<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Connectivity with a remote VPN peer in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Connectivity-with-a-remote-VPN-peer/m-p/183847#M33731</link>
    <description>&lt;P&gt;Hello, everyone.&lt;/P&gt;
&lt;P&gt;A query, I currently have a S2S IPsec VPN deployed, but I wanted to know if to "test" the connectivity with the remote peer with a "ping" from the GW CLI, you need to have a security policy?&lt;/P&gt;
&lt;P&gt;The IP of the remote peer is available from the Internet.&lt;BR /&gt;If you try to ping from any point of Internet 200.60.70.9 you can validate that the equipment responds to Internet, but from my GW (from the CLI), it does not answer me the PING.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="VPN3.png" style="width: 952px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/21402iF9790DFFA0866B2F/image-size/large?v=v2&amp;amp;px=999" role="button" title="VPN3.png" alt="VPN3.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="VPN2.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/21401i43A4B8D3A0F6E04B/image-size/large?v=v2&amp;amp;px=999" role="button" title="VPN2.png" alt="VPN2.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Additionally, I wanted to validate the "negotiation of the packets exchanged" for the establishment of the VPN, with the command "tcpdump -penni any host &amp;lt;remote peer&amp;gt;", but I do not get any "result" in the console of the equipment, and I find it super weird.&lt;BR /&gt;&lt;BR /&gt;The VPN is up, but I wanted to make sense of these things I'm talking about.&lt;BR /&gt;&lt;BR /&gt;Thanks for any comments&lt;/P&gt;</description>
    <pubDate>Mon, 12 Jun 2023 22:10:26 GMT</pubDate>
    <dc:creator>Matlu</dc:creator>
    <dc:date>2023-06-12T22:10:26Z</dc:date>
    <item>
      <title>Connectivity with a remote VPN peer</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Connectivity-with-a-remote-VPN-peer/m-p/183847#M33731</link>
      <description>&lt;P&gt;Hello, everyone.&lt;/P&gt;
&lt;P&gt;A query, I currently have a S2S IPsec VPN deployed, but I wanted to know if to "test" the connectivity with the remote peer with a "ping" from the GW CLI, you need to have a security policy?&lt;/P&gt;
&lt;P&gt;The IP of the remote peer is available from the Internet.&lt;BR /&gt;If you try to ping from any point of Internet 200.60.70.9 you can validate that the equipment responds to Internet, but from my GW (from the CLI), it does not answer me the PING.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="VPN3.png" style="width: 952px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/21402iF9790DFFA0866B2F/image-size/large?v=v2&amp;amp;px=999" role="button" title="VPN3.png" alt="VPN3.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="VPN2.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/21401i43A4B8D3A0F6E04B/image-size/large?v=v2&amp;amp;px=999" role="button" title="VPN2.png" alt="VPN2.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Additionally, I wanted to validate the "negotiation of the packets exchanged" for the establishment of the VPN, with the command "tcpdump -penni any host &amp;lt;remote peer&amp;gt;", but I do not get any "result" in the console of the equipment, and I find it super weird.&lt;BR /&gt;&lt;BR /&gt;The VPN is up, but I wanted to make sense of these things I'm talking about.&lt;BR /&gt;&lt;BR /&gt;Thanks for any comments&lt;/P&gt;</description>
      <pubDate>Mon, 12 Jun 2023 22:10:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Connectivity-with-a-remote-VPN-peer/m-p/183847#M33731</guid>
      <dc:creator>Matlu</dc:creator>
      <dc:date>2023-06-12T22:10:26Z</dc:date>
    </item>
    <item>
      <title>Re: Connectivity with a remote VPN peer</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Connectivity-with-a-remote-VPN-peer/m-p/183899#M33740</link>
      <description>&lt;P&gt;What version/JHF is the gateway?&lt;BR /&gt;Depending on your version, tcpdump doesn't always show what's going on when SecureXL accelerates the traffic.&lt;BR /&gt;cppcap can be used in this case.&lt;/P&gt;
&lt;P&gt;What is the remote peer in this case?&lt;BR /&gt;If it is not a Check Point device and you try to ping the external IP, it may not work.&lt;BR /&gt;See:&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/sk/sk108600" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk108600&lt;/A&gt;&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 13 Jun 2023 17:20:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Connectivity-with-a-remote-VPN-peer/m-p/183899#M33740</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2023-06-13T17:20:10Z</dc:date>
    </item>
    <item>
      <title>Re: Connectivity with a remote VPN peer</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Connectivity-with-a-remote-VPN-peer/m-p/183903#M33741</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;The JHF is Take 83, version R81.10&lt;/P&gt;
&lt;P&gt;The remote pair is a Fortigate. Your Public IP of the remote peer is available to test connectivity from anywhere on the Internet.&lt;/P&gt;
&lt;P&gt;If you test a PING from our Checkapoints Cluster, well, it just doesn't work, and according to the logs, it seems that it is because the traffic is being sent over the VPN, and it matches an IMPLIED RULE 0.&lt;BR /&gt;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="IM1.png" style="width: 686px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/21409iF067B8461094AB0D/image-size/large?v=v2&amp;amp;px=999" role="button" title="IM1.png" alt="IM1.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Is there any way to correct this behavior?&lt;/P&gt;
&lt;P&gt;Is there a way to ping from the GW to a remote peer, as a validation process of the device, before starting to "deploy" a VPN?&lt;BR /&gt;&lt;BR /&gt;cppcap, is there a tool to help me "test" the negotiation process for a VPN?&lt;BR /&gt;Any reference guide for cppcap?&lt;/P&gt;
&lt;P&gt;Regards.&lt;/P&gt;</description>
      <pubDate>Tue, 13 Jun 2023 17:30:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Connectivity-with-a-remote-VPN-peer/m-p/183903#M33741</guid>
      <dc:creator>Matlu</dc:creator>
      <dc:date>2023-06-13T17:30:24Z</dc:date>
    </item>
    <item>
      <title>Re: Connectivity with a remote VPN peer</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Connectivity-with-a-remote-VPN-peer/m-p/183917#M33746</link>
      <description>&lt;P&gt;Expected behavior that is possible to address in the SK I linked previously (scenario 3).&lt;/P&gt;</description>
      <pubDate>Tue, 13 Jun 2023 18:39:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Connectivity-with-a-remote-VPN-peer/m-p/183917#M33746</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2023-06-13T18:39:27Z</dc:date>
    </item>
  </channel>
</rss>

