<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: IPsec_ikev2 not starting up in CIsco IOS XE when router is respond in VPN</title>
    <link>https://community.cisco.com/t5/vpn/ipsec-ikev2-not-starting-up-in-cisco-ios-xe-when-router-is/m-p/5068399#M294661</link>
    <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1065752"&gt;@MHM Cisco World&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;I have allowed port 500 in the access list applied to the WAN interface but I did not see any logs when I ran a debug for IKEv2. Below is my config&lt;/P&gt;&lt;P&gt;interface GigabitEthernet5&lt;BR /&gt;description WAN interface&lt;BR /&gt;ip address 1.1.1.1 255.255.255.0&lt;BR /&gt;ip access-group fromoutside in&lt;BR /&gt;no ip redirects&lt;BR /&gt;no ip unreachables&lt;BR /&gt;no ip proxy-arp&lt;BR /&gt;ip nat outside&lt;BR /&gt;ip inspect in2out out&lt;BR /&gt;ip virtual-reassembly in&lt;BR /&gt;no ip route-cache&lt;BR /&gt;duplex auto&lt;BR /&gt;speed auto&lt;BR /&gt;crypt map RTPCLIENT&lt;BR /&gt;end&lt;/P&gt;&lt;P&gt;Extended IP access list fromoutside&lt;BR /&gt;------------------&lt;BR /&gt;truncated output&lt;BR /&gt;------------------&lt;BR /&gt;200 permit icmp any any (32688 matches)&lt;BR /&gt;210 permit esp any host 1.1.1.1 (81856 matches)&lt;BR /&gt;220 permit udp any host 1.1.1.1 eq isakmp (17799 matches)&lt;BR /&gt;230 permit gre any host 1.1.1.1 (1 match)&lt;BR /&gt;240 permit udp any host 1.1.1.1 eq non500-isakmp (4 matches)&lt;BR /&gt;&lt;BR /&gt;crypt map RTPCLIENT 10 ipsec-isakmp&lt;BR /&gt;description Azure - 10.54.4.64/28&lt;BR /&gt;set peer 2.2.2.2&lt;BR /&gt;set transform-set NEW-TS&lt;BR /&gt;set pfs group14&lt;BR /&gt;set ikev2-profile AzurePROF&lt;BR /&gt;match address AzureACL&lt;BR /&gt;&lt;BR /&gt;Extended IP access list AzureACL&lt;BR /&gt;10 permit ip 172.22.120.0 0.0.0.255 10.54.4.64 0.0.0.15&lt;/P&gt;&lt;P&gt;sh debug&lt;BR /&gt;IKEV2:&lt;BR /&gt;IKEv2 error debugging is on&lt;BR /&gt;IKEv2 default debugging is on&lt;BR /&gt;IKEv2 packet debugging is on&lt;BR /&gt;IKEv2 internal debugging is on&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;Palo Alto logs:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Rajesh11735_0-1713041491043.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/215669i2BA7B5C361EF6358/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Rajesh11735_0-1713041491043.png" alt="Rajesh11735_0-1713041491043.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Rajesh11735_1-1713041592279.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/215670iA8BFBE7DD87579AE/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Rajesh11735_1-1713041592279.png" alt="Rajesh11735_1-1713041592279.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sat, 13 Apr 2024 20:54:26 GMT</pubDate>
    <dc:creator>Rajesh11735</dc:creator>
    <dc:date>2024-04-13T20:54:26Z</dc:date>
    <item>
      <title>IPsec_ikev2 not starting up in CIsco IOS XE when router is responder</title>
      <link>https://community.cisco.com/t5/vpn/ipsec-ikev2-not-starting-up-in-cisco-ios-xe-when-router-is/m-p/5060837#M294529</link>
      <description>&lt;P&gt;Hello Guys,&lt;/P&gt;&lt;P&gt;We have a IKEv2 VPN between Palo Alto FW and Cisco 1121 IOS XE router and below is the Cisco side config. When I initiate traffic towards Cisco end's LAN gateway 172.22.120.1, the tunnel doesnt come up (Phase 1), while it works in the reverse, sending traffic to Palo.&amp;nbsp;&lt;/P&gt;&lt;P&gt;The Palo here, is not configured in passive mode and other clients with Watchguard, Sonicwall etc are able to connect without any issue.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is there any setting I can change in Cisco router to establish the connection as responder as well?