I’ve been going in circles trying to troubleshoot an IPSec tunnel and realized I need another set of eyes and some suggestions on where to look.
Background: Set up a site to site tunnel in early August, ran a test vpn ike-sa gateway XXX and test vpn ipsec-sa tunnel XXX and everything came up fine. Walked away because we didn’t need it at the time.
I come back to this now (when we need it) and I can’t get the tunnel to come up again. Nothing changed on the firewall configs.
SO…
I went ahead and rebuilt the tunnel from scratch, same config settings, nada. I’ve spent a few days on this.
I can see an ipsec-esp-udp flow between both firewalls in the session browser, but ike and ipsec never establish.
Crypto profiles are the exact same between devices.
I have pasted config from both firewalls below. On Firewall A there are a bunch of other tunnels all working perfectly fine…
Any thoughts on where to look next? Not that it matters but this is between a PA-820 and a PA-850.
Firewall A:
ike gateway
FirewallB_DC {
authentication {
pre-shared-key {
key -
}
}
protocol {
ikev1 {
dpd {
enable yes;
}
}
ikev2 {
dpd {
enable yes;
}
ike-crypto-profile IKEv2-AES256-SHA;
}
version ikev2-preferred;
}
protocol-common {
nat-traversal {
enable yes;
}
fragmentation {
enable no;
}
passive-mode yes;
}
local-address {
interface ethernet1/3;
ip ;
}
peer-address {
dynamic;
}
peer-id {
id [email protected];
type ufqdn;
}
local-id {
id ;
type ipaddr;
}
}
IPSEC:
FirewallB_S2S {
auto-key {
ike-gateway {
FirewallB_DC;
}
ipsec-crypto-profile default;
}
tunnel-monitor {
enable no;
}
tunnel-interface tunnel.30;
enable-gre-encapsulation yes;
}
Firewall B
gateway {
PIT_DC {
authentication {
pre-shared-key {
key - <key>
}
}
protocol {
ikev1 {
dpd {
enable yes;
}
}
ikev2 {
dpd {
enable yes;
}
ike-crypto-profile IKEv2-AES256-SHA;
}
version ikev2-preferred;
}
protocol-common {
nat-traversal {
enable yes;
}
passive-mode no;
fragmentation {
enable no;
}
}
local-address {
interface ethernet1/1;
}
peer-address {
ip <public ip>;
}
local-id {
id [email protected];
type ufqdn;
}
disabled no;
peer-id {
id <public ip>;
type ipaddr;
}
}
}
}
IPSEC:
ipsec {
FirewallA_S2S {
auto-key {
ike-gateway {
FirewallA;
}
ipsec-crypto-profile default;
}
tunnel-monitor {
enable no;
}
tunnel-interface tunnel.30;
enable-gre-encapsulation yes;
}
}
Firewall B has an address assigned via DHCP.
Firewall A ikemgr.log shows nothing from Firewall B, and Firewall B’s log shows it sending the init and then just sitting there forever before timing out.
Given that this is fairly simple I feel like I must be overlooking something really stupid.
Any thoughts?
Thanks!