<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: CP-to-CP Site-to-Site VPN woes in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CP-to-CP-Site-to-Site-VPN-woes/m-p/233299#M45124</link>
    <description>&lt;P&gt;Same thing, unable to do the key install, "Certificate defaultCert cannot be validated.", "Could not retrieve CRL."&lt;/P&gt;&lt;P&gt;From onsite at FW-DR I can access the ICA_CRL1.crl of FW-MGMT over port 18264 using the external IP, it's just that the FW itself keeps trying to use the internal address it seems.&lt;/P&gt;&lt;P&gt;I have FW-DR in a VPN community by itself for now to figure out this issue so not like it's getting stuck in a VPN loop either&lt;/P&gt;</description>
    <pubDate>Wed, 20 Nov 2024 17:01:47 GMT</pubDate>
    <dc:creator>klps</dc:creator>
    <dc:date>2024-11-20T17:01:47Z</dc:date>
    <item>
      <title>CP-to-CP Site-to-Site VPN woes</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CP-to-CP-Site-to-Site-VPN-woes/m-p/232712#M44976</link>
      <description>&lt;P&gt;Been trying to figure this out for a couple weeks now and getting nowhere.&lt;/P&gt;&lt;P&gt;Running R81.20 on all devices.&lt;/P&gt;&lt;P&gt;2 5200's in a cluster we'll call FW-HA, FW-MGMT server behind them&lt;/P&gt;&lt;P&gt;A new 6200 at a remote site called FW-DR&lt;/P&gt;&lt;P&gt;Have everything communicating and looking good for policy pushing but can't get the VPN to come up&lt;/P&gt;&lt;P&gt;Key install logs from FW-HA side have IKE showing&amp;nbsp; Phase1 Received Notification from Peer: invalid certificate&lt;/P&gt;&lt;P&gt;Key install logs from FW-DR side show&amp;nbsp;Main Mode Sent Notification to Peer: invalid certificate&lt;/P&gt;&lt;P&gt;Also have a reject showing in the logs from FW-DR trying to communicate with FW-HA citing a gateway to gateway authentication failure and under IKE "Main Mode Could not retrieve CRL.CN=FW-HA VPN Certificate,O=FW-MGMT"&lt;/P&gt;&lt;P&gt;We have an existing star network VPN to a CP appliance that is working that I've tried adding FW-DR as an additional remote site to with same results, have tried matching all NAT and security rules to be like the functioning VPN with no change.&lt;/P&gt;&lt;P&gt;Unsure of where to go from here. Thanks&lt;/P&gt;&lt;P&gt;To add, I have tried&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/sk/sk32648" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk32648&lt;/A&gt;&amp;nbsp;but oddly I don't see any communication port&amp;nbsp;18264 whatsoever between any of our gateway's and the management server even for everything that's working as it should. And I can't apply&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/sk/sk66381" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk66381&lt;/A&gt;&amp;nbsp;as I get the error "applying NAT on security gateway control connections is allowed only when the rule is installed on a single gateway", but also our other gateway and it's VPN work fine without this&lt;/P&gt;</description>
      <pubDate>Thu, 14 Nov 2024 13:17:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CP-to-CP-Site-to-Site-VPN-woes/m-p/232712#M44976</guid>
      <dc:creator>klps</dc:creator>
      <dc:date>2024-11-14T13:17:16Z</dc:date>
    </item>
    <item>
      <title>Re: CP-to-CP Site-to-Site VPN woes</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CP-to-CP-Site-to-Site-VPN-woes/m-p/232805#M44998</link>
      <description>&lt;P&gt;Have you checked if the VPN certificate is still valid?&lt;/P&gt;
&lt;P&gt;You can see that if you open the FW object in SmartConsole under ipsecVPN and then renew/view&lt;/P&gt;
&lt;P&gt;Maybe worth renew it anyway on both members (after renew policy push).&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Try to see the CRL traffic with tcpdump to be 100% sure it is sending yes or no. And if other side get's the traffic.&lt;/P&gt;
&lt;P&gt;Sometimes firewall tries to do CRL via VPN tunnel towards management system that will create a looping issue &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;tcpdump -nnei any port 18264&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 14 Nov 2024 21:21:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CP-to-CP-Site-to-Site-VPN-woes/m-p/232805#M44998</guid>
      <dc:creator>Lesley</dc:creator>
      <dc:date>2024-11-14T21:21:46Z</dc:date>
    </item>
    <item>
