<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Protocol violation detected with protocol:(IKE Nat traversal - UDP) in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Protocol-violation-detected-with-protocol-IKE-Nat-traversal-UDP/m-p/107259#M14360</link>
    <description>&lt;P&gt;Every Next Generation firewall maintains protocol signature to validate the authenticity of the protocol/service.&lt;BR /&gt;If any traffic does not match with the defined service/protocol signature standard, it will alert you with the protocol violation error message.&lt;BR /&gt;In Check Point, Application and URL filtering blade must be in enabled state on the gateway for the protocol signature validation.&lt;/P&gt;&lt;P&gt;Protocol Signature - A unique signature created by Check Point for each protocol and stored on the gateway. The signature identifies the protocol as genuine. This option is used to limit the port to the specified protocol.&lt;/P&gt;&lt;P&gt;Regards,&lt;BR /&gt;Hitesh Brahmbhatt&lt;/P&gt;</description>
    <pubDate>Fri, 08 Jan 2021 05:43:52 GMT</pubDate>
    <dc:creator>Hitesh_Brahmbha</dc:creator>
    <dc:date>2021-01-08T05:43:52Z</dc:date>
    <item>
      <title>Protocol violation detected with protocol:(IKE Nat traversal - UDP)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Protocol-violation-detected-with-protocol-IKE-Nat-traversal-UDP/m-p/74280#M11605</link>
      <description>&lt;P&gt;Hello&lt;/P&gt;&lt;P&gt;We are seeing this issue. and We have a problem with VPN communication.&lt;/P&gt;&lt;P&gt;Do you have any idea about that?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1. SG5100: R80.10 (Take 249)&lt;/P&gt;&lt;P&gt;2. Topology: 3rd party VPN &amp;lt;--- SG5100 (bridge mode) ---&amp;gt; 3rd party VPN&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;SG5100 is not set to VPN. It's just a bridge mode firewall.&lt;/P&gt;&lt;P&gt;3. Policy&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="11.PNG" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4324i0ABC471BEDF94B21/image-size/large?v=v2&amp;amp;px=999" role="button" title="11.PNG" alt="11.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;4. Logs&lt;/P&gt;&lt;P&gt;Firewall - Protocol violation detected with protocol:(IKE Nat traversal - UDP), matched protocol sig_id:(10), violation sig_id:(20). (500)&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="22.PNG" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4326iC7F5539D00D2C8D4/image-size/large?v=v2&amp;amp;px=999" role="button" title="22.PNG" alt="22.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 06 Feb 2020 07:41:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Protocol-violation-detected-with-protocol-IKE-Nat-traversal-UDP/m-p/74280#M11605</guid>
      <dc:creator>TAEKBOM_Kim</dc:creator>
      <dc:date>2020-02-06T07:41:36Z</dc:date>
    </item>
    <item>
      <title>Re: Protocol violation detected with protocol:(IKE Nat traversal - UDP)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Protocol-violation-detected-with-protocol-IKE-Nat-traversal-UDP/m-p/74290#M11606</link>
      <description>&lt;P&gt;Kim,&lt;/P&gt;
&lt;P&gt;first of all. Very interesting policy "any =&amp;gt; any, allow" Hope this will be only for testing.&lt;/P&gt;
&lt;P&gt;It looks like your VPN partners are not doing correctly the specifications for IKE_NAT-traversal.&lt;/P&gt;
&lt;P&gt;You can try to create a new service-object with no protocol definition like this:&lt;/P&gt;
&lt;DIV id="tinyMceEditorWolfgang_0" class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-left" image-alt="udp_4500.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4329iA96247D413D29E9F/image-size/medium?v=v2&amp;amp;px=400" role="button" title="udp_4500.png" alt="udp_4500.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt; and use this service object in your rulebase.&lt;/P&gt;
&lt;P&gt;Wolfgang&lt;/P&gt;</description>
      <pubDate>Thu, 06 Feb 2020 07:51:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Protocol-violation-detected-with-protocol-IKE-Nat-traversal-UDP/m-p/74290#M11606</guid>
      <dc:creator>Wolfgang</dc:creator>
      <dc:date>2020-02-06T07:51:14Z</dc:date>
    </item>
    <item>
      <title>Re: Protocol violation detected with protocol:(IKE Nat traversal - UDP)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Protocol-violation-detected-with-protocol-IKE-Nat-traversal-UDP/m-p/74295#M11607</link>
      <description>&lt;P&gt;Wolfgang,&lt;BR /&gt;Yes, it's only for testing. "any=&amp;gt;any,allow"&lt;/P&gt;&lt;P&gt;I created a new service-object with no protocol definition.&lt;BR /&gt;but the result was the same.&lt;/P&gt;&lt;P&gt;Firewall - Protocol violation detected with protocol:(IKE Nat traversal - UDP), matched protocol sig_id:(10), violation sig_id:(20). (500)&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="캡처.PNG" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4331i9D2D4CF62ADD43B5/image-size/large?v=v2&amp;amp;px=999" role="button" title="캡처.PNG" alt="캡처.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 06 Feb 2020 08:02:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Protocol-violation-detected-with-protocol-IKE-Nat-traversal-UDP/m-p/74295#M11607</guid>
