<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic You can take screenshots from in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ipsec-phase-1-is-working-now-but-phase-2-failing/m-p/2919291#M159015</link>
    <description>&lt;P&gt;You can take screenshots from Palo Alto.&lt;/P&gt;
&lt;P&gt;Also a full running config from the ASA would be good.&lt;/P&gt;
&lt;P&gt;--&lt;/P&gt;
&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
    <pubDate>Sun, 28 Feb 2016 02:39:34 GMT</pubDate>
    <dc:creator>Marius Gunnerud</dc:creator>
    <dc:date>2016-02-28T02:39:34Z</dc:date>
    <item>
      <title>IPSEC phase 1 is working now but Phase 2 failing</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-phase-1-is-working-now-but-phase-2-failing/m-p/2919279#M159003</link>
      <description>&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Hi Everyone,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Cisco ASA phase 1 failing&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Feb 27 2016 10:56:43: %ASA-5-713257: Phase 1 failure: Mismatched attribute types for class Group Description: Rcv'd: Group 5 Cfg'd: Group 2&lt;BR /&gt;Feb 27 2016 10:56:43: %ASA-3-713048: IP = 184.71.x.x, Error processing payload: Payload ID: 1&lt;BR /&gt;Feb 27 2016 10:56:45: %ASA-5-713257: Phase 1 failure: Mismatched attribute types for class Group Description: Rcv'd: Group 5 Cfg'd: Group 2&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;i am only using ikev1 policy 10 but system shows so many policies&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;crypto ikev1 policy 10&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt; authentication crack&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt; encryption aes-256&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt; hash md5&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt; group 5&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt; lifetime 86400&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;crypto ikev1 policy 20&lt;BR /&gt; authentication rsa-sig&lt;BR /&gt; encryption aes-256&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto ikev1 policy 30&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption aes-256&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto ikev1 policy 40&lt;BR /&gt; authentication crack&lt;BR /&gt; encryption aes-192&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto ikev1 policy 50&lt;BR /&gt; authentication rsa-sig&lt;BR /&gt; encryption aes-192&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto ikev1 policy 60&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption aes-192&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto ikev1 policy 70&lt;BR /&gt; authentication crack&lt;BR /&gt; encryption aes&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto ikev1 policy 80&lt;BR /&gt; authentication rsa-sig&lt;BR /&gt; encryption aes&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto ikev1 policy 90&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption aes&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto ikev1 policy 100&lt;BR /&gt; authentication crack&lt;BR /&gt; encryption 3des&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto ikev1 policy 110&lt;BR /&gt; authentication rsa-sig&lt;BR /&gt; encryption 3des&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto ikev1 policy 120&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption 3des&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto ikev1 policy 130&lt;BR /&gt; authentication crack&lt;BR /&gt; encryption des&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto ikev1 policy 140&lt;BR /&gt; authentication rsa-sig&lt;BR /&gt; encryption des&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;BR /&gt;crypto ikev1 policy 150&lt;BR /&gt; authentication pre-share&lt;BR /&gt; encryption des&lt;BR /&gt; hash sha&lt;BR /&gt; group 2&lt;BR /&gt; lifetime 86400&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;should i delete all other crypto ikev1 polices except 10?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;MAhesh&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 07:24:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-phase-1-is-working-now-but-phase-2-failing/m-p/2919279#M159003</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2019-03-12T07:24:43Z</dc:date>
