<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: S2S VPN cannot be connected - Invalid Key Exchange payload in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-VPN-cannot-be-connected-R82-10-Build-464-Invalid-Key/m-p/267187#M52816</link>
    <description>&lt;P&gt;It will take a lot of time, which we don’t have. I just reverted a snapshot to Take 271, hope it will help. By the way, I had another problem with this version, so I wouldn’t be surprised if it works on R81.&lt;/P&gt;</description>
    <pubDate>Tue, 13 Jan 2026 12:17:19 GMT</pubDate>
    <dc:creator>Exonix</dc:creator>
    <dc:date>2026-01-13T12:17:19Z</dc:date>
    <item>
      <title>S2S VPN cannot be connected R82.10 Build 464 - Invalid Key Exchange payload</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-VPN-cannot-be-connected-R82-10-Build-464-Invalid-Key/m-p/267011#M52780</link>
      <description>&lt;P&gt;Hello All,&lt;/P&gt;
&lt;P&gt;I have two CP gateways: one cloud-managed (vR82.10) and another on-premises-managed (vR80.40).&amp;nbsp;The cloud-managed firewall is also configured as a cluster (two 3950s) with ISP redundancy, but at the moment I am configuring the VPN with only one provider. I configured a basic site-to-site VPN, but it’s not working:&lt;BR /&gt;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Invalid Key Exchange payload.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/32671iD7E7FB6B2F739C29/image-size/large?v=v2&amp;amp;px=999" role="button" title="Invalid Key Exchange payload.png" alt="Invalid Key Exchange payload.png" /&gt;&lt;/span&gt;&lt;BR /&gt;&lt;BR /&gt;the same error in the Debug:&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;&amp;lt;Exchange serial="2775920" Peer="IP of my FW" Dir="Inbound" Type="Initial"&amp;gt;
        &amp;lt;peerIP&amp;gt;IP of my FW&amp;lt;/peerIP&amp;gt;
        &amp;lt;Message Valid="Yes" Initiator="Yes" Response="No" higherVer="No"&amp;gt;
                &amp;lt;arrivalTime&amp;gt;2026-01-11T20:39:10&amp;lt;/arrivalTime&amp;gt;
                &amp;lt;MsgID&amp;gt;0&amp;lt;/MsgID&amp;gt;
                &amp;lt;initSPI&amp;gt;d96446baa5702e5c&amp;lt;/initSPI&amp;gt;
                &amp;lt;respSPI&amp;gt;0000000000000000&amp;lt;/respSPI&amp;gt;
                &amp;lt;Next&amp;gt;SecurityAssociation&amp;lt;/Next&amp;gt;
                &amp;lt;Version&amp;gt;2.0&amp;lt;/Version&amp;gt;
                &amp;lt;Type&amp;gt;Initial&amp;lt;/Type&amp;gt;
                &amp;lt;Length&amp;gt;420&amp;lt;/Length&amp;gt;
                &amp;lt;Payloads&amp;gt;
                        &amp;lt;Payload Type="SecurityAssociation" Next="KeyExchange" Length="48" Critical="No"&amp;gt;
                                &amp;lt;prop ID="1"&amp;gt;
                                        &amp;lt;encr&amp;gt;AES-256&amp;lt;/encr&amp;gt;
                                        &amp;lt;prf&amp;gt;PRF-SHA256&amp;lt;/prf&amp;gt;
                                        &amp;lt;integ&amp;gt;HMAC-SHA2-256&amp;lt;/integ&amp;gt;
                                        &amp;lt;Key-Exchange&amp;gt;Group 20 (384-bit random ECP group)&amp;lt;/Key-Exchange&amp;gt;
                                &amp;lt;/prop&amp;gt;
                        &amp;lt;/Payload&amp;gt;
                        &amp;lt;Payload Type="KeyExchange" Next="Nonce" Length="264" Critical="No"&amp;gt;
                                &amp;lt;Method&amp;gt;14&amp;lt;/Method&amp;gt;
                                &amp;lt;Key&amp;gt;**********&amp;lt;/Key&amp;gt;
                        &amp;lt;/Payload&amp;gt;
                        &amp;lt;Payload Type="Nonce" Next="Notify" Length="24" Critical="No"&amp;gt;
                                &amp;lt;ndata&amp;gt;**********&amp;lt;/ndata&amp;gt;
                        &amp;lt;/Payload&amp;gt;
                        &amp;lt;Payload Type="Notify" Next="Notify" Length="28" Critical="No"&amp;gt;
                                &amp;lt;Protocol&amp;gt;0&amp;lt;/Protocol&amp;gt;