      <title>Re: CP-to-CP Site-to-Site VPN woes</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CP-to-CP-Site-to-Site-VPN-woes/m-p/232807#M44999</link>
      <description>&lt;P&gt;Exactly, there will be some issue with CRL and/or certificates between MGMT and FWs. If FW-HA and FW-DR are managed by the same FW-MGMT, for VPN establishment the certificates and used (not pre-shared keys).&lt;/P&gt;
&lt;P&gt;It can also happen that ICA cert on MGMT is expired.&lt;/P&gt;
&lt;P&gt;There might be some communication dropped (tcp/18264) between FWs and MGMT which is used for CRL downloads.&lt;/P&gt;</description>
      <pubDate>Thu, 14 Nov 2024 21:36:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CP-to-CP-Site-to-Site-VPN-woes/m-p/232807#M44999</guid>
      <dc:creator>JozkoMrkvicka</dc:creator>
      <dc:date>2024-11-14T21:36:28Z</dc:date>
    </item>
    <item>
      <title>Re: CP-to-CP Site-to-Site VPN woes</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CP-to-CP-Site-to-Site-VPN-woes/m-p/232829#M45002</link>
      <description>&lt;P&gt;I agree with the points made. If you renew vpn certs and test, may start working. If not, then do simple debug as per below and examine vpnd and ike* files in $FWDIR/log&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;
&lt;P&gt;vpn debug trunc&lt;/P&gt;
&lt;P&gt;vpn debug ikeon&lt;/P&gt;
&lt;P&gt;-test traffic&lt;/P&gt;
&lt;P&gt;vpn debug ikeoff&lt;/P&gt;</description>
      <pubDate>Thu, 14 Nov 2024 22:45:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CP-to-CP-Site-to-Site-VPN-woes/m-p/232829#M45002</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-11-14T22:45:02Z</dc:date>
    </item>
    <item>
      <title>Re: CP-to-CP Site-to-Site VPN woes</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CP-to-CP-Site-to-Site-VPN-woes/m-p/233289#M45118</link>
      <description>&lt;P&gt;Got tied up in another project but now am back on this.&lt;/P&gt;&lt;P&gt;Thanks for the info, the tcpdump has given me direction.&lt;/P&gt;&lt;P&gt;It appears it comes down to FW-DR not being able to get the cert from FW-MGMT which sits behind FW-HA.&lt;/P&gt;&lt;P&gt;I can see in the tcpdump that FW-DR is trying to connect to the internal address on FW-MGMT to retrieve the certificate. A NAT rule on FW-DR to translate the internal 10.x.x.x address of FW-MGMT to the external IP doesn't seem to be having any effect.&amp;nbsp;I'm not sure what was done on our other site firewall to get it to communicate on the external IP for certs as our original firewalls were upgraded by our Checkpoint seller&lt;/P&gt;&lt;P&gt;We do have a dummy management object, FW-MGMT-EXT, which has the external IP set on it, but I'm not sure how to get FW-DR to use that object to retrieve its certs&lt;/P&gt;</description>
      <pubDate>Wed, 20 Nov 2024 16:26:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CP-to-CP-Site-to-Site-VPN-woes/m-p/233289#M45118</guid>
      <dc:creator>klps</dc:creator>
      <dc:date>2024-11-20T16:26:48Z</dc:date>
    </item>
    <item>
      <title>Re: CP-to-CP Site-to-Site VPN woes</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CP-to-CP-Site-to-Site-VPN-woes/m-p/233291#M45119</link>
      <description>&lt;P&gt;Can you tell us please how is below configured? On the management object...&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot_1.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/28510iDF3C76C1129B286C/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Screenshot_1.png" alt="Screenshot_1.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt; &lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 20 Nov 2024 16:28:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CP-to-CP-Site-to-Site-VPN-woes/m-p/233291#M45119</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-11-20T16:28:45Z</dc:date>
    </item>
    <item>
      <title>Re: CP-to-CP Site-to-Site VPN woes</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CP-to-CP-Site-to-Site-VPN-woes/m-p/233294#M45120</link>
      <description>&lt;P&gt;Sure thing, it's currently set to hide behind gateway.&lt;/P&gt;&lt;P&gt;I'm going to try setting it explicitly to the external IP address now to see if it changes anything&lt;/P&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 20 Nov 2024 16:37:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CP-to-CP-Site-to-Site-VPN-woes/m-p/233294#M45120</guid>