    </item>
    <item>
      <title>i deleted all the crypto</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-phase-1-is-working-now-but-phase-2-failing/m-p/2919280#M159004</link>
      <description>&lt;P&gt;i deleted all the crypto ikev1 policies other than 10 now i see below error only&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Feb 27 2016 11:11:54: %ASA-6-302015: Built inbound UDP connection 10603 for outside:184.71.x.x/500 (184.71.x.x/500) to identity:68.145.154.x/500 (68.145.154.x/500)&lt;BR /&gt;Feb 27 2016 11:11:54: %ASA-3-713048: IP = 184.71.x.x, Error processing payload: Payload ID: 1&lt;/P&gt;</description>
      <pubDate>Sat, 27 Feb 2016 18:13:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-phase-1-is-working-now-but-phase-2-failing/m-p/2919280#M159004</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2016-02-27T18:13:46Z</dc:date>
    </item>
    <item>
      <title>Mahesh,</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-phase-1-is-working-now-but-phase-2-failing/m-p/2919281#M159005</link>
      <description>&lt;P&gt;Mahesh,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Can you please share the complete output of the following debug command?&lt;BR /&gt;debug crypto condition peer &amp;lt;x.x.x.x&amp;gt;&lt;BR /&gt;debug crypto isakmp 200&lt;BR /&gt;&lt;BR /&gt;x.x.x.x being peer IP&lt;BR /&gt;&lt;BR /&gt;Regards,&lt;BR /&gt;Dinesh Moudgil&lt;BR /&gt;&lt;BR /&gt;P.S. Please rate helpful posts.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 27 Feb 2016 18:21:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-phase-1-is-working-now-but-phase-2-failing/m-p/2919281#M159005</guid>
      <dc:creator>Dinesh Moudgil</dc:creator>
      <dc:date>2016-02-27T18:21:58Z</dc:date>
    </item>
    <item>
      <title>Hi Dinesh,</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-phase-1-is-working-now-but-phase-2-failing/m-p/2919282#M159006</link>
      <description>&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Hi Dinesh,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Phase &amp;nbsp;1 is working but now issue is with phase2.&lt;/P&gt;
&lt;P&gt;Phase 1 issue was fixed as i have typo in authentication.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Here is error from ASA&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Feb 27 2016 17:15:30: %ASA-3-713061: Group = 184.71.241.x, IP = 184.71.241.x, Rejecting IPSec tunnel: no matching crypto map entry for remote proxy 172.16.0.0/255.255.255.0/0/0 local proxy 10.0.0.0/255.255.255.0/0/0 on interface outside&lt;BR /&gt;Feb 27 2016 17:15:30: %ASA-3-713902: Group = 184.71.241.x, IP = 184.71.241.x, QM FSM error (P2 struct &amp;amp;0xcc18c788, mess id 0xd9728a94)!&lt;BR /&gt;Feb 27 2016 17:15:30: %ASA-3-713902: Group = 184.71.241.x, IP = 184.71.241.x, Removing peer from correlator table failed, no match!&lt;BR /&gt;Feb 27 2016 17:15:30: %ASA-5-713259: Group = 184.71.241.x, IP = 184.71.241.x, Session is being torn down. Reason: crypto map policy not found&lt;BR /&gt;Feb 27 2016 17:15:30: %ASA-4-113019: Group = 184.71.241.x, Username = 184.71.241.x, IP = 164.51.231.x, Session disconnected. Session Type: LAN-to-LAN, Duration: 0h:06m:03s, Bytes xmt: 0, Bytes rcv: 0, Reason: crypto map policy not found&lt;BR /&gt;Feb 27 2016 17:15:32: %ASA-5-713904: IP = 184.71.241.x, Received encrypted packet with no matching SA, dropping&lt;BR /&gt;Feb 27 2016 17:15:35: %ASA-5-713904: IP = 184.71.241.x, Received encrypted packet with no matching SA, dropping&lt;BR /&gt;Feb 27 2016 17:15:40: %ASA-5-713904: IP = 184.71.241.x, Received encrypted packet with no matching SA, dropping&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;MAhesh&lt;/P&gt;</description>