                                &amp;lt;Type&amp;gt;NAT detection source IP&amp;lt;/Type&amp;gt;
                                &amp;lt;spisize&amp;gt;0&amp;lt;/spisize&amp;gt;
                                &amp;lt;ndata&amp;gt;**********&amp;lt;/ndata&amp;gt;
                        &amp;lt;/Payload&amp;gt;
                        &amp;lt;Payload Type="Notify" Next="None" Length="28" Critical="No"&amp;gt;
                                &amp;lt;Protocol&amp;gt;0&amp;lt;/Protocol&amp;gt;
                                &amp;lt;Type&amp;gt;NAT detection destination IP&amp;lt;/Type&amp;gt;
                                &amp;lt;spisize&amp;gt;0&amp;lt;/spisize&amp;gt;
                                &amp;lt;ndata&amp;gt;**********&amp;lt;/ndata&amp;gt;
                        &amp;lt;/Payload&amp;gt;
                &amp;lt;/Payloads&amp;gt;
        &amp;lt;/Message&amp;gt;
        &amp;lt;Message Valid="Yes" Initiator="No" Response="Yes" higherVer="No"&amp;gt;
                &amp;lt;arrivalTime&amp;gt;2026-01-11T20:39:10&amp;lt;/arrivalTime&amp;gt;
                &amp;lt;MsgID&amp;gt;0&amp;lt;/MsgID&amp;gt;
                &amp;lt;initSPI&amp;gt;d96446baa5702e5c&amp;lt;/initSPI&amp;gt;
                &amp;lt;respSPI&amp;gt;0000000000000000&amp;lt;/respSPI&amp;gt;
                &amp;lt;Next&amp;gt;Notify&amp;lt;/Next&amp;gt;
                &amp;lt;Version&amp;gt;2.0&amp;lt;/Version&amp;gt;
                &amp;lt;Type&amp;gt;Initial&amp;lt;/Type&amp;gt;
                &amp;lt;Length&amp;gt;38&amp;lt;/Length&amp;gt;
                &amp;lt;Payloads&amp;gt;
                        &amp;lt;Payload Type="Notify" Next="None" Length="10" Critical="No"&amp;gt;
                                &amp;lt;Protocol&amp;gt;0&amp;lt;/Protocol&amp;gt;
                                &amp;lt;Type&amp;gt;Invalid Key Exchange payload&amp;lt;/Type&amp;gt;
                                &amp;lt;spisize&amp;gt;0&amp;lt;/spisize&amp;gt;
                                &amp;lt;ndata&amp;gt;00 0e&amp;lt;/ndata&amp;gt;
                        &amp;lt;/Payload&amp;gt;
                &amp;lt;/Payloads&amp;gt;
        &amp;lt;/Message&amp;gt;
        &amp;lt;final_state&amp;gt;message sent&amp;lt;/final_state&amp;gt;
        &amp;lt;peerdesc&amp;gt;IP of my FW&amp;lt;/peerdesc&amp;gt;
        &amp;lt;final_status&amp;gt;failure (final)&amp;lt;/final_status&amp;gt;
&amp;lt;/Exchange&amp;gt;
&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;BR /&gt;The Debug on my FW is a bit different -&amp;nbsp;&lt;SPAN&gt;In the logs, the firewall &lt;STRONG&gt;hostname&lt;/STRONG&gt; is shown instead of its IP address:&lt;/SPAN&gt;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;&amp;lt;Exchange serial="14064076" Peer="HOSTNAME of the 3950" Dir="Outbound" Type="Initial"&amp;gt;
        &amp;lt;peerIP&amp;gt;Cluster 3950 IP&amp;lt;/peerIP&amp;gt;
        &amp;lt;Message Valid="Yes" Initiator="Yes" Response="No" higherVer="No"&amp;gt;
                &amp;lt;arrivalTime&amp;gt;2026-01-11T20:39:11&amp;lt;/arrivalTime&amp;gt;
                &amp;lt;MsgID&amp;gt;0&amp;lt;/MsgID&amp;gt;
                &amp;lt;initSPI&amp;gt;d96446baa5702e5c&amp;lt;/initSPI&amp;gt;
                &amp;lt;respSPI&amp;gt;0000000000000000&amp;lt;/respSPI&amp;gt;
                &amp;lt;Next&amp;gt;SecurityAssociation&amp;lt;/Next&amp;gt;
                &amp;lt;Version&amp;gt;2.0&amp;lt;/Version&amp;gt;
                &amp;lt;Type&amp;gt;Initial&amp;lt;/Type&amp;gt;
                &amp;lt;Length&amp;gt;420&amp;lt;/Length&amp;gt;
                &amp;lt;Payloads&amp;gt;
                        &amp;lt;Payload Type="SecurityAssociation" Next="KeyExchange" Length="48" Critical="No"&amp;gt;
                                &amp;lt;prop ID="1"&amp;gt;
                                        &amp;lt;SPI&amp;gt;d96446baa5702e5c&amp;lt;/SPI&amp;gt;
                                        &amp;lt;encr&amp;gt;AES-256&amp;lt;/encr&amp;gt;
                                        &amp;lt;prf&amp;gt;PRF-SHA256&amp;lt;/prf&amp;gt;
