<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Checkpoint using draft NAT-T Standard in VPN in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Checkpoint-using-draft-NAT-T-Standard-in-VPN/m-p/12107#M765</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 15px;"&gt;So we've been having frequent issues between our Gaia appliances and AWS where they keep going down randomly.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 15px;"&gt;Recently we've got some positive updates that upon rekeying AWS rejects Checkpoint proposals especially on NAT-T standard. According to AWS, they reject because checkpoint is using&amp;nbsp;&lt;SPAN style="color: #000000; background-color: #ffffff;"&gt;draft-ietf-ipsec-nat-t-ike-02_n instead of RFC3974.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; background-color: #ffffff; font-size: 15px;"&gt;I would find this highly surprising given the profile of Checkpoint and that we would be the only one having this issue.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; background-color: #ffffff; font-size: 15px;"&gt;Anybody having this or similar issue not with AWS but with any other technology.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; background-color: #ffffff; font-size: 15px;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; background-color: #ffffff; font-size: 15px;"&gt;Sajid&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 23 Jul 2018 03:41:18 GMT</pubDate>
    <dc:creator>Sajid_Abbas</dc:creator>
    <dc:date>2018-07-23T03:41:18Z</dc:date>
    <item>
      <title>Checkpoint using draft NAT-T Standard in VPN</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Checkpoint-using-draft-NAT-T-Standard-in-VPN/m-p/12107#M765</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 15px;"&gt;So we've been having frequent issues between our Gaia appliances and AWS where they keep going down randomly.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 15px;"&gt;Recently we've got some positive updates that upon rekeying AWS rejects Checkpoint proposals especially on NAT-T standard. According to AWS, they reject because checkpoint is using&amp;nbsp;&lt;SPAN style="color: #000000; background-color: #ffffff;"&gt;draft-ietf-ipsec-nat-t-ike-02_n instead of RFC3974.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; background-color: #ffffff; font-size: 15px;"&gt;I would find this highly surprising given the profile of Checkpoint and that we would be the only one having this issue.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; background-color: #ffffff; font-size: 15px;"&gt;Anybody having this or similar issue not with AWS but with any other technology.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; background-color: #ffffff; font-size: 15px;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; background-color: #ffffff; font-size: 15px;"&gt;Sajid&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 23 Jul 2018 03:41:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Checkpoint-using-draft-NAT-T-Standard-in-VPN/m-p/12107#M765</guid>
      <dc:creator>Sajid_Abbas</dc:creator>
      <dc:date>2018-07-23T03:41:18Z</dc:date>
    </item>
    <item>
      <title>Re: Checkpoint using draft NAT-T Standard in VPN</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Checkpoint-using-draft-NAT-T-Standard-in-VPN/m-p/12108#M766</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Just to clarify, are you terminating a VPN between AWS and an on-premise Check Point gateway?&lt;/P&gt;&lt;P&gt;What version/hotfix level of code?&lt;/P&gt;&lt;P&gt;Also, have you opened a TAC ticket to investigate?&lt;/P&gt;&lt;P&gt;(Also, I assume you mean RFC3947, not RFC3974, which is about SMTP)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 23 Jul 2018 16:25:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Checkpoint-using-draft-NAT-T-Standard-in-VPN/m-p/12108#M766</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-07-23T16:25:49Z</dc:date>
    </item>
    <item>
      <title>Re: Checkpoint using draft NAT-T Standard in VPN</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Checkpoint-using-draft-NAT-T-Standard-in-VPN/m-p/12109#M767</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes we are terminating VPN on our on-premise gateway. Version is R80.10 JHF70.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;TAC case has been going on for quite a while and we are expecting a custom hotfix. AWS are stating that Checkpoint gateway send draft proposal standard and not the RFC3947 (you're correct).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If that indeed is the case, I assume we can't be the only one having these major issues.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sajid&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 23 Jul 2018 22:06:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Checkpoint-using-draft-NAT-T-Standard-in-VPN/m-p/12109#M767</guid>
      <dc:creator>Sajid_Abbas</dc:creator>
      <dc:date>2018-07-23T22:06:53Z</dc:date>
    </item>
    <item>
