<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to deeply delete any IKE/IPsec information linked to a Peer in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-deeply-delete-any-IKE-IPsec-information-linked-to-a-Peer/m-p/203543#M38360</link>
    <description>&lt;P&gt;the problem is getting critical with other customer&lt;/P&gt;
&lt;P&gt;we converted a problematic vpn policy based in vpn route based. Despite the tunnel was resetted, "No outbound SA" still there and i clearly see with my eyes on ASA side that check point keep tried to negotiate some subnets !!&amp;nbsp;&lt;/P&gt;
&lt;P&gt;At that time we was on route-based, so empty group + one vpn per gateway pair&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Need absolutely to underestand how to clean that f****g cache&lt;/P&gt;</description>
    <pubDate>Thu, 18 Jan 2024 19:42:17 GMT</pubDate>
    <dc:creator>CheckPointerXL</dc:creator>
    <dc:date>2024-01-18T19:42:17Z</dc:date>
    <item>
      <title>How to deeply delete any IKE/IPsec information linked to a Peer</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-deeply-delete-any-IKE-IPsec-information-linked-to-a-Peer/m-p/184674#M33921</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;
&lt;P&gt;today i tried to move, on customer side, a VPN with thirdy-party from their Cisco to their Check point, scenario:&lt;/P&gt;
&lt;P&gt;Move from: &lt;STRONG&gt;Third Party&lt;/STRONG&gt;---&lt;EM&gt;VPN&lt;/EM&gt;---&lt;STRONG&gt;Cisco&lt;/STRONG&gt;---&lt;EM&gt;clear traffic&lt;/EM&gt;--&lt;STRONG&gt;CheckPoint&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Move to: &lt;STRONG&gt;Third Party&lt;/STRONG&gt;---&lt;EM&gt;VPN&lt;/EM&gt;---&lt;STRONG&gt;CheckPoint&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Spent hours in troubleshooting, then we decided to rollback from check point to Cisco, but some traffic continued to not work.... so i discovered that a lot of test was probably invalidate by the following behavoir:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;when rollback was decided, i removed on mgmt the CheckPoint gateway from the community, disabled all rules... basically deleted everything, only Community with remote peer left on management.&lt;/P&gt;
&lt;P&gt;Installed, vpn tunnel down on CheckPoint and UP again with cisco, but still some traffic, originated behind check point and routed to the Cisco for encryption, was not working.&lt;/P&gt;
&lt;P&gt;On FW, after tunnel disruption was done, i&amp;nbsp; continued to have the following output despite Community was destroyed:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="vpntu.JPG" style="width: 734px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/21517i140535DA9003D586/image-dimensions/734x132?v=v2" width="734" height="132" role="button" title="vpntu.JPG" alt="vpntu.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Not working traffic by fw ctl zdebug + drop | grep IPnotResponding:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Cattura.JPG" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/21514iFED21A7A61C598C1/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Cattura.JPG" alt="Cattura.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Then, roughly after 1 hour, &lt;U&gt;when the above SA with "No outbound SA" disappeared&lt;/U&gt;, &lt;U&gt;no more drop&lt;/U&gt; on zdebug and &lt;U&gt;traffic started to work again&lt;/U&gt;. &lt;EM&gt;But now i don't wanna know WHY this behavoir... (but it should be discussed too i think...)&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;i'm pretty sure the same behavoir created to me a lot of problem in the past, especially during a change in configuration on P2.&lt;/P&gt;
&lt;P&gt;So i'm going to the question, vpn tu (7) seems to not work properly for such cases,&lt;U&gt; &lt;STRONG&gt;how can i DEEPLY clear any IKE/IPSec SA associated to a vpn?&lt;/STRONG&gt;&lt;/U&gt; i tried to find a way to delete the MSA/MSPI by his identifier but no luck, any suggestion ???&lt;/P&gt;
&lt;DIV id="gtx-trans" style="position: absolute; left: 377px; top: 935.375px;"&gt;
&lt;DIV class="gtx-trans-icon"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/DIV&gt;</description>
      <pubDate>Fri, 23 Jun 2023 18:18:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-deeply-delete-any-IKE-IPsec-information-linked-to-a-Peer/m-p/184674#M33921</guid>
      <dc:creator>CheckPointerXL</dc:creator>
      <dc:date>2023-06-23T18:18:33Z</dc:date>
    </item>
    <item>
      <title>Re: How to deeply delete any IKE/IPsec information linked to a Peer</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-deeply-delete-any-IKE-IPsec-information-linked-to-a-Peer/m-p/184675#M33922</link>
      <description>&lt;P&gt;Good question...I checked with vpn tu tlist -h command, but cant see option for delete. I also typed vpn and when you hit enter, it gives bunch of stuff, but nothing really similar to what you need. Lets see if someone else may know.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Fri, 23 Jun 2023 17:47:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-deeply-delete-any-IKE-IPsec-information-linked-to-a-Peer/m-p/184675#M33922</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-06-23T17:47:42Z</dc:date>
    </item>
    <item>
      <title>Re: How to deeply delete any IKE/IPsec information linked to a Peer</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-deeply-delete-any-IKE-IPsec-information-linked-to-a-Peer/m-p/184676#M33923</link>
      <description>&lt;P&gt;As &lt;A href="https://community.checkpoint.com/t5/Scripts/One-liner-to-show-VPN-S2S-tunnels-on-gateway/m-p/150205#M962" target="_self"&gt;this tool&lt;/A&gt;&amp;nbsp;of mine shows, &lt;CODE&gt;vpn tu del PEER_IP&lt;/CODE&gt; might help.&lt;/P&gt;</description>
      <pubDate>Fri, 23 Jun 2023 17:52:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-deeply-delete-any-IKE-IPsec-information-linked-to-a-Peer/m-p/184676#M33923</guid>
      <dc:creator>Danny</dc:creator>
      <dc:date>2023-06-23T17:52:59Z</dc:date>
    </item>
    <item>
      <title>Re: How to deeply delete any IKE/IPsec information linked to a Peer</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-deeply-delete-any-IKE-IPsec-information-linked-to-a-Peer/m-p/184677#M33924</link>
      <description>&lt;P&gt;hi danny, i'm not sure but i think that vpn tu del PEER_IP is a "shortcut" to the option 5 on vpn tu... and option 5 is a "lighter" version of option 7 (it preserve IKE SA)....so it should not help&lt;/P&gt;</description>
      <pubDate>Fri, 23 Jun 2023 17:56:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-deeply-delete-any-IKE-IPsec-information-linked-to-a-Peer/m-p/184677#M33924</guid>
      <dc:creator>CheckPointerXL</dc:creator>
      <dc:date>2023-06-23T17:56:32Z</dc:date>
    </item>
    <item>
      <title>Re: How to deeply delete any IKE/IPsec information linked to a Peer</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-deeply-delete-any-IKE-IPsec-information-linked-to-a-Peer/m-p/184678#M33925</link>
      <description>&lt;P&gt;anyway, I THINK that any attempt to delete the SA it will fail because in such cases, there is "NO outbound SA" and here&amp;nbsp; we are trying to delete an MSA/MSPI, that is something different:&lt;/P&gt;
&lt;UL type="disc"&gt;
&lt;LI&gt;
&lt;P&gt;&lt;FONT size="2"&gt;&lt;EM&gt;&lt;STRONG&gt;MSA&lt;/STRONG&gt;&lt;/EM&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;- "Meta SA".&lt;/FONT&gt;&lt;/P&gt;
&lt;UL type="circle"&gt;
&lt;LI&gt;&lt;FONT size="2"&gt;Contains:&lt;/FONT&gt;&lt;BR /&gt;
&lt;UL type="square"&gt;
&lt;LI&gt;&lt;FONT size="2"&gt;Methods&lt;/FONT&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;FONT size="2"&gt;Encapsulation scheme (ESP, AH, UDP)&lt;/FONT&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;FONT size="2"&gt;Encryption algorithm&lt;/FONT&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;FONT size="2"&gt;Data integrity algorithm&lt;/FONT&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;FONT size="2"&gt;Peer identity&lt;/FONT&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;FONT size="2"&gt;Peer address&lt;/FONT&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;FONT size="2"&gt;User name (for Remote Access client)&lt;/FONT&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;FONT size="2"&gt;&lt;U&gt;&lt;STRONG&gt;Intended use (IPsec IDs)&lt;/STRONG&gt;&lt;/U&gt;&lt;/FONT&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;FONT size="2"&gt;Access to Current usable SA (outbound only)&lt;/FONT&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;FONT size="2"&gt;MSA is bi-directional.