<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: R81.10 VPN site-2-site Palo Alto in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-10-VPN-site-2-site-to-Cisco-C8500-12X-IOS-XE-not-Palo-Alto/m-p/225419#M43373</link>
    <description>&lt;P&gt;Yes - at least no users reported errors - and firewall log contains none of these Rejects prior to reload after JHF was applied. If there were any issues they were insignificant. Edit: or not logged...&lt;/P&gt;</description>
    <pubDate>Tue, 03 Sep 2024 11:23:09 GMT</pubDate>
    <dc:creator>BjornErichsen</dc:creator>
    <dc:date>2024-09-03T11:23:09Z</dc:date>
    <item>
      <title>R81.10 VPN site-2-site to Cisco C8500-12X IOS XE (not Palo Alto as previously stated)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-10-VPN-site-2-site-to-Cisco-C8500-12X-IOS-XE-not-Palo-Alto/m-p/225115#M43308</link>
      <description>&lt;P&gt;&lt;STRONG&gt;EDIT:&lt;BR /&gt;Sorry guys. I was misinformed&lt;/STRONG&gt; - it now proves that the remote peer is in fact&amp;nbsp;&lt;SPAN class=""&gt;cisco C8500-12X, not Palo Alto firewalls... They are not making it easy on me &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;History:&lt;BR /&gt;&lt;/STRONG&gt;I am managing a CP R81.10 secure GW (VSX) with several VPNs to different vendors.&lt;BR /&gt;In late April we created yet another site-2-site VPN tunnel - towards Cisco IOS XE (for the first time), and it worked flawlessly.&lt;BR /&gt;In early July we deployed most recent (at that time) Jumbo Hotfix take 152.&lt;STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;Issue:&lt;BR /&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;Since the JHF deployed in July it appears we have had problems when IPsec SA keys are renegotiated (at default time interval of 3660 seconds).&lt;BR /&gt;Note that the tunnel works for the vast majority of the time, and the tunneled subnets does reestablish communication eventually without manual intervention, but we do see traffic impact.&lt;BR /&gt;&lt;BR /&gt;VPN Blade logs Rejects of various types - but generally in sequence:&lt;BR /&gt;&lt;BR /&gt;From remote Cisco IOS XE to CP:&lt;BR /&gt;Child SA exchange: Ended with error&lt;BR /&gt;Initial exchange: Sending notification to peer: Invalid Key Exchange payload&lt;BR /&gt;&lt;BR /&gt;Then from CP to remote Cisco IOS XE:&lt;BR /&gt;Child SA exchange: Received notification from peer: No proposal chosen MyMethods Phase2: AES-GCM-256 + HMAC-SHA2-384, No IPComp, No ESN, Group 20 (384-bit random ECP group)&lt;BR /&gt;&lt;BR /&gt;And from Cisco IOS XE to CP&lt;BR /&gt;Informational exchange: Ended with error&lt;BR /&gt;Initial exchange: Sending notification to peer: Invalid Key Exchange payload&lt;STRONG&gt;&lt;STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;Actions:&lt;BR /&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;We will be upgrading to latest Jumbo Hotfix (which claims to fix some VPN issues though none appear directly related) next week, but in case that does not solve the issue any help would be greatly appreciated.&lt;BR /&gt;&lt;BR /&gt;We already have our eye on DPD&amp;nbsp;@onfigured on&amp;nbsp;Cisco IOS XE since the CP side has not been configured with the tunnel as "Permanent", but I doubt that would cause IPsec renegotiation to fail periodically.&lt;/P&gt;&lt;P&gt;Also we have requested Cisco IOS XE side to first try with a IKEv2 proposal that exactly matches CP configuration. This has not yet been implemented - as these proposals are "global" - but they are looking into it.&lt;BR /&gt;&lt;BR /&gt;I'd really like to hear if anybody have fixed identical issues?&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;CP&amp;nbsp;VPN community config:&lt;BR /&gt;&lt;/STRONG&gt;We have a VPN community ("policy based") tunnel with verified encryption domains (subnets) at both ends.&lt;BR /&gt;Only allow encrypted traffic&lt;BR /&gt;IKEv2 only&lt;BR /&gt;Phase 1: AES-256,SHA384.Group 20&lt;BR /&gt;Phase 2: AES-GCM-256, PFS group 20&lt;BR /&gt;Not permanent and One VPN tunnel per subnet pair&lt;BR /&gt;Shared secret (which of course works)&lt;BR /&gt;Renegotiate IKE 1440 (minutes)&lt;BR /&gt;Renegotiate IPsec 3600 (seconds)&lt;BR /&gt;Anything not mentioned should be at default values for R81.10 (initial deployment for this VSX cluster was on R80.40)&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;Cisco IOS XE config (which I do not control):&lt;/STRONG&gt;&lt;BR /&gt;&lt;SPAN class=""&gt;#show crypto ikev2 proposal&lt;BR /&gt;IKEv2 proposal: VPN_XXXX_PROPOSAL_AES_CBC&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Encryption : AES-CBC-256 AES-CBC-192 AES-CBC-128&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Integrity&amp;nbsp; : SHA512 SHA384 SHA256&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; PRF&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : SHA512 SHA384 SHA256&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; DH Group&amp;nbsp;&amp;nbsp; : DH_GROUP_2048_256_MODP/Group 24 DH_GROUP_521_ECP/Group 21 DH_GROUP_384_ECP/Group 20&lt;BR /&gt;IKEv2 proposal: VPN_XXXX_PROPOSAL_AES_GCM&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Encryption : AES-GCM-256 AES-GCM-128&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Integrity&amp;nbsp; : none&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; PRF&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : SHA512 SHA384 SHA256&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; DH Group&amp;nbsp;&amp;nbsp; : DH_GROUP_2048_256_MODP/Group 24 DH_GROUP_521_ECP/Group 21 DH_GROUP_384_ECP/Group 20&lt;BR /&gt;IKEv2 proposal: default Disabled&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN class=""&gt;#show crypto ipsec profile VPN_XXXX_PROFILE_10029&lt;BR /&gt;IPSEC profile VPN_XXXX_PROFILE_10029&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; IKEv2 Profile: VPN_XXXX_PROFILE_10029&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Kilobyte Volume Rekey has been disabled.&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Security association lifetime:3600 seconds&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Responder-Only (Y/N): N&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; PFS (Y/N): Y&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; DH group:&amp;nbsp; group20&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Mixed-mode : Disabled&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Transform sets={&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; TS_XXXX_AES_GCM256:&amp;nbsp; { esp-gcm 256&amp;nbsp; } ,&lt;BR /&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; }&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;U&gt;&lt;U&gt;&lt;SPAN&gt;&lt;SPAN class=""&gt;&lt;SPAN&gt;&lt;SPAN class=""&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/U&gt;&lt;/U&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;#show crypto ikev2 profile VPN_XXXX_PROFILE_10029&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;IKEv2 profile: VPN_XXXX_PROFILE_10029&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;Ref Count: 5&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;Match criteria:&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;Fvrf: INFRA&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;Local address/interface:&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;yyy.zzz.xxx.ooo&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;Identities:&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;address vvv.uuu.ddd.qqq 255.255.255.255&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;&amp;nbsp;Certificate maps: none&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;Local identity: none&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;Remote identity: none&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;Local authentication method: pre-share&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;Remote authentication method(s): pre-share&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;EAP options: none&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;Keyring: VPN_XXXX_KEYRING_10029&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;Trustpoint(s): none&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;Lifetime: 86400 seconds&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;no lifetime certificate&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;DPD: interval 10, retry-interval 5, periodic&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;NAT-keepalive: disabled&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;Ivrf: none&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;Virtual-template: none&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;mode auto: none&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;AAA AnyConnect EAP authentication mlist: none&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;AAA EAP authentication mlist: none&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;AAA Accounting: none&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;AAA group authorization: none&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;AAA user authorization: none&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;PPK Dynamic: 0 PPK Required : 0 PPK Instance ID:&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 05 Sep 2024 12:47:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-10-VPN-site-2-site-to-Cisco-C8500-12X-IOS-XE-not-Palo-Alto/m-p/225115#M43308</guid>
      <dc:creator>BjornErichsen</dc:creator>
      <dc:date>2024-09-05T12:47:16Z</dc:date>
    </item>
    <item>
      <title>Re: R81.10 VPN site-2-site Palo Alto</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-10-VPN-site-2-site-to-Cisco-C8500-12X-IOS-XE-not-Palo-Alto/m-p/225147#M43310</link>
      <description>&lt;P&gt;See if my post below helps and how we got it working.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;
&lt;P&gt;Might not be exact same issue, but you may find it useful.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.checkpoint.com/t5/Security-Gateways/VPN-route-based-query/m-p/217215#M41354" target="_blank"&gt;VPN route based query - Check Point CheckMates&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 30 Aug 2024 14:26:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-10-VPN-site-2-site-to-Cisco-C8500-12X-IOS-XE-not-Palo-Alto/m-p/225147#M43310</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-08-30T14:26:47Z</dc:date>
    </item>
    <item>
      <title>Re: R81.10 VPN site-2-site Palo Alto</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-10-VPN-site-2-site-to-Cisco-C8500-12X-IOS-XE-not-Palo-Alto/m-p/225149#M43311</link>
      <description>&lt;P&gt;This sounds like a familiar issue I had with a set of Palos. Looking at my old e-mails, I found this snippet:&lt;/P&gt;
&lt;P&gt;These are the errors I have been seeing:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Child SA exchange: Sending notification to peer: No proposal chosen MyMethods Phase2: AES-GCM-256 + HMAC-SHA2-256, No IPComp, No ESN, Group 19 (256-bit random ECP group)&lt;/LI&gt;
&lt;LI&gt;Initial exchange: Sending notification to peer: Invalid Key Exchange payload&lt;/LI&gt;
&lt;LI&gt;Child SA exchange: Exchange failed: timeout reached.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The Palo side was using this:&lt;/P&gt;
&lt;P&gt;Phase 1 has these configured:&lt;/P&gt;
&lt;P&gt;DH Groups 21, 20, 19, 14, 5, 2&lt;/P&gt;
&lt;P&gt;Encryption AES-256-GCM, AES-256-CBC&lt;/P&gt;
&lt;P&gt;Authentication sha512, sha384, sha256, non-auth&lt;/P&gt;
&lt;P&gt;Lifetime: 24 hours&lt;/P&gt;
&lt;P&gt;Phase 2 has these configured:&lt;/P&gt;
&lt;P&gt;DH Group 19&lt;/P&gt;
&lt;P&gt;Lifetime 1 hour&lt;/P&gt;
&lt;P&gt;Lifesize 4608 MB&lt;/P&gt;
&lt;P&gt;Encryption: aes-256-gc, aes-256-cbc, aes-192,cbc, aes-128-gcm, aes-128-ccm, aes-128-cbc&lt;/P&gt;
&lt;P&gt;Authentication: sha512, sha384, sha256&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The resolution: Palo side created a profile specifically for our tunnel to use the same encryption ciphers we were sending instead of using a global profile with several ciphers enabled.&lt;/P&gt;</description>
