<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Route-based vpn with FortiGate not passing traffic - “no MSPI for MSA” in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Route-based-vpn-with-FortiGate-not-passing-traffic-no-MSPI-for/m-p/265137#M52206</link>
    <description>&lt;P&gt;Yea...who knows. Might be hard to say without doing debugs.&lt;/P&gt;</description>
    <pubDate>Thu, 11 Dec 2025 18:51:06 GMT</pubDate>
    <dc:creator>the_rock</dc:creator>
    <dc:date>2025-12-11T18:51:06Z</dc:date>
    <item>
      <title>Route-based vpn with FortiGate not passing traffic - “no MSPI for MSA”</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Route-based-vpn-with-FortiGate-not-passing-traffic-no-MSPI-for/m-p/265129#M52202</link>
      <description>&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 815px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/32406iC8A66DE5F6B85B69/image-dimensions/815x294?v=v2" width="815" height="294" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;I have a route-based vpn between a Check Point cluster (R81.20 Take 113) and a FortiGate. The vpn establishes and &lt;EM&gt;vpn tu tlist&lt;/EM&gt; shows correct traffic selectors but tunnel is ‘narrowed’ and traffic from the remote subnet does not arrive.&lt;/P&gt;&lt;P&gt;My TS: 10.53.25.160/28&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Peer TS: 192.168.5.0/28&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When the local peer sends outbound traffic the Check Point creates an additional tunnel with traffic selectors 0.0.0.0/0 on both side and this tunnel shows as ‘eclipsed’. Logs show outbound traffic is encrypted for the vpn and hits the correct outbound NAT rule translating it to a 10.53.25.x address.&lt;/P&gt;&lt;P&gt;&lt;EM&gt;fw ctl zdebug + drop | grep 192.168.5.x&lt;/EM&gt;&amp;nbsp; &amp;nbsp;shows outbound traffic being dropped with “no MSPI for MSA”.&lt;/P&gt;&lt;P&gt;The FortiGate peer then immediately sends a request to delete the SA –&lt;/P&gt;&lt;P&gt;“&lt;EM&gt;Informational exchange: Received delete IPsec SA request&lt;/EM&gt;”&lt;/P&gt;&lt;P&gt;but the eclipsed tunnel persists until it eventually ages out.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The behaviour of the narrow and eclipsed tunnels is as described in sk166417&lt;/P&gt;&lt;P&gt;There are no overlapping addresses in the encryption domains and other route-based vpns on the Check Point with AWS are working correctly.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Many combinations have been tried for the encryption domains&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;empty domains on one, other and both sides&lt;/LI&gt;&lt;LI&gt;subnets on one, other and both sides&lt;/LI&gt;&lt;LI&gt;individual IP addresses on one, other and both sides – including with and without the physical IP addresses of the servers&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;One tunnel per pair of hosts - does not work and causes repeated failed IKE negotiations&lt;/P&gt;&lt;P&gt;One tunnel per subnet pair – does not work, same result&lt;/P&gt;&lt;P&gt;One tunnel per gateway pair – the only option that works&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any suggestions?&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;</description>
      <pubDate>Thu, 11 Dec 2025 16:47:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Route-based-vpn-with-FortiGate-not-passing-traffic-no-MSPI-for/m-p/265129#M52202</guid>
      <dc:creator>SteveW</dc:creator>
      <dc:date>2025-12-11T16:47:32Z</dc:date>
    </item>
    <item>
      <title>Re: Route-based vpn with FortiGate not passing traffic - “no MSPI for MSA”</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Route-based-vpn-with-FortiGate-not-passing-traffic-no-MSPI-for/m-p/265130#M52203</link>
      <description>&lt;P&gt;Technically, one tunnel per gateway pair sounds like a right option here. Are you using numbered or unnumbered VTIs?&lt;/P&gt;</description>
      <pubDate>Thu, 11 Dec 2025 16:49:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Route-based-vpn-with-FortiGate-not-passing-traffic-no-MSPI-for/m-p/265130#M52203</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-12-11T16:49:32Z</dc:date>
    </item>
    <item>
      <title>Re: Route-based vpn with FortiGate not passing traffic - “no MSPI for MSA”</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Route-based-vpn-with-FortiGate-not-passing-traffic-no-MSPI-for/m-p/265135#M52204</link>
