<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: VPN Tunnel ASA&amp;gt;Palo Alto in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/vpn-tunnel-asa-gt-palo-alto/m-p/5038433#M1109807</link>
    <description>&lt;P&gt;Interesting remote side see the traffic and you cant see even the phase 1.&lt;/P&gt;
&lt;P&gt;try to capture the packet on the ASA.&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt; capture VPN type isakmp ikev2 interface outside match ip host x.x.x.x host z.z.z.z&lt;/LI-CODE&gt;
&lt;P&gt;once the capture are filling up you can see them by using command show capture VPN.&lt;/P&gt;
&lt;P&gt;as it will give you a good start to troubleshoot this.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/118097-configure-asa-00.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/118097-configure-asa-00.html&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 13 Mar 2024 02:38:37 GMT</pubDate>
    <dc:creator>Sheraz.Salim</dc:creator>
    <dc:date>2024-03-13T02:38:37Z</dc:date>
    <item>
      <title>VPN Tunnel ASA&gt;Palo Alto</title>
      <link>https://community.cisco.com/t5/network-security/vpn-tunnel-asa-gt-palo-alto/m-p/5038243#M1109792</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I'm having trouble setting up a vpn tunnel between a Cisco asa5516x running 9.16 (4)(me) and a Palo Alto PA-3430 running 10.2.6 (vendor).&lt;/P&gt;&lt;P&gt;First time crossing vendors for both of us.&lt;/P&gt;&lt;P&gt;Using Ikev2, both sides have the same phase 1 encryption:&lt;/P&gt;&lt;P&gt;encryption aes-192&lt;/P&gt;&lt;P&gt;&amp;nbsp;integrity sha&lt;/P&gt;&lt;P&gt;&amp;nbsp;group 21&lt;/P&gt;&lt;P&gt;&amp;nbsp;prf sha&lt;/P&gt;&lt;P&gt;&amp;nbsp;lifetime seconds 28800&amp;nbsp;&lt;/P&gt;&lt;P&gt;both sides have the same phase 2 ipsec:&lt;/P&gt;&lt;P&gt;&amp;nbsp;protocol esp encryption aes-256&lt;/P&gt;&lt;P&gt;&amp;nbsp;protocol esp integrity sha-256&lt;/P&gt;&lt;P&gt;PA says he can see traffic passing, but I don't even see an attempt at phase1 negotiation.&lt;/P&gt;&lt;P&gt;ACL is made on my end.&lt;/P&gt;&lt;P&gt;crypto map is made on my end.&lt;/P&gt;&lt;P&gt;group policy is made on my end.&lt;/P&gt;&lt;P&gt;&amp;nbsp;tunnel-group is made on my end.&lt;/P&gt;&lt;P&gt;ran the debug cry ikev2 pro and don't see an attempt at a handshake.&lt;/P&gt;&lt;P&gt;Not sure what is out of place.&lt;/P&gt;&lt;P&gt;any insight please???&lt;/P&gt;&lt;P&gt;what other info can I provide for any help?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2024 17:31:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-tunnel-asa-gt-palo-alto/m-p/5038243#M1109792</guid>
      <dc:creator>zietgiestt</dc:creator>
      <dc:date>2024-03-12T17:31:13Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Tunnel ASA&gt;Palo Alto</title>
      <link>https://community.cisco.com/t5/network-security/vpn-tunnel-asa-gt-palo-alto/m-p/5038247#M1109793</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/414854"&gt;@zietgiestt&lt;/a&gt; if the peer says the VPN is up, run &lt;STRONG&gt;show crypto ikev2 sa&lt;/STRONG&gt; and &lt;STRONG&gt;show crypto ipsec sa&lt;/STRONG&gt; from the CLI of the ASA and provide the output for review.&lt;/P&gt;
&lt;P&gt;If there is no output then the tunnel is not up.&lt;/P&gt;
&lt;P&gt;ASA IKEv2 troubleshooting guide - &lt;A href="https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/115935-asa-ikev2-debugs.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/115935-asa-ikev2-debugs.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;enable these debugs, generate some interesting traffic and provide the output for review.&lt;/P&gt;
&lt;PRE&gt;&lt;STRONG&gt;debug crypto ikev2 protocol 127&lt;BR /&gt;debug crypto ikev2 platform 127&lt;/STRONG&gt;&lt;/PRE&gt;
&lt;P&gt;Do you have a NAT exemption rule to ensure traffic is not unintentially translated?&lt;/P&gt;
