<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Can't monitor secondary node over IPSec tunnel in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Can-t-monitor-secondary-node-over-IPSec-tunnel/m-p/34791#M88167</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The spoofing error is due to the fact that the traffic comes from the other member, as I said before, look at the incoming interface the traffic is being dropped upon.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 21 Feb 2019 12:29:36 GMT</pubDate>
    <dc:creator>Maarten_Sjouw</dc:creator>
    <dc:date>2019-02-21T12:29:36Z</dc:date>
    <item>
      <title>Can't monitor secondary node over IPSec tunnel</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Can-t-monitor-secondary-node-over-IPSec-tunnel/m-p/34779#M88155</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Dear Community,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;as an ISP we are monitoring our customer environments throug IPSec tunnels from our datacenter.&lt;/P&gt;&lt;P&gt;I don't know why, but two of our Check Point installations are strange - I cannot access the secondary node through IPSec - other sites work well with the same design. One troublemaker runs an old VRRP cluster (R77.30), the other on is a clusterXL (R80.20).&lt;/P&gt;&lt;P&gt;This is the general setup:&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="79315" alt="topology" class="image-1 jive-image j-img-original" src="/legacyfs/online/checkpoint/79315_monitoring vpn.png" /&gt;&lt;/P&gt;&lt;P&gt;The montoring server is able to contact the MGMT VIP and node one, but obviously we need to monitor the second node as well.&lt;/P&gt;&lt;P&gt;The kernel param "&lt;CODE style="border: 0px; font-weight: inherit;"&gt;fwha_forw_packet_to_not_active" is set to yes on both nodes, but packets are getting dropped as "received unencrypted packet...should be encrypted". I also tried to do a hide nat with a dummy ip to masquerade the access to the second node, as if it is sourced from that dummy ip - didn't work either.&lt;/CODE&gt;&lt;/P&gt;&lt;P&gt;&lt;CODE style="border: 0px; font-weight: inherit;"&gt;&lt;/CODE&gt;&lt;/P&gt;&lt;P&gt;&lt;CODE style="border: 0px; font-weight: inherit;"&gt;I can't find the point I'm missing here - hopefully the community can help?&lt;/CODE&gt;&lt;/P&gt;&lt;P&gt;&lt;CODE style="border: 0px; font-weight: inherit;"&gt;&lt;/CODE&gt;&lt;/P&gt;&lt;P&gt;&lt;CODE style="border: 0px; font-weight: inherit;"&gt;Best Regards&lt;/CODE&gt;&lt;/P&gt;&lt;P&gt;&lt;CODE style="border: 0px; font-weight: inherit;"&gt;Johannes&lt;/CODE&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 21 Feb 2019 08:57:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Can-t-monitor-secondary-node-over-IPSec-tunnel/m-p/34779#M88155</guid>
      <dc:creator>Johannes_Schoen</dc:creator>
      <dc:date>2019-02-21T08:57:11Z</dc:date>
    </item>
    <item>
      <title>Re: Can't monitor secondary node over IPSec tunnel</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Can-t-monitor-secondary-node-over-IPSec-tunnel/m-p/34780#M88156</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;For VRRP there&amp;nbsp;are 2 settings in the dash, on the cluster object, forward to cluster member and hide behind cluster IP:&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-1 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/79317_pastedImage_1.png" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Turn them both off and these type of issues are no longer happening.&lt;/P&gt;&lt;P&gt;For the clusterXL double check that the correct member is dropping the traffic.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 21 Feb 2019 09:15:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Can-t-monitor-secondary-node-over-IPSec-tunnel/m-p/34780#M88156</guid>
      <dc:creator>Maarten_Sjouw</dc:creator>
      <dc:date>2019-02-21T09:15:49Z</dc:date>
    </item>
    <item>
      <title>Re: Can't monitor secondary node over IPSec tunnel</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Can-t-monitor-secondary-node-over-IPSec-tunnel/m-p/34781#M88157</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Dear Maarten,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;many thanks for your response, I wasn't aware of that VRRP setting.&lt;/P&gt;&lt;P&gt;But unfortunately that doesn't work, I still got this error (on the second node):&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-1 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/79319_pastedImage_1.png" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 21 Feb 2019 09:43:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Can-t-monitor-secondary-node-over-IPSec-tunnel/m-p/34781#M88157</guid>
      <dc:creator>Johannes_Schoen</dc:creator>
      <dc:date>2019-02-21T09:43:28Z</dc:date>
    </item>
    <item>
      <title>Re: Can't monitor secondary node over IPSec tunnel</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Can-t-monitor-secondary-node-over-IPSec-tunnel/m-p/34782#M88158</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Then you still have a problem with either that community (maybe a excluded service) or the VPN topology is not correct.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 21 Feb 2019 09:48:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Can-t-monitor-secondary-node-over-IPSec-tunnel/m-p/34782#M88158</guid>
      <dc:creator>Maarten_Sjouw</dc:creator>
      <dc:date>2019-02-21T09:48:58Z</dc:date>
    </item>
    <item>
      <title>Re: Can't monitor secondary node over IPSec tunnel</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Can-t-monitor-secondary-node-over-IPSec-tunnel/m-p/34783#M88159</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Doublechecked that.&lt;/P&gt;&lt;P&gt;VPN domain monitoring site: &amp;lt;monitoring-dmz-net&amp;gt;&lt;/P&gt;&lt;P&gt;VPN domain production site &amp;lt;management-net)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;No natting between both of them&lt;/P&gt;&lt;P&gt;No excluded service in the domain.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The strange thing is, that we have working sites with the same configuration, so I'm wondering why that "unencrypted received...expected encrypted" occurs&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 21 Feb 2019 10:09:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Can-t-monitor-secondary-node-over-IPSec-tunnel/m-p/34783#M88159</guid>
      <dc:creator>Johannes_Schoen</dc:creator>
      <dc:date>2019-02-21T10:09:44Z</dc:date>
    </item>
    <item>
      <title>Re: Can't monitor secondary node over IPSec tunnel</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Can-t-monitor-secondary-node-over-IPSec-tunnel/m-p/34784#M88160</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This shows that the ping is not sent thru VPN tunnel...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 21 Feb 2019 10:45:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Can-t-monitor-secondary-node-over-IPSec-tunnel/m-p/34784#M88160</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2019-02-21T10:45:51Z</dc:date>
    </item>
    <item>
      <title>Re: Can't monitor secondary node over IPSec tunnel</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Can-t-monitor-secondary-node-over-IPSec-tunnel/m-p/34785#M88161</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I can see on the interoperable ipsec device that the monitoring traffic for the primary and secondary node is sent to the tunnel.&lt;/P&gt;&lt;P&gt;Communication to primary node is working well, so I guess that is no routing issue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think the primary Checkpoint terminates the IPSec tunnel, removes the encryption (as expected) and sends the data to the secondary node with the nearest interface (in this case management interface). Somehow the secondary node expects the traffic to be encrypted anyway.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Or do you mean I need two vpn tunnels against the Checkpoints? (it's possible due to that "we-need-3-public-ips-even-if-we-use-only-one-thing")&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 21 Feb 2019 11:22:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Can-t-monitor-secondary-node-over-IPSec-tunnel/m-p/34785#M88161</guid>
      <dc:creator>Johannes_Schoen</dc:creator>
      <dc:date>2019-02-21T11:22:08Z</dc:date>
    </item>
    <item>
      <title>Re: Can't monitor secondary node over IPSec tunnel</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Can-t-monitor-secondary-node-over-IPSec-tunnel/m-p/34786#M88162</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;There is no way to do this indeed, as you say the traffic is decrypted on the active node and forwarded to the backup, and dropped there because it is cleartext.&lt;/P&gt;&lt;P&gt;You cannot build separate tunnels to the different members.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 21 Feb 2019 11:48:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Can-t-monitor-secondary-node-over-IPSec-tunnel/m-p/34786#M88162</guid>
      <dc:creator>Maarten_Sjouw</dc:creator>
      <dc:date>2019-02-21T11:48:01Z</dc:date>
    </item>
    <item>
      <title>Re: Can't monitor secondary node over IPSec tunnel</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Can-t-monitor-secondary-node-over-IPSec-tunnel/m-p/34787#M88163</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Maybe the workaround from&amp;nbsp;sk106425 can help ?&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 21 Feb 2019 12:17:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Can-t-monitor-secondary-node-over-IPSec-tunnel/m-p/34787#M88163</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2019-02-21T12:17:17Z</dc:date>
    </item>
    <item>
