<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic VPN PA-400 to PFSense in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/vpn-pa-400-to-pfsense/m-p/1224482#M5711</link>
    <description>&lt;P&gt;Hi all!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've created an IPsec VPN site-to-site between Palo Alto and PFSense.&lt;/P&gt;&lt;P&gt;We are facing problems because the tunnel doesn't connect. We see the errors below on Monitor Logs:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Error1 = IKEv2 IKE SA negotiation is started as responder, non-rekey. Initiated SA: IP_PALO_ALTO[500]-IP_PFSENSE[33848] SPI:1719700341f53997:4c83ee594abb7b38.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Error2 = ignoring unauthenticated notify payload (NAT_DETECTION_SOURCE_IP&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Do you know what could be the problem?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;The VPN worked with another firewall.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;We already tried:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Change psk&lt;/LI&gt;&lt;LI&gt;Change the internet line&lt;/LI&gt;&lt;LI&gt;Change encryption options&lt;/LI&gt;&lt;LI&gt;Check date/time&lt;/LI&gt;&lt;LI&gt;Check policies&lt;/LI&gt;&lt;LI&gt;Check ports 500 and 4500&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Help!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 21 Mar 2025 22:09:43 GMT</pubDate>
    <dc:creator>admin</dc:creator>
    <dc:date>2025-03-21T22:09:43Z</dc:date>
    <item>
      <title>VPN PA-400 to PFSense</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/vpn-pa-400-to-pfsense/m-p/1224482#M5711</link>
      <description>&lt;P&gt;Hi all!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've created an IPsec VPN site-to-site between Palo Alto and PFSense.&lt;/P&gt;&lt;P&gt;We are facing problems because the tunnel doesn't connect. We see the errors below on Monitor Logs:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Error1 = IKEv2 IKE SA negotiation is started as responder, non-rekey. Initiated SA: IP_PALO_ALTO[500]-IP_PFSENSE[33848] SPI:1719700341f53997:4c83ee594abb7b38.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Error2 = ignoring unauthenticated notify payload (NAT_DETECTION_SOURCE_IP&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Do you know what could be the problem?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;The VPN worked with another firewall.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;We already tried:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Change psk&lt;/LI&gt;&lt;LI&gt;Change the internet line&lt;/LI&gt;&lt;LI&gt;Change encryption options&lt;/LI&gt;&lt;LI&gt;Check date/time&lt;/LI&gt;&lt;LI&gt;Check policies&lt;/LI&gt;&lt;LI&gt;Check ports 500 and 4500&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Help!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Mar 2025 22:09:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/vpn-pa-400-to-pfsense/m-p/1224482#M5711</guid>
      <dc:creator>admin</dc:creator>
      <dc:date>2025-03-21T22:09:43Z</dc:date>
    </item>
    <item>
      <title>Re: VPN PA-400 to PFSense</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/vpn-pa-400-to-pfsense/m-p/1224635#M5720</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/91202491"&gt;@admin&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Further debugging is required.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I'd start by confirming both VPN peers can actually reach each other.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Start off by these troubleshooting tips:&lt;BR /&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClivCAC" target="_blank" rel="noopener"&gt;How to Troubleshoot IPSec VPN connectivity issues&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Here are some more debugging tips and usecases:&lt;BR /&gt;&lt;A href="https://live.paloaltonetworks.com/t5/support-faq/support-faq-how-to-troubleshoot-ipsec-vpn-connectivity-issues/ta-p/590317" target="_blank" rel="noopener"&gt;https://live.paloaltonetworks.com/t5/support-faq/support-faq-how-to-troubleshoot-ipsec-vpn-connectivity-issues/ta-p/590317&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Kind regards,&lt;/P&gt;
&lt;P&gt;-Kim.&lt;/P&gt;</description>
      <pubDate>Tue, 25 Mar 2025 09:33:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/vpn-pa-400-to-pfsense/m-p/1224635#M5720</guid>
      <dc:creator>kiwi</dc:creator>
      <dc:date>2025-03-25T09:33:48Z</dc:date>
    </item>
  </channel>
</rss>

