<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Fortigate Cloud Firewall running on FortiOS Version 5. Is this supported by Palo Alto ? in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/fortigate-cloud-firewall-running-on-fortios-version-5-is-this/m-p/15959#M11649</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Based on the logs here you should check these two settings.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Preshared key: confirm this is the same on both devices&lt;/P&gt;&lt;P&gt;Phase one crypto packages: confirm these are the same on both devices&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;These are configured on the Palo Alto at&lt;/P&gt;&lt;P&gt;Network tab -- Network profiles-- IKE Gateway&lt;/P&gt;&lt;P&gt;The crypto options are created&lt;/P&gt;&lt;P&gt;Network tab--Network profiles--IKE Crypto&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The default Cryto package settings are&lt;/P&gt;&lt;P&gt;Group 2;&amp;nbsp; AES or 3DES; SHA1 and 8 hours lifetime&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 17 Mar 2015 20:10:08 GMT</pubDate>
    <dc:creator>pulukas</dc:creator>
    <dc:date>2015-03-17T20:10:08Z</dc:date>
    <item>
      <title>Fortigate Cloud Firewall running on FortiOS Version 5. Is this supported by Palo Alto ?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/fortigate-cloud-firewall-running-on-fortios-version-5-is-this/m-p/15956#M11646</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;STRONG&gt;&lt;SPAN lang="EN-US" style="color: #1f497d;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;SPAN lang="EN-US" style="color: #1f497d;"&gt;Hello All,&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;SPAN lang="EN-US" style="color: #1f497d;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;SPAN lang="EN-US" style="color: #1f497d;"&gt;We would like to know whether the Fortigate Cloud Firewall running on FortiOS Version 5 is supported by PA for IPsec VPN as we are getting below error and tunnel is not coming up.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;SPAN lang="EN-US" style="color: #1f497d;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;SPAN lang="EN-US" style="color: #1f497d;"&gt;2015-03-17 10:53:28 [DEBUG]:&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN lang="EN-US" style="color: #1f497d;"&gt; vendorid.c:274:check_vendorid(): received unknown Vendor ID &lt;/SPAN&gt;à &lt;EM&gt;&lt;SPAN lang="EN-US" style="color: red;"&gt;Other End device is a Fortigate Cloud Firewall running on FortiOS Version 5. Is this supported by Palo Alto ?&lt;/SPAN&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;SPAN lang="EN-US" style="color: #1f497d;"&gt;2015-03-17 10:53:28 [DEBUG]:&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN lang="EN-US" style="color: #1f497d;"&gt; ipsec_doi.c:283:get_ph1approval(): an acceptable proposal found.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;SPAN lang="EN-US" style="color: #1f497d;"&gt;2015-03-17 10:53:28 [DEBUG]:&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN lang="EN-US" style="color: #1f497d;"&gt; ikev1.c:1672:isakmp_ph1resend(): resend phase1 packet 24871bfed0152c7e:faab2d4faea77d3f&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;SPAN lang="EN-US" style="color: #1f497d;"&gt;2015-03-17 10:53:34 [INFO]:&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN lang="EN-US" style="color: #1f497d;"&gt; ikev1.c:318:ikev1_main(): the packet is retransmitted by 40.132.56.196[500]&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;SPAN lang="EN-US" style="color: #1f497d;"&gt;2015-03-17 10:53:46 [DEBUG]:&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN lang="EN-US" style="color: #1f497d;"&gt; ikev1.c:1672:isakmp_ph1resend(): resend phase1 packet 24871bfed0152c7e:faab2d4faea77d3f&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;SPAN lang="EN-US" style="color: #1f497d;"&gt;2015-03-17 10:53:49 [PROTO_NOTIFY]:&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN lang="EN-US" style="color: #1f497d;"&gt; ikev1.c:2423:log_ph1negofailed(): ====&amp;gt; PHASE-1 NEGOTIATION FAILED AS RESPONDER, MAIN MODE &amp;lt;====&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;SPAN lang="EN-US" style="color: #1f497d;"&gt;====&amp;gt; Failed SA: 117.239.143.210[500]-40.132.56.196[500] cookie:0f9f6a98fdcb36ec:807e1f8d23119dee &amp;lt;==== Due to timeout.