<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Practical Advanced VPN Troubleshooting (Check Point) in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Practical-Advanced-VPN-Troubleshooting-Check-Point/m-p/273047#M103988</link>
    <description>&lt;P&gt;Truly amazing, brother. So lucky to have you on community &lt;span class="lia-unicode-emoji" title=":raising_hands:"&gt;🙌&lt;/span&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 10 Mar 2026 21:24:57 GMT</pubDate>
    <dc:creator>the_rock</dc:creator>
    <dc:date>2026-03-10T21:24:57Z</dc:date>
    <item>
      <title>Practical Advanced VPN Troubleshooting (Check Point)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Practical-Advanced-VPN-Troubleshooting-Check-Point/m-p/273039#M103981</link>
      <description>&lt;H2&gt;Using &lt;STRONG&gt;vpn debug&lt;/STRONG&gt; + kernel evidence (only when needed) — CheckMates-style&lt;/H2&gt;
&lt;P&gt;&lt;span class="lia-unicode-emoji" title=":warning:"&gt;⚠️&lt;/span&gt; &lt;STRONG&gt;Operational impact warning:&lt;/STRONG&gt; VPN debug—and especially &lt;STRONG&gt;kernel debug&lt;/STRONG&gt;—can generate high log volume and impact performance. Use a controlled window, ideally with &lt;STRONG&gt;console access&lt;/STRONG&gt;, and &lt;STRONG&gt;always apply filters&lt;/STRONG&gt; before collecting kernel evidence.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H2&gt;1) The right mindset: what you must prove (and at which layer)&lt;/H2&gt;
&lt;P&gt;Before turning on debug, define the hypothesis and the evidence you expect:&lt;/P&gt;
&lt;H3&gt;Layer 0 — IKE / NAT-T Connectivity&lt;/H3&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;Does the peer respond on &lt;STRONG&gt;UDP/500&lt;/STRONG&gt; (IKE) and, if NAT exists, &lt;STRONG&gt;UDP/4500&lt;/STRONG&gt; (NAT-T)?&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;Any upstream block? Asymmetric routing? ISP ALG interference?&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3&gt;Layer 1 — IKE Negotiation (Phase 1 / IKE SA)&lt;/H3&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;Compatible proposals (encryption / integrity / DH group)?&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;Authentication matches (PSK / certificate / ID)?&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;Certificate chain / CRL / time sync (clock skew) OK?&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3&gt;Layer 2 — Child SA / Phase 2 (Traffic Selectors)&lt;/H3&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;Do &lt;STRONG&gt;Encryption Domain / Traffic Selectors&lt;/STRONG&gt; match on both sides?&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;Correct &lt;STRONG&gt;NAT exemption&lt;/STRONG&gt;?&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;Does traffic match policy and enter VPN?&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3&gt;Layer 3 — Data Plane&lt;/H3&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;Is &lt;STRONG&gt;ESP (IP proto 50)&lt;/STRONG&gt; flowing both directions? Any kernel drops?&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;Is &lt;STRONG&gt;SecureXL&lt;/STRONG&gt; affecting visibility/behavior? Do you need to reproduce with a non-accelerated path?&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;H2&gt;2) Preparation (before debug)&lt;/H2&gt;
&lt;H3&gt;2.1 Minimum checklist (prevents unnecessary debug)&lt;/H3&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;Verify &lt;STRONG&gt;time/NTP&lt;/STRONG&gt; (common root cause for certificate/IKE failures).&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;Confirm policy is installed and rules allow &lt;STRONG&gt;UDP/500, UDP/4500, ESP (proto 50)&lt;/STRONG&gt; between peers.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;Confirm route to the peer and return path (especially multi-ISP).&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;Confirm Site-to-Site &lt;STRONG&gt;NAT exemption&lt;/STRONG&gt; and ensure there is no “surprise NAT” in the path.&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3&gt;2.2 Define the debug “target”&lt;/H3&gt;
