Hi @GnContente , Tunnel monitoring works by pinging a destination address on the other side of the tunnel -> https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-admin/vpns/set-up-site-to-site-vpn/set-up-an-ipsec-tunnel.html, Step 9, #2. So, rekeying child SAs will not cause the tunnel monitor to bring the tunnel down. The VPN does not drop during the rekeying process. The PA does not store a log of the keys unless the debugging level is set to dump -> https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClinCAC. In general, logging IPsec keys is not a secure practice. The IPsec protocols use a very complicated process to generate secure keys in order not to be compromised -> https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-admin/vpns/site-to-site-vpn-concepts/internet-key-exchange-ike-for-vpn.html. New keys are renegotiated are regular intervals to provide more security. So, I would never log the keys unless I needed to decrypt the traffic as described in the article. Thanks, Tom
... View more