<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: IKE Certificate Authentication Peer ID in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ike-certificate-authentication-peer-id/m-p/373833#M88965</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I can generate a new certificate if required.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The issue is that it's looking for the peer id which is an IP address in the SAN. I have added this into the cert and verified its there in the SAN but it still doesn't not get picked up during the phase 1 verification - would it be work adding another san entry like hostname and adding the IP address?&lt;/P&gt;</description>
    <pubDate>Fri, 11 Dec 2020 08:39:15 GMT</pubDate>
    <dc:creator>Chris.Billett</dc:creator>
    <dc:date>2020-12-11T08:39:15Z</dc:date>
    <item>
      <title>IKE Certificate Authentication Peer ID</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ike-certificate-authentication-peer-id/m-p/373519#M88934</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Im trying to setup a VPN connection using certificate based authentication. When Phase 1 tries to establish I'm getting the following error&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;Peer's ID payload ' IPv4_address:xxx.xxx.xxx.xxx' does not match certificate ID, Error: failed to get subjectAltName.&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have added the peer's IP address to the IP(SAN) of the&amp;nbsp; certificate and also tried using '&lt;EM&gt;Permit peer identification and certificate payload identification mismatch'&amp;nbsp;&lt;/EM&gt;with no luck.&lt;BR /&gt;&lt;BR /&gt;Any further suggestions on how to bring up phase 1?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Thu, 10 Dec 2020 15:23:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ike-certificate-authentication-peer-id/m-p/373519#M88934</guid>
      <dc:creator>Chris.Billett</dc:creator>
      <dc:date>2020-12-10T15:23:11Z</dc:date>
    </item>
    <item>
      <title>Re: IKE Certificate Authentication Peer ID</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ike-certificate-authentication-peer-id/m-p/373671#M88946</link>
      <description>&lt;P&gt;The error seems to suggest that either A. The other side is sending a local identification that does not match any SAN that is present on the certificate or B. Does not contain a SAN attribute on the certificate at all.&lt;/P&gt;&lt;P&gt;Are both sides under your control, where you're able to generate a new certificate if need be or inspect the current attributes of the certificate it's using?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also make sure the Certificate Profile on the VPN contains the Intermediate, Root or Self Signed certificate and is marked as a Trusted certificate in the local device store.&lt;/P&gt;</description>
      <pubDate>Thu, 10 Dec 2020 22:04:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ike-certificate-authentication-peer-id/m-p/373671#M88946</guid>
      <dc:creator>Retired Member</dc:creator>
      <dc:date>2020-12-10T22:04:35Z</dc:date>
    </item>
    <item>
      <title>Re: IKE Certificate Authentication Peer ID</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ike-certificate-authentication-peer-id/m-p/373833#M88965</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I can generate a new certificate if required.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The issue is that it's looking for the peer id which is an IP address in the SAN. I have added this into the cert and verified its there in the SAN but it still doesn't not get picked up during the phase 1 verification - would it be work adding another san entry like hostname and adding the IP address?&lt;/P&gt;</description>
      <pubDate>Fri, 11 Dec 2020 08:39:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ike-certificate-authentication-peer-id/m-p/373833#M88965</guid>
      <dc:creator>Chris.Billett</dc:creator>
      <dc:date>2020-12-11T08:39:15Z</dc:date>
    </item>
    <item>
      <title>Re: IKE Certificate Authentication Peer ID</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ike-certificate-authentication-peer-id/m-p/373836#M88966</link>
      <description>&lt;P&gt;If you can generate a new certificate it would defiantly be worth generating a new one containing additional SAN entries.&lt;/P&gt;&lt;P&gt;I'd suggest tagging on the SANs Hostname, FQDN and IP address and check if you can get the firewall to recognize these attributes as the Peer Identification.&lt;/P&gt;</description>
      <pubDate>Fri, 11 Dec 2020 09:24:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ike-certificate-authentication-peer-id/m-p/373836#M88966</guid>