      <pubDate>Fri, 30 Aug 2024 14:43:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-10-VPN-site-2-site-to-Cisco-C8500-12X-IOS-XE-not-Palo-Alto/m-p/225149#M43311</guid>
      <dc:creator>CaseyB</dc:creator>
      <dc:date>2024-08-30T14:43:08Z</dc:date>
    </item>
    <item>
      <title>Re: R81.10 VPN site-2-site Palo Alto</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-10-VPN-site-2-site-to-Cisco-C8500-12X-IOS-XE-not-Palo-Alto/m-p/225150#M43312</link>
      <description>&lt;P&gt;Thats an excellent point! I know PAN guy did that in our case (the post I referenced), though there, main issue was ID he needed from CP side to make it work fully. I believe things like what you advised&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/75772"&gt;@CaseyB&lt;/a&gt;&amp;nbsp;are less relevant for say Cisco or Fortinet, but for PAN, I do know it matters more.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Fri, 30 Aug 2024 14:49:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-10-VPN-site-2-site-to-Cisco-C8500-12X-IOS-XE-not-Palo-Alto/m-p/225150#M43312</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-08-30T14:49:41Z</dc:date>
    </item>
    <item>
      <title>Re: R81.10 VPN site-2-site Palo Alto</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-10-VPN-site-2-site-to-Cisco-C8500-12X-IOS-XE-not-Palo-Alto/m-p/225315#M43352</link>
      <description>&lt;P&gt;Thanks - but IKEv1 (as I read your solution) is not really an option for us. Audit will be on our backs &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 02 Sep 2024 06:35:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-10-VPN-site-2-site-to-Cisco-C8500-12X-IOS-XE-not-Palo-Alto/m-p/225315#M43352</guid>
      <dc:creator>BjornErichsen</dc:creator>
      <dc:date>2024-09-02T06:35:29Z</dc:date>
    </item>
    <item>
      <title>Re: R81.10 VPN site-2-site Palo Alto</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-10-VPN-site-2-site-to-Cisco-C8500-12X-IOS-XE-not-Palo-Alto/m-p/225317#M43353</link>
      <description>&lt;P&gt;Thanks - yes I read somewhere that is solved the issue (maybe an older comment by you? ), and this is actually what I meant by "&lt;SPAN&gt;Also we have requested Cisco IOS XE side to first try with a IKEv2 proposal that exactly matches CP configuration&lt;/SPAN&gt;" in OP&lt;BR /&gt;Specifically put this in top of global proposals or as specific for this tunnel:&lt;BR /&gt;&lt;SPAN&gt;&lt;SPAN class=""&gt;IKEv2 proposal: VPN_XXXX_PROPOSAL_AES_GCM_CP&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Encryption : AES-GCM-256&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Integrity&amp;nbsp; : none&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; PRF&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; : &amp;nbsp;SHA384&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; DH Group&amp;nbsp;&amp;nbsp; : DH_GROUP_384_ECP/Group 20&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;This gives me hope that it might actually solve the issue.&lt;BR /&gt;&lt;BR /&gt;Its just sickens me that the issue apparently arose after an CP JHF deployment, because it leaves little confidence in the future stability of this VPN. Thankfully its mostly used for mgmt access, but still...&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 05 Sep 2024 12:49:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-10-VPN-site-2-site-to-Cisco-C8500-12X-IOS-XE-not-Palo-Alto/m-p/225317#M43353</guid>
      <dc:creator>BjornErichsen</dc:creator>
      <dc:date>2024-09-05T12:49:05Z</dc:date>
    </item>
    <item>
      <title>Re: R81.10 VPN site-2-site Palo Alto</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-10-VPN-site-2-site-to-Cisco-C8500-12X-IOS-XE-not-Palo-Alto/m-p/225368#M43356</link>
      <description>&lt;P&gt;I think that may had been coincidental, I really do.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Mon, 02 Sep 2024 18:52:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-10-VPN-site-2-site-to-Cisco-C8500-12X-IOS-XE-not-Palo-Alto/m-p/225368#M43356</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-09-02T18:52:39Z</dc:date>
