<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: IKE pre-shared key VPN dynamic ip in Security e-Series</title>
    <link>https://community.hpe.com/t5/security-e-series/ike-pre-shared-key-vpn-dynamic-ip/m-p/6894793#M558</link>
    <description>&lt;P&gt;Howdy,&lt;/P&gt;&lt;P&gt;Just a couple of things -&lt;/P&gt;&lt;P&gt;1) If you can only see DES and SHA and no AES could it be because you haven't generated your (free) High-Encryption license and installed the key? There are restrictions on who can download a license key to enable the higher grade ciphers &amp;amp; algorythms based on your country of residence. You can get hold of this license by registering your device in the "My Networking" portal (sign in with your HPE Passport credentials) and if you are entitled to the license it should appear in "My Licenses" ready for download.&lt;/P&gt;&lt;P&gt;2) Check the Blog &lt;A href="http://www.networktasks.co.uk/environments/hp/comware-v5/hp-msr935-and-cisco-asa-ipsec-vpn" target="_blank"&gt;post &lt;/A&gt;that Phil Kennedy, one of our UK MASE Engineers, put together - it's a Cisco MSR inter-op example that you should be able to adapt to your use case.&lt;/P&gt;&lt;P&gt;Let us know how you get on and give us some feedback.&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Ian&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 31 Aug 2016 20:35:16 GMT</pubDate>
    <dc:creator>Ian Vaughan</dc:creator>
    <dc:date>2016-08-31T20:35:16Z</dc:date>
    <item>
      <title>IKE pre-shared key VPN dynamic ip</title>
      <link>https://community.hpe.com/t5/security-e-series/ike-pre-shared-key-vpn-dynamic-ip/m-p/6894535#M554</link>
      <description>&lt;P&gt;I am tyring to setup an IKE vpn from a Palo Alto to a MSR2003. &amp;nbsp;I can't seem to figure it out. &amp;nbsp;I can get the phase1 and phase2 to talk on the Palo Alto however on the HP router I do display ipsec sa and it's blank. &amp;nbsp;Can't seem to get the 2 to talk properly.&lt;/P&gt;&lt;P&gt;I'm using comcast on the spoke end with a dynamic ip &amp;nbsp;G0/0 get's ip through Comcast using DHCP. &amp;nbsp;However current configuration shows it statically assigned. &amp;nbsp;I've tried them both to no avail.&lt;/P&gt;&lt;P&gt;I'm also unable to get any other encryption than des and sha1. &amp;nbsp;I assumed that was because fips was not enabled. &amp;nbsp;I do not have the command to enable fips.....&lt;/P&gt;&lt;P&gt;I've posted my configuration so far.....&lt;/P&gt;&lt;P&gt;show current-configuration&lt;BR /&gt;#&lt;BR /&gt;version 7.1.059, Release 0304P15&lt;BR /&gt;#&lt;BR /&gt;sysname CypressSwamp&lt;BR /&gt;#&lt;BR /&gt;dhcp enable&lt;BR /&gt;#&lt;BR /&gt;dns domain co.cal.md.us&lt;BR /&gt;dns server 75.75.75.75&lt;BR /&gt;dns server 75.75.76.76&lt;BR /&gt;#&lt;BR /&gt;password-recovery enable&lt;BR /&gt;#&lt;BR /&gt;vlan 1&lt;BR /&gt;#&lt;BR /&gt;dhcp server ip-pool LAN&lt;BR /&gt;gateway-list 10.10.10.250&lt;BR /&gt;network 10.10.10.0 mask 255.255.255.0&lt;BR /&gt;address range 10.10.10.100 10.10.10.120&lt;BR /&gt;dns-list 75.75.75.75 75.75.76.76&lt;BR /&gt;#&lt;BR /&gt;controller Cellular0/0&lt;BR /&gt;#&lt;BR /&gt;interface Aux0&lt;BR /&gt;#&lt;BR /&gt;interface NULL0&lt;BR /&gt;#&lt;BR /&gt;interface GigabitEthernet0/0&lt;BR /&gt;port link-mode route&lt;BR /&gt;description WAN&lt;BR /&gt;ip address 50.78.77.11 255.255.255.248&lt;BR /&gt;nat outbound address-group 1 no-pat&lt;BR /&gt;ipsec apply policy map1&lt;BR /&gt;#&lt;BR /&gt;interface GigabitEthernet0/1&lt;BR /&gt;port link-mode route&lt;BR /&gt;description LAN&lt;BR /&gt;ip address 10.10.10.250 255.255.255.0&lt;BR /&gt;#&lt;BR /&gt;scheduler logfile size 16&lt;BR /&gt;#&lt;BR /&gt;line class aux&lt;BR /&gt;user-role network-admin&lt;BR /&gt;#&lt;BR /&gt;line class tty&lt;BR /&gt;user-role network-operator&lt;BR /&gt;#&lt;BR /&gt;line class vty&lt;BR /&gt;user-role network-operator&lt;BR /&gt;#&lt;BR /&gt;line aux 0&lt;BR /&gt;user-role