<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: VPN with 3rdparty in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-with-3rdparty/m-p/210042#M39799</link>
    <description>&lt;P&gt;I would do quick debug on CP side to see what it shows. Get iked and vpnd files from $FWDIR/log dir and run vpn iked calculate peer_ip_address to see which iked files are relevant&lt;/P&gt;
&lt;P&gt;vpn debug trunc&lt;/P&gt;
&lt;P&gt;vpn debug ikeon&lt;/P&gt;
&lt;P&gt;-try generate some traffic&lt;/P&gt;
&lt;P&gt;vpndebug ikeoff&lt;/P&gt;
&lt;P&gt;Best,&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
    <pubDate>Sat, 30 Mar 2024 02:54:00 GMT</pubDate>
    <dc:creator>the_rock</dc:creator>
    <dc:date>2024-03-30T02:54:00Z</dc:date>
    <item>
      <title>VPN with 3rdparty</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-with-3rdparty/m-p/210037#M39795</link>
      <description>&lt;P&gt;Hello community,&lt;/P&gt;&lt;P&gt;i have an issue on my configuration of vpn ipsec with 3rd party ( juniper), let me explain:&lt;/P&gt;&lt;P&gt;i created a vpn betwenn my cluster ( R80.40) and a remote Juniper Gateway.&lt;/P&gt;&lt;P&gt;traffic from juniper side to network behind my cluster CP is ok.&lt;/P&gt;&lt;P&gt;traffic from my to network to remote network is KO.&lt;/P&gt;&lt;P&gt;the configuration of my VPN domain:&amp;nbsp;&amp;nbsp; local 10.167.52.0/24 and remote 10.167.200.0/24&lt;/P&gt;&lt;P&gt;the same proxy id are configured on the juniper side.&lt;/P&gt;&lt;P&gt;tunnel management: one vpn tunnel per subnet pair&lt;/P&gt;&lt;P&gt;when investigating i find that ikep2 is ko ( CP to juniper)&lt;/P&gt;&lt;P&gt;on the juniper; &lt;SPAN&gt;&lt;SPAN class=""&gt;IPSec negotiation failed with error: Peer proposed traffic-selectors are not in configured range&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;on the cp: Child SA exchange: Received notification from peer: Traffic selectors unacceptable MyTSi: &amp;lt;10.167.0.0 - 10.167.255.255&amp;gt; MyTSr: &amp;lt;10.167.200.0 - 10.167.200.255&amp;gt;&lt;/P&gt;&lt;P&gt;This is due to supernetting, i assume. i made change as described on other discussion:&lt;/P&gt;&lt;P&gt;Guidbedit values to change to FALSE:&lt;/P&gt;&lt;P&gt;ike_enable_supernet&lt;/P&gt;&lt;P&gt;ike_p2_enable_supernet_from_R80.20&lt;/P&gt;&lt;P&gt;ike_use_largest_possible_subnets&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;but my cp gateway still send /16 instead of /24&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;can someone help on this?&lt;/P&gt;</description>
      <pubDate>Sat, 30 Mar 2024 01:07:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-with-3rdparty/m-p/210037#M39795</guid>
      <dc:creator>SkipperNavy</dc:creator>
      <dc:date>2024-03-30T01:07:31Z</dc:date>
    </item>
    <item>
      <title>Re: VPN with 3rdparty</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-with-3rdparty/m-p/210038#M39796</link>
      <description>&lt;P&gt;Did you install policy after making those guidbedit changes?&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Sat, 30 Mar 2024 01:24:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-with-3rdparty/m-p/210038#M39796</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-03-30T01:24:49Z</dc:date>
    </item>
    <item>
      <title>Re: VPN with 3rdparty</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-with-3rdparty/m-p/210039#M39797</link>
      <description>&lt;P&gt;Yes, i saved, the installed the policy.&lt;/P&gt;&lt;P&gt;i also tried to force the /24 via user.def.fw1 but still ko.&lt;/P&gt;&lt;P&gt;so i roll back the user.def.fw1&lt;/P&gt;</description>
      <pubDate>Sat, 30 Mar 2024 01:44:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-with-3rdparty/m-p/210039#M39797</guid>
      <dc:creator>SkipperNavy</dc:creator>
      <dc:date>2024-03-30T01:44:19Z</dc:date>
    </item>
    <item>
      <title>Re: VPN with 3rdparty</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-with-3rdparty/m-p/210040#M39798</link>
      <description>&lt;P&gt;Is there any natting inside the community?&lt;/P&gt;</description>
      <pubDate>Sat, 30 Mar 2024 01:51:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-with-3rdparty/m-p/210040#M39798</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-03-30T01:51:05Z</dc:date>
    </item>
    <item>
      <title>Re: VPN with 3rdparty</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-with-3rdparty/m-p/210042#M39799</link>
