<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: New VPN daemons in R81.20 in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/New-VPN-daemons-in-R81-10-R81-20/m-p/168860#M28096</link>
    <description>&lt;P&gt;Also, both daemons are mentioned in the R81.10/20 VPN admin guides, for example:&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;The CCC daemon&amp;nbsp;&lt;CODE&gt;&lt;SPAN class="SearchHighlight SearchHighlight1"&gt;cccd&lt;/SPAN&gt;&lt;/CODE&gt;&amp;nbsp;(introduced in&amp;nbsp;&lt;SPAN class="mc-variable Vars_Versions.r_ignis variable"&gt;R81.10&lt;/SPAN&gt;).&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;Responsible for the Circuit Cross-Connect (CCC) protocol, while:&lt;/EM&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;&lt;EM&gt;IKE for the same clients runs in the IKE daemon&amp;nbsp;&lt;CODE&gt;iked&lt;/CODE&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;EM&gt;CCC TLS for the same clients runs in the VPN daemon&amp;nbsp;&lt;CODE&gt;vpnd&lt;/CODE&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;EM&gt;Listens on these ports on a&amp;nbsp;&lt;SPAN class="mc-variable Vars_Other.tp_sgate variable"&gt;Security Gateway&lt;/SPAN&gt;:&lt;/EM&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;&lt;EM&gt;TCPT: 444 (TCP)&lt;/EM&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;EM&gt;Session infrastructure manager: 9993 (TCP)&lt;/EM&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;EM&gt;The IKE daemon&amp;nbsp;&lt;CODE&gt;&lt;SPAN class="SearchHighlight SearchHighlight1"&gt;iked&lt;/SPAN&gt;&lt;/CODE&gt;&amp;nbsp;(introduced in&amp;nbsp;&lt;SPAN class="mc-variable Vars_Versions.r_ignis variable"&gt;R81.10&lt;/SPAN&gt;).&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;Handles these VPN connections:&lt;/EM&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;&lt;EM&gt;All connections from IKE&amp;nbsp;&lt;SPAN class="mc-variable Vars_Other.tp_RACs variable"&gt;Remote Access clients&lt;/SPAN&gt;&amp;nbsp;clients (for example,&amp;nbsp;&lt;SPAN class="mc-variable Vars_Endpoint_SandBlast.tp_endcap variable"&gt;Endpoint&lt;/SPAN&gt;&amp;nbsp;clients)&lt;/EM&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;EM&gt;Site-to-Site connections from peer&amp;nbsp;&lt;SPAN class="mc-variable Vars_Other.tp_sgates variable"&gt;Security Gateways&lt;/SPAN&gt;&amp;nbsp;with a Dynamically Assigned IP address (DAIP)&lt;/EM&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;EM&gt;Large Scale VPN (LSV) connections&lt;/EM&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;EM&gt;Connections from&amp;nbsp;&lt;SPAN class="mc-variable Vars_BladesFeatures.tp_slsm variable"&gt;SmartLSM&lt;/SPAN&gt;&amp;nbsp;ROBO gateways&lt;/EM&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;EM&gt;Listens on these ports on a&amp;nbsp;&lt;SPAN class="mc-variable Vars_Other.tp_sgate variable"&gt;Security Gateway&lt;/SPAN&gt;:&lt;/EM&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;&lt;EM&gt;IKE: 30500 (UDP)&lt;/EM&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;EM&gt;IKE NAT-T: 34500 (UDP)&lt;/EM&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;EM&gt;Session infrastructure manager: 9994 (TCP)&lt;/EM&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;EM&gt;L2TP: 1701 (UDP)&lt;/EM&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;</description>
    <pubDate>Tue, 24 Jan 2023 08:17:34 GMT</pubDate>
    <dc:creator>_Val_</dc:creator>
    <dc:date>2023-01-24T08:17:34Z</dc:date>
    <item>
      <title>New VPN daemons in R81.10 / R81.20</title>
      <link>https://community.checkpoint.com/t5/General-Topics/New-VPN-daemons-in-R81-10-R81-20/m-p/168785#M28073</link>
      <description>&lt;P&gt;New VPN daemons were launched with R81.10. In the new version R81.20 you can see that these daemeons have been further revised.&lt;/P&gt;
&lt;P&gt;Now iked runs as a multi-process and controls all IPsec VPN tunnels.&lt;BR /&gt;The other two processes, vpnd and cccd, each run only once on the gateway.&lt;/P&gt;
&lt;P&gt;As far as I have understood correctly, the processes from R81.20 onwards are responsible for the following:&lt;/P&gt;
