Hi there,
I am new to this forum so bear with me.
I am attempting to setup an IPSec tunnel between one of our branch offices and our Palo Alto VM300 in Azure.
I have quadruple checked all the connection details, phase 1, phase 2 etc exactly match.
We already have another branch office connecting successfully to the same Palo Alto, so we exported the configuration from that site, and imported it into this new site’s config.
After the import, all details (basic configuration) was updated to reflect unique site including IPSec details.
The following has also been added:
• 50 ipsec-esp accepted on the forward chain
• UDP Port 500, 1701, 4500 accepted on the forward chain
• Srcnat accept rule #0 (Before default masquerade) added from the branch net to the remote net
I have also enabled ipsec logs; and get the following messages now.
Phase 1 negotiation failed due to time up from source port 500 to destination port 500
Now as this currently work in our other office and has the exact same config.
- Why am I not seeing the internal SRCNAT being hit at all?
- I have confirmed via netcat that the UDP ports are also allowed on both ends.
See below logs; IP addresses amended to not reflect our public IP’s
11:59:24 ipsec ipsec: 192.168.20.1 request for establishing IPsec-SA was queued due to no phase1 found.
11:59:24 ipsec ipsec: 192.168.20.1 phase2 negotiation failed due to time up waiting for phase1. AH 192.168.20.1[0]->192.168.40.1[0]
11:59:24 ipsec ipsec: delete phase 2 handler.
11:59:27 ipsec,error phase1 negotiation failed due to time up 192.168.40.1[500]<=>192.168.20.1[500] 7d4fd01e64e52f68:0000000000000000
11:59:27 ipsec,error ipsec: phase1 negotiation failed due to time up 192.168.40.1[500]<=>192.168.20.1[500] 7d4fd01e64e52f68:0000000000000000
11:59:27 ipsec,debug ipsec: 344 bytes from 192.168.40.1[500] to 41.160.185.171[500]
11:59:27 ipsec,debug ipsec: 1 times of 344 bytes message will be sent to 41.160.185.171[500]
11:59:27 ipsec,debug,packet ipsec: 1f2530a2 11acee92 00000000 00000000 01100200 00000000 00000158 0d000038
11:59:27 ipsec,debug,packet ipsec: 00000001 00000001 0000002c 01010001 00000024 01010000 800b0001 800c0e10
11:59:27 ipsec,debug,packet ipsec: 80010007 800e0100 80030001 80020002 80040002 0d000014 4a131c81 07035845
11:59:27 ipsec,debug,packet ipsec: 5c5728f2 0e95452f 0d000014 8f8d8382 6d246b6f c7a8a6a4 28c11de8 0d000014
11:59:27 ipsec,debug,packet ipsec: 439b59f8 ba676c4c 7737ae22 eab8f582 0d000014 4d1e0e13 6deafa34 c4f3ea9f
11:59:27 ipsec,debug,packet ipsec: 02ec7285 0d000014 80d0bb3d ef54565e e84645d4 c85ce3ee 0d000014 9909b64e
11:59:27 ipsec,debug,packet ipsec: ed937c65 73de52ac e952fa6b 0d000014 7d9419a6 5310ca6f 2c179d92 15529d56
11:59:27 ipsec,debug,packet ipsec: 0d000014 cd604643 35df21f8 7cfdb2fc 68b6a448 0d000014 90cb8091 3ebb696e
11:59:27 ipsec,debug,packet ipsec: 086381b5 ec427b1f 0d000014 16f6ca16 e4a4066d 83821a0f 0aeaa862 0d000014
11:59:27 ipsec,debug,packet ipsec: 4485152d 18b6bbcd 0be8a846 9579ddcc 0d000014 12f5f28c 457168a9 702d9fe2
11:59:27 ipsec,debug,packet ipsec: 74cc0100 00000014 afcad713 68a1f1c9 6b8696fc 77570100
11:59:37 ipsec,debug ipsec: ===
11:59:37 ipsec,info initiate new phase 1 (Identity Protection): 192.168.40.1[500]<=>192.168.20.1[500]
11:59:37 ipsec,info ipsec: initiate new phase 1 (Identity Protection): 192.168.40.1[500]<=>192.168.20.1[500]
11:59:37 ipsec,debug ipsec: new cookie:
11:59:37 ipsec,debug ipsec: a7a60417e619fbb3\18
11:59:37 ipsec,debug ipsec: add payload of len 48, next type 13
11:59:37 ipsec,debug ipsec: add payload of len 16, next type 13
11:59:37 ipsec,debug ipsec: add payload of len 16, next type 13
11:59:37 ipsec,debug ipsec: add payload of len 16, next type 13
11:59:37 ipsec,debug ipsec: add payload of len 16, next type 13
11:59:37 ipsec,debug ipsec: add payload of len 16, next type 13
11:59:37 ipsec,debug ipsec: add payload of len 16, next type 13
11:59:37 ipsec,debug ipsec: add payload of len 16, next type 13
11:59:37 ipsec,debug ipsec: add payload of len 16, next type 13
11:59:37 ipsec,debug ipsec: add payload of len 16, next type 13
11:59:37 ipsec,debug ipsec: add payload of len 16, next type 13
11:59:37 ipsec,debug ipsec: add payload of len 16, next type 13
11:59:37 ipsec,debug ipsec: add payload of len 16, next type 13
11:59:37 ipsec,debug ipsec: add payload of len 16, next type 0
11:59:37 ipsec,debug ipsec: 340 bytes from 192.168.40.1[500] to 192.168.20.1[500]
11:59:37 ipsec,debug ipsec: 1 times of 340 bytes message will be sent to 192.168.20.1[500]
11:59:37 ipsec,debug,packet ipsec: a7a60417 e619fbb3 00000000 00000000 01100200 00000000 00000154 0d000034
11:59:37 ipsec,debug,packet ipsec: 00000001 00000001 00000028 01010001 00000020 01010000 800b0001 800c0e10
11:59:37 ipsec,debug,packet ipsec: 80010005 80030001 80020002 80040002 0d000014 4a131c81 07035845 5c5728f2
11:59:37 ipsec,debug,packet ipsec: 0e95452f 0d000014 8f8d8382 6d246b6f c7a8a6a4 28c11de8 0d000014 439b59f8
11:59:37 ipsec,debug,packet ipsec: ba676c4c 7737ae22 eab8f582 0d000014 4d1e0e13 6deafa34 c4f3ea9f 02ec7285
11:59:37 ipsec,debug,packet ipsec: 0d000014 80d0bb3d ef54565e e84645d4 c85ce3ee 0d000014 9909b64e ed937c65
11:59:37 ipsec,debug,packet ipsec: 73de52ac e952fa6b 0d000014 7d9419a6 5310ca6f 2c179d92 15529d56 0d000014
11:59:37 ipsec,debug,packet ipsec: cd604643 35df21f8 7cfdb2fc 68b6a448 0d000014 90cb8091 3ebb696e 086381b5
11:59:37 ipsec,debug,packet ipsec: ec427b1f 0d000014 16f6ca16 e4a4066d 83821a0f 0aeaa862 0d000014 4485152d
11:59:37 ipsec,debug,packet ipsec: 18b6bbcd 0be8a846 9579ddcc 0d000014 12f5f28c 457168a9 702d9fe2 74cc0100
11:59:37 ipsec,debug,packet ipsec: 00000014 afcad713 68a1f1c9 6b8696fc 77570100
11:59:37 ipsec ipsec: sent phase1 packet 192.168.40.1[500]<=>192.168.20.1[500] a7a60417e619fbb3:0000000000000000
11:59:37 ipsec,debug ipsec: 1 times of 344 bytes message will be sent to 41.160.185.171[500]
11:59:37 ipsec,debug,packet ipsec: 1f2530a2 11acee92 00000000 00000000 01100200 00000000 00000158 0d000038
11:59:37 ipsec,debug,packet ipsec: 00000001 00000001 0000002c 01010001 00000024 01010000 800b0001 800c0e10
11:59:37 ipsec,debug,packet ipsec: 80010007 800e0100 80030001 80020002 80040002 0d000014 4a131c81 07035845
11:59:37 ipsec,debug,packet ipsec: 5c5728f2 0e95452f 0d000014 8f8d8382 6d246b6f c7a8a6a4 28c11de8 0d000014
11:59:37 ipsec,debug,packet ipsec: 439b59f8 ba676c4c 7737ae22 eab8f582 0d000014 4d1e0e13 6deafa34 c4f3ea9f
11:59:37 ipsec,debug,packet ipsec: 02ec7285 0d000014 80d0bb3d ef54565e e84645d4 c85ce3ee 0d000014 9909b64e
11:59:37 ipsec,debug,packet ipsec: ed937c65 73de52ac e952fa6b 0d000014 7d9419a6 5310ca6f 2c179d92 15529d56
11:59:37 ipsec,debug,packet ipsec: 0d000014 cd604643 35df21f8 7cfdb2fc 68b6a448 0d000014 90cb8091 3ebb696e
11:59:37 ipsec,debug,packet ipsec: 086381b5 ec427b1f 0d000014 16f6ca16 e4a4066d 83821a0f 0aeaa862 0d000014
11:59:37 ipsec,debug,packet ipsec: 4485152d 18b6bbcd 0be8a846 9579ddcc 0d000014 12f5f28c 457168a9 702d9fe2
11:59:37 ipsec,debug,packet ipsec: 74cc0100 00000014 afcad713 68a1f1c9 6b8696fc 77570100