&lt;/P&gt;&lt;P&gt;crypto ikev2 proposal AzureProp&lt;BR /&gt;encryption aes-cbc-256&lt;BR /&gt;integrity sha256&lt;BR /&gt;group 21&lt;BR /&gt;exit&lt;BR /&gt;crypto ikev2 policy eclipse_policy&lt;BR /&gt;proposal AzureProp&lt;BR /&gt;exit&lt;BR /&gt;crypto ikev2 profile AzurePROF&lt;BR /&gt;match identity remote address X.X.X.X X.X.X.X&lt;BR /&gt;authentication remote pre-share key Kqxem1fbR5aZTk0pmUAjsaQtN&lt;BR /&gt;authentication local pre-share key Kqxem1fbR5aZTk0pmUAjsaQtN&lt;BR /&gt;lifetime 28800&lt;BR /&gt;exit&lt;BR /&gt;crypto ipsec transform-set NEW-TS esp-aes 256 esp-sha256-hmac&lt;BR /&gt;mode tunnel&lt;BR /&gt;crypto map RTPCLIENT 10 ipsec-isakmp&lt;BR /&gt;set peer X.X.X.X&lt;BR /&gt;set security-association lifetime seconds 3600&lt;BR /&gt;set transform-set NEW-TS&lt;BR /&gt;set pfs group14&lt;BR /&gt;set ikev2-profile AzurePROF&lt;BR /&gt;match address AzureACL&lt;BR /&gt;exit&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 08 Apr 2024 16:45:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/vpn/ipsec-ikev2-not-starting-up-in-cisco-ios-xe-when-router-is/m-p/5060837#M294529</guid>
      <dc:creator>Rajesh11735</dc:creator>
      <dc:date>2024-04-08T16:45:54Z</dc:date>
    </item>
    <item>
      <title>Re: IPsec_ikev2 not starting up in CIsco IOS XE when router is respond</title>
      <link>https://community.cisco.com/t5/vpn/ipsec-ikev2-not-starting-up-in-cisco-ios-xe-when-router-is/m-p/5063136#M294564</link>
      <description>&lt;P&gt;&lt;SPAN&gt;disable config-exchange request&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;And check again&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Update me when you apply command&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;MHM&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 09 Apr 2024 14:12:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/vpn/ipsec-ikev2-not-starting-up-in-cisco-ios-xe-when-router-is/m-p/5063136#M294564</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-04-09T14:12:31Z</dc:date>
    </item>
    <item>
      <title>Re: IPsec_ikev2 not starting up in CIsco IOS XE when router is respond</title>
      <link>https://community.cisco.com/t5/vpn/ipsec-ikev2-not-starting-up-in-cisco-ios-xe-when-router-is/m-p/5065399#M294592</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1065752"&gt;@MHM Cisco World&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;Sorry for the late response. I tried it today and generated traffic from Palo End, but it didnt come up. No signs of Phase 1 coming up.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;crypto ikev2 profile AzurePROF&lt;BR /&gt;match identity remote address 1.1.1.1 255.255.255.255&lt;BR /&gt;authentication remote pre-share key XX&lt;BR /&gt;authentication local pre-share key XX&lt;BR /&gt;lifetime 28800&lt;BR /&gt;no config-exchange request&lt;/P&gt;&lt;P&gt;This is the error msg I am seeing in Palo.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Rajesh11735_0-1712778336026.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/215482iD854ECEA0E8EBF6B/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Rajesh11735_0-1712778336026.png" alt="Rajesh11735_0-1712778336026.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 10 Apr 2024 19:46:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/vpn/ipsec-ikev2-not-starting-up-in-cisco-ios-xe-when-router-is/m-p/5065399#M294592</guid>
      <dc:creator>Rajesh11735</dc:creator>
      <dc:date>2024-04-10T19:46:17Z</dc:date>
    </item>
    <item>
      <title>Re: IPsec_ikev2 not starting up in CIsco IOS XE when router is respond</title>