&lt;/FONT&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;FONT size="2"&gt;Inbound SAs point to the MSA.&lt;/FONT&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;FONT size="2"&gt;The MSA points to an outbound SA.&lt;/FONT&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;FONT size="2"&gt;When SAs are rekeyed and replaced, the MSA is not. It is just updated.&lt;/FONT&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;FONT size="2"&gt;An encrypted connection is marked with an MSPI (handle for the MSA).&lt;/FONT&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;FONT size="2"&gt;&lt;EM&gt;&lt;STRONG&gt;MSPI&lt;/STRONG&gt;&lt;/EM&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;- "Meta SPI" = peer + methods + IDs.&lt;/FONT&gt;&lt;/P&gt;
&lt;UL type="circle"&gt;
&lt;LI&gt;&lt;FONT size="2"&gt;MSPI is not a standard concept and exists only in Check Point VPN kernel.&lt;/FONT&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;FONT size="2"&gt;MSPI is actually a tunnel identifier. It is a local counter that uniquely identifies a tunnel on the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;EM&gt;given&lt;/EM&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;machine.&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;In cluster topology it needs to be translated from the MSPI of peer cluster member to the local MSPI.&lt;/FONT&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;FONT size="2"&gt;MSPI is an index to the MSA (Meta SA), which contains fields common to all SAs with the same peer, methods, IDs, where:&lt;/FONT&gt;&lt;BR /&gt;
&lt;UL type="square"&gt;
&lt;LI&gt;&lt;FONT size="2"&gt;Peer - peer gateway IP address&lt;/FONT&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;FONT size="2"&gt;Methods - per rule (community) parameters&lt;/FONT&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;FONT size="2"&gt;IDs - client/server or their containing subnets&lt;/FONT&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;FONT size="2"&gt;When a new IPsec tunnel is established, a new MSPI is created by, it get the next free MSPI number, and the MSPI counter is increased.&lt;/FONT&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;FONT size="2"&gt;When an IPsec tunnel is closed, the MSPI counter is decreased.&lt;/FONT&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;that is probably the root cause of the trafffic problem, but, coming back to the thread question, this is why any attempt to delete that entry will fail with any "delete SA" command.... of course these are only my assumptions, need a vpn king here to be sure &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV id="gtx-trans" style="position: absolute; left: 731px; top: 873.125px;"&gt;
&lt;DIV class="gtx-trans-icon"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/DIV&gt;</description>
      <pubDate>Fri, 23 Jun 2023 18:20:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-deeply-delete-any-IKE-IPsec-information-linked-to-a-Peer/m-p/184678#M33925</guid>
      <dc:creator>CheckPointerXL</dc:creator>
      <dc:date>2023-06-23T18:20:44Z</dc:date>
    </item>
    <item>
      <title>Re: How to deeply delete any IKE/IPsec information linked to a Peer</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-deeply-delete-any-IKE-IPsec-information-linked-to-a-Peer/m-p/184683#M33927</link>
      <description>&lt;P&gt;Clearly this information is stored in one or more table entries.&lt;BR /&gt;The trick is figuring out which one (using fw tab).&lt;BR /&gt;From there, you can delete the entries with fw tab -x (I believe).&lt;/P&gt;</description>
      <pubDate>Fri, 23 Jun 2023 19:04:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-deeply-delete-any-IKE-IPsec-information-linked-to-a-Peer/m-p/184683#M33927</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2023-06-23T19:04:57Z</dc:date>
