<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic DH group 15 not supported in phase 1 with IKE v1? in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/dh-group-15-not-supported-in-phase-1-with-ike-v1/m-p/568659#M114742</link>
    <description>&lt;P&gt;I need to migrate an old firewall to a PA-440 and came across an ancient IPsec where they have used DH group 15 for both phase 1 and 2. According to the docs for PanOS 10.2 DH 15 is now supported but the 440 whines about DH15 in phase 1 as I use IKE v1. DH15 in phase 2 seems OK. (Note: The cryptos are from the original setup, will change to more secure settings after migrating, also dependant on "the other side"...)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Message is:&lt;/P&gt;
&lt;P&gt;Not support: group 15 is selected in [name of IKE crypto suite] which is attached to IKEv1 gateway [name of IKE GW](Module: ikemgr)&lt;/P&gt;
&lt;P&gt;client ikemge phase 1 failure&lt;/P&gt;
&lt;P&gt;Commit failed&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Does anyone know why DH15 cannot be used and if there are plans to support it in IKE v1? It seems to me that the reason for adding DH15 etc. would be to have support for less secure algos during migration from older hardware and this often includes now obsolete setups like IKE v1.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Link to page stating support for DH15:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/compatibility-matrix/supported-cipher-suites/cipher-suites-supported-in-pan-os-10-2/cipher-suites-supported-in-pan-os-10-2-ike-web-certs" target="_blank"&gt;https://docs.paloaltonetworks.com/compatibility-matrix/supported-cipher-suites/cipher-suites-supported-in-pan-os-10-2/cipher-suites-supported-in-pan-os-10-2-ike-web-certs&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 06 Dec 2023 10:22:55 GMT</pubDate>
    <dc:creator>FredrikBjork</dc:creator>
    <dc:date>2023-12-06T10:22:55Z</dc:date>
    <item>
      <title>DH group 15 not supported in phase 1 with IKE v1?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dh-group-15-not-supported-in-phase-1-with-ike-v1/m-p/568659#M114742</link>
      <description>&lt;P&gt;I need to migrate an old firewall to a PA-440 and came across an ancient IPsec where they have used DH group 15 for both phase 1 and 2. According to the docs for PanOS 10.2 DH 15 is now supported but the 440 whines about DH15 in phase 1 as I use IKE v1. DH15 in phase 2 seems OK. (Note: The cryptos are from the original setup, will change to more secure settings after migrating, also dependant on "the other side"...)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Message is:&lt;/P&gt;
&lt;P&gt;Not support: group 15 is selected in [name of IKE crypto suite] which is attached to IKEv1 gateway [name of IKE GW](Module: ikemgr)&lt;/P&gt;
&lt;P&gt;client ikemge phase 1 failure&lt;/P&gt;
&lt;P&gt;Commit failed&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Does anyone know why DH15 cannot be used and if there are plans to support it in IKE v1? It seems to me that the reason for adding DH15 etc. would be to have support for less secure algos during migration from older hardware and this often includes now obsolete setups like IKE v1.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Link to page stating support for DH15:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/compatibility-matrix/supported-cipher-suites/cipher-suites-supported-in-pan-os-10-2/cipher-suites-supported-in-pan-os-10-2-ike-web-certs" target="_blank"&gt;https://docs.paloaltonetworks.com/compatibility-matrix/supported-cipher-suites/cipher-suites-supported-in-pan-os-10-2/cipher-suites-supported-in-pan-os-10-2-ike-web-certs&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 06 Dec 2023 10:22:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dh-group-15-not-supported-in-phase-1-with-ike-v1/m-p/568659#M114742</guid>
      <dc:creator>FredrikBjork</dc:creator>
      <dc:date>2023-12-06T10:22:55Z</dc:date>
    </item>
    <item>
      <title>Re: DH group 15 not supported in phase 1 with IKE v1?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dh-group-15-not-supported-in-phase-1-with-ike-v1/m-p/569573#M114865</link>
      <description>&lt;P&gt;Good Day&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The LiveCommunity may not work for PANW itself, so we cannot comment about if a feature/version will be supported.&lt;/P&gt;
&lt;P&gt;But, knowing that IKEv1 is about 20 years old, I am curious why wouldn't take the higher ground get both sides to work with IKEv2 which is a longer/stronger DH key pair size.&amp;nbsp; &lt;BR /&gt;&lt;BR /&gt;Again, just a suggestion.&amp;nbsp; &lt;BR /&gt;&lt;BR /&gt;What other questions can we answer?&lt;/P&gt;</description>
      <pubDate>Wed, 13 Dec 2023 01:40:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dh-group-15-not-supported-in-phase-1-with-ike-v1/m-p/569573#M114865</guid>
      <dc:creator>S.Cantwell</dc:creator>
      <dc:date>2023-12-13T01:40:51Z</dc:date>
    </item>
    <item>
      <title>Re: DH group 15 not supported in phase 1 with IKE v1?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/dh-group-15-not-supported-in-phase-1-with-ike-v1/m-p/569654#M114870</link>
      <description>&lt;P&gt;Sure, the community is the community, not PaloAlto itself. On the other hand, I think lots of people here stumble upon quirks like this on a daily basis so my intention was to see if someone else had had the same experience and perhaps even had come up with an explanation. After all, the docs state that DH15 is supported, and no exemptions are mentioned. That's what annoys me &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I do agree (as I wrote initially) that DH15 (and IKEv1) would only be used in the migration phase and moving to IKEv2 with more secure cryptos is the goal. As I indicated, the other side of the tunnel is not under my control, but I have already suggested that persons responsible for this firewall contact "the other side" to come up with a better config. As it is so simple in the PA to allow multiple cryptos, I can allow lots of them and the opposing side can choose whatever they like and are capable of. Customers are often hesitant to change too many things before a migration or firewall swap so the workflow tends to be "swap gear first, fix config later". That's why I was so happy when I saw DH15 being supported in 10.2, but...&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you for your reply! Let's continue keeping the bad guys out!&lt;/P&gt;</description>
      <pubDate>Wed, 13 Dec 2023 08:43:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/dh-group-15-not-supported-in-phase-1-with-ike-v1/m-p/569654#M114870</guid>
      <dc:creator>FredrikBjork</dc:creator>
      <dc:date>2023-12-13T08:43:34Z</dc:date>
    </item>
  </channel>
</rss>

