<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Trouble with IPSec Site2Site VPN in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/trouble-with-ipsec-site2site-vpn/m-p/355026#M87508</link>
    <description>&lt;P&gt;Thanks to your answer. Will try the firewall switch off.&lt;/P&gt;</description>
    <pubDate>Thu, 08 Oct 2020 04:40:22 GMT</pubDate>
    <dc:creator>c.keller</dc:creator>
    <dc:date>2020-10-08T04:40:22Z</dc:date>
    <item>
      <title>Trouble with IPSec Site2Site VPN</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/trouble-with-ipsec-site2site-vpn/m-p/354924#M87484</link>
      <description>&lt;P&gt;I am a beginner in the Palo Alto World.&lt;/P&gt;&lt;P&gt;I want to setup a Site2Site VPN to a customer.&lt;BR /&gt;The customer has a Palo Alto System running.&lt;/P&gt;&lt;P&gt;I cannot get the tunnel up.&lt;/P&gt;&lt;P&gt;The admin of the customer and me are troubleshooting the problems, but so far nothing is working.&lt;/P&gt;&lt;P&gt;The customer site seems to be ok, because he has some other site2site VPNs running.&lt;/P&gt;&lt;P&gt;My firewall is connected via Ethernet 1/1 to Fritzbox Router. I have Global Protect running, so the connection to internet is setup correctly so far. My Router has a port forwarding for (TCP442, UDP4500,4501,500 and ESP Protocol to the Firewall.&lt;/P&gt;&lt;P&gt;IPSec Crypto and IKE Crypto is correctly set up and checked multiple times.&lt;/P&gt;&lt;P&gt;Parameter of IKE Gateway is&lt;/P&gt;&lt;P&gt;Address Type IP4&lt;BR /&gt;Interface ethernet1/1 (connected to Fritzbox)&lt;BR /&gt;Local IP: -&amp;gt; Here is my 1. question : IP Adress of Firewall (Router), or public IP?&lt;BR /&gt;Peer IP Address Type IP&lt;BR /&gt;Peer Address: x.x.x.x IP Address of customer&lt;BR /&gt;Authentication: Pre-Shared Key&lt;BR /&gt;Pre-shared key: xxxxxxxxxx&lt;BR /&gt;Local identification: None -&amp;gt; Should here be my public ip? If yes, what has the customer to set up.&lt;BR /&gt;Peer Identifikation: None -&amp;gt; Should here be the Address of the customer?&lt;/P&gt;&lt;P&gt;Advanced Option:&lt;/P&gt;&lt;P&gt;Enable passive mode: off&lt;BR /&gt;Enable NAT Traversal: Should it be on or off.&lt;/P&gt;&lt;P&gt;IPSec Tunnels&lt;BR /&gt;3 ProxyIDs&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;If it do test vpn through cli i get following messages:&lt;/P&gt;&lt;P&gt;In case public ip address as local address&lt;BR /&gt;2020-10-07 07:50:30.965 +0200 [INFO]: { 1: }: Gateway-GW: IKEv2 SA test initiate start. 2020-10-07 07:50:30.965 +0200 [PNTF]: { 1: }:&lt;BR /&gt;====&amp;gt; IKEv2 IKE SA NEGOTIATION STARTED AS INITIATOR, non-rekey; gateway Prominent-GW &amp;lt;==== ====&amp;gt; Initiated SA: PublicIP[500]-CustomerIP[500] SPI:f3fd987d11f3e10f:0000000000000000 SN:43 &amp;lt;====&lt;BR /&gt;logfiles end here&lt;/P&gt;&lt;P&gt;In case of IP Address of router as local ip address&lt;BR /&gt;2020-10-07 07:57:51.550 +0200 [INFO]: { 1: }: Gateway-GW: IKEv2 SA test initiate start.&lt;BR /&gt;2020-10-07 07:57:51.550 +0200 [PNTF]: { 1: }: ====&amp;gt; IKEv2 IKE SA NEGOTIATION STARTED AS INITIATOR, non-rekey; gateway Gateway-GW &amp;lt;==== ====&amp;gt; Initiated SA: 192.168.178.7[500]-CustomerIP[500] SPI:b66c331180c0f75f:0000000000000000 SN:44 &amp;lt;====&lt;BR /&gt;2020-10-07 07:57:51.601 +0200 [PWRN]: { 1: }: 192.168.178.7[500] - CustomerIP[500]:0x10344480 [Prominent-GW:44] unauthenticated NO_PROPOSAL_CHOSEN received, you may need to check IKE settings.&lt;BR /&gt;2020-10-07 07:57:57.051 +0200 [PWRN]: { 1: }: 192.168.178.7[500] - CustomerIP[500]:0x10344640 [Prominent-GW:44] unauthenticated NO_PROPOSAL_CHOSEN received, you may need to check IKE settings.&lt;BR /&gt;2020-10-07 07:58:07.062 +0200 [PWRN]: { 1: }: 192.168.178.7[500] - CustomerIP[500]:0x10344480 [Prominent-GW:44] unauthenticated NO_PROPOSAL_CHOSEN received, you may need to check IKE settings.&lt;BR /&gt;&lt;BR /&gt;For testing i allowed everything in security policy.&lt;/P&gt;&lt;P&gt;So how can i find the issue. Any suggestion to troubleshoot this problem.&lt;/P&gt;&lt;P&gt;Thank you for your help.&lt;/P&gt;</description>
