Hello,
I am having this issue that Ipsec VPN re-keying between ASA5525 and MX68 sometimes fails.
This issue happens about once a week.
I have a workaround for the issue which is clearing ikev1 sa and ipsec sa on ASA side but I would like to know the root cause of this issue.
I read this somewhere that lifetime of ike1 tunnel should always be greater than lifetime of ipsec tunnel (although I could not find the reason of this practice.)
My current config is not following this practice. means that phase 1 and phase 2 have the same lifetime at this moment.
Could this config cause this re-key issue?
I see these logs on ASA side:
Removing peer from correlator table failed, no match!
All IPSec SA proposals found unacceptable!
I
Best regards,
Tats