<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: R81.20 - iked running while IPSec VPN blade not enabled in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-20-iked-running-while-IPSec-VPN-blade-not-enabled/m-p/195574#M36432</link>
    <description>&lt;P&gt;This may answer it...&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.checkpoint.com/t5/Security-Gateways/vpnd-process-running-vpn-blade-not-enabled/td-p/158779" target="_blank"&gt;https://community.checkpoint.com/t5/Security-Gateways/vpnd-process-running-vpn-blade-not-enabled/td-p/158779&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk109172" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk109172&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Thu, 19 Oct 2023 01:37:20 GMT</pubDate>
    <dc:creator>the_rock</dc:creator>
    <dc:date>2023-10-19T01:37:20Z</dc:date>
    <item>
      <title>R81.20 - iked running while IPSec VPN blade not enabled</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-20-iked-running-while-IPSec-VPN-blade-not-enabled/m-p/195553#M36422</link>
      <description>&lt;P&gt;Good afternoon 'mates.&lt;/P&gt;&lt;P&gt;We upgraded in place from R80.40 -&amp;gt; R81.20 JHF 26 last night, went very smoothly, cheers to MVC.&lt;/P&gt;&lt;P&gt;While reviewing this morning, I discovered there are new daemons for VPN (&lt;A href="https://community.checkpoint.com/t5/General-Topics/New-VPN-daemons-in-R81-10-R81-20/td-p/168785" target="_blank"&gt;https://community.checkpoint.com/t5/General-Topics/New-VPN-daemons-in-R81-10-R81-20/td-p/168785&lt;/A&gt;)&lt;/P&gt;&lt;P&gt;What I can't seem to track down anywhere is why are these daemons running if we're don't have the IPSEC VPN blade enabled on the cluster that was upgraded?&amp;nbsp; &amp;nbsp;We don't use CP for VPN access, so a bit concerned processes that aren't supposed to be enabled are running.&lt;/P&gt;&lt;P&gt;1) Don't worry about it?&lt;BR /&gt;2) How to really get them disabled?&lt;BR /&gt;3) R80.40 version didn't have the blade enabled either, but we would get alerted when internal pen test ran and connected to the gateways on udp/500.&amp;nbsp; &amp;nbsp;So they've been listening on a service we don't have enabled for quite some time.&lt;/P&gt;&lt;P&gt;Thanks for your insight.&lt;/P&gt;</description>
      <pubDate>Wed, 18 Oct 2023 17:02:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-20-iked-running-while-IPSec-VPN-blade-not-enabled/m-p/195553#M36422</guid>
      <dc:creator>Matt_Taber</dc:creator>
      <dc:date>2023-10-18T17:02:34Z</dc:date>
    </item>
    <item>
      <title>Re: R81.20 - iked running while IPSec VPN blade not enabled</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-20-iked-running-while-IPSec-VPN-blade-not-enabled/m-p/195554#M36423</link>
      <description>&lt;P&gt;Hey&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/8467"&gt;@Matt_Taber&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;If you send us the deamons you see, we can check.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Wed, 18 Oct 2023 17:15:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-20-iked-running-while-IPSec-VPN-blade-not-enabled/m-p/195554#M36423</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-10-18T17:15:48Z</dc:date>
    </item>
    <item>
      <title>Re: R81.20 - iked running while IPSec VPN blade not enabled</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-20-iked-running-while-IPSec-VPN-blade-not-enabled/m-p/195555#M36424</link>
