<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic GRE over IPSEC-Sending TS unacceptable notify-Cisco ASR1001-Palo Alto in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/gre-over-ipsec-sending-ts-unacceptable-notify-cisco-asr1001-palo/m-p/4978315#M1106948</link>
    <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;Platform&lt;/P&gt;&lt;P&gt;My end : Cisco ASR1001&lt;/P&gt;&lt;P&gt;Far end : Palo Alto&lt;/P&gt;&lt;P&gt;I am trying to establish&amp;nbsp; GRE over IPSEC tunnel with a customer using Palo Alto which fails when Palo Alto tries to initiate (role initiator) and Asr1001 is the responder. When the roles are switched (that is every time the tunnel goes down , the tunnel negotiation is initiated by tunnel reset at ASR1001) then tunnel comes up. Appreciate any help, Thank you&lt;/P&gt;&lt;P&gt;Debug logs shows:&lt;/P&gt;&lt;P&gt;Cisco end:&lt;/P&gt;&lt;P&gt;Nov 29 17:44:27.250: IKEv2:(SESSION ID = 64303,SA ID = 2):IPSec policy validate request sent for profile Paradise with psh index 2.&lt;/P&gt;&lt;P&gt;Nov 29 17:44:27.250: IKEv2:(SESSION ID = 64303,SA ID = 2):&lt;/P&gt;&lt;P&gt;Nov 29 17:44:27.254: IKEv2:(SESSION ID = 64303,SA ID = 2):(SA ID = 2):[IPsec -&amp;gt; IKEv2] Callback received for the validate proposal - FAILED.&lt;/P&gt;&lt;P&gt;Nov 29 17:44:27.255: IKEv2-ERROR:(SESSION ID = 64303,SA ID = 2):: There was no IPSEC policy found for received TSNov 29 17:44:27.255: IKEv2:(SESSION ID = 64303,SA ID = 2):Sending TS unacceptable notify&lt;/P&gt;&lt;P&gt;Palo Alto end:&lt;/P&gt;&lt;P&gt;023-12-06 15:16:58.127 -0400 [DEBG]: processing isakmp packet&lt;BR /&gt;2023-12-06 15:16:58.127 -0400 [DEBG]: ===&lt;BR /&gt;2023-12-06 15:16:58.127 -0400 [DEBG]: 137 bytes message received from 216.16X.XXX.5X&lt;BR /&gt;2023-12-06 15:16:58.127 -0400 [DEBG]: { 5: }: [IKE Initiator] response message_id 1 expected 1&lt;BR /&gt;2023-12-06 15:16:58.128 -0400 [PWRN]: { 5: }: 69.17.1xx.x0[500] - 216.16X.XXX.5X[500]:0x5607e608e760 vendor id payload ignored&lt;BR /&gt;2023-12-06 15:16:58.128 -0400 [PWRN]: { 5: }: 69.17.194.x0[500] - 216.16X.XXX.5X[500]:0x5607e608e760 received notify type NO_PROPOSAL_CHOSEN&lt;BR /&gt;2023-12-06 15:16:58.128 -0400 [INFO]: { 5: }: 69.1X.XXX.XX[500] - 216.16X.XXX.5X[500]:0x7fcbf4037610 authentication result: success&lt;BR /&gt;2023-12-06 15:16:58.128 -0400 [DEBG]: { 5: }: update response message_id 0x1&lt;BR /&gt;2023-12-06 15:16:58.128 -0400 [DEBG]: { 5: }: ikev2_process_child_notify(0x7fcbf4025018, 0x7fcc112a18b0), notify type NO_PROPOSAL_CHOSEN&lt;BR /&gt;2023-12-06 15:16:58.128 -0400 [PWRN]: { 5: }: 14 is not a child notify type&lt;BR /&gt;2023-12-06 15:16:58.128 -0400 [PERR]: { 5: }: 69.1X.XXX.XX[500] - 216.16X.XXX.5X[500]:0x7fcbf4037610 received Notify type NO_PROPOSAL_CHOSEN, failed establishing child_sa&lt;BR /&gt;2023-12-06 15:16:58.128 -0400 [PNTF]: { 5: }: ====&amp;gt; IKEv2 CHILD SA NEGOTIATION FAILED AS INITIATOR, non-rekey; gateway ike-vpn-fw02-ibasis-sig &amp;lt;====&lt;BR /&gt;====&amp;gt; Failed SA: 69.1X.XXX.XX[500]-216.16X.XXX.5X[500] message id:0x00000001 parent SN:2494 &amp;lt;==== Error code 19&lt;BR /&gt;2023-12-06 15:16:58.128 -0400 [DEBG]: { 5: }: SA established: state INI_IKE_AUTH_RCVD, caller initiator_ike_sa_auth_cont, attach 1&lt;BR /&gt;2023-12-06 15:16:58.128 -0400 [PNTF]: { 5: }: ====&amp;gt; IKEv2 IKE SA NEGOTIATION SUCCEEDED AS INITIATOR, non-rekey; gateway ike-vpn-fw02-ibasis-sig &amp;lt;====&lt;BR /&gt;====&amp;gt; Established SA: 69.1X.XXX.XX[500]-216.16X.XXX.5X[500] SPI:8dc026cee9b9e51d:5f7739109410fcd4 SN:2494 lifetime 86400 Sec &amp;lt;====&lt;/P&gt;&lt;P&gt;Attached config for Cisco ASR and palto Alto&lt;/P&gt;</description>
    <pubDate>Thu, 14 Dec 2023 21:49:57 GMT</pubDate>
    <dc:creator>mkrishnan</dc:creator>
    <dc:date>2023-12-14T21:49:57Z</dc:date>
    <item>
      <title>GRE over IPSEC-Sending TS unacceptable notify-Cisco ASR1001-Palo Alto</title>
