<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Debugging IKE/Tunnel establishment on VSX R81.20. in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Debugging-IKE-Tunnel-establishment-on-VSX-R81-20/m-p/252950#M49554</link>
    <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;I have a VS that is doing a S2S VPN using Ikev2&lt;/P&gt;
&lt;P&gt;I would like to evaluate with a debug everything that is exchanged on P1 and P2 for my VPN&lt;/P&gt;
&lt;P&gt;What command can help me with this goal?&lt;/P&gt;
&lt;P&gt;Which files should I extract from my VSX box in order to evaluate them with the IKEView tool&lt;/P&gt;
&lt;P&gt;My VS is ID 5 and my peer has the IP 181.90.100.50&lt;/P&gt;
&lt;P&gt;Thanks for your comments.&lt;/P&gt;</description>
    <pubDate>Thu, 10 Jul 2025 13:56:24 GMT</pubDate>
    <dc:creator>Matlu</dc:creator>
    <dc:date>2025-07-10T13:56:24Z</dc:date>
    <item>
      <title>Debugging IKE/Tunnel establishment on VSX R81.20.</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Debugging-IKE-Tunnel-establishment-on-VSX-R81-20/m-p/214282#M40902</link>
      <description>&lt;P&gt;We have a VSX R81.20 system with multiple VS`es.&lt;BR /&gt;Some virtual systems was created many years ago on earlier versions and some on R81.10 and R81.20.&lt;BR /&gt;All virtual systems are running on the same VSX-nodes, R81.20.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;We have an issue with establishing a VPN-tunnel from one of the newer virtual systems (VSID 16) to a third party and tried running a regular IKE-debug but no files were being created. On another virtual system (VSID 3) (created a long time ago) ike.elg-files are being created when running ike debug.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Checking "vpn iked status" i can see that for these 3 different systems, created on different versions iked is only running on the "oldest":&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;VSID3&lt;/STRONG&gt; (initially created on older R7x version - have several S2S tunnels working)&lt;/P&gt;&lt;P&gt;[Expert@fw-vsxnode-1:3]# vpn iked status&lt;BR /&gt;vpn: 'iked' is enabled.&lt;BR /&gt;vpn: 'iked' is configured for 2 instances.&lt;BR /&gt;vpn: The 'iked0' process is currently running.&lt;BR /&gt;vpn: The 'iked1' process is currently running.&lt;BR /&gt;[Expert@fw-vsxnode-1:3]#&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;VSID13&lt;/STRONG&gt; (initially created on R81.10 - have several S2S tunnels working)&lt;/P&gt;&lt;P&gt;[Expert@fw-vsxnode-1:13]# vpn iked status&lt;BR /&gt;vpn: 'iked' is disabled.&lt;BR /&gt;[Expert@fw-vsxnode-1:13]#&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;VSID16&lt;/STRONG&gt; (initially created on R81.20 version - Have one vpn-tunnel that doesnt work)&lt;/P&gt;&lt;P&gt;[Expert@fw-vsxnode-1:16]# vpn iked status&lt;BR /&gt;vpn: 'iked' is disabled.&lt;BR /&gt;[Expert@fw-vsxnode-1:16]# vsenv 3&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;According to R81.20 CLI reference guide there was a change in R81.10 on which daemon handles S2S traffic:&lt;BR /&gt;&lt;A href="https://sc1.checkpoint.com/documents/R81.20/WebAdminGuides/EN/CP_R81.20_CLI_ReferenceGuide/Content/Topics-CLIG/VPNSG/ike-debug.htm" target="_blank" rel="noopener"&gt;https://sc1.checkpoint.com/documents/R81.20/WebAdminGuides/EN/CP_R81.20_CLI_ReferenceGuide/Content/Topics-CLIG/VPNSG/ike-debug.htm&lt;/A&gt;&lt;/P&gt;&lt;P&gt;However according to &lt;A href="https://support.checkpoint.com/results/sk/sk180488" target="_blank" rel="noopener"&gt;https://support.checkpoint.com/results/sk/sk180488&lt;/A&gt; , in R81.20 and higher, S2S is handled by iked ?&lt;BR /&gt;(which it cant be since we have working VPN-tunnels on VSID13, but iked is disabled)&lt;/P&gt;&lt;P&gt;According to sk180488 it now looks like we have to run a full vpnd debug to be able to investigate IKE/tunnel establishment and&lt;BR /&gt;get a maintenance window to perform this debug ?&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Does this mean that iked is not disabled on all virtual systems on R81.20, only systems initially created on R81.10/R81.20 and higher and that we now need maintenance window to look at S2S tunnel establishment ?&lt;/P&gt;</description>