      <pubDate>Sun, 28 Feb 2016 01:01:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-phase-1-is-working-now-but-phase-2-failing/m-p/2919282#M159006</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2016-02-28T01:01:05Z</dc:date>
    </item>
    <item>
      <title>It seems to be complaining</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-phase-1-is-working-now-but-phase-2-failing/m-p/2919283#M159007</link>
      <description>&lt;P&gt;It seems to be complaining that the crypto map is not configured for this particular peer. &amp;nbsp;If it is configured, check that the crypto ACLs are mirror images of eachother. &amp;nbsp;If this is correct check if PFS is configured on one side and not the other. &amp;nbsp;If you are still having issues after checking these, please post your full configuration (remove public IPs and usernames / passwords).&lt;/P&gt;
&lt;P&gt;--&lt;/P&gt;
&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Sun, 28 Feb 2016 01:01:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-phase-1-is-working-now-but-phase-2-failing/m-p/2919283#M159007</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2016-02-28T01:01:06Z</dc:date>
    </item>
    <item>
      <title>As stated by my peer Marius, </title>
      <link>https://community.cisco.com/t5/network-security/ipsec-phase-1-is-working-now-but-phase-2-failing/m-p/2919284#M159008</link>
      <description>&lt;P&gt;As stated by my peer Marius,&amp;nbsp;"&lt;SPAN&gt; QM FSM error&lt;/SPAN&gt;" is pertaining to Phase 2 attributes mismatch&lt;BR /&gt;so please confirm they are matching on both sides.&lt;BR /&gt;&lt;BR /&gt;Regards,&lt;BR /&gt;Dinesh Moudgil&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;P.S. Please rate helpful posts.&lt;/P&gt;</description>
      <pubDate>Sun, 28 Feb 2016 01:15:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-phase-1-is-working-now-but-phase-2-failing/m-p/2919284#M159008</guid>
      <dc:creator>Dinesh Moudgil</dc:creator>
      <dc:date>2016-02-28T01:15:56Z</dc:date>
    </item>
    <item>
      <title>Hi Marius,</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-phase-1-is-working-now-but-phase-2-failing/m-p/2919285#M159009</link>
      <description>&lt;P&gt;Hi Marius,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Crypto ACL is matched at both ends.&lt;/P&gt;
&lt;P&gt;ASA&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;crypto map CRYPTO-MAP 1 match address VPN-INTERESTING-TRAFFIC&lt;BR /&gt;&lt;STRONG&gt;crypto map CRYPTO-MAP 1 set pfs group5&lt;/STRONG&gt;&lt;BR /&gt;crypto map CRYPTO-MAP 1 set peer 184.71.241.x&lt;BR /&gt;crypto map CRYPTO-MAP 1 set ikev1 transform-set VPN-TRANSFORM&lt;BR /&gt;crypto map CRYPTO-MAP interface outside&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;crypto ikev1 enable outside&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Shows PFS is group 5.&lt;/P&gt;
&lt;P&gt;Other end is PALO ALTO firewall and it also has DH ---Group5.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;MAhesh&lt;/P&gt;</description>
      <pubDate>Sun, 28 Feb 2016 01:23:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-phase-1-is-working-now-but-phase-2-failing/m-p/2919285#M159009</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2016-02-28T01:23:27Z</dc:date>
    </item>
    <item>
      <title>Does the Palo Alto have</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-phase-1-is-working-now-but-phase-2-failing/m-p/2919286#M159010</link>
      <description>&lt;P&gt;Does the Palo Alto have another route to the ASA through another interface perhaps? &amp;nbsp;I have come across a similar issue between ASA and Palo Alto where the Palo Alto established phase 1 through one interface and then sendt phase 2 through a second interface that was also had a route to the ASA.&lt;/P&gt;
