PA to ASA Proxy-ID Mismatch

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
Announcements

PA to ASA Proxy-ID Mismatch

L1 Bithead

Hi all,

 

We have a standard IPSec tunnel one of our smaller sites with a strange issue related to the Proxy-IDs defined on the PA side of the tunnel. Our ASA side (10.7.0.0/16) is set to inherit all policy settings from the PA side, and our PA defines the "policies" with the Proxy-ID. Normal behavior with a policy based firewall (ASA) and a route based firewall (PA). 

 

The issue is that while two of the networks defined on the PA side Proxy IDs are match the tunnel details on the ASA, the third network does not. Traffic from the 10.0.0.0/8 and 192.168.0.0/16 supernets is allowed over the tunnel without issue; however, the 172.16.0.0/12 supernet shows up on the ASA's as a smaller, but valid, subnet within the 172.16.0.0/12 supernet and only to one specific host. This is preventing anything in our 172 networks from accessing the site due to a mismatch in the negotiated session.

A quick note. Our PA is using SW version 7.1.10. In this version, we have seen some "ghosting" where some changes are not properly removed from the config file; as in objects still existing after removal, routes existing after removal, etc, so this may be related. We are upgrading this OS during our next maintenance window to 7.1.16.

 

Screenshots are below. I have also used proxy-ID local 0.0.0.0/0 but the results remain unchanged. 

 

PA_Proxy-ID_Details.PNGAll of the networks match the PaloAlto Proxy-IDs except for the 172 network.All of the networks match the PaloAlto Proxy-IDs except for the 172 network.ASA_Ses_Details.PNG

 Thank you!

 

- Edit: a word

1 accepted solution

Accepted Solutions

L7 Applicator

Hi @cenduit_jgolden


Probably the only solution for you is upgrading to something higher than 7.1.10. The issue you are facing is fixed in 7.1.11.

 

PAN-77127
Fixed an issue where the firewall reduced the range of local and remote
IKEv2 traffic selectors in a way that disrupted traffic in a VPN tunnel
that a Cisco Adaptive Security Appliance (ASA) initiated.


So upgradin to 7.1.16 is a good idea, that will solve the issue.

(https://www.paloaltonetworks.com/documentation/71/pan-os/pan-os-release-notes/pan-os-7-1-11-addresse...).

 

Another workaround would be changing the tunnel to IKEv1.

 

(Ok, there is a very little chance that you have found another problem, but I am pretty sure that your issue is fixed after the upgrade becaue I had exactly the same issue a while ago)

 

Regards,

Remo

View solution in original post

3 REPLIES 3

L7 Applicator

Hi @cenduit_jgolden


Probably the only solution for you is upgrading to something higher than 7.1.10. The issue you are facing is fixed in 7.1.11.

 

PAN-77127
Fixed an issue where the firewall reduced the range of local and remote
IKEv2 traffic selectors in a way that disrupted traffic in a VPN tunnel
that a Cisco Adaptive Security Appliance (ASA) initiated.


So upgradin to 7.1.16 is a good idea, that will solve the issue.

(https://www.paloaltonetworks.com/documentation/71/pan-os/pan-os-release-notes/pan-os-7-1-11-addresse...).

 

Another workaround would be changing the tunnel to IKEv1.

 

(Ok, there is a very little chance that you have found another problem, but I am pretty sure that your issue is fixed after the upgrade becaue I had exactly the same issue a while ago)

 

Regards,

Remo

Thanks for the insight Remo. I'll monitor this and update the post once we have upgraded.

 

Cheers!

 

-josh

Hi Remo,

 

After updating our firewall cluster to 7.1.16, the issue with ProxyID mismatch has been resolved. Thanks for the help!

 

-josh

  • 1 accepted solution
  • 5804 Views
  • 3 replies
  • 0 Likes
Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!

The LIVEcommunity thanks you for your participation!