      <pubDate>Wed, 15 May 2024 06:40:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Debugging-IKE-Tunnel-establishment-on-VSX-R81-20/m-p/214282#M40902</guid>
      <dc:creator>PetterD</dc:creator>
      <dc:date>2024-05-15T06:40:35Z</dc:date>
    </item>
    <item>
      <title>Re: Debugging IKE/Tunnel establishment on VSX R81.20.</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Debugging-IKE-Tunnel-establishment-on-VSX-R81-20/m-p/214395#M40919</link>
      <description>&lt;P&gt;Can you run this and see what it shows? Say peer IP is 7.8.9.9, run vpn iked calculate 7.8.9.9&lt;/P&gt;
&lt;P&gt;It should show which iked process is handling debugs.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Wed, 15 May 2024 16:08:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Debugging-IKE-Tunnel-establishment-on-VSX-R81-20/m-p/214395#M40919</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-05-15T16:08:05Z</dc:date>
    </item>
    <item>
      <title>Re: Debugging IKE/Tunnel establishment on VSX R81.20.</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Debugging-IKE-Tunnel-establishment-on-VSX-R81-20/m-p/214415#M40923</link>
      <description>&lt;P&gt;If VS has assigned only 1 IPv4 core, then iked is not enabled. If VS has more than 1 IPv4 core assigned, iked is automatically enabled. Try to check coreXL assignment for all mentioned VSs.&lt;/P&gt;
&lt;P&gt;By default, all VSs have only 1 IPv4 and 1 IPv6 core assigned. It is up to administrator to increase number of cores within VS object in SmartConsole.&lt;/P&gt;
&lt;P&gt;Please be aware that changing coreXL settings for specific VS (doesnt matter if IPv4 or IPv6) will result in total outage within affected VS for couple of minutes.&lt;/P&gt;</description>
      <pubDate>Wed, 15 May 2024 18:22:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Debugging-IKE-Tunnel-establishment-on-VSX-R81-20/m-p/214415#M40923</guid>
      <dc:creator>JozkoMrkvicka</dc:creator>
      <dc:date>2024-05-15T18:22:07Z</dc:date>
    </item>
    <item>
      <title>Re: Debugging IKE/Tunnel establishment on VSX R81.20.</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Debugging-IKE-Tunnel-establishment-on-VSX-R81-20/m-p/214470#M40938</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Thanks for the reply!&lt;/P&gt;&lt;P&gt;Does this mean that this is not related to R81.20 where the documentation states that its not handled by iked ?&lt;BR /&gt;Couldt find any information about this being related to number of virtual cores but this could also match (as VS 13 &amp;amp; 16 have 1 Core).&lt;/P&gt;&lt;P&gt;On VS13 we do have working Ipsec VPN tunnels and one core is enough to handle all the limited traffic we do have on these VS`es.&lt;BR /&gt;Cant find any limitations that we cant run Ipsec VPN with 1 core only, so does this mean its handled by "vpnd" and that we have to perform&lt;BR /&gt;a full vpnd-debug (maintenance window) to get the ike-debugs ?&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 16 May 2024 06:23:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Debugging-IKE-Tunnel-establishment-on-VSX-R81-20/m-p/214470#M40938</guid>
      <dc:creator>PetterD</dc:creator>
      <dc:date>2024-05-16T06:23:36Z</dc:date>
    </item>
    <item>
      <title>Re: Debugging IKE/Tunnel establishment on VSX R81.20.</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Debugging-IKE-Tunnel-establishment-on-VSX-R81-20/m-p/214471#M40939</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Thanks for the reply!&lt;BR /&gt;&lt;BR /&gt;I ran this command for the peer-address we are haveing troubles establishing a tunnel for (we dont have a valid SA for it):&lt;/P&gt;&lt;P&gt;[Expert@ffw-vsxnode-1:16]# vpn iked calculate 1.2.3.4&lt;BR /&gt;vpn: Address '1.2.3.4' is not handled by any IKED daemon&lt;BR /&gt;[Expert@fw-vsxnode-1:16]#&lt;/P&gt;&lt;P&gt;Looks like this, and the other VS (that have a tunnel for the same peer) doesnt have any iked-processes running.&lt;/P&gt;&lt;P&gt;Very confusing as the documentation for R81.20 doesnt mention anything about cores, but that S2S is not being handled by iked in R81.20 (while other documentation says it is).&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 16 May 2024 06:27:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Debugging-IKE-Tunnel-establishment-on-VSX-R81-20/m-p/214471#M40939</guid>