    </item>
    <item>
      <title>Re: R81.10 VPN site-2-site Palo Alto</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-10-VPN-site-2-site-to-Cisco-C8500-12X-IOS-XE-not-Palo-Alto/m-p/225379#M43358</link>
      <description>&lt;P&gt;Forgot to ask, did tunnel work constantly without any issues BEFORE jumbo install?&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Mon, 02 Sep 2024 20:47:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-10-VPN-site-2-site-to-Cisco-C8500-12X-IOS-XE-not-Palo-Alto/m-p/225379#M43358</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-09-02T20:47:13Z</dc:date>
    </item>
    <item>
      <title>Re: R81.10 VPN site-2-site Palo Alto</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-10-VPN-site-2-site-to-Cisco-C8500-12X-IOS-XE-not-Palo-Alto/m-p/225399#M43367</link>
      <description>&lt;P&gt;What JHF was installed on CP when all seemed to work ?&lt;/P&gt;
&lt;P&gt;To which JHF you updated CP when you noticed the issue?&lt;/P&gt;
&lt;P&gt;Did you uninstall the problematic JHF to confirm it is 100% related to JHF update ? If so, TAC should be involved and provide root cause&lt;/P&gt;</description>
      <pubDate>Tue, 03 Sep 2024 04:27:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-10-VPN-site-2-site-to-Cisco-C8500-12X-IOS-XE-not-Palo-Alto/m-p/225399#M43367</guid>
      <dc:creator>JozkoMrkvicka</dc:creator>
      <dc:date>2024-09-03T04:27:29Z</dc:date>
    </item>
    <item>
      <title>Re: R81.10 VPN site-2-site Palo Alto</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-10-VPN-site-2-site-to-Cisco-C8500-12X-IOS-XE-not-Palo-Alto/m-p/225419#M43373</link>
      <description>&lt;P&gt;Yes - at least no users reported errors - and firewall log contains none of these Rejects prior to reload after JHF was applied. If there were any issues they were insignificant. Edit: or not logged...&lt;/P&gt;</description>
      <pubDate>Tue, 03 Sep 2024 11:23:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-10-VPN-site-2-site-to-Cisco-C8500-12X-IOS-XE-not-Palo-Alto/m-p/225419#M43373</guid>
      <dc:creator>BjornErichsen</dc:creator>
      <dc:date>2024-09-03T11:23:09Z</dc:date>
    </item>
    <item>
      <title>Re: R81.10 VPN site-2-site Palo Alto</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-10-VPN-site-2-site-to-Cisco-C8500-12X-IOS-XE-not-Palo-Alto/m-p/225435#M43377</link>
      <description>&lt;P&gt;We upgraded from JHF take 129 to JHF take 152&lt;BR /&gt;&lt;BR /&gt;We did not try to uninstall JHF take 152 since it took a long time before the issue was discovered (due to summer vacation) and we need security fixes in 152 more than we need this mgmt access to be stable.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;We just installed latest JHF take 158, but it does not appear to have solved anything. Next step is to have the Cisco IOS XE IKEv2 proposal changed.&lt;/P&gt;</description>
      <pubDate>Thu, 05 Sep 2024 12:49:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-10-VPN-site-2-site-to-Cisco-C8500-12X-IOS-XE-not-Palo-Alto/m-p/225435#M43377</guid>
      <dc:creator>BjornErichsen</dc:creator>
      <dc:date>2024-09-05T12:49:53Z</dc:date>
    </item>
    <item>
      <title>Re: R81.10 VPN site-2-site Palo Alto</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-10-VPN-site-2-site-to-Cisco-C8500-12X-IOS-XE-not-Palo-Alto/m-p/225454#M43382</link>
      <description>&lt;P&gt;Hey&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/100857"&gt;@BjornErichsen&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Did you check out the post I referenced? I can even send you sreenshot of the ID Im referring to. Again, not sure if its 100% applicable in your situation, but worth checking.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Tue, 03 Sep 2024 12:41:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-10-VPN-site-2-site-to-Cisco-C8500-12X-IOS-XE-not-Palo-Alto/m-p/225454#M43382</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-09-03T12:41:46Z</dc:date>
