<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: VPN problems - Clear text packet should be encrypted in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-problems-Clear-text-packet-should-be-encrypted/m-p/197968#M37014</link>
    <description>&lt;P&gt;On the firewall module:&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;grep $ONEWEBIP $FWDIR/log/vpnd.elg*&lt;/P&gt;&lt;P&gt;Nothing...&lt;/P&gt;&lt;P&gt;Best,&lt;/P&gt;&lt;P&gt;Nils&lt;/P&gt;</description>
    <pubDate>Wed, 15 Nov 2023 06:58:30 GMT</pubDate>
    <dc:creator>NilsKS</dc:creator>
    <dc:date>2023-11-15T06:58:30Z</dc:date>
    <item>
      <title>VPN problems - Clear text packet should be encrypted</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-problems-Clear-text-packet-should-be-encrypted/m-p/197701#M36930</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Check Point R81.10 appliance. Cisco ASA 5506 peer.&lt;/P&gt;&lt;P&gt;I am trying to get IPSec policy-based VPN up and running on a field installation.The VPN connection was working fine for several years, until the remote end changed to Oneweb satellite provider and our Cisco ASA was moved from a public IP to a 192.168 private address on their network. T&lt;/P&gt;&lt;P&gt;When trying to establish the VPN connection, I get a 'Clear text packet should be encrypted' from their Oneweb gateway IP in our firewall for UDP/4500, and the packet is dropped.&lt;/P&gt;&lt;P&gt;I have configured user.def &amp;amp; crypt.def on our management server according to &lt;A href="https://support.checkpoint.com/results/sk/sk108600," target="_blank"&gt;https://support.checkpoint.com/results/sk/sk108600,&lt;/A&gt; but this did not help... NAT-T is enabled on out firewall.&lt;/P&gt;&lt;P&gt;The IP address of the remote is x.x.x.0. Could the zero IP-address cause problems with a Check Point firewall?&lt;/P&gt;&lt;P&gt;Best,&lt;/P&gt;&lt;P&gt;Nils&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 10 Nov 2023 13:29:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-problems-Clear-text-packet-should-be-encrypted/m-p/197701#M36930</guid>
      <dc:creator>NilsKS</dc:creator>
      <dc:date>2023-11-10T13:29:31Z</dc:date>
    </item>
    <item>
      <title>Re: VPN problems - Clear text packet should be encrypted</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-problems-Clear-text-packet-should-be-encrypted/m-p/197712#M36932</link>
      <description>&lt;P&gt;That message means the firewall received a packet from a source address in some peer's encryption domain to a destination address in its own encryption domain. You need to figure out which address shouldn't be in which encryption domain and remove it.&lt;/P&gt;</description>
      <pubDate>Fri, 10 Nov 2023 15:00:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-problems-Clear-text-packet-should-be-encrypted/m-p/197712#M36932</guid>
      <dc:creator>Bob_Zimmerman</dc:creator>
      <dc:date>2023-11-10T15:00:50Z</dc:date>
    </item>
    <item>
      <title>Re: VPN problems - Clear text packet should be encrypted</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-problems-Clear-text-packet-should-be-encrypted/m-p/197728#M36937</link>
      <description>&lt;P&gt;The encryption domains is as they were when we had a public IP on the ASA and a operational VPN.&lt;/P&gt;&lt;P&gt;Double checked and the encryption domains are OK and configured like all the other VPN field connections we have.&lt;/P&gt;&lt;P&gt;Best,&lt;/P&gt;&lt;P&gt;Nils&lt;/P&gt;</description>
      <pubDate>Fri, 10 Nov 2023 17:06:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-problems-Clear-text-packet-should-be-encrypted/m-p/197728#M36937</guid>