&lt;P&gt;Use real IPs from the case. Example safe test IPs (documentation ranges):&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;Remote peer (public): &lt;STRONG&gt;203.0.113.10&lt;/STRONG&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;Local (public): &lt;STRONG&gt;198.51.100.5&lt;/STRONG&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;Local network: &lt;STRONG&gt;10.10.10.0/24&lt;/STRONG&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;Remote network: &lt;STRONG&gt;10.20.20.0/24&lt;/STRONG&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;H2&gt;3) Standard evidence pack (CheckMates-ready): 3 sessions + consistent logs&lt;/H2&gt;
&lt;H3&gt;Session A — VPN debug (user space)&lt;/H3&gt;
&lt;OL&gt;
&lt;LI&gt;
&lt;P&gt;Enter &lt;STRONG&gt;Expert&lt;/STRONG&gt;.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;Normalize/truncate before starting:&lt;/P&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;PRE&gt;&lt;CODE class="language-bash"&gt;vpn debug trunc ALL=5
&lt;/CODE&gt;&lt;/PRE&gt;
&lt;OL start="3"&gt;
&lt;LI&gt;
&lt;P&gt;Enable VPN debug:&lt;/P&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;PRE&gt;&lt;CODE class="language-bash"&gt;vpn debug on
&lt;/CODE&gt;&lt;/PRE&gt;
&lt;OL start="4"&gt;
&lt;LI&gt;
&lt;P&gt;(Optional, very useful) Enable timestamps:&lt;/P&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;PRE&gt;&lt;CODE class="language-bash"&gt;vpn debug timeon
&lt;/CODE&gt;&lt;/PRE&gt;
&lt;OL start="5"&gt;
&lt;LI&gt;
&lt;P&gt;Follow logs in real time (separate tab is ideal):&lt;/P&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;PRE&gt;&lt;CODE class="language-bash"&gt;tail -f $FWDIR/log/vpnd.elg
tail -f $FWDIR/log/ike.elg
&lt;/CODE&gt;&lt;/PRE&gt;
&lt;P&gt;&lt;CODE&gt;vpn debug&lt;/CODE&gt; writes evidence to &lt;STRONG&gt;vpnd.elg&lt;/STRONG&gt; and &lt;STRONG&gt;ike.elg&lt;/STRONG&gt; under &lt;CODE&gt;$FWDIR/log/&lt;/CODE&gt;.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;When to use &lt;CODE&gt;ikefail&lt;/CODE&gt;&lt;/STRONG&gt;&lt;BR /&gt;If the issue is intermittent and you want to see failures or error events in IKE trading&lt;/P&gt;
&lt;PRE&gt;&lt;CODE class="language-bash"&gt;vpn debug ikefail
&lt;/CODE&gt;&lt;/PRE&gt;
&lt;H3&gt;&amp;nbsp;&lt;/H3&gt;
&lt;H3&gt;Session B — Network capture (tcpdump) for IKE/NAT-T/ESP&lt;/H3&gt;
&lt;P&gt;Goal: prove “Did the peer respond?”, “Did it migrate to NAT-T?”, “Is ESP flowing?”&lt;/P&gt;
&lt;PRE&gt;&lt;CODE class="language-bash"&gt;tcpdump -ni &amp;lt;wan_iface&amp;gt; -vvv "(udp port 500 or udp port 4500 or proto 50)"
&lt;/CODE&gt;&lt;/PRE&gt;
&lt;P&gt;&lt;STRONG&gt;Practical interpretation&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;Only UDP/500 outbound and nothing returns → upstream block / routing / ACL.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;UDP/500 then UDP/4500 → NAT-T in action (expected when NAT exists).&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;ESP outbound but not inbound → return path / upstream ACL / ISP / asymmetric routing / remote drop.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;ESP both directions but application fails → likely Phase 2 / selectors / NAT exemption / policy.&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3&gt;&amp;nbsp;&lt;/H3&gt;
&lt;H3&gt;Session C — (Optional) IKE monitor (snoop) when you must “see the conversation”&lt;/H3&gt;
&lt;P&gt;If you need deeper visibility:&lt;/P&gt;