      <description>&lt;P&gt;I would do quick debug on CP side to see what it shows. Get iked and vpnd files from $FWDIR/log dir and run vpn iked calculate peer_ip_address to see which iked files are relevant&lt;/P&gt;
&lt;P&gt;vpn debug trunc&lt;/P&gt;
&lt;P&gt;vpn debug ikeon&lt;/P&gt;
&lt;P&gt;-try generate some traffic&lt;/P&gt;
&lt;P&gt;vpndebug ikeoff&lt;/P&gt;
&lt;P&gt;Best,&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Sat, 30 Mar 2024 02:54:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-with-3rdparty/m-p/210042#M39799</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-03-30T02:54:00Z</dc:date>
    </item>
    <item>
      <title>Re: VPN with 3rdparty</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-with-3rdparty/m-p/210044#M39800</link>
      <description>&lt;P&gt;Nat-t is enabled. This is necessary on juniper side.&lt;/P&gt;</description>
      <pubDate>Sat, 30 Mar 2024 07:57:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-with-3rdparty/m-p/210044#M39800</guid>
      <dc:creator>SkipperNavy</dc:creator>
      <dc:date>2024-03-30T07:57:57Z</dc:date>
    </item>
    <item>
      <title>Re: VPN with 3rdparty</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-with-3rdparty/m-p/210045#M39801</link>
      <description>&lt;P&gt;How are you clearing your VPN between attempts/changes?&lt;/P&gt;
&lt;P&gt;Which Jumbo take is present on these systems?&lt;/P&gt;
&lt;P&gt;Note R80.40 will be EOL next month.&lt;/P&gt;</description>
      <pubDate>Sat, 30 Mar 2024 23:27:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-with-3rdparty/m-p/210045#M39801</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2024-03-30T23:27:34Z</dc:date>
    </item>
    <item>
      <title>Re: VPN with 3rdparty</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-with-3rdparty/m-p/210048#M39802</link>
      <description>&lt;P&gt;Makes sense, I heard that about Juniper before. Hey, is this enabled or not on CP side inside vpn community settings?&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot_1.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/25085i9AEAB578CA6CE22F/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Screenshot_1.png" alt="Screenshot_1.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt; &lt;/P&gt;</description>
      <pubDate>Sat, 30 Mar 2024 12:08:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-with-3rdparty/m-p/210048#M39802</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-03-30T12:08:23Z</dc:date>
    </item>
    <item>
      <title>Re: VPN with 3rdparty</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-with-3rdparty/m-p/210049#M39803</link>
      <description>&lt;P&gt;Please what do you mean by run vpn iked calculate?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 30 Mar 2024 12:32:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-with-3rdparty/m-p/210049#M39803</guid>
      <dc:creator>SkipperNavy</dc:creator>
      <dc:date>2024-03-30T12:32:55Z</dc:date>
    </item>
    <item>
      <title>Re: VPN with 3rdparty</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-with-3rdparty/m-p/210050#M39804</link>
      <description>&lt;P&gt;What I mean is this.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;[Expert@cpazurecluster1:0]# vpn iked calculate 20.151.89.116&lt;/P&gt;
&lt;P&gt;vpn: Address 20.151.89.116 is handled by IKED 0&lt;/P&gt;
&lt;P&gt;[Expert@cpazurecluster1:0]#&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;And what above means is that when you run debug, you ONLY care about iked0 files.&lt;/P&gt;</description>
      <pubDate>Sat, 30 Mar 2024 12:44:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-with-3rdparty/m-p/210050#M39804</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-03-30T12:44:04Z</dc:date>
    </item>
    <item>
      <title>Re: VPN with 3rdparty</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-with-3rdparty/m-p/210052#M39805</link>
      <description>&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.jpg" style="width: 4032px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/25086iB8D96AF683ECB027/image-size/medium?v=v2&amp;amp;px=400" role="button" title="image.jpg" alt="image.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;</description>
