

Lifetime = Specify the length of time that the negotiated key will stay effective.Diffie-Hellman (DH) Group = DH groups to use when generating public keys for IKE.It uses IKE-Crypto profile for IKE SA negotiation.authenticates the firewalls to each other and sets up a secure control channel.The other device should always be the initiator for the VPN tunnel, the other device should not be in passive mode (responder mode). IKE Gateways = specify the configuration information necessary to perform IKE protocol negotiation with peer gateways.allows you to set up IPSec tunnels for individual networks that are all associated with the same tunnel interface on the firewall.Each tunnel interface can have a MAX of 10 IPSec tunnels.The tunnel interface appears to the system as a normal interface, and the existing routing infrastructure can be applied. When a packet comes to the firewall, the route lookup funtion can determine the appropriate tunnel to use.Each tunnel is bound to a tunnel interface (clear text) traffic.Connections between a central site and multiple remote sites require VPN tunnels for each central - remote site pair.A single VPN tunnel may be sufficient for connection between a single central site and a remote site.6.1.2 IPSec VPN timeout issue between CISCO ASA router and PANFW:.6.1.1 troubleshooting VPN connectivity issues:.5.3 TUNNEL IS UP, STILL CANNOT PING END TO END:.5 Troubleshooting IPSec VPNs (PAN to Other Vendor).4.2 Route Based VPNs: (PANFW, Juniper SRX, Juniper Netscreen, Checkpoint).4 PROXY-ID (PAN to Cisco ASA, Checkpoint, Juniper SRX, Junier Netscreen).Configure the tunnel endpoint on the PAN device: Configure the IKE phase 2 IPSec Tunnel: (IPSec Crypto)

Configure IKE Phase 1 Gateway: (IKE Crypto)

Configure tunnel endpoint to the PAN device:
