<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Understanding a kernel vpn debug in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Understanding-a-kernel-vpn-debug/m-p/269108#M53262</link>
    <description>&lt;P&gt;You know, not to sound funny or ironic now, but when I was in my 20s, I could troubleshoot things for hours on end and still be fine...now in my 40s, I do NOT want to do that, UNLESS there is very good reason for it lol&lt;/P&gt;</description>
    <pubDate>Thu, 29 Jan 2026 18:41:05 GMT</pubDate>
    <dc:creator>the_rock</dc:creator>
    <dc:date>2026-01-29T18:41:05Z</dc:date>
    <item>
      <title>Understanding a kernel vpn debug</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Understanding-a-kernel-vpn-debug/m-p/268923#M53200</link>
      <description>&lt;P&gt;Good morning all.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've got a repeating vpn issue between my R81.20 cluster and a 3rd party cisco gateway. It fails to re-negotiate on the phase 2 timeout without me resetting the vpn at the CP end.&lt;BR /&gt;I've checked with the the 3rd party and the ikev2 vpn settings all match, but it still fails.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've taken a kernel debug with the instructions here&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/sk/sk180488" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk180488&lt;/A&gt;&amp;nbsp;but I'm not totally sure how to interpret the debug output, anyone got any pointers to help read through it to isolate the issue ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;&lt;P&gt;Ian&lt;/P&gt;</description>
      <pubDate>Wed, 28 Jan 2026 10:45:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Understanding-a-kernel-vpn-debug/m-p/268923#M53200</guid>
      <dc:creator>ibrown</dc:creator>
      <dc:date>2026-01-28T10:45:29Z</dc:date>
    </item>
    <item>
      <title>Re: Understanding a kernel vpn debug</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Understanding-a-kernel-vpn-debug/m-p/268925#M53202</link>
      <description>&lt;P&gt;It's difficult to answer this without seeing the debug output.&lt;/P&gt;</description>
      <pubDate>Wed, 28 Jan 2026 11:00:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Understanding-a-kernel-vpn-debug/m-p/268925#M53202</guid>
      <dc:creator>Vincent_Bacher</dc:creator>
      <dc:date>2026-01-28T11:00:02Z</dc:date>
    </item>
    <item>
      <title>Re: Understanding a kernel vpn debug</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Understanding-a-kernel-vpn-debug/m-p/268926#M53203</link>
      <description>&lt;P&gt;For Phase 2 issues, mostly they are related to Encryption Domains. Do they match on Cisco? normally they have to add policy rules to allow the same domains.&lt;/P&gt;</description>
      <pubDate>Wed, 28 Jan 2026 11:16:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Understanding-a-kernel-vpn-debug/m-p/268926#M53203</guid>
      <dc:creator>AttiqRahman786</dc:creator>
      <dc:date>2026-01-28T11:16:50Z</dc:date>
    </item>
    <item>
      <title>Re: Understanding a kernel vpn debug</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Understanding-a-kernel-vpn-debug/m-p/268927#M53204</link>
      <description>&lt;P&gt;We need a bit more information to assist you, as there are several possible causes for this issue. Please let us know:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;How your Link Selection settings are configured&lt;/LI&gt;&lt;LI&gt;Whether you are using ISP Redundancy&lt;/LI&gt;&lt;LI&gt;Details about the VPN community configuration and relevant security rules, and informations phase 1 and phase 2 from remote peer&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Based on your description, it seems Phase 1 is established, but Phase 2 fails to re-negotiate after the timeout. Since you have already verified the IKEv2 settings on both sides, let's gather more diagnostic information.