<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: PA Ipsec 2/3 phase 2 coming up only in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/pa-ipsec-2-3-phase-2-coming-up-only/m-p/12522#M9171</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello &lt;A href="https://live.paloaltonetworks.com/u1/15536"&gt;JRussell&lt;/A&gt;,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On the Palo Alto firewall, you monitor ikemgr.log while phase-2 is negotiating. For that you would need to setup the ike daemon to 'debug' level and tail follow the log.&lt;/P&gt;&lt;P&gt;&amp;gt; debug ike global on debug (make sure you give this command twice to make sure that the daemon logging is set at debug level rather than info level )&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;**************************************&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;gt; debug ike global on debug&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;sw.ikedaemon.debug.global: normal&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;gt; debug ike global on debug&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;sw.ikedaemon.debug.global:&lt;STRONG&gt; &lt;EM&gt;debug&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;**************************************&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Once that is done, you can execute the following command:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;gt; tail follow yes mp-log ikemgr.log&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;2014-06-19 14:34:16.194 -0500 ikemgr: panike_daemon phase 1 finished with status 1&lt;/P&gt;&lt;P&gt;2014-06-19 14:34:22.829 -0500 ikemgr: panike_daemon phase 2 started&lt;/P&gt;&lt;P&gt;2014-06-19 14:34:22.829 -0500 pan IKE cfg phase-2 triggered.&lt;/P&gt;&lt;P&gt;2014-06-19 14:34:22.829 -0500 pan IKE cfg phase-2 triggered when not necessary, skipped.&lt;/P&gt;&lt;P&gt;2014-06-19 14:34:22.829 -0500 ikemgr: panike_daemon phase 2 finished&lt;/P&gt;&lt;P&gt;2014-06-20 10:51:19 [INFO]: panike_debug_level_cb 4 =&amp;gt; 5&lt;/P&gt;&lt;P&gt;2014-06-20 10:51:20.603 -0500 debug: ifmon_request_put(daemon/panike_sysd_if.c:916): 16 write to pipe: debug_level&lt;/P&gt;&lt;P&gt;2014-06-20 10:51:20.603 -0500 debug: ifmon_request_get(daemon/panike_sysd_if.c:932): 16 read from pipe, msg type 1&lt;/P&gt;&lt;P&gt;.&lt;/P&gt;&lt;P&gt;,&lt;/P&gt;&lt;P&gt;.&lt;/P&gt;&lt;P&gt;.&lt;/P&gt;&lt;P&gt;and so forth....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To turn off the debugging:&lt;/P&gt;&lt;P&gt;&amp;gt; debug ike global on normal&lt;/P&gt;&lt;P&gt;sw.ikedaemon.debug.global: debug&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The following document helps troubleshooting VPN scenarios:&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/docs/DOC-3671"&gt;How to Troubleshoot VPN Connectivity Issues&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that gets your started!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks and regards,&lt;/P&gt;&lt;P&gt;Kunal Adak&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 20 Jun 2014 15:55:46 GMT</pubDate>
    <dc:creator>kadak</dc:creator>
    <dc:date>2014-06-20T15:55:46Z</dc:date>
    <item>
      <title>PA Ipsec 2/3 phase 2 coming up only</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-ipsec-2-3-phase-2-coming-up-only/m-p/12521#M9170</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi there,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 12px; background-color: #eaeaea;"&gt;I have a unique linux firewall box (that connects back to PA via Ipsec tunnels) on one of my sites. It is unique in the fact it requires 5 NIC's for the networks there. It only uses 3 phase 2 Ipsec tunnels which is the same on all my sites, but I have noticed some issues.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 12px; background-color: #eaeaea;"&gt;Namely that some of the time only 2 out of 3 tunnels come up. Sometimes all 3 come up, sometimes only 2. Fortunately the Main LAN always comes up, so users are not affected. Phase 1 tunnel comes up fine every time. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 12px; background-color: #eaeaea;"&gt;So I am trying to build a replacement box to test (as well as a backup in case the live one goes down), but when I boot the box up I get the Phase 1 come up fine. Then the main LAN Ipsec tunnel comes up. But for some reason it takes a very long time for that 2nd one to come up. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-family: Verdana, Arial, Helvetica, sans-serif; font-size: 12px; background-color: #eaeaea;"&gt;The original box was built by my predecessor and he left no documentation as to how he built this box. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I realize that this isn't necessarily a Palo problem, but it connects back to my PA firewall and all my other boxes of the same build are connecting without issue. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any suggestions would be greatly appreciated. Is there perhaps some way I can monitor the Phase 2 portions of the Ipsec so that I can see what is happening? Apart from the system logs is there anywhere I can look to try help me identify the issue?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 20 Jun 2014 15:20:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-ipsec-2-3-phase-2-coming-up-only/m-p/12521#M9170</guid>
      <dc:creator>JRussell</dc:creator>
      <dc:date>2014-06-20T15:20:17Z</dc:date>
    </item>
    <item>
