Hello, I am having this issue that Ipsec VPN re-keying between ASA5525 and MX68 sometimes fails. This issue happens about once a week. I have a workaround for the issue which is clearing ikev1 sa and ipsec sa on ASA side but I would like to know the root cause of this issue. I read this somewhere that lifetime of ike1 tunnel should always be greater than lifetime of ipsec tunnel (although I could not find the reason of this practice.) My current config is not following this practice. means that phase 1 and phase 2 have the same lifetime at this moment. Could this config cause this re-key issue? I see these logs on ASA side: Removing peer from correlator table failed, no match! All IPSec SA proposals found unacceptable! I Best regards, Tats
... View more