<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Wrong peer gateway for decrypted packet (VPN Error code 01) in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Wrong-peer-gateway-for-decrypted-packet-VPN-Error-code-01/m-p/4936#M18931</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If there is an overlap through VPN domains, one side should be NAT-ed.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 04 Aug 2017 12:43:12 GMT</pubDate>
    <dc:creator>_Val_</dc:creator>
    <dc:date>2017-08-04T12:43:12Z</dc:date>
    <item>
      <title>Wrong peer gateway for decrypted packet (VPN Error code 01)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Wrong-peer-gateway-for-decrypted-packet-VPN-Error-code-01/m-p/4935#M18930</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hey mates,&lt;/P&gt;&lt;P&gt;I have come across one more issue in checkpoint...i have configured 2 vpn for one of our client for 2 different location with similar lan ips. they are able to connect through one tunnel, but when they try to connect through another tunnel iam getting this error "&amp;nbsp;Wrong peer gateway for decrypted packet (VPN Error code 01)".&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 04 Aug 2017 12:37:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Wrong-peer-gateway-for-decrypted-packet-VPN-Error-code-01/m-p/4935#M18930</guid>
      <dc:creator>SAT_S</dc:creator>
      <dc:date>2017-08-04T12:37:12Z</dc:date>
    </item>
    <item>
      <title>Re: Wrong peer gateway for decrypted packet (VPN Error code 01)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Wrong-peer-gateway-for-decrypted-packet-VPN-Error-code-01/m-p/4936#M18931</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If there is an overlap through VPN domains, one side should be NAT-ed.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 04 Aug 2017 12:43:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Wrong-peer-gateway-for-decrypted-packet-VPN-Error-code-01/m-p/4936#M18931</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2017-08-04T12:43:12Z</dc:date>
    </item>
    <item>
      <title>Re: Wrong peer gateway for decrypted packet (VPN Error code 01)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Wrong-peer-gateway-for-decrypted-packet-VPN-Error-code-01/m-p/4937#M18932</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yeah i have thought of the same.. thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 04 Aug 2017 14:03:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Wrong-peer-gateway-for-decrypted-packet-VPN-Error-code-01/m-p/4937#M18932</guid>
      <dc:creator>SAT_S</dc:creator>
      <dc:date>2017-08-04T14:03:06Z</dc:date>
    </item>
    <item>
      <title>Re: Wrong peer gateway for decrypted packet (VPN Error code 01)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Wrong-peer-gateway-for-decrypted-packet-VPN-Error-code-01/m-p/4938#M18933</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yep, use the handy command "vpn overlap_encdom communities -s" to get a concise list of any VPN domain overlaps, see &lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk40206&amp;amp;partition=General&amp;amp;product=IPSec" style="max-width: 840px;"&gt;sk40206: Is there a way to view potentially overlapping &lt;STRONG&gt;VPN&lt;/STRONG&gt; Domains? &lt;/A&gt;for more details.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&lt;BR /&gt; My book "Max Power: Check Point Firewall Performance Optimization" &lt;BR /&gt; now available via &lt;A href="http://maxpowerfirewalls.com" target="_blank"&gt;http://maxpowerfirewalls.com&lt;/A&gt;.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 05 Aug 2017 13:07:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Wrong-peer-gateway-for-decrypted-packet-VPN-Error-code-01/m-p/4938#M18933</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2017-08-05T13:07:25Z</dc:date>
    </item>
    <item>
      <title>Re: Wrong peer gateway for decrypted packet (VPN Error code 01)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Wrong-peer-gateway-for-decrypted-packet-VPN-Error-code-01/m-p/4939#M18934</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hi tim thanks ..i can see the overlapping encryption domain after executing this command ..but how to get rid of this as customer is using same lan ip range on both side of the vpn tunnel and has refused to nat his network&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 05 Aug 2017 14:36:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Wrong-peer-gateway-for-decrypted-packet-VPN-Error-code-01/m-p/4939#M18934</guid>
      <dc:creator>SAT_S</dc:creator>
      <dc:date>2017-08-05T14:36:43Z</dc:date>
    </item>
    <item>
      <title>Re: Wrong peer gateway for decrypted packet (VPN Error code 01)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Wrong-peer-gateway-for-decrypted-packet-VPN-Error-code-01/m-p/4940#M18935</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You can double-NAT on one side of the tunnel to avoid any NAT whatsoever on the other side when an IP overlap is present, but it is difficult to set up and will involve configuring policy-based routing (PBR) and messing around with antispoofing to make it work with NAT.