                                        &amp;lt;integ&amp;gt;HMAC-SHA2-256&amp;lt;/integ&amp;gt;
                                        &amp;lt;dh&amp;gt;Group 20 (384-bit random ECP group)&amp;lt;/dh&amp;gt;
                                &amp;lt;/prop&amp;gt;
                        &amp;lt;/Payload&amp;gt;
                        &amp;lt;Payload Type="KeyExchange" Next="Nonce" Length="264" Critical="No"&amp;gt;
                                &amp;lt;Group&amp;gt;14&amp;lt;/Group&amp;gt;
                                &amp;lt;Key&amp;gt;*************&amp;lt;/Key&amp;gt;
                        &amp;lt;/Payload&amp;gt;
                        &amp;lt;Payload Type="Nonce" Next="Notify" Length="24" Critical="No"&amp;gt;
                                &amp;lt;ndata&amp;gt;*************&amp;lt;/ndata&amp;gt;
                        &amp;lt;/Payload&amp;gt;
                        &amp;lt;Payload Type="Notify" Next="Notify" Length="28" Critical="No"&amp;gt;
                                &amp;lt;Protocol&amp;gt;0&amp;lt;/Protocol&amp;gt;
                                &amp;lt;Type&amp;gt;NAT detection source IP&amp;lt;/Type&amp;gt;
                                &amp;lt;spisize&amp;gt;0&amp;lt;/spisize&amp;gt;
                                &amp;lt;ndata&amp;gt;*************&amp;lt;/ndata&amp;gt;
                        &amp;lt;/Payload&amp;gt;
                        &amp;lt;Payload Type="Notify" Next="None" Length="28" Critical="No"&amp;gt;
                                &amp;lt;Protocol&amp;gt;0&amp;lt;/Protocol&amp;gt;
                                &amp;lt;Type&amp;gt;NAT detection destination IP&amp;lt;/Type&amp;gt;
                                &amp;lt;spisize&amp;gt;0&amp;lt;/spisize&amp;gt;
                                &amp;lt;ndata&amp;gt;*************&amp;lt;/ndata&amp;gt;
                        &amp;lt;/Payload&amp;gt;
                &amp;lt;/Payloads&amp;gt;
        &amp;lt;/Message&amp;gt;
        &amp;lt;Message Valid="Yes" Initiator="No" Response="Yes" higherVer="No"&amp;gt;
                &amp;lt;arrivalTime&amp;gt;2026-01-11T20:39:11&amp;lt;/arrivalTime&amp;gt;
                &amp;lt;MsgID&amp;gt;0&amp;lt;/MsgID&amp;gt;
                &amp;lt;initSPI&amp;gt;d96446baa5702e5c&amp;lt;/initSPI&amp;gt;
                &amp;lt;respSPI&amp;gt;0000000000000000&amp;lt;/respSPI&amp;gt;
                &amp;lt;Next&amp;gt;Notify&amp;lt;/Next&amp;gt;
                &amp;lt;Version&amp;gt;2.0&amp;lt;/Version&amp;gt;
                &amp;lt;Type&amp;gt;Initial&amp;lt;/Type&amp;gt;
                &amp;lt;Length&amp;gt;38&amp;lt;/Length&amp;gt;
                &amp;lt;Payloads&amp;gt;
                        &amp;lt;Payload Type="Notify" Next="None" Length="10" Critical="No"&amp;gt;
                                &amp;lt;Protocol&amp;gt;0&amp;lt;/Protocol&amp;gt;
                                &amp;lt;Type&amp;gt;Invalid Key Exchange payload&amp;lt;/Type&amp;gt;
                                &amp;lt;spisize&amp;gt;0&amp;lt;/spisize&amp;gt;
                                &amp;lt;ndata&amp;gt;00 0e&amp;lt;/ndata&amp;gt;
                        &amp;lt;/Payload&amp;gt;
                &amp;lt;/Payloads&amp;gt;
        &amp;lt;/Message&amp;gt;
        &amp;lt;final_state&amp;gt;received message&amp;lt;/final_state&amp;gt;
        &amp;lt;peerdesc&amp;gt;HOSTNAME of the 3950&amp;lt;/peerdesc&amp;gt;
        &amp;lt;final_status&amp;gt;failure (final)&amp;lt;/final_status&amp;gt;
&amp;lt;/Exchange&amp;gt;&lt;/LI-CODE&gt;