      <pubDate>Sat, 30 Mar 2024 13:00:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-with-3rdparty/m-p/210052#M39805</guid>
      <dc:creator>SkipperNavy</dc:creator>
      <dc:date>2024-03-30T13:00:00Z</dc:date>
    </item>
    <item>
      <title>Re: VPN with 3rdparty</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-with-3rdparty/m-p/210053#M39806</link>
      <description>&lt;P&gt;I tried &amp;nbsp;running the command in expert mode but it return:&lt;/P&gt;&lt;P&gt;Unknown command « iked »&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 30 Mar 2024 13:03:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-with-3rdparty/m-p/210053#M39806</guid>
      <dc:creator>SkipperNavy</dc:creator>
      <dc:date>2024-03-30T13:03:23Z</dc:date>
    </item>
    <item>
      <title>Re: VPN with 3rdparty</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-with-3rdparty/m-p/210054#M39807</link>
      <description>&lt;P&gt;Just type vpn from expert mode and see if iked shows up in the menu, as below&lt;/P&gt;
&lt;P&gt;[Expert@cpazurecluster1:0]# vpn&lt;BR /&gt;Usage:&lt;BR /&gt;vpn debug ... # print debug msgs to VPN log files&lt;BR /&gt;vpn iked # various 'iked' related commands&lt;BR /&gt;vpn cccd # various 'cccd' related commands&lt;BR /&gt;vpn crl_zap # erase all CRLs from cache&lt;BR /&gt;vpn drv ... # attach vpn driver to fw driver and more&lt;BR /&gt;vpn ver [-k] # display VPN version&lt;BR /&gt;vpn crlview ... # debugging tool for CRLs&lt;BR /&gt;vpn compstat # display compression/decompression statistics&lt;BR /&gt;vpn compreset # reset compression/decompression statistics&lt;BR /&gt;vpn macutil [user_name] # display generated MAC address by username or&lt;BR /&gt;# DN from arg or stdin (also: vpn mu)&lt;BR /&gt;vpn tunnelutil # launch TunnelUtil tool to control&lt;BR /&gt;# VPN Tunnels (also: vpn tu)&lt;BR /&gt;vpn nssm_topology ... # generate topology in NSSM format for&lt;BR /&gt;# Nokia clients&lt;BR /&gt;vpn rll dump fileName/sync # Route Lookup Layer: Dump DB&lt;BR /&gt;# Sync DB&lt;BR /&gt;vpn overlap_encdom ... # Display overlapping encryption domains&lt;BR /&gt;vpn dll dump fileName # DNS Lookup Layer: Dump DB&lt;BR /&gt;vpn dll resolve [hostname] # Request Resolve&lt;BR /&gt;vpn 3rd_party_mep #&lt;BR /&gt;vpn ipafile_check filename [level] # Verify candidate for ipassignment.conf&lt;BR /&gt;vpn set_slim_server ... # Starting/stopping the slim web server&lt;BR /&gt;vpn set_snx_encdom_groups ... # enabling/disabling the encryption domain&lt;BR /&gt;# per usergroup feature for snx&lt;BR /&gt;vpn mep_refresh # Initiate MEP re-decision in case of&lt;BR /&gt;# backup stickiness configuration&lt;BR /&gt;vpn rim_cleanup # Clean RIM routes&lt;BR /&gt;vpn shell ... # Command Line Interface&lt;BR /&gt;vpn set_trac disable/enable # Starting/Stopping trac server&lt;BR /&gt;vpn neo_proto [on/off] # switching neo client protocol&lt;BR /&gt;vpn show_tcpt # show visitor mode users&lt;BR /&gt;vpn check_ttm # Check if a ttm file is valid&lt;BR /&gt;vpn dump_psk # dump hash (SHA256) of peers pre-shared-keys&lt;BR /&gt;vpn snx_unban # Reset the failed login attempt history of a client IP address&lt;BR /&gt;[Expert@cpazurecluster1:0]#&lt;/P&gt;</description>
      <pubDate>Sat, 30 Mar 2024 13:04:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-with-3rdparty/m-p/210054#M39807</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-03-30T13:04:49Z</dc:date>
    </item>
    <item>
      <title>Re: VPN with 3rdparty</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-with-3rdparty/m-p/210056#M39808</link>
      <description>&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.jpg" style="width: 4032px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/25087i8D8F42D85027C7AF/image-size/medium?v=v2&amp;amp;px=400" role="button" title="image.jpg" alt="image.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;There is no iked option with vpn colmand&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thank you &lt;/P&gt;</description>
      <pubDate>Sat, 30 Mar 2024 13:07:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-with-3rdparty/m-p/210056#M39808</guid>
      <dc:creator>SkipperNavy</dc:creator>
      <dc:date>2024-03-30T13:07:30Z</dc:date>
    </item>
    <item>
      <title>Re: VPN with 3rdparty</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-with-3rdparty/m-p/210057#M39809</link>