      <description>&lt;P&gt;&lt;SPAN&gt;There’s an SK for older versions describing exactly this error, and while it says it’s fixed from R81 onward… who’s to say it didn’t sneak back in with a newer release?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 11 Dec 2025 18:35:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Route-based-vpn-with-FortiGate-not-passing-traffic-no-MSPI-for/m-p/265135#M52204</guid>
      <dc:creator>Vincent_Bacher</dc:creator>
      <dc:date>2025-12-11T18:35:51Z</dc:date>
    </item>
    <item>
      <title>Re: Route-based vpn with FortiGate not passing traffic - “no MSPI for MSA”</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Route-based-vpn-with-FortiGate-not-passing-traffic-no-MSPI-for/m-p/265137#M52206</link>
      <description>&lt;P&gt;Yea...who knows. Might be hard to say without doing debugs.&lt;/P&gt;</description>
      <pubDate>Thu, 11 Dec 2025 18:51:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Route-based-vpn-with-FortiGate-not-passing-traffic-no-MSPI-for/m-p/265137#M52206</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-12-11T18:51:06Z</dc:date>
    </item>
    <item>
      <title>Re: Route-based vpn with FortiGate not passing traffic - “no MSPI for MSA”</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Route-based-vpn-with-FortiGate-not-passing-traffic-no-MSPI-for/m-p/265138#M52207</link>
      <description>&lt;P&gt;So we agree that (kernel) debugging could be done here.&lt;BR /&gt;Unfortunately, I don't have the commands in my head, but a Tac case should help.&lt;/P&gt;</description>
      <pubDate>Thu, 11 Dec 2025 18:55:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Route-based-vpn-with-FortiGate-not-passing-traffic-no-MSPI-for/m-p/265138#M52207</guid>
      <dc:creator>Vincent_Bacher</dc:creator>
      <dc:date>2025-12-11T18:55:20Z</dc:date>
    </item>
    <item>
      <title>Re: Route-based vpn with FortiGate not passing traffic - “no MSPI for MSA”</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Route-based-vpn-with-FortiGate-not-passing-traffic-no-MSPI-for/m-p/265139#M52208</link>
      <description>&lt;P&gt;I would start with below:&lt;/P&gt;
&lt;P&gt;CP:&lt;/P&gt;
&lt;P&gt;vpn debug trunc&lt;/P&gt;
&lt;P&gt;vpn debug ikeon&lt;/P&gt;
&lt;P&gt;-generate traffic&lt;/P&gt;
&lt;P&gt;vpn debug ikeoff&lt;/P&gt;
&lt;P&gt;fw ctl debug 0&lt;/P&gt;
&lt;P&gt;-check for iked and vpnd* files in $FWDIR/log dir&lt;/P&gt;
&lt;P&gt;FGT:&lt;/P&gt;
&lt;P&gt;di de di&lt;/P&gt;
&lt;P&gt;di de app ike -1&lt;/P&gt;
&lt;P&gt;di de en&lt;/P&gt;
&lt;P&gt;-generate traffic&lt;/P&gt;
&lt;P&gt;-check for messages that print on the screen&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 11 Dec 2025 18:57:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Route-based-vpn-with-FortiGate-not-passing-traffic-no-MSPI-for/m-p/265139#M52208</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-12-11T18:57:45Z</dc:date>
    </item>
    <item>
      <title>Re: Route-based vpn with FortiGate not passing traffic - “no MSPI for MSA”</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Route-based-vpn-with-FortiGate-not-passing-traffic-no-MSPI-for/m-p/265140#M52209</link>
      <description>&lt;P&gt;Exactly that would be the first steps.&lt;/P&gt;
&lt;P&gt;Here you can find kernel debugging as well. Not looked at the correct release but the command should be the same:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_NextGenSecurityGateway_Guide/Topics-FWG/Kernel-Debug/Kernel-Debug-Filters.htm" target="_blank" rel="noopener"&gt;https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_NextGenSecurityGateway_Guide/Topics-FWG/Kernel-Debug/Kernel-Debug-Filters.htm&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;addendum 2&lt;/P&gt;
&lt;P&gt;first step im 40et should be diagnose debug reset to not get any unwanted debugs in case anything is already set&lt;/P&gt;</description>
      <pubDate>Thu, 11 Dec 2025 19:07:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Route-based-vpn-with-FortiGate-not-passing-traffic-no-MSPI-for/m-p/265140#M52209</guid>
      <dc:creator>Vincent_Bacher</dc:creator>
      <dc:date>2025-12-11T19:07:37Z</dc:date>
    </item>
    <item>
      <title>Re: Route-based vpn with FortiGate not passing traffic - “no MSPI for MSA”</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Route-based-vpn-with-FortiGate-not-passing-traffic-no-MSPI-for/m-p/265141#M52210</link>
