<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: VPN - Check Point and Fortigate in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/VPN-Check-Point-and-Fortigate/m-p/132430#M23939</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Thanks for your feedback.&lt;/P&gt;&lt;P&gt;The internal network was configured in "Specific Network" and due that the external interface was drop. I removed the network from the Specific Network and everything worked.&lt;/P&gt;</description>
    <pubDate>Fri, 22 Oct 2021 12:59:26 GMT</pubDate>
    <dc:creator>j_silva</dc:creator>
    <dc:date>2021-10-22T12:59:26Z</dc:date>
    <item>
      <title>VPN - Check Point and Fortigate</title>
      <link>https://community.checkpoint.com/t5/General-Topics/VPN-Check-Point-and-Fortigate/m-p/76540#M15543</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;#Site A Check Point R80 (At the moment I can't confirm if R80.10,20,30..)&lt;BR /&gt;#Site B Fortigate&lt;/P&gt;&lt;P&gt;Reports of the VPN keep showing loads of errors with "&amp;nbsp;&lt;SPAN&gt;'Quick Mode Received Notification from Peer: invalid spi "&lt;BR /&gt;&lt;BR /&gt;It's not every time, so with it being intermittent I have ensured both Sites have the same Encryption settings, and the Phase 1 and Phase 2 timers are definitely set to the same time/interval.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;What else could be checked? Or what else do you guys who may have seen this before think it could be?&lt;BR /&gt;&lt;BR /&gt;I don't have much more information at the moment, but I would like to arm myself with some potential solutions or scenarios to troubleshoot.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Thu, 27 Feb 2020 10:06:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/VPN-Check-Point-and-Fortigate/m-p/76540#M15543</guid>
      <dc:creator>beneaton</dc:creator>
      <dc:date>2020-02-27T10:06:31Z</dc:date>
    </item>
    <item>
      <title>Re: VPN - Check Point and Fortigate</title>
      <link>https://community.checkpoint.com/t5/General-Topics/VPN-Check-Point-and-Fortigate/m-p/76543#M15544</link>
      <description>&lt;P&gt;I would suggest&amp;nbsp;&lt;A class="cp_link sc_ellipsis" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk108600&amp;amp;partition=Advanced&amp;amp;product=IPSec" target="_blank"&gt;sk108600: VPN Site-to-Site with 3rd party&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 27 Feb 2020 10:17:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/VPN-Check-Point-and-Fortigate/m-p/76543#M15544</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2020-02-27T10:17:42Z</dc:date>
    </item>
    <item>
      <title>Re: VPN - Check Point and Fortigate</title>
      <link>https://community.checkpoint.com/t5/General-Topics/VPN-Check-Point-and-Fortigate/m-p/76556#M15548</link>
      <description>Thanks - I'll get Solution #7 attempted 1st of all.</description>
      <pubDate>Thu, 27 Feb 2020 11:11:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/VPN-Check-Point-and-Fortigate/m-p/76556#M15548</guid>
      <dc:creator>beneaton</dc:creator>
      <dc:date>2020-02-27T11:11:59Z</dc:date>
    </item>
    <item>
      <title>Re: VPN - Check Point and Fortigate</title>
      <link>https://community.checkpoint.com/t5/General-Topics/VPN-Check-Point-and-Fortigate/m-p/76560#M15549</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/31029"&gt;@beneaton&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;Use following settings:&lt;/P&gt;