&lt;/P&gt;&lt;H4&gt;Recommended Steps&lt;/H4&gt;&lt;OL&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;Collect VPN Debugs:&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://sc1.checkpoint.com/documents/R81.20/WebAdminGuides/EN/CP_R81.20_SitetoSiteVPN_AdminGuide/Content/Topics-VPNSG/CLI/vpn-debug.htm?tocpath=Command%20Line%20Reference%7Cvpn%7C_____6" target="_blank" rel="noopener"&gt;https://sc1.checkpoint.com/documents/R81.20/WebAdminGuides/EN/CP_R81.20_SitetoSiteVPN_AdminGuide/Content/Topics-VPNSG/CLI/vpn-debug.htm?tocpath=Command%20Line%20Reference%7Cvpn%7C_____6&lt;/A&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;PRE&gt;vpn debug on
vpn debug trunc on
vpn debug ikeon
vpndebug trunc ALL=5&lt;/PRE&gt;&lt;P&gt;&lt;EM&gt;(Remember to disable debug after collecting logs to avoid performance impact:vpn debug off, vpn debug ikeoff, vpn debug truncoff&lt;/EM&gt;&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;Analyze with IKEView - &lt;SPAN&gt;sk30994&lt;/SPAN&gt;:&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Download IKEView (see:&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk30933" target="_blank" rel="noopener"&gt;What is the IKEView utility?&lt;/A&gt;)&lt;/LI&gt;&lt;LI&gt;Use it to analyze the debug files for detailed IKE negotiation information.&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;Reference Best Practices:&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Review&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk108600" target="_blank" rel="noopener"&gt;sk108600&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;– VPN Site-to-Site with 3rd party for common issues and solutions when working with third-party devices.&lt;/LI&gt;&lt;LI&gt;This sk normally bring good solutions for many situations&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;Check SmartConsole Logs:&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Filter by the peer’s public IP to find relevant VPN log entries.&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;H4&gt;Next Steps&lt;/H4&gt;&lt;P&gt;Please provide:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;The debug logs collected&lt;/LI&gt;&lt;LI&gt;Details about your Link Selection, ISP Redundancy, and VPN community configuration&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;With this information, we can help you isolate the root cause and suggest a solution.&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;If this is a critical situation for your environment, I suggest opening a TAC (Technical Assistance Center) case with Check Point Support to ensure faster and more direct assistance.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Best Regards,&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 28 Jan 2026 11:21:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Understanding-a-kernel-vpn-debug/m-p/268927#M53204</guid>
      <dc:creator>israelfds95</dc:creator>
      <dc:date>2026-01-28T11:21:35Z</dc:date>
    </item>
    <item>
      <title>Re: Understanding a kernel vpn debug</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Understanding-a-kernel-vpn-debug/m-p/268930#M53205</link>
      <description>&lt;P&gt;I would also add the&amp;nbsp;&lt;STRONG&gt;ATRG: VPN Core (Site to Site)&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk104760" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk104760&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 28 Jan 2026 11:28:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Understanding-a-kernel-vpn-debug/m-p/268930#M53205</guid>
      <dc:creator>Tal_Paz-Fridman</dc:creator>
      <dc:date>2026-01-28T11:28:53Z</dc:date>
    </item>
    <item>
      <title>Re: Understanding a kernel vpn debug</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Understanding-a-kernel-vpn-debug/m-p/268932#M53206</link>
