12-07-2016 02:50 AM - edited 02-21-2020 09:05 PM
Has anyone had any experience with the following:
i have an ASA 5510 at a branch location and im trying to set up an ipsec s2s between the two. The ASA gets its external address from the the provider via dhcp and the Palo Alto is static.
When configuring the Palo end, i set the peer device as dynamic. However it still requires an identifier, either an IP address or a FQDN. Is there a way of setting up a FQDN within the ASA e.g something@mycompany.com so the Palo can use this?
12-07-2016 10:12 AM
hello networkops3 ,
FQDN is generally used in case wherein the authentication is via certificate in case of authentication via pre-shared key we generally use identity as IP address
You can look at the current identity set on
sh run all crypto
please consider other tunnels as well since making any changes for identity might affect other tunnels.
Please mark as correct if helpful
thanks
Shakti
12-07-2016 04:11 PM
Hi Shakti,
Using the IP address is not an option as there is no guarantee of retaining that IP fas its DHCP. In the end i used - crypto isakmp identity hostname.
This worked after leaving the ASA disconnected and getting a new IP from ISP.
03-09-2017 11:08 AM
Hi
try this,
pr-fw01(config)# crypto isakmp identity ?
configure mode commands/options:
address Use the IP address of the interface for the identity
auto Identity automatically determined by the connection type: IP
address for preshared key and Cert DN for Cert based connections
hostname Use the hostname of the router for the identity
key-id Use the specified key-id for the identity
pr-fw01(config)# crypto isakmp identity k
pr-fw01(config)# crypto isakmp identity key-id ?
configure mode commands/options:
WORD key-id string
pr-fw01(config)# crypto isakmp identity key-id "peer_identified"
Andrea
06-28-2018 12:23 AM
It's been a while for this thread but wanted to give it a shot.
I have a similar situation but the remote end is a C867VAE with a 3G Sim card. I tried using the hostname as the tunnel identifier but still I see Phase1 mismatch issues from PA end.
I even tried enabling NAT-T on both ends (no crypto ipsec nat-transparency udp-encapsulation). However, the PA sees IKE messages from three different public IP's ( different IP's assigned for NAT'ing through the mobile service provider) and using the hostname hasn't worked for me either.
Has anyone had luck with this in a similar 3G setup?
Thanks,
Gihan
09-11-2024 01:12 PM
hi networkops3,
similar situation, palo alto FW static but ASA getting ip via dhcp from ISP. To be clear, you only configured the crypto isakmp identity hostname (ASA hostname) and it worked?. What was the identity on the PA FW side you used?
09-11-2024 09:50 PM
With host name you need ddns to make Asa change name<->IP whenever it receives new IP from ISP
Or simply use dynamic Ipsec
MHM
09-12-2024 09:09 AM
The value you would need to select on the Palo from the remote identification dropdown menu would be FQDN and then you add the ASA hostname in there. You don't have to configure any local identification on the Palo as if none is defined the Palo will use its local IP during the negotiation with the ASA.
09-16-2024 12:07 PM - edited 09-16-2024 01:39 PM
Adding the hostname of the ASA to the following field did not work. In fact, PA FW is giving me the error: IKE phase-1 negotiation is failed. Could not find configuration for IKE phase-1 request for peer IP. Still investigating. CORRECTION TO THE PICTURE BELOW: On the ASA side, I configured as crypto isakmp identity the HOSTAME not key-id.
09-24-2024 02:28 AM
Did you manage to resolve this issue in the end?
09-24-2024 06:56 AM
SOLUTION: It does NOT work with IKEV1, with IKEV2 using the HOSTNAME of the ASA in the FQDN (hostname) field of the Palo Alto FW made the trick and worked. We tried also the KEY-ID in the PA FW field but you must CONVERT the key-id value from the ASA configuration to HEX and use that HEX value in the PA FW field.
We use the following link for convertion: https://www.rapidtables.com/convert/number/ascii-to-hex.html
09-24-2024 07:03 AM
I think the issue is ASA use IP as Peer-ID by default for IKEv1
you need to config ASA to use Hostname as Peer-ID
MHM
09-24-2024 07:09 AM
In fact, I would not use IKEV1 anymore because it has been deprecated as per the IETF.
09-24-2024 07:11 AM
just for notice
sure IKEv2 is more secure
MHM
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide