<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: HI All,Any one can guide ? in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/HI-All-Any-one-can-guide/m-p/13984#M2346</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;"Strict" policy explicitly prohibits all internal networks from talking to each other, so we'll have to dig a bit to figure out what is going on.&lt;/P&gt;&lt;P&gt;the IP you are showing is the RFC1918 address, so you are not going over connections to ISPs, but private lines that should be connected to other internal interfaces.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To verify, please include screenshots of:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your routing settings:&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="67695" class="jive-image image-4" src="https://community.checkpoint.com/legacyfs/online/checkpoint/67695_pastedImage_7.png" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your configuration for ISP redundancy and NAT for the gateway, i.e.:&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="67684" class="image-1 jive-image" height="236" src="https://community.checkpoint.com/legacyfs/online/checkpoint/67684_pastedImage_1.png" width="267" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;SSL Inspection Policy and Inspections:&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="67692" class="image-2 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/67692_pastedImage_2.png" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And Firewall NAT policy settings (same screenshot as depicted here) and NAT Rules (3):&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="67693" class="image-3 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/67693_pastedImage_3.png" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the settings in the above section (2) are set to "On", turn it off, apply settings and try again.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Change Access Control Policy from "Strict" to "Standard" and attempt to establish SSL VPN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For troubleshooting, use "fw monitor" command (please lookup sk describing its usage). The iIoO depicting traversal of the firewall's interfaces.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;[Expert@drawbridge]# fw monitor -e "src=172.20.106.234 or dst=72.30.35.10 ,accept;"&lt;BR /&gt;fw: getting filter (from command line)&lt;BR /&gt;fw: compiling&lt;BR /&gt;monitorfilter:&lt;BR /&gt;Compiled OK.&lt;BR /&gt;fw: loading&lt;BR /&gt;fw: monitoring (control-C to stop)&lt;BR /&gt;[vs_0][fw_0] LAN1:i[60]: 192.168.7.148 -&amp;gt; 72.30.35.10 (ICMP) len=60 id=13357&lt;BR /&gt;ICMP: type=8 code=0 echo request id=1 seq=3195&lt;BR /&gt;[vs_0][fw_0] LAN1:I[60]: 192.168.7.148 -&amp;gt; 72.30.35.10 (ICMP) len=60 id=13357&lt;BR /&gt;ICMP: type=8 code=0 echo request id=1 seq=3195&lt;BR /&gt;[vs_0][fw_0] WAN:o[60]: 192.168.7.148 -&amp;gt; 72.30.35.10 (ICMP) len=60 id=13357&lt;BR /&gt;ICMP: type=8 code=0 echo request id=1 seq=3195&lt;BR /&gt;[vs_0][fw_0] WAN:O[60]: aaa.aaa.aaa.aaa -&amp;gt; 72.30.35.10 (ICMP) len=60 id=13357&lt;BR /&gt;ICMP: type=8 code=0 echo request id=12540 seq=3195&lt;BR /&gt;[vs_0][fw_0] LAN1:i[60]: 192.168.7.148 -&amp;gt; 72.30.35.10 (ICMP) len=60 id=13358&lt;BR /&gt;ICMP: type=8 code=0 echo request id=1 seq=3196&lt;BR /&gt;[vs_0][fw_0] LAN1:I[60]: 192.168.7.148 -&amp;gt; 72.30.35.10 (ICMP) len=60 id=13358&lt;BR /&gt;ICMP: type=8 code=0 echo request id=1 seq=3196&lt;BR /&gt;[vs_0][fw_0] WAN:o[60]: 192.168.7.148 -&amp;gt; 72.30.35.10 (ICMP) len=60 id=13358&lt;BR /&gt;ICMP: type=8 code=0 echo request id=1 seq=3196&lt;BR /&gt;[vs_0][fw_0] WAN:O[60]: aaa.aaa.aaa.aaa -&amp;gt; 72.30.35.10 (ICMP) len=60 id=13358&lt;BR /&gt;ICMP: type=8 code=0 echo request id=12540 seq=3196&lt;BR /&gt;[vs_0][fw_0] LAN1:i[60]: 192.168.7.148 -&amp;gt; 72.30.35.10 (ICMP) len=60 id=13359&lt;BR /&gt;ICMP: type=8 code=0 echo request id=1 seq=3197&lt;BR /&gt;[vs_0][fw_0] LAN1:I[60]: 192.168.7.148 -&amp;gt; 72.30.35.10 (ICMP) len=60 id=13359&lt;BR /&gt;ICMP: type=8 code=0 echo request id=1 seq=3197&lt;BR /&gt;[vs_0][fw_0] WAN:o[60]: 192.168.7.148 -&amp;gt; 72.30.35.10 (ICMP) len=60 id=13359&lt;BR /&gt;ICMP: type=8 code=0 echo request id=1 seq=3197&lt;BR /&gt;[vs_0][fw_0] WAN:O[60]: aaa.aaa.aaa.aaa -&amp;gt; 72.30.35.10 (ICMP) len=60 id=13359&lt;BR /&gt;ICMP: type=8 code=0 echo request id=12540 seq=3197&lt;BR /&gt;[vs_0][fw_0] LAN1:i[60]: 192.168.7.148 -&amp;gt; 72.30.35.10 (ICMP) len=60 id=13360&lt;BR /&gt;ICMP: type=8 code=0 echo request id=1 seq=3198&lt;BR /&gt;[vs_0][fw_0] LAN1:I[60]: 192.168.7.148 -&amp;gt; 72.30.35.10 (ICMP) len=60 id=13360&lt;BR /&gt;ICMP: type=8 code=0 echo request id=1 seq=3198&lt;BR /&gt;[vs_0][fw_0] WAN:o[60]: 192.168.7.148 -&amp;gt; 72.30.35.10 (ICMP) len=60 id=13360&lt;BR /&gt;ICMP: type=8 code=0 echo request id=1 seq=3198&lt;BR /&gt;[vs_0][fw_0] WAN:O[60]: aaa.aaa.aaa.aaa -&amp;gt; 72.30.35.10 (ICMP) len=60 id=13360&lt;BR /&gt;ICMP: type=8 code=0 echo request id=12540 seq=3198&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If changing the policy from "Strict" to "Standard" worked, look closer at the rules you've created while using "Strict" policy.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sat, 28 Jul 2018 13:04:40 GMT</pubDate>
    <dc:creator>Vladimir</dc:creator>
    <dc:date>2018-07-28T13:04:40Z</dc:date>
    <item>
      <title>HI All,Any one can guide ?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/HI-All-Any-one-can-guide/m-p/13979#M2341</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;[Expert@CTSG3Firewall]# tcpdump -nni any host 172.20.106.234&lt;BR /&gt;tcpdump: WARNING: any: That device doesn't support promiscuous mode&lt;BR /&gt;(Promiscuous mode not supported on the "any" device)&lt;BR /&gt;tcpdump: verbose output suppressed, use -v or -vv for full protocol decode&lt;BR /&gt;listening on any, link-type LINUX_SLL (Linux cooked), capture size 262144 bytes&lt;BR /&gt;19:17:40.710318 IP 10.25.153.3.49522 &amp;gt; 172.20.106.234.443: Flags [S], seq 2707150385, win 8192, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0&lt;BR /&gt;19:17:43.716807 IP 10.25.153.3.49522 &amp;gt; 172.20.106.234.443: Flags [S], seq 2707150385, win 8192, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0&lt;BR /&gt;19:17:49.722827 IP 10.25.153.3.49522 &amp;gt; 172.20.106.234.443: Flags [S], seq 2707150385, win 8192, options [mss 1460,nop,nop,sackOK], length 0&lt;BR /&gt;19:18:00.721660 IP 10.25.153.3.49523 &amp;gt; 172.20.106.234.443: Flags [S], seq 2812651852, win 8192, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0&lt;BR /&gt;19:18:03.731702 IP 10.25.153.3.49523 &amp;gt; 172.20.106.234.443: Flags [S], seq 2812651852, win 8192, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0&lt;BR /&gt;19:18:09.737746 IP 10.25.153.3.49523 &amp;gt; 172.20.106.234.443: Flags&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Not receiving return traffic ,while bypass firewall able connect VPN client ,through firewall can not see return traffic ..&lt;/P&gt;&lt;P&gt;using firewall model Checkpoint 750 small Business.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any one can guide on further troubleshooting ideas....&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 Jul 2018 15:01:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/HI-All-Any-one-can-guide/m-p/13979#M2341</guid>
      <dc:creator>Shivajith_S</dc:creator>
      <dc:date>2018-07-27T15:01:49Z</dc:date>
    </item>
    <item>
      <title>Re: HI All,Any one can guide ?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/HI-All-Any-one-can-guide/m-p/13980#M2342</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Please be more specific:&lt;/P&gt;&lt;P&gt;What kind of VPN? IPSec or SSL?&lt;/P&gt;&lt;P&gt;VPN from where to where?&lt;/P&gt;&lt;P&gt;When you are bypassing firewall, are you unloading the policy or are physically bypassing it?&lt;/P&gt;&lt;P&gt;If second, what IP is assigned to the client and by which device?&lt;/P&gt;&lt;P&gt;Describe the topology of your setup.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 Jul 2018 15:17:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/HI-All-Any-one-can-guide/m-p/13980#M2342</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2018-07-27T15:17:17Z</dc:date>
    </item>
    <item>
      <title>Re: HI All,Any one can guide ?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/HI-All-Any-one-can-guide/m-p/13981#M2343</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;SPAN&gt;Hi&lt;/SPAN&gt;&lt;P class=""&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P class=""&gt;Does this rely to r80.10? Might be a bug&lt;/P&gt;&lt;P class=""&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/thread/7267-tcpdump-r8010"&gt;https://community.checkpoint.com/thread/7267-tcpdump-r8010&lt;/A&gt;&amp;nbsp;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Kim&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 Jul 2018 16:27:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/HI-All-Any-one-can-guide/m-p/13981#M2343</guid>
      <dc:creator>Kim_Moberg</dc:creator>
      <dc:date>2018-07-27T16:27:36Z</dc:date>
    </item>
    <item>
      <title>Re: HI All,Any one can guide ?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/HI-All-Any-one-can-guide/m-p/13982#M2344</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I do not think 750 appliance are capable of running R80.10.&lt;/P&gt;&lt;P&gt;My money is on simple configuration error.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 27 Jul 2018 17:40:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/HI-All-Any-one-can-guide/m-p/13982#M2344</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2018-07-27T17:40:06Z</dc:date>
    </item>
    <item>
      <title>Re: HI All,Any one can guide ?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/HI-All-Any-one-can-guide/m-p/13983#M2345</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;HI Vladimir ,&lt;/P&gt;&lt;P&gt;please find the topology..&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-3 jive-image" height="263" src="https://community.checkpoint.com/legacyfs/online/checkpoint/67688_pastedImage_4.png" width="209" /&gt;&lt;IMG class="jive-image image-4" height="274" src="https://community.checkpoint.com/legacyfs/online/checkpoint/67689_pastedImage_5.png" width="204" /&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The Arrows segregating both network (2 different networks) .There is no internet connection,2 separate lease lines With Different brand FW VPN client able to connect , same implementation done with Checkpoint firewall instead of WAN int in fig 1 ,using LAN 5 as show in fig 5.&lt;/P&gt;&lt;P&gt;All required rules allowed(selected strict option) ,able to ping until ISP interfaces&amp;nbsp; ,icmp not allowed dst ip ,while try to establish VPN connection can see out going traffic for ex: PC A to dst ip 172.20.106.234 as per logs which in shared to before .&lt;/P&gt;&lt;P&gt;same issue for both networks&lt;/P&gt;&lt;P&gt;Not able to find where the incoming traffic dropping ...SSL VPN client not connecting&amp;nbsp; its showing not responded .&lt;/P&gt;&lt;P&gt;Firewall is Checkpoint 750 small business firewall ,R77.20.&lt;/P&gt;&lt;P&gt;kindly share if got any idea ....&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 28 Jul 2018 05:05:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/HI-All-Any-one-can-guide/m-p/13983#M2345</guid>
      <dc:creator>Shivajith_S</dc:creator>
      <dc:date>2018-07-28T05:05:29Z</dc:date>
    </item>
    <item>
      <title>Re: HI All,Any one can guide ?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/HI-All-Any-one-can-guide/m-p/13984#M2346</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;"Strict" policy explicitly prohibits all internal networks from talking to each other, so we'll have to dig a bit to figure out what is going on.&lt;/P&gt;&lt;P&gt;the IP you are showing is the RFC1918 address, so you are not going over connections to ISPs, but private lines that should be connected to other internal interfaces.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To verify, please include screenshots of:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your routing settings:&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="67695" class="jive-image image-4" src="https://community.checkpoint.com/legacyfs/online/checkpoint/67695_pastedImage_7.png" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your configuration for ISP redundancy and NAT for the gateway, i.e.:&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="67684" class="image-1 jive-image" height="236" src="https://community.checkpoint.com/legacyfs/online/checkpoint/67684_pastedImage_1.png" width="267" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;SSL Inspection Policy and Inspections:&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="67692" class="image-2 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/67692_pastedImage_2.png" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And Firewall NAT policy settings (same screenshot as depicted here) and NAT Rules (3):&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="67693" class="image-3 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/67693_pastedImage_3.png" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the settings in the above section (2) are set to "On", turn it off, apply settings and try again.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Change Access Control Policy from "Strict" to "Standard" and attempt to establish SSL VPN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For troubleshooting, use "fw monitor" command (please lookup sk describing its usage). The iIoO depicting traversal of the firewall's interfaces.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;[Expert@drawbridge]# fw monitor -e "src=172.20.106.234 or dst=72.30.35.10 ,accept;"&lt;BR /&gt;fw: getting filter (from command line)&lt;BR /&gt;fw: compiling&lt;BR /&gt;monitorfilter:&lt;BR /&gt;Compiled OK.&lt;BR /&gt;fw: loading&lt;BR /&gt;fw: monitoring (control-C to stop)&lt;BR /&gt;[vs_0][fw_0] LAN1:i[60]: 192.168.7.148 -&amp;gt; 72.30.35.10 (ICMP) len=60 id=13357&lt;BR /&gt;ICMP: type=8 code=0 echo request id=1 seq=3195&lt;BR /&gt;[vs_0][fw_0] LAN1:I[60]: 192.168.7.148 -&amp;gt; 72.30.35.10 (ICMP) len=60 id=13357&lt;BR /&gt;ICMP: type=8 code=0 echo request id=1 seq=3195&lt;BR /&gt;[vs_0][fw_0] WAN:o[60]: 192.168.7.148 -&amp;gt; 72.30.35.10 (ICMP) len=60 id=13357&lt;BR /&gt;ICMP: type=8 code=0 echo request id=1 seq=3195&lt;BR /&gt;[vs_0][fw_0] WAN:O[60]: aaa.aaa.aaa.aaa -&amp;gt; 72.30.35.10 (ICMP) len=60 id=13357&lt;BR /&gt;ICMP: type=8 code=0 echo request id=12540 seq=3195&lt;BR /&gt;[vs_0][fw_0] LAN1:i[60]: 192.168.7.148 -&amp;gt; 72.30.35.10 (ICMP) len=60 id=13358&lt;BR /&gt;ICMP: type=8 code=0 echo request id=1 seq=3196&lt;BR /&gt;[vs_0][fw_0] LAN1:I[60]: 192.168.7.148 -&amp;gt; 72.30.35.10 (ICMP) len=60 id=13358&lt;BR /&gt;ICMP: type=8 code=0 echo request id=1 seq=3196&lt;BR /&gt;[vs_0][fw_0] WAN:o[60]: 192.168.7.148 -&amp;gt; 72.30.35.10 (ICMP) len=60 id=13358&lt;BR /&gt;ICMP: type=8 code=0 echo request id=1 seq=3196&lt;BR /&gt;[vs_0][fw_0] WAN:O[60]: aaa.aaa.aaa.aaa -&amp;gt; 72.30.35.10 (ICMP) len=60 id=13358&lt;BR /&gt;ICMP: type=8 code=0 echo request id=12540 seq=3196&lt;BR /&gt;[vs_0][fw_0] LAN1:i[60]: 192.168.7.148 -&amp;gt; 72.30.35.10 (ICMP) len=60 id=13359&lt;BR /&gt;ICMP: type=8 code=0 echo request id=1 seq=3197&lt;BR /&gt;[vs_0][fw_0] LAN1:I[60]: 192.168.7.148 -&amp;gt; 72.30.35.10 (ICMP) len=60 id=13359&lt;BR /&gt;ICMP: type=8 code=0 echo request id=1 seq=3197&lt;BR /&gt;[vs_0][fw_0] WAN:o[60]: 192.168.7.148 -&amp;gt; 72.30.35.10 (ICMP) len=60 id=13359&lt;BR /&gt;ICMP: type=8 code=0 echo request id=1 seq=3197&lt;BR /&gt;[vs_0][fw_0] WAN:O[60]: aaa.aaa.aaa.aaa -&amp;gt; 72.30.35.10 (ICMP) len=60 id=13359&lt;BR /&gt;ICMP: type=8 code=0 echo request id=12540 seq=3197&lt;BR /&gt;[vs_0][fw_0] LAN1:i[60]: 192.168.7.148 -&amp;gt; 72.30.35.10 (ICMP) len=60 id=13360&lt;BR /&gt;ICMP: type=8 code=0 echo request id=1 seq=3198&lt;BR /&gt;[vs_0][fw_0] LAN1:I[60]: 192.168.7.148 -&amp;gt; 72.30.35.10 (ICMP) len=60 id=13360&lt;BR /&gt;ICMP: type=8 code=0 echo request id=1 seq=3198&lt;BR /&gt;[vs_0][fw_0] WAN:o[60]: 192.168.7.148 -&amp;gt; 72.30.35.10 (ICMP) len=60 id=13360&lt;BR /&gt;ICMP: type=8 code=0 echo request id=1 seq=3198&lt;BR /&gt;[vs_0][fw_0] WAN:O[60]: aaa.aaa.aaa.aaa -&amp;gt; 72.30.35.10 (ICMP) len=60 id=13360&lt;BR /&gt;ICMP: type=8 code=0 echo request id=12540 seq=3198&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If changing the policy from "Strict" to "Standard" worked, look closer at the rules you've created while using "Strict" policy.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 28 Jul 2018 13:04:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/HI-All-Any-one-can-guide/m-p/13984#M2346</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2018-07-28T13:04:40Z</dc:date>