&lt;PRE&gt;&lt;CODE class="language-bash"&gt;vpn debug mon
&lt;/CODE&gt;&lt;/PRE&gt;
&lt;P&gt;This generates a snoop capture (for example &lt;CODE&gt;ikemonitor.snoop&lt;/CODE&gt;) for analysis.&lt;BR /&gt;&lt;span class="lia-unicode-emoji" title=":warning:"&gt;⚠️&lt;/span&gt; &lt;STRONG&gt;Sensitive data warning:&lt;/STRONG&gt; can record sensitive information (e.g., XAUTH/password) depending on the scenario. Use only when necessary and handle per policy.&lt;/P&gt;
&lt;P&gt;To stop:&lt;/P&gt;
&lt;PRE&gt;&lt;CODE class="language-bash"&gt;vpn debug moff
&lt;/CODE&gt;&lt;/PRE&gt;
&lt;HR /&gt;
&lt;H2&gt;4) When (and how) to use Kernel Debug without hurting the environment&lt;/H2&gt;
&lt;P&gt;&lt;STRONG&gt;Golden rule:&lt;/STRONG&gt; never run kernel debug “blind.” Filter by &lt;STRONG&gt;VPN peer&lt;/STRONG&gt; or &lt;STRONG&gt;5-tuple&lt;/STRONG&gt;, then capture.&lt;/P&gt;
&lt;H3&gt;4.1 Filter by VPN peer (fastest for VPN incidents)&lt;/H3&gt;
&lt;PRE&gt;&lt;CODE class="language-bash"&gt;fw ctl set int simple_debug_filter_off 1
fw ctl set str simple_debug_filter_vpn_1 "203.0.113.10"
&lt;/CODE&gt;&lt;/PRE&gt;
&lt;P&gt;&lt;CODE&gt;simple_debug_filter_vpn_&amp;lt;N&amp;gt;&lt;/CODE&gt; filters kernel debug output by VPN peer.&lt;/P&gt;
&lt;H3&gt;4.2 Filter by 5-tuple (flow-specific issues)&lt;/H3&gt;
&lt;P&gt;Example (test HTTPS between two hosts):&lt;/P&gt;
&lt;PRE&gt;&lt;CODE class="language-bash"&gt;fw ctl set int simple_debug_filter_off 1
fw ctl set str simple_debug_filter_saddr_1 "10.10.10.50"
fw ctl set str simple_debug_filter_daddr_1 "10.20.20.80"
fw ctl set int simple_debug_filter_dport_1 443
fw ctl set int simple_debug_filter_proto_1 6
&lt;/CODE&gt;&lt;/PRE&gt;
&lt;P&gt;The filter logic supports &lt;STRONG&gt;AND&lt;/STRONG&gt; (same index) and &lt;STRONG&gt;OR&lt;/STRONG&gt; (different indices), including covering both directions if needed.&lt;/P&gt;
&lt;H3&gt;4.3 Disable filters at the end (mandatory hygiene)&lt;/H3&gt;
&lt;PRE&gt;&lt;CODE class="language-bash"&gt;fw ctl set int simple_debug_filter_off 1
&lt;/CODE&gt;&lt;/PRE&gt;
&lt;H2&gt;&amp;nbsp;&lt;/H2&gt;
&lt;H2&gt;5) End-to-end “copy/paste” sequence&lt;/H2&gt;
&lt;H3&gt;Start (Session A)&lt;/H3&gt;
&lt;PRE&gt;&lt;CODE class="language-bash"&gt;vpn debug trunc ALL=5
vpn debug timeon
vpn debug on
&lt;/CODE&gt;&lt;/PRE&gt;
&lt;H3&gt;Network capture (Session B)&lt;/H3&gt;
&lt;PRE&gt;&lt;CODE class="language-bash"&gt;tcpdump -ni &amp;lt;wan_iface&amp;gt; -vvv "(udp port 500 or udp port 4500 or proto 50)"
&lt;/CODE&gt;&lt;/PRE&gt;
&lt;H3&gt;(Optional) IKE monitor (Session C)&lt;/H3&gt;
&lt;PRE&gt;&lt;CODE class="language-bash"&gt;vpn debug mon
&lt;/CODE&gt;&lt;/PRE&gt;
&lt;H3&gt;Reproduce the issue&lt;/H3&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;Bring up the tunnel / generate interesting traffic&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;Record the exact test timestamp for correlation&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3&gt;Stop (Session A)&lt;/H3&gt;
&lt;PRE&gt;&lt;CODE class="language-bash"&gt;vpn debug off
vpn debug timeoff
&lt;/CODE&gt;&lt;/PRE&gt;
&lt;H3&gt;Stop monitor (if used)&lt;/H3&gt;
&lt;PRE&gt;&lt;CODE class="language-bash"&gt;vpn debug moff
&lt;/CODE&gt;&lt;/PRE&gt;
&lt;H3&gt;If you enabled kernel debug filters&lt;/H3&gt;
&lt;PRE&gt;&lt;CODE class="language-bash"&gt;fw ctl set int simple_debug_filter_off 1
&lt;/CODE&gt;&lt;/PRE&gt;
&lt;H2&gt;&amp;nbsp;&lt;/H2&gt;
&lt;H2&gt;6) What to look for in the logs (evidence-driven diagnosis)&lt;/H2&gt;
&lt;H3&gt;6.1 IKE (Phase 1 / IKE SA) failures&lt;/H3&gt;
