<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Problem with VPN AMAZON(AWS) ​​CHECK POINT in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/Problem-with-VPN-AMAZON-AWS-CHECK-POINT/m-p/93731#M18573</link>
    <description>&lt;P&gt;No, it is on CheckPoint itself.&lt;/P&gt;</description>
    <pubDate>Mon, 10 Aug 2020 06:06:53 GMT</pubDate>
    <dc:creator>Andris_Konovalo</dc:creator>
    <dc:date>2020-08-10T06:06:53Z</dc:date>
    <item>
      <title>Problem with VPN AMAZON(AWS) ​​CHECK POINT</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Problem-with-VPN-AMAZON-AWS-CHECK-POINT/m-p/62503#M12673</link>
      <description>&lt;P&gt;&lt;SPAN&gt;I have several VPNs against AWS, it happens that at random there is no more traffic. &amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;When the fault occurs, there are the following symptoms: &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;-Up Tunnel &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;-Phase 1 and Phase 2 established &amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;The problem is resolved when we restart Ike at the checkpoint (vpn tu - 7), but after a while it happens again. The configuration of my Tunnel is as follows: &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;IKv1 Phase I. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;-Encryption Algorithm: AES-128 &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;-Data Integrity: SHA1 &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Diffie-Hellman group: Group 2 (1024bit) &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Phase II -AES-128 &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Data Integrity: &lt;/SPAN&gt;&lt;SPAN&gt;SHA1 &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;IKE Security Association (Phase2): Use perfect Forward Secrecy (group 2)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Ike Phase I. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Renegotiate IKE Security associations every (minutes): 480 &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;IPsec (Phase 2): &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Renegotiate IPsec security associations every (seconds): 3600 Nat: Disable NAT inside the VPN community&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;DPD configured in the Cluster and AWS Community VPI and Ping interfaces on static routes&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Tunnel Management &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;-Permanent tunnels: establish permanent tunnels: in all the tunnels of the community. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;-VPN Tunnel Sharing: One VPN tunnel per Gateway pair. VPN ROUTING: to center or, even the center, other satellites, the Internet and other VPN objectives&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;DPD configured in the Cluster and AWS Community VPI and Ping interfaces on static routes&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;when I see the records, it's dropping by rule clean up&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;please your support, the tac still does not find the cause&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 11 Sep 2019 19:07:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Problem-with-VPN-AMAZON-AWS-CHECK-POINT/m-p/62503#M12673</guid>
      <dc:creator>jfabian</dc:creator>
      <dc:date>2019-09-11T19:07:37Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with VPN AMAZON(AWS) ​​CHECK POINT</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Problem-with-VPN-AMAZON-AWS-CHECK-POINT/m-p/62740#M12707</link>
      <description>What version of gateway are we talking about here?&lt;BR /&gt;Have you forced DPD on the gateway via the registry in addition to making the necessary change in the gateway object with GUIdbedit?&lt;BR /&gt;When it works, what do you see in the logs?&lt;BR /&gt;</description>
      <pubDate>Fri, 13 Sep 2019 20:00:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Problem-with-VPN-AMAZON-AWS-CHECK-POINT/m-p/62740#M12707</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-09-13T20:00:36Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with VPN AMAZON(AWS) ​​CHECK POINT</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Problem-with-VPN-AMAZON-AWS-CHECK-POINT/m-p/63771#M12940</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;The problem is presented in several clusters, in version R80.10.&lt;/P&gt;&lt;P&gt;I have enabled DPD in response mode and monitoring mode:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;To enable DPD Responder Mode:&lt;/P&gt;&lt;P&gt;Run on each gateway:&lt;BR /&gt;ckp_regedit -a SOFTWARE/CheckPoint/VPN1 forceSendDPDPayload -n 1&lt;/P&gt;&lt;P&gt;Enable the keep_IKE_SAs property in SmartDashboard to prevent a problem, where the Check Point gateway deletes IKE SAs:&lt;BR /&gt;In SmartDashboard, go to Global Properties &amp;gt; SmartDashboard Customization &amp;gt; Advanced Configuration &amp;gt; VPN advanced properties &amp;gt; VPN IKE properties.&lt;BR /&gt;Change keep_IKE_SAs to true.&lt;/P&gt;&lt;P&gt;To enable DPD monitoring:&lt;/P&gt;&lt;P&gt;On each VPN gateway in the VPN community, configure the tunnel_keepalive_method property, in GuiDBedit Tool (see sk13009) or dbedit (see skI3301). This includes 3rd Party gateways. (You cannot configure different monitor mechanisms for the same gateway).&lt;/P&gt;&lt;P&gt;In GuiDBedit Tool, go to Network Objects &amp;gt; network_objects &amp;gt; &amp;lt;gateway&amp;gt; &amp;gt; VPN.&lt;BR /&gt;For the Value, select a permanent tunnel mode.&lt;BR /&gt;Save all the changes.&lt;BR /&gt;Install policy on the gateways.&lt;/P&gt;</description>
      <pubDate>Thu, 26 Sep 2019 20:25:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Problem-with-VPN-AMAZON-AWS-CHECK-POINT/m-p/63771#M12940</guid>
      <dc:creator>Juan_Fabian_Ba1</dc:creator>
      <dc:date>2019-09-26T20:25:24Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with VPN AMAZON(AWS) ​​CHECK POINT</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Problem-with-VPN-AMAZON-AWS-CHECK-POINT/m-p/63772#M12941</link>
      <description>Hello!&lt;BR /&gt;&lt;BR /&gt;Yes, enable DPD via GuiDB and gateways.&lt;BR /&gt;&lt;BR /&gt;Both forms are active:&lt;BR /&gt;&lt;BR /&gt;-DPD Mode response&lt;BR /&gt;-DPD Mode monitoring</description>
      <pubDate>Thu, 26 Sep 2019 20:29:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Problem-with-VPN-AMAZON-AWS-CHECK-POINT/m-p/63772#M12941</guid>
      <dc:creator>Juan_Fabian_Ba1</dc:creator>
      <dc:date>2019-09-26T20:29:46Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with VPN AMAZON(AWS) ​​CHECK POINT</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Problem-with-VPN-AMAZON-AWS-CHECK-POINT/m-p/76849#M15628</link>
      <description>&lt;P&gt;Hi Juan,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Did you manage to fix your issues with aws &amp;lt;-&amp;gt; Checkpoint VPNs? As we have the same behavior for any of our gateways.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;BR /&gt;Yurii&lt;/P&gt;</description>
      <pubDate>Mon, 02 Mar 2020 13:04:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Problem-with-VPN-AMAZON-AWS-CHECK-POINT/m-p/76849#M15628</guid>
      <dc:creator>yuko</dc:creator>
      <dc:date>2020-03-02T13:04:57Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with VPN AMAZON(AWS) ​​CHECK POINT</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Problem-with-VPN-AMAZON-AWS-CHECK-POINT/m-p/77100#M15677</link>
      <description>Any fix? We have the same issue</description>
      <pubDate>Wed, 04 Mar 2020 09:45:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Problem-with-VPN-AMAZON-AWS-CHECK-POINT/m-p/77100#M15677</guid>
      <dc:creator>D-Dawg</dc:creator>
      <dc:date>2020-03-04T09:45:40Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with VPN AMAZON(AWS) ​​CHECK POINT</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Problem-with-VPN-AMAZON-AWS-CHECK-POINT/m-p/83041#M16793</link>
      <description>&lt;P&gt;Any solution ? We have observed the same problem already on two different GWs.&lt;/P&gt;&lt;P&gt;But in our case traffic is not working anymore, tunnels are UP /Phase1 and Phase2 and we see that we are sending packets over VPN and also some packets are reaching GW back, but nothing on inside Interface.&lt;/P&gt;&lt;P&gt;We have lost 3 partner connections to AWS already without resolution for about 3 weeks... Tons of troubleshooting with CP support, but still nothing ...&lt;/P&gt;</description>