&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;SPAN lang="EN-US" style="color: #1f497d;"&gt;2015-03-17 10:53:49 [INFO]:&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN lang="EN-US" style="color: #1f497d;"&gt; ikev1.c:2471:log_ph1deleted(): &lt;STRONG&gt;====&amp;gt; PHASE-1 SA DELETED &amp;lt;====&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN lang="EN-US" style="color: #1f497d;"&gt;====&amp;gt; Deleted SA: 117.239.143.210[500]-40.132.56.196[500] cookie:0f9f6a98fdcb36ec:807e1f8d23119dee &amp;lt;====&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN lang="EN-US" style="color: #1f497d;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN lang="EN-US" style="color: #1f497d;"&gt;Thanks.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Mar 2015 06:29:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/fortigate-cloud-firewall-running-on-fortios-version-5-is-this/m-p/15956#M11646</guid>
      <dc:creator>tac.in</dc:creator>
      <dc:date>2015-03-17T06:29:27Z</dc:date>
    </item>
    <item>
      <title>Re: Fortigate Cloud Firewall running on FortiOS Version 5. Is this supported by Palo Alto ?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/fortigate-cloud-firewall-running-on-fortios-version-5-is-this/m-p/15957#M11647</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello TAC,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Error "received unknown Vendor ID" doesn't mean peer is not supported for VPN, it appears to be a different issue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would suggest to open a case with TAC.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Hardik Shah&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Mar 2015 18:54:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/fortigate-cloud-firewall-running-on-fortios-version-5-is-this/m-p/15957#M11647</guid>
      <dc:creator>hshah</dc:creator>
      <dc:date>2015-03-17T18:54:40Z</dc:date>
    </item>
    <item>
      <title>Re: Fortigate Cloud Firewall running on FortiOS Version 5. Is this supported by Palo Alto ?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/fortigate-cloud-firewall-running-on-fortios-version-5-is-this/m-p/15958#M11648</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you also check VPN related session, check if any of the session in Discard state. This might be a policy related issue, where traffic is blocked by policy.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Mar 2015 18:55:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/fortigate-cloud-firewall-running-on-fortios-version-5-is-this/m-p/15958#M11648</guid>
      <dc:creator>hshah</dc:creator>
      <dc:date>2015-03-17T18:55:44Z</dc:date>
    </item>
    <item>
      <title>Re: Fortigate Cloud Firewall running on FortiOS Version 5. Is this supported by Palo Alto ?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/fortigate-cloud-firewall-running-on-fortios-version-5-is-this/m-p/15959#M11649</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Based on the logs here you should check these two settings.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Preshared key: confirm this is the same on both devices&lt;/P&gt;&lt;P&gt;Phase one crypto packages: confirm these are the same on both devices&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;These are configured on the Palo Alto at&lt;/P&gt;&lt;P&gt;Network tab -- Network profiles-- IKE Gateway&lt;/P&gt;&lt;P&gt;The crypto options are created&lt;/P&gt;&lt;P&gt;Network tab--Network profiles--IKE Crypto&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The default Cryto package settings are&lt;/P&gt;&lt;P&gt;Group 2;&amp;nbsp; AES or 3DES; SHA1 and 8 hours lifetime&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 Mar 2015 20:10:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/fortigate-cloud-firewall-running-on-fortios-version-5-is-this/m-p/15959#M11649</guid>
      <dc:creator>pulukas</dc:creator>
      <dc:date>2015-03-17T20:10:08Z</dc:date>
    </item>
  </channel>
</rss>