&lt;P&gt;Please provide your crypto and VPN ACL for review.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;You could also run packet-tracer twice to simulate the traffic flow, provide the output from the second output.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2024 17:38:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-tunnel-asa-gt-palo-alto/m-p/5038247#M1109793</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2024-03-12T17:38:56Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Tunnel ASA&gt;Palo Alto</title>
      <link>https://community.cisco.com/t5/network-security/vpn-tunnel-asa-gt-palo-alto/m-p/5038297#M1109796</link>
      <description>Hi Zietgiestt,&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Did you ensure to put in the NAT 0 statement for the ASA&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Tue, 12 Mar 2024 19:43:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-tunnel-asa-gt-palo-alto/m-p/5038297#M1109796</guid>
      <dc:creator>james.king14</dc:creator>
      <dc:date>2024-03-12T19:43:36Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Tunnel ASA&gt;Palo Alto</title>
      <link>https://community.cisco.com/t5/network-security/vpn-tunnel-asa-gt-palo-alto/m-p/5038329#M1109798</link>
      <description>&lt;P&gt;Rob,&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've attached your requested info. As you can see a sh cry is sa shows nothing regarding the remote IP (170.103.X.X).&lt;/P&gt;&lt;P&gt;Shouldn't there be at least some attempts to negotiate the tunnel with some fails?&lt;/P&gt;&lt;P&gt;I may have let the debug run a little long.&lt;/P&gt;&lt;P&gt;What my peer is saying is not that the tunnel is up, but he can see packets passing back/forth over udp500.&lt;/P&gt;&lt;P&gt;Hope this helps you help me...appreciate it&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2024 20:42:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-tunnel-asa-gt-palo-alto/m-p/5038329#M1109798</guid>
      <dc:creator>zietgiestt</dc:creator>
      <dc:date>2024-03-12T20:42:31Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Tunnel ASA&gt;Palo Alto</title>
      <link>https://community.cisco.com/t5/network-security/vpn-tunnel-asa-gt-palo-alto/m-p/5038341#M1109800</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/414854"&gt;@zietgiestt&lt;/a&gt; the debug output does not appear to be related to the PA VPN&amp;nbsp;170.103.X.X in question.&lt;/P&gt;
&lt;P&gt;If the peer was sending traffic to you and assuming they have configured the correct IP address for your ASA, I'd expect to see something in the debug output (regardless of whether the configuration works or not).&lt;/P&gt;
&lt;P&gt;Take a packet capture, filter on PA IP address and confirm from your end that there is communication between the PA IP address and your ASA. If not could there be something blocking communication in the path or the IP address is configured incorrectly.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2024 21:00:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-tunnel-asa-gt-palo-alto/m-p/5038341#M1109800</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2024-03-12T21:00:44Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Tunnel ASA&gt;Palo Alto</title>
      <link>https://community.cisco.com/t5/network-security/vpn-tunnel-asa-gt-palo-alto/m-p/5038349#M1109801</link>