      <pubDate>Fri, 24 Apr 2020 07:29:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Problem-with-VPN-AMAZON-AWS-CHECK-POINT/m-p/83041#M16793</guid>
      <dc:creator>Andris_Konovalo</dc:creator>
      <dc:date>2020-04-24T07:29:12Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with VPN AMAZON(AWS) ​​CHECK POINT</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Problem-with-VPN-AMAZON-AWS-CHECK-POINT/m-p/90696#M18138</link>
      <description>&lt;P&gt;Following this thread. We have the same issues with site to site tunnels to AWS.&lt;/P&gt;&lt;P&gt;5600 gateway devices running R80.20.&lt;/P&gt;</description>
      <pubDate>Mon, 06 Jul 2020 16:00:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Problem-with-VPN-AMAZON-AWS-CHECK-POINT/m-p/90696#M18138</guid>
      <dc:creator>TravisM</dc:creator>
      <dc:date>2020-07-06T16:00:54Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with VPN AMAZON(AWS) ​​CHECK POINT</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Problem-with-VPN-AMAZON-AWS-CHECK-POINT/m-p/93543#M18546</link>
      <description>&lt;P&gt;I have the same problem 5900 with 80.10 , after changing to 6700 with 80.40 the same problem..&lt;/P&gt;</description>
      <pubDate>Thu, 06 Aug 2020 07:50:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Problem-with-VPN-AMAZON-AWS-CHECK-POINT/m-p/93543#M18546</guid>
      <dc:creator>kobi_rudy</dc:creator>
      <dc:date>2020-08-06T07:50:55Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with VPN AMAZON(AWS) ​​CHECK POINT</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Problem-with-VPN-AMAZON-AWS-CHECK-POINT/m-p/93554#M18548</link>
      <description>&lt;P&gt;Hi, we found solution, problem is with NAT on AWS. To avoid these to happening we have added additional NAT rule, where "Original Source" is set to CP internal interface and all the other NAT fields are not changed. It helped to handle NAT properly on AWS side ...&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 06 Aug 2020 09:14:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Problem-with-VPN-AMAZON-AWS-CHECK-POINT/m-p/93554#M18548</guid>
      <dc:creator>Andris_Konovalo</dc:creator>
      <dc:date>2020-08-06T09:14:26Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with VPN AMAZON(AWS) ​​CHECK POINT</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Problem-with-VPN-AMAZON-AWS-CHECK-POINT/m-p/93729#M18572</link>
      <description>&lt;P&gt;where do you find the Nat rules in the AWS site?&lt;/P&gt;</description>
      <pubDate>Mon, 10 Aug 2020 05:28:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Problem-with-VPN-AMAZON-AWS-CHECK-POINT/m-p/93729#M18572</guid>
      <dc:creator>kobi_rudy</dc:creator>
      <dc:date>2020-08-10T05:28:01Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with VPN AMAZON(AWS) ​​CHECK POINT</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Problem-with-VPN-AMAZON-AWS-CHECK-POINT/m-p/93731#M18573</link>
      <description>&lt;P&gt;No, it is on CheckPoint itself.&lt;/P&gt;</description>
      <pubDate>Mon, 10 Aug 2020 06:06:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Problem-with-VPN-AMAZON-AWS-CHECK-POINT/m-p/93731#M18573</guid>
      <dc:creator>Andris_Konovalo</dc:creator>
      <dc:date>2020-08-10T06:06:53Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with VPN AMAZON(AWS) ​​CHECK POINT</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Problem-with-VPN-AMAZON-AWS-CHECK-POINT/m-p/93732#M18574</link>
      <description>&lt;P&gt;so you added a rule in the nat rules&amp;nbsp; of cp like that?&amp;nbsp;&lt;/P&gt;&lt;P&gt;internal_int_cp&amp;nbsp; &amp;nbsp; internal_net_aws&amp;nbsp; original&amp;nbsp; , and in the vpn community also " Disable Nat inside the vpn community " ?&lt;/P&gt;&lt;P&gt;do you think vpn resets can happened because MTU is 1500?&amp;nbsp;&lt;/P&gt;&lt;P&gt;its a new 6700 with 80.40. hf48&lt;/P&gt;&lt;P&gt;Thanks!&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 10 Aug 2020 06:21:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Problem-with-VPN-AMAZON-AWS-CHECK-POINT/m-p/93732#M18574</guid>