      <dc:creator>NilsKS</dc:creator>
      <dc:date>2023-11-10T17:06:13Z</dc:date>
    </item>
    <item>
      <title>Re: VPN problems - Clear text packet should be encrypted</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-problems-Clear-text-packet-should-be-encrypted/m-p/197729#M36938</link>
      <description>&lt;P&gt;I see what Bob is saying, as that message would always imply an issue with enc. domain, since it specifically means that packet that came in clear should have been encrypted, meaning go through the VPN tunnel.&lt;/P&gt;
&lt;P&gt;If you do fw monitor for that IP, what do you see? If last insp. point (O) shows, that means its NOT being encrypted.&lt;/P&gt;
&lt;P&gt;Also, just on a side note, if natting through VPN is taking place, ensure that nat is enabled inside VPM community (advanced tab I believe)&lt;/P&gt;
&lt;P&gt;Cheers,&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Fri, 10 Nov 2023 17:24:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-problems-Clear-text-packet-should-be-encrypted/m-p/197729#M36938</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-11-10T17:24:38Z</dc:date>
    </item>
    <item>
      <title>Re: VPN problems - Clear text packet should be encrypted</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-problems-Clear-text-packet-should-be-encrypted/m-p/197892#M36980</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;NAT is enabled within the community.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ONEWEB=ISP PUBLIC IP&lt;BR /&gt;CHECKPOINT=CHECK POINT PUBLIC IP&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;# fw monitor -F "$ONEWEB,0,$CHECKPOINT,0,0" -F "$CHECKPOINT,0,$ONEWEB,0,0"&lt;BR /&gt;...&lt;BR /&gt;[vs_0][fw_0] bond0.901:O[44]: CHECKPOINT -&amp;gt; ONEWEB (UDP) len=260 id=39737&lt;BR /&gt;UDP: 500 -&amp;gt; 500&lt;BR /&gt;[vs_0][fw_0] bond0.901:O[44]: CHECKPOINT -&amp;gt; ONEWEB (UDP) len=260 id=39752&lt;BR /&gt;UDP: 500 -&amp;gt; 500&lt;BR /&gt;[vs_0][ppak_0] bond0.901:i[44]: ONEWEB -&amp;gt; CHECKPOINT (UDP) len=96 id=19902&lt;BR /&gt;UDP: 500 -&amp;gt; 500&lt;BR /&gt;[vs_0][fw_0] bond0.901:i[44]: ONEWEB -&amp;gt; CHECKPOINT (UDP) len=96 id=19902&lt;BR /&gt;UDP: 500 -&amp;gt; 500&lt;BR /&gt;[vs_0][ppak_0] bond0.901:id[44]: ONEWEB -&amp;gt; CHECKPOINT (UDP) len=124 id=27692&lt;BR /&gt;UDP: 4500 -&amp;gt; 4500&lt;BR /&gt;[vs_0][fw_0] bond0.901:i[44]: ONEWEB -&amp;gt; CHECKPOINT (UDP) len=124 id=27692&lt;BR /&gt;UDP: 4500 -&amp;gt; 4500&lt;BR /&gt;create_one_data: no packets left to merge, but 84 bytes left in buffer!&lt;BR /&gt;[vs_0][fw_0] bond0.901:O[44]: CHECKPOINT -&amp;gt; ONEWEB (UDP) len=260 id=39772&lt;BR /&gt;UDP: 500 -&amp;gt; 500&lt;BR /&gt;[vs_0][ppak_0] bond0.901:id[44]: ONEWEB -&amp;gt; CHECKPOINT (UDP) len=124 id=7485&lt;BR /&gt;UDP: 4500 -&amp;gt; 4500&lt;BR /&gt;[vs_0][fw_0] bond0.901:i[44]: ONEWEB -&amp;gt; CHECKPOINT (UDP) len=124 id=7485&lt;BR /&gt;UDP: 4500 -&amp;gt; 4500&lt;BR /&gt;create_one_data: no packets left to merge, but 168 bytes left in buffer!&lt;BR /&gt;[vs_0][fw_0] bond0.901:O[44]: CHECKPOINT -&amp;gt; ONEWEB (UDP) len=260 id=41057&lt;BR /&gt;UDP: 500 -&amp;gt; 500&lt;BR /&gt;[vs_0][fw_0] bond0.901:O[44]: CHECKPOINT -&amp;gt; ONEWEB (UDP) len=260 id=41066&lt;BR /&gt;UDP: 500 -&amp;gt; 500&lt;BR /&gt;[vs_0][ppak_0] bond0.901:i[44]: ONEWEB -&amp;gt; CHECKPOINT (UDP) len=96 id=28322&lt;BR /&gt;UDP: 500 -&amp;gt; 500&lt;BR /&gt;[vs_0][fw_0] bond0.901:i[44]: ONEWEB -&amp;gt; CHECKPOINT (UDP) len=96 id=28322&lt;BR /&gt;UDP: 500 -&amp;gt; 500&lt;BR /&gt;[vs_0][ppak_0] bond0.901:id[44]: ONEWEB -&amp;gt; CHECKPOINT (UDP) len=124 id=2851&lt;BR /&gt;UDP: 4500 -&amp;gt; 4500&lt;BR /&gt;[vs_0][fw_0] bond0.901:i[44]: ONEWEB -&amp;gt; CHECKPOINT (UDP) len=124 id=2851&lt;BR /&gt;UDP: 4500 -&amp;gt; 4500&lt;BR /&gt;[vs_0][fw_0] bond0.901:O[44]: CHECKPOINT -&amp;gt; ONEWEB (UDP) len=260 id=42857&lt;BR /&gt;UDP: 500 -&amp;gt; 500&lt;BR /&gt;create_one_data: no packets left to merge, but 84 bytes left in buffer!