&lt;P&gt;&lt;BR /&gt;I already tried configuring the VPN with &lt;STRONG&gt;group 14 and without PFS&lt;/STRONG&gt; — nothing helped. The Settings of the VPN. With the same settings we have already anothe VPN to CP 1900 (This will be replaced with&amp;nbsp;the 3950)&lt;BR /&gt;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="gateways.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/32668i6BE961739C1EBEE4/image-size/large?v=v2&amp;amp;px=999" role="button" title="gateways.png" alt="gateways.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Encryption.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/32669i724FBC7E5509BD64/image-size/large?v=v2&amp;amp;px=999" role="button" title="Encryption.png" alt="Encryption.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="advanced.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/32670i5D8B231787EB9EA2/image-size/large?v=v2&amp;amp;px=999" role="button" title="advanced.png" alt="advanced.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;DIV class="flex flex-col text-sm pb-25"&gt;
&lt;ARTICLE class="text-token-text-primary w-full focus:outline-none [--shadow-height:45px] has-data-writing-block:pointer-events-none has-data-writing-block:-mt-(--shadow-height) has-data-writing-block:pt-(--shadow-height) [&amp;amp;:has([data-writing-block])&amp;gt;*]:pointer-events-auto scroll-mt-[calc(var(--header-height)+min(200px,max(70px,20svh)))]" dir="auto" tabindex="-1" data-turn-id="request-6955bf85-3220-8327-9885-c7ce3f90a519-6" data-testid="conversation-turn-86" data-scroll-anchor="true" data-turn="assistant"&gt;
&lt;DIV class="text-base my-auto mx-auto pb-10 [--thread-content-margin:--spacing(4)] @w-sm/main:[--thread-content-margin:--spacing(6)] @w-lg/main:[--thread-content-margin:--spacing(16)] px-(--thread-content-margin)"&gt;
&lt;DIV class="[--thread-content-max-width:40rem] @w-lg/main:[--thread-content-max-width:48rem] mx-auto max-w-(--thread-content-max-width) flex-1 group/turn-messages focus-visible:outline-hidden relative flex w-full min-w-0 flex-col agent-turn" tabindex="-1"&gt;
&lt;DIV class="flex max-w-full flex-col grow"&gt;
&lt;DIV class="min-h-8 text-message relative flex w-full flex-col items-end gap-2 text-start break-words whitespace-normal [.text-message+&amp;amp;]:mt-1" dir="auto" data-message-author-role="assistant" data-message-id="0e02fafe-d2de-4190-a0db-349c89195ed1" data-message-model-slug="gpt-5-2"&gt;
&lt;DIV class="flex w-full flex-col gap-1 empty:hidden first:pt-[1px]"&gt;
&lt;DIV class="markdown prose dark:prose-invert w-full break-words light markdown-new-styling"&gt;
&lt;P data-start="0" data-end="28" data-is-last-node="" data-is-only-node=""&gt;I would appreciate any help &lt;span class="lia-unicode-emoji" title=":folded_hands:"&gt;🙏&lt;/span&gt;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/ARTICLE&gt;
&lt;/DIV&gt;</description>
      <pubDate>Wed, 14 Jan 2026 16:11:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-VPN-cannot-be-connected-R82-10-Build-464-Invalid-Key/m-p/267011#M52780</guid>
      <dc:creator>Exonix</dc:creator>
      <dc:date>2026-01-14T16:11:06Z</dc:date>
    </item>
    <item>
      <title>Re: S2S VPN cannot be connected - Invalid Key Exchange payload</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-VPN-cannot-be-connected-R82-10-Build-464-Invalid-Key/m-p/267019#M52782</link>
      <description>&lt;P&gt;With ISP Redundancy on 3950s, You might want to change the settings in "Link Selection" under IPSec VPN settings on the cluster object.&lt;BR /&gt;When you say I have configured VPN on one ISP link, does this mean you have selected that specific IP under the option "Always use this IP address"?&lt;BR /&gt;&lt;BR /&gt;With the firewall hostname mentioned in the logs, I suspect that is your issue for phase 1.&lt;/P&gt;</description>
      <pubDate>Mon, 12 Jan 2026 10:15:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-VPN-cannot-be-connected-R82-10-Build-464-Invalid-Key/m-p/267019#M52782</guid>
      <dc:creator>AttiqRahman786</dc:creator>
      <dc:date>2026-01-12T10:15:51Z</dc:date>
    </item>
    <item>
      <title>Re: S2S VPN cannot be connected - Invalid Key Exchange payload</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-VPN-cannot-be-connected-R82-10-Build-464-Invalid-Key/m-p/267025#M52784</link>