      <dc:creator>PetterD</dc:creator>
      <dc:date>2024-05-16T06:27:56Z</dc:date>
    </item>
    <item>
      <title>Re: Debugging IKE/Tunnel establishment on VSX R81.20.</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Debugging-IKE-Tunnel-establishment-on-VSX-R81-20/m-p/214477#M40940</link>
      <description>&lt;P&gt;Just an update,&lt;/P&gt;&lt;P&gt;We were able to get a quick maintenance window and increased the number of virtual cores from 1-&amp;gt;2 on this VS and now we do have "iked" running so you were correct &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;BR /&gt;&lt;BR /&gt;Expert@fw-vsxnode-1:16]# fw ctl multik stat&lt;BR /&gt;ID | Active | CPU | Connections | Peak&lt;BR /&gt;-----------------------------------------------&lt;BR /&gt;0 | Yes | 2-15+ | 341 | 353&lt;BR /&gt;1 | Yes | 2-15+ | 187 | 189&lt;BR /&gt;[Expert@fw-vsxnode-1:16]# vpn iked status&lt;BR /&gt;vpn: 'iked' is enabled.&lt;BR /&gt;vpn: 'iked' is configured for 1 instances.&lt;BR /&gt;vpn: The 'iked0' process is currently running.&lt;BR /&gt;[Expert@fw-vsxnode-1:16]#&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 16 May 2024 07:55:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Debugging-IKE-Tunnel-establishment-on-VSX-R81-20/m-p/214477#M40940</guid>
      <dc:creator>PetterD</dc:creator>
      <dc:date>2024-05-16T07:55:28Z</dc:date>
    </item>
    <item>
      <title>Re: Debugging IKE/Tunnel establishment on VSX R81.20.</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Debugging-IKE-Tunnel-establishment-on-VSX-R81-20/m-p/214483#M40943</link>
      <description>&lt;P&gt;I remember a discussion with PS a while back that since R80+, the minimum amount of cores for any system is 2 to meet architectural requirements. For instance, a VM with just one core will fail at the FTS indicating at least 2 cores are needed.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In the case of VSX, they advised 2 virtual cores even for small VS, to ensures all OS functions work optimally since there it allows you indeed to create a VS with the default of 1 core.&lt;/P&gt;</description>
      <pubDate>Thu, 16 May 2024 09:39:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Debugging-IKE-Tunnel-establishment-on-VSX-R81-20/m-p/214483#M40943</guid>
      <dc:creator>Alex-</dc:creator>
      <dc:date>2024-05-16T09:39:56Z</dc:date>
    </item>
    <item>
      <title>Re: Debugging IKE/Tunnel establishment on VSX R81.20.</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Debugging-IKE-Tunnel-establishment-on-VSX-R81-20/m-p/214566#M40961</link>
      <description>&lt;P&gt;This finding was discovered just recently. Check Point just wrote it is like it is even despite the fact there is no sk article nor written anything related to this issue in any admin guide / ATRG.&lt;/P&gt;
&lt;P&gt;We never modified default number of CoreXL for any VS, since we didnt run to any issue with performance.&lt;/P&gt;</description>
      <pubDate>Thu, 16 May 2024 18:21:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Debugging-IKE-Tunnel-establishment-on-VSX-R81-20/m-p/214566#M40961</guid>
      <dc:creator>JozkoMrkvicka</dc:creator>
      <dc:date>2024-05-16T18:21:35Z</dc:date>
    </item>
    <item>
      <title>Re: Debugging IKE/Tunnel establishment on VSX R81.20.</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Debugging-IKE-Tunnel-establishment-on-VSX-R81-20/m-p/214568#M40962</link>
      <description>&lt;P&gt;In case of VSX, changing CoreXL for specific VS will cause outage for that VS. This "feature" is no go in production. If Check Point is able to change this "feature", I am OK changing coreXL to higher numbers.&lt;/P&gt;</description>
      <pubDate>Thu, 16 May 2024 18:29:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Debugging-IKE-Tunnel-establishment-on-VSX-R81-20/m-p/214568#M40962</guid>
      <dc:creator>JozkoMrkvicka</dc:creator>
      <dc:date>2024-05-16T18:29:33Z</dc:date>
    </item>
    <item>
      <title>Re: Debugging IKE/Tunnel establishment on VSX R81.20.</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Debugging-IKE-Tunnel-establishment-on-VSX-R81-20/m-p/214569#M40963</link>