&lt;P&gt;Would you be able to post the configuration for the ASA and Palo Alto, if the above is not the case.&lt;/P&gt;
&lt;P&gt;--&lt;/P&gt;
&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Sun, 28 Feb 2016 01:31:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-phase-1-is-working-now-but-phase-2-failing/m-p/2919286#M159010</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2016-02-28T01:31:25Z</dc:date>
    </item>
    <item>
      <title>On Palo Alto1. tail follow</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-phase-1-is-working-now-but-phase-2-failing/m-p/2919287#M159011</link>
      <description>&lt;P&gt;&lt;STRONG&gt;On Palo Alto&lt;BR /&gt;&lt;/STRONG&gt;&lt;BR /&gt;1. tail &lt;G class="gr_ gr_27 gr-alert gr_gramm gr_disable_anim_appear undefined Grammar multiReplace" id="27" data-gr-id="27"&gt;follow&lt;/G&gt; yes mp-log ikemgr.log&lt;/P&gt;
&lt;P&gt;2. Go&amp;nbsp;to Monitor &amp;gt; System &amp;gt;&amp;nbsp;&lt;BR /&gt;In the search &lt;G class="gr_ gr_26 gr-alert gr_gramm gr_disable_anim_appear undefined Punctuation multiReplace" id="26" data-gr-id="26"&gt;field ,&lt;/G&gt; type "( subtype eq vpn )" to filter the logs.&lt;/P&gt;
&lt;P&gt;3. Initiate the tunnel.&lt;/P&gt;
&lt;P&gt;4. Check the output of 1st and 2nd.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;On ASA&lt;/STRONG&gt;:&lt;BR /&gt;1.&lt;BR /&gt;debug crypto condition peer x.x.x.x (ip of &lt;G class="gr_ gr_25 gr-alert gr_gramm gr_disable_anim_appear undefined Grammar only-ins doubleReplace replaceWithoutSep" id="25" data-gr-id="25"&gt;remote&lt;/G&gt; peer)&lt;BR /&gt;debug crypto isakmp 200&lt;BR /&gt;debug crypto ipsec 200&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Here is a document that you can refer to verify the VPN tunnel on both firewalls:-&lt;BR /&gt;&lt;A href="https://live.paloaltonetworks.com/docs/DOC-3464" rel="nofollow" onmousedown="dataLayer.push({'event': 'eventTracker', 'eventCat': 'Outbound Links', 'eventAct': 'Click', 'eventLbl': 'live.paloaltonetworks.com/docs/DOC-3464', 'eventVal': 0});"&gt;https://live.paloaltonetworks.com/docs/DOC-3464&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;BR /&gt;Dinesh Moudgil&lt;BR /&gt;&lt;BR /&gt;P.S. Please rate helpful posts.&lt;/P&gt;</description>
      <pubDate>Sun, 28 Feb 2016 01:37:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-phase-1-is-working-now-but-phase-2-failing/m-p/2919287#M159011</guid>
      <dc:creator>Dinesh Moudgil</dc:creator>
      <dc:date>2016-02-28T01:37:32Z</dc:date>
    </item>
    <item>
      <title>PA</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-phase-1-is-working-now-but-phase-2-failing/m-p/2919288#M159012</link>
      <description>&lt;P&gt;PA&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;tail follow yes mp-log ikemgr.log&lt;BR /&gt;2016-02-27 18:43:06 [PROTO_NOTIFY]: notification message 36136:R-U-THERE, doi=1 proto_id=1 spi=a6c6be46186bbf71 31d44e89ea836da2 (size=16).&lt;BR /&gt;2016-02-27 18:43:16 [PROTO_NOTIFY]: notification message 36136:R-U-THERE, doi=1 proto_id=1 spi=a6c6be46186bbf71 31d44e89ea836da2 (size=16).&lt;BR /&gt;2016-02-27 18:43:20 [PROTO_NOTIFY]: ====&amp;gt; PHASE-1 NEGOTIATION STARTED AS INITIATOR, MAIN MODE &amp;lt;====&lt;BR /&gt;====&amp;gt; Initiated SA: 184.71.241.62[500]-68.145.154.173[500] cookie:c71da722ac08d724:0000000000000000 &amp;lt;====&lt;BR /&gt;2016-02-27 18:43:20 [INFO]: received Vendor ID: FRAGMENTATION&lt;BR /&gt;2016-02-27 18:43:20 [INFO]: received Vendor ID: CISCO-UNITY&lt;BR /&gt;2016-02-27 18:43:20 [INFO]: received Vendor ID: draft-ietf-ipsra-isakmp-xauth-06.txt&lt;BR /&gt;2016-02-27 18:43:20 [INFO]: received Vendor ID: DPD&lt;BR /&gt;2016-02-27 18:43:20 [PROTO_NOTIFY]: ====&amp;gt; PHASE-1 NEGOTIATION SUCCEEDED AS INITIATOR, MAIN MODE &amp;lt;====&lt;BR /&gt;====&amp;gt; Established SA: 184.71.241.62[500]-68.145.154.173[500] cookie:c71da722ac08d724:68407da551bafecf lifetime 86400 Sec &amp;lt;====&lt;BR /&gt;2016-02-27 18:43:26 [PROTO_NOTIFY]: notification message 36136:R-U-THERE, doi=1 proto_id=1 spi=a6c6be46186bbf71 31d44e89ea836da2 (size=16).