<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic VPN Tunnel between static Palo Alto and dynamic Fortigate in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-tunnel-between-static-palo-alto-and-dynamic-fortigate/m-p/20011#M14579</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What is the exact settings in order to establish a VPN tunnel between a Palo Alto firewall that has static WAN IP address and a Fortigate that has Dynamic WAN IP address?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If both has static IP address, the tunnel works.&lt;/P&gt;&lt;P&gt;If Fortigate has dynamic WAN address, I cannot get the VPN working.&amp;nbsp; I tried aggressive mode on both sides.&amp;nbsp; Palo Alto log keeps saying IKE phase-1 negotiation failed.&amp;nbsp; Couldn't find configuration for IKE phase-1 request for peer IP X.X.X.X[500], ID ipaddr:X.X.X.X.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sat, 30 May 2015 08:45:34 GMT</pubDate>
    <dc:creator>furrygolden</dc:creator>
    <dc:date>2015-05-30T08:45:34Z</dc:date>
    <item>
      <title>VPN Tunnel between static Palo Alto and dynamic Fortigate</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-tunnel-between-static-palo-alto-and-dynamic-fortigate/m-p/20011#M14579</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What is the exact settings in order to establish a VPN tunnel between a Palo Alto firewall that has static WAN IP address and a Fortigate that has Dynamic WAN IP address?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If both has static IP address, the tunnel works.&lt;/P&gt;&lt;P&gt;If Fortigate has dynamic WAN address, I cannot get the VPN working.&amp;nbsp; I tried aggressive mode on both sides.&amp;nbsp; Palo Alto log keeps saying IKE phase-1 negotiation failed.&amp;nbsp; Couldn't find configuration for IKE phase-1 request for peer IP X.X.X.X[500], ID ipaddr:X.X.X.X.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 30 May 2015 08:45:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-tunnel-between-static-palo-alto-and-dynamic-fortigate/m-p/20011#M14579</guid>
      <dc:creator>furrygolden</dc:creator>
      <dc:date>2015-05-30T08:45:34Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Tunnel between static Palo Alto and dynamic Fortigate</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-tunnel-between-static-palo-alto-and-dynamic-fortigate/m-p/20012#M14580</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Check your gatway configurations.&amp;nbsp; In addition to selecting aggressive mode on both sides.&amp;nbsp; Your gateways need to be configured to use dynamic on one side and static on the other.&amp;nbsp; And you should have local and peer identity configured.&amp;nbsp; This is used as the alternative to knowing the static ip address to match the IKE phase 1. These are not necessrily real email address just matching strings in the form of email addresses, they need to be the same on both sides as a kind of "password" check.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="DynamicGW.png" class="image-0 jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/19870_DynamicGW.png" style="height: auto;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="StaticGW.png" class="jive-image image-2" src="https://live.paloaltonetworks.com/legacyfs/online/19875_StaticGW.png" style="height: auto;" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 30 May 2015 13:27:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-tunnel-between-static-palo-alto-and-dynamic-fortigate/m-p/20012#M14580</guid>
      <dc:creator>pulukas</dc:creator>
      <dc:date>2015-05-30T13:27:26Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Tunnel between static Palo Alto and dynamic Fortigate</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-tunnel-between-static-palo-alto-and-dynamic-fortigate/m-p/20013#M14581</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok.. Got the tunnel up.&amp;nbsp; However, traffic is only one way.&amp;nbsp; I already checked my policies on both side, seems to be correct.&amp;nbsp; Plus, these are the same policies that I used for both side static scenario that worked two ways.&amp;nbsp; When I was troubleshooting the static scenario, I had the same issue and fixed it by rebooting the Fortigate and Palo Alto.&amp;nbsp; However, this time reboot did not help.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 30 May 2015 14:35:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-tunnel-between-static-palo-alto-and-dynamic-fortigate/m-p/20013#M14581</guid>
      <dc:creator>furrygolden</dc:creator>
      <dc:date>2015-05-30T14:35:30Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Tunnel between static Palo Alto and dynamic Fortigate</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-tunnel-between-static-palo-alto-and-dynamic-fortigate/m-p/20014#M14582</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What do the logs say about the traffic that is not working?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also be sure to have a a logging final deny rule so we can see if the traffic is hitting this rule.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 31 May 2015 11:31:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-tunnel-between-static-palo-alto-and-dynamic-fortigate/m-p/20014#M14582</guid>
      <dc:creator>pulukas</dc:creator>
      <dc:date>2015-05-31T11:31:00Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Tunnel between static Palo Alto and dynamic Fortigate</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-tunnel-between-static-palo-alto-and-dynamic-fortigate/m-p/20015#M14583</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="font-size: 13.3333330154419px;"&gt;It sounds like a routing issue in your case.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Don't think it matters in this case but in such scenarios I always set IKE gateway in passive mode.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 01 Jun 2015 06:34:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-tunnel-between-static-palo-alto-and-dynamic-fortigate/m-p/20015#M14583</guid>
      <dc:creator>santonic</dc:creator>
      <dc:date>2015-06-01T06:34:00Z</dc:date>
    </item>
  </channel>
</rss>