      <dc:creator>TAEKBOM_Kim</dc:creator>
      <dc:date>2020-02-06T08:02:04Z</dc:date>
    </item>
    <item>
      <title>Re: Protocol violation detected with protocol:(IKE Nat traversal - UDP)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Protocol-violation-detected-with-protocol-IKE-Nat-traversal-UDP/m-p/74298#M11608</link>
      <description>&lt;P&gt;Yeah, you get an alert - but what is your issue when i see action accept in log ?&lt;/P&gt;</description>
      <pubDate>Thu, 06 Feb 2020 09:01:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Protocol-violation-detected-with-protocol-IKE-Nat-traversal-UDP/m-p/74298#M11608</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2020-02-06T09:01:42Z</dc:date>
    </item>
    <item>
      <title>Re: Protocol violation detected with protocol:(IKE Nat traversal - UDP)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Protocol-violation-detected-with-protocol-IKE-Nat-traversal-UDP/m-p/74396#M11609</link>
      <description>G_W_Albrecht.&lt;BR /&gt;&lt;BR /&gt;We have a problem with vpn communication between 3rd party devices.&lt;BR /&gt;The vpn service is no problem when removing checkpoint devices.</description>
      <pubDate>Fri, 07 Feb 2020 08:25:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Protocol-violation-detected-with-protocol-IKE-Nat-traversal-UDP/m-p/74396#M11609</guid>
      <dc:creator>TAEKBOM_Kim</dc:creator>
      <dc:date>2020-02-07T08:25:43Z</dc:date>
    </item>
    <item>
      <title>Re: Protocol violation detected with protocol:(IKE Nat traversal - UDP)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Protocol-violation-detected-with-protocol-IKE-Nat-traversal-UDP/m-p/92791#M11610</link>
      <description>&lt;P&gt;I'm seeing similar log for Protocol violation, but it's for (DNS-UDP). Even though the log will say "Allow" for action, it actually cause problem.&lt;/P&gt;&lt;P&gt;Not sure if the packet is drop but the DNS did not resolve. Basically if I do a nslookup from client machine, I'll see a log of Protocol violation coming from internal DNS, and on client machine the nslookup will not resolve the url and just time out.&lt;/P&gt;&lt;P&gt;This doesn't always happen though. It happen from time to time so it's hard to replicate the issue with support on the phone. Just curious what cause it to think there's Protocol violation?&lt;/P&gt;</description>
      <pubDate>Wed, 29 Jul 2020 19:05:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Protocol-violation-detected-with-protocol-IKE-Nat-traversal-UDP/m-p/92791#M11610</guid>
      <dc:creator>Cyber_Serge</dc:creator>
      <dc:date>2020-07-29T19:05:08Z</dc:date>
    </item>
    <item>
      <title>Re: Protocol violation detected with protocol:(IKE Nat traversal - UDP)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Protocol-violation-detected-with-protocol-IKE-Nat-traversal-UDP/m-p/92793#M11611</link>
      <description>&lt;P&gt;The temporary workaround we did was a Global Exception rule from the Inspection Settings for said traffic, while waiting on support to figure out what cause it to think there's protocol violation&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 29 Jul 2020 19:30:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Protocol-violation-detected-with-protocol-IKE-Nat-traversal-UDP/m-p/92793#M11611</guid>
      <dc:creator>Cyber_Serge</dc:creator>
      <dc:date>2020-07-29T19:30:19Z</dc:date>
    </item>
    <item>
      <title>Re: Protocol violation detected with protocol:(IKE Nat traversal - UDP)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Protocol-violation-detected-with-protocol-IKE-Nat-traversal-UDP/m-p/107259#M14360</link>
      <description>&lt;P&gt;Every Next Generation firewall maintains protocol signature to validate the authenticity of the protocol/service.&lt;BR /&gt;If any traffic does not match with the defined service/protocol signature standard, it will alert you with the protocol violation error message.&lt;BR /&gt;In Check Point, Application and URL filtering blade must be in enabled state on the gateway for the protocol signature validation.&lt;/P&gt;&lt;P&gt;Protocol Signature - A unique signature created by Check Point for each protocol and stored on the gateway. The signature identifies the protocol as genuine. This option is used to limit the port to the specified protocol.&lt;/P&gt;&lt;P&gt;Regards,&lt;BR /&gt;Hitesh Brahmbhatt&lt;/P&gt;</description>
      <pubDate>Fri, 08 Jan 2021 05:43:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Protocol-violation-detected-with-protocol-IKE-Nat-traversal-UDP/m-p/107259#M14360</guid>
      <dc:creator>Hitesh_Brahmbha</dc:creator>
      <dc:date>2021-01-08T05:43:52Z</dc:date>
    </item>
  </channel>
</rss>

