<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Encryption of IKE (ESP) over VPN in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Encryption-of-IKE-ESP-over-VPN/m-p/246704#M48106</link>
    <description>&lt;P&gt;Hello&lt;/P&gt;&lt;P&gt;did anyone ran into an issue where 3rd part VPN tunnel traffic is dropped between two CP gateways that have a VTI based VPN between them. This describes my situation &lt;A href="https://support.checkpoint.com/results/sk/sk177715" target="_blank" rel="noopener"&gt;https://support.checkpoint.com/results/sk/sk177715. &lt;/A&gt;&lt;/P&gt;&lt;P&gt;So the two CP gateways that have VTI tunnel between them are serving just as "routers" between 3rd party GWs that are trying to establish their own VPN tunnel. We ran into this issue before as I will describe.&amp;nbsp; Mind you this is a VTI tunnel that connects thousands of host with no issues for years now.&lt;/P&gt;&lt;P&gt;We used to get error "Encryption Failure: Failed to enforce VPN Policy (11)" up till R81.10 (&lt;STRONG&gt;and solved the issue&lt;/STRONG&gt; with &lt;SPAN&gt;&amp;nbsp;"set int encrypt_non_gw_rdp_ike 1" parameter),&amp;nbsp;&lt;/SPAN&gt;but when we upgraded to R81.20 this error changed to "Failure preparing tunnel creation, internal error" Routing checks out and ICMP traffic betwen 3rd party gateways is routed via VTI tunnel, so its not the crypto map. Tried domain based VPN routeing, exclude ESP services, host routes, nothing helps. Both CPs are R81.20 manged by the same SMS,&lt;/P&gt;&lt;P&gt;CP detect the traffic as ESP.&amp;nbsp; Did anyone had similar issues with IPsec over IPsec on R81.20?&amp;nbsp;&lt;/P&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 16 Apr 2025 20:14:59 GMT</pubDate>
    <dc:creator>bu007</dc:creator>
    <dc:date>2025-04-16T20:14:59Z</dc:date>
    <item>
      <title>Encryption of IKE (ESP) over VPN</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Encryption-of-IKE-ESP-over-VPN/m-p/246704#M48106</link>
      <description>&lt;P&gt;Hello&lt;/P&gt;&lt;P&gt;did anyone ran into an issue where 3rd part VPN tunnel traffic is dropped between two CP gateways that have a VTI based VPN between them. This describes my situation &lt;A href="https://support.checkpoint.com/results/sk/sk177715" target="_blank" rel="noopener"&gt;https://support.checkpoint.com/results/sk/sk177715. &lt;/A&gt;&lt;/P&gt;&lt;P&gt;So the two CP gateways that have VTI tunnel between them are serving just as "routers" between 3rd party GWs that are trying to establish their own VPN tunnel. We ran into this issue before as I will describe.&amp;nbsp; Mind you this is a VTI tunnel that connects thousands of host with no issues for years now.&lt;/P&gt;&lt;P&gt;We used to get error "Encryption Failure: Failed to enforce VPN Policy (11)" up till R81.10 (&lt;STRONG&gt;and solved the issue&lt;/STRONG&gt; with &lt;SPAN&gt;&amp;nbsp;"set int encrypt_non_gw_rdp_ike 1" parameter),&amp;nbsp;&lt;/SPAN&gt;but when we upgraded to R81.20 this error changed to "Failure preparing tunnel creation, internal error" Routing checks out and ICMP traffic betwen 3rd party gateways is routed via VTI tunnel, so its not the crypto map. Tried domain based VPN routeing, exclude ESP services, host routes, nothing helps. Both CPs are R81.20 manged by the same SMS,&lt;/P&gt;&lt;P&gt;CP detect the traffic as ESP.&amp;nbsp; Did anyone had similar issues with IPsec over IPsec on R81.20?&amp;nbsp;&lt;/P&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 16 Apr 2025 20:14:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Encryption-of-IKE-ESP-over-VPN/m-p/246704#M48106</guid>
      <dc:creator>bu007</dc:creator>
      <dc:date>2025-04-16T20:14:59Z</dc:date>
    </item>
    <item>
      <title>Re: Encryption of IKE (ESP) over VPN</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Encryption-of-IKE-ESP-over-VPN/m-p/246706#M48107</link>