      <dc:creator>Retired Member</dc:creator>
      <dc:date>2020-12-11T09:24:33Z</dc:date>
    </item>
    <item>
      <title>Re: IKE Certificate Authentication Peer ID</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ike-certificate-authentication-peer-id/m-p/373861#M88969</link>
      <description>&lt;P&gt;New certificate didn't do the trick. PA Support also don't seem to know either &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 11 Dec 2020 14:35:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ike-certificate-authentication-peer-id/m-p/373861#M88969</guid>
      <dc:creator>Chris.Billett</dc:creator>
      <dc:date>2020-12-11T14:35:19Z</dc:date>
    </item>
    <item>
      <title>Re: IKE Certificate Authentication Peer ID</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ike-certificate-authentication-peer-id/m-p/373875#M88970</link>
      <description>&lt;P&gt;Are you sure you've imported the peers certificate, or signer of the certificate, in the local firewall and added a certificate profile containing this certificate which applies on the VPN?&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="BeardedTree_0-1607699919222.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/29103i73376FDB0B31AF6A/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="BeardedTree_0-1607699919222.png" alt="BeardedTree_0-1607699919222.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;The Peer Identification, local and peer, needs to match on both sides (Reverse local/Remote) and the Cert Profile, if containing the cert marked as trusted, should set up the Phase 1 connection.&lt;/P&gt;</description>
      <pubDate>Fri, 11 Dec 2020 15:21:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ike-certificate-authentication-peer-id/m-p/373875#M88970</guid>
      <dc:creator>Retired Member</dc:creator>
      <dc:date>2020-12-11T15:21:15Z</dc:date>
    </item>
    <item>
      <title>Re: IKE Certificate Authentication Peer ID</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ike-certificate-authentication-peer-id/m-p/373876#M88971</link>
      <description>&lt;P&gt;Ok to go through the motions..&lt;BR /&gt;&lt;BR /&gt;I generated a CSR using my public IP as the CN&lt;/P&gt;&lt;P&gt;I sent my CSR to the peer who signed it and sent back their Root, Int CA's and my signed cert&lt;BR /&gt;I imported all 3&lt;BR /&gt;&lt;BR /&gt;In the IKE setup I set the Cert to be the signed cert&lt;BR /&gt;I created a cert profile adding both CA's&lt;BR /&gt;I then set Local Identification to be my DN record of the Cert (as this populate this way)&lt;BR /&gt;I then set the Peer Identification to be their IP&lt;BR /&gt;&lt;BR /&gt;If I change the IP to be something else it fails before the authentication saying the Peer ID they presented didnt match.&lt;/P&gt;</description>
      <pubDate>Fri, 11 Dec 2020 15:30:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ike-certificate-authentication-peer-id/m-p/373876#M88971</guid>
      <dc:creator>Chris.Billett</dc:creator>
      <dc:date>2020-12-11T15:30:02Z</dc:date>
    </item>
    <item>
      <title>Re: IKE Certificate Authentication Peer ID</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ike-certificate-authentication-peer-id/m-p/373883#M88972</link>
      <description>&lt;P&gt;Gotcha, just to clarify did you also designate SAN attributes for your firewall cert and for the cert the other firewall is using?&lt;/P&gt;&lt;P&gt;Like:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="BeardedTree_0-1607702009759.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/29104i31A448F6CEDDFC06/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="BeardedTree_0-1607702009759.png" alt="BeardedTree_0-1607702009759.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;The additional attributes are SAN items which seem related to the error where no additional attributes were found.&lt;/P&gt;&lt;P&gt;It would end up local something similar to the below screenshot if he other side has a certificate with Email Otherunit@local.local.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="BeardedTree_1-1607702293010.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/29105i665B693FB202301C/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="BeardedTree_1-1607702293010.png" alt="BeardedTree_1-1607702293010.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Lastly the intermediate and/or root need to be marked in the certificate store as trusted CA's&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="BeardedTree_2-1607702432893.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/29106i336E61A8E5197777/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="BeardedTree_2-1607702432893.png" alt="BeardedTree_2-1607702432893.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 11 Dec 2020 16:00:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ike-certificate-authentication-peer-id/m-p/373883#M88972</guid>