      <description>&lt;P&gt;Correct.&lt;/P&gt;
&lt;P&gt;I was pointing the fact that any new VS we create has a minimum of two virtual cores so processes of that VS work in an environment with supported core allocation.&lt;/P&gt;</description>
      <pubDate>Thu, 16 May 2024 18:37:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Debugging-IKE-Tunnel-establishment-on-VSX-R81-20/m-p/214569#M40963</guid>
      <dc:creator>Alex-</dc:creator>
      <dc:date>2024-05-16T18:37:40Z</dc:date>
    </item>
    <item>
      <title>Re: Debugging IKE/Tunnel establishment on VSX R81.20.</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Debugging-IKE-Tunnel-establishment-on-VSX-R81-20/m-p/214572#M40964</link>
      <description>&lt;P&gt;Good approach &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I wish I had crystal ball back in old times where VSX was created (on R77.30), so I knew Check Point is changing VPN architecture starting from R81.10 and more cores will be needed &lt;span class="lia-unicode-emoji" title=":face_with_tongue:"&gt;😛&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;In old R77.30 times, everything related to VPN was handled by vpnd only (and even within &lt;SPAN&gt;CoreXL FW instance #0&lt;/SPAN&gt;).&lt;/P&gt;</description>
      <pubDate>Thu, 16 May 2024 18:49:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Debugging-IKE-Tunnel-establishment-on-VSX-R81-20/m-p/214572#M40964</guid>
      <dc:creator>JozkoMrkvicka</dc:creator>
      <dc:date>2024-05-16T18:49:15Z</dc:date>
    </item>
    <item>
      <title>Re: Debugging IKE/Tunnel establishment on VSX R81.20.</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Debugging-IKE-Tunnel-establishment-on-VSX-R81-20/m-p/214573#M40965</link>
      <description>&lt;P&gt;Good ol' R77.30 &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;For some reason, I have fond memories of R75.47 version, always treted me well lol&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Thu, 16 May 2024 18:51:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Debugging-IKE-Tunnel-establishment-on-VSX-R81-20/m-p/214573#M40965</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-05-16T18:51:24Z</dc:date>
    </item>
    <item>
      <title>Re: Debugging IKE/Tunnel establishment on VSX R81.20.</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Debugging-IKE-Tunnel-establishment-on-VSX-R81-20/m-p/252950#M49554</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;I have a VS that is doing a S2S VPN using Ikev2&lt;/P&gt;
&lt;P&gt;I would like to evaluate with a debug everything that is exchanged on P1 and P2 for my VPN&lt;/P&gt;
&lt;P&gt;What command can help me with this goal?&lt;/P&gt;
&lt;P&gt;Which files should I extract from my VSX box in order to evaluate them with the IKEView tool&lt;/P&gt;
&lt;P&gt;My VS is ID 5 and my peer has the IP 181.90.100.50&lt;/P&gt;
&lt;P&gt;Thanks for your comments.&lt;/P&gt;</description>
      <pubDate>Thu, 10 Jul 2025 13:56:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Debugging-IKE-Tunnel-establishment-on-VSX-R81-20/m-p/252950#M49554</guid>
      <dc:creator>Matlu</dc:creator>
      <dc:date>2025-07-10T13:56:24Z</dc:date>
    </item>
    <item>
      <title>Re: Debugging IKE/Tunnel establishment on VSX R81.20.</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Debugging-IKE-Tunnel-establishment-on-VSX-R81-20/m-p/252952#M49556</link>
      <description>&lt;P&gt;vpn debug trunc&lt;/P&gt;
&lt;P&gt;vpn debug ikeon&lt;/P&gt;
&lt;P&gt;-generate traffic&lt;/P&gt;
&lt;P&gt;vpn debug ikeoff&lt;/P&gt;
&lt;P&gt;Look for vpnd and ike* files in $FWDIR/log dir&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Thu, 10 Jul 2025 14:03:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Debugging-IKE-Tunnel-establishment-on-VSX-R81-20/m-p/252952#M49556</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-07-10T14:03:53Z</dc:date>
    </item>
    <item>
      <title>Re: Debugging IKE/Tunnel establishment on VSX R81.20.</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Debugging-IKE-Tunnel-establishment-on-VSX-R81-20/m-p/252956#M49557</link>
      <description>&lt;P&gt;Bro&lt;/P&gt;
&lt;P&gt;Is there any particular extension I need to look for for IKEv2?&lt;/P&gt;
