What is the exact settings in order to establish a VPN tunnel between a Palo Alto firewall that has static WAN IP address and a Fortigate that has Dynamic WAN IP address?
If both has static IP address, the tunnel works.
If Fortigate has dynamic WAN address, I cannot get the VPN working. I tried aggressive mode on both sides. Palo Alto log keeps saying IKE phase-1 negotiation failed. Couldn't find configuration for IKE phase-1 request for peer IP X.X.X.X, ID ipaddr:X.X.X.X.
Check your gatway configurations. In addition to selecting aggressive mode on both sides. Your gateways need to be configured to use dynamic on one side and static on the other. And you should have local and peer identity configured. This is used as the alternative to knowing the static ip address to match the IKE phase 1. These are not necessrily real email address just matching strings in the form of email addresses, they need to be the same on both sides as a kind of "password" check.
Ok.. Got the tunnel up. However, traffic is only one way. I already checked my policies on both side, seems to be correct. Plus, these are the same policies that I used for both side static scenario that worked two ways. When I was troubleshooting the static scenario, I had the same issue and fixed it by rebooting the Fortigate and Palo Alto. However, this time reboot did not help.
What do the logs say about the traffic that is not working?
Also be sure to have a a logging final deny rule so we can see if the traffic is hitting this rule.
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the Live Community as a whole!
The Live Community thanks you for your participation!