&lt;BR /&gt;2016-02-27 18:43:36 [PROTO_NOTIFY]: notification message 36136:R-U-THERE, doi=1 proto_id=1 spi=a6c6be46186bbf71 31d44e89ea836da2 (size=16).&lt;BR /&gt;2016-02-27 18:43:46 [PROTO_NOTIFY]: notification message 36136:R-U-THERE, doi=1 proto_id=1 spi=a6c6be46186bbf71 31d44e89ea836da2 (size=16).&lt;BR /&gt;2016-02-27 18:43:56 [PROTO_NOTIFY]: notification message 36136:R-U-THERE, doi=1 proto_id=1 spi=a6c6be46186bbf71 31d44e89ea836da2 (size=16).&lt;BR /&gt;2016-02-27 18:44:06 [PROTO_NOTIFY]: notification message 36136:R-U-THERE, doi=1 proto_id=1 spi=a6c6be46186bbf71 31d44e89ea836da2 (size=16).&lt;BR /&gt;2016-02-27 18:44:16 [PROTO_NOTIFY]: notification message 36136:R-U-THERE, doi=1 proto_id=1 spi=a6c6be46186bbf71 31d44e89ea836da2 (size=16).&lt;BR /&gt;2016-02-27 18:44:20 [INFO]: ====&amp;gt; PHASE-1 SA LIFETIME EXPIRED &amp;lt;====&lt;BR /&gt;====&amp;gt; Expired SA: 184.71.241.62[500]-68.145.154.173[500] cookie:a6c6be46186bbf71:31d44e89ea836da2 &amp;lt;====&lt;BR /&gt;2016-02-27 18:44:20 [INFO]: ====&amp;gt; PHASE-1 SA DELETED &amp;lt;====&lt;BR /&gt;====&amp;gt; Deleted SA: 184.71.241.62[500]-68.145.154.173[500] cookie:a6c6be46186bbf71:31d44e89ea836da2 &amp;lt;====&lt;BR /&gt;2016-02-27 18:44:21 [INFO]: ====&amp;gt; PHASE-1 SA LIFETIME EXPIRED &amp;lt;====&lt;BR /&gt;====&amp;gt; Expired SA: 184.71.241.62[500]-68.145.154.173[500] cookie:c71da722ac08d724:68407da551bafecf &amp;lt;====&lt;BR /&gt;2016-02-27 18:44:21 [INFO]: ====&amp;gt; PHASE-1 SA DELETED &amp;lt;====&lt;BR /&gt;====&amp;gt; Deleted SA: 184.71.241.62[500]-68.145.154.173[500] cookie:c71da722ac08d724:68407da551bafecf &amp;lt;====&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I have added the log info from the PA.&lt;/P&gt;
&lt;P&gt;Will do the same for Cisco&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;MAhesh&lt;/P&gt;</description>
      <pubDate>Sun, 28 Feb 2016 01:53:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-phase-1-is-working-now-but-phase-2-failing/m-p/2919288#M159012</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2016-02-28T01:53:42Z</dc:date>
    </item>
    <item>
      <title>PA management interface is on</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-phase-1-is-working-now-but-phase-2-failing/m-p/2919289#M159013</link>
      <description>&lt;P&gt;&lt;/P&gt;
&lt;P&gt;PA management interface is on same subnet as Cisco LAN that is 10.0.0.0.&lt;/P&gt;
&lt;P&gt;Can this cause the issue?&lt;/P&gt;
&lt;P&gt;How can i send you config from Palo alto?&lt;/P&gt;</description>
      <pubDate>Sun, 28 Feb 2016 02:15:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-phase-1-is-working-now-but-phase-2-failing/m-p/2919289#M159013</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2016-02-28T02:15:59Z</dc:date>
    </item>
    <item>
      <title>Log from Cisco</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-phase-1-is-working-now-but-phase-2-failing/m-p/2919290#M159014</link>
      <description>&lt;P&gt;Log from Cisco&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Feb 27 2016 19:02:49: %ASA-6-113009: AAA retrieved default group policy (DfltGrpPolicy) for user = 184.71.241.62&lt;BR /&gt;Feb 27 2016 19:02:49: %ASA-5-713119: Group = 184.71.241.62, IP = 184.71.241.62, PHASE 1 COMPLETED&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Debug output&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Feb 27 2016 19:24:46: %ASA-7-715036: Group = 184.71.241.62, IP = 184.71.241.62, Sending keep-alive of type DPD R-U-THERE (seq number 0x21a80545)&lt;BR /&gt;Feb 27 2016 19:24:46: %ASA-7-715046: Group = 184.71.241.62, IP = 184.71.241.62, constructing blank hash payload&lt;BR /&gt;Feb 27 2016 19:24:46: %ASA-7-715046: Group = 184.71.241.62, IP = 184.71.241.62, constructing qm hash payload&lt;BR /&gt;Feb 27 2016 19:24:46: %ASA-7-713236: IP = 184.71.241.62, IKE_DECODE SENDING Message (msgid=37a2d4fd) with payloads : HDR + HASH (8) + NOTIFY (11) + NONE (0) total length : 80&lt;BR /&gt;Feb 27 2016 19:24:46: %ASA-7-713236: IP = 184.71.241.62, IKE_DECODE RECEIVED Message (msgid=123be3c) with payloads : HDR + HASH (8) + NOTIFY (11) + NONE (0) total length : 80&lt;BR /&gt;Feb 27 2016 19:24:46: %ASA-7-715047: Group = 184.71.241.62, IP = 184.71.241.62, processing hash payload&lt;BR /&gt;Feb 27 2016 19:24:46: %ASA-7-715047: Group = 184.71.241.62, IP = 184.71.241.62, processing notify payload&lt;BR /&gt;Feb 27 2016 19:24:46: %ASA-7-715075: Group = 184.71.241.62, IP = 184.71.241.62, Received keep-alive of type DPD R-U-THERE-ACK (seq number 0x21a80545)&lt;/P&gt;</description>
      <pubDate>Sun, 28 Feb 2016 02:26:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-phase-1-is-working-now-but-phase-2-failing/m-p/2919290#M159014</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2016-02-28T02:26:07Z</dc:date>
    </item>
    <item>
      <title>You can take screenshots from</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-phase-1-is-working-now-but-phase-2-failing/m-p/2919291#M159015</link>
      <description>&lt;P&gt;You can take screenshots from Palo Alto.&lt;/P&gt;
&lt;P&gt;Also a full running config from the ASA would be good.&lt;/P&gt;
&lt;P&gt;--&lt;/P&gt;
&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Sun, 28 Feb 2016 02:39:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-phase-1-is-working-now-but-phase-2-failing/m-p/2919291#M159015</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2016-02-28T02:39:34Z</dc:date>
    </item>
    <item>
      <title>I have attached screenshots</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-phase-1-is-working-now-but-phase-2-failing/m-p/2919292#M159016</link>
      <description>&lt;P&gt;I have attached screenshots from PA&lt;/P&gt;
&lt;P&gt;and full config from ASA&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;MAhesh&lt;/P&gt;</description>
      <pubDate>Sun, 28 Feb 2016 03:18:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-phase-1-is-working-now-but-phase-2-failing/m-p/2919292#M159016</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2016-02-28T03:18:02Z</dc:date>
    </item>
    <item>
      <title>It looks correct.  Have you</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-phase-1-is-working-now-but-phase-2-failing/m-p/2919293#M159017</link>
      <description>&lt;P&gt;It looks correct. &amp;nbsp;Have you double checked that the PSK is correct? perhaps re-enter it at both ends of the tunnel.&lt;/P&gt;
&lt;P&gt;--&lt;/P&gt;
&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Sun, 28 Feb 2016 06:48:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-phase-1-is-working-now-but-phase-2-failing/m-p/2919293#M159017</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2016-02-28T06:48:23Z</dc:date>
    </item>
    <item>
      <title>I put the PSK on both devices</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-phase-1-is-working-now-but-phase-2-failing/m-p/2919294#M159018</link>
      <description>&lt;P&gt;I put the PSK on both devices still same issue.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Logs from ASA&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Feb 28 2016 12:49:26: %ASA-6-302015: Built inbound UDP connection 36387 for outside:184.71.241.62/500 (184.71.241.62/500) to identity:68.145.154.173/500 (68.145.154.173/500)&lt;BR /&gt;Feb 28 2016 12:49:26: %ASA-6-113009: AAA retrieved default group policy (DfltGrpPolicy) for user = 184.71.241.62&lt;BR /&gt;Feb 28 2016 12:49:26: %ASA-5-713119: Group = 184.71.241.62, IP = 184.71.241.62, PHASE 1 COMPLETED&lt;BR /&gt;Feb 28 2016 12:49:26: %ASA-3-713061: Group = 184.71.241.62, IP = 184.71.241.62, Rejecting IPSec tunnel: no matching crypto map entry for remote proxy 172.16.0.0/255.255.255.0/0/0 local proxy 10.0.0.0/255.255.255.0/0/0 on interface outside&lt;BR /&gt;Feb 28 2016 12:49:26: %ASA-3-713902: Group = 184.71.241.62, IP = 184.71.241.62, QM FSM error (P2 struct &amp;amp;0xcc047590, mess id 0x13a9e9fd)!