&lt;BR /&gt;[vs_0][ppak_0] bond0.901:i[44]: ONEWEB -&amp;gt; CHECKPOINT (UDP) len=96 id=21689&lt;BR /&gt;UDP: 500 -&amp;gt; 500&lt;BR /&gt;[vs_0][fw_0] bond0.901:i[44]: ONEWEB -&amp;gt; CHECKPOINT (UDP) len=96 id=21689&lt;BR /&gt;UDP: 500 -&amp;gt; 500&lt;BR /&gt;create_one_data: no packets left to merge, but 168 bytes left in buffer!&lt;BR /&gt;[vs_0][fw_0] bond0.901:O[44]: CHECKPOINT -&amp;gt; ONEWEB (UDP) len=260 id=44621&lt;BR /&gt;UDP: 500 -&amp;gt; 500&lt;BR /&gt;[vs_0][fw_0] bond0.901:O[44]: CHECKPOINT -&amp;gt; ONEWEB (UDP) len=260 id=44628&lt;BR /&gt;UDP: 500 -&amp;gt; 500&lt;BR /&gt;[vs_0][ppak_0] bond0.901:i[44]: ONEWEB -&amp;gt; CHECKPOINT (UDP) len=96 id=31060&lt;BR /&gt;UDP: 500 -&amp;gt; 500&lt;BR /&gt;[vs_0][fw_0] bond0.901:i[44]: ONEWEB -&amp;gt; CHECKPOINT (UDP) len=96 id=31060&lt;BR /&gt;UDP: 500 -&amp;gt; 500&lt;BR /&gt;[vs_0][ppak_0] bond0.901:i[44]: ONEWEB -&amp;gt; CHECKPOINT (UDP) len=96 id=13765&lt;BR /&gt;UDP: 500 -&amp;gt; 500&lt;BR /&gt;[vs_0][fw_0] bond0.901:i[44]: ONEWEB -&amp;gt; CHECKPOINT (UDP) len=96 id=13765&lt;BR /&gt;UDP: 500 -&amp;gt; 500&lt;BR /&gt;create_one_data: no packets left to merge, but 420 bytes left in buffer!&lt;BR /&gt;[vs_0][fw_0] bond0.901:O[44]: CHECKPOINT -&amp;gt; ONEWEB (UDP) len=260 id=45293&lt;BR /&gt;UDP: 500 -&amp;gt; 500&lt;BR /&gt;[vs_0][fw_0] bond0.901:O[44]: CHECKPOINT -&amp;gt; ONEWEB (UDP) len=260 id=45301&lt;BR /&gt;UDP: 500 -&amp;gt; 500&lt;BR /&gt;[vs_0][ppak_0] bond0.901:i[44]: ONEWEB -&amp;gt; CHECKPOINT (UDP) len=96 id=6269&lt;BR /&gt;UDP: 500 -&amp;gt; 500&lt;BR /&gt;[vs_0][fw_0] bond0.901:i[44]: ONEWEB -&amp;gt; CHECKPOINT (UDP) len=96 id=6269&lt;BR /&gt;UDP: 500 -&amp;gt; 500&lt;BR /&gt;[vs_0][ppak_0] bond0.901:i[44]: ONEWEB -&amp;gt; CHECKPOINT (UDP) len=352 id=17475&lt;BR /&gt;UDP: 500 -&amp;gt; 500&lt;BR /&gt;[vs_0][fw_0] bond0.901:i[44]: ONEWEB -&amp;gt; CHECKPOINT (UDP) len=352 id=17475&lt;BR /&gt;UDP: 500 -&amp;gt; 500&lt;BR /&gt;[vs_0][fw_0] bond0.901:O[44]: CHECKPOINT -&amp;gt; ONEWEB (UDP) len=156 id=45323&lt;BR /&gt;UDP: 500 -&amp;gt; 500&lt;BR /&gt;[vs_0][ppak_0] bond0.901:i[44]: ONEWEB -&amp;gt; CHECKPOINT (UDP) len=96 id=23191&lt;BR /&gt;UDP: 500 -&amp;gt; 500&lt;BR /&gt;[vs_0][fw_0] bond0.901:i[44]: ONEWEB -&amp;gt; CHECKPOINT (UDP) len=96 id=23191&lt;BR /&gt;UDP: 500 -&amp;gt; 500&lt;BR /&gt;[vs_0][ppak_0] bond0.901:i[44]: ONEWEB -&amp;gt; CHECKPOINT (UDP) len=332 id=8697&lt;BR /&gt;UDP: 500 -&amp;gt; 500&lt;BR /&gt;[vs_0][fw_0] bond0.901:i[44]: ONEWEB -&amp;gt; CHECKPOINT (UDP) len=332 id=8697&lt;BR /&gt;UDP: 500 -&amp;gt; 500&lt;BR /&gt;[vs_0][fw_0] bond0.901:O[44]: CHECKPOINT -&amp;gt; ONEWEB (UDP) len=260 id=45443&lt;BR /&gt;UDP: 500 -&amp;gt; 500&lt;BR /&gt;[vs_0][ppak_0] bond0.901:id[44]: ONEWEB -&amp;gt; CHECKPOINT (UDP) len=124 id=6628&lt;BR /&gt;UDP: 4500 -&amp;gt; 4500&lt;BR /&gt;[vs_0][fw_0] bond0.901:i[44]: ONEWEB -&amp;gt; CHECKPOINT (UDP) len=124 id=6628&lt;BR /&gt;UDP: 4500 -&amp;gt; 4500&lt;BR /&gt;create_one_data: no packets left to merge, but 84 bytes left in buffer!