      <link>https://community.cisco.com/t5/network-security/gre-over-ipsec-sending-ts-unacceptable-notify-cisco-asr1001-palo/m-p/4978315#M1106948</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;Platform&lt;/P&gt;&lt;P&gt;My end : Cisco ASR1001&lt;/P&gt;&lt;P&gt;Far end : Palo Alto&lt;/P&gt;&lt;P&gt;I am trying to establish&amp;nbsp; GRE over IPSEC tunnel with a customer using Palo Alto which fails when Palo Alto tries to initiate (role initiator) and Asr1001 is the responder. When the roles are switched (that is every time the tunnel goes down , the tunnel negotiation is initiated by tunnel reset at ASR1001) then tunnel comes up. Appreciate any help, Thank you&lt;/P&gt;&lt;P&gt;Debug logs shows:&lt;/P&gt;&lt;P&gt;Cisco end:&lt;/P&gt;&lt;P&gt;Nov 29 17:44:27.250: IKEv2:(SESSION ID = 64303,SA ID = 2):IPSec policy validate request sent for profile Paradise with psh index 2.&lt;/P&gt;&lt;P&gt;Nov 29 17:44:27.250: IKEv2:(SESSION ID = 64303,SA ID = 2):&lt;/P&gt;&lt;P&gt;Nov 29 17:44:27.254: IKEv2:(SESSION ID = 64303,SA ID = 2):(SA ID = 2):[IPsec -&amp;gt; IKEv2] Callback received for the validate proposal - FAILED.&lt;/P&gt;&lt;P&gt;Nov 29 17:44:27.255: IKEv2-ERROR:(SESSION ID = 64303,SA ID = 2):: There was no IPSEC policy found for received TSNov 29 17:44:27.255: IKEv2:(SESSION ID = 64303,SA ID = 2):Sending TS unacceptable notify&lt;/P&gt;&lt;P&gt;Palo Alto end:&lt;/P&gt;&lt;P&gt;023-12-06 15:16:58.127 -0400 [DEBG]: processing isakmp packet&lt;BR /&gt;2023-12-06 15:16:58.127 -0400 [DEBG]: ===&lt;BR /&gt;2023-12-06 15:16:58.127 -0400 [DEBG]: 137 bytes message received from 216.16X.XXX.5X&lt;BR /&gt;2023-12-06 15:16:58.127 -0400 [DEBG]: { 5: }: [IKE Initiator] response message_id 1 expected 1&lt;BR /&gt;2023-12-06 15:16:58.128 -0400 [PWRN]: { 5: }: 69.17.1xx.x0[500] - 216.16X.XXX.5X[500]:0x5607e608e760 vendor id payload ignored&lt;BR /&gt;2023-12-06 15:16:58.128 -0400 [PWRN]: { 5: }: 69.17.194.x0[500] - 216.16X.XXX.5X[500]:0x5607e608e760 received notify type NO_PROPOSAL_CHOSEN&lt;BR /&gt;2023-12-06 15:16:58.128 -0400 [INFO]: { 5: }: 69.1X.XXX.XX[500] - 216.16X.XXX.5X[500]:0x7fcbf4037610 authentication result: success&lt;BR /&gt;2023-12-06 15:16:58.128 -0400 [DEBG]: { 5: }: update response message_id 0x1&lt;BR /&gt;2023-12-06 15:16:58.128 -0400 [DEBG]: { 5: }: ikev2_process_child_notify(0x7fcbf4025018, 0x7fcc112a18b0), notify type NO_PROPOSAL_CHOSEN&lt;BR /&gt;2023-12-06 15:16:58.128 -0400 [PWRN]: { 5: }: 14 is not a child notify type&lt;BR /&gt;2023-12-06 15:16:58.128 -0400 [PERR]: { 5: }: 69.1X.XXX.XX[500] - 216.16X.XXX.5X[500]:0x7fcbf4037610 received Notify type NO_PROPOSAL_CHOSEN, failed establishing child_sa&lt;BR /&gt;2023-12-06 15:16:58.128 -0400 [PNTF]: { 5: }: ====&amp;gt; IKEv2 CHILD SA NEGOTIATION FAILED AS INITIATOR, non-rekey; gateway ike-vpn-fw02-ibasis-sig &amp;lt;====&lt;BR /&gt;====&amp;gt; Failed SA: 69.1X.XXX.XX[500]-216.16X.XXX.5X[500] message id:0x00000001 parent SN:2494 &amp;lt;==== Error code 19&lt;BR /&gt;2023-12-06 15:16:58.128 -0400 [DEBG]: { 5: }: SA established: state INI_IKE_AUTH_RCVD, caller initiator_ike_sa_auth_cont, attach 1&lt;BR /&gt;2023-12-06 15:16:58.128 -0400 [PNTF]: { 5: }: ====&amp;gt; IKEv2 IKE SA NEGOTIATION SUCCEEDED AS INITIATOR, non-rekey; gateway ike-vpn-fw02-ibasis-sig &amp;lt;====&lt;BR /&gt;====&amp;gt; Established SA: 69.1X.XXX.XX[500]-216.16X.XXX.5X[500] SPI:8dc026cee9b9e51d:5f7739109410fcd4 SN:2494 lifetime 86400 Sec &amp;lt;====&lt;/P&gt;&lt;P&gt;Attached config for Cisco ASR and palto Alto&lt;/P&gt;</description>
      <pubDate>Thu, 14 Dec 2023 21:49:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/gre-over-ipsec-sending-ts-unacceptable-notify-cisco-asr1001-palo/m-p/4978315#M1106948</guid>
      <dc:creator>mkrishnan</dc:creator>
      <dc:date>2023-12-14T21:49:57Z</dc:date>
    </item>
    <item>
      <title>Re: GRE over IPSEC-Sending TS unacceptable notify-Cisco ASR1001-Palo A</title>
      <link>https://community.cisco.com/t5/network-security/gre-over-ipsec-sending-ts-unacceptable-notify-cisco-asr1001-palo/m-p/4978486#M1106950</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1543207"&gt;@mkrishnan&lt;/a&gt; PFS is enabled on the ASR (group 19), but is PFS group 19 also enabled on the Palo Alto side?&lt;/P&gt;</description>
      <pubDate>Fri, 15 Dec 2023 08:08:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/gre-over-ipsec-sending-ts-unacceptable-notify-cisco-asr1001-palo/m-p/4978486#M1106950</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2023-12-15T08:08:41Z</dc:date>
