<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Issue with new VPN with new Cisco FTD firewall in Cloud Firewall</title>
    <link>https://community.checkpoint.com/t5/Cloud-Firewall/Issue-with-new-VPN-with-new-Cisco-FTD-firewall/m-p/231914#M5824</link>
    <description>&lt;P&gt;Yeah, "calculate based on topology" is really for Check Point hosts that respond to tunnel_test or (Check Point's) RDP probes. &amp;nbsp;3rd party peers should be Main Address for PSK. &amp;nbsp;If you're using certificate authentication, you might can get away with the DNS hostname option, but I've never had a need for that.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 06 Nov 2024 21:09:04 GMT</pubDate>
    <dc:creator>Duane_Toler</dc:creator>
    <dc:date>2024-11-06T21:09:04Z</dc:date>
    <item>
      <title>Issue with new VPN with new Cisco FTD firewall</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Issue-with-new-VPN-with-new-Cisco-FTD-firewall/m-p/231799#M5813</link>
      <description>&lt;P&gt;Hello, we are trying to migrate a VPN with one of our vendors because they bought a new firewall (Cisco FTD), they used to have Cisco ASA. The previous VPN with the previous firewall is working fine, but we are running into the following errors when we test the new VPN with their new firewall.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;Child SA exchange: Received notification from peer: No proposal chosen MyMethods Phase2: AES-256 + HMAC-SHA2-256, No IPComp, No ESN, Group 14&lt;/STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Auth exchange: Received notification from peer: Traffic selectors unacceptable MyTSi: &amp;lt;our fw's public IP&amp;gt; MyTSr: &amp;lt;their fw's public IP&amp;gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Sometimes the VPN is working fine for a day, but the next day it's not and we have to reverse back to the old VPN. The vendor is saying that the VPN configuration in the new firewall is the same as the VPN configuration from their old firewall.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;From their side they get the following error:&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;Local:TheirFWIP:500 Remote:OurFWIP:500 Username:OurFWIP IKEv2 Tunnel rejected: &lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Crypto Map Policy not found for remote traffic selector OurFWIP/OurFWIP/0/65535/0 local traffic selector TheirFWIP/TheirFWIP/0/65535/0!&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Any help would be greatly appreciated. Thank you!&lt;/P&gt;</description>
      <pubDate>Tue, 05 Nov 2024 23:25:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Issue-with-new-VPN-with-new-Cisco-FTD-firewall/m-p/231799#M5813</guid>
      <dc:creator>mfernandez1</dc:creator>
      <dc:date>2024-11-05T23:25:20Z</dc:date>
    </item>
    <item>
      <title>Re: Issue with new VPN with new Cisco FTD firewall</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Issue-with-new-VPN-with-new-Cisco-FTD-firewall/m-p/231800#M5814</link>
      <description>&lt;P&gt;Im not Cisco expert by any means, but having worked on Cisco ASA for few years, Im somewhat familiar with those errors. Plus, it helps when your colleague is a guy who worked for Cisco TAC in India : - )&lt;/P&gt;
&lt;P&gt;Anyway, those messages 100% indicate that problem is with phase 2. How is enc domain configured? Do you have PFS enabled? what DF group is used, if any? Is permanent tunnel enabled? Regular domain based or route based?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Wed, 06 Nov 2024 00:28:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Issue-with-new-VPN-with-new-Cisco-FTD-firewall/m-p/231800#M5814</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-11-06T00:28:37Z</dc:date>
    </item>
    <item>
      <title>Re: Issue with new VPN with new Cisco FTD firewall</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Issue-with-new-VPN-with-new-Cisco-FTD-firewall/m-p/231871#M5815</link>
      <description>&lt;P&gt;Thank you for replying, the encryption domain is configured as a network group that contains 3 network objects that are 3 different subnets x.x.100.0, x.x.101.0, x.x.102.0 with mask 255.255.255.0. PFS is enabled. DF group 14 (2048 bit). Permanent tunnel is enabled. The access rule is configured as source is our internal user IP subnet range and destination is the encryption domain group with subnets objects inside. They are in the same access rule as the old VPN, I am not sure if that matters.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;I have attached screenshots of the configuration.&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 06 Nov 2024 15:07:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Issue-with-new-VPN-with-new-Cisco-FTD-firewall/m-p/231871#M5815</guid>