      <title>Re: PA Ipsec 2/3 phase 2 coming up only</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-ipsec-2-3-phase-2-coming-up-only/m-p/12522#M9171</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello &lt;A href="https://live.paloaltonetworks.com/u1/15536"&gt;JRussell&lt;/A&gt;,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On the Palo Alto firewall, you monitor ikemgr.log while phase-2 is negotiating. For that you would need to setup the ike daemon to 'debug' level and tail follow the log.&lt;/P&gt;&lt;P&gt;&amp;gt; debug ike global on debug (make sure you give this command twice to make sure that the daemon logging is set at debug level rather than info level )&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;**************************************&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;gt; debug ike global on debug&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;sw.ikedaemon.debug.global: normal&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;gt; debug ike global on debug&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;sw.ikedaemon.debug.global:&lt;STRONG&gt; &lt;EM&gt;debug&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;**************************************&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Once that is done, you can execute the following command:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;gt; tail follow yes mp-log ikemgr.log&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;2014-06-19 14:34:16.194 -0500 ikemgr: panike_daemon phase 1 finished with status 1&lt;/P&gt;&lt;P&gt;2014-06-19 14:34:22.829 -0500 ikemgr: panike_daemon phase 2 started&lt;/P&gt;&lt;P&gt;2014-06-19 14:34:22.829 -0500 pan IKE cfg phase-2 triggered.&lt;/P&gt;&lt;P&gt;2014-06-19 14:34:22.829 -0500 pan IKE cfg phase-2 triggered when not necessary, skipped.&lt;/P&gt;&lt;P&gt;2014-06-19 14:34:22.829 -0500 ikemgr: panike_daemon phase 2 finished&lt;/P&gt;&lt;P&gt;2014-06-20 10:51:19 [INFO]: panike_debug_level_cb 4 =&amp;gt; 5&lt;/P&gt;&lt;P&gt;2014-06-20 10:51:20.603 -0500 debug: ifmon_request_put(daemon/panike_sysd_if.c:916): 16 write to pipe: debug_level&lt;/P&gt;&lt;P&gt;2014-06-20 10:51:20.603 -0500 debug: ifmon_request_get(daemon/panike_sysd_if.c:932): 16 read from pipe, msg type 1&lt;/P&gt;&lt;P&gt;.&lt;/P&gt;&lt;P&gt;,&lt;/P&gt;&lt;P&gt;.&lt;/P&gt;&lt;P&gt;.&lt;/P&gt;&lt;P&gt;and so forth....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To turn off the debugging:&lt;/P&gt;&lt;P&gt;&amp;gt; debug ike global on normal&lt;/P&gt;&lt;P&gt;sw.ikedaemon.debug.global: debug&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The following document helps troubleshooting VPN scenarios:&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/docs/DOC-3671"&gt;How to Troubleshoot VPN Connectivity Issues&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that gets your started!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks and regards,&lt;/P&gt;&lt;P&gt;Kunal Adak&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 20 Jun 2014 15:55:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-ipsec-2-3-phase-2-coming-up-only/m-p/12522#M9171</guid>
      <dc:creator>kadak</dc:creator>
      <dc:date>2014-06-20T15:55:46Z</dc:date>
    </item>
    <item>
      <title>Re: PA Ipsec 2/3 phase 2 coming up only</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-ipsec-2-3-phase-2-coming-up-only/m-p/12523#M9172</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Kunal,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I will give that a read. But just looking at that command. Won't that give me all phase 2 negotiations? I ask because that will give me an absolute tone of data returned as we have about 40 sites, all with 3 tunnels on them. &lt;/P&gt;&lt;P&gt;Is there any way to refine those Ike debug to only show the one site and it's tunnels?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 23 Jun 2014 09:02:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-ipsec-2-3-phase-2-coming-up-only/m-p/12523#M9172</guid>
      <dc:creator>JRussell</dc:creator>
      <dc:date>2014-06-23T09:02:47Z</dc:date>
    </item>
    <item>
      <title>Re: PA Ipsec 2/3 phase 2 coming up only</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-ipsec-2-3-phase-2-coming-up-only/m-p/12524#M9173</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ideally, you would be able to pipe the results of the tail command to grep, but there's nothing in the PAN-OS command line reference doc that indicates that's possible.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Am I missing something that would allow you to filter the output of a tail command?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 23 Jun 2014 14:35:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-ipsec-2-3-phase-2-coming-up-only/m-p/12524#M9173</guid>
      <dc:creator>Rick_Rutherford</dc:creator>
      <dc:date>2014-06-23T14:35:51Z</dc:date>
    </item>
    <item>
      <title>Re: PA Ipsec 2/3 phase 2 coming up only</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-ipsec-2-3-phase-2-coming-up-only/m-p/12525#M9174</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You should be able to start with the system log events in the Monitor tab.&amp;nbsp; Filter for the ipsec messages here and see what top level error messages you might be getting from the failed connection.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 23 Jun 2014 21:20:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-ipsec-2-3-phase-2-coming-up-only/m-p/12525#M9174</guid>
      <dc:creator>pulukas</dc:creator>
      <dc:date>2014-06-23T21:20:42Z</dc:date>
    </item>
    <item>
      <title>Re: PA Ipsec 2/3 phase 2 coming up only</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pa-ipsec-2-3-phase-2-coming-up-only/m-p/12526#M9175</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Somehow through doing all those troubleshooting guides and mucking around with the firewall settings on the other end I managed to get it up and running.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks all for your suggestions!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 24 Jun 2014 09:26:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pa-ipsec-2-3-phase-2-coming-up-only/m-p/12526#M9175</guid>
      <dc:creator>JRussell</dc:creator>
      <dc:date>2014-06-24T09:26:42Z</dc:date>
    </item>
  </channel>
</rss>

