<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Checkpoint to ASA VPN traffic selection issue in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Checkpoint-to-ASA-VPN-traffic-selection-issue/m-p/143698#M22353</link>
    <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;Have a 5800 R80.40 to a ASA 9.6 VPN trying to get up.&lt;/P&gt;&lt;P&gt;Scenario is,&lt;BR /&gt;ASA LAN server A to Checkpoint LAN server B&lt;BR /&gt;On the checkpoint, ASA LAN server A source is being translated to server C IP.&amp;nbsp;server B gets no nat/original.&lt;BR /&gt;Since this is transparent to the ASA, on the ASA the no nat rule says server A and B get no nat.&lt;/P&gt;&lt;P&gt;When initiating traffic on the Cisco side,&amp;nbsp;the ASA debugs makes it seem Phase 1 is ok as far as the crypto and PSK.&lt;BR /&gt;On the Cisco debug shows that the correct DH group has been negotiated, NAT-T is in use 4500, PSK has been sent and ESP encapsulation is going on,&lt;BR /&gt;Then the ASA sends the traffic selector for the correct source ( server A ) to destination ( server B ) and resends a few times and times out.&lt;/P&gt;&lt;P&gt;On the Checkpoint side, it shows as UP Phase 1, but shows this error.&lt;/P&gt;&lt;P&gt;IKEv2 [NAT-T (IPv4)&lt;BR /&gt;auth exchange: sending notification to peer: traffic selectors unacceptable&lt;BR /&gt;MyTSi MyTSr:&lt;BR /&gt;&amp;lt;has the public IP of the ASA&amp;gt;&lt;BR /&gt;&amp;lt;224.0.0.0 - 224.0.0.255&amp;gt;&lt;BR /&gt;Peer TSi:&lt;BR /&gt;Peer TSr:&lt;BR /&gt;&amp;lt;server B IP address&amp;gt;&lt;BR /&gt;Do not why the Checkpoint is picking the " public outside " interface IP of the ASA firewall.&lt;BR /&gt;Does anyone have any ideas?&lt;/P&gt;</description>
    <pubDate>Mon, 14 Mar 2022 23:39:40 GMT</pubDate>
    <dc:creator>rob99-99</dc:creator>
    <dc:date>2022-03-14T23:39:40Z</dc:date>
    <item>
      <title>Checkpoint to ASA VPN traffic selection issue</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Checkpoint-to-ASA-VPN-traffic-selection-issue/m-p/143698#M22353</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;Have a 5800 R80.40 to a ASA 9.6 VPN trying to get up.&lt;/P&gt;&lt;P&gt;Scenario is,&lt;BR /&gt;ASA LAN server A to Checkpoint LAN server B&lt;BR /&gt;On the checkpoint, ASA LAN server A source is being translated to server C IP.&amp;nbsp;server B gets no nat/original.&lt;BR /&gt;Since this is transparent to the ASA, on the ASA the no nat rule says server A and B get no nat.&lt;/P&gt;&lt;P&gt;When initiating traffic on the Cisco side,&amp;nbsp;the ASA debugs makes it seem Phase 1 is ok as far as the crypto and PSK.&lt;BR /&gt;On the Cisco debug shows that the correct DH group has been negotiated, NAT-T is in use 4500, PSK has been sent and ESP encapsulation is going on,&lt;BR /&gt;Then the ASA sends the traffic selector for the correct source ( server A ) to destination ( server B ) and resends a few times and times out.&lt;/P&gt;&lt;P&gt;On the Checkpoint side, it shows as UP Phase 1, but shows this error.&lt;/P&gt;&lt;P&gt;IKEv2 [NAT-T (IPv4)&lt;BR /&gt;auth exchange: sending notification to peer: traffic selectors unacceptable&lt;BR /&gt;MyTSi MyTSr:&lt;BR /&gt;&amp;lt;has the public IP of the ASA&amp;gt;&lt;BR /&gt;&amp;lt;224.0.0.0 - 224.0.0.255&amp;gt;&lt;BR /&gt;Peer TSi:&lt;BR /&gt;Peer TSr:&lt;BR /&gt;&amp;lt;server B IP address&amp;gt;&lt;BR /&gt;Do not why the Checkpoint is picking the " public outside " interface IP of the ASA firewall.&lt;BR /&gt;Does anyone have any ideas?&lt;/P&gt;</description>
      <pubDate>Mon, 14 Mar 2022 23:39:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Checkpoint-to-ASA-VPN-traffic-selection-issue/m-p/143698#M22353</guid>
      <dc:creator>rob99-99</dc:creator>
      <dc:date>2022-03-14T23:39:40Z</dc:date>
    </item>
    <item>
      <title>Re: Checkpoint to ASA VPN traffic selection issue</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Checkpoint-to-ASA-VPN-traffic-selection-issue/m-p/143715#M22359</link>
