<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Site to Site VPN - Checkpoint R80.10 to Cisco ASA - Troubleshooting in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-VPN-Check-Point-R80-10-to-Cisco-ASA-Troubleshooting/m-p/22022#M13075</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Some additional debugging steps here:&amp;nbsp;&lt;A class="link-titled" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk108600" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk108600"&gt;VPN Site-to-Site with 3rd party&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In general, if you can establish tunnels one way but not the other, this points to a difference in how each side is defining it's encryption domain.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 24 Aug 2018 18:17:47 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2018-08-24T18:17:47Z</dc:date>
    <item>
      <title>Site to Site VPN - Check Point R80.10 to Cisco ASA - Troubleshooting</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-VPN-Check-Point-R80-10-to-Cisco-ASA-Troubleshooting/m-p/22021#M13074</link>
      <description>&lt;P&gt;&lt;STRONG&gt;Moderators Note&lt;/STRONG&gt;: the original poster removed the origins content of this post. However, the replies to this post may be useful if you're trying to troubleshoot a VPN between Check Point and Cisco.&lt;/P&gt;</description>
      <pubDate>Fri, 15 Mar 2019 10:15:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-VPN-Check-Point-R80-10-to-Cisco-ASA-Troubleshooting/m-p/22021#M13074</guid>
      <dc:creator>Amit_Singh3</dc:creator>
      <dc:date>2019-03-15T10:15:29Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site VPN - Checkpoint R80.10 to Cisco ASA - Troubleshooting</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-VPN-Check-Point-R80-10-to-Cisco-ASA-Troubleshooting/m-p/22022#M13075</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Some additional debugging steps here:&amp;nbsp;&lt;A class="link-titled" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk108600" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk108600"&gt;VPN Site-to-Site with 3rd party&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In general, if you can establish tunnels one way but not the other, this points to a difference in how each side is defining it's encryption domain.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 24 Aug 2018 18:17:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-VPN-Check-Point-R80-10-to-Cisco-ASA-Troubleshooting/m-p/22022#M13075</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-08-24T18:17:47Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site VPN - Checkpoint R80.10 to Cisco ASA - Troubleshooting</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-VPN-Check-Point-R80-10-to-Cisco-ASA-Troubleshooting/m-p/22023#M13076</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;As a quick test, try setting VPN Tunnel Sharing to "pair of hosts" in the Community settings and reinstalling policy.&amp;nbsp; If A can now initiate to B it is definitely a subnet/Proxy-ID/encryption domain issue in IKE Phase 2.&amp;nbsp; However just because this setting makes it work DOES NOT mean you should just leave it set to that and call it good, as this setting can result in a very large number of Phase2/IPSec tunnels being formed.&amp;nbsp;&amp;nbsp; Set it back to "pair of subnets" then take a look at Scenario 1 in the SK Phoneboy posted.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&lt;BR /&gt; Second Edition of my "Max Power" Firewall Book&lt;BR /&gt; Now Available at &lt;A href="http://www.maxpowerfirewalls.com" target="_blank"&gt;http://www.maxpowerfirewalls.com&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 25 Aug 2018 14:28:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-VPN-Check-Point-R80-10-to-Cisco-ASA-Troubleshooting/m-p/22023#M13076</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2018-08-25T14:28:15Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site VPN - Checkpoint R80.10 to Cisco ASA - Troubleshooting</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-VPN-Check-Point-R80-10-to-Cisco-ASA-Troubleshooting/m-p/22024#M13077</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can't count how many times, especially CP vs Cisco ASA&amp;nbsp;this fixed the problem - changing from "tunnel per subnet" to "tunnel per hosts" &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&amp;nbsp;. The drawback is it does create lots of tunnels this way loading the firewall.