<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: S2S VPN between PA-3020 and Cisco ASA 5525 in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/s2s-vpn-between-pa-3020-and-cisco-asa-5525/m-p/434645#M96005</link>
    <description>&lt;P&gt;Hi Tom,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have got the 3rd party to run the command and they confirmed it is set as an ip address.&lt;/P&gt;&lt;P&gt;output was:&lt;/P&gt;&lt;P&gt;crypto isakmp identity key-id 213.61.xxx.xxx.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I also managed to confirmed that that ip was was HEX format in the packet capture. I tried setting the peer id as KEYID and setting the value of the peer ip in HEX format. The PA did not like this in IKEv1 mode. I have asked to change this to IKEv2 with the below P1/P2 settings.&amp;nbsp;&lt;/P&gt;&lt;P&gt;lifetime = 28800&lt;BR /&gt;lifebyte = 0&lt;BR /&gt;enctype = AES&lt;BR /&gt;encklen = 256&lt;BR /&gt;hashtype = SHA512&lt;BR /&gt;authmethod = PSK&lt;BR /&gt;dh_group = DH20&lt;/P&gt;&lt;P&gt;NAT-T enabled&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Just waiting to confirm if this is working.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hemal.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 17 Sep 2021 07:26:13 GMT</pubDate>
    <dc:creator>Hemal_Vaghela</dc:creator>
    <dc:date>2021-09-17T07:26:13Z</dc:date>
    <item>
      <title>S2S VPN between PA-3020 and Cisco ASA 5525</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/s2s-vpn-between-pa-3020-and-cisco-asa-5525/m-p/434457#M95977</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1st Post so hopefully i'm doing this correctly.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am trying to setup a VPN tunnel to a 3rd Party. We have a PA-3020 and they have a Cisco ASA. They do have another Cisco in-between both our devices which is performing NAT. Hence we have enabled NAT-T.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The main issue I am having is that the tunnel is not coming up. The error message I get in the logs and debugs is:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Expecting IP address type in main mode, but KEY_ID.&lt;/P&gt;&lt;P&gt;###.###.###.###[4500] - ###.##.###.###[4500]:(nil) invalid ID payload.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have the tunnel setup as follows:&lt;/P&gt;&lt;P&gt;main mode and using ip addresses.&lt;/P&gt;&lt;P&gt;ikev1&lt;/P&gt;&lt;P&gt;(lifetime = 28800:28800)&lt;BR /&gt;(lifebyte = 0:0)&lt;BR /&gt;&amp;nbsp;enctype = AES:AES&lt;BR /&gt;(encklen = 256:256)&lt;BR /&gt;hashtype = SHA1:SHA1&lt;BR /&gt;authmethod = PSK:PSK&lt;BR /&gt;dh_group = DH5:DH5&lt;/P&gt;&lt;P&gt;NAT-T enabled&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am also performing source and destination nats as the ip ranges conflicts on both sides. We have set the Proxy IDs on both ends as the nat ranges.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;On the PA-3020 the local and peer ID have been set as the public ips of the peers. I have also tried their private ip (as they are natting) just as a test, and I am getting the same error. Also tried removing the IDs and same thing.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have read an article about&amp;nbsp;How to determine the correct value to put in the PAN IKE peer KEYID field? But cannot seem to find the KEYID field (in hex or ascii) in the packet capture.&lt;/P&gt;&lt;P&gt;Link:&amp;nbsp;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClMQCA0" target="_blank"&gt;How to determine the correct value to put in the PAN IKE peer K... - Knowledge Base - Palo Alto Networks&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any help on why I am getting the error would help as I am not sure what else to try.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance&lt;/P&gt;</description>
      <pubDate>Thu, 16 Sep 2021 09:31:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/s2s-vpn-between-pa-3020-and-cisco-asa-5525/m-p/434457#M95977</guid>
      <dc:creator>Hemal_Vaghela</dc:creator>
      <dc:date>2021-09-16T09:31:03Z</dc:date>
    </item>
    <item>
      <title>Re: S2S VPN between PA-3020 and Cisco ASA 5525</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/s2s-vpn-between-pa-3020-and-cisco-asa-5525/m-p/434517#M95988</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/193861"&gt;@Hemal_Vaghela&lt;/a&gt; ,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Could you have them run this command on their ASA, "show run all | i crypto isakmp identity"?&amp;nbsp; You want to make sure you match that configuration on your firewall.&amp;nbsp; Sometimes I have found that "auto" doesn't work so well, but they probably can't change it since the config is global and applies to all their VPNs.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Tom&lt;/P&gt;</description>
      <pubDate>Thu, 16 Sep 2021 16:50:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/s2s-vpn-between-pa-3020-and-cisco-asa-5525/m-p/434517#M95988</guid>
      <dc:creator>TomYoung</dc:creator>
      <dc:date>2021-09-16T16:50:57Z</dc:date>
    </item>
    <item>
      <title>Re: S2S VPN between PA-3020 and Cisco ASA 5525</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/s2s-vpn-between-pa-3020-and-cisco-asa-5525/m-p/434645#M96005</link>
      <description>&lt;P&gt;Hi Tom,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have got the 3rd party to run the command and they confirmed it is set as an ip address.&lt;/P&gt;&lt;P&gt;output was:&lt;/P&gt;&lt;P&gt;crypto isakmp identity key-id 213.61.xxx.xxx.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I also managed to confirmed that that ip was was HEX format in the packet capture. I tried setting the peer id as KEYID and setting the value of the peer ip in HEX format. The PA did not like this in IKEv1 mode. I have asked to change this to IKEv2 with the below P1/P2 settings.&amp;nbsp;&lt;/P&gt;&lt;P&gt;lifetime = 28800&lt;BR /&gt;lifebyte = 0&lt;BR /&gt;enctype = AES&lt;BR /&gt;encklen = 256&lt;BR /&gt;hashtype = SHA512&lt;BR /&gt;authmethod = PSK&lt;BR /&gt;dh_group = DH20&lt;/P&gt;&lt;P&gt;NAT-T enabled&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Just waiting to confirm if this is working.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hemal.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 17 Sep 2021 07:26:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/s2s-vpn-between-pa-3020-and-cisco-asa-5525/m-p/434645#M96005</guid>
      <dc:creator>Hemal_Vaghela</dc:creator>
      <dc:date>2021-09-17T07:26:13Z</dc:date>
    </item>
    <item>
      <title>Re: S2S VPN between PA-3020 and Cisco ASA 5525</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/s2s-vpn-between-pa-3020-and-cisco-asa-5525/m-p/434690#M96007</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Setting the KEYID in HEX&amp;nbsp; for the peer id seems to bring the tunnel up.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Testing traffic as I am doing both source and destination nat, and I am hitting the nat and security policy but need 3rd Party to confirm if they see any traffic. On the PA side I am seeing timeouts at the moment.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I did have to set my nat policy as from zone trust to destination zone trust for the nat work work.&lt;/P&gt;&lt;P&gt;I did have the destination nat set to the 3rd party zone but this did not nat correctly.&lt;/P&gt;</description>
      <pubDate>Fri, 17 Sep 2021 09:13:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/s2s-vpn-between-pa-3020-and-cisco-asa-5525/m-p/434690#M96007</guid>
      <dc:creator>Hemal_Vaghela</dc:creator>
      <dc:date>2021-09-17T09:13:35Z</dc:date>
    </item>
  </channel>
</rss>