&lt;P&gt;Common patterns:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;“no proposal chosen”&lt;/STRONG&gt; → proposal mismatch (encryption/integrity/DH).&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;“invalid ID / ID mismatch”&lt;/STRONG&gt; → peer identity mismatch (DN/FQDN/IP).&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;“peer not responding”&lt;/STRONG&gt; → network/ACL/routing/NAT-T/ISP (prove with tcpdump).&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;How to close the case with evidence&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;If tcpdump shows &lt;STRONG&gt;no reply&lt;/STRONG&gt; on UDP/500/4500 → not “VPN config,” it’s connectivity/path.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;If the peer replies and negotiation stops at a consistent point → correlate timestamps in &lt;STRONG&gt;ike.elg/vpnd.elg&lt;/STRONG&gt; to identify the exact failure.&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3&gt;6.2 Phase 2 / Traffic Selector failures&lt;/H3&gt;
&lt;P&gt;Typical signs:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;IKE comes up, but traffic doesn’t pass.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;ESP is missing or only one direction.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;Sessions match the wrong behavior due to NAT/routing.&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;Proof points&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;tcpdump seeing &lt;STRONG&gt;proto 50&lt;/STRONG&gt; confirms ESP.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;CODE&gt;vpnd.elg&lt;/CODE&gt; typically exposes TS/encryption domain mismatch.&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;H2&gt;7) VSX (when applicable)&lt;/H2&gt;
&lt;P&gt;Before collecting anything, switch to the correct VS:&lt;/P&gt;
&lt;PRE&gt;&lt;CODE class="language-bash"&gt;vsenv &amp;lt;VSID&amp;gt;
&lt;/CODE&gt;&lt;/PRE&gt;
&lt;P&gt;Then run the steps above (each VS has its own contexts/logs).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 10 Mar 2026 20:14:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Practical-Advanced-VPN-Troubleshooting-Check-Point/m-p/273039#M103981</guid>
      <dc:creator>WiliRGasparetto</dc:creator>
      <dc:date>2026-03-10T20:14:47Z</dc:date>
    </item>
    <item>
      <title>Re: Practical Advanced VPN Troubleshooting (Check Point)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Practical-Advanced-VPN-Troubleshooting-Check-Point/m-p/273042#M103984</link>
      <description>&lt;P&gt;Keep it up!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 10 Mar 2026 20:27:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Practical-Advanced-VPN-Troubleshooting-Check-Point/m-p/273042#M103984</guid>
      <dc:creator>Pedro139128</dc:creator>
      <dc:date>2026-03-10T20:27:51Z</dc:date>
    </item>
    <item>
      <title>Re: Practical Advanced VPN Troubleshooting (Check Point)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Practical-Advanced-VPN-Troubleshooting-Check-Point/m-p/273047#M103988</link>
      <description>&lt;P&gt;Truly amazing, brother. So lucky to have you on community &lt;span class="lia-unicode-emoji" title=":raising_hands:"&gt;🙌&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 10 Mar 2026 21:24:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Practical-Advanced-VPN-Troubleshooting-Check-Point/m-p/273047#M103988</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2026-03-10T21:24:57Z</dc:date>
    </item>
    <item>
      <title>Re: Practical Advanced VPN Troubleshooting (Check Point)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Practical-Advanced-VPN-Troubleshooting-Check-Point/m-p/273056#M103991</link>
      <description>&lt;P&gt;Well done, brother!&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/96099"&gt;@WiliRGasparetto&lt;/a&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 10 Mar 2026 21:47:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Practical-Advanced-VPN-Troubleshooting-Check-Point/m-p/273056#M103991</guid>