      <title>Re: Can't monitor secondary node over IPSec tunnel</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Can-t-monitor-secondary-node-over-IPSec-tunnel/m-p/34788#M88164</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So it's not possible to monitor two hardware&amp;nbsp;node through an ipsec tunnel with Check Point?!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 21 Feb 2019 12:18:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Can-t-monitor-secondary-node-over-IPSec-tunnel/m-p/34788#M88164</guid>
      <dc:creator>Johannes_Schoen</dc:creator>
      <dc:date>2019-02-21T12:18:06Z</dc:date>
    </item>
    <item>
      <title>Re: Can't monitor secondary node over IPSec tunnel</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Can-t-monitor-secondary-node-over-IPSec-tunnel/m-p/34789#M88165</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Not if they are&amp;nbsp; in a cluster and the tunnel terminates on the cluster. Been there.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 21 Feb 2019 12:24:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Can-t-monitor-secondary-node-over-IPSec-tunnel/m-p/34789#M88165</guid>
      <dc:creator>Maarten_Sjouw</dc:creator>
      <dc:date>2019-02-21T12:24:13Z</dc:date>
    </item>
    <item>
      <title>Re: Can't monitor secondary node over IPSec tunnel</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Can-t-monitor-secondary-node-over-IPSec-tunnel/m-p/34790#M88166</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the suggestion, but the sk describes drops due to address spoofing, I think I have a different problem here&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 21 Feb 2019 12:27:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Can-t-monitor-secondary-node-over-IPSec-tunnel/m-p/34790#M88166</guid>
      <dc:creator>Johannes_Schoen</dc:creator>
      <dc:date>2019-02-21T12:27:46Z</dc:date>
    </item>
    <item>
      <title>Re: Can't monitor secondary node over IPSec tunnel</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Can-t-monitor-secondary-node-over-IPSec-tunnel/m-p/34791#M88167</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The spoofing error is due to the fact that the traffic comes from the other member, as I said before, look at the incoming interface the traffic is being dropped upon.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 21 Feb 2019 12:29:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Can-t-monitor-secondary-node-over-IPSec-tunnel/m-p/34791#M88167</guid>
      <dc:creator>Maarten_Sjouw</dc:creator>
      <dc:date>2019-02-21T12:29:36Z</dc:date>
    </item>
    <item>
      <title>Re: Can't monitor secondary node over IPSec tunnel</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Can-t-monitor-secondary-node-over-IPSec-tunnel/m-p/34792#M88168</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;To be honest, I don't understand what you mean/referring to.&lt;/P&gt;&lt;P&gt;The incoming interface for the monitoring traffic on the second node (which drops that traffic) is the management-interface with ip &amp;lt;mgmt-subnet&amp;gt;.3. Topology is defined as per ip and subnet and anti-spoofing is set to detect for that interface.&lt;/P&gt;&lt;P&gt;The firewall detects address spoofing, but the drop reason is due to the screenshot above.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you really cannot monitor the hardware through vpn, we cannot recommend checkpoint products for&amp;nbsp;any&amp;nbsp;customer.&lt;/P&gt;&lt;P&gt;I don't know any other relevant firewall vendor where that issue is expected behavior (without setting options which will decrease the security) - please correct me if I'm wrong&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 21 Feb 2019 12:47:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Can-t-monitor-secondary-node-over-IPSec-tunnel/m-p/34792#M88168</guid>
      <dc:creator>Johannes_Schoen</dc:creator>
      <dc:date>2019-02-21T12:47:31Z</dc:date>
    </item>
    <item>
      <title>Re: Can't monitor secondary node over IPSec tunnel</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Can-t-monitor-secondary-node-over-IPSec-tunnel/m-p/34793#M88169</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Why not open a ticket with TAC ? Maybe here we have different&amp;nbsp;&lt;STRONG&gt;&lt;CODE&gt;# fw ctl get int fw_allow_simultaneous_ping settings&lt;/CODE&gt;&lt;/STRONG&gt;&lt;CODE&gt;, or just different routing ! Monitoring of hardware mostly uses SNMP, not ICMP...&lt;/CODE&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 21 Feb 2019 13:15:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Can-t-monitor-secondary-node-over-IPSec-tunnel/m-p/34793#M88169</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2019-02-21T13:15:22Z</dc:date>
    </item>
    <item>
