This sounds like a familiar issue I had with a set of Palos. Looking at my old e-mails, I found this snippet:
These are the errors I have been seeing:
- Child SA exchange: Sending notification to peer: No proposal chosen MyMethods Phase2: AES-GCM-256 + HMAC-SHA2-256, No IPComp, No ESN, Group 19 (256-bit random ECP group)
- Initial exchange: Sending notification to peer: Invalid Key Exchange payload
- Child SA exchange: Exchange failed: timeout reached.
The Palo side was using this:
Phase 1 has these configured:
DH Groups 21, 20, 19, 14, 5, 2
Encryption AES-256-GCM, AES-256-CBC
Authentication sha512, sha384, sha256, non-auth
Lifetime: 24 hours
Phase 2 has these configured:
DH Group 19
Lifetime 1 hour
Lifesize 4608 MB
Encryption: aes-256-gc, aes-256-cbc, aes-192,cbc, aes-128-gcm, aes-128-ccm, aes-128-cbc
Authentication: sha512, sha384, sha256
The resolution: Palo side created a profile specifically for our tunnel to use the same encryption ciphers we were sending instead of using a global profile with several ciphers enabled.