    </item>
    <item>
      <title>Re: R81.10 VPN site-2-site Palo Alto</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-10-VPN-site-2-site-to-Cisco-C8500-12X-IOS-XE-not-Palo-Alto/m-p/225511#M43393</link>
      <description>&lt;P&gt;FYI - I have an open TAC case with R&amp;amp;D, a lot, if not all my IKEv2 tunnels started generating IKE failures on re-keys in R81.10 JHF 152+. I had to revert to JHF 150 to resolve the errors.&lt;/P&gt;
&lt;P&gt;Most of my tunnels are IKEv2: AES-256, SHA256, AES-GCM-256.&lt;/P&gt;</description>
      <pubDate>Tue, 03 Sep 2024 15:24:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-10-VPN-site-2-site-to-Cisco-C8500-12X-IOS-XE-not-Palo-Alto/m-p/225511#M43393</guid>
      <dc:creator>CaseyB</dc:creator>
      <dc:date>2024-09-03T15:24:34Z</dc:date>
    </item>
    <item>
      <title>Re: R81.10 VPN site-2-site Palo Alto</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-10-VPN-site-2-site-to-Cisco-C8500-12X-IOS-XE-not-Palo-Alto/m-p/225516#M43394</link>
      <description>&lt;P&gt;We have solved a lot of VPN issues by going to R81.20 Take 65+ on both VSX and ClusterXL on all sort of VPN configurations.&lt;/P&gt;
&lt;P&gt;The VPN feature seems really improved in that version of the OS.&lt;/P&gt;</description>
      <pubDate>Tue, 03 Sep 2024 15:50:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-10-VPN-site-2-site-to-Cisco-C8500-12X-IOS-XE-not-Palo-Alto/m-p/225516#M43394</guid>
      <dc:creator>Alex-</dc:creator>
      <dc:date>2024-09-03T15:50:42Z</dc:date>
    </item>
    <item>
      <title>Re: R81.10 VPN site-2-site Palo Alto</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-10-VPN-site-2-site-to-Cisco-C8500-12X-IOS-XE-not-Palo-Alto/m-p/225558#M43407</link>
      <description>&lt;P&gt;Having PA create a custom profile will most likely fix the issue. I've had great success limiting the encryption algorithm to CBC like the following example.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="IKEv2.png" style="width: 320px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/27489iD982B8766F2A4A2D/image-size/large?v=v2&amp;amp;px=999" role="button" title="IKEv2.png" alt="IKEv2.png" /&gt;&lt;/span&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'd also check the Traffic Selectors that are being proposed by both ends when tunnels come down.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 03 Sep 2024 23:16:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-10-VPN-site-2-site-to-Cisco-C8500-12X-IOS-XE-not-Palo-Alto/m-p/225558#M43407</guid>
      <dc:creator>Zolocofxp</dc:creator>
      <dc:date>2024-09-03T23:16:57Z</dc:date>
    </item>
    <item>
      <title>Re: R81.10 VPN site-2-site Palo Alto</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-10-VPN-site-2-site-to-Cisco-C8500-12X-IOS-XE-not-Palo-Alto/m-p/225563#M43408</link>
      <description>&lt;P&gt;Agree 100%&lt;/P&gt;</description>
      <pubDate>Tue, 03 Sep 2024 23:59:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-10-VPN-site-2-site-to-Cisco-C8500-12X-IOS-XE-not-Palo-Alto/m-p/225563#M43408</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-09-03T23:59:56Z</dc:date>
    </item>
    <item>
      <title>Re: R81.10 VPN site-2-site Palo Alto</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-10-VPN-site-2-site-to-Cisco-C8500-12X-IOS-XE-not-Palo-Alto/m-p/225581#M43410</link>
      <description>&lt;P&gt;Thanks - good to know.&lt;BR /&gt;Unfortunately I am stuck on R81.10 management servers a little while longer due to appliances - soon to be hardware refreshed.&lt;/P&gt;</description>
      <pubDate>Wed, 04 Sep 2024 06:51:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-10-VPN-site-2-site-to-Cisco-C8500-12X-IOS-XE-not-Palo-Alto/m-p/225581#M43410</guid>
      <dc:creator>BjornErichsen</dc:creator>
      <dc:date>2024-09-04T06:51:43Z</dc:date>
    </item>
    <item>
