<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic All site to site tunnels drop in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/all-site-to-site-tunnels-drop/m-p/314769#M81162</link>
    <description>&lt;P&gt;We had an incident where we have site to site VPNs coming into the Palo.&amp;nbsp; The connection dropped and they would not come backup, even after dropping the VPN on both devices.&amp;nbsp; The end result was a reboot of the firewall and it came back up.&amp;nbsp; What I saw in the logs is pasted below.&amp;nbsp; Customer support just said "As we can see from the Ike manager logs the firewall is receiving the first packet for IKE negotiation which accepts and sends the response but its not getting the reply."&amp;nbsp; Both sides could ping each other.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Ideas?&lt;/P&gt;&lt;P&gt;************&lt;/P&gt;&lt;P&gt;====&amp;gt; PHASE-1 NEGOTIATION FAILED AS RESPONDER, MAIN MODE &amp;lt;====&lt;BR /&gt;====&amp;gt; Failed SA: [500] cookie:b54ae8b7fae36f5b:a2a373bfed2ef054 &amp;lt;==== Due to timeout.&lt;BR /&gt;&amp;#27;[7m2020-03-05&amp;#27;[27m 04:23:39.000 -0600 [INFO]: { 4: }: ====&amp;gt; PHASE-1 SA DELETED &amp;lt;====&lt;BR /&gt;====&amp;gt; Deleted SA: [500] cookie:b54ae8b7fae36f5b:a2a373bfed2ef054 &amp;lt;====&lt;BR /&gt;&amp;#27;[7m2020-03-05&amp;#27;[27m 04:23:42.974 -0600 [PNTF]: { 4: }: ====&amp;gt; PHASE-1 NEGOTIATION STARTED AS RESPONDER, MAIN MODE &amp;lt;====&lt;BR /&gt;====&amp;gt; Initiated SA: 4[500] cookie:1589d0bc1ca8cedd:b61975bbe41105ad &amp;lt;====&lt;BR /&gt;&amp;#27;[7m2020-03-05&amp;#27;[27m 04:23:42.975 -0600 [INFO]: { 4: }: received Vendor ID: RFC 3947&lt;BR /&gt;&amp;#27;[7m2020-03-05&amp;#27;[27m 04:23:42.975 -0600 [INFO]: { 4: }: received Vendor ID: draft-ietf-ipsec-nat-t-ike-03&lt;BR /&gt;&amp;#27;[7m2020-03-05&amp;#27;[27m 04:23:42.975 -0600 [INFO]: { 4: }: received Vendor ID: draft-ietf-ipsec-nat-t-ike-02&lt;/P&gt;&lt;P&gt;&amp;#27;[7m2020-03-05&amp;#27;[27m 04:23:42.975 -0600 [INFO]: { 4: }: received Vendor ID: draft-ietf-ipsec-nat-t-ike-00&lt;BR /&gt;&amp;#27;[7m2020-03-05&amp;#27;[27m 04:23:42.975 -0600 [INFO]: { 4: }: Selected NAT-T version: RFC 3947&lt;BR /&gt;&amp;#27;[7m2020-03-05&amp;#27;[27m 04:23:50.974 -0600 [INFO]: the packet is retransmitted from [500].&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 05 Mar 2020 18:52:09 GMT</pubDate>
    <dc:creator>ShaunaYelverton</dc:creator>
    <dc:date>2020-03-05T18:52:09Z</dc:date>
    <item>
      <title>All site to site tunnels drop</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/all-site-to-site-tunnels-drop/m-p/314769#M81162</link>
      <description>&lt;P&gt;We had an incident where we have site to site VPNs coming into the Palo.&amp;nbsp; The connection dropped and they would not come backup, even after dropping the VPN on both devices.&amp;nbsp; The end result was a reboot of the firewall and it came back up.&amp;nbsp; What I saw in the logs is pasted below.&amp;nbsp; Customer support just said "As we can see from the Ike manager logs the firewall is receiving the first packet for IKE negotiation which accepts and sends the response but its not getting the reply."&amp;nbsp; Both sides could ping each other.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Ideas?&lt;/P&gt;&lt;P&gt;************&lt;/P&gt;&lt;P&gt;====&amp;gt; PHASE-1 NEGOTIATION FAILED AS RESPONDER, MAIN MODE &amp;lt;====&lt;BR /&gt;====&amp;gt; Failed SA: [500] cookie:b54ae8b7fae36f5b:a2a373bfed2ef054 &amp;lt;==== Due to timeout.