      <dc:creator>mfernandez1</dc:creator>
      <dc:date>2024-11-06T15:07:57Z</dc:date>
    </item>
    <item>
      <title>Re: Issue with new VPN with new Cisco FTD firewall</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Issue-with-new-VPN-with-new-Cisco-FTD-firewall/m-p/231884#M5816</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/119333"&gt;@mfernandez1&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Did you noticed that at the "Phases and timing" the units are different? (P1 minute, P2 second)?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Sometimes works sometimes not can be key exchange issues, where the root cause is this (lot of times)&lt;/P&gt;
&lt;P&gt;Supernet:&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/sk/sk108600" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk108600&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;The VPN-peer's config contains this tree /24 subnet?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Akos&lt;/P&gt;</description>
      <pubDate>Wed, 06 Nov 2024 16:40:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Issue-with-new-VPN-with-new-Cisco-FTD-firewall/m-p/231884#M5816</guid>
      <dc:creator>AkosBakos</dc:creator>
      <dc:date>2024-11-06T16:40:14Z</dc:date>
    </item>
    <item>
      <title>Re: Issue with new VPN with new Cisco FTD firewall</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Issue-with-new-VPN-with-new-Cisco-FTD-firewall/m-p/231890#M5817</link>
      <description>&lt;P&gt;Why do you have the peer's link selection set to "calculate based on topology" ? &amp;nbsp;This could lead to IKE/phase1 errors when sending IKE ID.&lt;/P&gt;
&lt;P&gt;Despite some popular opinions, FTD doesn't have the exact same VPN code as ASA; it's actually a lot better! &amp;nbsp;However, it doesn't mean the FTD admins didn't configure things "the ASA way". &amp;nbsp;They shouldn't include your gateway's interface IPs in their encryption domain group for your peer (hopefully they didn't).&lt;/P&gt;
&lt;P&gt;If you still can't get it working, then change the Tunnel Management to one tunnel per pair of hosts.. It's wildly inefficient, but it will get the job done.&lt;/P&gt;
&lt;P&gt;You also have DPD (Permanent Tunnels) enabled. &amp;nbsp;Make sure the remote side has their DPD enabled (for FTD is "ISAKMP keepalive").&amp;nbsp;&lt;/P&gt;
&lt;P&gt;FTD configuration with FMC site-to-site VPN configuration:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/device-config/740/management-center-device-config-74/vpn-s2s.html#reference_czb_mgl_wy" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/secure-firewall/management-center/device-config/740/management-center-device-config-74/vpn-s2s.html#reference_czb_mgl_wy&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 06 Nov 2024 18:25:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Issue-with-new-VPN-with-new-Cisco-FTD-firewall/m-p/231890#M5817</guid>
      <dc:creator>Duane_Toler</dc:creator>
      <dc:date>2024-11-06T18:25:05Z</dc:date>
    </item>
    <item>
      <title>Re: Issue with new VPN with new Cisco FTD firewall</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Issue-with-new-VPN-with-new-Cisco-FTD-firewall/m-p/231891#M5818</link>
      <description>&lt;P&gt;Thats great point actually, thats probably not accurate, I would leave it as main IP, as long as its corretc and simply put remote enc vpn domain.&lt;/P&gt;
&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/119333"&gt;@mfernandez1&lt;/a&gt;&amp;nbsp;Can you try that?&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Wed, 06 Nov 2024 18:29:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Issue-with-new-VPN-with-new-Cisco-FTD-firewall/m-p/231891#M5818</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-11-06T18:29:14Z</dc:date>
    </item>
    <item>
      <title>Re: Issue with new VPN with new Cisco FTD firewall</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Issue-with-new-VPN-with-new-Cisco-FTD-firewall/m-p/231892#M5819</link>
      <description>&lt;P&gt;Would be helpfull to see the config of the FTD. Otherwise we all have to guess what could be wrong.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Just ask for screenshot and they can mark out whatever they want. In the end they did the migration on their part.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 06 Nov 2024 18:30:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Issue-with-new-VPN-with-new-Cisco-FTD-firewall/m-p/231892#M5819</guid>
      <dc:creator>Lesley</dc:creator>
      <dc:date>2024-11-06T18:30:41Z</dc:date>
    </item>
    <item>
      <title>Re: Issue with new VPN with new Cisco FTD firewall</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Issue-with-new-VPN-with-new-Cisco-FTD-firewall/m-p/231905#M5820</link>
