<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Issue with VPN between Checkpoint and AWS in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issue-with-VPN-between-Checkpoint-and-AWS/m-p/228914#M44094</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;Thank you for your reply.&lt;/P&gt;&lt;P&gt;When using unnumbered VTIs, you don't need to set any ip address? In that case, how do you set up BGP peers?&lt;/P&gt;&lt;P&gt;Thomas&lt;/P&gt;</description>
    <pubDate>Fri, 04 Oct 2024 05:38:36 GMT</pubDate>
    <dc:creator>ThomasPP</dc:creator>
    <dc:date>2024-10-04T05:38:36Z</dc:date>
    <item>
      <title>Issue with VPN between Checkpoint and AWS</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issue-with-VPN-between-Checkpoint-and-AWS/m-p/228859#M44077</link>
      <description>&lt;P&gt;Hello&lt;/P&gt;&lt;P&gt;We are building a route based site-to-site VPN between our Checkpoint cluster (Check Point Gaia R81.10 - 15600) and AWS (tenant belonging to our partner).&lt;/P&gt;&lt;P&gt;Both phases are up but there is no traffic between VTI addresses (ping is not working but encrypted on Checkpoint side)&lt;/P&gt;&lt;P&gt;We've got errors like in the console : &amp;nbsp;:&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Child SA exchange: Peer's message is unacceptable&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;and fw ctl zdebug drop shows :&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;@;294556582;[cpu_6];[fw4_19];fw_log_drop_ex: Packet proto=6 169.254.131.30:35776 -&amp;gt; 169.254.131.29:179 dropped by fw_ipsec_encrypt_on_tunnel_instance Reason: No error - tunnel is not yet established;&lt;BR /&gt;&lt;EM&gt;@;294556582;[cpu_12];[fw4_7];fw_log_drop_ex: Packet proto=6 169.254.151.30:41589 -&amp;gt; 169.254.151.29:179 dropped by fw_ipsec_encrypt_on_tunnel_instance Reason: No error - tunnel is not yet established;&lt;/EM&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;We also noticed these logs :&lt;/P&gt;&lt;P&gt;&amp;nbsp;[vpnd 18908 4071475200]@FW-CPPT-3080[3 Oct 14:36:35][ikev2] TSPayload::Verify_ipv4: Traffic selector has been narrowed. Here's what's left (4 addresses)&lt;BR /&gt;[vpnd 18908 4071475200]@FW-CPPT-3080[3 Oct 14:36:35][ikev2]&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; --- 185.XXX.YYY.0 - 185.XXX.YYY.3&lt;BR /&gt;[vpnd 18908 4071475200]@FW-CPPT-3080[3 Oct 14:36:35][ikev2] TSPayload::Verify_ipv6: calculate all ranges&lt;BR /&gt;[vpnd 18908 4071475200]@FW-CPPT-3080[3 Oct 14:36:35][ikev2] constructRelevantIPRanges_ipv6: proto: 0, port range: All Ports&lt;BR /&gt;[vpnd 18908 4071475200]@FW-CPPT-3080[3 Oct 14:36:35][ikev2] TSPayload::Verify_ipv6: calculate ranges for ts 0&lt;BR /&gt;[vpnd 18908 4071475200]@FW-CPPT-3080[3 Oct 14:36:35][ikev2] constructRelevantIPRanges_ipv6: proto: 0, port range: All Ports&lt;BR /&gt;[vpnd 18908 4071475200]@FW-CPPT-3080[3 Oct 14:36:35][ikev2] TSPayload::Verify_ipv6: trying to match peer range 0: 185.XXX.YYY.0 - 185.XXX.YYY.3 against 0 policy ranges&lt;BR /&gt;[vpnd 18908 4071475200]@FW-CPPT-3080[3 Oct 14:36:35][ikev2] TSPayload::Verify_ipv6: Could not match traffic selector 1 (&amp;lt;185.XXX.YYY.0 - 185.XXX.YYY.3&amp;gt;)&lt;BR /&gt;[vpnd 18908 4071475200]@FW-CPPT-3080[3 Oct 14:36:35][ikev2] TSPayload::Verify_ipv6: Could not match any selectors&lt;BR /&gt;[vpnd 18908 4071475200]@FW-CPPT-3080[3 Oct 14:36:35][ikev2] TSPayload::Verify: returns true&lt;BR /&gt;[vpnd 18908 4071475200]@FW-CPPT-3080[3 Oct 