    </item>
    <item>
      <title>Re: GRE over IPSEC-Sending TS unacceptable notify-Cisco ASR1001-Palo A</title>
      <link>https://community.cisco.com/t5/network-security/gre-over-ipsec-sending-ts-unacceptable-notify-cisco-asr1001-palo/m-p/4978489#M1106951</link>
      <description>&lt;P&gt;Can I see config of ASR1k?&lt;/P&gt;
&lt;P&gt;Also there is mode ipv4 why you need to use gre over ipsec?&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Fri, 15 Dec 2023 08:15:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/gre-over-ipsec-sending-ts-unacceptable-notify-cisco-asr1001-palo/m-p/4978489#M1106951</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-12-15T08:15:15Z</dc:date>
    </item>
    <item>
      <title>Re: GRE over IPSEC-Sending TS unacceptable notify-Cisco ASR1001-Palo A</title>
      <link>https://community.cisco.com/t5/network-security/gre-over-ipsec-sending-ts-unacceptable-notify-cisco-asr1001-palo/m-p/4978497#M1106952</link>
      <description>&lt;P&gt;It is difficult to determine what the issue is with the limited information here.&amp;nbsp; But from the error message it looks like the ASR is complaining about the encryption domain / traffic selector (TS) when the Palo Alto initiates the connection.&amp;nbsp; Did you previously have this set up as a crypto map policy?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 15 Dec 2023 08:25:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/gre-over-ipsec-sending-ts-unacceptable-notify-cisco-asr1001-palo/m-p/4978497#M1106952</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2023-12-15T08:25:51Z</dc:date>
    </item>
    <item>
      <title>Re: GRE over IPSEC-Sending TS unacceptable notify-Cisco ASR1001-Palo A</title>
      <link>https://community.cisco.com/t5/network-security/gre-over-ipsec-sending-ts-unacceptable-notify-cisco-asr1001-palo/m-p/4979211#M1106966</link>
      <description>&lt;P&gt;Thank you for the response.&lt;/P&gt;&lt;P&gt;Yes sorry I attached VTI setup instead of GREoIPSEC , and forgot to mention, in VTI setup tunnels comes up with out any issues even when peer roles are switched&lt;/P&gt;&lt;P&gt;ASR1K cnfig:&lt;/P&gt;&lt;P&gt;interface Tunnel203&lt;BR /&gt;description Parad-Voice&lt;BR /&gt;vrf forwarding IBASIS-PUBLIC&lt;BR /&gt;ip address xxx.xxx.172.158 255.255.255.254&lt;BR /&gt;tunnel source xxx.xxx.184.22&lt;BR /&gt;tunnel destination xx.xx.194.66&lt;BR /&gt;tunnel protection ipsec profile Parad&lt;BR /&gt;end&lt;/P&gt;&lt;P&gt;IPSEC profile Parad&lt;BR /&gt;IKEv2 Profile: Parad&lt;BR /&gt;Security association lifetime: 4608000 kilobytes/28800 seconds&lt;BR /&gt;Responder-Only (Y/N): N&lt;BR /&gt;PFS (Y/N): Y&lt;BR /&gt;DH group: group19&lt;BR /&gt;Mixed-mode : Disabled&lt;BR /&gt;Transform sets={&lt;BR /&gt;Paradise: { esp-gcm } ,&lt;BR /&gt;}&lt;BR /&gt;IKEv2 profile: Parad&lt;BR /&gt;Ref Count: 5&lt;BR /&gt;Match criteria:&lt;BR /&gt;Fvrf: global&lt;BR /&gt;Local address/interface: none&lt;BR /&gt;Identities:&lt;BR /&gt;address xx.xx.194.66 255.255.255.255&lt;BR /&gt;Certificate maps: none&lt;BR /&gt;Local identity: address xxx.xxx.184.22&lt;BR /&gt;Remote identity: none&lt;BR /&gt;Local authentication method: pre-share&lt;BR /&gt;Remote authentication method(s): pre-share&lt;BR /&gt;EAP options: none&lt;BR /&gt;Keyring: Paradise&lt;BR /&gt;Trustpoint(s): none&lt;BR /&gt;Lifetime: 86400 seconds&lt;BR /&gt;DPD: disabled&lt;BR /&gt;NAT-keepalive: disabled&lt;BR /&gt;Ivrf: IBASIS-PUBLIC&lt;BR /&gt;Virtual-template: none&lt;BR /&gt;mode auto: none&lt;BR /&gt;AAA AnyConnect EAP authentication mlist: none&lt;BR /&gt;AAA EAP authentication mlist: none&lt;BR /&gt;AAA Accounting: none&lt;BR /&gt;AAA group authorization: none&lt;BR /&gt;AAA user authorization: none&lt;BR /&gt;PPK Dynamic: 0 PPK Required : 0 PPK Instance ID:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 15 Dec 2023 15:18:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/gre-over-ipsec-sending-ts-unacceptable-notify-cisco-asr1001-palo/m-p/4979211#M1106966</guid>
      <dc:creator>mkrishnan</dc:creator>
      <dc:date>2023-12-15T15:18:25Z</dc:date>
    </item>