&lt;P&gt;Phase 1: &lt;BR /&gt;- Main Mode (not aggressive mode)&lt;BR /&gt;- AES-256 / SHA256&lt;BR /&gt;- Use max. DH group 5 (not higher)&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;Phase 2&lt;BR /&gt;- Do not use PFS&lt;BR /&gt;- AES256 / SHA256&lt;BR /&gt;&lt;BR /&gt;This always works with CP R80.30 latest JHF and Fortigate 5.4, 5.6, 6.0, 6.2.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 27 Feb 2020 11:22:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/VPN-Check-Point-and-Fortigate/m-p/76560#M15549</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2020-02-27T11:22:08Z</dc:date>
    </item>
    <item>
      <title>Re: VPN - Check Point and Fortigate</title>
      <link>https://community.checkpoint.com/t5/General-Topics/VPN-Check-Point-and-Fortigate/m-p/76563#M15550</link>
      <description>Hi Heiko,&lt;BR /&gt;&lt;BR /&gt;Thanks for the reply.&lt;BR /&gt;&lt;BR /&gt;PFS is set to Group 2 as well as the DH group in Phase 1. I'll ask them to test without PFS set (removed from both Sides).&lt;BR /&gt;&lt;BR /&gt;Thanks again,&lt;BR /&gt;Ben&lt;BR /&gt;</description>
      <pubDate>Thu, 27 Feb 2020 11:25:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/VPN-Check-Point-and-Fortigate/m-p/76563#M15550</guid>
      <dc:creator>beneaton</dc:creator>
      <dc:date>2020-02-27T11:25:51Z</dc:date>
    </item>
    <item>
      <title>Re: VPN - Check Point and Fortigate</title>
      <link>https://community.checkpoint.com/t5/General-Topics/VPN-Check-Point-and-Fortigate/m-p/76570#M15554</link>
      <description>&lt;P&gt;I remember handling a similar case in which this error came up and it turned out that the somehow the database contained 2 objects with the same IP. (VPN peer IP)&lt;/P&gt;
&lt;P&gt;I know this is somewhat strange however worth checking..&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;HTH&lt;/P&gt;
&lt;P&gt;Uri&lt;/P&gt;</description>
      <pubDate>Thu, 27 Feb 2020 12:12:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/VPN-Check-Point-and-Fortigate/m-p/76570#M15554</guid>
      <dc:creator>Uri_Lewitus</dc:creator>
      <dc:date>2020-02-27T12:12:02Z</dc:date>
    </item>
    <item>
      <title>Re: VPN - Check Point and Fortigate</title>
      <link>https://community.checkpoint.com/t5/General-Topics/VPN-Check-Point-and-Fortigate/m-p/76574#M15557</link>
      <description>&lt;P&gt;The suggestion most related to the error they're getting is to create a No-NAT rule. However in the VPN community in R80 you can opt to tick the option "Disable NAT within the VPN community" - Wouldn't this perform the same action?&lt;BR /&gt;&lt;BR /&gt;Note: I've also suggested trying SHA256 instead of SHA1, and to not use PFS.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Thank you&lt;/P&gt;</description>
      <pubDate>Thu, 27 Feb 2020 12:21:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/VPN-Check-Point-and-Fortigate/m-p/76574#M15557</guid>
      <dc:creator>beneaton</dc:creator>
      <dc:date>2020-02-27T12:21:52Z</dc:date>
    </item>
    <item>
      <title>Re: VPN - Check Point and Fortigate</title>
      <link>https://community.checkpoint.com/t5/General-Topics/VPN-Check-Point-and-Fortigate/m-p/76576#M15558</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;CP receives that message from the FG?&lt;BR /&gt;Then you could do on the FG&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;PRE&gt;diagnose debug reset&lt;BR /&gt;diagnose vpn ike log filter dst-addr4 &amp;lt;ext. IP of CP gw&amp;gt;
diagnose debug app ike -1&lt;BR /&gt;diagnose debug console timestamp enable&lt;BR /&gt;diagnose debug enable&lt;/PRE&gt;&lt;P&gt;after testing, disable and reset debugs&lt;/P&gt;&lt;PRE&gt;diagnose debug reset
diagnose debug disable&lt;/PRE&gt;&lt;P&gt;Cheers&lt;BR /&gt;Vincent&lt;/P&gt;</description>
      <pubDate>Thu, 27 Feb 2020 12:33:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/VPN-Check-Point-and-Fortigate/m-p/76576#M15558</guid>
      <dc:creator>Vincent_Bacher</dc:creator>
      <dc:date>2020-02-27T12:33:11Z</dc:date>