14:36:35][ikev2] TSPayload::getContainingTS: looking for a ts that contains &amp;lt;169.254.131.30 ; TCP ; 179&amp;gt;&lt;BR /&gt;[vpnd 18908 4071475200]@FW-CPPT-3080[3 Oct 14:36:35][ikev2] constructRelevantIPRanges_ipv4: checking range: 185.XXX.YYY.0 - 185.XXX.YYY.6&lt;BR /&gt;[vpnd 18908 4071475200]@FW-CPPT-3080[3 Oct 14:36:35][ikev2] constructRelevantIPRanges_ipv4: added range: 185.XXX.YYY.0 - 185.XXX.YYY.3&lt;BR /&gt;[vpnd 18908 4071475200]@FW-CPPT-3080[3 Oct 14:36:35][ikev2] constructRelevantIPRanges_ipv4: checking range:185.XXX.YYY.0 - 185.XXX.YYY.3&lt;BR /&gt;[vpnd 18908 4071475200]@FW-CPPT-3080[3 Oct 14:36:35][ikev2] constructRelevantIPRanges_ipv4: added range: 185.XXX.YYY.0 - 185.XXX.YYY.3&lt;BR /&gt;[vpnd 18908 4071475200]@FW-CPPT-3080[3 Oct 14:36:35][ikev2] TSPayload::getContainingTS: Try specific protocol/port (6/179) num_range: 1. addresses in ranges: 4 (4)&lt;BR /&gt;[vpnd 18908 4071475200]@FW-CPPT-3080[3 Oct 14:36:35][ikev2] TSPayload::getContainingTS: Returning empty TS. Proto: 6&lt;BR /&gt;[vpnd 18908 4071475200]@FW-CPPT-3080[3 Oct 14:36:35][ikev2] ikeChildSAExchange_i::validateTSiPayload: empty traffic selector.&lt;BR /&gt;[vpnd 18908 4071475200]@FW-CPPT-3080[3 Oct 14:36:35][ikev2] Exchange::processPayloads: problem processing payload no. 4 of type TS-i payload&lt;BR /&gt;[vpnd 18908 4071475200]@FW-CPPT-3080[3 Oct 14:36:35][ikev2] Exchange::processPayloads: processPayloads returning initial status&lt;BR /&gt;[vpnd 18908 4071475200]@FW-CPPT-3080[3 Oct 14:36:35][ikev2] Exchange::setStatus: Changing status from: initial to: failure (final)..&lt;BR /&gt;[vpnd 18908 4071475200]@FW-CPPT-3080[3 Oct 14:36:35][ikev2] Exchange::setLog: Setting log message:&lt;BR /&gt;Peer's message is unacceptable..&lt;/P&gt;&lt;P&gt;Do you have any idea?&amp;nbsp;&lt;/P&gt;&lt;P&gt;Could it be a mismatch between route based and policy based ?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;SPAN class=""&gt;&amp;nbsp;Thank you&lt;BR /&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;SPAN class=""&gt;Thomas&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 03 Oct 2024 13:19:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issue-with-VPN-between-Checkpoint-and-AWS/m-p/228859#M44077</guid>
      <dc:creator>ThomasPP</dc:creator>
      <dc:date>2024-10-03T13:19:02Z</dc:date>
    </item>
    <item>
      <title>Re: Issue with VPN between Checkpoint and AWS</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issue-with-VPN-between-Checkpoint-and-AWS/m-p/228863#M44078</link>
      <description>&lt;P&gt;What steps did you follow to configure this?&lt;BR /&gt;It’s not necessarily an issue with route versus domain VPN, but it does indicate a configuration mismatch.&lt;/P&gt;</description>
      <pubDate>Thu, 03 Oct 2024 13:36:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issue-with-VPN-between-Checkpoint-and-AWS/m-p/228863#M44078</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-10-03T13:36:17Z</dc:date>
    </item>
    <item>
      <title>Re: Issue with VPN between Checkpoint and AWS</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issue-with-VPN-between-Checkpoint-and-AWS/m-p/228864#M44079</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;We followed the following links :&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;A class="" href="https://docs.aws.amazon.com/vpn/latest/s2svpn/cgw-dynamic-routing-example-interface.html" target="_blank" rel="noopener noreferrer"&gt;https://docs.aws.amazon.com/vpn/latest/s2svpn/cgw-dynamic-routing-example-interface.html&lt;/A&gt;&lt;/LI&gt;&lt;LI&gt;&lt;A class="" href="https://support.checkpoint.com/results/sk/sk108958" target="_blank" rel="noopener noreferrer"&gt;https://support.checkpoint.com/results/sk/sk108958&lt;/A&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;And our partners sent us the configuration files from AWS.&lt;/P&gt;</description>