      <title>Re: R81.10 VPN site-2-site Palo Alto</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-10-VPN-site-2-site-to-Cisco-C8500-12X-IOS-XE-not-Palo-Alto/m-p/225585#M43411</link>
      <description>&lt;P&gt;ooh well - that sounds ominous.&lt;BR /&gt;You can probably add this post to the case then. Looks like VPN blade errors are not limited to Cisco IOS XE in my end either, but that specific VPN just has more error-logs than all the others combined, and we don't have user complains about the other VPNs (yet).&lt;BR /&gt;Currently running R81.10 JHF take 158 (I know JHF 156 is the recommended take for the time being).&lt;BR /&gt;&lt;BR /&gt;Edit: All errors are Rejects - 94% of errors are inbound to checkpoint firewall&lt;BR /&gt;&lt;BR /&gt;Edit-2: Ended up creating a TAC case of my own - will post results once its concluded.&lt;/P&gt;</description>
      <pubDate>Thu, 05 Sep 2024 12:51:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-10-VPN-site-2-site-to-Cisco-C8500-12X-IOS-XE-not-Palo-Alto/m-p/225585#M43411</guid>
      <dc:creator>BjornErichsen</dc:creator>
      <dc:date>2024-09-05T12:51:50Z</dc:date>
    </item>
    <item>
      <title>Re: R81.10 VPN site-2-site Palo Alto</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-10-VPN-site-2-site-to-Cisco-C8500-12X-IOS-XE-not-Palo-Alto/m-p/227032#M43651</link>
      <description>&lt;P&gt;Greetings,&lt;/P&gt;&lt;P&gt;We're facing the same thing after deploying the latest JHF on 81.10, what was the outcome of the ticket in your case?&lt;/P&gt;&lt;P&gt;The issue isn't restricted to Cisco peers, we can see tunnels with all sorts of vendors exhibiting the same behavior - full re-establishment every ~2 minutes due to "Invalid Key Exchange payload"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;</description>
      <pubDate>Wed, 18 Sep 2024 06:40:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-10-VPN-site-2-site-to-Cisco-C8500-12X-IOS-XE-not-Palo-Alto/m-p/227032#M43651</guid>
      <dc:creator>Radu_Ciobanu</dc:creator>
      <dc:date>2024-09-18T06:40:05Z</dc:date>
    </item>
    <item>
      <title>Re: R81.10 VPN site-2-site Palo Alto</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-10-VPN-site-2-site-to-Cisco-C8500-12X-IOS-XE-not-Palo-Alto/m-p/227055#M43660</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/100857"&gt;@BjornErichsen&lt;/a&gt;,&lt;BR /&gt;&lt;BR /&gt;Did you have any conclusion on your TAC case?&lt;BR /&gt;We are experiencing the exact same issue on all IKEv2 tunnels on a VSX cluster with 45 VS, after having upgraded from R81.10 Take 139 to Take 156.&lt;BR /&gt;&lt;BR /&gt;It really seems very likely that a change to the behavior of phase 2 re-negotiations for IKEv2 tunnels have been made in the code, and this has not been amply (or at all) described in the release notes of Take 152.&lt;BR /&gt;&lt;BR /&gt;The only thing I can find in the release notes that sound like something that could cause this, is the following:&lt;BR /&gt;"&lt;BR /&gt;&lt;SPAN&gt;PRJ-53366/&lt;/SPAN&gt;&lt;SPAN&gt;PRHF-32706&lt;BR /&gt;&lt;BR /&gt;VPN IKEv2 negotiation with a third party peer may fail when the peer offers multiple combined encryption algorithms in one proposal. For example, AWS by default offers AES-GCM and AES-GCM-256. The issue triggers an IKE failure log.&lt;/SPAN&gt;&lt;BR /&gt;"&lt;BR /&gt;&lt;BR /&gt;This though is noted as a fix in Take 139 - so it does not really add up.&lt;BR /&gt;&lt;BR /&gt;I am quite confident that changing to IKEv1 will solve the issue.&lt;BR /&gt;I have not tried this out yet however - as it is not really the solution to the problem - only a "hotfix" so to speak.&lt;BR /&gt;&lt;BR /&gt;I am contemplating creating my own TAC case because of this.&lt;/P&gt;</description>
      <pubDate>Wed, 18 Sep 2024 08:43:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-10-VPN-site-2-site-to-Cisco-C8500-12X-IOS-XE-not-Palo-Alto/m-p/227055#M43660</guid>
      <dc:creator>VSX_Bernie</dc:creator>
      <dc:date>2024-09-18T08:43:05Z</dc:date>
    </item>
  </channel>
</rss>