      <description>&lt;P&gt;Addendum: to look at the vpn debug trunc output you may use the good old ikeview tool&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk30994" target="_blank" rel="noopener"&gt;https://support.checkpoint.com/results/sk/sk30994&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 11 Dec 2025 19:06:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Route-based-vpn-with-FortiGate-not-passing-traffic-no-MSPI-for/m-p/265141#M52210</guid>
      <dc:creator>Vincent_Bacher</dc:creator>
      <dc:date>2025-12-11T19:06:14Z</dc:date>
    </item>
    <item>
      <title>Re: Route-based vpn with FortiGate not passing traffic - “no MSPI for MSA”</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Route-based-vpn-with-FortiGate-not-passing-traffic-no-MSPI-for/m-p/265142#M52211</link>
      <description>&lt;P&gt;Hopefully, they would not need to run kernel debug...&lt;/P&gt;</description>
      <pubDate>Thu, 11 Dec 2025 19:06:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Route-based-vpn-with-FortiGate-not-passing-traffic-no-MSPI-for/m-p/265142#M52211</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-12-11T19:06:52Z</dc:date>
    </item>
    <item>
      <title>Re: Route-based vpn with FortiGate not passing traffic - “no MSPI for MSA”</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Route-based-vpn-with-FortiGate-not-passing-traffic-no-MSPI-for/m-p/265143#M52212</link>
      <description>&lt;P&gt;Hopefully&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 11 Dec 2025 19:09:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Route-based-vpn-with-FortiGate-not-passing-traffic-no-MSPI-for/m-p/265143#M52212</guid>
      <dc:creator>Vincent_Bacher</dc:creator>
      <dc:date>2025-12-11T19:09:55Z</dc:date>
    </item>
    <item>
      <title>Re: Route-based vpn with FortiGate not passing traffic - “no MSPI for MSA”</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Route-based-vpn-with-FortiGate-not-passing-traffic-no-MSPI-for/m-p/265174#M52229</link>
      <description>&lt;P&gt;Hi Andy, using numbered VTIs as recommended by TAC&lt;/P&gt;</description>
      <pubDate>Fri, 12 Dec 2025 09:16:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Route-based-vpn-with-FortiGate-not-passing-traffic-no-MSPI-for/m-p/265174#M52229</guid>
      <dc:creator>SteveW</dc:creator>
      <dc:date>2025-12-12T09:16:15Z</dc:date>
    </item>
    <item>
      <title>Re: Route-based vpn with FortiGate not passing traffic - “no MSPI for MSA”</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Route-based-vpn-with-FortiGate-not-passing-traffic-no-MSPI-for/m-p/265178#M52230</link>
      <description>&lt;P&gt;That should be fine. I would do debug I mentioned and see what you get.&lt;/P&gt;</description>
      <pubDate>Fri, 12 Dec 2025 11:51:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Route-based-vpn-with-FortiGate-not-passing-traffic-no-MSPI-for/m-p/265178#M52230</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-12-12T11:51:31Z</dc:date>
    </item>
    <item>
      <title>Re: Route-based vpn with FortiGate not passing traffic - “no MSPI for MSA”</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Route-based-vpn-with-FortiGate-not-passing-traffic-no-MSPI-for/m-p/265194#M52232</link>
      <description>&lt;P&gt;Maybe try Fortigate debug first, see if it gives any more details.&lt;/P&gt;</description>
      <pubDate>Fri, 12 Dec 2025 14:16:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Route-based-vpn-with-FortiGate-not-passing-traffic-no-MSPI-for/m-p/265194#M52232</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-12-12T14:16:41Z</dc:date>
    </item>
    <item>
      <title>Re: Route-based vpn with FortiGate not passing traffic - “no MSPI for MSA”</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Route-based-vpn-with-FortiGate-not-passing-traffic-no-MSPI-for/m-p/270804#M103300</link>