      <description>&lt;P&gt;&lt;SPAN&gt;After configuring ISP redundancy, the link selection is greyed out.&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Link_selection.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/32672iADE642CEFC35C7B6/image-size/large?v=v2&amp;amp;px=999" role="button" title="Link_selection.png" alt="Link_selection.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;By “with one ISP,” I mean that I am using only the IP address of the first (active) ISP as the remote peer. You can see this on the first configuration pucture. &lt;BR /&gt;I also think that the hostname may have an impact, but I haven’t found a way to resolve this yet.&lt;/P&gt;</description>
      <pubDate>Mon, 12 Jan 2026 10:50:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-VPN-cannot-be-connected-R82-10-Build-464-Invalid-Key/m-p/267025#M52784</guid>
      <dc:creator>Exonix</dc:creator>
      <dc:date>2026-01-12T10:50:17Z</dc:date>
    </item>
    <item>
      <title>Re: S2S VPN cannot be connected - Invalid Key Exchange payload</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-VPN-cannot-be-connected-R82-10-Build-464-Invalid-Key/m-p/267027#M52785</link>
      <description>&lt;P&gt;Just noticed this while skimming through your debug logs - I might have spotted something, though I haven't had time to verify it thoroughly:&lt;/P&gt;
&lt;P&gt;In the IKE exchange, Firewall 2 appears to be proposing DH Group 20 (384-bit ECP) in the Security Association payload, but the actual KeyExchange payload contains &amp;lt;Group&amp;gt;14&amp;lt;/Group&amp;gt; (2048-bit MODP). Firewall 1 then rejects this with "Invalid Key Exchange payload" error code 0x0e (which is decimal 14).&lt;/P&gt;
&lt;P&gt;This looks like a potential DH group mismatch or misconfiguration on the initiator side. Might be worth checking that the IKE Phase 1 proposal configuration is consistent on both gateways - specifically that the DH groups match on both sides.&lt;/P&gt;
&lt;P&gt;Could be completely off here since I didn't dive deep into it, but thought it was worth mentioning in case it helps.&lt;/P&gt;</description>
      <pubDate>Mon, 12 Jan 2026 11:00:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-VPN-cannot-be-connected-R82-10-Build-464-Invalid-Key/m-p/267027#M52785</guid>
      <dc:creator>Vincent_Bacher</dc:creator>
      <dc:date>2026-01-12T11:00:23Z</dc:date>
    </item>
    <item>
      <title>Re: S2S VPN cannot be connected - Invalid Key Exchange payload</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-VPN-cannot-be-connected-R82-10-Build-464-Invalid-Key/m-p/267030#M52786</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;Did you check without "Apply settings to VPN traffic" ?&amp;nbsp;&lt;SPAN&gt;In other words it would be useful to test by selecting the relevant External interface only via &lt;/SPAN&gt;Link Selection&lt;SPAN&gt;. You can proceed based on the outcome you get from there. (Of course, while performing this test, you should plan accordingly if you have multiple VPN sites.)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;If it works this way, you can use the HA settings under the Link Selection section for redundancy.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;</description>
      <pubDate>Mon, 12 Jan 2026 11:11:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-VPN-cannot-be-connected-R82-10-Build-464-Invalid-Key/m-p/267030#M52786</guid>
      <dc:creator>TurgutKaplanogl</dc:creator>
      <dc:date>2026-01-12T11:11:09Z</dc:date>
    </item>
    <item>
      <title>Re: S2S VPN cannot be connected - Invalid Key Exchange payload</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-VPN-cannot-be-connected-R82-10-Build-464-Invalid-Key/m-p/267031#M52787</link>
