Getting IPsec to work between devices of different manufacturers is difficult, getting it to work between different devices under different management is almost impossible.
In general, I agree with the sentiment. If I manage both sides, I can usually get an IPSec tunnel functional in about 15 minutes regardless of the manufacturers, as long as I have at least some experience with it (I still find Palo Alto a bit quirky, but that's probably just me). If I manage only one side, it is completely dependent upon the experience and skill level of the administrator on the far side. I've brought tunnels up by exchanging a few emails, and I've spent hours on the phone trying to get a tunnel online.
In my experience, separate management on each side requires at least one side to actually know how IPSec works to troubleshoot issues. If the remote side doesn't understand IPSec, I'm usually advising them what to do on their side based on the logs on my side. Occasionally I have the far side send me their logs to identify problems, but usually I can tell based on my logs. Unfortunately, IMHO there isn't a fast way to learn IPSec troubleshooting without doing it yourself. It comes from many hours of experience analyzing logs on both sides.
It helps to break down the requirements into bite-sized parts. Can each device reach the peer via IP? If so, can UDP 500 be exchanged? If so, can IPSec be exchanged? If so, then IPSec negotiations begin, along with log analysis. Is phase 1 completing? If so, is phase 2 completing? If so, is there a NAT rule applying to the traffic that shouldn't be (this is the problem about 90% of the time)? If not, is there an ACL blocking the desired traffic? And so on...
Good luck.