      <description>&lt;P&gt;TAC didn't offer much assistance, just said it was a configuration mismatch error and closed the case.&lt;/P&gt;&lt;P&gt;Tried many things but could not solve the narrowing /eclipsed tunnel on the Check Point so&amp;nbsp;asked the third-party to change the Fortigate traffic selectors to universal. This fixed the problem with narrow / eclipsed and also stopped the "no MSPI for MSA" error.&lt;/P&gt;&lt;P&gt;&lt;EM&gt;fw crl zdebug + drop&lt;/EM&gt; now shows that traffic is no longer being dropped and the FortiGate side have confirmed that the traffic is arriving. However, the traffic is only passing in one direction - from Check Point to FortiGate.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I think this may be because the Check Point is using a Numbered vti, which is the recommended option and the peer won't have a corresponding 169.254.x.y address configured.&lt;/P&gt;&lt;P&gt;I am checking with the remote side if the FortiGate can be configured with a 'local IP' to match my Numbered vti as the articles I have read point to this being the problem. If there are any FortiGate wizards out there your comments would be appreciated.&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Steve&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 16 Feb 2026 14:12:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Route-based-vpn-with-FortiGate-not-passing-traffic-no-MSPI-for/m-p/270804#M103300</guid>
      <dc:creator>SteveW</dc:creator>
      <dc:date>2026-02-16T14:12:16Z</dc:date>
    </item>
    <item>
      <title>Re: Route-based vpn with FortiGate not passing traffic - “no MSPI for MSA”</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Route-based-vpn-with-FortiGate-not-passing-traffic-no-MSPI-for/m-p/270808#M103301</link>
      <description>&lt;P&gt;Can you try vpn domains as empty group and then tunnel mgmt permanent tunnels and per gateway setting?&lt;/P&gt;</description>
      <pubDate>Fri, 13 Feb 2026 16:49:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Route-based-vpn-with-FortiGate-not-passing-traffic-no-MSPI-for/m-p/270808#M103301</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2026-02-13T16:49:20Z</dc:date>
    </item>
    <item>
      <title>Re: Route-based vpn with FortiGate not passing traffic - “no MSPI for MSA”</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Route-based-vpn-with-FortiGate-not-passing-traffic-no-MSPI-for/m-p/270895#M103303</link>
      <description>&lt;P&gt;Hello&lt;/P&gt;&lt;P&gt;in any case, if you configure a route based vpn with numbered VTI, you should:&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Create the VPNT interfaces. Set the ID, and the peer name (this is the name of the interoperable device you'll configure in the next steps). Define an IP address for Firewall 1 and for Firewall 2 (in smartconsole you'll configure the cluster IP used as a next hop by the Fortigate's routing configuration).&lt;/LI&gt;&lt;LI&gt;Configure routing for remote networks (the networks behind the Fortigate) using as a next hop the IP address assigned to the Fortigate's VTI.&lt;/LI&gt;&lt;LI&gt;In Smartconsole , update the topology of your Check Point adding the VPNT interfaces and configuring cluster IP for this interface.&lt;/LI&gt;&lt;LI&gt;Then create the interoperable device (fortigate).&lt;/LI&gt;&lt;LI&gt;configure the VPN community, the encryption domain for your Check Point cluster and the Fortigate should be an empty group.&lt;/LI&gt;&lt;LI&gt;In the VPN community, configure Tunnel Management with the one tunnel per gateway option selected (do not enable Permament Tunnel because is not supported by Fortigate).&lt;/LI&gt;&lt;LI&gt;Configure access policy.&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;I'm sure that you've already configured your Check Point in this way, obviously Fortigate must be configured in a similar way, by configuring as encryption domains the 0.0.0.0/0.0.0.0 (on both local and remote network) and also the routing as configured on Check Point.&lt;/P&gt;&lt;P&gt;Usually these are the steps you need to follow to configure the route based vpn between Check Point and a 3rd party device.&lt;/P&gt;</description>
      <pubDate>Sat, 14 Feb 2026 21:46:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Route-based-vpn-with-FortiGate-not-passing-traffic-no-MSPI-for/m-p/270895#M103303</guid>
      <dc:creator>simonemantovani</dc:creator>
      <dc:date>2026-02-14T21:46:51Z</dc:date>
    </item>
    <item>
      <title>Re: Route-based vpn with FortiGate not passing traffic - “no MSPI for MSA”</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Route-based-vpn-with-FortiGate-not-passing-traffic-no-MSPI-for/m-p/270896#M103304</link>
