<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: IKEv2 issues with R80.30 JHA 166 - traffic selectors unacceptable in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IKEv2-issues-with-R80-30-JHA-166-traffic-selectors-unacceptable/m-p/93922#M10624</link>
    <description>&lt;P&gt;Just a wild guess here...&lt;/P&gt;&lt;P&gt;Do you use host objects or network objects (/32) in the remote encryption domain object? If you are using host objects, can you try again with network objects?&lt;/P&gt;</description>
    <pubDate>Wed, 12 Aug 2020 13:07:38 GMT</pubDate>
    <dc:creator>Tobias_Moritz</dc:creator>
    <dc:date>2020-08-12T13:07:38Z</dc:date>
    <item>
      <title>IKEv2 issues with R80.30 JHA 166 - traffic selectors unacceptable</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IKEv2-issues-with-R80-30-JHA-166-traffic-selectors-unacceptable/m-p/93887#M10623</link>
      <description>&lt;P&gt;Hi all, I'm having an issue with IKEv2 support. Tunnel management is set to tunnel per host. Access is basically /32 to /32. Tunnel fails during phase 2. We did some debugging via ikeview and everything looked ok. After looking at vpnd.elg (vpn debug on) I noticed I could see where the remote internal IP would be checked against the contents of the remote firewalls encryption domain. BTW there is src and dst nats on the local checkpoint gateway as well.&lt;/P&gt;&lt;P&gt;This is what I see in the debugs. Not word for word just high level.&lt;/P&gt;&lt;P&gt;Searching for remote internal IP (pre nat IP address)&lt;/P&gt;&lt;P&gt;comparing against external IP of remote VPN peer - no match&lt;/P&gt;&lt;P&gt;comparing against NAT IP (post nat IP) of remote internal host - no match&lt;/P&gt;&lt;P&gt;comparing against 224.0.0.0/24 - no match&lt;/P&gt;&lt;P&gt;Error&amp;nbsp;traffic selectors unacceptable&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Whats odd is its not searching all the hosts in the remote encryption domain. There are 9 IPs in the remote enc domain. For sure the internal remote host is in the encryption domain of the remote firewall (interop device) as well. Also I have no idea where the multicast subnet came from. Its not part of any of the configs.&lt;/P&gt;&lt;P&gt;We just switched everything to IKEv1 and things are coming up now. I see a few ikev2 updates after 166. We haven't opened a ticket yet just though I would ask here first. We're going to try switching it back to ikev2 just to be %100 where the issue is tomorrow.&lt;/P&gt;&lt;P&gt;Oh remote gateway is a ASA so my sympathy goes out to them. That being said sure feels like a bug on the checkpoint side.&lt;/P&gt;</description>
      <pubDate>Wed, 12 Aug 2020 02:00:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IKEv2-issues-with-R80-30-JHA-166-traffic-selectors-unacceptable/m-p/93887#M10623</guid>
      <dc:creator>John_Fleming</dc:creator>
      <dc:date>2020-08-12T02:00:03Z</dc:date>
    </item>
    <item>
      <title>Re: IKEv2 issues with R80.30 JHA 166 - traffic selectors unacceptable</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IKEv2-issues-with-R80-30-JHA-166-traffic-selectors-unacceptable/m-p/93922#M10624</link>
      <description>&lt;P&gt;Just a wild guess here...&lt;/P&gt;&lt;P&gt;Do you use host objects or network objects (/32) in the remote encryption domain object? If you are using host objects, can you try again with network objects?&lt;/P&gt;</description>
      <pubDate>Wed, 12 Aug 2020 13:07:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IKEv2-issues-with-R80-30-JHA-166-traffic-selectors-unacceptable/m-p/93922#M10624</guid>
      <dc:creator>Tobias_Moritz</dc:creator>
      <dc:date>2020-08-12T13:07:38Z</dc:date>
    </item>
    <item>
      <title>Re: IKEv2 issues with R80.30 JHA 166 - traffic selectors unacceptable</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IKEv2-issues-with-R80-30-JHA-166-traffic-selectors-unacceptable/m-p/93954#M10625</link>
      <description>&lt;P&gt;/32 network objects?? Heresy I say!&lt;/P&gt;&lt;P&gt;kidding aside... we just flipped everything back to ikev2 and it came up. I can now see the search rolling through on the contents of the remove encryption domain.&lt;/P&gt;&lt;P&gt;I really wish this wouldn't have worked. I think we're going to stick to ikev2 and see what happens.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 12 Aug 2020 19:42:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IKEv2-issues-with-R80-30-JHA-166-traffic-selectors-unacceptable/m-p/93954#M10625</guid>
      <dc:creator>John_Fleming</dc:creator>
      <dc:date>2020-08-12T19:42:48Z</dc:date>
    </item>
    <item>
      <title>Re: IKEv2 issues with R80.30 JHA 166 - traffic selectors unacceptable</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IKEv2-issues-with-R80-30-JHA-166-traffic-selectors-unacceptable/m-p/125707#M18252</link>
      <description>&lt;P&gt;Hello, so what was your fix and how did you go about this? Running into the same issue&lt;/P&gt;</description>
      <pubDate>Wed, 04 Aug 2021 14:49:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IKEv2-issues-with-R80-30-JHA-166-traffic-selectors-unacceptable/m-p/125707#M18252</guid>
      <dc:creator>prodigy477</dc:creator>
      <dc:date>2021-08-04T14:49:39Z</dc:date>
    </item>
    <item>
      <title>Re: IKEv2 issues with R80.30 JHA 166 - traffic selectors unacceptable</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IKEv2-issues-with-R80-30-JHA-166-traffic-selectors-unacceptable/m-p/166641#M29999</link>
      <description>&lt;P&gt;Hi John,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Ran into same issue, what was your fix on this?&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 04 Jan 2023 05:31:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IKEv2-issues-with-R80-30-JHA-166-traffic-selectors-unacceptable/m-p/166641#M29999</guid>
      <dc:creator>kennyt</dc:creator>
      <dc:date>2023-01-04T05:31:22Z</dc:date>
    </item>
    <item>
      <title>Re: IKEv2 issues with R80.30 JHA 166 - traffic selectors unacceptable</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IKEv2-issues-with-R80-30-JHA-166-traffic-selectors-unacceptable/m-p/166660#M30005</link>
      <description>&lt;P&gt;Which version of Gateway and ASA were involved?&lt;/P&gt;</description>
      <pubDate>Wed, 04 Jan 2023 08:12:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IKEv2-issues-with-R80-30-JHA-166-traffic-selectors-unacceptable/m-p/166660#M30005</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2023-01-04T08:12:57Z</dc:date>
    </item>
    <item>
      <title>Re: IKEv2 issues with R80.30 JHA 166 - traffic selectors unacceptable</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IKEv2-issues-with-R80-30-JHA-166-traffic-selectors-unacceptable/m-p/168299#M30443</link>
      <description>&lt;P&gt;CP v81.10 and a third party GSM router, not an ASA&lt;/P&gt;</description>
      <pubDate>Thu, 19 Jan 2023 03:45:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IKEv2-issues-with-R80-30-JHA-166-traffic-selectors-unacceptable/m-p/168299#M30443</guid>
      <dc:creator>kennyt</dc:creator>
      <dc:date>2023-01-19T03:45:15Z</dc:date>
    </item>
  </channel>
</rss>