&lt;TABLE border="1" width="100%"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD width="33.333333333333336%" height="24px"&gt;&lt;STRONG&gt;VPN Type&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD width="33.333333333333336%" height="24px"&gt;&lt;STRONG&gt;vpnd&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD width="33.333333333333336%" height="24px"&gt;&lt;STRONG&gt;iked&lt;/STRONG&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="33.333333333333336%" height="24px"&gt;Site-to-Site VPN&lt;/TD&gt;
&lt;TD width="33.333333333333336%" height="24px"&gt;-&lt;/TD&gt;
&lt;TD width="33.333333333333336%" height="24px"&gt;IPSec ESP&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="33.333333333333336%" height="24px"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD width="33.333333333333336%" height="24px"&gt;-&lt;/TD&gt;
&lt;TD width="33.333333333333336%" height="24px"&gt;IPSec NAT-T&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="33.333333333333336%" height="24px"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD width="33.333333333333336%" height="24px"&gt;-&lt;/TD&gt;
&lt;TD width="33.333333333333336%" height="24px"&gt;Permanent tunnel&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="33.333333333333336%" height="24px"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD width="33.333333333333336%" height="24px"&gt;-&lt;/TD&gt;
&lt;TD width="33.333333333333336%" height="24px"&gt;MEP&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="33.333333333333336%" height="24px"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD width="33.333333333333336%" height="24px"&gt;-&lt;/TD&gt;
&lt;TD width="33.333333333333336%" height="24px"&gt;Link selection&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="33.333333333333336%" height="24px"&gt;Remote Access VPN&lt;/TD&gt;
&lt;TD width="33.333333333333336%" height="24px"&gt;-&lt;/TD&gt;
&lt;TD width="33.333333333333336%" height="24px"&gt;Endpoint - IPSec RA Client&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="33.333333333333336%" height="24px"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD width="33.333333333333336%" height="24px"&gt;-&lt;/TD&gt;
&lt;TD width="33.333333333333336%" height="24px"&gt;L2TP&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="33.333333333333336%" height="24px"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD width="33.333333333333336%" height="24px"&gt;CCC protocol&lt;/TD&gt;
&lt;TD width="33.333333333333336%" height="24px"&gt;-&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="33.333333333333336%" height="24px"&gt;&amp;nbsp;&lt;/TD&gt;
&lt;TD width="33.333333333333336%" height="24px"&gt;Visitor Mode&lt;/TD&gt;
&lt;TD width="33.333333333333336%" height="24px"&gt;-&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For debugging, I noticed that the IKED daemon must now be debugged accordingly for example for iked0, iked1,...&lt;BR /&gt;Depending on the corresponding daemon (now shown in R81.20 with "&lt;STRONG&gt;vpn tu tlist -z&lt;/STRONG&gt;")&amp;nbsp; the debug must be set specifically for it.&lt;BR /&gt;&lt;BR /&gt;If the daemon is now known, a special debug for this iked index id can be enabled:&lt;BR /&gt;&lt;STRONG&gt;# ike debug -i &amp;lt;iked index id&amp;gt; trunc ALL=5&lt;/STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;This creates the corresponding debug files with the corresponding iked index id:&lt;BR /&gt;vpnd-ikev&lt;STRONG&gt;&amp;lt;iked index id&amp;gt;&lt;/STRONG&gt;trace&lt;STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;So far I have understood everything.&lt;STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;Now my questions:&lt;/STRONG&gt;&lt;BR /&gt;1) Where can I find Check Point documentation describing the new R81.20 VPN architecture?&lt;BR /&gt;2) How can I enable a VPN debug and how can I evaluate the multi R81.20 iked daemons? Are there any sk's or a documentation here.&lt;BR /&gt;3) Is there a design overview of how vpnd, iked and cccd work together?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 24 Jan 2023 07:43:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/New-VPN-daemons-in-R81-10-R81-20/m-p/168785#M28073</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2023-01-24T07:43:18Z</dc:date>
    </item>
    <item>
      <title>Re: New VPN daemons in R81.20</title>
      <link>https://community.checkpoint.com/t5/General-Topics/New-VPN-daemons-in-R81-10-R81-20/m-p/168832#M28087</link>
      <description>&lt;P&gt;I've seen some internal documentation on the new architecture, but don't think it's public yet.&lt;BR /&gt;I assume you can enable debug on multiple iked at the same time using the process you mentioned.&lt;BR /&gt;&lt;BR /&gt;If I understand correctly:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;vpnd handles most VPN functions&lt;/LI&gt;
&lt;LI&gt;iked handles IKE Negotiations&lt;/LI&gt;
&lt;LI&gt;cccd handles Endpoint Compliance functions&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;iked and cccd were added in R81.10&lt;BR /&gt;iked became multi-threaded in R81.20.&lt;BR /&gt;Prior to R81.10, all three functions were included in vpnd.&lt;/P&gt;</description>
      <pubDate>Tue, 24 Jan 2023 03:16:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/New-VPN-daemons-in-R81-10-R81-20/m-p/168832#M28087</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2023-01-24T03:16:01Z</dc:date>
    </item>
    <item>
      <title>Re: New VPN daemons in R81.20</title>
      <link>https://community.checkpoint.com/t5/General-Topics/New-VPN-daemons-in-R81-10-R81-20/m-p/168848#M28093</link>
      <description>&lt;P&gt;Since R81.10, the new VPN is voodoo magic for me.&lt;BR /&gt;&lt;BR /&gt;I'm looking for documentation (SK's, what's new infos, debug infos,...) on how to debug this and how the new daemons work on R81.10 / R81.20. &lt;BR /&gt;&lt;BR /&gt;On a 4 core LAB system with 3 CoreXL instances I see that only &lt;STRONG&gt;two iked&lt;/STRONG&gt; daemons are started but&amp;nbsp;&lt;STRONG&gt;three vpnd&lt;/STRONG&gt; Dameon are started&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-left" image-alt="picture1_vpn_fdtewrrfew.jpg" style="width: 285px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/19257iD008DA88FE488C21/image-dimensions/285x200?v=v2" width="285" height="200" role="button" title="picture1_vpn_fdtewrrfew.jpg" alt="picture1_vpn_fdtewrrfew.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-left" image-alt="picture2_vpn.jpg" style="width: 587px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/19256iBE17E09BA34D95B9/image-dimensions/587x57?v=v2" width="587" height="57" role="button" title="picture2_vpn.jpg" alt="picture2_vpn.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I would also have expected three iked daemons here.&lt;/P&gt;
&lt;P&gt;Do you have any technical documentation on how the new VPN design works?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 24 Jan 2023 07:32:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/New-VPN-daemons-in-R81-10-R81-20/m-p/168848#M28093</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2023-01-24T07:32:44Z</dc:date>
    </item>
    <item>
      <title>Re: New VPN daemons in R81.20</title>
      <link>https://community.checkpoint.com/t5/General-Topics/New-VPN-daemons-in-R81-10-R81-20/m-p/168859#M28095</link>
      <description>&lt;P&gt;From what I see, iked is for IKE negotiations related to IPsec RAS VPN, IKE with DIAP and Large Scale VPN. The regular S2S are handled by vpnd, still.&lt;/P&gt;
&lt;P&gt;See&amp;nbsp;&lt;SPAN&gt;skI4326 and VPN admin guides for more details.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 24 Jan 2023 08:18:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/New-VPN-daemons-in-R81-10-R81-20/m-p/168859#M28095</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2023-01-24T08:18:39Z</dc:date>
    </item>
    <item>
      <title>Re: New VPN daemons in R81.20</title>
      <link>https://community.checkpoint.com/t5/General-Topics/New-VPN-daemons-in-R81-10-R81-20/m-p/168860#M28096</link>