&lt;BR /&gt;&amp;#27;[7m2020-03-05&amp;#27;[27m 04:23:39.000 -0600 [INFO]: { 4: }: ====&amp;gt; PHASE-1 SA DELETED &amp;lt;====&lt;BR /&gt;====&amp;gt; Deleted SA: [500] cookie:b54ae8b7fae36f5b:a2a373bfed2ef054 &amp;lt;====&lt;BR /&gt;&amp;#27;[7m2020-03-05&amp;#27;[27m 04:23:42.974 -0600 [PNTF]: { 4: }: ====&amp;gt; PHASE-1 NEGOTIATION STARTED AS RESPONDER, MAIN MODE &amp;lt;====&lt;BR /&gt;====&amp;gt; Initiated SA: 4[500] cookie:1589d0bc1ca8cedd:b61975bbe41105ad &amp;lt;====&lt;BR /&gt;&amp;#27;[7m2020-03-05&amp;#27;[27m 04:23:42.975 -0600 [INFO]: { 4: }: received Vendor ID: RFC 3947&lt;BR /&gt;&amp;#27;[7m2020-03-05&amp;#27;[27m 04:23:42.975 -0600 [INFO]: { 4: }: received Vendor ID: draft-ietf-ipsec-nat-t-ike-03&lt;BR /&gt;&amp;#27;[7m2020-03-05&amp;#27;[27m 04:23:42.975 -0600 [INFO]: { 4: }: received Vendor ID: draft-ietf-ipsec-nat-t-ike-02&lt;/P&gt;&lt;P&gt;&amp;#27;[7m2020-03-05&amp;#27;[27m 04:23:42.975 -0600 [INFO]: { 4: }: received Vendor ID: draft-ietf-ipsec-nat-t-ike-00&lt;BR /&gt;&amp;#27;[7m2020-03-05&amp;#27;[27m 04:23:42.975 -0600 [INFO]: { 4: }: Selected NAT-T version: RFC 3947&lt;BR /&gt;&amp;#27;[7m2020-03-05&amp;#27;[27m 04:23:50.974 -0600 [INFO]: the packet is retransmitted from [500].&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 05 Mar 2020 18:52:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/all-site-to-site-tunnels-drop/m-p/314769#M81162</guid>
      <dc:creator>ShaunaYelverton</dc:creator>
      <dc:date>2020-03-05T18:52:09Z</dc:date>
    </item>
    <item>
      <title>Re: All site to site tunnels drop</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/all-site-to-site-tunnels-drop/m-p/314797#M81167</link>
      <description>&lt;P&gt;What version are you running?&amp;nbsp; The 8.1.13 release has a fix for a huge memory leak that causes symptoms very similar to if not exactly what you are experiencing.&lt;/P&gt;</description>
      <pubDate>Thu, 05 Mar 2020 20:27:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/all-site-to-site-tunnels-drop/m-p/314797#M81167</guid>
      <dc:creator>jeremy.larsen</dc:creator>
      <dc:date>2020-03-05T20:27:14Z</dc:date>
    </item>
    <item>
      <title>Re: All site to site tunnels drop - Palo to Sonicwall</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/all-site-to-site-tunnels-drop/m-p/314902#M81178</link>
      <description>&lt;P&gt;In case anyone else is configuring PAN to Sonicwall this is how we configured. The tunnel interfaces were significantly slower and did not re-establish communication.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://live.paloaltonetworks.com/t5/API-Articles/Create-a-VPN-from-Palo-Alto-to-Sonicwall/ta-p/55309" target="_blank" rel="noopener"&gt;https://live.paloaltonetworks.com/t5/API-Articles/Create-a-VPN-from-Palo-Alto-to-Sonicwall/ta-p/55309&lt;/A&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 06 Mar 2020 13:13:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/all-site-to-site-tunnels-drop/m-p/314902#M81178</guid>
      <dc:creator>ShaunaYelverton</dc:creator>
      <dc:date>2020-03-06T13:13:02Z</dc:date>
    </item>
    <item>
      <title>Re: All site to site tunnels drop</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/all-site-to-site-tunnels-drop/m-p/314903#M81179</link>
      <description>&lt;P&gt;We are running 9.0.5, it was a misconfiguration of the tunnel between the Sonicwalls and Palo.&amp;nbsp; They stayed up for over a week though.&amp;nbsp; Thanks for the update.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 06 Mar 2020 13:37:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/all-site-to-site-tunnels-drop/m-p/314903#M81179</guid>
      <dc:creator>ShaunaYelverton</dc:creator>
      <dc:date>2020-03-06T13:37:35Z</dc:date>
    </item>
  </channel>
</rss>