&amp;nbsp; Let me illustrate, let's assume you are Site A and it initiates connections to Site B through the VPN tunnel, here is the setup:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Site A:&lt;/P&gt;&lt;P&gt;internal network 192.168.1.0/24, interface eth0&lt;/P&gt;&lt;P&gt;external network (some ISP routable block), interface eth1&lt;/P&gt;&lt;P&gt;NAT overlay network: 172.16.1.0/24 (This is a made-up network that does not exist anywhere in Site A's internal network and does not conflict)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Site A FW VPN Domain setting: 192.168.1.0/24, 172.16.1.0/24&lt;/P&gt;&lt;P&gt;Site B FW Externally Managed Gateway/Interoperable Device VPN Domain setting: 172.17.1.0/24&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Network Policy Rule:&lt;/P&gt;&lt;P&gt;Source: 192.168.1.0/24&lt;/P&gt;&lt;P&gt;Dest: 172.17.1.0/24&lt;/P&gt;&lt;P&gt;Service: whatever&lt;/P&gt;&lt;P&gt;Action: Accept&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Manual Static NAT (mask lengths much match &lt;STRONG&gt;precisely&lt;/STRONG&gt; between Original &amp;amp; Translated fields or you will get a NAT verification error):&lt;/P&gt;&lt;P&gt;Orig Source: 192.168.1.0/24&lt;/P&gt;&lt;P&gt;Orig Dest: 172.17.1.0/24&lt;/P&gt;&lt;P&gt;Orig Service: Any&lt;/P&gt;&lt;P&gt;Translated Source: 172.16.1.0/24 (Static)&lt;/P&gt;&lt;P&gt;Translated Destination: 192.168.1.0/24 (Static)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PBR Policy Rule on FWA:&lt;/P&gt;&lt;P&gt;Source: 192.168.1.0/24&lt;/P&gt;&lt;P&gt;and&lt;/P&gt;&lt;P&gt;Destination: 192.168.1.0/24&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PBR Next Hop: Internet GW, interface eth1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To reach systems at Site B through the VPN tunnel, users at site A must attempt to connect to the host at Site B's overlay IP address.&amp;nbsp; So if the Site B system to be reached is 192.168.1.222, user at site A must attempt the connection to a destination IP of 172.17.1.222.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Site B:&lt;/P&gt;&lt;P&gt;network 192.168.1.0/24&lt;/P&gt;&lt;P&gt;NAT overlay network: 172.17.1.0/24 (This is a made-up network that does not exist anywhere in Site B's internal network and does not conflict)&lt;/P&gt;&lt;P&gt;Site B must be expecting traffic to arrive in the tunnel from Site A sourced from 172.16.1.0/24&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You will also probably have to define some antispoofing exceptions on the Site A firewall to make this work.&amp;nbsp; SecureXL also sometimes doesn't play nice with PBR based on your firewall version, you may need to manually turn on PBR support in SecureXL:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk109741&amp;amp;partition=Advanced&amp;amp;product=SecureXL%22" style="max-width: 840px;"&gt;sk109741: Packets are not routed correctly when &lt;STRONG&gt;PBR&lt;/STRONG&gt; is configured and &lt;STRONG&gt;SecureXL&lt;/STRONG&gt; is enabled&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is from memory so I may be off on a detail or two but hopefully you get the idea.&amp;nbsp; Not simple.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&lt;BR /&gt; My book "Max Power: Check Point Firewall Performance Optimization" &lt;BR /&gt; now available via &lt;A href="http://maxpowerfirewalls.com" target="_blank"&gt;http://maxpowerfirewalls.com&lt;/A&gt;.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 07 Aug 2017 19:56:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Wrong-peer-gateway-for-decrypted-packet-VPN-Error-code-01/m-p/4940#M18935</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2017-08-07T19:56:26Z</dc:date>
    </item>
    <item>
      <title>Re: Wrong peer gateway for decrypted packet (VPN Error code 01)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Wrong-peer-gateway-for-decrypted-packet-VPN-Error-code-01/m-p/4941#M18936</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The easiest solution to have one of the sites to perform the NAT, and configure only the NATed IP as encryption domain in your config.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Jun 2018 21:04:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Wrong-peer-gateway-for-decrypted-packet-VPN-Error-code-01/m-p/4941#M18936</guid>
      <dc:creator>Houssameddine_1</dc:creator>
      <dc:date>2018-06-08T21:04:38Z</dc:date>
    </item>
    <item>
      <title>Re: Wrong peer gateway for decrypted packet (VPN Error code 01)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Wrong-peer-gateway-for-decrypted-packet-VPN-Error-code-01/m-p/104562#M18937</link>
      <description>&lt;P&gt;Thanks for the ideas.&amp;nbsp; In my case, I had to remove the manually defined network from the old Interoperable device (the remote gw).&amp;nbsp; &amp;nbsp;Even though is wasn't being used, it was still being used!&amp;nbsp; &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 07 Dec 2020 18:42:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Wrong-peer-gateway-for-decrypted-packet-VPN-Error-code-01/m-p/104562#M18937</guid>
      <dc:creator>Daniel_Kavan</dc:creator>
      <dc:date>2020-12-07T18:42:26Z</dc:date>
    </item>
    <item>
      <title>Re: Wrong peer gateway for decrypted packet (VPN Error code 01)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Wrong-peer-gateway-for-decrypted-packet-VPN-Error-code-01/m-p/104762#M18938</link>
      <description>&lt;P&gt;Thanks Daniel. This morning I did the same thing and it fixed my issue. I just added a dummy vpn domain in the original community just to test and it worked on the community.&lt;/P&gt;</description>
      <pubDate>Wed, 09 Dec 2020 11:43:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Wrong-peer-gateway-for-decrypted-packet-VPN-Error-code-01/m-p/104762#M18938</guid>
      <dc:creator>John_Perez</dc:creator>
      <dc:date>2020-12-09T11:43:33Z</dc:date>
    </item>
  </channel>
</rss>

