<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: VPN Tunnel instability in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/vpn-tunnel-instability/m-p/1494790#M631835</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It could be that the fortigate is maintainig the old IPSec SAs after the lifetime expiration and preventing the PIX from renegotiating new IPSec SAs. The 86400 sec lifetime seems high for phase 2. You can test lowering the IPSec SA lifetime value to 3600 seconds to see if it helps with the stability. A more frequent renegotation of IPSec SAs may help prevent this situation from happening.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff; text-decoration: underline; "&gt;&lt;A href="http://www.cisco.com/en/US/docs/security/asa/asa72/command/reference/c5_72.html#wp2064458"&gt;http://www.cisco.com/en/US/docs/security/asa/asa72/command/reference/c5_72.html#wp2064458&lt;/A&gt;&lt;/SPAN&gt;&lt;A href="http://www.cisco.com/en/US/docs/security/asa/asa72/command/reference/c5_72.html#wp2064458"&gt;http://www.cisco.com/en/US/docs/security/asa/asa72/command/reference/c5_72.html#wp2064458&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sat, 21 Aug 2010 01:00:11 GMT</pubDate>
    <dc:creator>witsang</dc:creator>
    <dc:date>2010-08-21T01:00:11Z</dc:date>
    <item>
      <title>VPN Tunnel instability</title>
      <link>https://community.cisco.com/t5/network-security/vpn-tunnel-instability/m-p/1494789#M631834</link>
      <description>&lt;P&gt;Hello Experts,&lt;/P&gt;&lt;P&gt;I am facing some issues with vpn tunnel.I have formed the vpn tunnel between cisco pix (ver 7.2) and fortigate(othervendor).&lt;/P&gt;&lt;P&gt;Once i initiate tunnel from fortigate i can see ike phase up with ipsec up&lt;/P&gt;&lt;P&gt;for eg 1 IKE and 5 IPSEC and all subnets will be reachable at that moment aftersome time few subnets go unreachable.When i check pix i can see IKE phase will be fine but 2 IPSEC up. what might be the reason for this instability?&lt;/P&gt;&lt;P&gt;i set 86400 sec for both phase 1 and phase 2 on both devices&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;KG&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 18:26:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-tunnel-instability/m-p/1494789#M631834</guid>
      <dc:creator>pramod</dc:creator>
      <dc:date>2019-03-11T18:26:24Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Tunnel instability</title>
      <link>https://community.cisco.com/t5/network-security/vpn-tunnel-instability/m-p/1494790#M631835</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It could be that the fortigate is maintainig the old IPSec SAs after the lifetime expiration and preventing the PIX from renegotiating new IPSec SAs. The 86400 sec lifetime seems high for phase 2. You can test lowering the IPSec SA lifetime value to 3600 seconds to see if it helps with the stability. A more frequent renegotation of IPSec SAs may help prevent this situation from happening.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;crypto ipsec security-association lifetime&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff; text-decoration: underline; "&gt;&lt;A href="http://www.cisco.com/en/US/docs/security/asa/asa72/command/reference/c5_72.html#wp2064458"&gt;http://www.cisco.com/en/US/docs/security/asa/asa72/command/reference/c5_72.html#wp2064458&lt;/A&gt;&lt;/SPAN&gt;&lt;A href="http://www.cisco.com/en/US/docs/security/asa/asa72/command/reference/c5_72.html#wp2064458"&gt;http://www.cisco.com/en/US/docs/security/asa/asa72/command/reference/c5_72.html#wp2064458&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 21 Aug 2010 01:00:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/vpn-tunnel-instability/m-p/1494790#M631835</guid>
      <dc:creator>witsang</dc:creator>
      <dc:date>2010-08-21T01:00:11Z</dc:date>
    </item>
  </channel>
</rss>