    <item>
      <title>Re: GRE over IPSEC-Sending TS unacceptable notify-Cisco ASR1001-Palo A</title>
      <link>https://community.cisco.com/t5/network-security/gre-over-ipsec-sending-ts-unacceptable-notify-cisco-asr1001-palo/m-p/4979215#M1106967</link>
      <description>&lt;P&gt;Thanks for the response.&lt;/P&gt;&lt;P&gt;From the original setup , its always GREoIPSEC until I decided to test with VTI, there was no encryption domains involved as we run BGP over this tunnel for exchanging prefixes&lt;/P&gt;&lt;P&gt;Thats where I am not sure, when ASR1K initiate the tunnel negotiations, the tunnel comes up but when Palo Alto initiates in the messages its sending TS for validation which is non-existent in the ipsec policy ASR1K end , hence it fails with TS unacceptable&lt;/P&gt;</description>
      <pubDate>Fri, 15 Dec 2023 15:23:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/gre-over-ipsec-sending-ts-unacceptable-notify-cisco-asr1001-palo/m-p/4979215#M1106967</guid>
      <dc:creator>mkrishnan</dc:creator>
      <dc:date>2023-12-15T15:23:46Z</dc:date>
    </item>
    <item>
      <title>Re: GRE over IPSEC-Sending TS unacceptable notify-Cisco ASR1001-Palo A</title>
      <link>https://community.cisco.com/t5/network-security/gre-over-ipsec-sending-ts-unacceptable-notify-cisco-asr1001-palo/m-p/4979216#M1106968</link>
      <description>&lt;P&gt;Thanks for the response.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yes PFS is enabled both ends with same group&lt;/P&gt;</description>
      <pubDate>Fri, 15 Dec 2023 15:25:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/gre-over-ipsec-sending-ts-unacceptable-notify-cisco-asr1001-palo/m-p/4979216#M1106968</guid>
      <dc:creator>mkrishnan</dc:creator>
      <dc:date>2023-12-15T15:25:49Z</dc:date>
    </item>
    <item>
      <title>Re: GRE over IPSEC-Sending TS unacceptable notify-Cisco ASR1001-Palo A</title>
      <link>https://community.cisco.com/t5/network-security/gre-over-ipsec-sending-ts-unacceptable-notify-cisco-asr1001-palo/m-p/4979228#M1106970</link>
      <description>&lt;P&gt;Hello friend&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I was want to see config&amp;nbsp; policy key profile of ikev2&lt;/P&gt;
&lt;P&gt;Until that time&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Remote identity: &lt;STRONG&gt;none&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Are you dont use any remote identity for ikev2 profile?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;That explain why when palo initiate the traffic there is no response from ASR&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;MHM&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 15 Dec 2023 15:40:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/gre-over-ipsec-sending-ts-unacceptable-notify-cisco-asr1001-palo/m-p/4979228#M1106970</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-12-15T15:40:12Z</dc:date>
    </item>
    <item>
      <title>Re: GRE over IPSEC-Sending TS unacceptable notify-Cisco ASR1001-Palo A</title>
      <link>https://community.cisco.com/t5/network-security/gre-over-ipsec-sending-ts-unacceptable-notify-cisco-asr1001-palo/m-p/4979233#M1106971</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;In IKEV2 profile, ASR1K doesn't give the option to add remote identity&amp;nbsp; only local identity&amp;nbsp; while allows matching identity for remote as below:&lt;/P&gt;&lt;P&gt;M077-C1001-1(config-ikev2-profile)#identity ?&lt;BR /&gt;local Specify the local IKE identity to use for the negotiation&lt;/P&gt;&lt;P&gt;M077-C1001-1(config-ikev2-profile)#match identity ?