      <description>&lt;P&gt;iked and vpnd, but not cccd&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;[Expert@fw3:0]# ps aux|grep ike&lt;BR /&gt;admin 5716 0.1 0.1 276956 61676 ? Sl 01:37 0:48 iked 0&lt;BR /&gt;admin 5717 0.1 0.1 276900 61232 ? Sl 01:37 0:48 iked 1&lt;BR /&gt;admin 5718 0.1 0.1 276668 60888 ? Sl 01:37 0:48 iked 2&lt;BR /&gt;admin 5719 0.1 0.1 276944 61288 ? Sl 01:37 0:48 iked 3&lt;BR /&gt;admin 5754 0.1 0.1 277112 61336 ? Sl 01:37 0:48 iked 4&lt;/P&gt;&lt;P&gt;[Expert@fw3:0]# ps aux|grep vpn&lt;BR /&gt;admin 5715 0.1 0.2 299164 65444 ? SLl 01:37 0:52 vpnd 0&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;[Expert@fw3:0]# ps aux|grep ccc&lt;BR /&gt;admin 12953 0.0 0.0 2648 576 pts/2 S+ 13:19 0:00 grep --color=auto ccc&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 18 Oct 2023 17:21:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-20-iked-running-while-IPSec-VPN-blade-not-enabled/m-p/195555#M36424</guid>
      <dc:creator>Matt_Taber</dc:creator>
      <dc:date>2023-10-18T17:21:46Z</dc:date>
    </item>
    <item>
      <title>Re: R81.20 - iked running while IPSec VPN blade not enabled</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-20-iked-running-while-IPSec-VPN-blade-not-enabled/m-p/195558#M36425</link>
      <description>&lt;P&gt;Well, I learned something new today as well : - )&lt;/P&gt;
&lt;P&gt;Yes, it is possible...see below, my lab R81.20 jumbo 26, no vpn blade.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://sc1.checkpoint.com/documents/R81.10/WebAdminGuides/EN/CP_R81.10_SitetoSiteVPN_AdminGuide/Topics-VPNSG/CLI/ike-debug.htm?TocPath=Command%20Line%20Reference%7C_____2" target="_blank"&gt;https://sc1.checkpoint.com/documents/R81.10/WebAdminGuides/EN/CP_R81.10_SitetoSiteVPN_AdminGuide/Topics-VPNSG/CLI/ike-debug.htm?TocPath=Command%20Line%20Reference%7C_____2&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;[Expert@CP-TEST-FIREWALL:0]# enabled_blades&lt;BR /&gt;fw urlf appi ips mon&lt;BR /&gt;[Expert@CP-TEST-FIREWALL:0]# ps aux|grep ike&lt;BR /&gt;admin 7683 0.0 0.0 34916 5484 ? Ss Oct16 2:15 spike_detective&lt;BR /&gt;admin 9452 0.1 0.1 258308 42048 ? Sl Oct16 3:40 iked 0&lt;BR /&gt;admin 9453 0.1 0.1 258296 41740 ? Sl Oct16 3:36 iked 1&lt;BR /&gt;admin 9454 0.1 0.1 258308 41716 ? Sl Oct16 3:40 iked 2&lt;BR /&gt;admin 15503 0.0 0.0 2652 568 pts/2 S+ 13:39 0:00 grep --color=auto ike&lt;BR /&gt;[Expert@CP-TEST-FIREWALL:0]# vpn iked disable&lt;BR /&gt;vpn: disabling 'iked'...&lt;BR /&gt;vpn: reconfiguring system...&lt;/P&gt;
&lt;P&gt;Installing Security Policy LAB-POLICY on all.all@CP-TEST-FIREWALL&lt;BR /&gt;IPS package: Compiled OK.&lt;BR /&gt;Fetching Security Policy from local succeeded&lt;BR /&gt;vpn: 'iked' is now disabled.&lt;/P&gt;
&lt;P&gt;[Expert@CP-TEST-FIREWALL:0]# ps aux|grep ike&lt;BR /&gt;admin 7683 0.0 0.0 34916 5484 ? Ss Oct16 2:15 spike_detective&lt;BR /&gt;admin 16106 0.0 0.0 2652 572 pts/2 S+ 13:41 0:00 grep --color=auto ike&lt;BR /&gt;[Expert@CP-TEST-FIREWALL:0]# fw ver&lt;BR /&gt;This is Check Point's software version R81.20 - Build 012&lt;BR /&gt;[Expert@CP-TEST-FIREWALL:0]# cpinfo -y fw1&lt;/P&gt;
&lt;P&gt;This is Check Point CPinfo Build 914000234 for GAIA&lt;BR /&gt;[FW1]&lt;BR /&gt;HOTFIX_R81_20_JUMBO_HF_MAIN Take: 26&lt;BR /&gt;HOTFIX_PUBLIC_CLOUD_CA_BUNDLE_AUTOUPDATE&lt;BR /&gt;HOTFIX_GOT_TPCONF_AUTOUPDATE&lt;/P&gt;
