<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Azure to On-Prem VPN policy change while VPN is down in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Azure-to-On-Prem-VPN-policy-change-while-VPN-is-down/m-p/201729#M37960</link>
    <description>&lt;P&gt;Odd you had to do that to fix the problem, but hey, as long as it works ; - )&lt;/P&gt;
&lt;P&gt;Thanks for the update.&lt;/P&gt;
&lt;P&gt;Best,&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
    <pubDate>Thu, 28 Dec 2023 17:59:02 GMT</pubDate>
    <dc:creator>the_rock</dc:creator>
    <dc:date>2023-12-28T17:59:02Z</dc:date>
    <item>
      <title>Azure to On-Prem VPN policy change while VPN is down</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Azure-to-On-Prem-VPN-policy-change-while-VPN-is-down/m-p/201654#M37931</link>
      <description>&lt;P&gt;I am currently testing CloudGuard Network.&amp;nbsp; Previously I have a working Site-2-Site VPN working to my on-premises 6700.&amp;nbsp; Both were managed by the same Management server (again on-prem).&lt;BR /&gt;&lt;BR /&gt;Today I unfortunately had to change the External IP of my 6700 due to ISP requirements.&amp;nbsp;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;I am seeing that the 6700 is still using the old external IP which of course is failing:&lt;BR /&gt;&lt;SPAN&gt;# tcpdump -nni any host 20.151.201.XX and port 4500 tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on any, link-type LINUX_SLL (Linux cooked), capture size 262144 bytes&lt;BR /&gt;14:54:41.350998 IP 64.114.54.YY.4500 &amp;gt; 20.151.201.XX.4500: UDP-encap: ESP(spi=0x03270274,seq=0x163), length 100 14:54:41.351001 ethertype IPv4, IP 64.114.54.YY.4500 &amp;gt; 20.151.201.XX.4500: UDP-encap: ESP(spi=0x03270274,seq=0x163), length 100&lt;BR /&gt;14:54:41.550805 IP 64.114.54.YY.4500 &amp;gt; 20.151.201.XX.4500: UDP-encap: ESP(spi=0x03270274,seq=0x164), length 100 14:54:41.550807 ethertype IPv4, IP 64.114.54.YY.4500 &amp;gt; 20.151.201.XX.4500: UDP-encap: ESP(spi=0x03270274,seq=0x164), length 100&lt;BR /&gt;14:54:41.924931 IP 64.114.54.YY.4500 &amp;gt; 20.151.201.XX.4500: UDP-encap: ESP(spi=0x03270274,seq=0x165), length 100 14:54:41.924933 ethertype IPv4, IP 64.114.54.YY.4500 &amp;gt; 20.151.201.XX.4500: UDP-encap: ESP(spi=0x03270274,seq=0x165), length 100&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;The only way I have fixed this previously is to push a new policy, which I can't do with the policy down.&lt;BR /&gt;&lt;BR /&gt;My next thought is to attach a new temp public IP to the backend vnet, but I think the policy will block that too.&lt;BR /&gt;I do have a case open with Support, but thought I would try here as well.&lt;BR /&gt;&lt;BR /&gt;Anything else I can try?&lt;/P&gt;</description>
      <pubDate>Thu, 28 Dec 2023 00:27:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Azure-to-On-Prem-VPN-policy-change-while-VPN-is-down/m-p/201654#M37931</guid>
      <dc:creator>Graham1</dc:creator>
      <dc:date>2023-12-28T00:27:30Z</dc:date>
    </item>
    <item>
      <title>Re: Azure to On-Prem VPN policy change while VPN is down</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Azure-to-On-Prem-VPN-policy-change-while-VPN-is-down/m-p/201660#M37937</link>
      <description>&lt;P&gt;If you are indeed testing I would suggest building the scenario so that Management traffic isn't via the VPN where possible.&lt;/P&gt;
&lt;P&gt;Refer also&amp;nbsp;&lt;SPAN&gt;sk104582.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 28 Dec 2023 03:14:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Azure-to-On-Prem-VPN-policy-change-while-VPN-is-down/m-p/201660#M37937</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2023-12-28T03:14:10Z</dc:date>
    </item>
    <item>
      <title>Re: Azure to On-Prem VPN policy change while VPN is down</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Azure-to-On-Prem-VPN-policy-change-while-VPN-is-down/m-p/201661#M37938</link>
      <description>&lt;P&gt;Your last comment about backend vnet makes sense to me.&lt;/P&gt;
&lt;P&gt;Best,&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Thu, 28 Dec 2023 05:09:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Azure-to-On-Prem-VPN-policy-change-while-VPN-is-down/m-p/201661#M37938</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-12-28T05:09:37Z</dc:date>
    </item>
    <item>
      <title>Re: Azure to On-Prem VPN policy change while VPN is down</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Azure-to-On-Prem-VPN-policy-change-while-VPN-is-down/m-p/201726#M37958</link>
      <description>&lt;P&gt;Anytime you change the management IP (as the gateway sees it), you need to push a new policy.&lt;BR /&gt;On the gateway, you can do an fw unloadlocal, which unloads the existing security policy and should allow this.&lt;/P&gt;</description>
      <pubDate>Thu, 28 Dec 2023 17:35:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Azure-to-On-Prem-VPN-policy-change-while-VPN-is-down/m-p/201726#M37958</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2023-12-28T17:35:12Z</dc:date>
    </item>
    <item>
      <title>Re: Azure to On-Prem VPN policy change while VPN is down</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Azure-to-On-Prem-VPN-policy-change-while-VPN-is-down/m-p/201728#M37959</link>
      <description>&lt;P&gt;Thanks for the replies everyone.&amp;nbsp; This was really strange one for me since I was seeing both ends of the VPN still trying to use the old IP of the on-prem GW, even though I updated the IPSEC VPN link selection (manual to external IP).&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;I spent some time with Support last night and they couldn't resolve the issue either and the next step was going to be upgrade from R81.10 take 66 to take 130.&amp;nbsp; I did see that there are many VPN fixes in the versions between, but I only get yearly&amp;nbsp; maintenance windows, unless emergencies occur.&amp;nbsp;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;I had pushed multiple polices for both ends since it is centrally&amp;nbsp; managed, but no luck.&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;Finally the fix:&amp;nbsp;&lt;/STRONG&gt; remove GWs from the VPN community, install policy, re-add GWs to community and&amp;nbsp;install policy again.&lt;/P&gt;</description>
      <pubDate>Thu, 28 Dec 2023 17:56:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Azure-to-On-Prem-VPN-policy-change-while-VPN-is-down/m-p/201728#M37959</guid>
      <dc:creator>Graham1</dc:creator>
      <dc:date>2023-12-28T17:56:28Z</dc:date>
    </item>
    <item>
      <title>Re: Azure to On-Prem VPN policy change while VPN is down</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Azure-to-On-Prem-VPN-policy-change-while-VPN-is-down/m-p/201729#M37960</link>
      <description>&lt;P&gt;Odd you had to do that to fix the problem, but hey, as long as it works ; - )&lt;/P&gt;
&lt;P&gt;Thanks for the update.&lt;/P&gt;
&lt;P&gt;Best,&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Thu, 28 Dec 2023 17:59:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Azure-to-On-Prem-VPN-policy-change-while-VPN-is-down/m-p/201729#M37960</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-12-28T17:59:02Z</dc:date>
    </item>
  </channel>
</rss>