&lt;BR /&gt;remote Remote identity&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;IKEv2 profile commands:&lt;BR /&gt;aaa Specify AAA related configs&lt;BR /&gt;anyconnect Enable profile for anyconnect profile download&lt;BR /&gt;authentication Set authentication method&lt;BR /&gt;config-exchange config-exchange options&lt;BR /&gt;description Specify a description of this profile&lt;BR /&gt;dpd Enable IKE liveness check for peers&lt;BR /&gt;dynamic Indicates the IKEv2 profile settings are dynamic&lt;BR /&gt;exit Exit from crypto ikev2 profile sub mode&lt;BR /&gt;identity Specify IKE identity to use ---&amp;gt; local&lt;BR /&gt;initial-contact initial-contact processing options&lt;BR /&gt;ivrf I-VRF of the profile&lt;BR /&gt;keyring Specify keyring to use&lt;BR /&gt;lifetime Set lifetime for ISAKMP security association&lt;BR /&gt;match Match values of peer -- -&amp;gt; remote&lt;BR /&gt;nat NAT-transparency&lt;BR /&gt;no Negate a command or set its defaults&lt;BR /&gt;pki Specify certificate authorities to trust&lt;BR /&gt;ppk Post Quantum Key server instance ID&lt;BR /&gt;reconnect Enable profile for auto re-connect&lt;BR /&gt;redirect IKEv2 Redirect Mechanism for load-balancing&lt;BR /&gt;shutdown shutdown the IKEv2 profile&lt;BR /&gt;virtual-template Specify the virtual-template for dynamic interface creation.&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Fri, 15 Dec 2023 15:47:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/gre-over-ipsec-sending-ts-unacceptable-notify-cisco-asr1001-palo/m-p/4979233#M1106971</guid>
      <dc:creator>mkrishnan</dc:creator>
      <dc:date>2023-12-15T15:47:20Z</dc:date>
    </item>
    <item>
      <title>Re: GRE over IPSEC-Sending TS unacceptable notify-Cisco ASR1001-Palo A</title>
      <link>https://community.cisco.com/t5/network-security/gre-over-ipsec-sending-ts-unacceptable-notify-cisco-asr1001-palo/m-p/4979241#M1106972</link>
      <description>&lt;P&gt;&lt;SPAN&gt;M077-C1001-1(config-ikev2-profile)#match identity ?&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;remote Remote identity&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Yes set remote identity using public IP of tunnel destiantion.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;MHM&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 15 Dec 2023 16:00:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/gre-over-ipsec-sending-ts-unacceptable-notify-cisco-asr1001-palo/m-p/4979241#M1106972</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-12-15T16:00:49Z</dc:date>
    </item>
    <item>
      <title>Re: GRE over IPSEC-Sending TS unacceptable notify-Cisco ASR1001-Palo A</title>
      <link>https://community.cisco.com/t5/network-security/gre-over-ipsec-sending-ts-unacceptable-notify-cisco-asr1001-palo/m-p/4979244#M1106974</link>
      <description>&lt;P&gt;yes its already there in the config&lt;/P&gt;&lt;P&gt;identities:&lt;BR /&gt;address xx.xx.194.66 255.255.255.255&amp;nbsp; -- this is the remote identity&lt;/P&gt;&lt;P&gt;in the profile that that you are seeing just remote identity in the available commands&lt;/P&gt;&lt;P&gt;Local identity: address xxx.xxx.184.22&lt;BR /&gt;Remote identity: none --- this is not available under&lt;/P&gt;&lt;P&gt;M077-C1001-1(config-ikev2-profile)#identity ?&lt;BR /&gt;local Specify the local IKE identity to use for the negotiation (no option to choose remote here only local)&lt;/P&gt;&lt;P&gt;While match identity allows remote identity to be configured&lt;/P&gt;&lt;P&gt;M077-C1001-1(config-ikev2-profile)#match identity ?&lt;BR /&gt;remote Remote identity&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 15 Dec 2023 16:06:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/gre-over-ipsec-sending-ts-unacceptable-notify-cisco-asr1001-palo/m-p/4979244#M1106974</guid>
      <dc:creator>mkrishnan</dc:creator>
      <dc:date>2023-12-15T16:06:49Z</dc:date>
    </item>
    <item>
      <title>Re: GRE over IPSEC-Sending TS unacceptable notify-Cisco ASR1001-Palo A</title>
      <link>https://community.cisco.com/t5/network-security/gre-over-ipsec-sending-ts-unacceptable-notify-cisco-asr1001-palo/m-p/4979251#M1106976</link>
      <description>&lt;P&gt;Identity for yout ASR&lt;/P&gt;
&lt;P&gt;Match identity remote&amp;nbsp; for Palo&lt;/P&gt;
&lt;P&gt;Use match identity under profile&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Fri, 15 Dec 2023 16:18:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/gre-over-ipsec-sending-ts-unacceptable-notify-cisco-asr1001-palo/m-p/4979251#M1106976</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-12-15T16:18:21Z</dc:date>
    </item>
    <item>
      <title>Re: GRE over IPSEC-Sending TS unacceptable notify-Cisco ASR1001-Palo A</title>