    </item>
    <item>
      <title>Re: How to deeply delete any IKE/IPsec information linked to a Peer</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-deeply-delete-any-IKE-IPsec-information-linked-to-a-Peer/m-p/184685#M33928</link>
      <description>&lt;P&gt;vpn tu (option 7) works perfectly fine in case both peers are Check Point gateways while the "vpn tu" command is executed AT THE SAME TIME on both Check Point peers.&lt;/P&gt;
&lt;P&gt;Another option can be to use SAM rule on Check Point gateway to reject connection to/from peer.&lt;/P&gt;</description>
      <pubDate>Fri, 23 Jun 2023 20:02:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-deeply-delete-any-IKE-IPsec-information-linked-to-a-Peer/m-p/184685#M33928</guid>
      <dc:creator>JozkoMrkvicka</dc:creator>
      <dc:date>2023-06-23T20:02:38Z</dc:date>
    </item>
    <item>
      <title>Re: How to deeply delete any IKE/IPsec information linked to a Peer</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-deeply-delete-any-IKE-IPsec-information-linked-to-a-Peer/m-p/184696#M33934</link>
      <description>&lt;P&gt;Hello Phoneboy,&lt;/P&gt;&lt;P&gt;Don't you think there should be an easier way to do this?&lt;BR /&gt;Having traffic outages after deleting all related VPN configuration because the CP firewall still has some entries in some tables that you need to dig deep and if lucky you may find it(probably not)..&amp;nbsp;&lt;/P&gt;&lt;P&gt;CP needs to understand that customers are getting less and less tolerant to this kind of quirks..&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 24 Jun 2023 12:33:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-deeply-delete-any-IKE-IPsec-information-linked-to-a-Peer/m-p/184696#M33934</guid>
      <dc:creator>anstelios</dc:creator>
      <dc:date>2023-06-24T12:33:00Z</dc:date>
    </item>
    <item>
      <title>Re: How to deeply delete any IKE/IPsec information linked to a Peer</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-deeply-delete-any-IKE-IPsec-information-linked-to-a-Peer/m-p/184697#M33935</link>
      <description>&lt;P&gt;100% agree&lt;/P&gt;
&lt;P&gt;Not only customers, administrators like us too...&lt;/P&gt;</description>
      <pubDate>Sat, 24 Jun 2023 12:36:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-deeply-delete-any-IKE-IPsec-information-linked-to-a-Peer/m-p/184697#M33935</guid>
      <dc:creator>CheckPointerXL</dc:creator>
      <dc:date>2023-06-24T12:36:47Z</dc:date>
    </item>
    <item>
      <title>Re: How to deeply delete any IKE/IPsec information linked to a Peer</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-deeply-delete-any-IKE-IPsec-information-linked-to-a-Peer/m-p/184821#M33972</link>
      <description>&lt;P&gt;It's possible this particular issue is not known or not encountered often enough.&lt;BR /&gt;However, I tend to think vpn tu should either offer an option for this or do it as part of one of the existing options.&lt;BR /&gt;I'll ask around.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I believe the correct table to find this in (per&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/sk/sk104760" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk104760&lt;/A&gt;) is called meta_sas.&lt;BR /&gt;You can use fw tab -x to delete the relevant entry in the connections table.&lt;BR /&gt;Other tables are also listed there.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 26 Jun 2023 16:50:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-deeply-delete-any-IKE-IPsec-information-linked-to-a-Peer/m-p/184821#M33972</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2023-06-26T16:50:18Z</dc:date>
    </item>
    <item>
      <title>Re: How to deeply delete any IKE/IPsec information linked to a Peer</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-deeply-delete-any-IKE-IPsec-information-linked-to-a-Peer/m-p/203543#M38360</link>
      <description>&lt;P&gt;the problem is getting critical with other customer&lt;/P&gt;
&lt;P&gt;we converted a problematic vpn policy based in vpn route based. Despite the tunnel was resetted, "No outbound SA" still there and i clearly see with my eyes on ASA side that check point keep tried to negotiate some subnets !!&amp;nbsp;&lt;/P&gt;
