<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cross-site communication problem in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Cross-site-communication-problem/m-p/241244#M46799</link>
    <description>&lt;P&gt;On one hand, you say Site A has a 3600, yet on the very next line you say "site A has no firewall, but an AD server behind a Mikrotik router"...which is it?&lt;BR /&gt;A simple network diagram showing all the mentioned components would help tremendously.&lt;/P&gt;
&lt;P&gt;What troubleshooting has been done so far on this issue?&lt;BR /&gt;Do you see logs on the Check Point that the traffic has been accepted, for instance?&lt;BR /&gt;Have you use a tcpdump or fw monitor to verify the traffic is leaving the gateway through the VPN tunnel?&lt;BR /&gt;Have you run any debugs on the traffic in question?&lt;/P&gt;
&lt;P&gt;The following (which I got from AI Copilot, but looks correct) might help to understand what is going on.&lt;BR /&gt;Please make sure to follow the mandatory guidelines to minimize the potential impact of this operation:&lt;/P&gt;
&lt;DIV class="ai-chatbot-conversation-assistant-text css-1m564fq"&gt;
&lt;P&gt;&lt;STRONG&gt;Mandatory Guidelines:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;The kernel debug is a heavy operation and might cause a machine to hang or even crash.&lt;/LI&gt;
&lt;LI&gt;Perform this operation only during a maintenance window due to the high impact it might have.&lt;/LI&gt;
&lt;LI&gt;Ensure you have a console connection available in case the machine hangs.&lt;/LI&gt;
&lt;LI&gt;Validate before and after the operation that the state of the machine is stable (no high CPU, etc).&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3&gt;Debug Procedure&lt;/H3&gt;
&lt;OL&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Connect to the command line on the Security Gateway / each Cluster Member three times - open three separate shell windows:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;1st shell window: to run the VPN user space debug and the kernel debug.&lt;/LI&gt;
&lt;LI&gt;2nd shell window: to run the FW Monitor traffic capture.&lt;/LI&gt;
&lt;LI&gt;3rd shell window: to run the TCPdump traffic capture.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;In each shell window, log in to the Expert mode.&lt;/STRONG&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Start the FW Monitor traffic capture in the 2nd shell:&lt;/STRONG&gt;&lt;/P&gt;
&lt;PRE&gt;&lt;CODE class="language-bash"&gt;fw monitor -F "&amp;lt;Source IP&amp;gt;,&amp;lt;Source Port&amp;gt;,&amp;lt;Dest IP&amp;gt;,&amp;lt;Dest Port&amp;gt;,&amp;lt;Protocol Number&amp;gt;" -o /var/log/fw_mon_traffic.cap
&lt;BUTTON&gt;&lt;/BUTTON&gt;&lt;/CODE&gt;&lt;/PRE&gt;
&lt;UL&gt;
&lt;LI&gt;Example:
&lt;PRE&gt;&lt;CODE class="language-bash"&gt;fw monitor -F "192.168.1.1,0,192.168.2.1,0,0" -o /var/log/fw_mon_traffic.cap
&lt;BUTTON&gt;&lt;/BUTTON&gt;&lt;/CODE&gt;&lt;/PRE&gt;
&lt;/LI&gt;
&lt;LI&gt;This captures traffic between&lt;CODE&gt;192.168.1.1&lt;BUTTON&gt;&lt;/BUTTON&gt;&lt;/CODE&gt;and&lt;CODE&gt;192.168.2.1&lt;BUTTON&gt;&lt;/BUTTON&gt;&lt;/CODE&gt;.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Start the kernel debug in the 1st shell:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Configure the applicable kernel debug filters for VPN peers to decrease the number of debug messages:
&lt;PRE&gt;&lt;CODE class="language-bash"&gt;fw ctl set str simple_debug_filter_vpn_1 '&amp;lt;IPv4_Address_#1_of_VPN_Peer&amp;gt;' -a
fw ctl set str simple_debug_filter_vpn_2 '&amp;lt;IPv4_Address_#2_of_VPN_Peer&amp;gt;' -a
&lt;BUTTON&gt;&lt;/BUTTON&gt;&lt;/CODE&gt;&lt;/PRE&gt;
&lt;/LI&gt;
&lt;LI&gt;Example:
&lt;PRE&gt;&lt;CODE class="language-bash"&gt;fw ctl set str simple_debug_filter_vpn_1 '192.168.1.1' -a
fw ctl set str simple_debug_filter_vpn_2 '192.168.2.1' -a
&lt;BUTTON&gt;&lt;/BUTTON&gt;&lt;/CODE&gt;&lt;/PRE&gt;
&lt;/LI&gt;
&lt;LI&gt;Start the kernel debug and save its output in a file:
&lt;PRE&gt;&lt;CODE class="language-bash"&gt;fw ctl kdebug -T -f &amp;gt; /var/log/kernel_debug.txt
&lt;BUTTON&gt;&lt;/BUTTON&gt;&lt;/CODE&gt;&lt;/PRE&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Start the TCPdump traffic capture on the external VPN interface in the 3rd shell:&lt;/STRONG&gt;&lt;/P&gt;
&lt;PRE&gt;&lt;CODE class="language-bash"&gt;tcpdump -p -e -n -i &amp;lt;Name of VPN Interface&amp;gt; -w /var/log/tcpdump.cap
&lt;BUTTON&gt;&lt;/BUTTON&gt;&lt;/CODE&gt;&lt;/PRE&gt;
&lt;UL&gt;
&lt;LI&gt;Example:
&lt;PRE&gt;&lt;CODE class="language-bash"&gt;tcpdump -p -e -n -i eth1 -w /var/log/tcpdump.cap
&lt;BUTTON&gt;&lt;/BUTTON&gt;&lt;/CODE&gt;&lt;/PRE&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Replicate the issue or wait for the issue to occur. Make sure the problem was replicated.&lt;/STRONG&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Stop the kernel debug in the 1st shell:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Press&lt;CODE&gt;CTRL + C&lt;BUTTON&gt;&lt;/BUTTON&gt;&lt;/CODE&gt;to stop the kernel debug.&lt;/LI&gt;
&lt;LI&gt;Reset the VPN and Firewall kernel debug flags:
&lt;PRE&gt;&lt;CODE class="language-bash"&gt;fw ctl debug 0
&lt;BUTTON&gt;&lt;/BUTTON&gt;&lt;/CODE&gt;&lt;/PRE&gt;
&lt;/LI&gt;
&lt;LI&gt;Reset the SecureXL debug flags:
&lt;PRE&gt;&lt;CODE class="language-bash"&gt;fwaccel dbg resetall
&lt;BUTTON&gt;&lt;/BUTTON&gt;&lt;/CODE&gt;&lt;/PRE&gt;
&lt;/LI&gt;
&lt;LI&gt;Reset the kernel debug filters:
&lt;PRE&gt;&lt;CODE class="language-bash"&gt;fw ctl set int simple_debug_filter_off 1
&lt;BUTTON&gt;&lt;/BUTTON&gt;&lt;/CODE&gt;&lt;/PRE&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Stop the VPN user space debug:&lt;/STRONG&gt;&lt;/P&gt;
&lt;PRE&gt;&lt;CODE class="language-bash"&gt;vpn debug off
&lt;BUTTON&gt;&lt;/BUTTON&gt;&lt;/CODE&gt;&lt;/PRE&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Stop the TCPdump traffic capture in the 3rd shell:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Press&lt;CODE&gt;CTRL + C&lt;BUTTON&gt;&lt;/BUTTON&gt;&lt;/CODE&gt;to stop the TCPdump capture.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Collect the debug files:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;CODE&gt;/var/log/fw_mon_traffic.cap&lt;BUTTON&gt;&lt;/BUTTON&gt;&lt;/CODE&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;CODE&gt;/var/log/kernel_debug.txt&lt;BUTTON&gt;&lt;/BUTTON&gt;&lt;/CODE&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;CODE&gt;/var/log/tcpdump.cap&lt;BUTTON&gt;&lt;/BUTTON&gt;&lt;/CODE&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;These steps will help you collect the necessary debug information for traffic between two IP addresses across a site-to-site VPN.&lt;/P&gt;
&lt;/DIV&gt;
&lt;DIV class="css-1lj4tcw"&gt;
&lt;DIV class="css-1ggc6ok"&gt;
&lt;DIV&gt;BE AWARE&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV class="css-rtx1wd"&gt;Important - To prevent negative impact on your production environment, double-check the provided information in the Administration Guide for the involved product.&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV class="ai-chatbot-references css-g9n3fs"&gt;
&lt;DIV class="css-131f8vm"&gt;Learn more:&lt;/DIV&gt;
&lt;DIV class="css-zs1iv6"&gt;
&lt;OL class="css-3yupri"&gt;
&lt;LI class="ai-chatbot-reference css-1onth16"&gt;&lt;A class="css-a3bjub" href="http://support.checkpoint.com/results/sk/sk180488" target="_blank" rel="noopener"&gt;sk180488 - How to collect a debug for VPN issues&lt;/A&gt;&lt;/LI&gt;
&lt;LI class="ai-chatbot-reference css-1onth16"&gt;&lt;A class="css-a3bjub" href="http://support.checkpoint.com/results/sk/sk41317" target="_blank" rel="noopener"&gt;sk41317 - How to read an IKE.elg debug file&lt;/A&gt;&lt;/LI&gt;
&lt;LI class="ai-chatbot-reference css-1onth16"&gt;&lt;A class="css-a3bjub" href="https://sc1.checkpoint.com/documents/R80.40/WebAdminGuides/EN/CP_R80.40_SitetoSiteVPN_AdminGuide/Topics-VPNSG/CLI/vpn-debug.htm" target="_blank" rel="noopener"&gt;R80.40 Site to Site VPN Administration Guide - vpn-debug&lt;/A&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;</description>
    <pubDate>Fri, 14 Feb 2025 20:38:29 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2025-02-14T20:38:29Z</dc:date>
    <item>
      <title>Cross-site communication problem</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Cross-site-communication-problem/m-p/241222#M46798</link>
      <description>&lt;P&gt;Good evening,&lt;BR /&gt;here is my problem:&lt;BR /&gt;I have 2 sites A and B, site A has a CP 3600 behind which run 2 AD servers, a web server and 1 SQL server.&lt;BR /&gt;on site A there's no firewall, but an AD server connected behind a Mikrotik router. the site-to-site vpn between the Mikrotik routers works well and the AD servers on sites A and B synchronize directly.&lt;BR /&gt;i installed a NetBackup backup server on site B, no communication problems between the NetBackup server and site B's AD server.&lt;BR /&gt;but it's impossible to reach the servers at site A on port 1556 and 13724, even though they're open on the servers and the CP.&lt;BR /&gt;a Mngnt_master object is created for the backup server on site B 172.16.0.6 and the objects for the servers on site A 192.168.1.X. a rule is created in the firewall to let the connection go through, but it doesn't work.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Capture d'écran 2025-02-14 155427.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/29619i84214BE0B748AB84/image-size/large?v=v2&amp;amp;px=999" role="button" title="Capture d'écran 2025-02-14 155427.png" alt="Capture d'écran 2025-02-14 155427.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;i'd like to know if the problem comes from the CP, then how to open the ports correctly on the CP.&lt;BR /&gt;thank you.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 14 Feb 2025 16:11:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Cross-site-communication-problem/m-p/241222#M46798</guid>
      <dc:creator>junior_kakou</dc:creator>
      <dc:date>2025-02-14T16:11:55Z</dc:date>
    </item>
    <item>
      <title>Re: Cross-site communication problem</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Cross-site-communication-problem/m-p/241244#M46799</link>
      <description>&lt;P&gt;On one hand, you say Site A has a 3600, yet on the very next line you say "site A has no firewall, but an AD server behind a Mikrotik router"...which is it?&lt;BR /&gt;A simple network diagram showing all the mentioned components would help tremendously.&lt;/P&gt;
&lt;P&gt;What troubleshooting has been done so far on this issue?&lt;BR /&gt;Do you see logs on the Check Point that the traffic has been accepted, for instance?&lt;BR /&gt;Have you use a tcpdump or fw monitor to verify the traffic is leaving the gateway through the VPN tunnel?&lt;BR /&gt;Have you run any debugs on the traffic in question?&lt;/P&gt;
&lt;P&gt;The following (which I got from AI Copilot, but looks correct) might help to understand what is going on.&lt;BR /&gt;Please make sure to follow the mandatory guidelines to minimize the potential impact of this operation:&lt;/P&gt;
&lt;DIV class="ai-chatbot-conversation-assistant-text css-1m564fq"&gt;
&lt;P&gt;&lt;STRONG&gt;Mandatory Guidelines:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;The kernel debug is a heavy operation and might cause a machine to hang or even crash.&lt;/LI&gt;
&lt;LI&gt;Perform this operation only during a maintenance window due to the high impact it might have.&lt;/LI&gt;
&lt;LI&gt;Ensure you have a console connection available in case the machine hangs.&lt;/LI&gt;
&lt;LI&gt;Validate before and after the operation that the state of the machine is stable (no high CPU, etc).&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3&gt;Debug Procedure&lt;/H3&gt;
&lt;OL&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Connect to the command line on the Security Gateway / each Cluster Member three times - open three separate shell windows:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;1st shell window: to run the VPN user space debug and the kernel debug.&lt;/LI&gt;
&lt;LI&gt;2nd shell window: to run the FW Monitor traffic capture.&lt;/LI&gt;
&lt;LI&gt;3rd shell window: to run the TCPdump traffic capture.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;In each shell window, log in to the Expert mode.&lt;/STRONG&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Start the FW Monitor traffic capture in the 2nd shell:&lt;/STRONG&gt;&lt;/P&gt;
&lt;PRE&gt;&lt;CODE class="language-bash"&gt;fw monitor -F "&amp;lt;Source IP&amp;gt;,&amp;lt;Source Port&amp;gt;,&amp;lt;Dest IP&amp;gt;,&amp;lt;Dest Port&amp;gt;,&amp;lt;Protocol Number&amp;gt;" -o /var/log/fw_mon_traffic.cap
&lt;BUTTON&gt;&lt;/BUTTON&gt;&lt;/CODE&gt;&lt;/PRE&gt;
&lt;UL&gt;
&lt;LI&gt;Example:
&lt;PRE&gt;&lt;CODE class="language-bash"&gt;fw monitor -F "192.168.1.1,0,192.168.2.1,0,0" -o /var/log/fw_mon_traffic.cap
&lt;BUTTON&gt;&lt;/BUTTON&gt;&lt;/CODE&gt;&lt;/PRE&gt;
&lt;/LI&gt;
&lt;LI&gt;This captures traffic between&lt;CODE&gt;192.168.1.1&lt;BUTTON&gt;&lt;/BUTTON&gt;&lt;/CODE&gt;and&lt;CODE&gt;192.168.2.1&lt;BUTTON&gt;&lt;/BUTTON&gt;&lt;/CODE&gt;.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Start the kernel debug in the 1st shell:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Configure the applicable kernel debug filters for VPN peers to decrease the number of debug messages:
&lt;PRE&gt;&lt;CODE class="language-bash"&gt;fw ctl set str simple_debug_filter_vpn_1 '&amp;lt;IPv4_Address_#1_of_VPN_Peer&amp;gt;' -a
fw ctl set str simple_debug_filter_vpn_2 '&amp;lt;IPv4_Address_#2_of_VPN_Peer&amp;gt;' -a
&lt;BUTTON&gt;&lt;/BUTTON&gt;&lt;/CODE&gt;&lt;/PRE&gt;
&lt;/LI&gt;
&lt;LI&gt;Example:
&lt;PRE&gt;&lt;CODE class="language-bash"&gt;fw ctl set str simple_debug_filter_vpn_1 '192.168.1.1' -a
fw ctl set str simple_debug_filter_vpn_2 '192.168.2.1' -a
&lt;BUTTON&gt;&lt;/BUTTON&gt;&lt;/CODE&gt;&lt;/PRE&gt;
&lt;/LI&gt;
&lt;LI&gt;Start the kernel debug and save its output in a file:
&lt;PRE&gt;&lt;CODE class="language-bash"&gt;fw ctl kdebug -T -f &amp;gt; /var/log/kernel_debug.txt
&lt;BUTTON&gt;&lt;/BUTTON&gt;&lt;/CODE&gt;&lt;/PRE&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Start the TCPdump traffic capture on the external VPN interface in the 3rd shell:&lt;/STRONG&gt;&lt;/P&gt;
&lt;PRE&gt;&lt;CODE class="language-bash"&gt;tcpdump -p -e -n -i &amp;lt;Name of VPN Interface&amp;gt; -w /var/log/tcpdump.cap
&lt;BUTTON&gt;&lt;/BUTTON&gt;&lt;/CODE&gt;&lt;/PRE&gt;
&lt;UL&gt;
&lt;LI&gt;Example:
&lt;PRE&gt;&lt;CODE class="language-bash"&gt;tcpdump -p -e -n -i eth1 -w /var/log/tcpdump.cap
&lt;BUTTON&gt;&lt;/BUTTON&gt;&lt;/CODE&gt;&lt;/PRE&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Replicate the issue or wait for the issue to occur. Make sure the problem was replicated.&lt;/STRONG&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Stop the kernel debug in the 1st shell:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Press&lt;CODE&gt;CTRL + C&lt;BUTTON&gt;&lt;/BUTTON&gt;&lt;/CODE&gt;to stop the kernel debug.&lt;/LI&gt;
&lt;LI&gt;Reset the VPN and Firewall kernel debug flags:
&lt;PRE&gt;&lt;CODE class="language-bash"&gt;fw ctl debug 0
&lt;BUTTON&gt;&lt;/BUTTON&gt;&lt;/CODE&gt;&lt;/PRE&gt;
&lt;/LI&gt;
&lt;LI&gt;Reset the SecureXL debug flags:
&lt;PRE&gt;&lt;CODE class="language-bash"&gt;fwaccel dbg resetall
&lt;BUTTON&gt;&lt;/BUTTON&gt;&lt;/CODE&gt;&lt;/PRE&gt;
&lt;/LI&gt;
&lt;LI&gt;Reset the kernel debug filters:
&lt;PRE&gt;&lt;CODE class="language-bash"&gt;fw ctl set int simple_debug_filter_off 1
&lt;BUTTON&gt;&lt;/BUTTON&gt;&lt;/CODE&gt;&lt;/PRE&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Stop the VPN user space debug:&lt;/STRONG&gt;&lt;/P&gt;
&lt;PRE&gt;&lt;CODE class="language-bash"&gt;vpn debug off
&lt;BUTTON&gt;&lt;/BUTTON&gt;&lt;/CODE&gt;&lt;/PRE&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Stop the TCPdump traffic capture in the 3rd shell:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Press&lt;CODE&gt;CTRL + C&lt;BUTTON&gt;&lt;/BUTTON&gt;&lt;/CODE&gt;to stop the TCPdump capture.&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Collect the debug files:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;CODE&gt;/var/log/fw_mon_traffic.cap&lt;BUTTON&gt;&lt;/BUTTON&gt;&lt;/CODE&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;CODE&gt;/var/log/kernel_debug.txt&lt;BUTTON&gt;&lt;/BUTTON&gt;&lt;/CODE&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;CODE&gt;/var/log/tcpdump.cap&lt;BUTTON&gt;&lt;/BUTTON&gt;&lt;/CODE&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;These steps will help you collect the necessary debug information for traffic between two IP addresses across a site-to-site VPN.&lt;/P&gt;
&lt;/DIV&gt;
&lt;DIV class="css-1lj4tcw"&gt;
&lt;DIV class="css-1ggc6ok"&gt;
&lt;DIV&gt;BE AWARE&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV class="css-rtx1wd"&gt;Important - To prevent negative impact on your production environment, double-check the provided information in the Administration Guide for the involved product.&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV class="ai-chatbot-references css-g9n3fs"&gt;
&lt;DIV class="css-131f8vm"&gt;Learn more:&lt;/DIV&gt;
&lt;DIV class="css-zs1iv6"&gt;
&lt;OL class="css-3yupri"&gt;
&lt;LI class="ai-chatbot-reference css-1onth16"&gt;&lt;A class="css-a3bjub" href="http://support.checkpoint.com/results/sk/sk180488" target="_blank" rel="noopener"&gt;sk180488 - How to collect a debug for VPN issues&lt;/A&gt;&lt;/LI&gt;
&lt;LI class="ai-chatbot-reference css-1onth16"&gt;&lt;A class="css-a3bjub" href="http://support.checkpoint.com/results/sk/sk41317" target="_blank" rel="noopener"&gt;sk41317 - How to read an IKE.elg debug file&lt;/A&gt;&lt;/LI&gt;
&lt;LI class="ai-chatbot-reference css-1onth16"&gt;&lt;A class="css-a3bjub" href="https://sc1.checkpoint.com/documents/R80.40/WebAdminGuides/EN/CP_R80.40_SitetoSiteVPN_AdminGuide/Topics-VPNSG/CLI/vpn-debug.htm" target="_blank" rel="noopener"&gt;R80.40 Site to Site VPN Administration Guide - vpn-debug&lt;/A&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;</description>
      <pubDate>Fri, 14 Feb 2025 20:38:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Cross-site-communication-problem/m-p/241244#M46799</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2025-02-14T20:38:29Z</dc:date>
    </item>
    <item>
      <title>Re: Cross-site communication problem</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Cross-site-communication-problem/m-p/241409#M46862</link>
      <description>&lt;P&gt;Hello PoneBoy;&lt;BR /&gt;Sorry I made a mistake in the description. It's site B that doesn't have a CP behind the mikrotik router. communication in the site-to-site VPN works fine. the communication problem is between the CP and the server on site A's coast. port 1556 is open on the servers of sites A and B. a telnet (site A, telnet 172.168.1.2 1556) from a server on site A to site B works fine. But the reverse doesn't work, telnet 192.168.1.2 1556 (site B).&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;</description>
      <pubDate>Mon, 17 Feb 2025 18:07:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Cross-site-communication-problem/m-p/241409#M46862</guid>
      <dc:creator>junior_kakou</dc:creator>
      <dc:date>2025-02-17T18:07:05Z</dc:date>
    </item>
    <item>
      <title>Re: Cross-site communication problem</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Cross-site-communication-problem/m-p/241454#M46887</link>
      <description>&lt;P&gt;Problem is understood.&lt;BR /&gt;Following questions:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN&gt;What troubleshooting has been done so far on this issue?&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Do you see logs on the Check Point and/or Mikrotik related to the traffic?&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Have you used packet captures at various points to see where the traffic "disappears"?&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Have you use a tcpdump or fw monitor to verify the traffic is leaving the gateway through the VPN tunnel?&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Have you run any debugs on the traffic in question on the gateway, the instructions for which I provided above?&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Tue, 18 Feb 2025 00:07:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Cross-site-communication-problem/m-p/241454#M46887</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2025-02-18T00:07:04Z</dc:date>
    </item>
  </channel>
</rss>