      <dc:creator>klps</dc:creator>
      <dc:date>2024-11-20T16:37:00Z</dc:date>
    </item>
    <item>
      <title>Re: CP-to-CP Site-to-Site VPN woes</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CP-to-CP-Site-to-Site-VPN-woes/m-p/233295#M45121</link>
      <description>&lt;P&gt;I have a gut feeling that will help.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Wed, 20 Nov 2024 16:42:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CP-to-CP-Site-to-Site-VPN-woes/m-p/233295#M45121</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-11-20T16:42:27Z</dc:date>
    </item>
    <item>
      <title>Re: CP-to-CP Site-to-Site VPN woes</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CP-to-CP-Site-to-Site-VPN-woes/m-p/233296#M45122</link>
      <description>&lt;P&gt;Unfortunately not, can still see it trying the internal 10.x.x.x address on port 18264 after a policy push&lt;/P&gt;</description>
      <pubDate>Wed, 20 Nov 2024 16:54:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CP-to-CP-Site-to-Site-VPN-woes/m-p/233296#M45122</guid>
      <dc:creator>klps</dc:creator>
      <dc:date>2024-11-20T16:54:25Z</dc:date>
    </item>
    <item>
      <title>Re: CP-to-CP Site-to-Site VPN woes</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CP-to-CP-Site-to-Site-VPN-woes/m-p/233297#M45123</link>
      <description>&lt;P&gt;What is the error now? Is it still related to certificate?&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Wed, 20 Nov 2024 16:56:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CP-to-CP-Site-to-Site-VPN-woes/m-p/233297#M45123</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-11-20T16:56:13Z</dc:date>
    </item>
    <item>
      <title>Re: CP-to-CP Site-to-Site VPN woes</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CP-to-CP-Site-to-Site-VPN-woes/m-p/233299#M45124</link>
      <description>&lt;P&gt;Same thing, unable to do the key install, "Certificate defaultCert cannot be validated.", "Could not retrieve CRL."&lt;/P&gt;&lt;P&gt;From onsite at FW-DR I can access the ICA_CRL1.crl of FW-MGMT over port 18264 using the external IP, it's just that the FW itself keeps trying to use the internal address it seems.&lt;/P&gt;&lt;P&gt;I have FW-DR in a VPN community by itself for now to figure out this issue so not like it's getting stuck in a VPN loop either&lt;/P&gt;</description>
      <pubDate>Wed, 20 Nov 2024 17:01:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CP-to-CP-Site-to-Site-VPN-woes/m-p/233299#M45124</guid>
      <dc:creator>klps</dc:creator>
      <dc:date>2024-11-20T17:01:47Z</dc:date>
    </item>
    <item>
      <title>Re: CP-to-CP Site-to-Site VPN woes</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CP-to-CP-Site-to-Site-VPN-woes/m-p/233305#M45129</link>
      <description>&lt;P&gt;Are you able to quickly renew vpn cert and install the policy and test again?&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Wed, 20 Nov 2024 17:15:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CP-to-CP-Site-to-Site-VPN-woes/m-p/233305#M45129</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-11-20T17:15:40Z</dc:date>
    </item>
    <item>
      <title>Re: CP-to-CP Site-to-Site VPN woes</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CP-to-CP-Site-to-Site-VPN-woes/m-p/233306#M45130</link>
      <description>&lt;P&gt;You can also run below on mgmt to verify certs validity.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.checkpoint.com/t5/Scripts/Valid-Certificates-Overview-Oneliner/m-p/179954" target="_blank"&gt;https://community.checkpoint.com/t5/Scripts/Valid-Certificates-Overview-Oneliner/m-p/179954&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 20 Nov 2024 17:16:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CP-to-CP-Site-to-Site-VPN-woes/m-p/233306#M45130</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-11-20T17:16:57Z</dc:date>
    </item>
    <item>
      <title>Re: CP-to-CP Site-to-Site VPN woes</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CP-to-CP-Site-to-Site-VPN-woes/m-p/233308#M45131</link>
      <description>&lt;P&gt;All of our SIC and IKE certs are good, that is a handy command to have though, thanks&lt;/P&gt;&lt;P&gt;I've been renewing the FW-DR cert almost every time I make a troubleshooting change now to force the key install to attempt sooner so definitely not expired.&lt;/P&gt;</description>
