<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: IKEV2 With Cisco ASA in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/IKEV2-With-Cisco-ASA/m-p/53076#M10829</link>
    <description>&lt;P&gt;This really is not a lot to go on, but I believe I have done this in the past.&lt;/P&gt;
&lt;P&gt;Take a look at this old thread in CPUG:&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://www.cpug.org/forums/showthread.php/21310-Issue-with-VPN-tunnel-between-Checkpoint-R77-30-and-Cisco-ASA" target="_blank"&gt;https://www.cpug.org/forums/showthread.php/21310-Issue-with-VPN-tunnel-between-Checkpoint-R77-30-and-Cisco-ASA&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;and see if anything there can be of use to troubleshoot.&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Thu, 09 May 2019 23:00:28 GMT</pubDate>
    <dc:creator>Vladimir</dc:creator>
    <dc:date>2019-05-09T23:00:28Z</dc:date>
    <item>
      <title>IKEV2 With Cisco ASA</title>
      <link>https://community.checkpoint.com/t5/General-Topics/IKEV2-With-Cisco-ASA/m-p/53040#M10828</link>
      <description>&lt;P&gt;I have a pair of FW on Azure infrastructure. However, I'm not able to establish VPN using IKEV2 from the checkpoint FW to Cisco ASA.&lt;/P&gt;&lt;P&gt;Anyone set VPN up with Cisco ASA before using IKEv2?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Kayode&lt;/P&gt;</description>
      <pubDate>Thu, 09 May 2019 16:10:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/IKEV2-With-Cisco-ASA/m-p/53040#M10828</guid>
      <dc:creator>Olukayode_Adegb</dc:creator>
      <dc:date>2019-05-09T16:10:05Z</dc:date>
    </item>
    <item>
      <title>Re: IKEV2 With Cisco ASA</title>
      <link>https://community.checkpoint.com/t5/General-Topics/IKEV2-With-Cisco-ASA/m-p/53076#M10829</link>
      <description>&lt;P&gt;This really is not a lot to go on, but I believe I have done this in the past.&lt;/P&gt;
&lt;P&gt;Take a look at this old thread in CPUG:&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://www.cpug.org/forums/showthread.php/21310-Issue-with-VPN-tunnel-between-Checkpoint-R77-30-and-Cisco-ASA" target="_blank"&gt;https://www.cpug.org/forums/showthread.php/21310-Issue-with-VPN-tunnel-between-Checkpoint-R77-30-and-Cisco-ASA&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;and see if anything there can be of use to troubleshoot.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 09 May 2019 23:00:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/IKEV2-With-Cisco-ASA/m-p/53076#M10829</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2019-05-09T23:00:28Z</dc:date>
    </item>
    <item>
      <title>Re: IKEV2 With Cisco ASA</title>
      <link>https://community.checkpoint.com/t5/General-Topics/IKEV2-With-Cisco-ASA/m-p/53122#M10830</link>
      <description>&lt;P&gt;My experience with Cisco is that setting up a VPN tunnel is very difficult, because Cisco is very strict with it's configuration.&lt;/P&gt;&lt;P&gt;Most of the time you have a encryption domain mismatch, thus why I would recommend to request the CLI configuration of said Cisco ASA, which will show you how it is exactly configured.&lt;/P&gt;&lt;P&gt;My recommendation is to first configure a (Domain-based) VPN IPSec Tunnel&lt;/P&gt;&lt;P&gt;After that has been setup, see if the tunnel comes up by initiating traffic.&lt;/P&gt;&lt;P&gt;If not, perform an IKE debug and to read it with IKEVIEW (Check Point tool).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If it is a mismatch in encryption domains, you have to modify the user.def to specify exactly what should be negotiated.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The following SK's will help you with the troubleshooting:&amp;nbsp;&lt;/P&gt;&lt;P&gt;- Location of crypt.def:&amp;nbsp;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk98241" target="_blank" rel="noopener"&gt;sk98241&lt;/A&gt;&lt;/P&gt;&lt;P&gt;- Location of user.def:&amp;nbsp;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk98239" target="_blank" rel="noopener"&gt;sk98239&lt;/A&gt;&lt;/P&gt;&lt;P&gt;- Configure encryption domains to negotiate&amp;nbsp;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk108600#Scenario%201" target="_blank" rel="noopener"&gt;sk108600 - Scenario1&lt;/A&gt;&lt;/P&gt;&lt;P&gt;-&amp;nbsp;&lt;SPAN&gt;What information is required to troubleshoot the VPN related issues?