      <dc:creator>Retired Member</dc:creator>
      <dc:date>2020-12-11T16:00:50Z</dc:date>
    </item>
    <item>
      <title>Re: IKE Certificate Authentication Peer ID</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ike-certificate-authentication-peer-id/m-p/373884#M88973</link>
      <description>&lt;P&gt;I tried setting the SAN for IP to be that of the remote peer.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Im in the process of waiting for a new cert to be signed where the SAN IP is set to the local peer ip as you show in your screenshots.&lt;/P&gt;</description>
      <pubDate>Fri, 11 Dec 2020 16:04:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ike-certificate-authentication-peer-id/m-p/373884#M88973</guid>
      <dc:creator>Chris.Billett</dc:creator>
      <dc:date>2020-12-11T16:04:18Z</dc:date>
    </item>
    <item>
      <title>Re: IKE Certificate Authentication Peer ID</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ike-certificate-authentication-peer-id/m-p/373885#M88974</link>
      <description>&lt;P&gt;Sorry yes, I have also set these to trusted.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If i set anything other than the IP address in the Peer Identification field i get the following error&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;received ID_R (type ipaddr [xxx.xxx.xxx.xxx]) does not match peer ID&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So if i set it back to the IP i then get the cert error&lt;/P&gt;</description>
      <pubDate>Fri, 11 Dec 2020 16:09:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ike-certificate-authentication-peer-id/m-p/373885#M88974</guid>
      <dc:creator>Chris.Billett</dc:creator>
      <dc:date>2020-12-11T16:09:41Z</dc:date>
    </item>
    <item>
      <title>Re: IKE Certificate Authentication Peer ID</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ike-certificate-authentication-peer-id/m-p/373886#M88975</link>
      <description>&lt;P&gt;That would mean the Peer firewall is sending it's IP address as Local Identifier, however the question is if this is also defined on the certificate the Peer is using as that needs to match aswell.&lt;/P&gt;&lt;P&gt;So the Peers Certificate would need a SAN Attribute "IP Address" with it's IP.&lt;/P&gt;</description>
      <pubDate>Fri, 11 Dec 2020 16:13:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ike-certificate-authentication-peer-id/m-p/373886#M88975</guid>
      <dc:creator>Retired Member</dc:creator>
      <dc:date>2020-12-11T16:13:22Z</dc:date>
    </item>
    <item>
      <title>Re: IKE Certificate Authentication Peer ID</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ike-certificate-authentication-peer-id/m-p/373891#M88976</link>
      <description>&lt;P&gt;I've posed the question to my peer.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I added this IP as a SAN entry in my CSR but as far as their side im not sure.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 11 Dec 2020 16:47:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ike-certificate-authentication-peer-id/m-p/373891#M88976</guid>
      <dc:creator>Chris.Billett</dc:creator>
      <dc:date>2020-12-11T16:47:06Z</dc:date>
    </item>
    <item>
      <title>Re: IKE Certificate Authentication Peer ID</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ike-certificate-authentication-peer-id/m-p/374012#M88996</link>
      <description>&lt;P&gt;Taking the original error and picking it piece by piece.&lt;/P&gt;&lt;PRE&gt;Peer's ID payload ' IPv4_address:xxx.xxx.xxx.xxx' does not match certificate ID, Error: failed to get subjectAltName.&lt;/PRE&gt;&lt;P&gt;It would seem that their side does have their Local ID Field and IP Field are filled with an IP address however the certificate they use doesn't seem to have a SAN at all, or a matching IP address SAN on the certificate.&lt;/P&gt;&lt;P&gt;Looking at the last bit my guestimate would be the second case.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Next step would be to verify if this is actually the case by either having them check the config or make a PCAP of the initial exchange to capture the certificate info (Depending on the Ike version and mode of connection (Main/aggressive)).&lt;/P&gt;</description>
      <pubDate>Sat, 12 Dec 2020 14:25:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ike-certificate-authentication-peer-id/m-p/374012#M88996</guid>
      <dc:creator>Retired Member</dc:creator>
      <dc:date>2020-12-12T14:25:30Z</dc:date>
    </item>
  </channel>
</rss>