      <pubDate>Wed, 20 Nov 2024 17:21:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CP-to-CP-Site-to-Site-VPN-woes/m-p/233308#M45131</guid>
      <dc:creator>klps</dc:creator>
      <dc:date>2024-11-20T17:21:27Z</dc:date>
    </item>
    <item>
      <title>Re: CP-to-CP Site-to-Site VPN woes</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CP-to-CP-Site-to-Site-VPN-woes/m-p/233309#M45132</link>
      <description>&lt;P&gt;I get it, thats fair enough. I will tell you I had situation like yours twice with clients and once they renewed the vpn cert and installed the policy, all worked, though they were NOT expired. Now, Im not saying that would fix it for you, but cant make it worse either.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Wed, 20 Nov 2024 17:23:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CP-to-CP-Site-to-Site-VPN-woes/m-p/233309#M45132</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-11-20T17:23:13Z</dc:date>
    </item>
    <item>
      <title>Re: CP-to-CP Site-to-Site VPN woes</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CP-to-CP-Site-to-Site-VPN-woes/m-p/233357#M45146</link>
      <description>&lt;P&gt;Go back to sk66381. Check the control connections checkbox. From the drop down, choose the one gateway that sits in front of the management server (unless this is a CloudGuard management server). &amp;nbsp;Install policy to all gateways. &amp;nbsp;Should be good to go.&lt;/P&gt;</description>
      <pubDate>Thu, 21 Nov 2024 06:04:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CP-to-CP-Site-to-Site-VPN-woes/m-p/233357#M45146</guid>
      <dc:creator>Duane_Toler</dc:creator>
      <dc:date>2024-11-21T06:04:53Z</dc:date>
    </item>
    <item>
      <title>Re: CP-to-CP Site-to-Site VPN woes</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CP-to-CP-Site-to-Site-VPN-woes/m-p/233366#M45151</link>
      <description>&lt;P&gt;Seems like it should be being sent as part of IKE, do you have caching disabled?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk116340" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk116340&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 21 Nov 2024 08:46:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CP-to-CP-Site-to-Site-VPN-woes/m-p/233366#M45151</guid>
      <dc:creator>emmap</dc:creator>
      <dc:date>2024-11-21T08:46:21Z</dc:date>
    </item>
    <item>
      <title>Re: CP-to-CP Site-to-Site VPN woes</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CP-to-CP-Site-to-Site-VPN-woes/m-p/233392#M45159</link>
      <description>&lt;P&gt;I decided to try this again and this time it has worked. I don't know if something else I changed along the way allowed this to work this time or what. But just glad the VPN is coming up now.&lt;/P&gt;</description>
      <pubDate>Thu, 21 Nov 2024 11:56:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CP-to-CP-Site-to-Site-VPN-woes/m-p/233392#M45159</guid>
      <dc:creator>klps</dc:creator>
      <dc:date>2024-11-21T11:56:11Z</dc:date>
    </item>
    <item>
      <title>Re: CP-to-CP Site-to-Site VPN woes</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CP-to-CP-Site-to-Site-VPN-woes/m-p/233400#M45161</link>
      <description>&lt;P&gt;All gateways managed by this management server need to contact it on port 18264 every 24 hours for CRL updates. &amp;nbsp;Otherwise the VPN dies. &amp;nbsp;Login to your remote gateway as expert mode and make sure you can Telnet to the management server NAT IP on port 18264:&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;telnet &amp;lt;public ip&amp;gt; 18264&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;You need to get a response saying it is connected. &amp;nbsp;Press Control and ] like the prompt says, then type “quit”. You’re good to go. Keep a close eye on this for the next 24 hours, however. &amp;nbsp;It will be at the precise 24 hour mark, too; not 1 second late.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Good luck!&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 21 Nov 2024 13:09:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CP-to-CP-Site-to-Site-VPN-woes/m-p/233400#M45161</guid>
      <dc:creator>Duane_Toler</dc:creator>
      <dc:date>2024-11-21T13:09:02Z</dc:date>
    </item>
  </channel>
</rss>