&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk40114" target="_blank" rel="noopener"&gt;sk40114&lt;/A&gt;&lt;/P&gt;&lt;P&gt;-&amp;nbsp;&lt;SPAN&gt;How to generate a valid VPN debug, IKE debug and FW Monitor:&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk33327" target="_blank" rel="noopener"&gt;sk33327&lt;/A&gt;&lt;/P&gt;&lt;P&gt;- IKEView utility:&amp;nbsp;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk30994&amp;amp;partition=Advanced&amp;amp;product=IPSec" target="_blank" rel="noopener"&gt;sk30994&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope this helps!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Kind regards,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Sean&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 10 May 2019 12:52:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/IKEV2-With-Cisco-ASA/m-p/53122#M10830</guid>
      <dc:creator>Sean_Van_Loon</dc:creator>
      <dc:date>2019-05-10T12:52:44Z</dc:date>
    </item>
    <item>
      <title>Re: IKEV2 With Cisco ASA</title>
      <link>https://community.checkpoint.com/t5/General-Topics/IKEV2-With-Cisco-ASA/m-p/53147#M10831</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Hello Mate,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;May thanks for your contribution.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Just to add more context to my question, on the checkpoint FW side, the requirement is to hide our internal LAN and so we’ve been asked to NAT to another Private Subnet so this can be advertised as VPN domain. This looks like Private to Private NAT. The traffic looks like this:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;CHECKPOINT&lt;/SPAN&gt;&lt;SPAN&gt; LAN (10.151.X.X)----&amp;gt;Private subnet (172.x.x.x/24)Public IP (52.X.X.X)------VPN(IKEv2)-----&amp;gt;Public (208.X.X.X)Private subnet (207.x.x.x/24) &lt;SPAN&gt;ASA&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Any suggestion on how to make this happen will be of great help.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Regards&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 10 May 2019 14:53:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/IKEV2-With-Cisco-ASA/m-p/53147#M10831</guid>
      <dc:creator>Olukayode_Adegb</dc:creator>
      <dc:date>2019-05-10T14:53:51Z</dc:date>
    </item>
    <item>
      <title>Re: IKEV2 With Cisco ASA</title>
      <link>https://community.checkpoint.com/t5/General-Topics/IKEV2-With-Cisco-ASA/m-p/53162#M10832</link>
      <description>&lt;P&gt;Tip:&lt;/P&gt;
&lt;P&gt;- use IKEv1&lt;/P&gt;
&lt;P&gt;- use lower DH groups for example 5&lt;/P&gt;
&lt;P&gt;- use main mode&lt;/P&gt;
&lt;P&gt;- check first with PSK&lt;/P&gt;
&lt;P&gt;- check same phase 1 and phase 2 settings&lt;/P&gt;
&lt;P&gt;- check supernet issues&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 10 May 2019 19:12:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/IKEV2-With-Cisco-ASA/m-p/53162#M10832</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2019-05-10T19:12:27Z</dc:date>
    </item>
    <item>
      <title>Re: IKEV2 With Cisco ASA</title>
      <link>https://community.checkpoint.com/t5/General-Topics/IKEV2-With-Cisco-ASA/m-p/53163#M10833</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Or see this SK:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk108600&amp;amp;partition=Advanced&amp;amp;product=IPSec&amp;amp;t=1557516025687" target="_self"&gt;VPN Site-to-Site with 3rd party&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 10 May 2019 19:22:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/IKEV2-With-Cisco-ASA/m-p/53163#M10833</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2019-05-10T19:22:03Z</dc:date>
    </item>
    <item>
      <title>Re: IKEV2 With Cisco ASA</title>
      <link>https://community.checkpoint.com/t5/General-Topics/IKEV2-With-Cisco-ASA/m-p/53390#M10834</link>
      <description>I would recommend only lowering the DH group temporary, as this is actual one of the most important component in the IPSec VPN security.&lt;BR /&gt;As a best practice, it is now recommended to use DH 14 or higher.&lt;BR /&gt;The lower the DH group, the easier the keys can be cracked.</description>
      <pubDate>Tue, 14 May 2019 08:22:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/IKEV2-With-Cisco-ASA/m-p/53390#M10834</guid>
      <dc:creator>Sean_Van_Loon</dc:creator>
      <dc:date>2019-05-14T08:22:03Z</dc:date>
    </item>
  </channel>
</rss>