      <pubDate>Thu, 03 Oct 2024 13:38:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issue-with-VPN-between-Checkpoint-and-AWS/m-p/228864#M44079</guid>
      <dc:creator>ThomasPP</dc:creator>
      <dc:date>2024-10-03T13:38:18Z</dc:date>
    </item>
    <item>
      <title>Re: Issue with VPN between Checkpoint and AWS</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issue-with-VPN-between-Checkpoint-and-AWS/m-p/228867#M44080</link>
      <description>&lt;P&gt;See if below post I made helps. Key here is to MAKE SURE routes are configured in a way I described. If not, traffic will never work. If you need more help, let me know. I know this is for Azure, but exact same method applies to AWS.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.checkpoint.com/t5/Security-Gateways/Route-based-VPN-tunnel-to-Azure/m-p/206179/emcs_t/S2h8ZW1haWx8dG9waWNfc3Vic2NyaXB0aW9ufExTTjlYV1FXMUlGQVNMfDIwNjE3OXxTVUJTQ1JJUFRJT05TfGhL#M38950" target="_blank"&gt;https://community.checkpoint.com/t5/Security-Gateways/Route-based-VPN-tunnel-to-Azure/m-p/206179/emcs_t/S2h8ZW1haWx8dG9waWNfc3Vic2NyaXB0aW9ufExTTjlYV1FXMUlGQVNMfDIwNjE3OXxTVUJTQ1JJUFRJT05TfGhL#M38950&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 03 Oct 2024 14:32:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issue-with-VPN-between-Checkpoint-and-AWS/m-p/228867#M44080</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-10-03T14:32:00Z</dc:date>
    </item>
    <item>
      <title>Re: Issue with VPN between Checkpoint and AWS</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issue-with-VPN-between-Checkpoint-and-AWS/m-p/228869#M44081</link>
      <description>&lt;P&gt;In your VPN Community, what do you have configured for Tunnel Sharing?&lt;BR /&gt;I believe it should be "one per gateway" as shown below.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/27988iD7D84449408A282D/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 03 Oct 2024 14:32:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issue-with-VPN-between-Checkpoint-and-AWS/m-p/228869#M44081</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-10-03T14:32:47Z</dc:date>
    </item>
    <item>
      <title>Re: Issue with VPN between Checkpoint and AWS</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issue-with-VPN-between-Checkpoint-and-AWS/m-p/228873#M44082</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;We have configured "one vpn tunnel per Gateway" :&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2024-10-03 16_35_14-vm-itm-mgt-3 - Connexion Bureau à distance.png" style="width: 706px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/27990iE4897E07CB7C1AE4/image-size/large?v=v2&amp;amp;px=999" role="button" title="2024-10-03 16_35_14-vm-itm-mgt-3 - Connexion Bureau à distance.png" alt="2024-10-03 16_35_14-vm-itm-mgt-3 - Connexion Bureau à distance.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;We are trying to use BGP routing for the first time but it seems that BGP traffic is not flowing through the VPN (it is dropped, see first post) :&lt;/P&gt;&lt;P&gt;&lt;EM&gt;@;294556582;[cpu_6];[fw4_19];fw_log_drop_ex: Packet proto=6 169.254.131.30:35776 -&amp;gt; 169.254.131.29:179 dropped by fw_ipsec_encrypt_on_tunnel_instance Reason: No error - tunnel is not yet established;&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 03 Oct 2024 14:40:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issue-with-VPN-between-Checkpoint-and-AWS/m-p/228873#M44082</guid>
