<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: VPN with Cisco FTD-local subnet natted, key exchange with original IPs in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-with-Cisco-FTD-local-subnet-natted-key-exchange-with/m-p/70064#M12033</link>
    <description>&lt;P&gt;Thanks G_W for your answer. I know it's a really old system but I have to deal with it...&lt;BR /&gt;I'll review the articles.&lt;BR /&gt;Thanks again.&lt;BR /&gt;Stefano.&lt;/P&gt;</description>
    <pubDate>Wed, 11 Dec 2019 14:05:33 GMT</pubDate>
    <dc:creator>Stefano_Chiesa</dc:creator>
    <dc:date>2019-12-11T14:05:33Z</dc:date>
    <item>
      <title>VPN with Cisco FTD-local subnet natted, key exchange with original IPs</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-with-Cisco-FTD-local-subnet-natted-key-exchange-with/m-p/70052#M12031</link>
      <description>&lt;P&gt;Hello all.&lt;/P&gt;&lt;P&gt;On a 2200 R75.40 cluster is configured a L2L VPN with a remote Cisco FTD.&lt;BR /&gt;in the VPN configuration the real local subnet (10.39.126.x/23) is not specified&amp;nbsp; but instead a NAT subnet is used (192.168.123.x/27).&lt;BR /&gt;On the remote side 4 hosts (/32) are defined as remote networks (10.130.200.234/.235/.236/.241).&lt;/P&gt;&lt;P&gt;The local subnet is manually Hide-Natted behind a single IP NAT-Subnet address (192.168.123.1).&lt;BR /&gt;The tunnel is up but sometimes when the key exchange happens the original 10.39.126.x IP is used in the packet instead of 192.168.123.1 nat IP (see below the log records).&lt;/P&gt;&lt;P&gt;The key with the wrong IP is installed (why?) but then the traffic fails.&lt;/P&gt;&lt;P&gt;Seem a matter of activity sequence (accept rule, nat, negotiate, encrypt..).&lt;/P&gt;&lt;P&gt;Does anyone have a suggestion?&lt;/P&gt;&lt;P&gt;Thanks in advance.&lt;BR /&gt;Stefano&lt;/P&gt;&lt;P&gt;----------------------------- CORRECT KEY INSTALL&lt;/P&gt;&lt;P&gt;Number: 11768148&lt;BR /&gt;Date: 11Dec2019&lt;BR /&gt;Time: 9:12:30&lt;BR /&gt;Interface: daemon&lt;BR /&gt;Origin: FW&lt;BR /&gt;Type: Log&lt;BR /&gt;Action: Key Install&lt;BR /&gt;==&amp;gt;Source: VPN-NAT-IP (192.168.123.1) &amp;lt;&amp;lt;==== CORRECT&lt;BR /&gt;Destination: 10.130.200.235&lt;BR /&gt;Community: xxxxxxxxxxxxx&lt;BR /&gt;Information: IKE: Child SA exchange: Created a child SA successfully&lt;BR /&gt;IKE IDs: &amp;lt;192.168.123.0 - 192.168.123.31&amp;gt;&amp;lt;10.130.200.235&amp;gt;&lt;BR /&gt;Source Key ID: 0x92dddf54&lt;BR /&gt;Destination Key ID: 0x9ab9283b&lt;BR /&gt;Encryption Scheme: IKEv2&lt;BR /&gt;Data Encryption Methods: AES_256 + HMAC_SHA256, No IPComp, No ESN, No PFS&lt;BR /&gt;IKE Initiator Cookie: dbd002e39d8ab5aa&lt;BR /&gt;IKE Responder Cookie: eb019a4c3f09bd88&lt;BR /&gt;IKE Phase2 Message ID: 0000000d&lt;BR /&gt;VPN Peer Gateway: REMOTE-Peer (X.X.X.X)&lt;BR /&gt;Subproduct: VPN&lt;BR /&gt;VPN Feature: IKE&lt;BR /&gt;Product: Security Gateway/Management&lt;BR /&gt;Product Family: Network&lt;/P&gt;&lt;P&gt;----------------------------- WRONG KEY INSTALL&lt;/P&gt;&lt;P&gt;Number: 11750404&lt;BR /&gt;Date: 11Dec2019&lt;BR /&gt;Time: 9:11:52&lt;BR /&gt;Interface: daemon&lt;BR /&gt;Origin: FW&lt;BR /&gt;Type: Log&lt;BR /&gt;Action: Key Install&lt;BR /&gt;==&amp;gt;Source: 10.39.126.44 &amp;lt;&amp;lt;======= WRONG!&lt;BR /&gt;Destination: 10.130.200.234&lt;BR /&gt;Community: xxxxxxxxxxxxx&lt;BR /&gt;Information: IKE: Child SA exchange: Created a child SA successfully&lt;BR /&gt;IKE IDs: &amp;lt;10.130.200.234&amp;gt;&lt;BR /&gt;Source Key ID: 0x1f571570&lt;BR /&gt;Destination Key ID: 0xcb0be6fa&lt;BR /&gt;Encryption Scheme: IKEv2&lt;BR /&gt;Data Encryption Methods: AES_256 + HMAC_SHA256, No IPComp, No ESN, No PFS&lt;BR /&gt;IKE Initiator Cookie: dbd002e39d8ab5aa&lt;BR /&gt;IKE Responder Cookie: eb019a4c3f09bd88&lt;BR /&gt;IKE Phase2 Message ID: 0000000c&lt;BR /&gt;VPN Peer Gateway: REMOTE-Peer (X.X.X.X)&lt;BR /&gt;Subproduct: VPN&lt;BR /&gt;VPN Feature: IKE&lt;BR /&gt;Product: Security Gateway/Management&lt;BR /&gt;Product Family: Network&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;----------------------------- FAILING HTTPS ACCESS&lt;/P&gt;&lt;P&gt;Number: 11781102&lt;BR /&gt;Date: 11Dec2019&lt;BR /&gt;Time: 9:12:52&lt;BR /&gt;Interface: Mgmt&lt;BR /&gt;Origin: FW&lt;BR /&gt;Type: Log&lt;BR /&gt;Action: Drop&lt;BR /&gt;Service: https (443)&lt;BR /&gt;Source Port: 58984&lt;BR /&gt;Source: 10.39.126.44&lt;BR /&gt;Destination: 10.130.200.234&lt;BR /&gt;Protocol: tcp&lt;BR /&gt;Rule: 43&lt;BR /&gt;Rule UID: {4904EE49-19C1-4074-8561-DF7437BF5FBF}&lt;BR /&gt;NAT rule number: 3&lt;BR /&gt;NAT additional rule number: 1&lt;BR /&gt;XlateSrc: VPN-NAT-IP (192.168.123.1)&lt;BR /&gt;XlateSPort: 14356&lt;BR /&gt;Community: XXXXXXXXXXXXXX&lt;BR /&gt;Information: service_id: https&lt;BR /&gt;encryption fail reason: Packet is dropped because there is no valid SA - please refer to solution sk19423 in SecureKnowledge Database for more information&lt;BR /&gt;Encryption Scheme: IKE&lt;BR /&gt;Data Encryption Methods: ESP: AES-256 + SHA256&lt;BR /&gt;VPN Peer Gateway: REMOTE-Peer (X.X.X.X)&lt;BR /&gt;Subproduct: VPN&lt;BR /&gt;VPN Feature: VPN&lt;BR /&gt;Product: Security Gateway/Management&lt;BR /&gt;Log ID: 404830&lt;BR /&gt;Product Family: Network&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;------------------------------ WORKING HTTPS ACCESS&lt;/P&gt;&lt;P&gt;Number: 11768149&lt;BR /&gt;Date: 11Dec2019&lt;BR /&gt;Time: 9:12:30&lt;BR /&gt;Interface: Mgmt&lt;BR /&gt;Origin: FW&lt;BR /&gt;Type: Log&lt;BR /&gt;Action: Encrypt&lt;BR /&gt;Source: 10.39.126.44&lt;BR /&gt;Destination: 10.130.200.235&lt;BR /&gt;Protocol: icmp&lt;BR /&gt;Rule: 43&lt;BR /&gt;Rule UID: {4904EE49-19C1-4074-8561-DF7437BF5FBF}&lt;BR /&gt;NAT rule number: 3&lt;BR /&gt;NAT additional rule number: 1&lt;BR /&gt;XlateSrc: VPN-NAT-IP (192.168.123.1)&lt;BR /&gt;Community: XXXXXXXXXXXXXX&lt;BR /&gt;Information: service_id: icmp-proto&lt;BR /&gt;ICMP: Echo Request&lt;BR /&gt;ICMP Type: 8&lt;BR /&gt;ICMP Code: 0&lt;BR /&gt;Encryption Scheme: IKE&lt;BR /&gt;Data Encryption Methods: ESP: AES-256 + SHA256&lt;BR /&gt;VPN Peer Gateway: REMOTE-Peer (X.X.X.X)&lt;BR /&gt;Subproduct: VPN&lt;BR /&gt;VPN Feature: VPN&lt;BR /&gt;Product: Security Gateway/Management&lt;BR /&gt;Product Family: Network&lt;/P&gt;</description>
      <pubDate>Wed, 11 Dec 2019 09:02:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-with-Cisco-FTD-local-subnet-natted-key-exchange-with/m-p/70052#M12031</guid>
      <dc:creator>Stefano_Chiesa</dc:creator>
      <dc:date>2019-12-11T09:02:03Z</dc:date>
    </item>
    <item>
      <title>Re: VPN with Cisco FTD-local subnet natted, key exchange with original IPs</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-with-Cisco-FTD-local-subnet-natted-key-exchange-with/m-p/70062#M12032</link>
      <description>&lt;P&gt;R75.40 has been out of support since April 2016 - so all i can suggest is look around in the forum, e.g. &amp;nbsp;&lt;A id="link_29" class="page-link lia-link-navigation lia-custom-event" style="font-family: inherit;" href="https://community.checkpoint.com/t5/General-Topics/Site-To-Site-VPN-with-Multiple-Subnets/m-p/21509?search-action-id=9964374511&amp;amp;search-result-uid=21509" target="_blank"&gt;Site-To-Site &lt;SPAN class="lia-search-match-lithium"&gt;VPN&lt;/SPAN&gt; with Multiple Subnets&lt;/A&gt;,&lt;SPAN style="color: #000000; font-family: inherit;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN style="color: #000000; font-family: inherit;"&gt;Link to &lt;SPAN&gt;sk62803&lt;/SPAN&gt;&amp;nbsp;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk62803" target="_blank"&gt;https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solut...&lt;/A&gt;&lt;/SPAN&gt;&lt;SPAN style="color: #000000; font-family: inherit;"&gt;&amp;nbsp;and&amp;nbsp;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk53980" rel="nofollow noopener noreferrer" target="_blank"&gt;Site to Site with 3rd party&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 11 Dec 2019 09:40:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-with-Cisco-FTD-local-subnet-natted-key-exchange-with/m-p/70062#M12032</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2019-12-11T09:40:56Z</dc:date>
    </item>
    <item>
      <title>Re: VPN with Cisco FTD-local subnet natted, key exchange with original IPs</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-with-Cisco-FTD-local-subnet-natted-key-exchange-with/m-p/70064#M12033</link>
      <description>&lt;P&gt;Thanks G_W for your answer. I know it's a really old system but I have to deal with it...&lt;BR /&gt;I'll review the articles.&lt;BR /&gt;Thanks again.&lt;BR /&gt;Stefano.&lt;/P&gt;</description>
      <pubDate>Wed, 11 Dec 2019 14:05:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-with-Cisco-FTD-local-subnet-natted-key-exchange-with/m-p/70064#M12033</guid>
      <dc:creator>Stefano_Chiesa</dc:creator>
      <dc:date>2019-12-11T14:05:33Z</dc:date>
    </item>
  </channel>
</rss>

