<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: R80.40 JHF 120 - S2S VPN issue in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-40-JHF-120-S2S-VPN-issue/m-p/126084#M24745</link>
    <description>&lt;P&gt;Hi Juancho&lt;/P&gt;&lt;P&gt;When running tcpdump do you see ESP packets intiated udp/500 and reply on udp/4500? or is it both ways sending udp/500 or udp/4500? should be the later.&lt;/P&gt;&lt;P&gt;For example&lt;/P&gt;&lt;P&gt;tcpdump -penni any host x.x.x.x&amp;nbsp;&lt;/P&gt;&lt;P&gt;x’s representative public ip of remote peer.&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;</description>
    <pubDate>Mon, 09 Aug 2021 16:12:53 GMT</pubDate>
    <dc:creator>Kim_Moberg</dc:creator>
    <dc:date>2021-08-09T16:12:53Z</dc:date>
    <item>
      <title>R80.40 JHF 120 - S2S VPN issue</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-40-JHF-120-S2S-VPN-issue/m-p/125884#M24736</link>
      <description>&lt;P&gt;Hey Lads,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;A customer installed JHF 120 this morning and many S2S vpns didn't come up.&lt;BR /&gt;&lt;BR /&gt;Solved it by reverting to JHF 118.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Am about to raise to TAC for them to have a look at the debugs but wanted to just give the heads up to the community.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Juan&lt;/P&gt;</description>
      <pubDate>Fri, 06 Aug 2021 14:30:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-40-JHF-120-S2S-VPN-issue/m-p/125884#M24736</guid>
      <dc:creator>Juan_</dc:creator>
      <dc:date>2021-08-06T14:30:01Z</dc:date>
    </item>
    <item>
      <title>Re: R80.40 JHF 120 - S2S VPN issue</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-40-JHF-120-S2S-VPN-issue/m-p/125906#M24737</link>
      <description>&lt;P&gt;Please provide updates on your investigations.&amp;nbsp;&amp;nbsp; would be good to understand.&lt;/P&gt;&lt;P&gt;There are a ZILLION fixes in JFA take #119.&lt;/P&gt;&lt;P&gt;reference:&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;A href="https://community.checkpoint.com/t5/General-Topics/R80-40-Jumbo-Hotfix-Accumulator-New-GA-Take-120/m-p/125773" target="_blank" rel="noopener"&gt;R80.40 Jumbo&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 06 Aug 2021 21:49:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-40-JHF-120-S2S-VPN-issue/m-p/125906#M24737</guid>
      <dc:creator>Garrett_DirSec</dc:creator>
      <dc:date>2021-08-06T21:49:48Z</dc:date>
    </item>
    <item>
      <title>Re: R80.40 JHF 120 - S2S VPN issue</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-40-JHF-120-S2S-VPN-issue/m-p/125919#M24738</link>
      <description>&lt;P&gt;We had exactly the same issue at a customer site.&amp;nbsp; All S2S tunnels failed with "local interface spoofing".&amp;nbsp; Had to revert back to T118.&lt;/P&gt;
&lt;P&gt;Ironically, TAC had us install this take troubleshoot an issue with a single S2S that wouldn't come up.&lt;/P&gt;</description>
      <pubDate>Sat, 07 Aug 2021 07:36:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-40-JHF-120-S2S-VPN-issue/m-p/125919#M24738</guid>
      <dc:creator>Ruan_Kotze</dc:creator>
      <dc:date>2021-08-07T07:36:22Z</dc:date>
    </item>
    <item>
      <title>Re: R80.40 JHF 120 - S2S VPN issue</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-40-JHF-120-S2S-VPN-issue/m-p/125934#M24739</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/44717"&gt;@Juan_&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;can you please share more info about which tunnels exactly are impacted?&lt;/P&gt;
&lt;P&gt;I'm interesting to understand the encryption suite of those tunnels and Ike version.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Ilya&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 08 Aug 2021 06:17:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-40-JHF-120-S2S-VPN-issue/m-p/125934#M24739</guid>
      <dc:creator>Ilya_Yusupov</dc:creator>
      <dc:date>2021-08-08T06:17:14Z</dc:date>
    </item>
    <item>
      <title>Re: R80.40 JHF 120 - S2S VPN issue</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-40-JHF-120-S2S-VPN-issue/m-p/125941#M24740</link>
      <description>&lt;P&gt;Could this issue be with T119 rather then T120?&amp;nbsp; According to the official list only two things have been added since T119 (If you believe that).&amp;nbsp; I did also find it strange that T119 did not go into GA and T120 in ongoing.&lt;/P&gt;