      <dc:creator>ThomasPP</dc:creator>
      <dc:date>2024-10-03T14:40:35Z</dc:date>
    </item>
    <item>
      <title>Re: Issue with VPN between Checkpoint and AWS</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issue-with-VPN-between-Checkpoint-and-AWS/m-p/228876#M44085</link>
      <description>&lt;P&gt;Here is what I had learned doing extensive testing with a colleague for BGP through route based tunnels...key is to use UNNUMBERED vtis for that to work. Why, dont ask me, as I have no clue in the world, but I even mentioned this to TAC once after being on the phone 5 hours troubleshooting the issue.&lt;/P&gt;
&lt;P&gt;We actually fixed it in Azure lab the next day.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Thu, 03 Oct 2024 14:45:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issue-with-VPN-between-Checkpoint-and-AWS/m-p/228876#M44085</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-10-03T14:45:31Z</dc:date>
    </item>
    <item>
      <title>Re: Issue with VPN between Checkpoint and AWS</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issue-with-VPN-between-Checkpoint-and-AWS/m-p/228914#M44094</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;Thank you for your reply.&lt;/P&gt;&lt;P&gt;When using unnumbered VTIs, you don't need to set any ip address? In that case, how do you set up BGP peers?&lt;/P&gt;&lt;P&gt;Thomas&lt;/P&gt;</description>
      <pubDate>Fri, 04 Oct 2024 05:38:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issue-with-VPN-between-Checkpoint-and-AWS/m-p/228914#M44094</guid>
      <dc:creator>ThomasPP</dc:creator>
      <dc:date>2024-10-04T05:38:36Z</dc:date>
    </item>
    <item>
      <title>Re: Issue with VPN between Checkpoint and AWS</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issue-with-VPN-between-Checkpoint-and-AWS/m-p/228923#M44099</link>
      <description>&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk176249" target="_blank" rel="noopener"&gt;sk176249&lt;/A&gt; is very well written and while it pertains to Azure VWAN, the concept of route-based VPN with BGP is common to cloud implementations. You can adapt the Azure parts to AWS and it should work.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 04 Oct 2024 09:43:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issue-with-VPN-between-Checkpoint-and-AWS/m-p/228923#M44099</guid>
      <dc:creator>Alex-</dc:creator>
      <dc:date>2024-10-04T09:43:11Z</dc:date>
    </item>
    <item>
      <title>Re: Issue with VPN between Checkpoint and AWS</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issue-with-VPN-between-Checkpoint-and-AWS/m-p/228924#M44100</link>
      <description>&lt;P&gt;Thats right, thats why its called unnumbered. BGP, you configure it like you normally would.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Fri, 04 Oct 2024 09:44:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issue-with-VPN-between-Checkpoint-and-AWS/m-p/228924#M44100</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-10-04T09:44:19Z</dc:date>
    </item>
  </channel>
</rss>