      <link>https://community.cisco.com/t5/network-security/gre-over-ipsec-sending-ts-unacceptable-notify-cisco-asr1001-palo/m-p/4979255#M1106979</link>
      <description>&lt;P&gt;Not sure I understand you correctly, I already did that&amp;nbsp; Profile has the remote identity under identities&lt;/P&gt;&lt;P&gt;identities:&lt;BR /&gt;address xx.xx.194.66 255.255.255.255 -- this is the remote identity (this is Palo Alto)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 15 Dec 2023 16:24:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/gre-over-ipsec-sending-ts-unacceptable-notify-cisco-asr1001-palo/m-p/4979255#M1106979</guid>
      <dc:creator>mkrishnan</dc:creator>
      <dc:date>2023-12-15T16:24:26Z</dc:date>
    </item>
    <item>
      <title>Re: GRE over IPSEC-Sending TS unacceptable notify-Cisco ASR1001-Palo A</title>
      <link>https://community.cisco.com/t5/network-security/gre-over-ipsec-sending-ts-unacceptable-notify-cisco-asr1001-palo/m-p/4979262#M1106980</link>
      <description>&lt;P&gt;friend the identity is used for your LOACL&amp;nbsp;&lt;BR /&gt;match identity is used for Peer&amp;nbsp;&lt;BR /&gt;NOTE:- if you config misconfig Palo IP with identity command remove it&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot (72).png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/205132i564BEFDE55478BBB/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot (72).png" alt="Screenshot (72).png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot (73).png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/205131i082CBE1B6A5B9EDA/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot (73).png" alt="Screenshot (73).png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 15 Dec 2023 16:35:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/gre-over-ipsec-sending-ts-unacceptable-notify-cisco-asr1001-palo/m-p/4979262#M1106980</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-12-15T16:35:12Z</dc:date>
    </item>
    <item>
      <title>Re: GRE over IPSEC-Sending TS unacceptable notify-Cisco ASR1001-Palo A</title>
      <link>https://community.cisco.com/t5/network-security/gre-over-ipsec-sending-ts-unacceptable-notify-cisco-asr1001-palo/m-p/4979267#M1106981</link>
      <description>&lt;P&gt;Thanks for the explanation but it seems I configured local and remote identities correctly&lt;/P&gt;&lt;P&gt;M077-C1001-1(config-ikev2-profile)#identity local add&lt;BR /&gt;M077-C1001-1(config-ikev2-profile)#identity local address xxx.xxx.187.52 -- ASR1K end&lt;/P&gt;&lt;P&gt;M077-C1001-1(config-ikev2-profile)#match identity remote address xx.xx.194.70 255.255.255.255 -- palo alto&lt;BR /&gt;% Already found same 'match identity' statement in this profile&lt;/P&gt;</description>
      <pubDate>Fri, 15 Dec 2023 16:46:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/gre-over-ipsec-sending-ts-unacceptable-notify-cisco-asr1001-palo/m-p/4979267#M1106981</guid>
      <dc:creator>mkrishnan</dc:creator>
      <dc:date>2023-12-15T16:46:51Z</dc:date>
    </item>
    <item>
      <title>Re: GRE over IPSEC-Sending TS unacceptable notify-Cisco ASR1001-Palo A</title>
      <link>https://community.cisco.com/t5/network-security/gre-over-ipsec-sending-ts-unacceptable-notify-cisco-asr1001-palo/m-p/4979269#M1106982</link>
      <description>&lt;P&gt;That why I ask you are you use palo in identity command (not match identity)?&lt;/P&gt;
&lt;P&gt;You can see in your debug&amp;nbsp; the profile and policy not match.&lt;/P&gt;
&lt;P&gt;Can you copy paste the command (show run) and hide the public IP.&lt;/P&gt;
&lt;P&gt;Let me check all&lt;/P&gt;
&lt;P&gt;Thanks&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Fri, 15 Dec 2023 16:50:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/gre-over-ipsec-sending-ts-unacceptable-notify-cisco-asr1001-palo/m-p/4979269#M1106982</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-12-15T16:50:46Z</dc:date>
    </item>
    <item>
      <title>Re: GRE over IPSEC-Sending TS unacceptable notify-Cisco ASR1001-Palo A</title>
      <link>https://community.cisco.com/t5/network-security/gre-over-ipsec-sending-ts-unacceptable-notify-cisco-asr1001-palo/m-p/4979277#M1106984</link>
      <description>&lt;P&gt;crypto ikev2 profile Parad&lt;BR /&gt;match identity remote address xx.xx.194.70 255.255.255.255&lt;BR /&gt;identity local address xxx.xxx.187.52&lt;BR /&gt;authentication remote pre-share&lt;BR /&gt;authentication local pre-share&lt;BR /&gt;keyring local Parad&lt;BR /&gt;ivrf IBASIS-PUBLIC&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;crypto ipsec profile Parad&lt;BR /&gt;set security-association lifetime seconds 28800&lt;BR /&gt;set transform-set Parad&lt;BR /&gt;set pfs group14&lt;BR /&gt;set ikev2-profile Parad&lt;BR /&gt;reverse-route static&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set Parad esp-gcm&lt;BR /&gt;mode tunnel&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 15 Dec 2023 17:01:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/gre-over-ipsec-sending-ts-unacceptable-notify-cisco-asr1001-palo/m-p/4979277#M1106984</guid>
      <dc:creator>mkrishnan</dc:creator>
      <dc:date>2023-12-15T17:01:12Z</dc:date>
    </item>
    <item>
      <title>Re: GRE over IPSEC-Sending TS unacceptable notify-Cisco ASR1001-Palo A</title>
      <link>https://community.cisco.com/t5/network-security/gre-over-ipsec-sending-ts-unacceptable-notify-cisco-asr1001-palo/m-p/4979328#M1106985</link>
      <description>&lt;P&gt;&lt;SPAN&gt;That all config there is no config of policy?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Also tunnel use ivrf&amp;nbsp;IBASIS-PUBLIC&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;There is no fvrf so&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;keyring local Parad &amp;lt;- this must without any fvrf&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;ivrf IBASIS-PUBLIC &amp;lt;- this ivrf is correct but I never see anyone use it under ikev2 profile' remove it and try&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;MHM&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 15 Dec 2023 17:18:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/gre-over-ipsec-sending-ts-unacceptable-notify-cisco-asr1001-palo/m-p/4979328#M1106985</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-12-15T17:18:29Z</dc:date>
    </item>
    <item>
      <title>Re: GRE over IPSEC-Sending TS unacceptable notify-Cisco ASR1001-Palo A</title>
      <link>https://community.cisco.com/t5/network-security/gre-over-ipsec-sending-ts-unacceptable-notify-cisco-asr1001-palo/m-p/4979339#M1106987</link>
      <description>&lt;P&gt;crypto ikev2 proposal Parad&lt;BR /&gt;encryption aes-gcm-128&lt;BR /&gt;prf sha256&lt;BR /&gt;group 14&lt;/P&gt;&lt;P&gt;crypto ikev2 policy POLICY1&lt;BR /&gt;proposal PROPOSAL1&lt;BR /&gt;proposal Parad&lt;BR /&gt;proposal&lt;BR /&gt;proposal&lt;/P&gt;&lt;P&gt;keyring local Parad &amp;lt;- this must without any fvrf&lt;/P&gt;&lt;P&gt;As per debug, psk is shared and authentication is successful , so this has no effect on the issue being reported by ASR1K&lt;BR /&gt;ivrf IBASIS-PUBLIC &amp;lt;- this ivrf is correct but I never see anyone use it under ikev2 profile' remove it and try&lt;/P&gt;&lt;P&gt;Again ,ivrf has no bearing&amp;nbsp; on the issue being reported by ASR1K as this is for our internal routing back to our end device&lt;/P&gt;&lt;P&gt;I am more curious to understand , why ASR1K is getting TS in the messages from Palo Alto when there is no encryption domain/ACL are defined on both ends to validate the interesting traffic as GREoIPSEC is not configured the way&amp;nbsp; IPSEC tunnels are setup (crypto iskamp)&lt;/P&gt;&lt;P&gt;Similarly when ASR1K is initiating , this TS issue is no longer there the tunnel is established ( what is influencing roles Initiator/responder) so this makes me think when ASR1K initiates its not sending any TS messages to be validated by PALO ALTO and tunnel is established&lt;/P&gt;</description>
      <pubDate>Fri, 15 Dec 2023 17:33:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/gre-over-ipsec-sending-ts-unacceptable-notify-cisco-asr1001-palo/m-p/4979339#M1106987</guid>
      <dc:creator>mkrishnan</dc:creator>
      <dc:date>2023-12-15T17:33:22Z</dc:date>
    </item>
    <item>
      <title>Re: GRE over IPSEC-Sending TS unacceptable notify-Cisco ASR1001-Palo A</title>