      <description>&lt;P&gt;Yes I noticed the difference, it is configured the same way as the old VPN that works fine. I will check out the article, thank you.&lt;/P&gt;</description>
      <pubDate>Wed, 06 Nov 2024 20:29:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Issue-with-new-VPN-with-new-Cisco-FTD-firewall/m-p/231905#M5820</guid>
      <dc:creator>mfernandez1</dc:creator>
      <dc:date>2024-11-06T20:29:22Z</dc:date>
    </item>
    <item>
      <title>Re: Issue with new VPN with new Cisco FTD firewall</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Issue-with-new-VPN-with-new-Cisco-FTD-firewall/m-p/231906#M5821</link>
      <description>&lt;P&gt;We had it as "Always use this IP address" - Main Address, but we changed it to "calculate based on topology" to test it. I will ask them to send me screenshots of the configuration on their firewall and confirm keepalive is configured.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 06 Nov 2024 20:38:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Issue-with-new-VPN-with-new-Cisco-FTD-firewall/m-p/231906#M5821</guid>
      <dc:creator>mfernandez1</dc:creator>
      <dc:date>2024-11-06T20:38:04Z</dc:date>
    </item>
    <item>
      <title>Re: Issue with new VPN with new Cisco FTD firewall</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Issue-with-new-VPN-with-new-Cisco-FTD-firewall/m-p/231907#M5822</link>
      <description>&lt;P&gt;I assume neither one worked then?&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Wed, 06 Nov 2024 20:39:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Issue-with-new-VPN-with-new-Cisco-FTD-firewall/m-p/231907#M5822</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-11-06T20:39:11Z</dc:date>
    </item>
    <item>
      <title>Re: Issue with new VPN with new Cisco FTD firewall</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Issue-with-new-VPN-with-new-Cisco-FTD-firewall/m-p/231913#M5823</link>
      <description>&lt;P&gt;I think I will change it back to&amp;nbsp;"Always use this IP address" because before it at least worked for a day, now it does not work at all, but in the old VPN that is working right now it is set as&amp;nbsp;"calculate based on topology"&lt;/P&gt;</description>
      <pubDate>Wed, 06 Nov 2024 21:05:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Issue-with-new-VPN-with-new-Cisco-FTD-firewall/m-p/231913#M5823</guid>
      <dc:creator>mfernandez1</dc:creator>
      <dc:date>2024-11-06T21:05:30Z</dc:date>
    </item>
    <item>
      <title>Re: Issue with new VPN with new Cisco FTD firewall</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Issue-with-new-VPN-with-new-Cisco-FTD-firewall/m-p/231914#M5824</link>
      <description>&lt;P&gt;Yeah, "calculate based on topology" is really for Check Point hosts that respond to tunnel_test or (Check Point's) RDP probes. &amp;nbsp;3rd party peers should be Main Address for PSK. &amp;nbsp;If you're using certificate authentication, you might can get away with the DNS hostname option, but I've never had a need for that.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 06 Nov 2024 21:09:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Issue-with-new-VPN-with-new-Cisco-FTD-firewall/m-p/231914#M5824</guid>
      <dc:creator>Duane_Toler</dc:creator>
      <dc:date>2024-11-06T21:09:04Z</dc:date>
    </item>
    <item>
      <title>Re: Issue with new VPN with new Cisco FTD firewall</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Issue-with-new-VPN-with-new-Cisco-FTD-firewall/m-p/231915#M5825</link>
      <description>&lt;P&gt;I just sent them an email to see if they can provide screenshots of the configuration and confirm that their encryption domain is set up the same way with the 3 subnets and mask, that they are not&amp;nbsp;including our gateway's interface IPs in their encryption domain group, and that keepalive is configured. Thanks everyone!&lt;/P&gt;</description>
      <pubDate>Wed, 06 Nov 2024 21:12:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Issue-with-new-VPN-with-new-Cisco-FTD-firewall/m-p/231915#M5825</guid>
      <dc:creator>mfernandez1</dc:creator>
      <dc:date>2024-11-06T21:12:58Z</dc:date>
    </item>
    <item>
      <title>Re: Issue with new VPN with new Cisco FTD firewall</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Issue-with-new-VPN-with-new-Cisco-FTD-firewall/m-p/233856#M5826</link>
      <description>&lt;P&gt;This is what they sent me, I dont think it shows everything&lt;/P&gt;</description>
      <pubDate>Tue, 26 Nov 2024 20:31:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Issue-with-new-VPN-with-new-Cisco-FTD-firewall/m-p/233856#M5826</guid>
      <dc:creator>mfernandez1</dc:creator>
      <dc:date>2024-11-26T20:31:57Z</dc:date>
    </item>
    <item>