      <description>&lt;P&gt;This is a good point, because when I changed the DH group to 14, the key exchange remained at group 20 on both firewalls. I thought this was a bug. As you can see in the configuration screenshots, DH is set to 20 — so why does it show &lt;CODE data-start="235" data-end="254"&gt;&amp;lt;Group&amp;gt;14&amp;lt;/Group&amp;gt;&lt;/CODE&gt; then? No matter which groups I specify, it always remains &lt;CODE data-start="52" data-end="98"&gt;&amp;lt;dh&amp;gt;Group 20 (384-bit random ECP group)&amp;lt;/dh&amp;gt;&lt;/CODE&gt; and &lt;CODE data-start="103" data-end="122"&gt;&amp;lt;Group&amp;gt;14&amp;lt;/Group&amp;gt;&amp;nbsp;&lt;span class="lia-unicode-emoji" title=":face_with_steam_from_nose:"&gt;😤&lt;/span&gt;&lt;/CODE&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 12 Jan 2026 11:12:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-VPN-cannot-be-connected-R82-10-Build-464-Invalid-Key/m-p/267031#M52787</guid>
      <dc:creator>Exonix</dc:creator>
      <dc:date>2026-01-12T11:12:06Z</dc:date>
    </item>
    <item>
      <title>Re: S2S VPN cannot be connected - Invalid Key Exchange payload</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-VPN-cannot-be-connected-R82-10-Build-464-Invalid-Key/m-p/267035#M52789</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/63510"&gt;@TurgutKaplanogl&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;wow, after unselect the "&lt;SPAN&gt;Apply settings to VPN traffic&lt;/SPAN&gt;" the "Link Selection" is active again. Let me test it.&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Link_selection2.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/32673iD6177A40FC6E195C/image-size/large?v=v2&amp;amp;px=999" role="button" title="Link_selection2.png" alt="Link_selection2.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 12 Jan 2026 11:16:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-VPN-cannot-be-connected-R82-10-Build-464-Invalid-Key/m-p/267035#M52789</guid>
      <dc:creator>Exonix</dc:creator>
      <dc:date>2026-01-12T11:16:57Z</dc:date>
    </item>
    <item>
      <title>Re: S2S VPN cannot be connected - Invalid Key Exchange payload</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-VPN-cannot-be-connected-R82-10-Build-464-Invalid-Key/m-p/267048#M52792</link>
      <description>&lt;P&gt;Since I can't see anything at the moment, I would suggest submitting a ticket to TAC.&lt;/P&gt;</description>
      <pubDate>Mon, 12 Jan 2026 13:06:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-VPN-cannot-be-connected-R82-10-Build-464-Invalid-Key/m-p/267048#M52792</guid>
      <dc:creator>Vincent_Bacher</dc:creator>
      <dc:date>2026-01-12T13:06:27Z</dc:date>
    </item>
    <item>
      <title>Re: S2S VPN cannot be connected - Invalid Key Exchange payload</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-VPN-cannot-be-connected-R82-10-Build-464-Invalid-Key/m-p/267053#M52795</link>
      <description>&lt;P&gt;I just have opened it...&lt;/P&gt;</description>
      <pubDate>Mon, 12 Jan 2026 13:44:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-VPN-cannot-be-connected-R82-10-Build-464-Invalid-Key/m-p/267053#M52795</guid>
      <dc:creator>Exonix</dc:creator>
      <dc:date>2026-01-12T13:44:19Z</dc:date>
    </item>
    <item>
      <title>Re: S2S VPN cannot be connected - Invalid Key Exchange payload</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-VPN-cannot-be-connected-R82-10-Build-464-Invalid-Key/m-p/267055#M52796</link>
      <description>&lt;P&gt;Did you try change it to DH 14 to see if that makes any difference?&lt;/P&gt;</description>
      <pubDate>Mon, 12 Jan 2026 13:45:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-VPN-cannot-be-connected-R82-10-Build-464-Invalid-Key/m-p/267055#M52796</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2026-01-12T13:45:30Z</dc:date>
    </item>
    <item>
      <title>Re: S2S VPN cannot be connected - Invalid Key Exchange payload</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-VPN-cannot-be-connected-R82-10-Build-464-Invalid-Key/m-p/267057#M52797</link>
      <description>&lt;P&gt;Are the 3950s running the new R82.10 Build 464 or the original Build 271 + JHF-22?&lt;/P&gt;
&lt;P&gt;I ask because when I upgraded ours, GCM ciphers no longer work in Phase 1, we have an open TAC case. So, you might also be hitting an IPsec bug.&lt;/P&gt;</description>
