<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: IPSec S2S VPN between Palo Alto and Sophos XG in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-s2s-vpn-between-palo-alto-and-sophos-xg/m-p/358075#M87844</link>
    <description>&lt;P&gt;is there a way for you to limit the proposals the Sophos is sending out, and could you post which config you have set on the PAN?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;the log shows AES but no keysize, so maybe it's proposing 128 instead of 256&lt;/P&gt;</description>
    <pubDate>Thu, 22 Oct 2020 09:26:28 GMT</pubDate>
    <dc:creator>reaper</dc:creator>
    <dc:date>2020-10-22T09:26:28Z</dc:date>
    <item>
      <title>IPSec S2S VPN between Palo Alto and Sophos XG</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-s2s-vpn-between-palo-alto-and-sophos-xg/m-p/358005#M87830</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm trying to set up a S2S between Palo Alto Sophos XG and so far it's been unsuccessful as Palo Alto is not able to find a suitable proposal for the connection.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've also tried the following the KB here. (&lt;A href="https://www.sophos.com/en-us/medialibrary/PDFs/documentation/SophosFirewall/Pocket-Guides/Establish-IPsec-VPN-Connection-between-Sophos-and-PaloAlto.pdf" target="_blank" rel="noopener"&gt;https://www.sophos.com/en-us/medialibrary/PDFs/documentation/SophosFirewall/Pocket-Guides/Establish-IPsec-VPN-Connection-between-Sophos-and-PaloAlto.pdf&lt;/A&gt;)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm supposed to be using IKEv1, AES256-SHA256, DH5 and I've checked to make sure the settings on both Firewalls are aligned (IKE, encryption keys, preshared keys).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Below is the logs from Palo Alto for a connection coming in from Sophos. Any insight to interpreting the logs would be helpful.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2020-10-21 01:29:05.195 +0000 [PNTF]: { 54: }: ====&amp;gt; PHASE-1 NEGOTIATION STARTED AS RESPONDER, MAIN MODE &amp;lt;====&lt;BR /&gt;====&amp;gt; Initiated SA &amp;lt;====&lt;BR /&gt;[INFO]: { 54: }: received Vendor ID: draft-ietf-ipsra-isakmp-xauth-06.txt&lt;BR /&gt;[INFO]: { 54: }: received Vendor ID: DPD&lt;BR /&gt;[INFO]: { 54: }: received Vendor ID: CISCO-UNITY&lt;BR /&gt;[INFO]: { 54: }: received Vendor ID: FRAGMENTATION&lt;BR /&gt;[INFO]: { 54: }: received Vendor ID: RFC 3947&lt;BR /&gt;[INFO]: { 54: }: received Vendor ID: draft-ietf-ipsec-nat-t-ike-02&lt;/P&gt;&lt;P&gt;[PERR]: { 54: }: rejected hashtype: DB(prop#1:trns#1):Peer(prop#0:trns#1) = SHA1:SHA256&lt;BR /&gt;[PERR]: { 54: }: rejected dh_group: DB(prop#1:trns#1):Peer(prop#0:trns#1) = DH2:DH5&lt;BR /&gt;[PERR]: { 54: }: rejected enctype: DB(prop#1:trns#2):Peer(prop#0:trns#1) = 3DES:AES&lt;BR /&gt;[PERR]: { 54: }: rejected hashtype: DB(prop#1:trns#2):Peer(prop#0:trns#1) = SHA1:SHA256&lt;BR /&gt;[PERR]: { 54: }: rejected dh_group: DB(prop#1:trns#2):Peer(prop#0:trns#1) = DH2:DH5&lt;BR /&gt;[PERR]: { 54: }: rejected hashtype: DB(prop#1:trns#1):Peer(prop#0:trns#2) = SHA1:SHA256&lt;BR /&gt;[PERR]: { 54: }: rejected enctype: DB(prop#1:trns#2):Peer(prop#0:trns#2) = 3DES:AES&lt;BR /&gt;[PERR]: { 54: }: rejected hashtype: DB(prop#1:trns#2):Peer(prop#0:trns#2) = SHA1:SHA256&lt;BR /&gt;[PERR]: { 54: }: rejected hashtype: DB(prop#1:trns#1):Peer(prop#0:trns#3) = SHA1:SHA256&lt;BR /&gt;[PERR]: { 54: }: rejected dh_group: DB(prop#1:trns#1):Peer(prop#0:trns#3) = DH2:DH19&lt;BR /&gt;[PERR]: { 54: }: rejected enctype: DB(prop#1:trns#2):Peer(prop#0:trns#3) = 3DES:AES&lt;BR /&gt;[PERR]: { 54: }: rejected hashtype: DB(prop#1:trns#2):Peer(prop#0:trns#3) = SHA1:SHA256&lt;BR /&gt;[PERR]: { 54: }: rejected dh_group: DB(prop#1:trns#2):Peer(prop#0:trns#3) = DH2:DH19&lt;BR /&gt;[PERR]: { 54: }: rejected enctype: DB(prop#1:trns#1):Peer(prop#0:trns#4) = AES:TBD&lt;BR /&gt;[PERR]: { 54: }: rejected hashtype: DB(prop#1:trns#1):Peer(prop#0:trns#4) = SHA1:TBD&lt;BR /&gt;[PERR]: { 54: }: rejected dh_group: DB(prop#1:trns#1):Peer(prop#0:trns#4) = DH2:DH19&lt;BR /&gt;[PERR]: { 54: }: rejected enctype: DB(prop#1:trns#2):Peer(prop#0:trns#4) = 3DES:TBD&lt;BR /&gt;[PERR]: { 54: }: rejected hashtype: DB(prop#1:trns#2):Peer(prop#0:trns#4) = SHA1:TBD&lt;BR /&gt;[PERR]: { 54: }: rejected dh_group: DB(prop#1:trns#2):Peer(prop#0:trns#4) = DH2:DH19&lt;BR /&gt;[PERR]: { 54: }: no suitable proposal found.&lt;/P&gt;&lt;P&gt;[PERR]: { 54: }: (nil) failed to get valid proposal.&lt;BR /&gt;[PERR]: { 54: }: failed to process packet.&lt;BR /&gt;[INFO]: { 54: }: ====&amp;gt; PHASE-1 SA DELETED &amp;lt;====&lt;BR /&gt;====&amp;gt; Deleted SA &amp;lt;====&lt;/P&gt;</description>
      <pubDate>Thu, 22 Oct 2020 02:41:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-s2s-vpn-between-palo-alto-and-sophos-xg/m-p/358005#M87830</guid>
      <dc:creator>Isaac_Zheng</dc:creator>
      <dc:date>2020-10-22T02:41:30Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec S2S VPN between Palo Alto and Sophos XG</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-s2s-vpn-between-palo-alto-and-sophos-xg/m-p/358075#M87844</link>
      <description>&lt;P&gt;is there a way for you to limit the proposals the Sophos is sending out, and could you post which config you have set on the PAN?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;the log shows AES but no keysize, so maybe it's proposing 128 instead of 256&lt;/P&gt;</description>
      <pubDate>Thu, 22 Oct 2020 09:26:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-s2s-vpn-between-palo-alto-and-sophos-xg/m-p/358075#M87844</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2020-10-22T09:26:28Z</dc:date>
    </item>
  </channel>
</rss>

