- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
08-01-2014 10:17 AM
As per my understanding, It's only relevant if you have multiple IKE policies. The lowest numbered one is checked first. If it matches the IKE properties (policies) on the other end, it's used. Otherwise, it moves down the priority list to see if the other policies match.
Related Cisco Disciussion: https://supportforums.cisco.com/discussion/11254861/question-related-ike-policy-priority
Thanks
08-01-2014 10:22 AM
Yeah there are 3 or 4 ike policies with different priorities
08-01-2014 12:32 PM
For the tunnel to form, both devices must agree on at least one ike policy. You can specify multiple ike policies, or crypto settings, and as long as both devices have at least one match, they will use that match to form the tunnel. The priorities on the Cisco side allow you to specify which policies you want the Cisco device to try using first - if the other side's policy matches then great - otherwise move down to the next policy based on priority. It is simply a way to show preference for a specific policy.
For example, it allows you to always use 3des if the other side supports it, and if not, then negotiate AES128, etc...
With PA, in the IKE Crypto profile, you can specify multiple options for DH group, authentication, and encryption. By doing so, you are telling the PA to utilize any combination of the settings specified to form the tunnel. As long as the peer device has a policy that matches one of those combinations, the devices will use that match and the tunnel will form.
08-01-2014 12:45 PM
Mostly its the cisco side that I am having problem figuring out, it looks as thought everything matches and the tunnel comes up for an extended period of time and then drops until the cisco initiates a new tunnel
08-01-2014 03:47 PM
It sounds like you are hitting phase 2 lifetime and tunnel drops due to lack of traffic across the tunnel. PANOS defaults to 1 hour for ipsec-sa 2 lifetime. Have you checked with Cisco to see what is their ipsec SA lifetime?
Based on your last comment, seems that tunnel is functioning as expected. You may want to also check with Cisco to see if they have a way to keep their tunnels always up.
08-01-2014 04:01 PM
infotech wrote:
There seem to be more than one policy on the ike policies on the cisco how do I know which one matches the PA?
In the Cisco configuration the phase 1 will use each of the policies in order as they appear in the configuration. As long as you have a matching policy on your side to one of them the phase 1 should complete.
For phase two the Cicso configuration usually specifies a proposal set that you must also match.
Are you connecting to an ASA or a Cisco Integrated services router?
08-04-2014 06:06 AM
I am connecting to an asa 5505 firewall. It is up for 8 hours and then it just drops and comes up again on its own. If I do try to bring it up manually it has to be done from the cisco side by pinging an address on the PA side.
08-04-2014 06:07 AM
Yes I have checked the lifetime on both sides. Whether they match of not the same thing happens
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!