&lt;BR /&gt;[vs_0][fw_0] bond0.901:O[44]: CHECKPOINT -&amp;gt; ONEWEB (UDP) len=260 id=46179&lt;BR /&gt;UDP: 500 -&amp;gt; 500&lt;BR /&gt;[vs_0][ppak_0] bond0.901:id[44]: ONEWEB -&amp;gt; CHECKPOINT (UDP) len=124 id=12098&lt;BR /&gt;UDP: 4500 -&amp;gt; 4500&lt;BR /&gt;[vs_0][fw_0] bond0.901:i[44]: ONEWEB -&amp;gt; CHECKPOINT (UDP) len=124 id=12098&lt;BR /&gt;UDP: 4500 -&amp;gt; 4500&lt;BR /&gt;create_one_data: no packets left to merge, but 84 bytes left in buffer!&lt;BR /&gt;[vs_0][fw_0] bond0.901:O[44]: CHECKPOINT -&amp;gt; ONEWEB (UDP) len=260 id=46199&lt;BR /&gt;UDP: 500 -&amp;gt; 500&lt;BR /&gt;[vs_0][ppak_0] bond0.901:i[44]: ONEWEB -&amp;gt; CHECKPOINT (UDP) len=96 id=13925&lt;BR /&gt;UDP: 500 -&amp;gt; 500&lt;BR /&gt;[vs_0][fw_0] bond0.901:i[44]: ONEWEB -&amp;gt; CHECKPOINT (UDP) len=96 id=13925&lt;BR /&gt;UDP: 500 -&amp;gt; 500&lt;BR /&gt;[vs_0][fw_0] bond0.901:O[44]: CHECKPOINT -&amp;gt; ONEWEB (UDP) len=260 id=46209&lt;BR /&gt;UDP: 500 -&amp;gt; 500&lt;BR /&gt;create_one_data: no packets left to merge, but 84 bytes left in buffer!&lt;BR /&gt;[vs_0][ppak_0] bond0.901:id[44]: ONEWEB -&amp;gt; CHECKPOINT (UDP) len=124 id=13308&lt;BR /&gt;UDP: 4500 -&amp;gt; 4500&lt;BR /&gt;[vs_0][fw_0] bond0.901:i[44]: ONEWEB -&amp;gt; CHECKPOINT (UDP) len=124 id=13308&lt;BR /&gt;UDP: 4500 -&amp;gt; 4500&lt;BR /&gt;create_one_data: no packets left to merge, but 84 bytes left in buffer!&lt;BR /&gt;[vs_0][fw_0] bond0.901:O[44]: CHECKPOINT -&amp;gt; ONEWEB (UDP) len=260 id=47113&lt;BR /&gt;UDP: 500 -&amp;gt; 500&lt;BR /&gt;[vs_0][ppak_0] bond0.901:id[44]: ONEWEB -&amp;gt; CHECKPOINT (UDP) len=124 id=6325&lt;BR /&gt;UDP: 4500 -&amp;gt; 4500&lt;BR /&gt;[vs_0][fw_0] bond0.901:i[44]: ONEWEB -&amp;gt; CHECKPOINT (UDP) len=124 id=6325&lt;BR /&gt;UDP: 4500 -&amp;gt; 4500&lt;BR /&gt;[vs_0][fw_0] bond0.901:O[44]: CHECKPOINT -&amp;gt; ONEWEB (UDP) len=260 id=47764&lt;BR /&gt;UDP: 500 -&amp;gt; 500&lt;BR /&gt;create_one_data: no packets left to merge, but 84 bytes left in buffer!&lt;BR /&gt;[vs_0][ppak_0] bond0.901:i[44]: ONEWEB -&amp;gt; CHECKPOINT (UDP) len=96 id=8267&lt;BR /&gt;UDP: 500 -&amp;gt; 500&lt;BR /&gt;[vs_0][fw_0] bond0.901:i[44]: ONEWEB -&amp;gt; CHECKPOINT (UDP) len=96 id=8267&lt;BR /&gt;UDP: 500 -&amp;gt; 500&lt;BR /&gt;[vs_0][fw_0] bond0.901:O[44]: CHECKPOINT -&amp;gt; ONEWEB (UDP) len=260 id=48022&lt;BR /&gt;UDP: 500 -&amp;gt; 500&lt;BR /&gt;create_one_data: no packets left to merge, but 84 bytes left in buffer!&lt;BR /&gt;[vs_0][ppak_0] bond0.901:id[44]: ONEWEB -&amp;gt; CHECKPOINT (UDP) len=124 id=18576&lt;BR /&gt;UDP: 4500 -&amp;gt; 4500&lt;BR /&gt;[vs_0][fw_0] bond0.901:i[44]: ONEWEB -&amp;gt; CHECKPOINT (UDP) len=124 id=18576&lt;BR /&gt;UDP: 4500 -&amp;gt; 4500&lt;BR /&gt;create_one_data: no packets left to merge, but 84 bytes left in buffer!&lt;BR /&gt;[vs_0][fw_0] bond0.901:O[44]: CHECKPOINT -&amp;gt; ONEWEB (UDP) len=260 id=48962&lt;BR /&gt;UDP: 500 -&amp;gt; 500&lt;BR /&gt;[vs_0][ppak_0] bond0.901:i[44]: ONEWEB -&amp;gt; CHECKPOINT (UDP) len=96 id=10778&lt;BR /&gt;UDP: 500 -&amp;gt; 500&lt;BR /&gt;[vs_0][fw_0] bond0.901:i[44]: ONEWEB -&amp;gt; CHECKPOINT (UDP) len=96 id=10778&lt;BR /&gt;UDP: 500 -&amp;gt; 500&lt;BR /&gt;create_one_data: no packets left to merge, but 84 bytes left in buffer!&lt;BR /&gt;[vs_0][fw_0] bond0.901:O[44]: CHECKPOINT -&amp;gt; ONEWEB (UDP) len=260 id=50122&lt;BR /&gt;UDP: 500 -&amp;gt; 500&lt;BR /&gt;[vs_0][ppak_0] bond0.901:i[44]: ONEWEB -&amp;gt; CHECKPOINT (UDP) len=96 id=3817&lt;BR /&gt;UDP: 500 -&amp;gt; 500&lt;BR /&gt;[vs_0][fw_0] bond0.901:i[44]: ONEWEB -&amp;gt; CHECKPOINT (UDP) len=96 id=3817&lt;BR /&gt;UDP: 500 -&amp;gt; 500&lt;BR /&gt;[vs_0][fw_0] bond0.901:O[44]: CHECKPOINT -&amp;gt; ONEWEB (UDP) len=260 id=50275&lt;BR /&gt;UDP: 500 -&amp;gt; 500&lt;BR /&gt;create_one_data: no packets left to merge, but 252 bytes left in buffer!