      <description>&lt;P&gt;I made post about it 2 years ago.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.checkpoint.com/t5/Firewall-and-Security-Management/Route-based-VPN-tunnel-to-Azure/m-p/206179/emcs_t/S2h8ZW1haWx8dG9waWNfc3Vic2NyaXB0aW9ufExTTjlYV1FXMUlGQVNMfDIwNjE3OXxTVUJTQ1JJUFRJT05TfGhL#M38950" target="_blank"&gt;https://community.checkpoint.com/t5/Firewall-and-Security-Management/Route-based-VPN-tunnel-to-Azure/m-p/206179/emcs_t/S2h8ZW1haWx8dG9waWNfc3Vic2NyaXB0aW9ufExTTjlYV1FXMUlGQVNMfDIwNjE3OXxTVUJTQ1JJUFRJT05TfGhL#M38950&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 14 Feb 2026 22:06:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Route-based-vpn-with-FortiGate-not-passing-traffic-no-MSPI-for/m-p/270896#M103304</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2026-02-14T22:06:33Z</dc:date>
    </item>
    <item>
      <title>Re: Route-based vpn with FortiGate not passing traffic - “no MSPI for MSA”</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Route-based-vpn-with-FortiGate-not-passing-traffic-no-MSPI-for/m-p/271007#M103314</link>
      <description>&lt;P&gt;Hi Andy,&lt;/P&gt;&lt;P&gt;I already have empty groups for the vpn domains on both sides and also Tunnel per gateway pair. I have tried permanent tunnel and non-permanent and the result is the same. As Simone points out, the permanent tunnel is specific to Check Point so is ignored by the FortiGate.&lt;BR /&gt;I used your post from 2 years ago as a reference but went with Numbered vti rather than Unnumbered because that was the recommendation.&lt;/P&gt;&lt;P&gt;I have vpns working successfully with Azure off the same security gateway but what was used there has not helped with getting the FortiGate vpn working.&lt;/P&gt;&lt;P&gt;Thanks for your input and based on the results I'm getting I think I'm getting closer to resolving it.&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Steve&lt;/P&gt;</description>
      <pubDate>Mon, 16 Feb 2026 14:27:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Route-based-vpn-with-FortiGate-not-passing-traffic-no-MSPI-for/m-p/271007#M103314</guid>
      <dc:creator>SteveW</dc:creator>
      <dc:date>2026-02-16T14:27:49Z</dc:date>
    </item>
    <item>
      <title>Re: Route-based vpn with FortiGate not passing traffic - “no MSPI for MSA”</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Route-based-vpn-with-FortiGate-not-passing-traffic-no-MSPI-for/m-p/271008#M103315</link>
      <description>&lt;P&gt;Hey Steve,&lt;/P&gt;
&lt;P&gt;If you are allowed to do remote, Im fairly confident we could make this work. I had done permanent tunnels with Fortigate dozen times (at least), always worked fine.&lt;/P&gt;</description>
      <pubDate>Mon, 16 Feb 2026 14:30:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Route-based-vpn-with-FortiGate-not-passing-traffic-no-MSPI-for/m-p/271008#M103315</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2026-02-16T14:30:03Z</dc:date>
    </item>
    <item>
      <title>Re: Route-based vpn with FortiGate not passing traffic - “no MSPI for MSA”</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Route-based-vpn-with-FortiGate-not-passing-traffic-no-MSPI-for/m-p/271009#M103316</link>
      <description>&lt;P&gt;Hello Simone,&lt;/P&gt;&lt;P&gt;Thanks for confirming the steps needed to create the vpn. Those are the actions I had taken and confirms that my Check Point peer is configured correctly.&lt;/P&gt;&lt;P&gt;For the numbered vti I have used 169.254.x.83 and 169.254.x.84 for the cluster members and 169.254.x.82 for the cluster vip. The next-hop is 169.254.x.81 and this has been configured in the static route in the routing table for each member.&lt;/P&gt;&lt;P&gt;I thought the 169.254.x.y addresses were significant only locally but I think the FortiGate needs to be configured with169.254.x.82 as the next-hop so that it can send traffic to my Check Point. This is the part I am unsure about because I'm not familiar with the FortiGate setup and if it can support a corresponding 'internal IP' as the next-hop back to me. I'm waiting for the third-party to get back to me.&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Steve&lt;/P&gt;</description>
      <pubDate>Mon, 16 Feb 2026 14:54:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Route-based-vpn-with-FortiGate-not-passing-traffic-no-MSPI-for/m-p/271009#M103316</guid>
      <dc:creator>SteveW</dc:creator>
      <dc:date>2026-02-16T14:54:02Z</dc:date>
    </item>
  </channel>
</rss>

