Cisco ASA PA ipsec issue

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
Announcements
Please sign in to see details of an important advisory in our Customer Advisories area.

Cisco ASA PA ipsec issue

L1 Bithead

Hi,

 

We have recently come across an interesting issue between a Cisco ASA ikev2 tunnel with a PA. 

If I was to failover the PA to an HA peer, traffic initiated from the Cisco ASA continues to flow whilst traffic initiating from the PA stops.

 

I noticed when the PA fails over the ASA drops both phases and recreates them with a new SPI value whilst the PA continues to use the same SPA value. PA manages to change its SPA value to match the new SPI value only for traffic that originates from the ASA  although traffic from the PA continues to use the same SPA value which causes the traffic to not be sent.

My fix currently is by resetting the problematic proxy ID's from PA.

I have a case open with PA although has anyone come across this before as I assume this would be a common problem faced.

 

Cisco ASA 9.8.4.xx, PA 10.1.4-h4

 

8 REPLIES 8

Cyber Elite
Cyber Elite

Hi @ITforacompany ,

 

Have you configured Liveness Check under Network > Network Profiles > IKE Gateways > [edit gateway] > Advanced Options?  I have that set to 5 seconds on an IPsec tunnel to an FTD device which is has much of the same code as an ASA.  https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClgcCAC

 

The ASA may need the "crypto ikev2 dpd interval retry-interval" command configured.  I can't remember if it is default.

 

Thanks,

 

Tom

Help the community: Like helpful comments and mark solutions.

Hi Tom,

 

Appreciate the reply although the liveness check on the PA's and the DPD on the ASA is already configured.

They are different values where the PA is 5seconds and the ASA is 10seconds retry every 2 although i would not think this would be the issue.

 

Thanks

L1 Bithead

Hi Tom,

 

Are you using route or policy based routing for your site to site tunnels between the PA and FTD?

Cyber Elite
Cyber Elite

Hi @ITforacompany ,

 

Mine is still proxy-based.

 

Thanks,

 

Tom

Help the community: Like helpful comments and mark solutions.

L1 Bithead

Did PA ever get back to you on the case you opened or did you ever get a fix? I feel I'm having the very same issue you describe.

They did and it was drawn out. They deem this issue is just between Cisco ASA's and PA's. All other parties are not affected although yet to be tested. 

Their reply to CASE 02120653

 

"The root of this problem is due to IKE phase 1 SA information NOT synchronized between the Palo Alto Networks HA firewalls (only IPSEC phase 2 SAs are synchronized between HA firewalls)."

 

Their initial answer was to disable the liveness check and DPD which after failing over the PA pairs did work although the issue arose again when the ASA rekeyed. The traffic dropped again for the proxy ID traffic that was originating behind the PA. This is due to the phase 1 details not being syncing between the HA pairs. The only fix at the moment is to manually run "test vpn ipsec-sa" from PA.  

I am pushing our account rep to add it as a hotfix.

Wow....thank you for the reply. Hopefully they will add it.

L0 Member

Hi, I got similar issue here. Any update from your side?

 

  • 4016 Views
  • 8 replies
  • 0 Likes
Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!

The LIVEcommunity thanks you for your participation!