      <description>&lt;P&gt;Since this broke as a result of an upgrade, your best bet is to engage the TAC if you haven't already.&lt;/P&gt;</description>
      <pubDate>Wed, 16 Apr 2025 21:29:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Encryption-of-IKE-ESP-over-VPN/m-p/246706#M48107</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2025-04-16T21:29:34Z</dc:date>
    </item>
    <item>
      <title>Re: Encryption of IKE (ESP) over VPN</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Encryption-of-IKE-ESP-over-VPN/m-p/246734#M48111</link>
      <description>&lt;P&gt;Yeah I did that already. I have a case open, just wanted to check if maybe someone already had this issue and was able to solve it.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 17 Apr 2025 07:56:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Encryption-of-IKE-ESP-over-VPN/m-p/246734#M48111</guid>
      <dc:creator>bu007</dc:creator>
      <dc:date>2025-04-17T07:56:44Z</dc:date>
    </item>
    <item>
      <title>Re: Encryption of IKE (ESP) over VPN</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Encryption-of-IKE-ESP-over-VPN/m-p/246737#M48112</link>
      <description>&lt;P&gt;I found &lt;A href="https://support.checkpoint.com/results/sk/sk170141" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;sk170141: Site to Site VPN traffic is being dropped for "&lt;STRONG&gt;Failure&lt;/STRONG&gt; &lt;STRONG&gt;preparing&lt;/STRONG&gt; &lt;STRONG&gt;tunnel&lt;/STRONG&gt; &lt;STRONG&gt;creation&lt;/STRONG&gt;, &lt;STRONG&gt;internal&lt;/STRONG&gt; &lt;STRONG&gt;error&lt;/STRONG&gt;"&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 17 Apr 2025 09:31:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Encryption-of-IKE-ESP-over-VPN/m-p/246737#M48112</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2025-04-17T09:31:53Z</dc:date>
    </item>
    <item>
      <title>Re: Encryption of IKE (ESP) over VPN</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Encryption-of-IKE-ESP-over-VPN/m-p/246738#M48113</link>
      <description>&lt;P&gt;Hello Albrecht, I've seen that SK, routing is OK. I tried adding a host route and domain based routing, It did not help. Thanks for replaying.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 17 Apr 2025 10:18:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Encryption-of-IKE-ESP-over-VPN/m-p/246738#M48113</guid>
      <dc:creator>bu007</dc:creator>
      <dc:date>2025-04-17T10:18:12Z</dc:date>
    </item>
    <item>
      <title>Re: Encryption of IKE (ESP) over VPN</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Encryption-of-IKE-ESP-over-VPN/m-p/246765#M48114</link>
      <description>&lt;P&gt;Firewall appliance model?&amp;nbsp; Is UPPAK in use?&amp;nbsp; (&lt;STRONG&gt;fwaccel stat&lt;/STRONG&gt;).&amp;nbsp; Have personally seen issues with VPN traffic attempting to traverse but not terminating on a gateway with UPPAK enabled.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk182775" target="_blank" rel="noopener"&gt;sk182775: Packet loss (fwconn_key_init_links failed) for ESP packets when using&amp;nbsp;User-Mode SecureXL&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.checkpoint.com/t5/Security-Gateways/No-ICMP-traffic-trough-VPN-after-migration/m-p/239123#M46399" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;No ICMP traffic trough VPN after migration&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 17 Apr 2025 13:43:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Encryption-of-IKE-ESP-over-VPN/m-p/246765#M48114</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2025-04-17T13:43:06Z</dc:date>
    </item>
    <item>
      <title>Re: Encryption of IKE (ESP) over VPN</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Encryption-of-IKE-ESP-over-VPN/m-p/246785#M48118</link>
      <description>&lt;P&gt;Hello Timothy,&lt;/P&gt;&lt;P&gt;Thank you for your reply. I thought of that to, I did have the "vpn accel off x.x.x.x" command ready but need a maintenance window, which I didn't have, yet. I would like to get as much info as possible, and it is on my "to do" list. ICMP traffic actually works its the ESP packets that are the problem. JHF is 92&lt;/P&gt;&lt;P&gt;6900 appliance&amp;nbsp;&lt;/P&gt;&lt;P&gt;|Id|Name |Status |Interfaces |Features |&lt;BR /&gt;+---------------------------------------------------------------------------------+&lt;BR /&gt;|0 |KPPAK |enabled &amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;To sum up:&lt;/P&gt;&lt;P&gt;packet is being droped at "iD":&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;vpn_is_it_encrypted_packet: dir 0, x.x.x.x:0 -&amp;gt; y.y.y.y:0 IPP 50 IPsec packet, but not ours ;&amp;nbsp;&lt;/EM&gt;&amp;nbsp;&lt;BR /&gt;...&lt;BR /&gt;&lt;EM&gt;vpnk_multik_forward (in): multicore VPN enabled&lt;/EM&gt;;&lt;BR /&gt;...&lt;BR /&gt;&lt;EM&gt;chain_ipsec_methods_ok: ******************* Illegal interfaces group 0 get_interfaces_group&lt;/EM&gt; = -8 ifnum = 34 ;&amp;nbsp;&lt;BR /&gt;...&lt;BR /&gt;&lt;EM&gt;Illegal interfaces group 0 get_interfaces_group = -8 ifnum = 34 ;&amp;nbsp;&lt;/EM&gt;-&amp;gt; no idea atm&lt;BR /&gt;...&lt;BR /&gt;&lt;STRONG&gt;vpnk_get_mspi_from_opaque: retuned mspi = [fail]&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;get_msa_by_mspi: mspi [fail] ... returning;&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;...&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;vpn_enc_scheme_to_schemname: illegal scheme -1;&lt;/STRONG&gt;&lt;BR /&gt;...&lt;BR /&gt;fw_log_drop_ex: Packet proto=50 ... dropped by vpn_drop_and_log&lt;BR /&gt;Reason: Failure preparing tunnel creation, internal error;&lt;/P&gt;&lt;P&gt;So no mspi, no SA.&lt;/P&gt;&lt;P&gt;I had some different issues on R81.10 but is it possible that packet is being handled by &lt;SPAN&gt;IKED&amp;nbsp;instead of&amp;nbsp;VPND?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;I've uploaded this logs to TAC just now. I'll post what the problem/solution was.&lt;/P&gt;</description>
      <pubDate>Thu, 17 Apr 2025 20:15:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Encryption-of-IKE-ESP-over-VPN/m-p/246785#M48118</guid>
      <dc:creator>bu007</dc:creator>
      <dc:date>2025-04-17T20:15:55Z</dc:date>
    </item>
    <item>
      <title>Re: Encryption of IKE (ESP) over VPN</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Encryption-of-IKE-ESP-over-VPN/m-p/246794#M48121</link>
      <description>&lt;P&gt;There were a couple of initial issues with the new iked in R81.20 which assumed all of the IKE-related roles from the much older vpnd, but as long as you are running the latest recommended Jumbo for R81.20 it shouldn't be your problem.&amp;nbsp; You could try temporarily disabling iked with the&amp;nbsp;&lt;SPAN&gt;&lt;STRONG&gt;vpn iked disable&lt;/STRONG&gt; command as documented below and see if it clears the problem; you can also disable iked permanently:&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk180252" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;sk180252: Route Injection Mechanism (RIM) in R81.10 does not work as expected with LSM satellite gateways&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 17 Apr 2025 23:50:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Encryption-of-IKE-ESP-over-VPN/m-p/246794#M48121</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2025-04-17T23:50:50Z</dc:date>
    </item>
    <item>
      <title>Re: Encryption of IKE (ESP) over VPN</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Encryption-of-IKE-ESP-over-VPN/m-p/268875#M53191</link>
      <description>&lt;P&gt;so what was the solution?&lt;/P&gt;</description>
      <pubDate>Tue, 27 Jan 2026 23:48:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Encryption-of-IKE-ESP-over-VPN/m-p/268875#M53191</guid>
      <dc:creator>Chris_Wilson</dc:creator>
      <dc:date>2026-01-27T23:48:43Z</dc:date>
    </item>
  </channel>
</rss>