      <description>&lt;P&gt;Also, both daemons are mentioned in the R81.10/20 VPN admin guides, for example:&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;The CCC daemon&amp;nbsp;&lt;CODE&gt;&lt;SPAN class="SearchHighlight SearchHighlight1"&gt;cccd&lt;/SPAN&gt;&lt;/CODE&gt;&amp;nbsp;(introduced in&amp;nbsp;&lt;SPAN class="mc-variable Vars_Versions.r_ignis variable"&gt;R81.10&lt;/SPAN&gt;).&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;Responsible for the Circuit Cross-Connect (CCC) protocol, while:&lt;/EM&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;&lt;EM&gt;IKE for the same clients runs in the IKE daemon&amp;nbsp;&lt;CODE&gt;iked&lt;/CODE&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;EM&gt;CCC TLS for the same clients runs in the VPN daemon&amp;nbsp;&lt;CODE&gt;vpnd&lt;/CODE&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;EM&gt;Listens on these ports on a&amp;nbsp;&lt;SPAN class="mc-variable Vars_Other.tp_sgate variable"&gt;Security Gateway&lt;/SPAN&gt;:&lt;/EM&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;&lt;EM&gt;TCPT: 444 (TCP)&lt;/EM&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;EM&gt;Session infrastructure manager: 9993 (TCP)&lt;/EM&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;EM&gt;The IKE daemon&amp;nbsp;&lt;CODE&gt;&lt;SPAN class="SearchHighlight SearchHighlight1"&gt;iked&lt;/SPAN&gt;&lt;/CODE&gt;&amp;nbsp;(introduced in&amp;nbsp;&lt;SPAN class="mc-variable Vars_Versions.r_ignis variable"&gt;R81.10&lt;/SPAN&gt;).&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;Handles these VPN connections:&lt;/EM&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;&lt;EM&gt;All connections from IKE&amp;nbsp;&lt;SPAN class="mc-variable Vars_Other.tp_RACs variable"&gt;Remote Access clients&lt;/SPAN&gt;&amp;nbsp;clients (for example,&amp;nbsp;&lt;SPAN class="mc-variable Vars_Endpoint_SandBlast.tp_endcap variable"&gt;Endpoint&lt;/SPAN&gt;&amp;nbsp;clients)&lt;/EM&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;EM&gt;Site-to-Site connections from peer&amp;nbsp;&lt;SPAN class="mc-variable Vars_Other.tp_sgates variable"&gt;Security Gateways&lt;/SPAN&gt;&amp;nbsp;with a Dynamically Assigned IP address (DAIP)&lt;/EM&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;EM&gt;Large Scale VPN (LSV) connections&lt;/EM&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;EM&gt;Connections from&amp;nbsp;&lt;SPAN class="mc-variable Vars_BladesFeatures.tp_slsm variable"&gt;SmartLSM&lt;/SPAN&gt;&amp;nbsp;ROBO gateways&lt;/EM&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;EM&gt;Listens on these ports on a&amp;nbsp;&lt;SPAN class="mc-variable Vars_Other.tp_sgate variable"&gt;Security Gateway&lt;/SPAN&gt;:&lt;/EM&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;&lt;EM&gt;IKE: 30500 (UDP)&lt;/EM&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;EM&gt;IKE NAT-T: 34500 (UDP)&lt;/EM&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;EM&gt;Session infrastructure manager: 9994 (TCP)&lt;/EM&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;EM&gt;L2TP: 1701 (UDP)&lt;/EM&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Tue, 24 Jan 2023 08:17:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/New-VPN-daemons-in-R81-10-R81-20/m-p/168860#M28096</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2023-01-24T08:17:34Z</dc:date>
    </item>
    <item>
      <title>Re: New VPN daemons in R81.20</title>
      <link>https://community.checkpoint.com/t5/General-Topics/New-VPN-daemons-in-R81-10-R81-20/m-p/168899#M28104</link>
      <description>&lt;P&gt;THX for this info.&lt;/P&gt;</description>
      <pubDate>Tue, 24 Jan 2023 11:28:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/New-VPN-daemons-in-R81-10-R81-20/m-p/168899#M28104</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2023-01-24T11:28:35Z</dc:date>
    </item>
    <item>
      <title>Re: New VPN daemons in R81.20</title>
      <link>https://community.checkpoint.com/t5/General-Topics/New-VPN-daemons-in-R81-10-R81-20/m-p/168902#M28105</link>
