<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic R80.40 LSV &amp;amp; DAIP Ipsec VPN - VPN domain of peers not detected in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/R80-40-LSV-amp-DAIP-Ipsec-VPN-VPN-domain-of-peers-not-detected/m-p/77404#M15764</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Saw some other post here asking about odd IPSEC behavior in R80.40. I have been trying to get LSV ipsec VPN working but it seems that the VPN domain is not detected at all and then traffic cannot flow.&lt;/P&gt;&lt;P&gt;If I create the devices as interoperable devices with the same internal CA identifiers under "matching criteria" I can get it working but even then I have to manually override the VPN domain in the VPN community and the firewall doesn't seem able to sniff the VPN domain even from the information i put into the interoperable device information.&lt;/P&gt;&lt;P&gt;Has anyone tried reporting bugs to check point about LSV vpn or does anyone have info about upcoming Jumbo HFAs that might fix this behavior?&lt;/P&gt;&lt;P&gt;Since no VPN domain is detected the tunnel comes up OK but traffic fails to pass because it is dropped by the ruleset with the message :&amp;nbsp;According to the policy the packet should not have been decrypted&lt;/P&gt;</description>
    <pubDate>Fri, 06 Mar 2020 07:27:05 GMT</pubDate>
    <dc:creator>Raine_Widjeskog</dc:creator>
    <dc:date>2020-03-06T07:27:05Z</dc:date>
    <item>
      <title>R80.40 LSV &amp; DAIP Ipsec VPN - VPN domain of peers not detected</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R80-40-LSV-amp-DAIP-Ipsec-VPN-VPN-domain-of-peers-not-detected/m-p/77404#M15764</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Saw some other post here asking about odd IPSEC behavior in R80.40. I have been trying to get LSV ipsec VPN working but it seems that the VPN domain is not detected at all and then traffic cannot flow.&lt;/P&gt;&lt;P&gt;If I create the devices as interoperable devices with the same internal CA identifiers under "matching criteria" I can get it working but even then I have to manually override the VPN domain in the VPN community and the firewall doesn't seem able to sniff the VPN domain even from the information i put into the interoperable device information.&lt;/P&gt;&lt;P&gt;Has anyone tried reporting bugs to check point about LSV vpn or does anyone have info about upcoming Jumbo HFAs that might fix this behavior?&lt;/P&gt;&lt;P&gt;Since no VPN domain is detected the tunnel comes up OK but traffic fails to pass because it is dropped by the ruleset with the message :&amp;nbsp;According to the policy the packet should not have been decrypted&lt;/P&gt;</description>
      <pubDate>Fri, 06 Mar 2020 07:27:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R80-40-LSV-amp-DAIP-Ipsec-VPN-VPN-domain-of-peers-not-detected/m-p/77404#M15764</guid>
      <dc:creator>Raine_Widjeskog</dc:creator>
      <dc:date>2020-03-06T07:27:05Z</dc:date>
    </item>
    <item>
      <title>Re: R80.40 LSV &amp; DAIP Ipsec VPN - VPN domain of peers not detected</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R80-40-LSV-amp-DAIP-Ipsec-VPN-VPN-domain-of-peers-not-detected/m-p/77528#M15780</link>
      <description>Recommend opening a TAC case.</description>
      <pubDate>Sat, 07 Mar 2020 00:29:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R80-40-LSV-amp-DAIP-Ipsec-VPN-VPN-domain-of-peers-not-detected/m-p/77528#M15780</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-03-07T00:29:28Z</dc:date>
    </item>
  </channel>
</rss>