&lt;P&gt;FW1 build number:&lt;BR /&gt;This is Check Point's software version R81.20 - Build 012&lt;BR /&gt;kernel: R81.20 - Build 014&lt;/P&gt;
&lt;P&gt;[Expert@CP-TEST-FIREWALL:0]#&lt;/P&gt;</description>
      <pubDate>Wed, 18 Oct 2023 17:42:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-20-iked-running-while-IPSec-VPN-blade-not-enabled/m-p/195558#M36425</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-10-18T17:42:57Z</dc:date>
    </item>
    <item>
      <title>Re: R81.20 - iked running while IPSec VPN blade not enabled</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-20-iked-running-while-IPSec-VPN-blade-not-enabled/m-p/195560#M36426</link>
      <description>&lt;P&gt;Appreciate you running that down!&amp;nbsp; &amp;nbsp;I will disable iked during a future maintenance window.&amp;nbsp; &amp;nbsp;&lt;/P&gt;&lt;P&gt;However, the gateways are still listening on udp/500 udp/4500 and tcp/444 via vpnd.&amp;nbsp; &amp;nbsp;I don't see a way to disable vpnd via CLI.&amp;nbsp; Would it be safe to comment out this line from $FWDIR/conf/fwauthd.conf:&lt;/P&gt;&lt;P&gt;&lt;EM&gt;0 vpn vpnd respawn 0&lt;/EM&gt;&lt;BR /&gt;&lt;BR /&gt;I find it concerning that the gateways would still listen on ports that aren't configured to be enabled via a blade.&amp;nbsp; We have no need for UDP/500 or 4500 on these units.&lt;/P&gt;&lt;P&gt;Thank you again!&lt;/P&gt;</description>
      <pubDate>Wed, 18 Oct 2023 18:06:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-20-iked-running-while-IPSec-VPN-blade-not-enabled/m-p/195560#M36426</guid>
      <dc:creator>Matt_Taber</dc:creator>
      <dc:date>2023-10-18T18:06:39Z</dc:date>
    </item>
    <item>
      <title>Re: R81.20 - iked running while IPSec VPN blade not enabled</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-20-iked-running-while-IPSec-VPN-blade-not-enabled/m-p/195574#M36432</link>
      <description>&lt;P&gt;This may answer it...&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.checkpoint.com/t5/Security-Gateways/vpnd-process-running-vpn-blade-not-enabled/td-p/158779" target="_blank"&gt;https://community.checkpoint.com/t5/Security-Gateways/vpnd-process-running-vpn-blade-not-enabled/td-p/158779&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk109172" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk109172&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 19 Oct 2023 01:37:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-20-iked-running-while-IPSec-VPN-blade-not-enabled/m-p/195574#M36432</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-10-19T01:37:20Z</dc:date>
    </item>
    <item>
      <title>Re: R81.20 - iked running while IPSec VPN blade not enabled</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-20-iked-running-while-IPSec-VPN-blade-not-enabled/m-p/195769#M36507</link>
      <description>&lt;P&gt;Apparently my searching ability is subpar, thank you AGAIN for tracking this information down.&amp;nbsp; &amp;nbsp;Much appreciated.&amp;nbsp; We do run Identity Awareness.&amp;nbsp; Crazy that vpnd is responsible for the different portals.