&lt;BR /&gt;[vs_0][ppak_0] bond0.901:i[44]: ONEWEB -&amp;gt; CHECKPOINT (UDP) len=96 id=19307&lt;BR /&gt;UDP: 500 -&amp;gt; 500&lt;BR /&gt;[vs_0][fw_0] bond0.901:i[44]: ONEWEB -&amp;gt; CHECKPOINT (UDP) len=96 id=19307&lt;BR /&gt;UDP: 500 -&amp;gt; 500&lt;BR /&gt;[vs_0][ppak_0] bond0.901:i[44]: ONEWEB -&amp;gt; CHECKPOINT (UDP) len=352 id=24226&lt;BR /&gt;UDP: 500 -&amp;gt; 500&lt;BR /&gt;[vs_0][fw_0] bond0.901:i[44]: ONEWEB -&amp;gt; CHECKPOINT (UDP) len=352 id=24226&lt;BR /&gt;UDP: 500 -&amp;gt; 500&lt;BR /&gt;[vs_0][fw_0] bond0.901:O[44]: CHECKPOINT -&amp;gt; ONEWEB (UDP) len=156 id=50371&lt;BR /&gt;UDP: 500 -&amp;gt; 500&lt;BR /&gt;[vs_0][ppak_0] bond0.901:i[44]: ONEWEB -&amp;gt; CHECKPOINT (UDP) len=332 id=31644&lt;BR /&gt;UDP: 500 -&amp;gt; 500&lt;BR /&gt;[vs_0][fw_0] bond0.901:i[44]: ONEWEB -&amp;gt; CHECKPOINT (UDP) len=332 id=31644&lt;BR /&gt;UDP: 500 -&amp;gt; 500&lt;BR /&gt;[vs_0][fw_0] bond0.901:O[44]: CHECKPOINT -&amp;gt; ONEWEB (UDP) len=260 id=50382&lt;BR /&gt;UDP: 500 -&amp;gt; 500&lt;BR /&gt;^C monitor: caught sig 2&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Nils&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 14 Nov 2023 07:57:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-problems-Clear-text-packet-should-be-encrypted/m-p/197892#M36980</guid>
      <dc:creator>NilsKS</dc:creator>
      <dc:date>2023-11-14T07:57:58Z</dc:date>
    </item>
    <item>
      <title>Re: VPN problems - Clear text packet should be encrypted</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-problems-Clear-text-packet-should-be-encrypted/m-p/197893#M36981</link>
      <description>&lt;P&gt;The filtering is wrong. You are looking to GW to GW IKE/IPsec traffic with this filter. In fact, you want to see the traffic which is cleartext while should be encrypted. Use the IP address from the drop VPN log to filter&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 14 Nov 2023 08:13:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-problems-Clear-text-packet-should-be-encrypted/m-p/197893#M36981</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2023-11-14T08:13:45Z</dc:date>
    </item>
    <item>
      <title>Re: VPN problems - Clear text packet should be encrypted</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-problems-Clear-text-packet-should-be-encrypted/m-p/197900#M36983</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is the traffic being blocked...&lt;/P&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Id: 0affff37-b5bb-e31d-6553-31c035650000&lt;BR /&gt;Marker: @A@@B@1699916401@C@8872156&lt;BR /&gt;Log Server Origin: x.x.x.x&lt;BR /&gt;Time: 2023-11-14T08:37:20Z&lt;BR /&gt;Interface Direction: inbound&lt;BR /&gt;Interface Name: bond0.901&lt;BR /&gt;Id Generated By Indexer:false&lt;BR /&gt;First: true&lt;BR /&gt;Sequencenum: 16&lt;BR /&gt;Log ID: 404822&lt;BR /&gt;Source: ONEWEB&lt;BR /&gt;Source Port: 4500&lt;BR /&gt;Destination: CHECKPOINT&lt;BR /&gt;Destination Port: 4500&lt;BR /&gt;IP Protocol: 17&lt;BR /&gt;Scheme: NA&lt;BR /&gt;Methods: ESP: AES-256 + SHA256&lt;BR /&gt;Encryption Failure: Clear text packet should be encrypted&lt;BR /&gt;VPN Feature: VPN&lt;BR /&gt;Action: Drop&lt;BR /&gt;Type: Connection&lt;BR /&gt;Policy Name: xxx&lt;BR /&gt;Policy Management: yyy&lt;BR /&gt;Db Tag: {9229EFFB-8C2B-F84A-B1B0-FAF838AF6345}&lt;BR /&gt;Policy Date: 2023-11-14T06:58:28Z&lt;BR /&gt;Blade: VPN&lt;BR /&gt;Origin: CHECKPOINT&lt;BR /&gt;Service: UDP/4500&lt;BR /&gt;Product Family: Access&lt;BR /&gt;Logid: 1&lt;BR /&gt;Interface: bond0.901&lt;BR /&gt;Description:&lt;/P&gt;</description>
