<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Site to Site VPN failing when IKEv2 and different PANOS in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-vpn-failing-when-ikev2-and-different-panos/m-p/481212#M104138</link>
    <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/113306"&gt;@COlson&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I don't know the exact detail of the implementstion of "IKEv2 preferred" but I only had issues with this in the past. I recommend you to use IKEv2 only. Once the tunnel is successfully connected it will not suddenly fail to establish and then do a fallback to IKEv1. If it really fails in such a situation, then it probably is because of an (unlikely) MITM attack.&lt;/P&gt;</description>
    <pubDate>Wed, 20 Apr 2022 05:49:27 GMT</pubDate>
    <dc:creator>Remo</dc:creator>
    <dc:date>2022-04-20T05:49:27Z</dc:date>
    <item>
      <title>Site to Site VPN failing when IKEv2 and different PANOS</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-vpn-failing-when-ikev2-and-different-panos/m-p/480263#M103992</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;I’ve recently ran into an issue where I’m using IKEv2 preferred and the two firewalls are using different versions of PAN-OS. It will fail with “invalid sig.”. If both firewalls are the same PAN-OS version (this has been happening on 9.1.11-9.1-13h3… I don’t have any other versions to test), it works fine. But since I can’t update all firewalls at the same time, there are periods of time where they are different versions and that results in the tunnel dropping.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Additionally, as I’m using IKEv2 preferred, I assumed that when IKEv2 failed, it would use IKEv1 but that doesn’t seem to be the case. &amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;Are both of these expected behaviors? &amp;nbsp;There must be something I am missing.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Thanks. &amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 14 Apr 2022 00:58:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-vpn-failing-when-ikev2-and-different-panos/m-p/480263#M103992</guid>
      <dc:creator>COlson</dc:creator>
      <dc:date>2022-04-14T00:58:21Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site VPN failing when IKEv2 and different PANOS</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-vpn-failing-when-ikev2-and-different-panos/m-p/481212#M104138</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/113306"&gt;@COlson&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I don't know the exact detail of the implementstion of "IKEv2 preferred" but I only had issues with this in the past. I recommend you to use IKEv2 only. Once the tunnel is successfully connected it will not suddenly fail to establish and then do a fallback to IKEv1. If it really fails in such a situation, then it probably is because of an (unlikely) MITM attack.&lt;/P&gt;</description>
      <pubDate>Wed, 20 Apr 2022 05:49:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-vpn-failing-when-ikev2-and-different-panos/m-p/481212#M104138</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2022-04-20T05:49:27Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site VPN failing when IKEv2 and different PANOS</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-vpn-failing-when-ikev2-and-different-panos/m-p/482162#M104252</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;I could set it to IKEv2 only but the same problem arises; as soon as the the two firewalls are on different versions of PAN-OS, IKEv2 fails. &amp;nbsp;I would have thought that would be the use case for IKEv2 preferred but it doesn’t seem it.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 24 Apr 2022 00:40:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/site-to-site-vpn-failing-when-ikev2-and-different-panos/m-p/482162#M104252</guid>
      <dc:creator>COlson</dc:creator>
      <dc:date>2022-04-24T00:40:03Z</dc:date>
    </item>
  </channel>
</rss>