      <title>Re: Can't monitor secondary node over IPSec tunnel</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Can-t-monitor-secondary-node-over-IPSec-tunnel/m-p/34794#M88170</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yeah, I guess that is the next step.&lt;/P&gt;&lt;P&gt;It's the same when using snmp, but a continous ping from commandline is not that distracting for our colleagues, than having our monitoring system sending snmp requests, which result in an error state.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 21 Feb 2019 13:20:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Can-t-monitor-secondary-node-over-IPSec-tunnel/m-p/34794#M88170</guid>
      <dc:creator>Johannes_Schoen</dc:creator>
      <dc:date>2019-02-21T13:20:15Z</dc:date>
    </item>
    <item>
      <title>Re: Can't monitor secondary node over IPSec tunnel</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Can-t-monitor-secondary-node-over-IPSec-tunnel/m-p/34795#M88171</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What I mean by the interface is that when the traffic comes through the VPN tunnel to FW1 to go to FW2, it will be sent from FW1 to FW2 over a specific interface, so when you look at the details of the log entry, what is the interface you see the traffic come in on FW2 where it is being dropped, therefore the spoofing could because it is coming in over an interface where this traffic should not be entering normally.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Lets say you use the eth6 interface for monitoring and the inteface that the VPN terminates on is eth1, you do not have the monitoring system as a network you would expect to enter on eth6, you expect that to enter on eth1, butr as fw1 decrypts the traffic and forwards it to fw2 eth6 this would not accept this traffic there and drop it on spoofing.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 21 Feb 2019 19:09:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Can-t-monitor-secondary-node-over-IPSec-tunnel/m-p/34795#M88171</guid>
      <dc:creator>Maarten_Sjouw</dc:creator>
      <dc:date>2019-02-21T19:09:00Z</dc:date>
    </item>
    <item>
      <title>Re: Can't monitor secondary node over IPSec tunnel</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Can-t-monitor-secondary-node-over-IPSec-tunnel/m-p/34796#M88172</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Johannes&lt;CODE&gt;,&lt;/CODE&gt;&lt;/P&gt;&lt;P&gt;&lt;CODE&gt;I know there is was an issue with "&lt;CODE style="border: 0px; font-weight: inherit;"&gt;fwha_forw_packet_to_not_active&lt;/CODE&gt;" in R80.20.&lt;/CODE&gt;&lt;/P&gt;&lt;P&gt;&lt;CODE&gt;A hotfix was released today on top Jumbo Take 43.&lt;/CODE&gt;&lt;/P&gt;&lt;P&gt;&lt;CODE&gt;&lt;/CODE&gt;&lt;/P&gt;&lt;P&gt;&lt;CODE&gt;&lt;SPAN&gt;I suggest to open a ticket to TAC and request this Hotfix:&lt;/SPAN&gt;&lt;/CODE&gt;&lt;/P&gt;&lt;P&gt;&lt;CODE&gt;&lt;/CODE&gt;&lt;/P&gt;&lt;P&gt;&lt;CODE&gt;In the description mention that you have R80.20 and &lt;CODE style="border: 0px; font-weight: inherit;"&gt;fwha_forw_packet_to_not_active&lt;/CODE&gt; is not working as before, and request this Hotfix &lt;SPAN&gt;R80_20_t43_jhf_218_main&lt;/SPAN&gt;.&lt;/CODE&gt;&lt;/P&gt;&lt;P&gt;&lt;CODE&gt;&lt;/CODE&gt;&lt;/P&gt;&lt;P&gt;&lt;CODE&gt;I suspect it will solve your issue. &lt;/CODE&gt;&lt;/P&gt;&lt;P&gt;&lt;CODE&gt;&lt;/CODE&gt;&lt;/P&gt;&lt;P&gt;&lt;CODE&gt;Thanks,&lt;/CODE&gt;&lt;/P&gt;&lt;P&gt;&lt;CODE&gt;Koby&lt;/CODE&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 21 Feb 2019 19:43:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Can-t-monitor-secondary-node-over-IPSec-tunnel/m-p/34796#M88172</guid>
      <dc:creator>Koby_Kagan</dc:creator>
      <dc:date>2019-02-21T19:43:48Z</dc:date>
    </item>
    <item>
      <title>Re: Can't monitor secondary node over IPSec tunnel</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Can-t-monitor-secondary-node-over-IPSec-tunnel/m-p/34797#M88173</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Cool, we also encountered issues with this kernel parameter not working at some customer with R80.20.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 21 Feb 2019 20:31:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Can-t-monitor-secondary-node-over-IPSec-tunnel/m-p/34797#M88173</guid>
      <dc:creator>Norbert_Bohusch</dc:creator>
      <dc:date>2019-02-21T20:31:40Z</dc:date>
    </item>
    <item>
      <title>Re: Can't monitor secondary node over IPSec tunnel</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Can-t-monitor-secondary-node-over-IPSec-tunnel/m-p/34798#M88174</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;sk147493&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 21 Feb 2019 20:43:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Can-t-monitor-secondary-node-over-IPSec-tunnel/m-p/34798#M88174</guid>
      <dc:creator>Koby_Kagan</dc:creator>
      <dc:date>2019-02-21T20:43:06Z</dc:date>
    </item>
  </channel>
</rss>