      <description>&lt;P&gt;"iked" magic goes on for me, though. &lt;BR /&gt;When I look at the system with htop, 6 iked processes are started on a 3 CoreXL system.&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="picture4_vpn_woodoo_543534.jpg" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/19268i4A4635516FEF7E6D/image-size/medium?v=v2&amp;amp;px=400" role="button" title="picture4_vpn_woodoo_543534.jpg" alt="picture4_vpn_woodoo_543534.jpg" /&gt;&lt;/span&gt;&lt;BR /&gt;&lt;BR /&gt;I would like to understand the new vpn technology in depth so that we can better help our customers in case of issue. &lt;BR /&gt;Is it planned that there will be more information here in the future. &lt;BR /&gt;If this information exists, where can I find it (SK's, ....)?&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 24 Jan 2023 11:45:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/New-VPN-daemons-in-R81-10-R81-20/m-p/168902#M28105</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2023-01-24T11:45:04Z</dc:date>
    </item>
    <item>
      <title>Re: New VPN daemons in R81.20</title>
      <link>https://community.checkpoint.com/t5/General-Topics/New-VPN-daemons-in-R81-10-R81-20/m-p/168906#M28106</link>
      <description>&lt;P&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk173903" target="_self"&gt;sk173903&lt;/A&gt; - "&lt;SPAN&gt;&lt;EM&gt;Resilient VPN architecture - multi-process architecture to handle IKE negotiations in dedicated scalable daemons, providing unprecedented resiliency&lt;/EM&gt;"&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://sc1.checkpoint.com/documents/R81.20/WebAdminGuides/EN/CP_R81.20_SitetoSiteVPN_AdminGuide/Content/Topics-VPNSG/CLI/ike-debug.htm?Highlight=iked" target="_self"&gt;R81.20 VPN Admin Guide&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/19269iB1E5740DB81C5CF6/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 24 Jan 2023 12:03:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/New-VPN-daemons-in-R81-10-R81-20/m-p/168906#M28106</guid>
      <dc:creator>Danny</dc:creator>
      <dc:date>2023-01-24T12:03:43Z</dc:date>
    </item>
    <item>
      <title>Re: New VPN daemons in R81.20</title>
      <link>https://community.checkpoint.com/t5/General-Topics/New-VPN-daemons-in-R81-10-R81-20/m-p/168915#M28107</link>
      <description>&lt;P&gt;&lt;A href="https://sc1.checkpoint.com/documents/R81.20/WebAdminGuides/EN/CP_R81.20_SitetoSiteVPN_AdminGuide/Content/Topics-VPNSG/CLI/ike-debug.htm?Highlight=iked" target="_self"&gt;Site to Site VPN R81.20 Administration Guide&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="picture9_53hgfdh90654.jpg" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/19279i44C6B77BB5D5FFC0/image-size/large?v=v2&amp;amp;px=999" role="button" title="picture9_53hgfdh90654.jpg" alt="picture9_53hgfdh90654.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;------------------------------------------------------------------------------------------&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="picture4_5434543.jpg" style="width: 438px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/19273i3A7377BC140584A0/image-dimensions/438x32?v=v2" width="438" height="32" role="button" title="picture4_5434543.jpg" alt="picture4_5434543.jpg" /&gt;&lt;/span&gt; &lt;span class="lia-inline-image-display-wrapper lia-image-align-left" image-alt="picture5_55345765.jpg" style="width: 262px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/19275i0916F5B9266205F7/image-dimensions/262x113?v=v2" width="262" height="113" role="button" title="picture5_55345765.jpg" alt="picture5_55345765.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Number of IKED instances = 3 CoreXL / 2 instances per daemon = &lt;STRONG&gt;&lt;FONT color="#FF99CC"&gt;1.5&amp;nbsp;&lt;/FONT&gt;&lt;/STRONG&gt; &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ===&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="picture7_535790654.jpg" style="width: 720px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/19277i93E3586E8151C58C/image-size/large?v=v2&amp;amp;px=999" role="button" title="picture7_535790654.jpg" alt="picture7_535790654.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;-------------------------------------------------------------------------------------------&lt;/P&gt;