&lt;/P&gt;&lt;P&gt;And by the way I saw it happening just out of the blue - no config changes on either side, encryption domains match 1 to 1, still either one direction of VPN stops working, or even some specific hosts in the same network get dropped.&lt;/P&gt;&lt;P&gt;PS For advocates of "it is&amp;nbsp; a hack!" , "quick fixes are bad", "you should debug the issue, recompile the firewall code, fix the bug" - (if you come from another planet) in the capitalism, who pays the money decides what is good for him/her, and when presented with either quick fix or fundamental/taking from hours to days debug the client still wants 'quick-fix' - you do what the client asks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 26 Aug 2018 04:23:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-VPN-Check-Point-R80-10-to-Cisco-ASA-Troubleshooting/m-p/22024#M13077</guid>
      <dc:creator>Yuri_Slobodyany</dc:creator>
      <dc:date>2018-08-26T04:23:53Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site VPN - Checkpoint R80.10 to Cisco ASA - Troubleshooting</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-VPN-Check-Point-R80-10-to-Cisco-ASA-Troubleshooting/m-p/22025#M13078</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Its interesting that checkpoint is doing nat.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;can you please check what are the values that you have in this setting:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;DIV style="border: 0px; font-weight: inherit; font-size: 14px;"&gt;&lt;DIV class="" style="border: 0px; font-weight: inherit; margin: 20px 0px;"&gt;&lt;H3 class="" style="color: #333333; background-color: inherit; border: 0px; font-weight: bold; text-decoration: none; font-size: 24px; margin: 0.5cm 0px 0em; padding: 20px 0pt 1px;"&gt;Advanced NAT-T Configuration&lt;/H3&gt;&lt;P class="" style="color: #333333; background-color: inherit; border: 0px; font-weight: inherit; text-decoration: none; margin: 6pt 0pt; padding: 0pt;"&gt;These variables are defined for each gateway and control NAT-T for site-to-site VPN:&lt;/P&gt;&lt;DIV class="" style="border: 0px; font-weight: inherit;"&gt;&lt;TABLE border="0" cellpadding="2" cellspacing="0" style="color: #333333; border: 0px; font-weight: inherit; margin: 0px 0px 2px;" width="654"&gt;&lt;THEAD style="border: inherit solid inherit; font-weight: inherit;"&gt;&lt;TR align="left" style="border: inherit solid inherit; font-weight: inherit;" valign="top"&gt;&lt;TH bgcolor="#515254" class="" style="border-width: 1px; border-style: solid; border-color: #010101 #010101 #010101 #ffffff; padding: 2px 4px;" width="264"&gt;&lt;P class="" style="color: #ffffff; background-color: inherit; border: 0px; font-weight: bold; text-decoration: none; text-indent: 0cm; font-size: 10pt; margin: 1pt -2pt 2pt; padding: 6pt;"&gt;Item&lt;/P&gt;&lt;/TH&gt;&lt;TH bgcolor="#515254" class="" style="border: 1px solid #010101; padding: 2px 4px;" width="276"&gt;&lt;P class="" style="color: #ffffff; background-color: inherit; border: 0px; font-weight: bold; text-decoration: none; text-indent: 0cm; font-size: 10pt; margin: 1pt -2pt 2pt; padding: 6pt;"&gt;Description&lt;/P&gt;&lt;/TH&gt;&lt;TH bgcolor="#515254" class="" style="border-width: 1px; border-style: solid; border-color: #010101 #ffffff #010101 #010101; padding: 2px 4px;" width="114"&gt;&lt;P class="" style="color: #ffffff; background-color: inherit; border: 0px; font-weight: bold; text-decoration: none; text-indent: 0cm; font-size: 10pt; margin: 1pt -2pt 2pt; padding: 6pt;"&gt;Default Value&lt;/P&gt;&lt;/TH&gt;&lt;/TR&gt;&lt;/THEAD&gt;&lt;TBODY