ATP500 and rekey time in phase1 for ipsec VPN tunnels

TasagoreSeibei
Posts: 2
Freshman Member

in Security
Hi
I have a IPSEC tunnel, the other side is a Sophos device. We have intermittent disconnections and the Sophos guy says that it's due a bad rekey time. The remote log shows:
"Received IKE message with invalid SPI"
They have the tunnel configured in Phase1 for SA LifeTime of 10800s with a re-key margin of 360s, but I can't configure the second one setting in the ATP500.
Which is the default re-key margin for an ATP500?
Regards
0
All Replies
-
Hi @TasagoreSeibei ,
They have the tunnel configured in Phase1 for SA LifeTime of 10800s with a re-key margin of 360s, but I can't configure the second one setting in the ATP500.
Which is the default re-key margin for an ATP500?
Let me clarify what you're asking:
- For the Sophos device: They can set Phase 1 SA Lifetime of 10800s with a 360s re-key margin.
- For the ATP500: You can only set Phase 1 SA Lifetime, but no re-key margin setting is available? Are you looking to confirm what the default re-key margin is for Phase 1 on the ATP500?
0 - For the Sophos device: They can set Phase 1 SA Lifetime of 10800s with a 360s re-key margin.
Categories
- All Categories
- 415 Beta Program
- 2.5K Nebula
- 152 Nebula Ideas
- 102 Nebula Status and Incidents
- 5.8K Security
- 296 USG FLEX H Series
- 281 Security Ideas
- 1.5K Switch
- 77 Switch Ideas
- 1.1K Wireless
- 42 Wireless Ideas
- 6.5K Consumer Product
- 254 Service & License
- 396 News and Release
- 85 Security Advisories
- 29 Education Center
- 10 [Campaign] Zyxel Network Detective
- 3.6K FAQ
- 34 Documents
- 34 Nebula Monthly Express
- 87 About Community
- 76 Security Highlight