&lt;P&gt;Above said, I have installed T119 on a gateway with a S2S VPN and we have had no reported issues.&lt;/P&gt;</description>
      <pubDate>Sun, 08 Aug 2021 09:34:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-40-JHF-120-S2S-VPN-issue/m-p/125941#M24740</guid>
      <dc:creator>genisis__</dc:creator>
      <dc:date>2021-08-08T09:34:03Z</dc:date>
    </item>
    <item>
      <title>Re: R80.40 JHF 120 - S2S VPN issue</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-40-JHF-120-S2S-VPN-issue/m-p/125943#M24741</link>
      <description>&lt;P&gt;Would be interesting to hear if the condition are related to:&lt;/P&gt;&lt;P&gt;- CP2CP tunnels&lt;/P&gt;&lt;P&gt;- CP2 3rd party like Cisco&lt;/P&gt;&lt;P&gt;- IKEv1 or IKEv2&lt;/P&gt;&lt;P&gt;- Remote peer behind NAT?&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;</description>
      <pubDate>Sun, 08 Aug 2021 13:22:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-40-JHF-120-S2S-VPN-issue/m-p/125943#M24741</guid>
      <dc:creator>Kim_Moberg</dc:creator>
      <dc:date>2021-08-08T13:22:57Z</dc:date>
    </item>
    <item>
      <title>Re: R80.40 JHF 120 - S2S VPN issue</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-40-JHF-120-S2S-VPN-issue/m-p/125947#M24742</link>
      <description>&lt;P&gt;wow...thats unfortunate, but glad it was solved. It would be good to find out what is causing this with take 120.&lt;/P&gt;</description>
      <pubDate>Sun, 08 Aug 2021 13:50:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-40-JHF-120-S2S-VPN-issue/m-p/125947#M24742</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2021-08-08T13:50:18Z</dc:date>
    </item>
    <item>
      <title>Re: R80.40 JHF 120 - S2S VPN issue</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-40-JHF-120-S2S-VPN-issue/m-p/126076#M24743</link>
      <description>&lt;P&gt;Yeah, the one with the VPN fixes is 119, but 120 went GA. That's why i mentioned 120.&lt;/P&gt;</description>
      <pubDate>Mon, 09 Aug 2021 15:44:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-40-JHF-120-S2S-VPN-issue/m-p/126076#M24743</guid>
      <dc:creator>Juan_</dc:creator>
      <dc:date>2021-08-09T15:44:43Z</dc:date>
    </item>
    <item>
      <title>Re: R80.40 JHF 120 - S2S VPN issue</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-40-JHF-120-S2S-VPN-issue/m-p/126079#M24744</link>
      <description>&lt;P&gt;Hi Ilya,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;One tunnel is ikev2 using:&lt;/P&gt;&lt;P&gt;P1: aes2 sha2 group 20&lt;/P&gt;&lt;P&gt;P2:aes2 sha2 group20&lt;/P&gt;&lt;P&gt;Other 2 that we documented failing are ikev1:&lt;/P&gt;&lt;P&gt;P1:3des md5 group2&lt;/P&gt;&lt;P&gt;P2: 3des md5&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;More info:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Remote peers are of different vendors, one of them Palo Alto. Not aware of the others&lt;/LI&gt;&lt;LI&gt;Cluster is behind a fortigate that NATs the CPs IP.&lt;UL&gt;&lt;LI&gt;Link selection is not configured&lt;UL&gt;&lt;LI&gt;It's just "main ip address" which is a private&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;One of the VPNs on JHF_118 goes over ESP, the other 2 over 4500&lt;UL&gt;&lt;LI&gt;Didn't check it on JHF_120, we reverted quickly.&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;By responses of others doesn't seem to be so widespread though there seem to be a couple of issues. I can send you the SR number if you want.&lt;BR /&gt;&lt;BR /&gt;Juan&lt;/P&gt;</description>
      <pubDate>Mon, 09 Aug 2021 15:53:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-40-JHF-120-S2S-VPN-issue/m-p/126079#M24744</guid>
      <dc:creator>Juan_</dc:creator>
      <dc:date>2021-08-09T15:53:29Z</dc:date>
    </item>
    <item>
      <title>Re: R80.40 JHF 120 - S2S VPN issue</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-40-JHF-120-S2S-VPN-issue/m-p/126084#M24745</link>
      <description>&lt;P&gt;Hi Juancho&lt;/P&gt;&lt;P&gt;When running tcpdump do you see ESP packets intiated udp/500 and reply on udp/4500? or is it both ways sending udp/500 or udp/4500? should be the later.&lt;/P&gt;&lt;P&gt;For example&lt;/P&gt;&lt;P&gt;tcpdump -penni any host x.x.x.x&amp;nbsp;&lt;/P&gt;&lt;P&gt;x’s representative public ip of remote peer.&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;</description>
      <pubDate>Mon, 09 Aug 2021 16:12:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-40-JHF-120-S2S-VPN-issue/m-p/126084#M24745</guid>
