Tunnel between (ASA’s/PALO’s) and VYOS .
When NAT T is disabled via the crypto map(ASA) or NAT-T not ticked on the Palo IKE gateway config. The IPSEC tunnel on Vyos shows up, but no traffic passes.
NAT-T Disabled
show vpn ipsec sa
Connection State Uptime Bytes In/Out Packets In/Out Remote address Remote ID Proposal
peer-172.30.X.X-tunnel-0 up 12m4s 0B/0B 0/0 172.30.X.X N/A AES_CBC_256/HMAC_SHA2_256_128
NAT-T Enabled
$ show vpn ipsec sa
Connection State Uptime Bytes In/Out Packets In/Out Remote address Remote ID Proposal
peer-172.30.X.X-tunnel-0 up 17m27s 7K/13K 168/216 172.30.X.X N/A AES_CBC_256/HMAC_SHA2_256_128
Below IKE shows NAT-T = no
show vpn ike sa
Peer ID / IP Local ID / IP
172.30.X.X 172.20.X.X
State IKEVer Encrypt Hash D-H Group NAT-T A-Time L-Time
----- ------ ------- ---- --------- ----- ------ ------
up IKEv2 aes256 sha256_128 14(MODP_2048) **no** 3600 86400
When this situation occurs, no traffic passes the tunnel.
The tunnel is up but not passing until NAT-T is enabled on the ASA/Palo side. As soon as NAT-T is enabled and vpn restarted, the traffic passes. There are no NAT devices in the network path between these firewalls. Any ideas on why NAT-T impacts the tunnel traffic in this way?
-Nathan