network-admin&lt;BR /&gt;#&lt;BR /&gt;line vty 0 63&lt;BR /&gt;user-role network-operator&lt;BR /&gt;#&lt;BR /&gt;ip route-static 0.0.0.0 0 50.78.77.14&lt;BR /&gt;#&lt;BR /&gt;acl advanced name NATOut&lt;BR /&gt;rule 0 permit ip source 10.10.10.0 0.0.0.255&lt;BR /&gt;#&lt;BR /&gt;domain system&lt;BR /&gt;#&lt;BR /&gt;domain default enable system&lt;BR /&gt;#&lt;BR /&gt;role name level-0&lt;BR /&gt;description Predefined level-0 role&lt;BR /&gt;#&lt;BR /&gt;role name level-1&lt;BR /&gt;description Predefined level-1 role&lt;BR /&gt;#&lt;BR /&gt;role name level-2&lt;BR /&gt;description Predefined level-2 role&lt;BR /&gt;#&lt;BR /&gt;role name level-3&lt;BR /&gt;description Predefined level-3 role&lt;BR /&gt;#&lt;BR /&gt;role name level-4&lt;BR /&gt;description Predefined level-4 role&lt;BR /&gt;#&lt;BR /&gt;role name level-5&lt;BR /&gt;description Predefined level-5 role&lt;BR /&gt;#&lt;BR /&gt;role name level-6&lt;BR /&gt;description Predefined level-6 role&lt;BR /&gt;#&lt;BR /&gt;role name level-7&lt;BR /&gt;description Predefined level-7 role&lt;BR /&gt;#&lt;BR /&gt;role name level-8&lt;BR /&gt;description Predefined level-8 role&lt;BR /&gt;#&lt;BR /&gt;role name level-9&lt;BR /&gt;description Predefined level-9 role&lt;BR /&gt;#&lt;BR /&gt;role name level-10&lt;BR /&gt;description Predefined level-10 role&lt;BR /&gt;#&lt;BR /&gt;role name level-11&lt;BR /&gt;description Predefined level-11 role&lt;BR /&gt;#&lt;BR /&gt;role name level-12&lt;BR /&gt;description Predefined level-12 role&lt;BR /&gt;#&lt;BR /&gt;role name level-13&lt;BR /&gt;description Predefined level-13 role&lt;BR /&gt;#&lt;BR /&gt;role name level-14&lt;BR /&gt;description Predefined level-14 role&lt;BR /&gt;#&lt;BR /&gt;user-group system&lt;BR /&gt;#&lt;BR /&gt;ipsec transform-set calvert&lt;BR /&gt;esp encryption-algorithm des-cbc&lt;BR /&gt;esp authentication-algorithm sha1&lt;BR /&gt;#&lt;BR /&gt;nat address-group 1&lt;BR /&gt;address 50.78.77.11 50.78.77.11&lt;BR /&gt;#&lt;BR /&gt;ike keychain keychain1&lt;BR /&gt;pre-shared-key address 64.26.88.100 255.255.255.248 key cipher&amp;nbsp;left intentionally blank&lt;BR /&gt;#&lt;BR /&gt;return&lt;/P&gt;</description>
      <pubDate>Wed, 31 Aug 2016 11:36:42 GMT</pubDate>
      <guid>https://community.hpe.com/t5/security-e-series/ike-pre-shared-key-vpn-dynamic-ip/m-p/6894535#M554</guid>
      <dc:creator>tmoez</dc:creator>
      <dc:date>2016-08-31T11:36:42Z</dc:date>
    </item>
    <item>
      <title>Re: IKE pre-shared key VPN dynamic ip</title>
      <link>https://community.hpe.com/t5/security-e-series/ike-pre-shared-key-vpn-dynamic-ip/m-p/6894546#M555</link>
      <description>&lt;P&gt;Hi there ,&lt;/P&gt;&lt;P&gt;i made a small research regarding fips and found these steps..maybe they apply to your case :&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;SPAN class="s1"&gt;Steps to enable FIPS mode:&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Follow the procedure in the following article to enable FIPS mode on firewall 1: &lt;A href="https://live.paloaltonetworks.com/t5/Management-Articles/How-to-Enable-or-Disable-Common-Criteria-CCEAL4-Mode/ta-p/58679" target="_blank"&gt;How to Enable or Disable (Common Criteria) CCEAL4 Mode ( //live.paloaltonetworks.com/t5/Management-Articles/How-to-Enable-or-Disable-Common-Criteria-CCEAL4-Mode/ta-p/58679 )&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;After you are able to log into the firewall via GUI on Firewall1 on 192.168.1.1, &lt;/SPAN&gt;&lt;SPAN class="s2"&gt;import firewall 1’s exported candidate configuration into the firewall A using WebGUI : Device &amp;gt; Setup &amp;gt; Operations &amp;gt; Import Named Configuration Snapshot.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;SPAN class="s2"&gt;Note: If the device is being managed from Panorama, then import the device state: (WebGUI)&amp;nbsp;&lt;/SPAN&gt;&lt;/EM&gt;&lt;SPAN class="s2"&gt;&lt;FONT face="courier new,courier"&gt;Device -&amp;gt; Setup -&amp;gt; Operations -&amp;gt; Import&amp;nbsp;Device State&lt;/FONT&gt;&lt;/SPAN&gt;&lt;SPAN class="s2"&gt;.