12-19-2022 06:56 AM
We have a firepower running in vmware and are using firepower device manager to manage the device.
but sporadically we get the message IPSEC:Received an ESP packet from [SiteB] to [SiteA] that failed authentication
But I can't find out what is causing this error anybody has an idea, when I get the message the tunnel is also down for like 45 minutes.
IKE policy is set as following:
Encryption AES192
DFH: 14
Integrity hash: SHA256
PRF hash: SHA256
Lifetime: 86400
IPSEC proposal
Encryption AESGCM192
Integrity hash: SHA256
12-27-2022 04:39 PM
sorry for late reply but are this issue solved ?
are you run IKEv2?
12-29-2022 01:08 AM
Yes I'm running IKEv2
I have now replaced the IPSEC proposal encryption from AESGCM192 to AES192 and I'm monitoring to see if they are going down
12-28-2022 02:39 AM
My initial though here is that this is a timeout / lifetime issue. Have you verified the timeout values at both ends of the s2s VPN?
12-29-2022 01:08 AM
Yes timout is set to 8 hours
01-03-2023 03:04 AM
is this a site to site VPN, DMVPN, FlexVPN, etc.?
is one of the sites using dynamic IP or are both static?
If the issue happens again, check the output of show crypto ipsec sa and verify if the SPI values are the same for the interesting traffic.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide