<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: VPN tunnel down issue in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-tunnel-down-issue/m-p/103211#M12985</link>
    <description>&lt;P&gt;Hi, We had heaps of VPN issues with AWS. This all got sorted when we upgraded firmware to R80.20.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Have you tried doing that.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We also have a script running that check tunnel ping and then resets tunnel if needed.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Could try those steps.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Sajid&lt;/P&gt;</description>
    <pubDate>Wed, 25 Nov 2020 00:44:54 GMT</pubDate>
    <dc:creator>Sajid_Abbas</dc:creator>
    <dc:date>2020-11-25T00:44:54Z</dc:date>
    <item>
      <title>VPN tunnel down issue</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-tunnel-down-issue/m-p/50834#M12977</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am facing issue with VPN tunnel between Check Point firewall and AWS between Check Point firewall and AWS there is multiple tunnel and that is getting down when not in use multiple time i need to reset tunnel after that its working fine is there any idea we create script through API can send continuous icmp traffic towards AWS tunnel to keep tunnel UP and i no need to reset the tunnel again and again.&lt;/P&gt;&lt;P&gt;Currently our setup is running on distributed 2 GW in cluster manage by MGMT server and all are running on R80.10 with take 189 hotfix.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 13 Apr 2019 17:14:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-tunnel-down-issue/m-p/50834#M12977</guid>
      <dc:creator>ramawatar</dc:creator>
      <dc:date>2019-04-13T17:14:18Z</dc:date>
    </item>
    <item>
      <title>Re: VPN tunnel down issue</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-tunnel-down-issue/m-p/50850#M12978</link>
      <description>The SKs that talk about configuring a VPN with AWS mention using Dead Peer Detection--are you using it?&lt;BR /&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk97746" target="_blank"&gt;https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk97746&lt;/A&gt;</description>
      <pubDate>Sun, 14 Apr 2019 10:38:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-tunnel-down-issue/m-p/50850#M12978</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-04-14T10:38:38Z</dc:date>
    </item>
    <item>
      <title>Re: VPN tunnel down issue</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-tunnel-down-issue/m-p/50898#M12979</link>
      <description>You need to enable Permanent Tunnel in Tunnel management on the vpn community.</description>
      <pubDate>Sun, 14 Apr 2019 22:22:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-tunnel-down-issue/m-p/50898#M12979</guid>
      <dc:creator>Maarten_Sjouw</dc:creator>
      <dc:date>2019-04-14T22:22:19Z</dc:date>
    </item>
    <item>
      <title>Re: VPN tunnel down issue</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-tunnel-down-issue/m-p/51648#M12980</link>
      <description>&lt;P&gt;Dear Phoneboy/Admin&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for your response i am already using&amp;nbsp;&lt;STRONG&gt;&lt;EM&gt;tunnel_keepalive_method&amp;nbsp; dpd and check all other parameter but didn't find solution till now.&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;get error log&amp;nbsp;&lt;EM&gt;&lt;STRONG&gt;packet is dropped because an ipsec sa associated with the spi on the received ipsec could not be found&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;Action: drop Description: ESP traffic dropped.&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;I will follow the&amp;nbsp;sk19423 but that is not helpfull for me.&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;STRONG&gt;Can i disable NAT T ?? and if i disable NAT T then what is the impact of that in production??&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 24 Apr 2019 09:32:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-tunnel-down-issue/m-p/51648#M12980</guid>
      <dc:creator>ramawatar</dc:creator>
      <dc:date>2019-04-24T09:32:34Z</dc:date>
    </item>
    <item>
      <title>Re: VPN tunnel down issue</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-tunnel-down-issue/m-p/54393#M12981</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/28391"&gt;@ramawatar&lt;/a&gt;&amp;nbsp;and&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/7"&gt;@PhoneBoy&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am also facing similar issue.&lt;/P&gt;&lt;P&gt;My observation is, in continuous ongoing security parameter negotiations, whenever&lt;STRONG&gt; AWS end&lt;/STRONG&gt; negotiates tunnel with NAT-T (4500), tunnel shows UP but &lt;U&gt;no data traverse through tunnel&lt;/U&gt;.&lt;/P&gt;&lt;P&gt;&lt;EM&gt;(As per few secure knowledge checkpoint only responds for NAT-T negotiation but never initiate negotiation with NAT-T)&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;fw ctl zdebug + drop | grep &amp;lt;AWS_gateway&amp;gt; gives decryption failed. (A = My End. B= AWS End.)&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image drop.JPG" style="width: 874px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/1332i5879AF5109A80171/image-size/large?v=v2&amp;amp;px=999" role="button" title="image drop.JPG" alt="image drop.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;I am using BGP protocol to control routing.&lt;/P&gt;&lt;P&gt;BGP TCP handshake not getting complete when IKE negotiation shown IKE NAT-T (4500).&lt;/P&gt;&lt;P&gt;But fw monitor shows my end try to send bgp messages through tunnel and even initial packet comes through aws end but TCP complete connection not happening.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;[vs_0][fw_22] eth3-01:i[60]: 169.254.A.A -&amp;gt; 169.254.B.B (TCP) len=60 id=10285&lt;BR /&gt;TCP: 45645 -&amp;gt; 179 .S.... seq=2ab5fb15 ack=00000000&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;BR /&gt;[vs_0][fw_22] vpnt6:O[60]: 169.254.B.B -&amp;gt; 169.254.A.A (TCP) len=60 id=0&lt;BR /&gt;TCP: 179 -&amp;gt; 45645 .S..A. seq=808ca7b8 ack=2ab5fb16&lt;BR /&gt;[vs_0][fw_3] vpnt6:e[60]: 169.254.B.B -&amp;gt; 169.254.A.A (TCP) len=60 id=0&lt;BR /&gt;TCP: 179 -&amp;gt; 45645 .S..A. seq=808ca7b8 ack=2ab5fb16&lt;BR /&gt;[vs_0][fw_3] eth3-01:E[60]: 169.254.B.B -&amp;gt; 169.254.A.A (TCP) len=60 id=0&lt;BR /&gt;TCP: 179 -&amp;gt; 45645 .S..A. seq=808ca7b8 ack=2ab5fb16&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;When I am doing manual tunnel reset, checkpoint initiating tunnel, where it negotiating on 500 UDP and data starts traversing through tunnel.&lt;/P&gt;&lt;P&gt;Tunnels remain UP, till negotiation not happening through IKE 4500.&lt;/P&gt;&lt;P&gt;&amp;nbsp;Currently I am experimenting to tune below gateway specific parameters to ensure negotiation of IKE 4500 should not happen. (&lt;EM&gt;There is no NAT device between my end and AWS&lt;/EM&gt;)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;IKE_SUPPORT_NAT_T&lt;/P&gt;&lt;P&gt;offer_nat_t_initator&lt;/P&gt;&lt;P&gt;offer_nat_t_responder_for_known_gw&lt;/P&gt;&lt;P&gt;force_nat_t&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Advanced NAT-T Configuration&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;P&gt;These variables are defined for each gateway and control NAT-T for site-to-site VPN:&lt;/P&gt;&lt;P&gt;Item&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Description&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Default Value&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;P&gt;offer_nat_t_initator&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;Initiator sends NAT-T traffic&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;true&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;P&gt;offer_nat_t_responder_for_known_gw&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;Responder accepts NAT-T traffic from known gateways&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;true&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;P&gt;force_nat_t&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;Force NAT-T even if there is no NAT-T device&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;false&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Checkpoint team (&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/7"&gt;@PhoneBoy&lt;/a&gt;&amp;nbsp; ) through my above observations please highlight and resolve any &lt;SPAN&gt;interoperability&amp;nbsp;&lt;/SPAN&gt;through NAT-T between checkpoint and other vendor device.&lt;/P&gt;</description>
      <pubDate>Mon, 27 May 2019 05:08:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-tunnel-down-issue/m-p/54393#M12981</guid>
      <dc:creator>Uttam_Ghole</dc:creator>
      <dc:date>2019-05-27T05:08:07Z</dc:date>
    </item>
    <item>
      <title>Re: VPN tunnel down issue</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-tunnel-down-issue/m-p/54499#M12982</link>
      <description>&lt;P&gt;You're seeing "decryption failed" messages in zdebug, which would suggest a configuration mismatch of some sort.&lt;BR /&gt;You'll need to debug it to see where the mismatch is, using something like:&amp;nbsp;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk63560" target="_blank"&gt;https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk63560&lt;/A&gt;&lt;BR /&gt;Also recommend engaging with the TAC.&lt;/P&gt;</description>
      <pubDate>Tue, 28 May 2019 07:22:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-tunnel-down-issue/m-p/54499#M12982</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-05-28T07:22:47Z</dc:date>
    </item>
    <item>
      <title>Re: VPN tunnel down issue</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-tunnel-down-issue/m-p/82517#M12983</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/2259"&gt;@Uttam_Ghole&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am experiencing the same issue. Did you manage to resolve it after modifying &lt;SPAN&gt;gateway specific parameters&lt;/SPAN&gt;?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Mon, 20 Apr 2020 16:40:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-tunnel-down-issue/m-p/82517#M12983</guid>
      <dc:creator>Aroma2118</dc:creator>
      <dc:date>2020-04-20T16:40:04Z</dc:date>
    </item>
    <item>
      <title>Re: VPN tunnel down issue</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-tunnel-down-issue/m-p/82547#M12984</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/24354"&gt;@Aroma2118&lt;/a&gt;&amp;nbsp;We are facing Issue with AWS tunnel only, now working fine we disable NAT T from for all security gateway &amp;amp; set&amp;nbsp;&lt;STRONG&gt;tunnel_keepalive_method DPD&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;To enable DPD monitoring:&lt;/P&gt;&lt;P&gt;On each VPN gateway in the VPN community, configure the&amp;nbsp;tunnel_keepalive_method&amp;nbsp;property, in GuiDBedit Tool (see&amp;nbsp;sk13009) or dbedit (see&amp;nbsp;skI3301). This includes 3rd Party gateways. (You cannot configure different monitor mechanisms for the same gateway).&lt;/P&gt;&lt;P&gt;In GuiDBedit Tool, go to&amp;nbsp;Network Objects&amp;nbsp;&amp;gt;&amp;nbsp;network_objects&amp;nbsp;&amp;gt;&amp;nbsp;&amp;lt;gateway&amp;gt;&amp;nbsp;&amp;gt;&amp;nbsp;VPN.&lt;BR /&gt;For the&amp;nbsp;Value, select a permanent tunnel mode.&lt;BR /&gt;Save all the changes.&lt;BR /&gt;Install policy on the gateways.&lt;/P&gt;&lt;P&gt;For best practice Use Respective Gaia Version&amp;nbsp;&amp;nbsp;VPN Administration Guide.&lt;/P&gt;</description>
      <pubDate>Mon, 20 Apr 2020 20:22:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-tunnel-down-issue/m-p/82547#M12984</guid>
      <dc:creator>ramawatar</dc:creator>
      <dc:date>2020-04-20T20:22:49Z</dc:date>
    </item>
    <item>
      <title>Re: VPN tunnel down issue</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-tunnel-down-issue/m-p/103211#M12985</link>
      <description>&lt;P&gt;Hi, We had heaps of VPN issues with AWS. This all got sorted when we upgraded firmware to R80.20.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Have you tried doing that.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We also have a script running that check tunnel ping and then resets tunnel if needed.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Could try those steps.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Sajid&lt;/P&gt;</description>
      <pubDate>Wed, 25 Nov 2020 00:44:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-tunnel-down-issue/m-p/103211#M12985</guid>
      <dc:creator>Sajid_Abbas</dc:creator>
      <dc:date>2020-11-25T00:44:54Z</dc:date>
    </item>
    <item>
      <title>Re: VPN tunnel down issue</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-tunnel-down-issue/m-p/109977#M15057</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/14352"&gt;@Sajid_Abbas&lt;/a&gt;&amp;nbsp;yes it's resolve in R80.20, we also already upgraded our infra from R80.10 to R80.20&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 06 Feb 2021 07:34:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-tunnel-down-issue/m-p/109977#M15057</guid>
      <dc:creator>ramawatar</dc:creator>
      <dc:date>2021-02-06T07:34:32Z</dc:date>
    </item>
    <item>
      <title>Re: VPN tunnel down issue</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-tunnel-down-issue/m-p/110007#M15067</link>
      <description>&lt;P&gt;Was it related to&amp;nbsp;&lt;SPAN&gt;sk142355&amp;nbsp;VPN tunnel goes down after policy push, must be reset to bring it up?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 06 Feb 2021 22:50:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-tunnel-down-issue/m-p/110007#M15067</guid>
      <dc:creator>Cyber_Serge</dc:creator>
      <dc:date>2021-02-06T22:50:49Z</dc:date>
    </item>
    <item>
      <title>Re: VPN tunnel down issue</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-tunnel-down-issue/m-p/110049#M15076</link>
      <description>&lt;P&gt;Not sure that option works with 3rd party vendors though...I only seen it work cp - cp tunnels.&lt;/P&gt;</description>
      <pubDate>Sun, 07 Feb 2021 13:50:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-tunnel-down-issue/m-p/110049#M15076</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2021-02-07T13:50:02Z</dc:date>
    </item>
    <item>
      <title>Re: VPN tunnel down issue</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-tunnel-down-issue/m-p/137465#M20822</link>
      <description>&lt;P&gt;i have this same issue with static routes. could you please tell, did you manage to resolve this issue. kindly let us know.&lt;/P&gt;</description>
      <pubDate>Thu, 30 Dec 2021 18:01:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-tunnel-down-issue/m-p/137465#M20822</guid>
      <dc:creator>Ayyappa</dc:creator>
      <dc:date>2021-12-30T18:01:00Z</dc:date>
    </item>
    <item>
      <title>Re: VPN tunnel down issue</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-tunnel-down-issue/m-p/147789#M23581</link>
      <description>&lt;P&gt;Hi Sajid_Abbas,&lt;/P&gt;&lt;P&gt;We are in need of a script to reset the tunnels every time they go down (we check by ping). Can you share it with us? Thank you!&lt;/P&gt;</description>
      <pubDate>Wed, 04 May 2022 03:53:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-tunnel-down-issue/m-p/147789#M23581</guid>
      <dc:creator>giangnt</dc:creator>
      <dc:date>2022-05-04T03:53:28Z</dc:date>
    </item>
    <item>
      <title>Re: VPN tunnel down issue</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-tunnel-down-issue/m-p/147792#M23582</link>
      <description>&lt;P&gt;Hi Sajid_Abbas,&lt;/P&gt;&lt;P&gt;We also need automatic ping check and tunnel reset, can you share with us the script you have? Thank you so much!&lt;/P&gt;</description>
      <pubDate>Wed, 04 May 2022 04:51:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-tunnel-down-issue/m-p/147792#M23582</guid>
      <dc:creator>giangnt</dc:creator>
      <dc:date>2022-05-04T04:51:45Z</dc:date>
    </item>
    <item>
      <title>Re: VPN tunnel down issue</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-tunnel-down-issue/m-p/193179#M35877</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;Is DPD still needed for permanent tunnel checks in R81.20.&amp;nbsp;&amp;nbsp; Also, is guiDB still needed to enable it?&lt;/P&gt;</description>
      <pubDate>Wed, 20 Sep 2023 17:44:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-tunnel-down-issue/m-p/193179#M35877</guid>
      <dc:creator>Daniel_Kavan</dc:creator>
      <dc:date>2023-09-20T17:44:41Z</dc:date>
    </item>
    <item>
      <title>Re: VPN tunnel down issue</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-tunnel-down-issue/m-p/193182#M35878</link>
      <description>&lt;P&gt;DPD is still used for permanent tunnels.&lt;BR /&gt;In fact,&amp;nbsp;from R81, DPD is set as the default for newly created Interoperable Objects.&lt;BR /&gt;If I understand Scenario 5 of &lt;A href="https://support.checkpoint.com/results/sk/sk108600" target="_self"&gt;sk108600&lt;/A&gt; correctly, unless you've changed the setting from the previous default, it should be changed upon upgrade to an R81+ release automatically.&lt;/P&gt;</description>
      <pubDate>Wed, 20 Sep 2023 18:03:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-tunnel-down-issue/m-p/193182#M35878</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2023-09-20T18:03:51Z</dc:date>
    </item>
  </channel>
</rss>