&lt;/SPAN&gt;&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Make sure you have a local admin account configured with a known password so that we are still able to manage the device after committing.&lt;/SPAN&gt;&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Make sure HA is enabled and HA encryption keys are exchanged again between firewall 1 and firewall 2 using the method in this article:&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://live.paloaltonetworks.com/t5/Configuration-Articles/How-to-enable-encryption-on-HA1-in-high-availability/ta-p/54031" target="_blank"&gt;How to enable encryption on HA1 in high availability configurations&lt;/A&gt;&lt;SPAN&gt;.&lt;/SPAN&gt;&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Make sure HA preemption is turned off and HA settings are properly there.&lt;/SPAN&gt;&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;After verifying configuration, make sure network cables are disconnected on this firewall. This will prevent any split brain situation in the network.&lt;/SPAN&gt;&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Commit the changes, and if the commit goes through, connect the management port back to the network so that you can&amp;nbsp;connect back to original management IP to regain access to the firewall.&lt;/SPAN&gt;&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN class="s1"&gt;&lt;SPAN class="s1"&gt;After logging in again,&lt;/SPAN&gt;&lt;/SPAN&gt;&amp;nbsp;check the HA status&amp;nbsp;and&amp;nbsp;suspend the local device via the CLI:&lt;BR /&gt;&amp;gt;&amp;nbsp;&lt;FONT face="courier new,courier"&gt;request high-availability state suspend&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Update the Licenses, Content and Antivirus database, URL database to the required version. WildFire registration might fail because the device is in suspended state, so ignore for now.&lt;/SPAN&gt;&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;If Panorama is involved, on the Panorama, change the template operational mode to FIPS, or Common Critera. Performing a local commit is optional.&lt;/SPAN&gt;&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Verify, under managed devices, that Firewall1 shows as connected, then do a Device Group commit to Firewall1.&lt;/SPAN&gt;&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;Make sure all settings are properly pushed to the firewall.&lt;/SPAN&gt;&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN class="s1"&gt;&lt;SPAN class="s1"&gt;&lt;SPAN class="s1"&gt;Connect the network cables on Firewall1, put Firewall1 in functional mode, and suspend Firewall2 via the CLI.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;P&gt;&lt;FONT face="courier new,courier"&gt;&amp;nbsp; &amp;gt; request high-availability state functional &lt;/FONT&gt;(On Firewall1)&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier"&gt;&amp;nbsp;&amp;nbsp;&lt;SPAN&gt;&amp;gt; request high-availability state suspend&amp;nbsp;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;SPAN&gt;(On Firewall2)&lt;/SPAN&gt;&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;&lt;SPAN&gt;Now the Firewall1&amp;nbsp;should be active. Verify that traffic is passing through the device. Download the WildFire package, and verify that the registration is working and status is okay. &lt;A href="https://live.paloaltonetworks.com/t5/Management-Articles/Wildfire-Configuration-Testing-and-Monitoring/ta-p/57722" target="_blank"&gt;Wildfire Configuration, Testing, and Monitoring&lt;/A&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;&lt;SPAN&gt;Repeat steps 1 to 12 for firewall 2.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;Put the Firewall2 in a functional state after verifying everything&amp;nbsp;is in sync and sessions are also synced between the two firewalls.