<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic IKEv2 - Unexpected ipsec key delete event in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ikev2-unexpected-ipsec-key-delete-event/m-p/377928#M89416</link>
    <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm a medior network engineer who just got into a new position where I deal with PA FWs. I face the following issue now:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;There is an IPSEC site-to-site VPN between my PA-850 (ver. 9.1.3) and a remote FW (I'm not sure about the remote device type). I see strange behaviours.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yesterday 3 pm the rekey happened. It finished with ikev2-nego-child-succ event and created a Child_SA.&lt;/P&gt;&lt;P&gt;But today morning all the keys got renegotiated starting with this event:&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Ikev2-nego-child-start.&lt;/P&gt;&lt;P&gt;Description: IKEv2 child SA negotiation is started as responder, rekey. Initiated SA: *local_ip*[500]-*remote_ip*[500].&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;After this all the child SAs for the various proxy ids got deleted and then re-installed.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Note: I started the story with yesterday's rekey. That was also a chain of events like this, in which the rekey was not yet due.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Our workforce is relying on this IPsec tunnel, but that is also strange that on yesterday's failure they all experienced connectivity issues while on today's one they did not.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please let me know if you have any ideas, or question.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cheers,&lt;/P&gt;&lt;P&gt;Daniel&lt;/P&gt;</description>
    <pubDate>Tue, 05 Jan 2021 12:25:32 GMT</pubDate>
    <dc:creator>olloczky</dc:creator>
    <dc:date>2021-01-05T12:25:32Z</dc:date>
    <item>
      <title>IKEv2 - Unexpected ipsec key delete event</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ikev2-unexpected-ipsec-key-delete-event/m-p/377928#M89416</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm a medior network engineer who just got into a new position where I deal with PA FWs. I face the following issue now:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;There is an IPSEC site-to-site VPN between my PA-850 (ver. 9.1.3) and a remote FW (I'm not sure about the remote device type). I see strange behaviours.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yesterday 3 pm the rekey happened. It finished with ikev2-nego-child-succ event and created a Child_SA.&lt;/P&gt;&lt;P&gt;But today morning all the keys got renegotiated starting with this event:&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Ikev2-nego-child-start.&lt;/P&gt;&lt;P&gt;Description: IKEv2 child SA negotiation is started as responder, rekey. Initiated SA: *local_ip*[500]-*remote_ip*[500].&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;After this all the child SAs for the various proxy ids got deleted and then re-installed.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Note: I started the story with yesterday's rekey. That was also a chain of events like this, in which the rekey was not yet due.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Our workforce is relying on this IPsec tunnel, but that is also strange that on yesterday's failure they all experienced connectivity issues while on today's one they did not.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please let me know if you have any ideas, or question.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cheers,&lt;/P&gt;&lt;P&gt;Daniel&lt;/P&gt;</description>
      <pubDate>Tue, 05 Jan 2021 12:25:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ikev2-unexpected-ipsec-key-delete-event/m-p/377928#M89416</guid>
      <dc:creator>olloczky</dc:creator>
      <dc:date>2021-01-05T12:25:32Z</dc:date>
    </item>
    <item>
      <title>Re: IKEv2 - Unexpected ipsec key delete event</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ikev2-unexpected-ipsec-key-delete-event/m-p/378041#M89431</link>
      <description>&lt;P&gt;Hi Daniel&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Are you on 'friendly' terms with the remote end?&amp;nbsp; you could ask them to compare notes and see how they have their crypto and phases set, there may be a discrepancy of timers or 'byte count' between your devices that's causing their device to rekey sooner than expected (since they initiate the rekey)&lt;/P&gt;&lt;P&gt;Typical rekey for phase1 is 8 hours, and every 1 hour for phase2, with no bytecount on either. There shouldn't be a huge impact for users unless there are some very sensitive applications in use, the list of proxyIDs is huge, or the crypto is too strong for one side&lt;/P&gt;&lt;P&gt;In which case you could try 'timing' the rekeys or using more process friendly algorythms&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 05 Jan 2021 23:16:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ikev2-unexpected-ipsec-key-delete-event/m-p/378041#M89431</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2021-01-05T23:16:12Z</dc:date>
    </item>
    <item>
      <title>Re: IKEv2 - Unexpected ipsec key delete event</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ikev2-unexpected-ipsec-key-delete-event/m-p/378098#M89441</link>
      <description>&lt;P&gt;Hi Reaper,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for the info. Hopefully we will have a session with the customer on Friday so we can clarify the settings.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 06 Jan 2021 12:27:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ikev2-unexpected-ipsec-key-delete-event/m-p/378098#M89441</guid>
      <dc:creator>olloczky</dc:creator>
      <dc:date>2021-01-06T12:27:27Z</dc:date>
    </item>
  </channel>
</rss>