      <pubDate>Mon, 12 Jan 2026 13:53:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-VPN-cannot-be-connected-R82-10-Build-464-Invalid-Key/m-p/267057#M52797</guid>
      <dc:creator>CaseyB</dc:creator>
      <dc:date>2026-01-12T13:53:39Z</dc:date>
    </item>
    <item>
      <title>Re: S2S VPN cannot be connected - Invalid Key Exchange payload</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-VPN-cannot-be-connected-R82-10-Build-464-Invalid-Key/m-p/267059#M52798</link>
      <description>&lt;P&gt;&lt;SPAN class="YPkS7KbdpWfGdYKd3QB9" data-src-align="0:1"&gt;I&lt;/SPAN&gt; &lt;SPAN class="YPkS7KbdpWfGdYKd3QB9" data-src-align="2:7"&gt;upgraded&lt;/SPAN&gt; &lt;SPAN class="YPkS7KbdpWfGdYKd3QB9" data-src-align="10:3"&gt;it&lt;/SPAN&gt; &lt;SPAN class="YPkS7KbdpWfGdYKd3QB9" data-src-align="14:2"&gt;to&lt;/SPAN&gt; &lt;SPAN class="YPkS7KbdpWfGdYKd3QB9" data-src-align="17:6"&gt;version&lt;/SPAN&gt; &lt;SPAN class="YPkS7KbdpWfGdYKd3QB9" data-src-align="24:3"&gt;464&lt;/SPAN&gt; &lt;SPAN class="YPkS7KbdpWfGdYKd3QB9" data-src-align="29:6"&gt;before&lt;/SPAN&gt; &lt;SPAN class="YPkS7KbdpWfGdYKd3QB9" data-src-align="40:10"&gt;proceeding&lt;/SPAN&gt; &lt;SPAN class="YPkS7KbdpWfGdYKd3QB9" data-src-align="51:1"&gt;with&lt;/SPAN&gt; &lt;SPAN class="YPkS7KbdpWfGdYKd3QB9" data-src-align="53:5:59:4"&gt;any&lt;/SPAN&gt; &lt;SPAN class="YPkS7KbdpWfGdYKd3QB9" data-src-align="64:9"&gt;configuration&lt;/SPAN&gt;&lt;SPAN&gt;.&amp;nbsp;Did &lt;SPAN class="YPkS7KbdpWfGdYKd3QB9" data-src-align="0:2"&gt;you&lt;/SPAN&gt; &lt;SPAN class="YPkS7KbdpWfGdYKd3QB9" data-src-align="3:11"&gt;encounter&lt;/SPAN&gt; &lt;SPAN class="YPkS7KbdpWfGdYKd3QB9" data-src-align="17:4"&gt;this&lt;/SPAN&gt; &lt;SPAN class="YPkS7KbdpWfGdYKd3QB9" data-src-align="22:7"&gt;bug&lt;/SPAN&gt; &lt;SPAN class="YPkS7KbdpWfGdYKd3QB9" data-src-align="30:1"&gt;in&lt;/SPAN&gt; the &lt;SPAN class="YPkS7KbdpWfGdYKd3QB9" data-src-align="32:9"&gt;latest&lt;/SPAN&gt; &lt;SPAN class="YPkS7KbdpWfGdYKd3QB9" data-src-align="42:10"&gt;update&lt;/SPAN&gt;&lt;SPAN class="YPkS7KbdpWfGdYKd3QB9" data-src-align="52:1"&gt;?&lt;/SPAN&gt;??&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 12 Jan 2026 14:07:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-VPN-cannot-be-connected-R82-10-Build-464-Invalid-Key/m-p/267059#M52798</guid>
      <dc:creator>Exonix</dc:creator>
      <dc:date>2026-01-12T14:07:58Z</dc:date>
    </item>
    <item>
      <title>Re: S2S VPN cannot be connected - Invalid Key Exchange payload</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-VPN-cannot-be-connected-R82-10-Build-464-Invalid-Key/m-p/267060#M52799</link>
      <description>&lt;P&gt;Yes, we were using GCM ciphers without issues on Build 271, the upgrade to Build 464 broke them. It doesn't seem like much of a stretch that you could also be running into an IPsec bug.&lt;/P&gt;</description>
      <pubDate>Mon, 12 Jan 2026 14:12:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-VPN-cannot-be-connected-R82-10-Build-464-Invalid-Key/m-p/267060#M52799</guid>
      <dc:creator>CaseyB</dc:creator>
      <dc:date>2026-01-12T14:12:08Z</dc:date>
    </item>
    <item>
      <title>Re: S2S VPN cannot be connected - Invalid Key Exchange payload</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-VPN-cannot-be-connected-R82-10-Build-464-Invalid-Key/m-p/267067#M52800</link>
      <description>&lt;P&gt;&lt;SPAN class="YPkS7KbdpWfGdYKd3QB9" data-src-align="0:3"&gt;how&lt;/SPAN&gt; &lt;SPAN class="YPkS7KbdpWfGdYKd3QB9" data-src-align="4:5"&gt;long&lt;/SPAN&gt; &lt;SPAN class="YPkS7KbdpWfGdYKd3QB9" data-src-align="10:3"&gt;has&lt;/SPAN&gt; &lt;SPAN class="YPkS7KbdpWfGdYKd3QB9" data-src-align="21:3"&gt;your&lt;/SPAN&gt; &lt;SPAN class="YPkS7KbdpWfGdYKd3QB9" data-src-align="25:5"&gt;ticket&lt;/SPAN&gt;&lt;SPAN&gt; been &lt;/SPAN&gt;&lt;SPAN class="YPkS7KbdpWfGdYKd3QB9" data-src-align="14:6"&gt;open&lt;/SPAN&gt;&lt;SPAN class="YPkS7KbdpWfGdYKd3QB9" data-src-align="30:1"&gt;?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 12 Jan 2026 14:48:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-VPN-cannot-be-connected-R82-10-Build-464-Invalid-Key/m-p/267067#M52800</guid>
