<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: IKEv2 between PAN-OS 8.1.9HF4 and Cisco IOS routers or ASA devices in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ikev2-between-pan-os-8-1-9hf4-and-cisco-ios-routers-or-asa/m-p/293301#M77558</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;While I have not experienced issues with what you are describing, is there a requirement for ikev2? v1 is still pretty secure if you keep everything at 256 or higher with a strong passphrase.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Just a thought.&lt;/P&gt;</description>
    <pubDate>Fri, 18 Oct 2019 18:12:42 GMT</pubDate>
    <dc:creator>OtakarKlier</dc:creator>
    <dc:date>2019-10-18T18:12:42Z</dc:date>
    <item>
      <title>IKEv2 between PAN-OS 8.1.9HF4 and Cisco IOS routers or ASA devices</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ikev2-between-pan-os-8-1-9hf4-and-cisco-ios-routers-or-asa/m-p/293172#M77514</link>
      <description>&lt;P&gt;I am trying to setup site-2-site VPN between a Cisco router and PaloAlto 820 running 8.1.9HF4.&amp;nbsp; Everything is working fine in IKEv1&lt;/P&gt;&lt;P&gt;but it is not working in IKEv2.&amp;nbsp; Look like PaloAlto is not playing nice with Cisco devices.&amp;nbsp; If I replace the PaloAlto with Checkpoint firewall, it works fine with Cisco in IKEv2.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have a ticket open with PaloAlto TAC and they are investigating but TAC is moving very slow and I need to get it working in the next 48 hours.&amp;nbsp; PAN TAC engineer told me that there are lot of issues with PAN IKEv2 and 3rd party vendors like Cisco.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Anyone able to to get IKEv2 working between PAN and Cisco without any issues?&lt;/P&gt;</description>
      <pubDate>Wed, 16 Oct 2019 18:33:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ikev2-between-pan-os-8-1-9hf4-and-cisco-ios-routers-or-asa/m-p/293172#M77514</guid>
      <dc:creator>dtran</dc:creator>
      <dc:date>2019-10-16T18:33:09Z</dc:date>
    </item>
    <item>
      <title>Re: IKEv2 between PAN-OS 8.1.9HF4 and Cisco IOS routers or ASA devices</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ikev2-between-pan-os-8-1-9hf4-and-cisco-ios-routers-or-asa/m-p/293176#M77517</link>
      <description>&lt;P&gt;I no longer use the Palo Alto for ipsec tunnels, but have in the past. We have added so many, we broke that off into it's own device, which happens to not be a PA product.&amp;nbsp; I would suggest on the Palo Alto to set the IKE Gateway peer type to dynamic, instead of static. Then let the cisco establish the tunnel.&amp;nbsp; I ran into an issue with the PA once before with static tunnels and virtual routers. This is just a test to see if that is affecting you. In my issue the dynamic works and static would not.&amp;nbsp; Other than that, you need to crank up the logging level and see what is causing the tunnel to die.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Justin Woodman&lt;/P&gt;</description>
      <pubDate>Wed, 16 Oct 2019 19:54:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ikev2-between-pan-os-8-1-9hf4-and-cisco-ios-routers-or-asa/m-p/293176#M77517</guid>
      <dc:creator>JustinWoodman</dc:creator>
      <dc:date>2019-10-16T19:54:06Z</dc:date>
    </item>
    <item>
      <title>Re: IKEv2 between PAN-OS 8.1.9HF4 and Cisco IOS routers or ASA devices</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ikev2-between-pan-os-8-1-9hf4-and-cisco-ios-routers-or-asa/m-p/293301#M77558</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;While I have not experienced issues with what you are describing, is there a requirement for ikev2? v1 is still pretty secure if you keep everything at 256 or higher with a strong passphrase.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Just a thought.&lt;/P&gt;</description>
      <pubDate>Fri, 18 Oct 2019 18:12:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ikev2-between-pan-os-8-1-9hf4-and-cisco-ios-routers-or-asa/m-p/293301#M77558</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2019-10-18T18:12:42Z</dc:date>
    </item>
    <item>
      <title>Re: IKEv2 between PAN-OS 8.1.9HF4 and Cisco IOS routers or ASA devices</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ikev2-between-pan-os-8-1-9hf4-and-cisco-ios-routers-or-asa/m-p/295528#M77844</link>
      <description>&lt;P&gt;I found the issue and it is not the PAN firewalls.&amp;nbsp; It is with Cisco IOS device.&amp;nbsp; The case is currently being investigated by Cisco TAC.&amp;nbsp; Cisco actually has a bug ID on this:&amp;nbsp;&amp;nbsp;CSCtq08784.&amp;nbsp; IKEv2 does not work between Cisco and 3rd party devices&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 31 Oct 2019 18:11:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ikev2-between-pan-os-8-1-9hf4-and-cisco-ios-routers-or-asa/m-p/295528#M77844</guid>
      <dc:creator>dtran</dc:creator>
      <dc:date>2019-10-31T18:11:05Z</dc:date>
    </item>
  </channel>
</rss>

