IPSEC Troubleshooting Palo Alto 1699387222
IPSEC Troubleshooting Palo Alto 1699387222
com
________________________________________________________________________________________________
IKE Phase 1
IKE Phase 2
Check if the firewalls are negotiating the tunnels, and ensure that 2unidirectional SPIs exist:
> show vpn ipsec-sa
> show vpn ipsec-sa tunnel <tunnel.name>
Check if proposals are correct. If incorrect, logs about the mismatch can be found under the
system logs under the monitor tab, or by using the following command:
Check if pfs is enabled on both ends. If incorrect, logs about the mismatch can be found under the
system logs under the monitor tab, or by using the command:
Check the proxy-id configuration. This is usually not required when the tunnel is between two
Palo Alto Networks firewalls, but when the peer is from another vendor, IDs usually need to be
configured. A mismatch would be indicated under the system logs, or by using the command:
www.nettechcloud.com | sales@nettechcloud.com
> show vpn flow name <tunnel.id/tunnel.name>
Check if encapsulation and decapsulation bytes are increasing. If the firewall is passing traffic,
then both values should be increasing.
If encapsulation bytes are increasing and decapsulation is constant, then the firewall is
sending but not receiving packets.
Check to see if a policy is dropping the traffic or if a port translating device in front of PAN that
might be dropping the ESP packets.
If decapsulation bytes are increasing and encapsulation is constant, then the firewall is receiving
but not transmitting packets.
Check to see if a policy is dropping the traffic:
www.nettechcloud.com | sales@nettechcloud.com
Interpret VPN Error Messages
IF ERROR IS THIS
ERROR 1: IKE phase-1 negotiation is failed as initiator, main mode. Failed SA: x.x.x.x [500]-
y.y.y.y[500]cookie:84222f276c2fa2e9:0000000000000000due to timeout.
OR
ERROR 2: IKE phase 1 negotiation is failed. Couldn’t find configuration for IKE phase-1 request for peer
IP x.x.x.x [1929]
RESOLUTION
- Verify that the public IP address for each VPN peer is accurate in the IKE Gateway configuration
-Verify that the IP addresses can be pinged and that routing issues are not causing the connection
failure
OR
ERROR 4: Received unencrypted notify payload (no proposal chosen) from IP x.x.x.x[500] to
y.y.y.y[500], ignored..
RESOLUTION
-Check the IKE Crypto profile configuration to verify that the proposals on both sides have a common
encryption, authentication, and DH Group proposal
-Check the IKE Crypto profile configuration to verify that the proposals on both sides have a common
encryption, authentication, and DH Group proposal
OR
ERROR 6: IKE phase-2 negotiation failed when processing SA payload. No suitable proposal found in
peer’s SA payload
RESOLUTION
www.nettechcloud.com | sales@nettechcloud.com
pfs is either enabled or disabled on both VPN peers
the DH Groups proposed by each peer has at least one DH Group in common
ERROR 7: IKE phase-2 negotiation failed when processing Proxy ID. Received local id x.x.x.x/x type
IPv4 address protocol 0port 0, received remote id y.y.y.y/y type IPv4 address protocol 0 port 0.
RESOLUTION
The VPN peer on one end is using policy-based VPN. You must configure a Proxy ID on the Palo Alto
Networks firewall
You can Buy Complete Palo Alto Firewall Troubleshooting Course (Recorded Videos with Practical
demonstration) from
https://nettechcloud.com/courses/troubleshooting-palo-alto-firewall-panos-10/?tab=tab-overview
www.nettechcloud.com | sales@nettechcloud.com