      <dc:creator>Kim_Moberg</dc:creator>
      <dc:date>2021-08-09T16:12:53Z</dc:date>
    </item>
    <item>
      <title>Re: R80.40 JHF 120 - S2S VPN issue</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-40-JHF-120-S2S-VPN-issue/m-p/126589#M24746</link>
      <description>&lt;P&gt;Hey all, I'm not sure this 100% relative, but we're seeing something else with ike v2 s2s vpn's that's different in 120 vs other versions.&amp;nbsp; GW general properties is set to a private IP, link selection is set to public IP.&amp;nbsp; In versions under 120, the peer side sees the General Properties IP, in 120, phase 2 is seeing the public IP.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 11 Aug 2021 16:08:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-40-JHF-120-S2S-VPN-issue/m-p/126589#M24746</guid>
      <dc:creator>smoraneng</dc:creator>
      <dc:date>2021-08-11T16:08:08Z</dc:date>
    </item>
    <item>
      <title>Re: R80.40 JHF 120 - S2S VPN issue</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-40-JHF-120-S2S-VPN-issue/m-p/126591#M24747</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;Just wanted to share that we had problem with only one S2S vpn after installing JHA Take 120. In our case the vpn is completely down (checked with vpn tu options 3 and 4) and smartview monitor. However, the gateway is keeping and old SPI (seen with vpn tu tlis) and is trying to encrypt the traffic with that SPI. As this SPI is incorrect the peer rejects our traffic which is normal. The problem is the checkpoint gateway not deleting that SPI, tried to remove the gateway from the community but did not work, SPI is not deleted. Working with TAC to see how to fix this on Jumbo 120 as we waited months for a fix included on Take 119.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;</description>
      <pubDate>Wed, 11 Aug 2021 16:15:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-40-JHF-120-S2S-VPN-issue/m-p/126591#M24747</guid>
      <dc:creator>RS_Daniel</dc:creator>
      <dc:date>2021-08-11T16:15:20Z</dc:date>
    </item>
    <item>
      <title>Re: R80.40 JHF 120 - S2S VPN issue</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-40-JHF-120-S2S-VPN-issue/m-p/126593#M24748</link>
      <description>&lt;P&gt;Hm, thats interesting...I know R&amp;amp;D told me before not to worry what it shows in SV monitor, as that could be misleading as far as vpn tunnel status and I do agree, as thats my experience as well, so vpn tu is way more reliable and more correct. So you are saying only 1 tunnel is broken...is it with cloud provider, cp to cp or cp to 3rd part, just wondering?&lt;/P&gt;</description>
      <pubDate>Wed, 11 Aug 2021 16:23:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-40-JHF-120-S2S-VPN-issue/m-p/126593#M24748</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2021-08-11T16:23:58Z</dc:date>
    </item>
    <item>
      <title>Re: R80.40 JHF 120 - S2S VPN issue</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-40-JHF-120-S2S-VPN-issue/m-p/126594#M24749</link>
      <description>&lt;P&gt;Well, technically, lots of customer would have it that way and thats perfectly fine, as VPN would look for whats configured in link selection, so whatever is set there, would be what is taking as main public IP...what option do you have configured in that tab?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 11 Aug 2021 16:25:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-40-JHF-120-S2S-VPN-issue/m-p/126594#M24749</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2021-08-11T16:25:29Z</dc:date>
    </item>
    <item>
      <title>Re: R80.40 JHF 120 - S2S VPN issue</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-40-JHF-120-S2S-VPN-issue/m-p/126600#M24750</link>
      <description>&lt;P&gt;So with no configuration change on the gw other than applying HF 120&amp;nbsp; The general properties is set to the 10 ip, the link selection is set to public IP.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 11 Aug 2021 16:45:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-40-JHF-120-S2S-VPN-issue/m-p/126600#M24750</guid>
      <dc:creator>smoraneng</dc:creator>
      <dc:date>2021-08-11T16:45:42Z</dc:date>
    </item>
    <item>
      <title>Re: R80.40 JHF 120 - S2S VPN issue</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-40-JHF-120-S2S-VPN-issue/m-p/126601#M24751</link>
