<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ESP traffic dropped by remote party in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ESP-traffic-dropped-by-remote-party/m-p/92827#M10591</link>
    <description>&lt;P&gt;Hi CheckMates,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In a Cluster environment (R80.30) we have a new internet connection and our first task is to migrate the VPN's to the second internet connection. We succesfully did that for multiple VPN's now, but only 2 VPN's have the same issue. I have to say that the new internet connection is a little bit special, since the IP addres of the external interface is used for a transit network with our ISP. The real public IP is on another interface and the ISP routes it to the firewall cluster.&lt;/P&gt;&lt;P&gt;For the last 2 VPN's, we do get succesfully a P1 and P2. &lt;SPAN&gt;Also the remote party is able to sent traffic to us. We can see that traffic in the logs getting decrypted and confirmed that&amp;nbsp;with a packet capture on the Check Point. Unfortunately&amp;nbsp;all the traffic we sent to the remote party, is dropped on the Cisco ASA because the ESP traffic is received on the side from our new external interface ip (the ip used for transit between our Check Point and ISP).&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;So this is a legitimate reason to drop our traffic of course. But how can we force the Check Point to sent ESP packets with the right source ip adres? Why do only have 2 of the 7 VPN's this issue?&amp;nbsp;&lt;/P&gt;&lt;P&gt;I first thought that it had something to do with routing or link selection. But if that is the case, I do not understand why this setup works for the other 5 VPN's.&lt;/P&gt;&lt;P&gt;Thank you in advance!&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Wesley&lt;/P&gt;</description>
    <pubDate>Thu, 30 Jul 2020 07:47:34 GMT</pubDate>
    <dc:creator>Wesley_van_der_</dc:creator>
    <dc:date>2020-07-30T07:47:34Z</dc:date>
    <item>
      <title>ESP traffic dropped by remote party</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ESP-traffic-dropped-by-remote-party/m-p/92827#M10591</link>
      <description>&lt;P&gt;Hi CheckMates,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In a Cluster environment (R80.30) we have a new internet connection and our first task is to migrate the VPN's to the second internet connection. We succesfully did that for multiple VPN's now, but only 2 VPN's have the same issue. I have to say that the new internet connection is a little bit special, since the IP addres of the external interface is used for a transit network with our ISP. The real public IP is on another interface and the ISP routes it to the firewall cluster.&lt;/P&gt;&lt;P&gt;For the last 2 VPN's, we do get succesfully a P1 and P2. &lt;SPAN&gt;Also the remote party is able to sent traffic to us. We can see that traffic in the logs getting decrypted and confirmed that&amp;nbsp;with a packet capture on the Check Point. Unfortunately&amp;nbsp;all the traffic we sent to the remote party, is dropped on the Cisco ASA because the ESP traffic is received on the side from our new external interface ip (the ip used for transit between our Check Point and ISP).&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;So this is a legitimate reason to drop our traffic of course. But how can we force the Check Point to sent ESP packets with the right source ip adres? Why do only have 2 of the 7 VPN's this issue?&amp;nbsp;&lt;/P&gt;&lt;P&gt;I first thought that it had something to do with routing or link selection. But if that is the case, I do not understand why this setup works for the other 5 VPN's.&lt;/P&gt;&lt;P&gt;Thank you in advance!&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Wesley&lt;/P&gt;</description>
      <pubDate>Thu, 30 Jul 2020 07:47:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ESP-traffic-dropped-by-remote-party/m-p/92827#M10591</guid>
      <dc:creator>Wesley_van_der_</dc:creator>
      <dc:date>2020-07-30T07:47:34Z</dc:date>
    </item>
    <item>
      <title>Re: ESP traffic dropped by remote party</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ESP-traffic-dropped-by-remote-party/m-p/92873#M10592</link>
      <description>&lt;P&gt;Please post the settings from these screens in your configuration, feel free to redact IP addresses as needed.&amp;nbsp; Also is the Main Address on the General Properties screen of the firewall/cluster object set to the transit address or the VPN IP address?&amp;nbsp; Are any of the other working 5 VPNs Cisco?&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="VPN_Link.jpg" style="width: 768px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/7428i4F6F7DFAD1DBFC8C/image-size/large?v=v2&amp;amp;px=999" role="button" title="VPN_Link.jpg" alt="VPN_Link.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 30 Jul 2020 14:22:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ESP-traffic-dropped-by-remote-party/m-p/92873#M10592</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2020-07-30T14:22:01Z</dc:date>