      <dc:creator>Exonix</dc:creator>
      <dc:date>2026-01-12T14:48:45Z</dc:date>
    </item>
    <item>
      <title>Re: S2S VPN cannot be connected - Invalid Key Exchange payload</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-VPN-cannot-be-connected-R82-10-Build-464-Invalid-Key/m-p/267102#M52804</link>
      <description>&lt;P&gt;Since last Wednesday, we did a troubleshooting session Thursday and collected logs / debugs.&lt;/P&gt;</description>
      <pubDate>Mon, 12 Jan 2026 17:02:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-VPN-cannot-be-connected-R82-10-Build-464-Invalid-Key/m-p/267102#M52804</guid>
      <dc:creator>CaseyB</dc:creator>
      <dc:date>2026-01-12T17:02:30Z</dc:date>
    </item>
    <item>
      <title>Re: S2S VPN cannot be connected - Invalid Key Exchange payload</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-VPN-cannot-be-connected-R82-10-Build-464-Invalid-Key/m-p/267115#M52807</link>
      <description>&lt;P&gt;yes, I tried, but it didn't help, and moreover, I still saw DH 20 in the logs...&lt;/P&gt;</description>
      <pubDate>Mon, 12 Jan 2026 20:57:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-VPN-cannot-be-connected-R82-10-Build-464-Invalid-Key/m-p/267115#M52807</guid>
      <dc:creator>Exonix</dc:creator>
      <dc:date>2026-01-12T20:57:11Z</dc:date>
    </item>
    <item>
      <title>Re: S2S VPN cannot be connected - Invalid Key Exchange payload</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-VPN-cannot-be-connected-R82-10-Build-464-Invalid-Key/m-p/267133#M52808</link>
      <description>&lt;P&gt;I'd recommend to press the escalate button then.&lt;/P&gt;</description>
      <pubDate>Tue, 13 Jan 2026 07:02:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-VPN-cannot-be-connected-R82-10-Build-464-Invalid-Key/m-p/267133#M52808</guid>
      <dc:creator>Vincent_Bacher</dc:creator>
      <dc:date>2026-01-13T07:02:04Z</dc:date>
    </item>
    <item>
      <title>Re: S2S VPN cannot be connected - Invalid Key Exchange payload</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-VPN-cannot-be-connected-R82-10-Build-464-Invalid-Key/m-p/267169#M52809</link>
      <description>&lt;P&gt;they just closed my Ticket, because one my side 80.40 is out of support...&amp;nbsp; 🤦‍&lt;/P&gt;</description>
      <pubDate>Tue, 13 Jan 2026 11:35:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-VPN-cannot-be-connected-R82-10-Build-464-Invalid-Key/m-p/267169#M52809</guid>
      <dc:creator>Exonix</dc:creator>
      <dc:date>2026-01-13T11:35:01Z</dc:date>
    </item>
    <item>
      <title>Re: S2S VPN cannot be connected - Invalid Key Exchange payload</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-VPN-cannot-be-connected-R82-10-Build-464-Invalid-Key/m-p/267172#M52811</link>
      <description>&lt;P&gt;It's probably time to upgrade...&lt;/P&gt;</description>
      <pubDate>Tue, 13 Jan 2026 11:08:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-VPN-cannot-be-connected-R82-10-Build-464-Invalid-Key/m-p/267172#M52811</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2026-01-13T11:08:17Z</dc:date>
    </item>
    <item>
      <title>Re: S2S VPN cannot be connected - Invalid Key Exchange payload</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-VPN-cannot-be-connected-R82-10-Build-464-Invalid-Key/m-p/267179#M52812</link>
      <description>&lt;P&gt;we can't just upgrade with one click and one day. And my request was't about this system, but about 82.10...&lt;/P&gt;</description>
      <pubDate>Tue, 13 Jan 2026 11:36:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-VPN-cannot-be-connected-R82-10-Build-464-Invalid-Key/m-p/267179#M52812</guid>
      <dc:creator>Exonix</dc:creator>
      <dc:date>2026-01-13T11:36:13Z</dc:date>
    </item>
  </channel>
</rss>