      <dc:creator>PedroRFernandes</dc:creator>
      <dc:date>2026-03-10T21:47:50Z</dc:date>
    </item>
    <item>
      <title>Re: Practical Advanced VPN Troubleshooting (Check Point)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Practical-Advanced-VPN-Troubleshooting-Check-Point/m-p/273132#M104026</link>
      <description>&lt;P&gt;Thank you so much &lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/38213"&gt;@the_rock&lt;/a&gt;&amp;nbsp;, and the feeling is mutual. You are an inspiration to us all.&lt;/P&gt;</description>
      <pubDate>Wed, 11 Mar 2026 13:36:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Practical-Advanced-VPN-Troubleshooting-Check-Point/m-p/273132#M104026</guid>
      <dc:creator>WiliRGasparetto</dc:creator>
      <dc:date>2026-03-11T13:36:01Z</dc:date>
    </item>
    <item>
      <title>Re: Practical Advanced VPN Troubleshooting (Check Point)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Practical-Advanced-VPN-Troubleshooting-Check-Point/m-p/273133#M104027</link>
      <description>&lt;P&gt;Thanks mate, means a lot you saying that.&lt;/P&gt;</description>
      <pubDate>Wed, 11 Mar 2026 13:37:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Practical-Advanced-VPN-Troubleshooting-Check-Point/m-p/273133#M104027</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2026-03-11T13:37:35Z</dc:date>
    </item>
    <item>
      <title>Re: Practical Advanced VPN Troubleshooting (Check Point)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Practical-Advanced-VPN-Troubleshooting-Check-Point/m-p/273234#M104062</link>
      <description>&lt;P&gt;Well, I'm just telling the truth. When I started, you were always one of my biggest role models.&lt;/P&gt;</description>
      <pubDate>Thu, 12 Mar 2026 09:46:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Practical-Advanced-VPN-Troubleshooting-Check-Point/m-p/273234#M104062</guid>
      <dc:creator>WiliRGasparetto</dc:creator>
      <dc:date>2026-03-12T09:46:10Z</dc:date>
    </item>
    <item>
      <title>Re: Practical Advanced VPN Troubleshooting (Check Point)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Practical-Advanced-VPN-Troubleshooting-Check-Point/m-p/273253#M104063</link>
      <description>&lt;P&gt;You are too kind, man.&lt;/P&gt;</description>
      <pubDate>Thu, 12 Mar 2026 11:51:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Practical-Advanced-VPN-Troubleshooting-Check-Point/m-p/273253#M104063</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2026-03-12T11:51:55Z</dc:date>
    </item>
    <item>
      <title>Re: Practical Advanced VPN Troubleshooting (Check Point)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Practical-Advanced-VPN-Troubleshooting-Check-Point/m-p/273439#M104123</link>
      <description>&lt;P&gt;thk's&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/139126"&gt;@PedroRFernandes&lt;/a&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 14 Mar 2026 11:31:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Practical-Advanced-VPN-Troubleshooting-Check-Point/m-p/273439#M104123</guid>
      <dc:creator>WiliRGasparetto</dc:creator>
      <dc:date>2026-03-14T11:31:45Z</dc:date>
    </item>
    <item>
      <title>Re: Practical Advanced VPN Troubleshooting (Check Point)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Practical-Advanced-VPN-Troubleshooting-Check-Point/m-p/274150#M104432</link>
      <description>&lt;P&gt;hehe&lt;/P&gt;</description>
      <pubDate>Wed, 25 Mar 2026 12:06:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Practical-Advanced-VPN-Troubleshooting-Check-Point/m-p/274150#M104432</guid>
      <dc:creator>WiliRGasparetto</dc:creator>
      <dc:date>2026-03-25T12:06:42Z</dc:date>
    </item>
  </channel>
</rss>