&lt;P&gt;At that time we was on route-based, so empty group + one vpn per gateway pair&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Need absolutely to underestand how to clean that f****g cache&lt;/P&gt;</description>
      <pubDate>Thu, 18 Jan 2024 19:42:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-deeply-delete-any-IKE-IPsec-information-linked-to-a-Peer/m-p/203543#M38360</guid>
      <dc:creator>CheckPointerXL</dc:creator>
      <dc:date>2024-01-18T19:42:17Z</dc:date>
    </item>
    <item>
      <title>Re: How to deeply delete any IKE/IPsec information linked to a Peer</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-deeply-delete-any-IKE-IPsec-information-linked-to-a-Peer/m-p/203589#M38369</link>
      <description>&lt;P&gt;How can i clean all that P1 entries for a VPN Peer?&lt;/P&gt;
&lt;DIV id="tinyMceEditor_4dc339e2ccfbf5CheckPointerXL_1" class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 212px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/24137iBA8C780A5587551C/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;DIV id="tinyMceEditor_4dc339e2ccfbf5CheckPointerXL_0" class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;P&gt;tried: vpn tu (7), vpn accel off, removed gateway from community for 10minutes....&lt;/P&gt;</description>
      <pubDate>Fri, 19 Jan 2024 07:34:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-deeply-delete-any-IKE-IPsec-information-linked-to-a-Peer/m-p/203589#M38369</guid>
      <dc:creator>CheckPointerXL</dc:creator>
      <dc:date>2024-01-19T07:34:35Z</dc:date>
    </item>
    <item>
      <title>Re: How to deeply delete any IKE/IPsec information linked to a Peer</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-deeply-delete-any-IKE-IPsec-information-linked-to-a-Peer/m-p/204098#M38497</link>
      <description>&lt;P&gt;When I asked about this problem previously, I was told that this issue needs to be handled via the TAC.&lt;BR /&gt;It is likely some sort of bug that is causing this.&lt;/P&gt;</description>
      <pubDate>Wed, 24 Jan 2024 22:35:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-deeply-delete-any-IKE-IPsec-information-linked-to-a-Peer/m-p/204098#M38497</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-01-24T22:35:48Z</dc:date>
    </item>
    <item>
      <title>Re: How to deeply delete any IKE/IPsec information linked to a Peer</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-deeply-delete-any-IKE-IPsec-information-linked-to-a-Peer/m-p/204251#M38526</link>
      <description>&lt;P&gt;I'd suspect that the withdrawal of IKE negotiation duties from vpnd and re-implementation of that into the new iked daemon in R81.10+ may have something to do with these problems, and this transition may have broken something in how &lt;STRONG&gt;vpn tu&lt;/STRONG&gt; interacts with it.&amp;nbsp; Something perhaps for R&amp;amp;D to look into.&amp;nbsp;&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/54489"&gt;@CheckPointerXL&lt;/a&gt;&amp;nbsp;I assume you are running at least R81.10 and iked is running on your gateway?&lt;/P&gt;</description>
      <pubDate>Fri, 26 Jan 2024 14:00:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-deeply-delete-any-IKE-IPsec-information-linked-to-a-Peer/m-p/204251#M38526</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2024-01-26T14:00:53Z</dc:date>
    </item>
    <item>
      <title>Re: How to deeply delete any IKE/IPsec information linked to a Peer</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-deeply-delete-any-IKE-IPsec-information-linked-to-a-Peer/m-p/204294#M38527</link>
      <description>&lt;P&gt;correct, it seems that compulsively doing vpn tu-&amp;gt;optin 7-ip peer it works.... maybe it's a case, but it worked last two times (only for Phase2)&lt;/P&gt;</description>
      <pubDate>Fri, 26 Jan 2024 16:59:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-deeply-delete-any-IKE-IPsec-information-linked-to-a-Peer/m-p/204294#M38527</guid>
      <dc:creator>CheckPointerXL</dc:creator>
      <dc:date>2024-01-26T16:59:34Z</dc:date>
    </item>
  </channel>
</rss>