      <title>Re: Issue with new VPN with new Cisco FTD firewall</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Issue-with-new-VPN-with-new-Cisco-FTD-firewall/m-p/233858#M5827</link>
      <description>&lt;P&gt;Thats not helpful, sorry.&lt;/P&gt;</description>
      <pubDate>Tue, 26 Nov 2024 20:35:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Issue-with-new-VPN-with-new-Cisco-FTD-firewall/m-p/233858#M5827</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-11-26T20:35:12Z</dc:date>
    </item>
    <item>
      <title>Re: Issue with new VPN with new Cisco FTD firewall</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Issue-with-new-VPN-with-new-Cisco-FTD-firewall/m-p/233866#M5828</link>
      <description>&lt;P&gt;I came across this menu called traditional mode and see that it does not have anything selected. I have not seen or used it before, could this be the issue?&lt;/P&gt;</description>
      <pubDate>Tue, 26 Nov 2024 22:56:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Issue-with-new-VPN-with-new-Cisco-FTD-firewall/m-p/233866#M5828</guid>
      <dc:creator>mfernandez1</dc:creator>
      <dc:date>2024-11-26T22:56:26Z</dc:date>
    </item>
    <item>
      <title>Re: Issue with new VPN with new Cisco FTD firewall</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Issue-with-new-VPN-with-new-Cisco-FTD-firewall/m-p/233867#M5829</link>
      <description>&lt;P&gt;Nothing needs to be changed there leave that as it was.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 26 Nov 2024 23:03:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Issue-with-new-VPN-with-new-Cisco-FTD-firewall/m-p/233867#M5829</guid>
      <dc:creator>Lesley</dc:creator>
      <dc:date>2024-11-26T23:03:43Z</dc:date>
    </item>
    <item>
      <title>Re: Issue with new VPN with new Cisco FTD firewall</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Issue-with-new-VPN-with-new-Cisco-FTD-firewall/m-p/233868#M5830</link>
      <description>&lt;P&gt;Maybe time for vpn debug on our side? And review it in ike view.&lt;/P&gt;
&lt;P&gt;the config screenshot does not show a lot. Would be interested in encryption methods and timers. It could be timer issue if you say tunnel works a day and then stops.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 26 Nov 2024 23:07:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Issue-with-new-VPN-with-new-Cisco-FTD-firewall/m-p/233868#M5830</guid>
      <dc:creator>Lesley</dc:creator>
      <dc:date>2024-11-26T23:07:24Z</dc:date>
    </item>
    <item>
      <title>Re: Issue with new VPN with new Cisco FTD firewall</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Issue-with-new-VPN-with-new-Cisco-FTD-firewall/m-p/240628#M5831</link>
      <description>&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="IKEv2 IPSec.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/29551iD98A5B79E192678A/image-size/medium?v=v2&amp;amp;px=400" role="button" title="IKEv2 IPSec.png" alt="IKEv2 IPSec.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="IKEv2 policy.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/29549iA641A39456BF47FD/image-size/medium?v=v2&amp;amp;px=400" role="button" title="IKEv2 policy.png" alt="IKEv2 policy.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="IKEv2 IPSec Advanced.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/29550i5AB8273BA684869A/image-size/medium?v=v2&amp;amp;px=400" role="button" title="IKEv2 IPSec Advanced.png" alt="IKEv2 IPSec Advanced.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;   These are the configurations from FTD side&lt;/P&gt;</description>
      <pubDate>Thu, 06 Feb 2025 15:47:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Issue-with-new-VPN-with-new-Cisco-FTD-firewall/m-p/240628#M5831</guid>
      <dc:creator>mfernandez1</dc:creator>
      <dc:date>2025-02-06T15:47:33Z</dc:date>
    </item>
    <item>
      <title>Re: Issue with new VPN with new Cisco FTD firewall</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/Issue-with-new-VPN-with-new-Cisco-FTD-firewall/m-p/240633#M5832</link>
      <description>&lt;P&gt;The last time that the VPN went down we unchecked this option "Disable NAT inside the VPN Community" in our Checkpoint firewall and it started working again but only for 1 day.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Disable Nat.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/29552i78413EAFEF486958/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Disable Nat.png" alt="Disable Nat.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 06 Feb 2025 15:58:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/Issue-with-new-VPN-with-new-Cisco-FTD-firewall/m-p/240633#M5832</guid>
      <dc:creator>mfernandez1</dc:creator>
      <dc:date>2025-02-06T15:58:01Z</dc:date>
    </item>
  </channel>
</rss>