      <pubDate>Wed, 07 Oct 2020 17:32:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/trouble-with-ipsec-site2site-vpn/m-p/354924#M87484</guid>
      <dc:creator>c.keller</dc:creator>
      <dc:date>2020-10-07T17:32:42Z</dc:date>
    </item>
    <item>
      <title>Re: Trouble with IPSec Site2Site VPN</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/trouble-with-ipsec-site2site-vpn/m-p/354953#M87486</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;sincei port forwarding enabled, local IP would be the firewall ip local id is same as what you set on the other side as peer id. Your Peer-id set it to customer public ip, NAT traversal is also not needed,&lt;BR /&gt;Try to turn off the firewall on your Fritzbox.&lt;BR /&gt;If that didn’t help, turn on ike passive mode on your firewall and make the other side initiate the connection.&lt;/P&gt;</description>
      <pubDate>Wed, 07 Oct 2020 19:31:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/trouble-with-ipsec-site2site-vpn/m-p/354953#M87486</guid>
      <dc:creator>Abdul-Fattah</dc:creator>
      <dc:date>2020-10-07T19:31:01Z</dc:date>
    </item>
    <item>
      <title>Re: Trouble with IPSec Site2Site VPN</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/trouble-with-ipsec-site2site-vpn/m-p/354983#M87498</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/158285"&gt;@c.keller&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Local identification: None -&amp;gt; Should here be my public ip? If yes, what has the customer to set up.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#FF0000"&gt;Your local identification can be literally anything you want it to be, as long as the other side has it setup as their peer identification. This can be done by any option as long as you have it configured correctly on the other end. IP Address is the most common followed by FQDN, but as long as what you are sending is what the other end is expecting it'll work.&lt;/FONT&gt;&lt;BR /&gt;&lt;SPAN&gt;Peer Identifikation: None -&amp;gt; Should here be the Address of the customer?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#FF0000"&gt;&lt;SPAN&gt;The Peer Identification needs to be whatever the other end has set as their local identification, so you need to get this information from the customer. Usually, it's the IP Address or the FQDN, but it can be any option supported.&amp;nbsp;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#000000"&gt;&lt;SPAN&gt;Again, the IP Address is the most common ID to use but it isn't the only one. There's a couple caveats with the other methods, but as long as both peers are sending/expecting the same information it should work fine (baring running into these caveats like FQDN use when set to aggressive mode, ect).You can leave these options set to none and you want them to match on each node.&amp;nbsp;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 07 Oct 2020 21:32:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/trouble-with-ipsec-site2site-vpn/m-p/354983#M87498</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2020-10-07T21:32:30Z</dc:date>
    </item>
    <item>
      <title>Re: Trouble with IPSec Site2Site VPN</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/trouble-with-ipsec-site2site-vpn/m-p/355025#M87507</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;&amp;nbsp;Thanks for the quick answer.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The customer is a big company and they can not change things on PA as quickly i can.&amp;nbsp;&lt;/P&gt;&lt;P&gt;At the moment they have Peer IP set to my public ip. The local and peer identification is set to none.&lt;/P&gt;&lt;P&gt;The NAT-T option is set to false.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I tried a lot of different things in the past week, without success.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If i use public ip in the as Ethernet1/1 (I have to add a subinterface to Ethernet1/1 and use public IP Address). Global Protect breaks and i think no communication works. But if i use firewall IP address with interface, i think customers firewall does not allow it.