      <dc:creator>kobi_rudy</dc:creator>
      <dc:date>2020-08-10T06:21:35Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with VPN AMAZON(AWS) ​​CHECK POINT</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Problem-with-VPN-AMAZON-AWS-CHECK-POINT/m-p/93734#M18575</link>
      <description>&lt;P&gt;Just "&lt;SPAN&gt;internal_int_cp&lt;/SPAN&gt;" was enough.&lt;/P&gt;</description>
      <pubDate>Mon, 10 Aug 2020 06:20:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Problem-with-VPN-AMAZON-AWS-CHECK-POINT/m-p/93734#M18575</guid>
      <dc:creator>Andris_Konovalo</dc:creator>
      <dc:date>2020-08-10T06:20:19Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with VPN AMAZON(AWS) ​​CHECK POINT</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Problem-with-VPN-AMAZON-AWS-CHECK-POINT/m-p/95893#M18882</link>
      <description>&lt;P&gt;Hello Everyone&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I hope you guys are well&lt;/P&gt;&lt;P&gt;Please!&lt;/P&gt;&lt;P&gt;We got the same behavior with the difference that the tunnel became down only on the weekend. We must do the same steps (VPN TU option 7 or reset tunnel from SmartView Monitor).&lt;/P&gt;&lt;P&gt;what do you mean with &lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN&gt;internal_int_cp&lt;/SPAN&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;?&amp;nbsp;&lt;/P&gt;&lt;P&gt;Original Source=&amp;nbsp;&lt;SPAN&gt;&lt;EM&gt;&lt;STRONG&gt;internal_int_cp&lt;/STRONG&gt;&lt;/EM&gt;&amp;nbsp; &amp;nbsp;Orginal Destination= original&amp;nbsp; &amp;nbsp; &amp;nbsp;Traslated Orginal=&amp;nbsp;Orginal&amp;nbsp; &amp;nbsp;Traslated Destination=original&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thank you so much!&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;best regards&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 03 Sep 2020 03:38:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Problem-with-VPN-AMAZON-AWS-CHECK-POINT/m-p/95893#M18882</guid>
      <dc:creator>Everest_Aponte</dc:creator>
      <dc:date>2020-09-03T03:38:43Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with VPN AMAZON(AWS) ​​CHECK POINT</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Problem-with-VPN-AMAZON-AWS-CHECK-POINT/m-p/95912#M18889</link>
      <description>&lt;P&gt;internal_int_cp = CheckPoint assigned private ip address (on interface and VIP for cluster), from where you are initiating IPSec tunnel.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 03 Sep 2020 06:19:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Problem-with-VPN-AMAZON-AWS-CHECK-POINT/m-p/95912#M18889</guid>
      <dc:creator>Andris_Konovalo</dc:creator>
      <dc:date>2020-09-03T06:19:50Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with VPN AMAZON(AWS) ​​CHECK POINT</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Problem-with-VPN-AMAZON-AWS-CHECK-POINT/m-p/95922#M18892</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;We had the same issue when traffic was not passing through the vpn tunnel.&lt;/P&gt;&lt;P&gt;The solution was to set up an SLA on a cisco router which does periodically pings towards a host on the other end of the vpn tunnel in AWS.&lt;/P&gt;</description>
      <pubDate>Thu, 03 Sep 2020 07:05:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Problem-with-VPN-AMAZON-AWS-CHECK-POINT/m-p/95922#M18892</guid>
      <dc:creator>funkylicious</dc:creator>
      <dc:date>2020-09-03T07:05:14Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with VPN AMAZON(AWS) ​​CHECK POINT</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Problem-with-VPN-AMAZON-AWS-CHECK-POINT/m-p/95942#M18894</link>
      <description>&lt;P&gt;Permanent tunnels and the advanced "keep_IKE_SAs" setting in&amp;nbsp;&lt;SPAN&gt;sk142355 have resolved several issues that I've seen with AWS&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 03 Sep 2020 11:54:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Problem-with-VPN-AMAZON-AWS-CHECK-POINT/m-p/95942#M18894</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2020-09-03T11:54:04Z</dc:date>
    </item>
  </channel>
</rss>