&lt;P&gt;When I do the math, the formula for me looks like this:&lt;/P&gt;
&lt;P&gt;Number of IKED instances = (Number of CoreXL Firewall Instances)&amp;nbsp; &lt;FONT color="#FF0000"&gt;*&lt;/FONT&gt; (Value of Kernel Parameter 'ike_num_instances_per_daemon')&lt;/P&gt;
&lt;P&gt;There should be a "*" sign and not a "/" sign.&lt;BR /&gt;&lt;BR /&gt;Number of IKED instances = 3 CoreXL * 2 instances per daemon = &lt;STRONG&gt;&lt;FONT color="#FF99CC"&gt;6&amp;nbsp;&lt;/FONT&gt;&lt;/STRONG&gt; &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ===&lt;BR /&gt;-------------------------------------------------------------------------------------------&lt;/P&gt;
&lt;P&gt;That's my problem. I don't understand the technology behind it. &lt;BR /&gt;Why two instances per daemon? This is not described in the Admin Guide.&lt;BR /&gt;&lt;BR /&gt;I would like more information from Check Point here.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 24 Jan 2023 12:54:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/New-VPN-daemons-in-R81-10-R81-20/m-p/168915#M28107</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2023-01-24T12:54:15Z</dc:date>
    </item>
    <item>
      <title>Re: New VPN daemons in R81.20</title>
      <link>https://community.checkpoint.com/t5/General-Topics/New-VPN-daemons-in-R81-10-R81-20/m-p/168992#M28113</link>
      <description>&lt;P&gt;With R81.10 and R81.20, you can see that a new development has taken place here. We had some VPN problems with the new release in the last months. We had open many VPN tickets at the support. But with newer R81.10 Jumbo HF versions it has gotten better.&lt;/P&gt;</description>
      <pubDate>Tue, 24 Jan 2023 20:42:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/New-VPN-daemons-in-R81-10-R81-20/m-p/168992#M28113</guid>
      <dc:creator>WScheider</dc:creator>
      <dc:date>2023-01-24T20:42:17Z</dc:date>
    </item>
    <item>
      <title>Re: New VPN daemons in R81.20</title>
      <link>https://community.checkpoint.com/t5/General-Topics/New-VPN-daemons-in-R81-10-R81-20/m-p/169240#M28138</link>
      <description>&lt;P&gt;Is there any news on my question from Check Point. &lt;BR /&gt;Do you have deep dive information on the VPN daemons and VPN debug.&lt;/P&gt;</description>
      <pubDate>Thu, 26 Jan 2023 07:58:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/New-VPN-daemons-in-R81-10-R81-20/m-p/169240#M28138</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2023-01-26T07:58:09Z</dc:date>
    </item>
    <item>
      <title>Re: New VPN daemons in R81.20</title>
      <link>https://community.checkpoint.com/t5/General-Topics/New-VPN-daemons-in-R81-10-R81-20/m-p/169295#M28150</link>
      <description>&lt;P&gt;You've pretty much uncovered most of what has been communicated to TAC about how to debug the new vpnd/iked.&lt;BR /&gt;The traditional debug command of&amp;nbsp;&lt;STRONG&gt;&lt;FONT face="courier new,courier"&gt;vpn debug trunc ALL=5&lt;/FONT&gt;&lt;/STRONG&gt; should debug all the iked processes at once, it will just generate more files &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;BR /&gt;Having said that, on a busy gateway, you might want to debug a specific instance of it, particularly if the issue is with a specific peer (since a given instance of iked is used for a specific VPN peer).&lt;/P&gt;</description>
      <pubDate>Thu, 26 Jan 2023 14:58:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/New-VPN-daemons-in-R81-10-R81-20/m-p/169295#M28150</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2023-01-26T14:58:26Z</dc:date>
    </item>
    <item>
      <title>Re: New VPN daemons in R81.20</title>
      <link>https://community.checkpoint.com/t5/General-Topics/New-VPN-daemons-in-R81-10-R81-20/m-p/170495#M28378</link>
      <description>&lt;P&gt;FYI, we've released a new SK on this topic:&amp;nbsp;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk180488" target="_blank"&gt;https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk180488&lt;/A&gt;&amp;nbsp;&lt;BR /&gt;This is meant to replace several SKs on debugging VPN and includes information necessary for debugging VPNs in R81.20.&lt;/P&gt;</description>