      <description>&lt;P&gt;Agreed, not sure how much to post without exposing too much. Here is a redacted snippit where it fails.&lt;/P&gt;</description>
      <pubDate>Wed, 28 Jan 2026 11:33:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Understanding-a-kernel-vpn-debug/m-p/268932#M53206</guid>
      <dc:creator>ibrown</dc:creator>
      <dc:date>2026-01-28T11:33:53Z</dc:date>
    </item>
    <item>
      <title>Re: Understanding a kernel vpn debug</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Understanding-a-kernel-vpn-debug/m-p/268959#M53213</link>
      <description>&lt;P&gt;Do you see any logs using:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;blade:VPN AND &amp;lt;Cisco-Public-IP&amp;gt; AND action:Reject&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Wed, 28 Jan 2026 14:36:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Understanding-a-kernel-vpn-debug/m-p/268959#M53213</guid>
      <dc:creator>CaseyB</dc:creator>
      <dc:date>2026-01-28T14:36:12Z</dc:date>
    </item>
    <item>
      <title>Re: Understanding a kernel vpn debug</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Understanding-a-kernel-vpn-debug/m-p/268993#M53223</link>
      <description>&lt;P&gt;&lt;SPAN&gt;As I am limited to my mobile at the moment my observation is not really safe. From my perspective the&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;debug shows &lt;/SPAN&gt;&lt;SPAN&gt;no kernel-level packet drops&lt;/SPAN&gt;&lt;SPAN&gt;. Data traffic is fully accelerated by &lt;/SPAN&gt;&lt;SPAN&gt;SecureXL (SXL)&lt;/SPAN&gt;&lt;SPAN&gt;.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;The issue seems to be a&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;missing Outbound IPsec SA&lt;/SPAN&gt;&lt;SPAN&gt; (Phase 2). While inbound traffic is successfully decrypted, the gateway cannot encrypt return traffic because the outbound SPI (MSPI) is missing, forcing a tunnel trigger. IKE negotiation packets are correctly forwarded to the iked daemon.&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Key Log Evidence&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;• &lt;/SPAN&gt;&lt;SPAN&gt;Offloading:&lt;/SPAN&gt;&lt;SPAN&gt; Tunnel (5ae8 (i: 0)) handled by SXL. [span_5](start_span)Preparing..&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;• &lt;/SPAN&gt;&lt;SPAN&gt;The Error:&lt;/SPAN&gt;&lt;SPAN&gt; request_to_open_tunnel_if_not_ready: no mspi --&amp;gt; no VPN on this side (dir 2)&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;• &lt;/SPAN&gt;&lt;SPAN&gt;IKE Success:&lt;/SPAN&gt;&lt;SPAN&gt; vpnk_multik_forward_vpnxl: ... forwarding to global instance&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Conclusion&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;The firewall kernel is functioning correctly. The failure is located in the &lt;/SPAN&gt;&lt;SPAN&gt;VPN Phase 2 negotiation&lt;/SPAN&gt;&lt;SPAN&gt; within the user-mode process, resulting in unidirectional SAs (Inbound OK, Outbound missing).&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Next Step&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Investigate &lt;/SPAN&gt;&lt;SPAN&gt;$FWDIR/log/ike.elg&lt;/SPAN&gt;&lt;SPAN&gt; for Phase 2 negotiation errors (e.g., No Proposal Chosen, TS Mismatch) and verify current SAs using vpn tu.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;And in addition check logs on peer gateway at if I an right it should show the reason for a phase 2 negotiation issue.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;but please be aware that I could have missed or misinterpreted something on my mobile display.&lt;/P&gt;</description>
      <pubDate>Wed, 28 Jan 2026 19:43:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Understanding-a-kernel-vpn-debug/m-p/268993#M53223</guid>
      <dc:creator>Vincent_Bacher</dc:creator>
      <dc:date>2026-01-28T19:43:45Z</dc:date>
    </item>
    <item>
