<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: IPSEC vpn between cisco 2900 and PAN in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-between-cisco-2900-and-pan/m-p/433476#M95872</link>
    <description>&lt;P&gt;Thank you&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/8533"&gt;@epeeler&lt;/a&gt;&amp;nbsp;for posting question.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is the default value in Cisco IOS: crypto ipsec security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In order to change it, please go to configuration mode, then issue:&amp;nbsp;crypto ipsec security-association lifetime kilobytes&amp;nbsp;&amp;lt;2560-4294967295&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Kind Regards&lt;/P&gt;&lt;P&gt;Pavel&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 13 Sep 2021 13:29:36 GMT</pubDate>
    <dc:creator>PavelK</dc:creator>
    <dc:date>2021-09-13T13:29:36Z</dc:date>
    <item>
      <title>IPSEC vpn between cisco 2900 and PAN</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-between-cisco-2900-and-pan/m-p/433459#M95870</link>
      <description>&lt;P&gt;Hi everyone,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm trying to setup a route based IPSEC tunnel between my PAN 3020 and Cisco 2900 router.&amp;nbsp; I'm getting a parameter mismatch on on the ipsec lifesize parameter and don't know how to fix it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The Cisco peer appears to be wanting a lifesize setting of 4608000KB but the PAN won't let you set it that high. I've tried setting it with the equivalent MB setting on the PAN but I'm still getting the mismatch.&amp;nbsp; Does anyone know how to change this setting on the Cisco side?&amp;nbsp; I can't seem to find the right command.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is what I see on the PAN. I am not the admin for the Cisco router.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any ideas?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2021-09-10 16:36:10.645 -0500 [PNTF]: { 2: }: ====&amp;gt; PHASE-2 NEGOTIATION STARTED AS RESPONDER, (QUICK MODE) &amp;lt;====&lt;BR /&gt;====&amp;gt; Initiated SA: &amp;lt;redacted&amp;gt;[500]-&amp;lt;redacted&amp;gt;[500] message id:0x4B3D3BCC &amp;lt;====&lt;BR /&gt;2021-09-10 16:36:10.646 -0500 [PNTF]: { 2: 11}: simultaneous phase-2 rekey request detected, peer is not PANOS. delay processing this new request(isakmp message-id 0x4B3D3BCC).&lt;BR /&gt;2021-09-10 16:36:10.646 -0500 [PERR]: { : 11}: lifesize 4608000 KB&lt;BR /&gt;2021-09-10 16:36:10.646 -0500 [PERR]: { : 11}: not matched&lt;BR /&gt;2021-09-10 16:36:10.646 -0500 [PERR]: { : 11}: no suitable policy found.&lt;BR /&gt;2021-09-10 16:36:10.646 -0500 [ERR ]: { : 11}: failed to pre-process packet.&lt;BR /&gt;2021-09-10 16:36:10.703 -0500 [INFO]: { 2: }: IKE ISAKMP KEY_DELETE recvd: cookie:490a0356f9c07229:aaa5e1482371a0a4.&lt;BR /&gt;98%&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 13 Sep 2021 12:30:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-between-cisco-2900-and-pan/m-p/433459#M95870</guid>
      <dc:creator>epeeler</dc:creator>
      <dc:date>2021-09-13T12:30:42Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC vpn between cisco 2900 and PAN</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-between-cisco-2900-and-pan/m-p/433476#M95872</link>
      <description>&lt;P&gt;Thank you&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/8533"&gt;@epeeler&lt;/a&gt;&amp;nbsp;for posting question.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is the default value in Cisco IOS: crypto ipsec security-association lifetime kilobytes 4608000&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In order to change it, please go to configuration mode, then issue:&amp;nbsp;crypto ipsec security-association lifetime kilobytes&amp;nbsp;&amp;lt;2560-4294967295&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Kind Regards&lt;/P&gt;&lt;P&gt;Pavel&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 13 Sep 2021 13:29:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-between-cisco-2900-and-pan/m-p/433476#M95872</guid>
      <dc:creator>PavelK</dc:creator>
      <dc:date>2021-09-13T13:29:36Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC vpn between cisco 2900 and PAN</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-between-cisco-2900-and-pan/m-p/433500#M95874</link>
      <description>&lt;P&gt;Hey &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/8533"&gt;@epeeler&lt;/a&gt; ,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;That is intersting. Up to this point I was living with the impression that lifesize mistmatch should not effect phase negotiation, similar to lifetime.&lt;/P&gt;&lt;P&gt;If lifetime is configured differently on both end of the tunnel, tunnel will be negotiated successfully, but you will experiance some issues with the traffic.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;While I agree with &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/192693"&gt;@PavelK&lt;/a&gt; and you should definately fix the mistmatch, I am little sceptic as this is the actual reason for failing tunnel negotiation. In addition using MB on Palo, should be exactly the same, as the IPsec standard is actually using KB, so in the background Palo should convert the MB and sent the equivalent KB.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Are you sure all other settings matching phase2 settings? You will notice that Palo support CBC and GCM modes for the encryption algorithms, while I am not sure if Cisco is supporting GCM you may want to check if Palo is using CBC.&lt;/P&gt;</description>
      <pubDate>Mon, 13 Sep 2021 14:25:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-between-cisco-2900-and-pan/m-p/433500#M95874</guid>
      <dc:creator>aleksandar.astardzhiev</dc:creator>
      <dc:date>2021-09-13T14:25:29Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC vpn between cisco 2900 and PAN</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-between-cisco-2900-and-pan/m-p/433551#M95881</link>
      <description>&lt;P&gt;First of all, thank you both for taking the time to respond.&amp;nbsp; The issue did indeed end up being a&amp;nbsp; parameter other than lifesize being mismatched.&amp;nbsp; I had not turned on ike debugging on the PAN and so the messages I was seeing in the log while correct, didn't necessarily correspond to each other.&amp;nbsp; Once I enabled detailed debugging I could see what the actual mismatch was which ended up being the hash setting for the phase 2 connection.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Moral of the story here...even though you're seeing log entries for phase 1 and phase 2 negotiation, if you don't turn on debug for ike, you're not getting the full story.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Again, thank you both very much.&lt;/P&gt;</description>
      <pubDate>Mon, 13 Sep 2021 15:41:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-between-cisco-2900-and-pan/m-p/433551#M95881</guid>
      <dc:creator>epeeler</dc:creator>
      <dc:date>2021-09-13T15:41:47Z</dc:date>
    </item>
  </channel>
</rss>