      <link>https://community.cisco.com/t5/network-security/gre-over-ipsec-sending-ts-unacceptable-notify-cisco-asr1001-palo/m-p/4979817#M1106991</link>
      <description>&lt;P&gt;Hi friend&amp;nbsp;&lt;BR /&gt;I try lab config (with out iVRF) and face issue the IKEv2 GREoIPSec not work at all&amp;nbsp;&lt;BR /&gt;&lt;STRONG&gt;show crypto ipsec sa&amp;nbsp;&lt;/STRONG&gt;&lt;BR /&gt;show error pkt count increase when I ping from LAN to LAN over tunnel&amp;nbsp;&lt;BR /&gt;I think you face same issue&amp;nbsp;&lt;BR /&gt;and then clear all config and add it again and it work (same config)&lt;BR /&gt;so what maybe cause this issue&amp;nbsp;&lt;BR /&gt;1- you run crypto map under the tunnel interface, I read in cisco guide the IOS XE face issue if tunnel source use crypto map and tunnel use crypto profile&amp;nbsp;&lt;BR /&gt;2- you use VTI and then change to GREoIPSec using same tunnel config.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;how I troubleshooting my lab&amp;nbsp;&lt;BR /&gt;show crypto ike2 profile (same as your there is no remote identity !!)&lt;BR /&gt;show crypto ike2 session (this include more info that show crypto ikev2 sa)&lt;BR /&gt;show crypto ipsec sa&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;R1&lt;/P&gt;
&lt;P&gt;crypto ikev2 proposal prop&lt;BR /&gt;encryption 3des&lt;BR /&gt;integrity md5&lt;BR /&gt;group 14&lt;BR /&gt;!&lt;BR /&gt;crypto ikev2 policy pol&lt;BR /&gt;match address local 100.0.0.1&lt;BR /&gt;proposal prop&lt;BR /&gt;!&lt;BR /&gt;crypto ikev2 keyring key&lt;BR /&gt;peer R2&lt;BR /&gt;address 100.0.0.2&lt;BR /&gt;pre-shared-key mhm&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;crypto ikev2 profile prof&lt;BR /&gt;match identity remote address 100.0.0.2 255.255.255.255&lt;BR /&gt;identity local address 100.0.0.1&lt;BR /&gt;authentication remote pre-share&lt;BR /&gt;authentication local pre-share&lt;BR /&gt;keyring local key&lt;BR /&gt;dpd 10 2 periodic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;crypto ipsec transform-set mhm esp-des&lt;BR /&gt;mode tunnel&lt;BR /&gt;!&lt;BR /&gt;crypto ipsec profile MHM&lt;BR /&gt;set transform-set mhm&lt;BR /&gt;set ikev2-profile prof&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;interface Tunnel0&lt;BR /&gt;ip address 5.0.0.2 255.255.255.0&lt;BR /&gt;tunnel source FastEthernet0/0&lt;BR /&gt;tunnel destination 100.0.0.2&lt;BR /&gt;tunnel protection ipsec profile MHM&lt;/P&gt;
&lt;P&gt;R2&lt;/P&gt;
&lt;P&gt;crypto ikev2 proposal prop&lt;BR /&gt;encryption 3des&lt;BR /&gt;integrity md5&lt;BR /&gt;group 14&lt;BR /&gt;!&lt;BR /&gt;crypto ikev2 policy pol&lt;BR /&gt;match address local 100.0.0.2&lt;BR /&gt;proposal prop&lt;BR /&gt;!&lt;BR /&gt;crypto ikev2 keyring key&lt;BR /&gt;peer R1&lt;BR /&gt;address 100.0.0.1&lt;BR /&gt;pre-shared-key mhm&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;crypto ikev2 profile prof&lt;BR /&gt;match identity remote address 100.0.0.1 255.255.255.255&lt;BR /&gt;identity local address 100.0.0.2&lt;BR /&gt;authentication remote pre-share&lt;BR /&gt;authentication local pre-share&lt;BR /&gt;keyring local key&lt;BR /&gt;dpd 10 2 periodic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;crypto ipsec transform-set mhm esp-des&lt;BR /&gt;mode tunnel&lt;BR /&gt;!&lt;BR /&gt;crypto ipsec profile MHM&lt;BR /&gt;set transform-set mhm&lt;BR /&gt;set ikev2-profile prof&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;interface Tunnel0&lt;BR /&gt;ip address 5.0.0.2 255.255.255.0&lt;BR /&gt;tunnel source FastEthernet0/0&lt;BR /&gt;tunnel destination 100.0.0.1&lt;BR /&gt;tunnel protection ipsec profile MHM&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot (578).png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/205179i022E3E8CE0252405/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot (578).png" alt="Screenshot (578).png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 16 Dec 2023 08:04:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/gre-over-ipsec-sending-ts-unacceptable-notify-cisco-asr1001-palo/m-p/4979817#M1106991</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-12-16T08:04:46Z</dc:date>
    </item>
  </channel>
</rss>