&lt;/P&gt;&lt;P&gt;I think the IP will not be translated to my public ip and the tunnel does not get up.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is there a chance to do something, without changing the customer part?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I wondering, is this not common to have the PA to a router? Because i saw in the other rules to different companies, that they use alway public ip as peer&amp;nbsp; (customer PA) with local and peer identifier set to none.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 08 Oct 2020 04:39:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/trouble-with-ipsec-site2site-vpn/m-p/355025#M87507</guid>
      <dc:creator>c.keller</dc:creator>
      <dc:date>2020-10-08T04:39:41Z</dc:date>
    </item>
    <item>
      <title>Re: Trouble with IPSec Site2Site VPN</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/trouble-with-ipsec-site2site-vpn/m-p/355026#M87508</link>
      <description>&lt;P&gt;Thanks to your answer. Will try the firewall switch off.&lt;/P&gt;</description>
      <pubDate>Thu, 08 Oct 2020 04:40:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/trouble-with-ipsec-site2site-vpn/m-p/355026#M87508</guid>
      <dc:creator>c.keller</dc:creator>
      <dc:date>2020-10-08T04:40:22Z</dc:date>
    </item>
    <item>
      <title>Re: Trouble with IPSec Site2Site VPN</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/trouble-with-ipsec-site2site-vpn/m-p/355040#M87510</link>
      <description>&lt;P&gt;Another quick question: Do Global Protect interfere with site2site vpn? This is a suggestion by the customer?&lt;/P&gt;</description>
      <pubDate>Thu, 08 Oct 2020 05:07:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/trouble-with-ipsec-site2site-vpn/m-p/355040#M87510</guid>
      <dc:creator>c.keller</dc:creator>
      <dc:date>2020-10-08T05:07:42Z</dc:date>
    </item>
    <item>
      <title>Re: Trouble with IPSec Site2Site VPN</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/trouble-with-ipsec-site2site-vpn/m-p/355056#M87512</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/129900"&gt;@Abdul-Fattah&lt;/a&gt;&amp;nbsp;: Firewall off had no effect.&lt;/P&gt;</description>
      <pubDate>Thu, 08 Oct 2020 05:44:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/trouble-with-ipsec-site2site-vpn/m-p/355056#M87512</guid>
      <dc:creator>c.keller</dc:creator>
      <dc:date>2020-10-08T05:44:36Z</dc:date>
    </item>
    <item>
      <title>Re: Trouble with IPSec Site2Site VPN</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/trouble-with-ipsec-site2site-vpn/m-p/355057#M87513</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/158285"&gt;@c.keller&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;if you set the ID to none by default the firewall will use the IP, so make sure that the customer side Peer-ID and your Local-ID match.&amp;nbsp;&lt;/P&gt;&lt;P&gt;if the problem with the Identification you will recieve a notification in the logs.&lt;/P&gt;&lt;P&gt;what system logs is your firewall reporting regarding the IPsec?&lt;/P&gt;&lt;P&gt;is the firewall receiving or trying to make a connection to the other end?, check sessions and traffic logs.&lt;/P&gt;</description>
      <pubDate>Thu, 08 Oct 2020 07:43:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/trouble-with-ipsec-site2site-vpn/m-p/355057#M87513</guid>
      <dc:creator>Abdul-Fattah</dc:creator>
      <dc:date>2020-10-08T07:43:40Z</dc:date>
    </item>
    <item>
      <title>Re: Trouble with IPSec Site2Site VPN</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/trouble-with-ipsec-site2site-vpn/m-p/355542#M87552</link>
      <description>&lt;P&gt;Finally it was a mismatch in the Ike Crypt setting. And also a communication timeout issue with PA-220. Seemed like the PA was to slow to response. After Dead peer detection was deactivated, it worked.&lt;/P&gt;</description>
      <pubDate>Sat, 10 Oct 2020 10:39:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/trouble-with-ipsec-site2site-vpn/m-p/355542#M87552</guid>
      <dc:creator>c.keller</dc:creator>
      <dc:date>2020-10-10T10:39:12Z</dc:date>
    </item>
  </channel>
</rss>