      <title>Re: Understanding a kernel vpn debug</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Understanding-a-kernel-vpn-debug/m-p/268995#M53224</link>
      <description>&lt;P&gt;I wonder if its nat issue?&lt;/P&gt;
&lt;P&gt;What are enc domains? Is it using empty group as enc domains? Also, perment tunnel and how is tunnel mgmt set up?&lt;/P&gt;
&lt;P&gt;Is nat disabled inside community?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;12:46:49.565629;[cpu_3];[fw4_0];IKE_Utils_FillIKEInfo: outgoing_single_IP = 0.0.0.0 and peer_IP = my_external_IP;&lt;BR /&gt;@;2551617668.10148319;21Jan2026 12:46:49.565630;[cpu_3];[fw4_0];IKE_Utils_FillIKEInfo: pIKEInfo printout for cookies &amp;lt;8bd665d5f3c76d98 : 3be797e83a56fe7c&amp;gt;;&lt;BR /&gt;@;2551617668.10148320;21Jan2026 12:46:49.565631;[cpu_3];[fw4_0];IKE_Utils_FillIKEInfo: pIKEInfo-&amp;gt;m_stateRestored = 1;&lt;BR /&gt;@;2551617668.10148321;21Jan2026 12:46:49.565631;[cpu_3];[fw4_0];IKE_Utils_FillIKEInfo: pIKEInfo-&amp;gt;m_myAddress = my_external_IP;&lt;BR /&gt;@;2551617668.10148322;21Jan2026 12:46:49.565632;[cpu_3];[fw4_0];IKE_Utils_FillIKEInfo: pIKEInfo-&amp;gt;m_myPort = 500;&lt;BR /&gt;@;2551617668.10148323;21Jan2026 12:46:49.565633;[cpu_3];[fw4_0];IKE_Utils_FillIKEInfo: pIKEInfo-&amp;gt;m_peerAddress = thirdparty_IP;&lt;BR /&gt;@;2551617668.10148324;21Jan2026 12:46:49.565633;[cpu_3];[fw4_0];IKE_Utils_FillIKEInfo: pIKEInfo-&amp;gt;m_peerPort = 500;&lt;BR /&gt;@;2551617668.10148325;21Jan2026 12:46:49.565634;[cpu_3];[fw4_0];IKE_Utils_FillIKEInfo: pIKEInfo-&amp;gt;m_throughIf = 13;&lt;BR /&gt;@;2551617668.10148326;21Jan2026 12:46:49.565634;[cpu_3];[fw4_0];IKE_Utils_FillIKEInfo: pIKEInfo-&amp;gt;m_NATT_probing = 0;&lt;BR /&gt;@;2551617668.10148327;21Jan2026 12:46:49.565635;[cpu_3];[fw4_0];IKE_Utils_FillIKEInfo: setting entry in dynamic_ipsec_source_address table;&lt;BR /&gt;@;2551617668.10148328;21Jan2026 12:46:49.565637;[cpu_3];[fw4_0];get_ike_SEP_ownership: entering;&lt;BR /&gt;@;2551617668.10148329;21Jan2026 12:46:49.565641;[cpu_3];[fw4_0];vpn_translate_dst_cpip: Entering with dst: 253.116.23.193;&lt;BR /&gt;@;2551617668.10148330;21Jan2026 12:46:49.565643;[cpu_3];[fw4_0];vpn_translate_udp_dst_src: src=0.0.0.0, dst = my_FW_IP, sport 0, dport 0;&lt;BR /&gt;@;2551617668.10148331;21Jan2026 12:46:49.565645;[cpu_3];[fw4_0];vpn_translate_udp_dst_src: not invalidating chain cache in inbound;&lt;BR /&gt;@;2551617668.10148332;21Jan2026 12:46:49.565645;[cpu_3];[fw4_0];vpn_translate_udp_dst_src: succeeded to translate;&lt;BR /&gt;@;2551617668.10148333;21Jan2026 12:46:49.565647;[cpu_3];[fw4_0];get_address_for_iked_assignment: enter for peer address thirdparty_IP, might be daip 1, might be ra 0, user MD: 0;&lt;BR /&gt;@;2551617668.10148334;21Jan2026 12:46:49.565649;[cpu_3];[fw4_0];get_address_for_iked_assignment: returning canonized address: thirdparty_IP;&lt;BR /&gt;@;2551617668.10148335;21Jan2026 12:46:49.565651;[cpu_3];[fw4_0];get_iked_handler_for_address: dae&lt;/P&gt;</description>
      <pubDate>Wed, 28 Jan 2026 20:26:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Understanding-a-kernel-vpn-debug/m-p/268995#M53224</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2026-01-28T20:26:41Z</dc:date>
    </item>
    <item>
      <title>Re: Understanding a kernel vpn debug</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Understanding-a-kernel-vpn-debug/m-p/269000#M53228</link>
      <description>&lt;P&gt;I just ran whole debug through ms copilot AI and it pretty much referenced what I asked about, vpn domains. Here is what I would do to try fix this. Set BOTH enc domains for this community to empty groups, set tunnel mgmt per gateway and permanent tunnels, but make sure rule reflects actual subnets participating via vpn.&lt;/P&gt;
&lt;P&gt;Enable bi directional match in vpn settings in global properties and set vpn column in the rule with 3 things:&lt;/P&gt;
&lt;P&gt;vpn community -&amp;gt; internal&lt;/P&gt;
&lt;P&gt;internal -&amp;gt; vpn community&lt;/P&gt;