style="border: inherit solid inherit; font-weight: inherit;"&gt;&lt;TR align="left" style="border: inherit solid inherit; font-weight: inherit;" valign="top"&gt;&lt;TD style="border-width: 1px; border-style: solid; border-color: #010101 #010101 #010101 #ffffff; padding: 2px 4px;" width="264"&gt;&lt;P class="" style="color: #333333; background-color: inherit; border: 0px; font-weight: normal; text-decoration: none; text-indent: 0cm; margin: 6pt 0pt; padding: 0pt;"&gt;offer_nat_t_initator&lt;/P&gt;&lt;/TD&gt;&lt;TD style="border: 1px solid #010101; padding: 2px 4px;" width="276"&gt;&lt;P class="" style="color: #000000; background-color: inherit; border: 0px; font-weight: normal; text-decoration: none; text-indent: 0cm; margin: 3pt 0cm; padding: 0pt;"&gt;Initiator sends NAT-T traffic&lt;/P&gt;&lt;/TD&gt;&lt;TD style="border-width: 1px; border-style: solid; border-color: #010101 #ffffff #010101 #010101; padding: 2px 4px;" width="114"&gt;&lt;P class="" style="color: #000000; background-color: inherit; border: 0px; font-weight: normal; text-decoration: none; text-indent: 0cm; margin: 3pt 0cm; padding: 0pt;"&gt;true&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="border: inherit solid inherit; font-weight: inherit;" valign="top"&gt;&lt;TD style="border-width: 1px; border-style: solid; border-color: #010101 #010101 #010101 #ffffff; padding: 2px 4px;" width="264"&gt;&lt;P class="" style="color: #333333; background-color: inherit; border: 0px; font-weight: normal; text-decoration: none; text-indent: 0cm; margin: 6pt 0pt; padding: 0pt;"&gt;offer_nat_t_responder_for_known_gw&lt;/P&gt;&lt;/TD&gt;&lt;TD style="border: 1px solid #010101; padding: 2px 4px;" width="276"&gt;&lt;P class="" style="color: #000000; background-color: inherit; border: 0px; font-weight: normal; text-decoration: none; text-indent: 0cm; margin: 3pt 0cm; padding: 0pt;"&gt;Responder accepts NAT-T traffic from known gateways&lt;/P&gt;&lt;/TD&gt;&lt;TD style="border-width: 1px; border-style: solid; border-color: #010101 #ffffff #010101 #010101; padding: 2px 4px;" width="114"&gt;&lt;P class="" style="color: #000000; background-color: inherit; border: 0px; font-weight: normal; text-decoration: none; text-indent: 0cm; margin: 3pt 0cm; padding: 0pt;"&gt;true&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR align="left" style="border: inherit solid inherit; font-weight: inherit;" valign="top"&gt;&lt;TD style="border-width: 1px; border-style: solid; border-color: #010101 #010101 #010101 #ffffff; padding: 2px 4px;" width="264"&gt;&lt;P class="" style="color: #333333; background-color: inherit; border: 0px; font-weight: normal; text-decoration: none; text-indent: 0cm; margin: 6pt 0pt; padding: 0pt;"&gt;force_nat_t&lt;/P&gt;&lt;/TD&gt;&lt;TD style="border: 1px solid #010101; padding: 2px 4px;" width="276"&gt;&lt;P class="" style="color: #000000; background-color: inherit; border: 0px; font-weight: normal; text-decoration: none; text-indent: 0cm; margin: 3pt 0cm; padding: 0pt;"&gt;Force NAT-T even if there is no NAT-T device&lt;/P&gt;&lt;/TD&gt;&lt;TD style="border-width: 1px; border-style: solid; border-color: #010101 #ffffff #010101 #010101; padding: 2px 4px;" width="114"&gt;&lt;P class="" style="color: #000000; background-color: inherit; border: 0px; font-weight: normal; text-decoration: none; text-indent: 0cm; margin: 3pt 0cm; padding: 0pt;"&gt;false&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/DIV&gt;&lt;P class="" style="color: #333333; background-color: inherit; border: 0px; font-weight: inherit; text-decoration: none; margin: 6pt 0pt; padding: 0pt;"&gt;The variables can be viewed or changed in GuiDBedit under:&lt;/P&gt;&lt;P class="" style="color: #333333; background-color: inherit; border: 0px; font-weight: inherit; text-decoration: none; margin: 6pt 0pt; padding: 0pt;"&gt;&lt;STRONG class="" style="color: inherit; background-color: inherit; border: 0px; font-weight: bold; padding: 0pt;"&gt;TABLE&lt;/STRONG&gt;&lt;SPAN style="border: 0px; font-weight: inherit;"&gt;&amp;nbsp;&lt;/SPAN&gt;&amp;gt;&lt;SPAN style="border: 