      <pubDate>Tue, 14 Nov 2023 08:47:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-problems-Clear-text-packet-should-be-encrypted/m-p/197900#M36983</guid>
      <dc:creator>NilsKS</dc:creator>
      <dc:date>2023-11-14T08:47:33Z</dc:date>
    </item>
    <item>
      <title>Re: VPN problems - Clear text packet should be encrypted</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-problems-Clear-text-packet-should-be-encrypted/m-p/197923#M36997</link>
      <description>&lt;P&gt;What does it show in vpnd.elg when you filter for peer's external IP?&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Tue, 14 Nov 2023 13:27:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-problems-Clear-text-packet-should-be-encrypted/m-p/197923#M36997</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-11-14T13:27:12Z</dc:date>
    </item>
    <item>
      <title>Re: VPN problems - Clear text packet should be encrypted</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-problems-Clear-text-packet-should-be-encrypted/m-p/197932#M37004</link>
      <description>&lt;P&gt;That message is&amp;nbsp;&lt;EM&gt;&lt;STRONG&gt;always&lt;/STRONG&gt;&lt;/EM&gt; an encryption domain issue.&lt;/P&gt;
&lt;P&gt;What is the interoperable device's IPSec VPN &amp;gt; Link Selection set to?&lt;/P&gt;</description>
      <pubDate>Tue, 14 Nov 2023 15:50:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-problems-Clear-text-packet-should-be-encrypted/m-p/197932#M37004</guid>
      <dc:creator>Bob_Zimmerman</dc:creator>
      <dc:date>2023-11-14T15:50:10Z</dc:date>
    </item>
    <item>
      <title>Re: VPN problems - Clear text packet should be encrypted</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-problems-Clear-text-packet-should-be-encrypted/m-p/197940#M37006</link>
      <description>&lt;P&gt;You are 100% correct, but maybe not so obvious on their end until someone does the remote session to verify.&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/34744"&gt;@NilsKS&lt;/a&gt;&amp;nbsp;, did you work with TAC as of yet or no?&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Tue, 14 Nov 2023 17:55:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-problems-Clear-text-packet-should-be-encrypted/m-p/197940#M37006</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-11-14T17:55:15Z</dc:date>
    </item>
    <item>
      <title>Re: VPN problems - Clear text packet should be encrypted</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-problems-Clear-text-packet-should-be-encrypted/m-p/197966#M37012</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Link Selection: Always use this IP address: Main address.&lt;/P&gt;&lt;P&gt;Best,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Nils&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 15 Nov 2023 06:39:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-problems-Clear-text-packet-should-be-encrypted/m-p/197966#M37012</guid>
      <dc:creator>NilsKS</dc:creator>
      <dc:date>2023-11-15T06:39:14Z</dc:date>
    </item>
    <item>
      <title>Re: VPN problems - Clear text packet should be encrypted</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-problems-Clear-text-packet-should-be-encrypted/m-p/197967#M37013</link>
      <description>&lt;P&gt;No, I have not worked with TAC. I have contacted our Check Point vendor, but they have not come up with a solution.&lt;/P&gt;&lt;P&gt;Best,&lt;/P&gt;&lt;P&gt;Nils&lt;/P&gt;</description>
      <pubDate>Wed, 15 Nov 2023 09:11:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-problems-Clear-text-packet-should-be-encrypted/m-p/197967#M37013</guid>