&lt;P&gt;vpn community -&amp;gt; vpn community&lt;/P&gt;
&lt;P&gt;Install policy -&amp;gt; test&lt;/P&gt;
&lt;P&gt;I really have high confidence this would work.&lt;/P&gt;</description>
      <pubDate>Thu, 29 Jan 2026 00:05:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Understanding-a-kernel-vpn-debug/m-p/269000#M53228</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2026-01-29T00:05:08Z</dc:date>
    </item>
    <item>
      <title>Re: Understanding a kernel vpn debug</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Understanding-a-kernel-vpn-debug/m-p/269020#M53233</link>
      <description>&lt;P&gt;Thank you. Disappointingly, my vpn debug created iked0.elg and iked1.elg, but no legacy*.elg or xmll files, which is annoying as ikeview won't handle those.&amp;nbsp;sk30994 says it&amp;nbsp;&lt;EM&gt;should&lt;/EM&gt; but it didn't. Perhaps it's a nuance on my R81.20 cluster.&lt;/P&gt;</description>
      <pubDate>Thu, 29 Jan 2026 09:45:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Understanding-a-kernel-vpn-debug/m-p/269020#M53233</guid>
      <dc:creator>ibrown</dc:creator>
      <dc:date>2026-01-29T09:45:05Z</dc:date>
    </item>
    <item>
      <title>Re: Understanding a kernel vpn debug</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Understanding-a-kernel-vpn-debug/m-p/269021#M53234</link>
      <description>&lt;P&gt;&lt;SPAN&gt;It’s been a while since I last used vpn debug and viewed it using ikeview, but as far as I remember, vpn debug generates XML output for IKEv2 and ELG output for IKEv1. Is this an IKEv2 tunnel ?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 29 Jan 2026 09:58:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Understanding-a-kernel-vpn-debug/m-p/269021#M53234</guid>
      <dc:creator>Vincent_Bacher</dc:creator>
      <dc:date>2026-01-29T09:58:14Z</dc:date>
    </item>
    <item>
      <title>Re: Understanding a kernel vpn debug</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Understanding-a-kernel-vpn-debug/m-p/269022#M53235</link>
      <description>&lt;P&gt;Have you tried disabling the VPN accel? I remember once I had to do that for a specific peer in a one way traffic situation. remember it is a global change so only specify the peers you want to disable vpn accel.&lt;BR /&gt;Clish Command - VPN accel off&lt;/P&gt;</description>
      <pubDate>Thu, 29 Jan 2026 10:10:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Understanding-a-kernel-vpn-debug/m-p/269022#M53235</guid>
      <dc:creator>AttiqRahman786</dc:creator>
      <dc:date>2026-01-29T10:10:19Z</dc:date>
    </item>
    <item>
      <title>Re: Understanding a kernel vpn debug</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Understanding-a-kernel-vpn-debug/m-p/269024#M53236</link>
      <description>&lt;P&gt;Thank you. I don't have NAT disabled in the community as I am having to hide my internal subnets to access the 3rd party.&lt;/P&gt;&lt;P&gt;It has had permanent tunnels set but it made no difference. It is set as one tunnel per pair of hosts, but the enc domain is my nat address (single host) and two hosts at the third party, and they are accessed as active/standby so we are only seeing a phase 2 sa for a pair of hosts.&lt;/P&gt;</description>
      <pubDate>Thu, 29 Jan 2026 10:41:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Understanding-a-kernel-vpn-debug/m-p/269024#M53236</guid>
      <dc:creator>ibrown</dc:creator>
      <dc:date>2026-01-29T10:41:48Z</dc:date>
    </item>
    <item>
      <title>Re: Understanding a kernel vpn debug</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Understanding-a-kernel-vpn-debug/m-p/269025#M53237</link>
      <description>&lt;P&gt;Yes IKEv2, I don't understand why no xml debug occurred given i cut and pasted the instructions from the SK, but it did not. Just the two elg files.&lt;BR /&gt;I'll try generating it again&lt;/P&gt;</description>
