several IKE Crypto Profiles on the same interface for SITE-to-SITE VPN

Reply
Highlighted
L1 Bithead

several IKE Crypto Profiles on the same interface for SITE-to-SITE VPN

Hello dear colleagues,

 

according to the documentation, there is a limitation for IKE gateways:

All IKE gateways configured on the same interface or local IP address must use the same crypto
profile. (c) 

The same restriction is mentioned in the PANOS v8.1 course.

 

First of all, it seems strange that we cannot use different IKE options for different peers. Second, I use different IKE Crypto Profiles for different IKE gateways on the same public interface without any problem. I can see that they do use different algorithms for encrypting, hashing, DH group, etc. So it works.

 

  Is it some obsolete information they just forgot to remove? 

 

Regards,

Vladimir Stepanov

Highlighted
L7 Applicator

Can you point out where it is in documentation?

You can definitely use diferent crypto profiles on same interface in diferent IKE gateways.

Enterprise Architect @ Cloud Carib www.cloudcarib.com
ACE, PCNSE, PCNSI
Highlighted
Cyber Elite

@vladimir.stepanov,

As @Raido mentioned this is either poorly worded or simply not correct. You can only assign one profile per IKE gateway (obviously), but as long as you use a different IKE gateway you can have multiple profiles assigned regardless of them sharing the same physical interface. 

Highlighted
L1 Bithead

At first I have seen it in the paloalto online course for Pan-OS 8.1, module about Site-to-Site VPN, IKE Gateway configuration. After I started to search and found the same in the PAN-OS Admin Guide 8.0 - Page 691

 

ike crypto profiles.PNG

Cyber Elite

???

 

I have never seen or heard of this note and since 5.0 I use different profiles for the ike gateways ... also with 8.0

Highlighted
L5 Sessionator

Definitelly a mistake. This would make firewall practically useless for VPNs.

Highlighted
L1 Bithead

Ok, thanks everybody, I am going to report them about this mistake. Just strange that this is mentioned in several sources.

Highlighted
L2 Linker

Also on 9.1. Admin Guide site 907.

 

After Upgrading from working 9.0.8 with multiple IKE crypto profiles on same Interface / IP I got an auto commit error.status auto commit job public.JPG

 

ike crypto profile.JPG

Highlighted
L7 Applicator

Are your peers configured with dynamic IPs?

Enterprise Architect @ Cloud Carib www.cloudcarib.com
ACE, PCNSE, PCNSI
Highlighted
L2 Linker

Yes, my peers configured with dynamic IP's

Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the Live Community as a whole!

The Live Community thanks you for your participation!