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;[Expert@fw4:0]# for i in `mpclient list`; do echo $i ; mpclient status $i; done&lt;BR /&gt;DLPSenderPortal&lt;BR /&gt;Portal is running&lt;BR /&gt;SecurePlatform&lt;BR /&gt;Portal is running&lt;BR /&gt;UserCheck&lt;BR /&gt;Portal is running&lt;BR /&gt;ZeroPhishing&lt;BR /&gt;Portal is running&lt;BR /&gt;nac&lt;BR /&gt;Portal is running&lt;BR /&gt;nac_transparent_auth&lt;BR /&gt;Portal is running&lt;BR /&gt;saml-vpn&lt;BR /&gt;Portal is not running&lt;/P&gt;&lt;P&gt;[Expert@fw4:0]# for i in `mpclient list`; do echo $i ; mpclient getdata $i; done&lt;BR /&gt;&lt;SPAN&gt;DLPSenderPortal&lt;BR /&gt;&lt;/SPAN&gt;Portal is not configured yet&lt;BR /&gt;SecurePlatform&lt;BR /&gt;Portal path prefix '' port 49927 hostname 'redacted' priority 10 encrypted 1&lt;BR /&gt;UserCheck&lt;BR /&gt;Portal path prefix '/UserCheck' port 56645 hostname 'redacted' priority 1000 encrypted 0&lt;BR /&gt;ZeroPhishing&lt;BR /&gt;Portal is not configured yet&lt;BR /&gt;nac&lt;BR /&gt;Portal is not configured yet&lt;BR /&gt;nac_transparent_auth&lt;BR /&gt;Portal is not configured yet&lt;BR /&gt;saml-vpn&lt;BR /&gt;Portal is not configured yet&lt;/P&gt;&lt;P&gt;I'll see if I can track down a way to disable udp/500 and 4500 from listening w/o impacting the portals.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 20 Oct 2023 15:28:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-20-iked-running-while-IPSec-VPN-blade-not-enabled/m-p/195769#M36507</guid>
      <dc:creator>Matt_Taber</dc:creator>
      <dc:date>2023-10-20T15:28:55Z</dc:date>
    </item>
    <item>
      <title>Re: R81.20 - iked running while IPSec VPN blade not enabled</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-20-iked-running-while-IPSec-VPN-blade-not-enabled/m-p/195773#M36508</link>
      <description>&lt;P&gt;No problem at all, glad we can help. I would be careful when it comes to disabling anything to do with multi-portal, as it may cause you more headache.&lt;/P&gt;
&lt;P&gt;Cheers,&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Fri, 20 Oct 2023 18:03:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-20-iked-running-while-IPSec-VPN-blade-not-enabled/m-p/195773#M36508</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-10-20T18:03:54Z</dc:date>
    </item>
    <item>
      <title>Re: R81.20 - iked running while IPSec VPN blade not enabled</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-20-iked-running-while-IPSec-VPN-blade-not-enabled/m-p/195776#M36509</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/8467"&gt;@Matt_Taber&lt;/a&gt;,&lt;BR /&gt;&lt;BR /&gt;From version R81, the VPND has been replaced in many points by the IKED. You can read more in my article "&lt;SPAN class="lia-message-read"&gt;&lt;A href="https://community.checkpoint.com/t5/General-Topics/New-VPN-daemons-in-R81-10-R81-20/m-p/168785#M28073" target="_self"&gt;New VPN daemons in R81.10 / R81.20 &lt;/A&gt; &lt;/SPAN&gt;". If a multiportal service other than&amp;nbsp; - GAIA Portal corresponds to SecurePlatform -&amp;nbsp; is started, the IKED - for older versions R80.40 and lower the VPND - is always started. The background is that the IKED is also responsible for certificate negotiation.&lt;BR /&gt;&lt;BR /&gt;PS:&lt;BR /&gt;I think Check Point should revise the following&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/sk/sk109172" target="_blank" rel="noopener noreferrer"&gt;sk109172&lt;/A&gt; here. Unfortunately, only the VPND is described in this sk.&lt;/P&gt;</description>
      <pubDate>Fri, 20 Oct 2023 18:46:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-20-iked-running-while-IPSec-VPN-blade-not-enabled/m-p/195776#M36509</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2023-10-20T18:46:54Z</dc:date>
    </item>
    <item>
