Disclaimer: Please contact Sophos Professional Services if you require assistance with your specific environment.
This article describes how to set up a site-to-site IPsec VPN connection between a Sophos Firewall and a Palo Alto firewall using a pre-shared key to authenticate VPN peers.
Applies to the following Sophos products and versionsSophos Firewall
Sign up to the Sophos Support Notification Service to get the latest product release information and critical issues.
why are you describing the configuration of an IPsec tunnel for IKE v1 when both palo alto and XG Firewall support IKE v2? Why do you describe the configuration on the old version of palo alto v8 (according to screens) when v8 is already an unsupported version and now supported versions are v9 and v10?I recently configured an IPsec tunnel for one customer and I know from my own experience what the current situation is. Your configuration is more than two years old. I'm sorry, but this type of tutorial will not much help partners and users.
do you found issue to use IKE v1 and authetication sha 1?
I am trying to set a site-2-site IPSEC tunnel between PA440 and SG230. Followed recommendations above except it is not SOPHOS XG ;( with no luck. Any working example configuration? Please help.
I kind also agree with Alda, why anybody will use IKE1, SHA1 (should not be used anymore) and PH5 nowadays?