPSEC VPN to monitor IP Peer side server.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My query is I dont see ping packet intiated by tunnel interface towards destination IP on firewall logs.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Though in show vpn tunnel-flow id I can see monitor packets sent incrementing&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;does source packet gets encrypted inside tunnel ?&lt;/P&gt;</description>
      <pubDate>Fri, 02 Aug 2019 09:32:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-tunnel-monotor-showing-down/m-p/280722#M75874</guid>
      <dc:creator>fatboy1607</dc:creator>
      <dc:date>2019-08-02T09:32:18Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC VPN tunnel monotor showing down</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-tunnel-monotor-showing-down/m-p/280752#M75877</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do you see an increment in the received packet counter? This KB explains very well expected behaviour:&lt;/P&gt;&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000CloYCAS" target="_blank" rel="noopener"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000CloYCAS&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Traffic will be encrypted for sure, so only ESP should be visible in the traffic log, however, this is FW's own traffic (initiated by the device) so l am not 100% sure if it will be logged.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Ensure monitored host responds to the ICMP from the remote subnet (in our case FW's tunnel interface IP)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thx,&lt;/P&gt;&lt;P&gt;Myky&lt;/P&gt;</description>
      <pubDate>Fri, 02 Aug 2019 12:50:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-tunnel-monotor-showing-down/m-p/280752#M75877</guid>
      <dc:creator>myky</dc:creator>
      <dc:date>2019-08-02T12:50:21Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC VPN tunnel monotor showing down</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-tunnel-monotor-showing-down/m-p/281291#M75943</link>
      <description>&lt;P&gt;IN attached KB it says we need to allow ICMP between Tunnel Interface and Remote IP ( Tunnel Monitor IP ) if Peer device is not Palo alto.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClR3CAK" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClR3CAK&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;That does say to me traffic is not getting encrypted inside tunnel ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But strange that is I dont see ICMP packets in traffic monitor so it contradicts for KB say&lt;/P&gt;</description>
      <pubDate>Tue, 06 Aug 2019 12:15:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-tunnel-monotor-showing-down/m-p/281291#M75943</guid>
      <dc:creator>fatboy1607</dc:creator>
      <dc:date>2019-08-06T12:15:55Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC VPN tunnel monotor showing down</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-tunnel-monotor-showing-down/m-p/281305#M75946</link>
      <description>&lt;P&gt;All traffic will be encrypted inside the tunnel. Get the PCAP from the server side, check for ICMP traffic and if it arrives, ensure your server responses to the requests.&lt;/P&gt;</description>
      <pubDate>Tue, 06 Aug 2019 12:56:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-tunnel-monotor-showing-down/m-p/281305#M75946</guid>
      <dc:creator>myky</dc:creator>
      <dc:date>2019-08-06T12:56:35Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC VPN tunnel monotor showing down</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-tunnel-monotor-showing-down/m-p/281698#M75999</link>
      <description>&lt;P&gt;peer side is Azure we cannot run pcap there&lt;/P&gt;</description>
      <pubDate>Thu, 08 Aug 2019 06:23:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-tunnel-monotor-showing-down/m-p/281698#M75999</guid>
      <dc:creator>fatboy1607</dc:creator>
      <dc:date>2019-08-08T06:23:48Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC VPN tunnel monotor showing down</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-tunnel-monotor-showing-down/m-p/281700#M76000</link>
      <description>&lt;P&gt;You should be able to run the PCAP on the actual server.&lt;/P&gt;</description>
      <pubDate>Thu, 08 Aug 2019 07:07:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-tunnel-monotor-showing-down/m-p/281700#M76000</guid>
      <dc:creator>myky</dc:creator>
      <dc:date>2019-08-08T07:07:50Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC VPN tunnel monotor showing down</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-tunnel-monotor-showing-down/m-p/281974#M76019</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/1289"&gt;@fatboy1607&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- ICMP packets generated by tunnel monitor are not logged&lt;/P&gt;&lt;P&gt;- Packet capture on the firewall cannot capture those packets&lt;/P&gt;&lt;P&gt;- The only way to see if tunnel monitor is sending and receiving (if receiving) packets is via the comman you already know &amp;gt; show vpn tunnel-flow id&lt;BR /&gt;&lt;BR /&gt;The ping packets generated by tunnel monitor ARE definately encrypted and send try the tunnel, that is the whole point of the tunnel monitor, to see if both phases of the IPsec tunnel are up and actual traffic can pass through it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The common reason for your tunnel monitor to show down is - proxy id. If your tunnel is using multiple proxy id, tunnel monitor will fail. For more details see my comment in the following post - &lt;A href="https://live.paloaltonetworks.com/t5/General-Topics/Fail-over-VPN-site-to-site/m-p/249792/highlight/true#M71033" target="_self"&gt;Fail-over VPN site-to-site &lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 09 Aug 2019 07:21:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-tunnel-monotor-showing-down/m-p/281974#M76019</guid>
      <dc:creator>aleksandar.astardzhiev</dc:creator>
      <dc:date>2019-08-09T07:21:21Z</dc:date>
    </item>
  </channel>
</rss>