0px; font-weight: inherit;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG class="" style="color: inherit; background-color: inherit; border: 0px; font-weight: bold; padding: 0pt;"&gt;Network Objects&lt;/STRONG&gt;&lt;SPAN style="border: 0px; font-weight: inherit;"&gt;&amp;nbsp;&lt;/SPAN&gt;&amp;gt;&lt;STRONG class="" style="color: inherit; background-color: inherit; border: 0px; font-weight: bold; padding: 0pt;"&gt;&lt;SPAN style="border: 0px; font-weight: inherit;"&gt;&amp;nbsp;&lt;/SPAN&gt;network_objects&lt;/STRONG&gt;&lt;SPAN style="border: 0px; font-weight: inherit;"&gt;&amp;nbsp;&lt;/SPAN&gt;&amp;gt;&lt;SPAN style="border: 0px; font-weight: inherit;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG class="" style="color: inherit; background-color: inherit; border: 0px; font-weight: bold; padding: 0pt;"&gt;&amp;lt;gateway_object&amp;gt;&lt;/STRONG&gt;&lt;SPAN style="border: 0px; font-weight: inherit;"&gt;&amp;nbsp;&lt;/SPAN&gt;&amp;gt;&lt;SPAN style="border: 0px; font-weight: inherit;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG class="" style="color: inherit; background-color: inherit; border: 0px; font-weight: bold; padding: 0pt;"&gt;VPN&lt;/STRONG&gt;.&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV style="border: 0px; font-weight: inherit; font-size: 14px;"&gt; &lt;/DIV&gt;&lt;DIV class="" style="border: 0px; font-weight: inherit; font-size: 14px; margin: 20px 0px 0px;"&gt;&lt;DIV class="" data-comment-id="11029" style="color: #6d6e71; border: none; font-weight: inherit; font-size: 0.8571rem;"&gt;Thanks,&amp;nbsp;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 26 Aug 2018 08:13:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-VPN-Check-Point-R80-10-to-Cisco-ASA-Troubleshooting/m-p/22025#M13078</guid>
      <dc:creator>Matan_Suissa</dc:creator>
      <dc:date>2018-08-26T08:13:54Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site VPN - Checkpoint R80.10 to Cisco ASA - Troubleshooting</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-VPN-Check-Point-R80-10-to-Cisco-ASA-Troubleshooting/m-p/22026#M13079</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Some things to considere:&lt;/P&gt;&lt;P&gt;&amp;nbsp;- Check Point VPN-1 can supernet networks and this is not accepted by most other parties. (Documented in Secure Knowledge)&lt;/P&gt;&lt;P&gt;&amp;nbsp;- Cisco ASA can accept things in phase 2 which are not right on initial contact but refuse them later on when it is time to rekey. (Thanks for Cisco TAC engineer for sharing that gold nugget of wisdom as it is not documented.)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;While none of these may apply it is good to understand that every vendor has it's little features to make troubleshooting interesting.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 Aug 2018 10:49:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-VPN-Check-Point-R80-10-to-Cisco-ASA-Troubleshooting/m-p/22026#M13079</guid>
      <dc:creator>Hugo_vd_Kooij</dc:creator>
      <dc:date>2018-08-28T10:49:09Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site VPN - Checkpoint R80.10 to Cisco ASA - Troubleshooting</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-VPN-Check-Point-R80-10-to-Cisco-ASA-Troubleshooting/m-p/22027#M13080</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hey Timothy.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please look at&amp;nbsp;&lt;SPAN style="font-size: 11.0pt; color: #1f497d;"&gt;sk108600 scenario 1.&amp;nbsp;I think it will solve your problem &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;. If you have additional 3rd party issues I will be glad to assist.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 11.0pt; color: #1f497d;"&gt;Thanks.&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 29 Aug 2018 07:42:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-VPN-Check-Point-R80-10-to-Cisco-ASA-Troubleshooting/m-p/22027#M13080</guid>
      <dc:creator>Matan_Suissa</dc:creator>
      <dc:date>2018-08-29T07:42:00Z</dc:date>
    </item>
  </channel>
</rss>