    </item>
    <item>
      <title>Re: HI All,Any one can guide ?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/HI-All-Any-one-can-guide/m-p/13985#M2347</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;IMG class="image-1 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/67690_pastedImage_1.png" /&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;In this scenario there is no ISP redundancy , here PC A,PC B should communicate respective dst as show in figure with arrows. ( as mention 1 and 2 in fig),here 1 and 2 are separated&amp;nbsp; network .&lt;/LI&gt;&lt;LI&gt;that's why implemented with LAN 5 ( separated from LAN Switch ),DMZ instead using WAN int ( for example 1 as shown fig ) .&lt;/LI&gt;&lt;LI&gt;also tried with standard policy and with INT WAN (instead of LAN 5 ) for Network 1 able to ping to ISP 1 interface directly connected INTERFACE.Can not initiate VPN .&lt;/LI&gt;&lt;LI&gt;Until Firewall interface only under my control from LAN PC's .&lt;/LI&gt;&lt;LI&gt;Routing are directly connected ,&lt;/LI&gt;&lt;LI&gt;NAT is turned off as you mentioned .&lt;/LI&gt;&lt;LI&gt;The option which you mentioned SSL VPN inspection need to check with HTTPS categorization mode on my side weather how its working&lt;/LI&gt;&lt;LI&gt;With same setup will check with Standard Policy .&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your valuable replies ..&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 28 Jul 2018 15:04:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/HI-All-Any-one-can-guide/m-p/13985#M2347</guid>
      <dc:creator>Shivajith_S</dc:creator>
      <dc:date>2018-07-28T15:04:21Z</dc:date>
    </item>
    <item>
      <title>Re: HI All,Any one can guide ?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/HI-All-Any-one-can-guide/m-p/13986#M2348</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Nah, those 700&amp;nbsp;SMB GW’a&amp;nbsp;are&amp;nbsp;running on&amp;nbsp;Gaia&amp;nbsp;embedded R77.20.x and not (yet) on R80.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 28 Jul 2018 19:23:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/HI-All-Any-one-can-guide/m-p/13986#M2348</guid>
      <dc:creator>Normen_Sam-Sin3</dc:creator>
      <dc:date>2018-07-28T19:23:43Z</dc:date>
    </item>
    <item>
      <title>Re: HI All,Any one can guide ?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/HI-All-Any-one-can-guide/m-p/13987#M2349</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P class=""&gt;I just saw you were using tcpdump with parametre -Penni and it also generated an error. This Tim Hall found as a bug. I dont know if this could be the issue.&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;I would have removed the parametre to first see if traffic flows as expected.&lt;/P&gt;&lt;P class=""&gt;I think &lt;A _jive_internal="true" class="jive-link-profile-small jive_macro jive_macro_user" href="https://community.checkpoint.com/people/vladff097c1d-a31f-483e-9404-5bf20903d568"&gt;Vladimir Yakovlev&amp;nbsp;&lt;/A&gt;got a point about a misconfiguration.&lt;/P&gt;&lt;P class=""&gt;Thanks&lt;/P&gt;&lt;P class=""&gt;Kim&lt;/P&gt;&lt;P class=""&gt;&lt;BR /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 29 Jul 2018 06:38:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/HI-All-Any-one-can-guide/m-p/13987#M2349</guid>
      <dc:creator>Kim_Moberg</dc:creator>
      <dc:date>2018-07-29T06:38:08Z</dc:date>
    </item>
    <item>
      <title>Re: HI All,Any one can guide ?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/HI-All-Any-one-can-guide/m-p/13988#M2350</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi All , Thanks for giving valuable info ,Special thanks to Vladimir ..&lt;/P&gt;&lt;P&gt;The issue got resolved its because of anti spoofing dropping.And modified routing and policy configuration .Now it working with Strict mode.In Cli globally disable the anti spoofing.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 30 Jul 2018 16:23:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/HI-All-Any-one-can-guide/m-p/13988#M2350</guid>
      <dc:creator>Shivajith_S</dc:creator>
      <dc:date>2018-07-30T16:23:40Z</dc:date>
    </item>
  </channel>
</rss>