      <description>&lt;P&gt;James,&lt;/P&gt;&lt;P&gt;Not truly familiar with the nat 0 statement. I do have a nat statement in place:&lt;/P&gt;&lt;P&gt;nat (inside,outside) source static WS_Tunnel_Tempel_Internal WS_Tunnel_Tempel_Internal destination static WS_Tunnel_WS_Internal WS_Tunnel_WS_Internal no-proxy-arp route-lookup&lt;/P&gt;&lt;P&gt;If I run a packet tracer sourced form an IP in the ACL to a remote IP, I see the untranslated hits climb 1 at a time.&lt;/P&gt;&lt;P&gt;23 (inside) to (outside) source static WS_Tunnel_Tempel_Internal WS_Tunnel_Tempel_Internal destination static WS_Tunnel_WS_Internal WS_Tunnel_WS_Internal no-proxy-arp route-lookup&lt;BR /&gt;translate_hits = 0, &lt;U&gt;&lt;STRONG&gt;untranslate_hits = 3&lt;/STRONG&gt;&lt;/U&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2024 21:11:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-tunnel-asa-gt-palo-alto/m-p/5038349#M1109801</guid>
      <dc:creator>zietgiestt</dc:creator>
      <dc:date>2024-03-12T21:11:08Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Tunnel ASA&gt;Palo Alto</title>
      <link>https://community.cisco.com/t5/network-security/vpn-tunnel-asa-gt-palo-alto/m-p/5038354#M1109802</link>
      <description>&lt;P&gt;Yes. That is what is frustrating me. I can see the log monitor that my peer can ping me so I know he has the correct IP, as do I.I will run a packet capture as you suggest.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I will post after. thanks&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/97036"&gt;@Rob Ingram&lt;/a&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2024 21:21:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-tunnel-asa-gt-palo-alto/m-p/5038354#M1109802</guid>
      <dc:creator>zietgiestt</dc:creator>
      <dc:date>2024-03-12T21:21:29Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Tunnel ASA&gt;Palo Alto</title>
      <link>https://community.cisco.com/t5/network-security/vpn-tunnel-asa-gt-palo-alto/m-p/5038433#M1109807</link>
      <description>&lt;P&gt;Interesting remote side see the traffic and you cant see even the phase 1.&lt;/P&gt;
&lt;P&gt;try to capture the packet on the ASA.&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt; capture VPN type isakmp ikev2 interface outside match ip host x.x.x.x host z.z.z.z&lt;/LI-CODE&gt;
&lt;P&gt;once the capture are filling up you can see them by using command show capture VPN.&lt;/P&gt;
&lt;P&gt;as it will give you a good start to troubleshoot this.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/118097-configure-asa-00.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/118097-configure-asa-00.html&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 13 Mar 2024 02:38:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-tunnel-asa-gt-palo-alto/m-p/5038433#M1109807</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2024-03-13T02:38:37Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Tunnel ASA&gt;Palo Alto</title>
      <link>https://community.cisco.com/t5/network-security/vpn-tunnel-asa-gt-palo-alto/m-p/5038614#M1109809</link>
      <description>&lt;P&gt;Do the following&amp;nbsp;&lt;/P&gt;
&lt;P&gt;debug crypto condition peer x.x.x.x&lt;BR /&gt;then&lt;/P&gt;
&lt;PRE&gt;&lt;STRONG&gt;debug crypto ikev2 protocol 127&lt;BR /&gt;debug crypto ikev2 platform 127&lt;/STRONG&gt;&lt;/PRE&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Wed, 13 Mar 2024 09:23:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-tunnel-asa-gt-palo-alto/m-p/5038614#M1109809</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2024-03-13T09:23:16Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Tunnel ASA&gt;Palo Alto</title>
      <link>https://community.cisco.com/t5/network-security/vpn-tunnel-asa-gt-palo-alto/m-p/5088046#M1112060</link>
      <description>&lt;P&gt;Seems it was an issue with the PA and their ACL.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Was able to get the tunnel to come up.&lt;/P&gt;&lt;P&gt;Tanks for everyone's input...&lt;/P&gt;</description>
      <pubDate>Thu, 02 May 2024 19:13:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-tunnel-asa-gt-palo-alto/m-p/5088046#M1112060</guid>
      <dc:creator>zietgiestt</dc:creator>
      <dc:date>2024-05-02T19:13:30Z</dc:date>
    </item>
  </channel>
</rss>