      <link>https://community.cisco.com/t5/vpn/ipsec-ikev2-not-starting-up-in-cisco-ios-xe-when-router-is/m-p/5065426#M294593</link>
      <description>&lt;P&gt;Show crypto session peer x.x.x.x&lt;/P&gt;
&lt;P&gt;Share this&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Wed, 10 Apr 2024 20:00:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/vpn/ipsec-ikev2-not-starting-up-in-cisco-ios-xe-when-router-is/m-p/5065426#M294593</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-04-10T20:00:02Z</dc:date>
    </item>
    <item>
      <title>Re: IPsec_ikev2 not starting up in CIsco IOS XE when router is respond</title>
      <link>https://community.cisco.com/t5/vpn/ipsec-ikev2-not-starting-up-in-cisco-ios-xe-when-router-is/m-p/5065456#M294594</link>
      <description>&lt;P&gt;Session status: DOWN&lt;BR /&gt;Peer: 1.1.1.1 port 500 fvrf: (none) ivrf: (none)&lt;BR /&gt;Desc: (none)&lt;BR /&gt;Phase1_id: (none)&lt;BR /&gt;IPSEC FLOW: permit ip 172.22.120.0/255.255.255.0 10.54.4.64/255.255.255.240&lt;BR /&gt;Active SAs: 0, origin: crypto map&lt;BR /&gt;Inbound: #pkts dec'ed 0 drop 0 life (KB/Sec) 0/0&lt;BR /&gt;Outbound: #pkts enc'ed 0 drop 0 life (KB/Sec) 0/0&lt;/P&gt;</description>
      <pubDate>Wed, 10 Apr 2024 20:09:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/vpn/ipsec-ikev2-not-starting-up-in-cisco-ios-xe-when-router-is/m-p/5065456#M294594</guid>
      <dc:creator>Rajesh11735</dc:creator>
      <dc:date>2024-04-10T20:09:29Z</dc:date>
    </item>
    <item>
      <title>Re: IPsec_ikev2 not starting up in CIsco IOS XE when router is respond</title>
      <link>https://community.cisco.com/t5/vpn/ipsec-ikev2-not-starting-up-in-cisco-ios-xe-when-router-is/m-p/5066763#M294626</link>
      <description>&lt;P&gt;Ip access-list extended ikev2&lt;/P&gt;
&lt;P&gt;Permit udp host &amp;lt;router IP&amp;gt; eq 500 host &amp;lt;peer ip&amp;gt;&lt;/P&gt;
&lt;P&gt;Permit udp host &amp;lt;router IP&amp;gt; host &amp;lt;peer ip&amp;gt; eq 500&lt;/P&gt;
&lt;P&gt;Debup ip packet ikev2 detail&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Check if IOS XE router recieve or not the phase1 ikev2.&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Thu, 11 Apr 2024 20:40:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/vpn/ipsec-ikev2-not-starting-up-in-cisco-ios-xe-when-router-is/m-p/5066763#M294626</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-04-11T20:40:24Z</dc:date>
    </item>
    <item>
      <title>Re: IPsec_ikev2 not starting up in CIsco IOS XE when router is respond</title>
      <link>https://community.cisco.com/t5/vpn/ipsec-ikev2-not-starting-up-in-cisco-ios-xe-when-router-is/m-p/5068399#M294661</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1065752"&gt;@MHM Cisco World&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;I have allowed port 500 in the access list applied to the WAN interface but I did not see any logs when I ran a debug for IKEv2. Below is my config&lt;/P&gt;&lt;P&gt;interface GigabitEthernet5&lt;BR /&gt;description WAN interface&lt;BR /&gt;ip address 1.1.1.1 255.255.255.0&lt;BR /&gt;ip access-group fromoutside in&lt;BR /&gt;no ip redirects&lt;BR /&gt;no ip unreachables&lt;BR /&gt;no ip proxy-arp&lt;BR /&gt;ip nat outside&lt;BR /&gt;ip inspect in2out out&lt;BR /&gt;ip virtual-reassembly in&lt;BR /&gt;no ip route-cache&lt;BR /&gt;duplex auto&lt;BR /&gt;speed auto&lt;BR /&gt;crypt map RTPCLIENT&lt;BR /&gt;end&lt;/P&gt;&lt;P&gt;Extended IP access list fromoutside&lt;BR /&gt;------------------&lt;BR /&gt;truncated output&lt;BR /&gt;------------------&lt;BR /&gt;200 permit icmp any any (32688 matches)&lt;BR /&gt;210 permit esp any host 1.1.1.1 (81856 matches)&lt;BR /&gt;220 permit udp any host 1.1.1.1 eq isakmp (17799 matches)&lt;BR /&gt;230 permit gre any host 1.1.1.1 (1 match)&lt;BR /&gt;240 permit udp any host 1.1.1.1 eq non500-isakmp (4 matches)&lt;BR /&gt;&lt;BR /&gt;crypt map RTPCLIENT 10 ipsec-isakmp&lt;BR /&gt;description Azure - 10.54.4.64/28&lt;BR /&gt;set peer 2.2.2.2&lt;BR /&gt;set transform-set NEW-TS&lt;BR /&gt;set pfs group14&lt;BR /&gt;set ikev2-profile AzurePROF&lt;BR /&gt;match address AzureACL&lt;BR /&gt;&lt;BR /&gt;Extended IP access list AzureACL&lt;BR /&gt;10 permit ip 172.22.120.0 0.0.0.255 10.54.4.64 0.0.0.15&lt;/P&gt;&lt;P&gt;sh debug&lt;BR /&gt;IKEV2:&lt;BR /&gt;IKEv2 error debugging is on&lt;BR /&gt;IKEv2 default debugging is on&lt;BR /&gt;IKEv2 packet debugging is on&lt;BR /&gt;IKEv2 internal debugging is on&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;Palo Alto logs:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Rajesh11735_0-1713041491043.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/215669i2BA7B5C361EF6358/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Rajesh11735_0-1713041491043.png" alt="Rajesh11735_0-1713041491043.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Rajesh11735_1-1713041592279.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/215670iA8BFBE7DD87579AE/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Rajesh11735_1-1713041592279.png" alt="Rajesh11735_1-1713041592279.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 13 Apr 2024 20:54:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/vpn/ipsec-ikev2-not-starting-up-in-cisco-ios-xe-when-router-is/m-p/5068399#M294661</guid>
      <dc:creator>Rajesh11735</dc:creator>
      <dc:date>2024-04-13T20:54:26Z</dc:date>
    </item>
    <item>
      <title>Re: IPsec_ikev2 not starting up in CIsco IOS XE when router is respond</title>
      <link>https://community.cisco.com/t5/vpn/ipsec-ikev2-not-starting-up-in-cisco-ios-xe-when-router-is/m-p/5069182#M294681</link>
      <description>&lt;P&gt;I know it,&amp;nbsp; that there is some kind of statefull acl drop incoming.&lt;/P&gt;
&lt;P&gt;So can you please do debug I mention before&lt;/P&gt;
&lt;P&gt;Debug ikev2 dont show anything if the traffic is drop in ingress interface' i.e. it drop before it reach cpu for analysis.&lt;/P&gt;
&lt;P&gt;There is two command&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Access group IN and inspection can drop ikev2 packet&amp;nbsp;&lt;/P&gt;
&lt;P&gt;But let make sure bu debug I share&amp;nbsp;&lt;/P&gt;
&lt;P&gt;And also add&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Deny ip any any log&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To end of acl and check the log message of deny packet' is it include any packet of ikev2 or not&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Mon, 15 Apr 2024 08:41:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/vpn/ipsec-ikev2-not-starting-up-in-cisco-ios-xe-when-router-is/m-p/5069182#M294681</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-04-15T08:41:11Z</dc:date>
    </item>
    <item>
      <title>Re: IPsec_ikev2 not starting up in CIsco IOS XE when router is respond</title>
      <link>https://community.cisco.com/t5/vpn/ipsec-ikev2-not-starting-up-in-cisco-ios-xe-when-router-is/m-p/5080039#M294989</link>
      <description>&lt;P&gt;any update&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Fri, 26 Apr 2024 19:15:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/vpn/ipsec-ikev2-not-starting-up-in-cisco-ios-xe-when-router-is/m-p/5080039#M294989</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-04-26T19:15:43Z</dc:date>
    </item>
  </channel>
</rss>