      <title>Re: Checkpoint using draft NAT-T Standard in VPN</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Checkpoint-using-draft-NAT-T-Standard-in-VPN/m-p/12110#M768</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I know some customers are terminating VPNs to Check Point gateways in AWS versus terminating on the AWS VPN gateways.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 24 Jul 2018 14:05:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Checkpoint-using-draft-NAT-T-Standard-in-VPN/m-p/12110#M768</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-07-24T14:05:35Z</dc:date>
    </item>
    <item>
      <title>Re: Checkpoint using draft NAT-T Standard in VPN</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Checkpoint-using-draft-NAT-T-Standard-in-VPN/m-p/12111#M769</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Just to update, we have a fix for this in R80.20 (Gateway).&lt;/P&gt;&lt;P&gt;For R80.10, you should be able to request a hotfix from the TAC for this.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 24 Jul 2018 20:08:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Checkpoint-using-draft-NAT-T-Standard-in-VPN/m-p/12111#M769</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-07-24T20:08:14Z</dc:date>
    </item>
    <item>
      <title>Re: Checkpoint using draft NAT-T Standard in VPN</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Checkpoint-using-draft-NAT-T-Standard-in-VPN/m-p/12112#M770</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We do have an option of terminating CGW in AWS but that's a whole other cost and design. Does it really solve the underlying issue as you still need connectivity back into AWS VPC.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We are in the process of obtaining/implementing a hotfix from TAC. Do you know when will R80.20 update be available for gateway. Website says 2018.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sajid&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 24 Jul 2018 21:51:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Checkpoint-using-draft-NAT-T-Standard-in-VPN/m-p/12112#M770</guid>
      <dc:creator>Sajid_Abbas</dc:creator>
      <dc:date>2018-07-24T21:51:55Z</dc:date>
    </item>
    <item>
      <title>Re: Checkpoint using draft NAT-T Standard in VPN</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Checkpoint-using-draft-NAT-T-Standard-in-VPN/m-p/12113#M771</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If both endpoints are Check Point it does resolve a lot of potential compatibility issues (but does have different costs as well).&lt;/P&gt;&lt;P&gt;Once traffic is in one VPC it can go to others (assuming you configure VPC connectivity).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;R80.20 timelines have not been finalized.&lt;/P&gt;&lt;P&gt;You are welcome to participate in the production R80.20 EA: &lt;A href="https://community.checkpoint.com/message/23895"&gt;Want to join R80.20 EA activities?&lt;/A&gt;‌&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 25 Jul 2018 01:31:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Checkpoint-using-draft-NAT-T-Standard-in-VPN/m-p/12113#M771</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-07-25T01:31:49Z</dc:date>
    </item>
    <item>
      <title>Re: Checkpoint using draft NAT-T Standard in VPN</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Checkpoint-using-draft-NAT-T-Standard-in-VPN/m-p/12114#M772</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We are facing the same issue right now. We have been stable for around 1 year on R80.10 gateways, and for the last 2 months, we had terrible stability issues with AWS tunnels. Upon investigation we found the root cause was the same as mentioned by OP.&lt;/P&gt;&lt;P&gt;On top of the fact that with no changes were brought to the configuration, the&amp;nbsp;tunnels broke after 1 year with no logical explanation, and the fact that while the draft CKP is using is from 2002 and the RFC was just released in 2005, that surely doesn't give enough time to integrate it in the code, the most annoying part is that we opened a ticket to TAC and the engineer says no such hotfix exists.&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.checkpoint.com/migrated-users/2075"&gt;Dameon Welch-Abernathy&lt;/A&gt;‌ would you be able to help here?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best regards,&lt;/P&gt;&lt;P&gt;Bogdan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 07 Jan 2019 08:59:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Checkpoint-using-draft-NAT-T-Standard-in-VPN/m-p/12114#M772</guid>
      <dc:creator>Bogdan_Tatomir1</dc:creator>
      <dc:date>2019-01-07T08:59:41Z</dc:date>
    </item>
    <item>