    </item>
    <item>
      <title>Re: ESP traffic dropped by remote party</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ESP-traffic-dropped-by-remote-party/m-p/92876#M10593</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;IKEv2 ?&lt;/P&gt;&lt;P&gt;If so, I suggest changing to IKEv1&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.checkpoint.com/t5/General-Topics/VPN-issue-with-IKEv2-and-Cisco-ASA/m-p/64830#M13243" target="_blank"&gt;https://community.checkpoint.com/t5/General-Topics/VPN-issue-with-IKEv2-and-Cisco-ASA/m-p/64830#M13243&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.checkpoint.com/t5/Next-Generation-Firewall/Site-to-Site-VPN-Check-Point-R80-10-to-Cisco-ASA-Troubleshooting/td-p/22021" target="_blank"&gt;https://community.checkpoint.com/t5/Next-Generation-Firewall/Site-to-Site-VPN-Check-Point-R80-10-to-Cisco-ASA-Troubleshooting/td-p/22021&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 30 Jul 2020 14:50:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ESP-traffic-dropped-by-remote-party/m-p/92876#M10593</guid>
      <dc:creator>funkylicious</dc:creator>
      <dc:date>2020-07-30T14:50:56Z</dc:date>
    </item>
    <item>
      <title>Re: ESP traffic dropped by remote party</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ESP-traffic-dropped-by-remote-party/m-p/93122#M10594</link>
      <description>&lt;P&gt;Hi Timothy,&lt;/P&gt;&lt;P&gt;The IP address shown in SmartConsole is a RFC1918 address which is used for the MPLS connection to branch offices. There is also a VPN configured on this interface with the branch offices.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="LinkSelection.PNG" style="width: 754px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/7458iCEB405B6C389F0D3/image-size/large?v=v2&amp;amp;px=999" role="button" title="LinkSelection.PNG" alt="LinkSelection.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Above you find our current settings. TAC advised us to change the Respond Traffic setting to "use outgoing traffic configuration" instead of "Reply from the same interface".&lt;/P&gt;&lt;P&gt;I thought that these were the only VPN's with a Cisco device, but not 100% sure.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Wesley&lt;/P&gt;</description>
      <pubDate>Mon, 03 Aug 2020 06:04:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ESP-traffic-dropped-by-remote-party/m-p/93122#M10594</guid>
      <dc:creator>Wesley_van_der_</dc:creator>
      <dc:date>2020-08-03T06:04:36Z</dc:date>
    </item>
    <item>
      <title>Re: ESP traffic dropped by remote party</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ESP-traffic-dropped-by-remote-party/m-p/93123#M10595</link>
      <description>&lt;P&gt;All tunnels are IKEv1.&lt;/P&gt;</description>
      <pubDate>Mon, 03 Aug 2020 06:05:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ESP-traffic-dropped-by-remote-party/m-p/93123#M10595</guid>
      <dc:creator>Wesley_van_der_</dc:creator>
      <dc:date>2020-08-03T06:05:40Z</dc:date>
    </item>
    <item>
      <title>Re: ESP traffic dropped by remote party</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ESP-traffic-dropped-by-remote-party/m-p/93175#M10596</link>
      <description>&lt;P&gt;On the Interoperable Device objects representing the Ciscos that are having the problem, what is Link Selection set for there?&lt;/P&gt;</description>
      <pubDate>Mon, 03 Aug 2020 15:40:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ESP-traffic-dropped-by-remote-party/m-p/93175#M10596</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2020-08-03T15:40:47Z</dc:date>
    </item>
    <item>
      <title>Re: ESP traffic dropped by remote party</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ESP-traffic-dropped-by-remote-party/m-p/108230#M14589</link>
      <description>&lt;P&gt;Hi Wesley_van_der,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I believe I am experiencing the same issue- did you ever get a solution to this ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Let me know.&lt;/P&gt;</description>
      <pubDate>Tue, 19 Jan 2021 22:36:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/ESP-traffic-dropped-by-remote-party/m-p/108230#M14589</guid>
      <dc:creator>Darren_Fine</dc:creator>
      <dc:date>2021-01-19T22:36:07Z</dc:date>
    </item>
  </channel>
</rss>