      <pubDate>Thu, 29 Jan 2026 10:49:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Understanding-a-kernel-vpn-debug/m-p/269025#M53237</guid>
      <dc:creator>ibrown</dc:creator>
      <dc:date>2026-01-29T10:49:41Z</dc:date>
    </item>
    <item>
      <title>Re: Understanding a kernel vpn debug</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Understanding-a-kernel-vpn-debug/m-p/269026#M53238</link>
      <description>&lt;P&gt;Thanks, I'll check with the 3rd party on the enc domain. I am loathe to enable a global property that might affect the other VPNs already running, at this moment, it is off at the moment.&lt;/P&gt;</description>
      <pubDate>Thu, 29 Jan 2026 10:51:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Understanding-a-kernel-vpn-debug/m-p/269026#M53238</guid>
      <dc:creator>ibrown</dc:creator>
      <dc:date>2026-01-29T10:51:49Z</dc:date>
    </item>
    <item>
      <title>Re: Understanding a kernel vpn debug</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Understanding-a-kernel-vpn-debug/m-p/269027#M53239</link>
      <description>&lt;P&gt;Yes, I see a traffic selector error, where my cluster fires back every address it knows including other vpn target addresses. I've spoken to tac about that behaviour but it appears 'by design' but I don't like it...!&lt;/P&gt;</description>
      <pubDate>Thu, 29 Jan 2026 10:54:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Understanding-a-kernel-vpn-debug/m-p/269027#M53239</guid>
      <dc:creator>ibrown</dc:creator>
      <dc:date>2026-01-29T10:54:49Z</dc:date>
    </item>
    <item>
      <title>Re: Understanding a kernel vpn debug</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Understanding-a-kernel-vpn-debug/m-p/269029#M53240</link>
      <description>&lt;P&gt;Thanks, I am going to try to generate it again, just have to wait for the 8 hour timeout. Using the SK didn't generate anything ikeview would work on.&lt;/P&gt;</description>
      <pubDate>Thu, 29 Jan 2026 10:56:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Understanding-a-kernel-vpn-debug/m-p/269029#M53240</guid>
      <dc:creator>ibrown</dc:creator>
      <dc:date>2026-01-29T10:56:47Z</dc:date>
    </item>
    <item>
      <title>Re: Understanding a kernel vpn debug</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Understanding-a-kernel-vpn-debug/m-p/269030#M53241</link>
      <description>&lt;P&gt;Strange. Maybe you could try using&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;vpn debug trunc ALL=5&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;edit: and I would suggest to do&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;vpn accel off &amp;lt;peer_IP&amp;gt;&lt;/P&gt;
&lt;P&gt;before debugging as already stated here&lt;/P&gt;
&lt;P&gt;and turning on afterwards&lt;/P&gt;</description>
      <pubDate>Thu, 29 Jan 2026 11:24:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Understanding-a-kernel-vpn-debug/m-p/269030#M53241</guid>
      <dc:creator>Vincent_Bacher</dc:creator>
      <dc:date>2026-01-29T11:24:05Z</dc:date>
    </item>
    <item>
      <title>Re: Understanding a kernel vpn debug</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Understanding-a-kernel-vpn-debug/m-p/269032#M53242</link>
      <description>&lt;P&gt;It would not affect anything, as it just lets you modify that setting in the rule column, which might not even fix the issue, just something Im used to doing for route based tunnels. I would still try empty group as enc domains, you dont need other side to do anything with that. You just change it for both on CP side. I will send you screenshot later to demonstrate what I meant.&lt;/P&gt;</description>
      <pubDate>Thu, 29 Jan 2026 12:11:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Understanding-a-kernel-vpn-debug/m-p/269032#M53242</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2026-01-29T12:11:13Z</dc:date>
    </item>
  </channel>
</rss>