      <dc:creator>NilsKS</dc:creator>
      <dc:date>2023-11-15T09:11:41Z</dc:date>
    </item>
    <item>
      <title>Re: VPN problems - Clear text packet should be encrypted</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-problems-Clear-text-packet-should-be-encrypted/m-p/197968#M37014</link>
      <description>&lt;P&gt;On the firewall module:&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;grep $ONEWEBIP $FWDIR/log/vpnd.elg*&lt;/P&gt;&lt;P&gt;Nothing...&lt;/P&gt;&lt;P&gt;Best,&lt;/P&gt;&lt;P&gt;Nils&lt;/P&gt;</description>
      <pubDate>Wed, 15 Nov 2023 06:58:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-problems-Clear-text-packet-should-be-encrypted/m-p/197968#M37014</guid>
      <dc:creator>NilsKS</dc:creator>
      <dc:date>2023-11-15T06:58:30Z</dc:date>
    </item>
    <item>
      <title>Re: VPN problems - Clear text packet should be encrypted</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-problems-Clear-text-packet-should-be-encrypted/m-p/198006#M37025</link>
      <description>&lt;P&gt;And which one is the main IP address?&lt;/P&gt;
&lt;P&gt;You should probably use the private address as the main IP address on the object, set Link Selection to use a statically NATed address, and specify the public address there.&lt;/P&gt;</description>
      <pubDate>Wed, 15 Nov 2023 14:03:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-problems-Clear-text-packet-should-be-encrypted/m-p/198006#M37025</guid>
      <dc:creator>Bob_Zimmerman</dc:creator>
      <dc:date>2023-11-15T14:03:56Z</dc:date>
    </item>
    <item>
      <title>Re: VPN problems - Clear text packet should be encrypted</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-problems-Clear-text-packet-should-be-encrypted/m-p/198007#M37026</link>
      <description>&lt;P&gt;IP for ASA external interface is 192.168.200.10.&lt;BR /&gt;I have tried to set this as the IP for the interoperable object and configured the IP on the modem via Link Selection &amp;gt; Always use this IP address &amp;gt; Statically NATed IP, but this did not work. I do not see any traffic from either of these IP-addresses in the logs.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best,&lt;/P&gt;&lt;P&gt;Nils&lt;/P&gt;</description>
      <pubDate>Wed, 15 Nov 2023 14:33:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-problems-Clear-text-packet-should-be-encrypted/m-p/198007#M37026</guid>
      <dc:creator>NilsKS</dc:creator>
      <dc:date>2023-11-15T14:33:44Z</dc:date>
    </item>
    <item>
      <title>Re: VPN problems - Clear text packet should be encrypted</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-problems-Clear-text-packet-should-be-encrypted/m-p/198008#M37027</link>
      <description>&lt;P&gt;What do they see on Cisco side? Here is simple debug guy I used to work with few years ago gave me (he worked for Cisco TAC in India)&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;debug vpn:&lt;/P&gt;
&lt;P&gt;debug crypto condition peer x.x.x.x&lt;/P&gt;
&lt;P&gt;debug crypto ikev1 200 (or v2, whichever is used)&lt;/P&gt;
&lt;P&gt;debug crypto ipsec 200&lt;/P&gt;
&lt;P&gt;to cancel all debugs-&amp;gt; undebug all&lt;/P&gt;</description>
      <pubDate>Wed, 15 Nov 2023 14:47:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-problems-Clear-text-packet-should-be-encrypted/m-p/198008#M37027</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-11-15T14:47:03Z</dc:date>
    </item>
    <item>