      <description>&lt;P&gt;Then Im really not sure...seems like take 120 problem, I would say.&lt;/P&gt;</description>
      <pubDate>Wed, 11 Aug 2021 16:47:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-40-JHF-120-S2S-VPN-issue/m-p/126601#M24751</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2021-08-11T16:47:42Z</dc:date>
    </item>
    <item>
      <title>Re: R80.40 JHF 120 - S2S VPN issue</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-40-JHF-120-S2S-VPN-issue/m-p/126603#M24752</link>
      <description>&lt;P&gt;Can someone please provide SR number or anything else regarding this issue?&lt;/P&gt;
&lt;P&gt;Reading about this issue here stops us for going to take 120. We need 120 to solve some other problems but failing S2S tunnels is the more complicating problem.&lt;/P&gt;
&lt;P&gt;Wolfgang&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 11 Aug 2021 18:30:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-40-JHF-120-S2S-VPN-issue/m-p/126603#M24752</guid>
      <dc:creator>Wolfgang</dc:creator>
      <dc:date>2021-08-11T18:30:47Z</dc:date>
    </item>
    <item>
      <title>Re: R80.40 JHF 120 - S2S VPN issue</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-40-JHF-120-S2S-VPN-issue/m-p/126604#M24753</link>
      <description>&lt;P&gt;If after upgrade, the IP presented for the ID payload is the Link Selection address, then note that an issue was fixed and the peer's configuration should be updated to match the expected (link selection) IP. (There was an issue in IKEv2 where we would use the main IP instead of the link selection IP)&lt;/P&gt;
&lt;P&gt;In the jumbo sk in Take 119 there is this note regarding that fixed issue:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;EM&gt;"Invalid ID information&lt;/EM&gt;&lt;SPAN&gt;” message may be displayed when peer is 3rd party and Link selection is overridden.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Wed, 11 Aug 2021 18:13:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-40-JHF-120-S2S-VPN-issue/m-p/126604#M24753</guid>
      <dc:creator>Brandon_Pace</dc:creator>
      <dc:date>2021-08-11T18:13:53Z</dc:date>
    </item>
    <item>
      <title>Re: R80.40 JHF 120 - S2S VPN issue</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-40-JHF-120-S2S-VPN-issue/m-p/126605#M24754</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;
&lt;P&gt;I am Idan Tsarfati, IPsec VPN R&amp;amp;D group manager.&lt;/P&gt;
&lt;P&gt;Regarding the problem in take 120:&lt;/P&gt;
&lt;P&gt;We changed a behavior which related to narrowing feature.&lt;/P&gt;
&lt;P&gt;In case where CP GW connected with a 3rd party peer and there is a mismatch with the encryption domain configuration the tunnel &amp;nbsp;might stop transfer traffic.&lt;/P&gt;
&lt;P&gt;Until this take, the narrowing feature fixed a situation where we have universal tunnel in CP side and 'tunnel per subnet' in the 3rd party side.&lt;/P&gt;
&lt;P&gt;In order to make it work, the misconfiguration should be fixed - a SK will be published tomorrow on how to recognize it.&lt;/P&gt;
&lt;P&gt;Basically if you see **narrowing** in vpn tu tlist in the relevant tunnel, this is the case.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am not familiar with any other issue in this take - the known issue is relevant only where the environment has a configuration issue and it should not widely happen. I am familiar with only 2 cases.&lt;/P&gt;
&lt;P&gt;I know about many customers who use take 120 (or 119 which is identical) and it works very well.&lt;/P&gt;
&lt;P&gt;The take include many fixes and solved many issues.&lt;/P&gt;</description>
      <pubDate>Wed, 11 Aug 2021 19:09:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-40-JHF-120-S2S-VPN-issue/m-p/126605#M24754</guid>
      <dc:creator>idants</dc:creator>
      <dc:date>2021-08-11T19:09:13Z</dc:date>
    </item>
    <item>
      <title>Re: R80.40 JHF 120 - S2S VPN issue</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-40-JHF-120-S2S-VPN-issue/m-p/126606#M24755</link>
      <description>&lt;P&gt;hello&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/32330"&gt;@idants&lt;/a&gt;&amp;nbsp; -- thanks for the background and details.&amp;nbsp; very helpful.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 11 Aug 2021 19:10:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-40-JHF-120-S2S-VPN-issue/m-p/126606#M24755</guid>
      <dc:creator>Garrett_DirSec</dc:creator>
      <dc:date>2021-08-11T19:10:11Z</dc:date>
    </item>
  </channel>
</rss>