&lt;P&gt;I have problems with traffic exchange on P2, and I want to ‘detect’ what is being exchanged at this stage by both peers.&lt;/P&gt;
&lt;P&gt;Cheers&lt;/P&gt;</description>
      <pubDate>Thu, 10 Jul 2025 14:23:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Debugging-IKE-Tunnel-establishment-on-VSX-R81-20/m-p/252956#M49557</guid>
      <dc:creator>Matlu</dc:creator>
      <dc:date>2025-07-10T14:23:35Z</dc:date>
    </item>
    <item>
      <title>Re: Debugging IKE/Tunnel establishment on VSX R81.20.</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Debugging-IKE-Tunnel-establishment-on-VSX-R81-20/m-p/252957#M49558</link>
      <description>&lt;P&gt;You mean file extension?&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Thu, 10 Jul 2025 14:25:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Debugging-IKE-Tunnel-establishment-on-VSX-R81-20/m-p/252957#M49558</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-07-10T14:25:36Z</dc:date>
    </item>
    <item>
      <title>Re: Debugging IKE/Tunnel establishment on VSX R81.20.</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Debugging-IKE-Tunnel-establishment-on-VSX-R81-20/m-p/252959#M49559</link>
      <description>&lt;P&gt;Yep 🥸&lt;/P&gt;</description>
      <pubDate>Thu, 10 Jul 2025 14:27:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Debugging-IKE-Tunnel-establishment-on-VSX-R81-20/m-p/252959#M49559</guid>
      <dc:creator>Matlu</dc:creator>
      <dc:date>2025-07-10T14:27:50Z</dc:date>
    </item>
    <item>
      <title>Re: Debugging IKE/Tunnel establishment on VSX R81.20.</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Debugging-IKE-Tunnel-establishment-on-VSX-R81-20/m-p/252962#M49560</link>
      <description>&lt;P&gt;Either .trace or .elg&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Thu, 10 Jul 2025 14:29:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Debugging-IKE-Tunnel-establishment-on-VSX-R81-20/m-p/252962#M49560</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-07-10T14:29:16Z</dc:date>
    </item>
    <item>
      <title>Re: Debugging IKE/Tunnel establishment on VSX R81.20.</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Debugging-IKE-Tunnel-establishment-on-VSX-R81-20/m-p/255465#M49980</link>
      <description>&lt;P&gt;Hello,&lt;BR /&gt;In VSX environments.&lt;BR /&gt;Is it “objective” to use the “tcpdump” command to capture traffic?&lt;BR /&gt;I have a problem with a particular selector.&lt;BR /&gt;Source: 10.100.0.0/24&lt;BR /&gt;Destination: 172.20.10.200&lt;BR /&gt;Port: 8080&lt;/P&gt;
&lt;P&gt;My VPN is up on P1 and P2, but when the source launches connection tests to the destination behind our VS, it doesn't work.&lt;/P&gt;
&lt;P&gt;Is it useful to perform tshoot tests with tcpdump in these scenarios?&lt;BR /&gt;Is there a command that can be useful to capture whether the traffic is actually reaching our VS?&lt;/P&gt;
&lt;P&gt;Best regards.&lt;/P&gt;</description>
      <pubDate>Tue, 19 Aug 2025 22:21:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Debugging-IKE-Tunnel-establishment-on-VSX-R81-20/m-p/255465#M49980</guid>
      <dc:creator>Matlu</dc:creator>
      <dc:date>2025-08-19T22:21:59Z</dc:date>
    </item>
    <item>
      <title>Re: Debugging IKE/Tunnel establishment on VSX R81.20.</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Debugging-IKE-Tunnel-establishment-on-VSX-R81-20/m-p/255479#M49982</link>
      <description>&lt;P&gt;You should use cppcap, not tcpdump which can impact your system.&lt;/P&gt;
&lt;P&gt;The -v flag allows to capture traffic on a specific VS.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Check out the documentation and the SK.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://sc1.checkpoint.com/documents/R82/WebAdminGuides/EN/CP_R82_CLI_ReferenceGuide/Content/Topics-CLIG/FWG/cppcap.htm" target="_blank"&gt;https://sc1.checkpoint.com/documents/R82/WebAdminGuides/EN/CP_R82_CLI_ReferenceGuide/Content/Topics-CLIG/FWG/cppcap.htm&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 20 Aug 2025 05:42:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Debugging-IKE-Tunnel-establishment-on-VSX-R81-20/m-p/255479#M49982</guid>
      <dc:creator>Alex-</dc:creator>
      <dc:date>2025-08-20T05:42:45Z</dc:date>
    </item>
  </channel>
</rss>