      <title>Re: VPN problems - Clear text packet should be encrypted</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-problems-Clear-text-packet-should-be-encrypted/m-p/198145#M37054</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Finally got access to the ASA again...&lt;/P&gt;&lt;P&gt;Output from debug commands that produced output attached.&lt;/P&gt;&lt;P&gt;Best,&lt;/P&gt;&lt;P&gt;Nils&lt;/P&gt;</description>
      <pubDate>Thu, 16 Nov 2023 13:19:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-problems-Clear-text-packet-should-be-encrypted/m-p/198145#M37054</guid>
      <dc:creator>NilsKS</dc:creator>
      <dc:date>2023-11-16T13:19:10Z</dc:date>
    </item>
    <item>
      <title>Re: VPN problems - Clear text packet should be encrypted</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-problems-Clear-text-packet-should-be-encrypted/m-p/198148#M37056</link>
      <description>&lt;P&gt;If I remember right, crypto map on Cisco refers to phase 2 and debug shows it all matching, so logically, seems like something on CP is no "agreeing" with Cisco side.&lt;/P&gt;
&lt;P&gt;Can you verify 100% that vpn domain on CP side indeed includes eveything thats supposed to go through the tunnel? I mean, everything needed behind the CP firewall.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Thu, 16 Nov 2023 13:28:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-problems-Clear-text-packet-should-be-encrypted/m-p/198148#M37056</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-11-16T13:28:05Z</dc:date>
    </item>
    <item>
      <title>Re: VPN problems - Clear text packet should be encrypted</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-problems-Clear-text-packet-should-be-encrypted/m-p/198155#M37057</link>
      <description>&lt;P&gt;Hi!&lt;/P&gt;&lt;P&gt;Thanks for still being in the loop on this one! Much appreciated!&lt;/P&gt;&lt;P&gt;The VPN domain for the center gateway (Check Point) is the same as for our 10+ other VPN installations using Cisco ASA. It contains all the networks defined on the enc. domain on the ASA.&lt;/P&gt;&lt;P&gt;The VPN domain for the satellite gateway (the ASA) is the internal 172.22.154.128/27 network on the ASA.&lt;/P&gt;&lt;P&gt;I am not able to find any anomalies with this.&lt;/P&gt;&lt;P&gt;Best,&lt;/P&gt;&lt;P&gt;Nils&lt;/P&gt;</description>
      <pubDate>Thu, 16 Nov 2023 13:55:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-problems-Clear-text-packet-should-be-encrypted/m-p/198155#M37057</guid>
      <dc:creator>NilsKS</dc:creator>
      <dc:date>2023-11-16T13:55:02Z</dc:date>
    </item>
    <item>
      <title>Re: VPN problems - Clear text packet should be encrypted</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-problems-Clear-text-packet-should-be-encrypted/m-p/198230#M37069</link>
      <description>&lt;P&gt;Found the solution!&lt;/P&gt;&lt;P&gt;UDP4500 IKE_NAT_TRAVERSAL had to be added to 'Excluded Services' for the VPN community...&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="NilsKS_0-1700205315371.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23280i62A0D91B746A67B5/image-size/medium?v=v2&amp;amp;px=400" role="button" title="NilsKS_0-1700205315371.png" alt="NilsKS_0-1700205315371.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;A big thanks to all that took time to help!!&lt;/P&gt;&lt;P&gt;Best,&lt;/P&gt;&lt;P&gt;Nils&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 17 Nov 2023 07:15:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-problems-Clear-text-packet-should-be-encrypted/m-p/198230#M37069</guid>
      <dc:creator>NilsKS</dc:creator>
      <dc:date>2023-11-17T07:15:46Z</dc:date>
    </item>
  </channel>
</rss>