      <pubDate>Mon, 06 Feb 2023 18:34:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/New-VPN-daemons-in-R81-10-R81-20/m-p/170495#M28378</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2023-02-06T18:34:21Z</dc:date>
    </item>
    <item>
      <title>Re: New VPN daemons in R81.20</title>
      <link>https://community.checkpoint.com/t5/General-Topics/New-VPN-daemons-in-R81-10-R81-20/m-p/170500#M28381</link>
      <description>&lt;P&gt;Excellent sk, thanks for sharing!&lt;/P&gt;</description>
      <pubDate>Mon, 06 Feb 2023 19:10:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/New-VPN-daemons-in-R81-10-R81-20/m-p/170500#M28381</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-02-06T19:10:54Z</dc:date>
    </item>
    <item>
      <title>Re: New VPN daemons in R81.20</title>
      <link>https://community.checkpoint.com/t5/General-Topics/New-VPN-daemons-in-R81-10-R81-20/m-p/170507#M28382</link>
      <description>&lt;P&gt;Very nice! THX&lt;/P&gt;</description>
      <pubDate>Mon, 06 Feb 2023 19:44:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/New-VPN-daemons-in-R81-10-R81-20/m-p/170507#M28382</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2023-02-06T19:44:05Z</dc:date>
    </item>
    <item>
      <title>Re: New VPN daemons in R81.10 / R81.20</title>
      <link>https://community.checkpoint.com/t5/General-Topics/New-VPN-daemons-in-R81-10-R81-20/m-p/216051#M35850</link>
      <description>&lt;P&gt;Attention, quoting from&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/General-Topics/Important-security-update-stay-protected-against-VPN-Information/m-p/215965#M35811" target="_self"&gt;&lt;SPAN&gt;Important security update - stay protected against VPN Information Disclosure (CVE-2024-24919)&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In R81.10 we added a feature to improve VPN performance - named CCCD&lt;/P&gt;
&lt;P&gt;This feature is&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;disabled by default&lt;/STRONG&gt;, and we know about few advanced customers who are using it.&lt;/P&gt;
&lt;P&gt;Customers who enable CCCD&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;STRONG&gt;are still vulnerable to CVE-2024-24919 even after installing the Hotfix!&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;U&gt;&lt;STRONG&gt;YOU MUST DISABLE CCCD TO BECOME PROTECTED!&lt;/STRONG&gt;&lt;/U&gt;&lt;/P&gt;
&lt;P&gt;Instructions below and also on&amp;nbsp;&lt;A class="fui-Link ___1rxvrpe f2hkw1w f3rmtva f1ewtqcl fyind8e f1k6fduh f1w7gpdv fk6fouc fjoy568 figsok6 f1hu3pq6 f11qmguv f19f4twv f1tyq0we f1g0x7ka fhxju0i f1qch9an f1cnd47f fqv5qza f1vmzxwi f1o700av f13mvf36 f1cmlufx f9n3di6 f1ids18y f1tx3yz7 f1deo86v f1eh06m1 f1iescvh fhgqx19 f1olyrje f1p93eir f1nev41a f1h8hb77 f1lqvz6u f10aw75t fsle3fq f17ae5zn" title="https://support.checkpoint.com/results/sk/sk182336" href="https://support.checkpoint.com/results/sk/sk182336" target="_blank" rel="noreferrer noopener" aria-label="Link SK182336"&gt;SK182336&lt;/A&gt;:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Run the command:&amp;nbsp;&lt;CODE&gt;&lt;STRONG&gt;vpn cccd status&lt;/STRONG&gt;&lt;/CODE&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;The expected output is:&amp;nbsp;&lt;CODE&gt;&lt;STRONG&gt;vpn: 'cccd' is disabled&lt;/STRONG&gt;&lt;/CODE&gt;.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;If the output differs, stop the&amp;nbsp;&lt;CODE&gt;&lt;STRONG&gt;CCCD&lt;/STRONG&gt;&lt;/CODE&gt;&amp;nbsp;process by running the&amp;nbsp;&lt;CODE&gt;&lt;STRONG&gt;vpn cccd disable&lt;/STRONG&gt;&lt;/CODE&gt;&amp;nbsp;command.&lt;BR /&gt;&lt;BR /&gt;More info by the link above.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 01 Jun 2024 13:31:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/New-VPN-daemons-in-R81-10-R81-20/m-p/216051#M35850</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2024-06-01T13:31:14Z</dc:date>
    </item>
  </channel>
</rss>