      <title>Re: Checkpoint using draft NAT-T Standard in VPN</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Checkpoint-using-draft-NAT-T-Standard-in-VPN/m-p/12115#M773</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I did a quick search of past SRs and find at least one reference to this hotfix.&lt;/P&gt;&lt;P&gt;Please send me your SR# privately.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 Jan 2019 06:31:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Checkpoint-using-draft-NAT-T-Standard-in-VPN/m-p/12115#M773</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-01-08T06:31:02Z</dc:date>
    </item>
    <item>
      <title>Re: Checkpoint using draft NAT-T Standard in VPN</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Checkpoint-using-draft-NAT-T-Standard-in-VPN/m-p/12116#M774</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Just to update, it looks like we fixed this issue in R80.10 JHF 151 and above.&lt;/P&gt;&lt;P&gt;It is specifically noted as&amp;nbsp;PMTR-14920.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 Jan 2019 16:05:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Checkpoint-using-draft-NAT-T-Standard-in-VPN/m-p/12116#M774</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-01-08T16:05:20Z</dc:date>
    </item>
    <item>
      <title>Re: Checkpoint using draft NAT-T Standard in VPN</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Checkpoint-using-draft-NAT-T-Standard-in-VPN/m-p/12117#M775</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Dameon,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We upgraded our firewalls to JHF169 hoping it would resolve all these issues. After this, the VPN only stay alive up for Phase 1 lifetime and do not come up. Instead now we have to bring it up manually.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The issue is so worsened that it doesn't seem beneficial to open another TAC case, and we're just going to roll back to JHF121 which was better (although not fully resolved).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sajid&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 Jan 2019 04:05:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Checkpoint-using-draft-NAT-T-Standard-in-VPN/m-p/12117#M775</guid>
      <dc:creator>Sajid_Abbas</dc:creator>
      <dc:date>2019-01-22T04:05:13Z</dc:date>
    </item>
    <item>
      <title>Re: Checkpoint using draft NAT-T Standard in VPN</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Checkpoint-using-draft-NAT-T-Standard-in-VPN/m-p/12118#M776</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;As the issue should have been resolved by this JHF it would be best to open a TAC case so we can properly debug/resolve the issue.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 23 Jan 2019 01:52:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Checkpoint-using-draft-NAT-T-Standard-in-VPN/m-p/12118#M776</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-01-23T01:52:56Z</dc:date>
    </item>
    <item>
      <title>Re: Checkpoint using draft NAT-T Standard in VPN</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Checkpoint-using-draft-NAT-T-Standard-in-VPN/m-p/12119#M777</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you for the info. And I'm sorry I was not able to update here also. So the resolution that worked for us was a compound one:&lt;/P&gt;&lt;P&gt;- we upgraded to JHA take 169, as instructed by TAC&lt;/P&gt;&lt;P&gt;- on AWS side we deleted the vpn connection (formerly created in format of vgw-xxx 8 chars long) and created a new one with the exact same settings. This fell into the new 17 characters naming convention which apparently also runs on newer software&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This created a stable environment. Also for others reading, make sure you use VTIs with AWS and directional match instead of just the community name in the VPN column in the rulebase.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Side note: After just upgrading to JHA 169 without rebuilding on AWS side, we were seeing two IPSEC SAs created for a permanent tunnel, with one tunnel per gateway pair, which would cause traffic to not flow correctly.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps anyone else to fix this issue.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 24 Jan 2019 10:38:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Checkpoint-using-draft-NAT-T-Standard-in-VPN/m-p/12119#M777</guid>
      <dc:creator>Bogdan_Tatomir1</dc:creator>
      <dc:date>2019-01-24T10:38:44Z</dc:date>
    </item>
    <item>
      <title>Re: Checkpoint using draft NAT-T Standard in VPN</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Checkpoint-using-draft-NAT-T-Standard-in-VPN/m-p/59633#M4515</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We started having this exact same issue with your AWS VPN after upgrade to R80.20 + latest HF.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It seems that the fix in r80.10 is not protfixed to R80.20 ? please advise&lt;/P&gt;</description>
      <pubDate>Mon, 05 Aug 2019 08:47:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Checkpoint-using-draft-NAT-T-Standard-in-VPN/m-p/59633#M4515</guid>
      <dc:creator>Khalid_Aftas</dc:creator>
      <dc:date>2019-08-05T08:47:32Z</dc:date>
    </item>
  </channel>
</rss>