    </item>
    <item>
      <title>Re: VPN - Check Point and Fortigate</title>
      <link>https://community.checkpoint.com/t5/General-Topics/VPN-Check-Point-and-Fortigate/m-p/76589#M15561</link>
      <description>&lt;P&gt;Assuming you've already verified the SA Lifetimes, ensure that the Fortigate is not using a data lifesize or tunnel idle timer.&amp;nbsp; It sounds like the Fortigate is expiring the tunnel early for some reason.&amp;nbsp; Also make sure DPD is disabled on the Fortigate unless you have explicitly enabled it on the Check Point side.&lt;/P&gt;
&lt;P&gt;Also be aware that during Quick Mode Phase 2 negotiations the Fortigate is just like Juniper in that it is very picky about subnets/Proxy-IDs it will accept.&amp;nbsp; The proposal must exactly match the subnets/Proxy-IDs configured on the Fortigate, unlike Cisco and Check Point it will refuse a proposal that is a subset of what is configured.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 27 Feb 2020 14:15:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/VPN-Check-Point-and-Fortigate/m-p/76589#M15561</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2020-02-27T14:15:27Z</dc:date>
    </item>
    <item>
      <title>Re: VPN - Check Point and Fortigate</title>
      <link>https://community.checkpoint.com/t5/General-Topics/VPN-Check-Point-and-Fortigate/m-p/131968#M23887</link>
      <description>&lt;P&gt;Hi Heiko&lt;/P&gt;&lt;P&gt;Do have some explaination for the reason to not check PFS ?&lt;/P&gt;&lt;P&gt;I have the same scenario, but in my case the vpn is established and when the user (behind the fortigate) try to access a server (behind the CP) the traffic is coming from the external interface and this traffic is dropped by antispoofing. I already configure a group to allow this network, but the traffic still coming from the external interface.&lt;/P&gt;</description>
      <pubDate>Mon, 18 Oct 2021 11:16:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/VPN-Check-Point-and-Fortigate/m-p/131968#M23887</guid>
      <dc:creator>j_silva</dc:creator>
      <dc:date>2021-10-18T11:16:48Z</dc:date>
    </item>
    <item>
      <title>Re: VPN - Check Point and Fortigate</title>
      <link>https://community.checkpoint.com/t5/General-Topics/VPN-Check-Point-and-Fortigate/m-p/132027#M23898</link>
      <description>&lt;P&gt;you probably have another internal interface with antispoofing configured with too big networks&lt;/P&gt;&lt;P&gt;for example CP is expecting traffic from 10.0.0.0/8 to be coming from eth5 (internal interface), and now all of a sudden 10.100.0.0/24 is coming in via a VPN on the external interface&lt;BR /&gt;either eth5 is configured to broad for antispoofing or you need to configure exclusions on eth5&lt;/P&gt;</description>
      <pubDate>Tue, 19 Oct 2021 06:20:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/VPN-Check-Point-and-Fortigate/m-p/132027#M23898</guid>
      <dc:creator>JanVC</dc:creator>
      <dc:date>2021-10-19T06:20:53Z</dc:date>
    </item>
    <item>
      <title>Re: VPN - Check Point and Fortigate</title>
      <link>https://community.checkpoint.com/t5/General-Topics/VPN-Check-Point-and-Fortigate/m-p/132430#M23939</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Thanks for your feedback.&lt;/P&gt;&lt;P&gt;The internal network was configured in "Specific Network" and due that the external interface was drop. I removed the network from the Specific Network and everything worked.&lt;/P&gt;</description>
      <pubDate>Fri, 22 Oct 2021 12:59:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/VPN-Check-Point-and-Fortigate/m-p/132430#M23939</guid>
      <dc:creator>j_silva</dc:creator>
      <dc:date>2021-10-22T12:59:26Z</dc:date>
    </item>
  </channel>
</rss>