&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;Download the WildFire package on firewall 2, and verify that the registration is working and the status.&lt;/SPAN&gt; &lt;A href="https://live.paloaltonetworks.com/t5/Management-Articles/Wildfire-Configuration-Testing-and-Monitoring/ta-p/57722" target="_blank"&gt;Wildfire Configuration, Testing, and Monitoring&lt;/A&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;Test the failover by suspending device B, and make sure the tcp-reject-non-syn is enabled again.&lt;/SPAN&gt;&lt;/LI&gt;&lt;/OL&gt;</description>
      <pubDate>Wed, 31 Aug 2016 12:01:42 GMT</pubDate>
      <guid>https://community.hpe.com/t5/security-e-series/ike-pre-shared-key-vpn-dynamic-ip/m-p/6894546#M555</guid>
      <dc:creator>NickChatz</dc:creator>
      <dc:date>2016-08-31T12:01:42Z</dc:date>
    </item>
    <item>
      <title>Re: IKE pre-shared key VPN dynamic ip</title>
      <link>https://community.hpe.com/t5/security-e-series/ike-pre-shared-key-vpn-dynamic-ip/m-p/6894604#M556</link>
      <description>&lt;P&gt;Thank you for the quick reply. &amp;nbsp;I"m good on the Palo Alto side, it's the MSR2003 side that I'm stuck on.&lt;/P&gt;</description>
      <pubDate>Wed, 31 Aug 2016 13:31:58 GMT</pubDate>
      <guid>https://community.hpe.com/t5/security-e-series/ike-pre-shared-key-vpn-dynamic-ip/m-p/6894604#M556</guid>
      <dc:creator>tmoez</dc:creator>
      <dc:date>2016-08-31T13:31:58Z</dc:date>
    </item>
    <item>
      <title>Re: IKE pre-shared key VPN dynamic ip</title>
      <link>https://community.hpe.com/t5/security-e-series/ike-pre-shared-key-vpn-dynamic-ip/m-p/6894633#M557</link>
      <description>&lt;P&gt;Oh ok good then. What's your current firmware version?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;maybe this can help you&amp;nbsp; --&amp;gt; &lt;A href="http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=mmr_kc-0127033" target="_blank"&gt;http://h20564.www2.hpe.com/hpsc/doc/public/display?docId=mmr_kc-0127033&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 31 Aug 2016 14:43:34 GMT</pubDate>
      <guid>https://community.hpe.com/t5/security-e-series/ike-pre-shared-key-vpn-dynamic-ip/m-p/6894633#M557</guid>
      <dc:creator>NickChatz</dc:creator>
      <dc:date>2016-08-31T14:43:34Z</dc:date>
    </item>
    <item>
      <title>Re: IKE pre-shared key VPN dynamic ip</title>
      <link>https://community.hpe.com/t5/security-e-series/ike-pre-shared-key-vpn-dynamic-ip/m-p/6894793#M558</link>
      <description>&lt;P&gt;Howdy,&lt;/P&gt;&lt;P&gt;Just a couple of things -&lt;/P&gt;&lt;P&gt;1) If you can only see DES and SHA and no AES could it be because you haven't generated your (free) High-Encryption license and installed the key? There are restrictions on who can download a license key to enable the higher grade ciphers &amp;amp; algorythms based on your country of residence. You can get hold of this license by registering your device in the "My Networking" portal (sign in with your HPE Passport credentials) and if you are entitled to the license it should appear in "My Licenses" ready for download.&lt;/P&gt;&lt;P&gt;2) Check the Blog &lt;A href="http://www.networktasks.co.uk/environments/hp/comware-v5/hp-msr935-and-cisco-asa-ipsec-vpn" target="_blank"&gt;post &lt;/A&gt;that Phil Kennedy, one of our UK MASE Engineers, put together - it's a Cisco MSR inter-op example that you should be able to adapt to your use case.&lt;/P&gt;&lt;P&gt;Let us know how you get on and give us some feedback.&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Ian&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 31 Aug 2016 20:35:16 GMT</pubDate>
      <guid>https://community.hpe.com/t5/security-e-series/ike-pre-shared-key-vpn-dynamic-ip/m-p/6894793#M558</guid>
      <dc:creator>Ian Vaughan</dc:creator>
      <dc:date>2016-08-31T20:35:16Z</dc:date>
    </item>
  </channel>
</rss>