&lt;BR /&gt;Feb 28 2016 12:49:26: %ASA-3-713902: Group = 184.71.241.62, IP = 184.71.241.62, Removing peer from correlator table failed, no match!&lt;BR /&gt;Feb 28 2016 12:49:26: %ASA-5-713259: Group = 184.71.241.62, IP = 184.71.241.62, Session is being torn down. Reason: crypto map policy not found&lt;BR /&gt;Feb 28 2016 12:49:26: %ASA-4-113019: Group = 184.71.241.62, Username = 184.71.241.62, IP = 164.51.231.204, Session disconnected. Session Type: LAN-to-LAN, Duration: 0h:00m:00s, Bytes xmt: 0, Bytes rcv: 0, Reason: crypto map policy not found&lt;/P&gt;</description>
      <pubDate>Sun, 28 Feb 2016 19:54:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-phase-1-is-working-now-but-phase-2-failing/m-p/2919294#M159018</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2016-02-28T19:54:48Z</dc:date>
    </item>
    <item>
      <title>Your ASA configuration looks</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-phase-1-is-working-now-but-phase-2-failing/m-p/2919295#M159019</link>
      <description>&lt;P&gt;Your ASA configuration looks fine. &amp;nbsp;I believe the issue is on the Palo Alto and how it handles the VPN traffic. Unfortunately my knowledge of Palo Alto is very deep.&lt;/P&gt;
&lt;P&gt;--&lt;/P&gt;
&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Sun, 28 Feb 2016 19:56:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-phase-1-is-working-now-but-phase-2-failing/m-p/2919295#M159019</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2016-02-28T19:56:47Z</dc:date>
    </item>
    <item>
      <title>I will keep troubleshooting</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-phase-1-is-working-now-but-phase-2-failing/m-p/2919296#M159020</link>
      <description>&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I will keep troubleshooting will update you.&lt;/P&gt;
&lt;P&gt;Best Regards&lt;/P&gt;
&lt;P&gt;Mahesh&lt;/P&gt;</description>
      <pubDate>Sun, 28 Feb 2016 20:00:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-phase-1-is-working-now-but-phase-2-failing/m-p/2919296#M159020</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2016-02-28T20:00:22Z</dc:date>
    </item>
    <item>
      <title>Phase 2 is up now seems ASA</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-phase-1-is-working-now-but-phase-2-failing/m-p/2919297#M159021</link>
      <description>&lt;P&gt;Phase 2 is up now seems ASA was missing&lt;/P&gt;
&lt;P&gt;crypto map CRYPTO-MAP 1 match address VPN-INTERESTING-TRAFFIC&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;Mahesh&lt;/P&gt;</description>
      <pubDate>Sun, 28 Feb 2016 20:32:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-phase-1-is-working-now-but-phase-2-failing/m-p/2919297#M159021</guid>
      <dc:creator>mahesh18</dc:creator>
      <dc:date>2016-02-28T20:32:37Z</dc:date>
    </item>
    <item>
      <title>really?  the config you</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-phase-1-is-working-now-but-phase-2-failing/m-p/2919298#M159022</link>
      <description>&lt;P&gt;really? &amp;nbsp;the config you posted had it there:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;crypto map CRYPTO-MAP 1 match address VPN-INTERESTING-TRAFFIC
crypto map CRYPTO-MAP 1 set pfs group5
crypto map CRYPTO-MAP 1 set peer 184.71.241.62 
crypto map CRYPTO-MAP 1 set ikev1 transform-set VPN-TRANSFORM
&amp;lt;--- More ---&amp;gt;
              
crypto map CRYPTO-MAP 1 set security-association lifetime seconds 86400&lt;/PRE&gt;
&lt;P&gt;--&lt;/P&gt;
&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Sun, 28 Feb 2016 20:49:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-phase-1-is-working-now-but-phase-2-failing/m-p/2919298#M159022</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2016-02-28T20:49:33Z</dc:date>
    </item>
  </channel>
</rss>