      <description>&lt;P&gt;See&amp;nbsp;&lt;A class="cp_link sc_ellipsis" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk108600&amp;amp;partition=Advanced&amp;amp;product=IPSec" target="_blank"&gt;sk108600: &lt;STRONG&gt;VPN&lt;/STRONG&gt; Site-to-Site with &lt;STRONG&gt;3rd&lt;/STRONG&gt; &lt;STRONG&gt;party&lt;/STRONG&gt;&lt;/A&gt;&amp;nbsp;and&amp;nbsp;&lt;A class="cp_link sc_ellipsis" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk157473&amp;amp;partition=Advanced&amp;amp;product=IPSec" target="_blank"&gt;sk157473: Site &lt;STRONG&gt;to&lt;/STRONG&gt; Site using IKEv2 fails with "None of the &lt;STRONG&gt;traffic&lt;/STRONG&gt; &lt;STRONG&gt;selectors&lt;/STRONG&gt; match the conection"&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 15 Mar 2022 08:35:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Checkpoint-to-ASA-VPN-traffic-selection-issue/m-p/143715#M22359</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2022-03-15T08:35:34Z</dc:date>
    </item>
    <item>
      <title>Re: Checkpoint to ASA VPN traffic selection issue</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Checkpoint-to-ASA-VPN-traffic-selection-issue/m-p/143787#M22365</link>
      <description>&lt;P&gt;Thanks for the links. I had read them before, but didn't see anything exact to my scenario, but will try a few of the things in them.&lt;/P&gt;&lt;P&gt;I had read an article a while that mentioned the traffic selection on the Checkpoint side, being the ASA firewalls interface rather than the IP of the server in the VPN domain, but cannot find that article again.&lt;BR /&gt;&lt;BR /&gt;On the ASA side, I see the traffic selector correct, Server A IP permit any to server B IP.&lt;BR /&gt;But on the checkpoint this error, where instead of IP of server A, it is the IP of the ASA interface and 224.0.0.0-224.0.0.255&lt;BR /&gt;What does 224.0.0.0-224.0.0.255 mean ?&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;IKEv2 [NAT-T (IPv4)&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;auth exchange: sending notification to peer: traffic selectors unacceptable&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;MyTSi MyTSr:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;lt;has the public IP of the ASA&amp;gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;lt;224.0.0.0 - 224.0.0.255&amp;gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Peer TSi:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Peer TSr:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;lt;server B IP address&amp;gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 15 Mar 2022 17:47:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Checkpoint-to-ASA-VPN-traffic-selection-issue/m-p/143787#M22365</guid>
      <dc:creator>rob99-99</dc:creator>
      <dc:date>2022-03-15T17:47:55Z</dc:date>
    </item>
    <item>
      <title>Re: Checkpoint to ASA VPN traffic selection issue</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Checkpoint-to-ASA-VPN-traffic-selection-issue/m-p/165338#M29640</link>
      <description>&lt;P&gt;Hey, G_W_Albrecht, thank you, it helped me.&lt;/P&gt;&lt;P&gt;I've just changed the Tunnel Mode of the VPN Community from"One Tunnel Per Subnet Pair" to "One Tunnel Per Gateway Pair" and all worked, thank you again for posting the sk157473&lt;/P&gt;&lt;P&gt;Best.&lt;/P&gt;</description>
      <pubDate>Thu, 15 Dec 2022 20:09:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Checkpoint-to-ASA-VPN-traffic-selection-issue/m-p/165338#M29640</guid>
      <dc:creator>ClauberTeles</dc:creator>
      <dc:date>2022-12-15T20:09:18Z</dc:date>
    </item>
    <item>
      <title>Re: Checkpoint to ASA VPN traffic selection issue</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Checkpoint-to-ASA-VPN-traffic-selection-issue/m-p/223954#M42976</link>
      <description>&lt;P&gt;Thanks!&lt;BR /&gt;&lt;BR /&gt;That helped me configuring a site-to-site VPN with a Fortigate on the peer side with the same errors in the log!&lt;BR /&gt;&lt;BR /&gt;Christian&lt;/P&gt;</description>
      <pubDate>Mon, 19 Aug 2024 09:22:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Checkpoint-to-ASA-VPN-traffic-selection-issue/m-p/223954#M42976</guid>
      <dc:creator>Greifenstein</dc:creator>
      <dc:date>2024-08-19T09:22:01Z</dc:date>
    </item>
  </channel>
</rss>