      <description>&lt;P&gt;Ok, no worries. Lets do remote if you are allowed, I think we can figure this out.&lt;/P&gt;
&lt;P&gt;If yes, just DM me and I can send you zoom.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Sat, 30 Mar 2024 13:09:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-with-3rdparty/m-p/210057#M39809</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-03-30T13:09:25Z</dc:date>
    </item>
    <item>
      <title>Re: VPN with 3rdparty</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-with-3rdparty/m-p/210059#M39810</link>
      <description>&lt;P&gt;Traffic selectors proposed to a Juniper must match precisely, it will not accept a subset.&amp;nbsp; However the Check Point will accept a subset if the Juniper proposes it, which is why the Juniper can bring the tunnel up, but if the Check Point is the initiator it cannot.&lt;/P&gt;
&lt;P&gt;Make sure "disable NAT in VPN Community" is set as the_rock mentioned.&lt;/P&gt;
&lt;P&gt;The GUIdbedit largest_possible_subnet and user.def hacks are no longer needed as you can now set precise VPN domains per VPN Community.&amp;nbsp; I'm pretty sure this capability was added in R80.40 which is the release you are using.&amp;nbsp; On the VPN Community screen shown below, override the VPN Domain "IP addresses based on object topology" setting for both community members like this:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="vpn_domain_override.png" style="width: 845px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/25088iE26CC6394B9CECEB/image-size/large?v=v2&amp;amp;px=999" role="button" title="vpn_domain_override.png" alt="vpn_domain_override.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 30 Mar 2024 13:12:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-with-3rdparty/m-p/210059#M39810</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2024-03-30T13:12:24Z</dc:date>
    </item>
    <item>
      <title>Re: VPN with 3rdparty</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-with-3rdparty/m-p/210065#M39811</link>
      <description>&lt;P&gt;Thank you&amp;nbsp;the-rock but i can use remote, company restriction.&lt;/P&gt;&lt;P&gt;if i disable nat on cp, is it necessary to do the same on juniper?&lt;/P&gt;</description>
      <pubDate>Sat, 30 Mar 2024 13:53:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-with-3rdparty/m-p/210065#M39811</guid>
      <dc:creator>SkipperNavy</dc:creator>
      <dc:date>2024-03-30T13:53:39Z</dc:date>
    </item>
    <item>
      <title>Re: VPN with 3rdparty</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-with-3rdparty/m-p/210066#M39812</link>
      <description>&lt;P&gt;Correct.&lt;/P&gt;</description>
      <pubDate>Sat, 30 Mar 2024 13:56:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-with-3rdparty/m-p/210066#M39812</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-03-30T13:56:53Z</dc:date>
    </item>
    <item>
      <title>Re: VPN with 3rdparty</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-with-3rdparty/m-p/210067#M39813</link>
      <description>&lt;P&gt;Hello, i made all this change but my cp gateway still send /16 as MyTSI&lt;/P&gt;&lt;P&gt;can someone explain me to understand how the gateway obtain /16? &amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;thank you in advance&lt;/P&gt;</description>
      <pubDate>Sat, 30 Mar 2024 14:08:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-with-3rdparty/m-p/210067#M39813</guid>
      <dc:creator>SkipperNavy</dc:creator>
      <dc:date>2024-03-30T14:08:59Z</dc:date>
    </item>
    <item>
      <title>Re: VPN with 3rdparty</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-with-3rdparty/m-p/210068#M39814</link>
      <description>&lt;P&gt;Can you please send screenshots of changes you made in guidbedit, as well as community settings? Please blue out any sensitive info. Also, do the debug I mentioned last nite.&lt;/P&gt;
&lt;P&gt;vpn debug trunc&lt;/P&gt;
&lt;P&gt;vpn debug ikeon&lt;/P&gt;
&lt;P&gt;-try generate some traffic&lt;/P&gt;
&lt;P&gt;vpn debug ikeoff&lt;/P&gt;
&lt;P&gt;Look for iked and vpnd files in $FWDIR/log dir&lt;/P&gt;
&lt;P&gt;Best,&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 30 Mar 2024 14:20:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-with-3rdparty/m-p/210068#M39814</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-03-30T14:20:06Z</dc:date>
    </item>
  </channel>
</rss>