      <title>Re: R81.20 - iked running while IPSec VPN blade not enabled</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-20-iked-running-while-IPSec-VPN-blade-not-enabled/m-p/216049#M41208</link>
      <description>&lt;P&gt;Attention, quoting from&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/General-Topics/Important-security-update-stay-protected-against-VPN-Information/m-p/215965#M35811" target="_self"&gt;&lt;SPAN&gt;Important security update - stay protected against VPN Information Disclosure (CVE-2024-24919)&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In R81.10 we added a feature to improve VPN performance - named CCCD&lt;/P&gt;
&lt;P&gt;This feature is&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;disabled by default&lt;/STRONG&gt;, and we know about few advanced customers who are using it.&lt;/P&gt;
&lt;P&gt;Customers who enable CCCD&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;STRONG&gt;are still vulnerable to CVE-2024-24919 even after installing the Hotfix!&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;U&gt;&lt;STRONG&gt;YOU MUST DISABLE CCCD TO BECOME PROTECTED!&lt;/STRONG&gt;&lt;/U&gt;&lt;/P&gt;
&lt;P&gt;Instructions below and also on&amp;nbsp;&lt;A class="fui-Link ___1rxvrpe f2hkw1w f3rmtva f1ewtqcl fyind8e f1k6fduh f1w7gpdv fk6fouc fjoy568 figsok6 f1hu3pq6 f11qmguv f19f4twv f1tyq0we f1g0x7ka fhxju0i f1qch9an f1cnd47f fqv5qza f1vmzxwi f1o700av f13mvf36 f1cmlufx f9n3di6 f1ids18y f1tx3yz7 f1deo86v f1eh06m1 f1iescvh fhgqx19 f1olyrje f1p93eir f1nev41a f1h8hb77 f1lqvz6u f10aw75t fsle3fq f17ae5zn" title="https://support.checkpoint.com/results/sk/sk182336" href="https://support.checkpoint.com/results/sk/sk182336" target="_blank" rel="noreferrer noopener" aria-label="Link SK182336"&gt;SK182336&lt;/A&gt;:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Run the command:&amp;nbsp;&lt;CODE&gt;&lt;STRONG&gt;vpn cccd status&lt;/STRONG&gt;&lt;/CODE&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;The expected output is:&amp;nbsp;&lt;CODE&gt;&lt;STRONG&gt;vpn: 'cccd' is disabled&lt;/STRONG&gt;&lt;/CODE&gt;.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;If the output differs, stop the&amp;nbsp;&lt;CODE&gt;&lt;STRONG&gt;CCCD&lt;/STRONG&gt;&lt;/CODE&gt;&amp;nbsp;process by running the&amp;nbsp;&lt;CODE&gt;&lt;STRONG&gt;vpn cccd disable&lt;/STRONG&gt;&lt;/CODE&gt;&amp;nbsp;command.&lt;BR /&gt;&lt;BR /&gt;More info by the link above.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 01 Jun 2024 13:30:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-20-iked-running-while-IPSec-VPN-blade-not-enabled/m-p/216049#M41208</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2024-06-01T13:30:37Z</dc:date>
    </item>
    <item>
      <title>Re: R81.20 - iked running while IPSec VPN blade not enabled</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-20-iked-running-while-IPSec-VPN-blade-not-enabled/m-p/262391#M51482</link>
      <description>&lt;P&gt;Hi Heiko,&lt;/P&gt;
&lt;P&gt;The new R81.20+ iked has been formally documented here:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk184307" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;sk184307: VPN User-space Multi-Process Architecture in R81.20 and higher&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 10 Nov 2025 23:13:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-20-iked-running-while-IPSec-VPN-blade-not-enabled/m-p/262391#M51482</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2025-11-10T23:13:12Z</dc:date>
    </item>
  </channel>
</rss>

