<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Site to Site VPN between Quantum Spark and 3rd party Juniper SRX in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/Site-to-Site-VPN-between-Quantum-Spark-and-3rd-party-Juniper-SRX/m-p/240982#M40208</link>
    <description>&lt;P&gt;We are doing a Site to Site VPN Route based Preshared key- between 3rd party firewall (Static IP) and&amp;nbsp; Quantum spark (Dynamic IP with SIM card)&lt;/P&gt;&lt;P&gt;Although Phase1 and Phase 2 is up, traffic is not passing through IPSec tunnel. We have configured everything Security Policies. and showing policy hit counts at 3rd party firewall site. But still no traffic passing. checking with TAC doesn't resolve the issue yet and they point ISP might have a problem.&lt;/P&gt;&lt;P&gt;Did anyone have experiences similar scenarios - Dynamic IP at Quantum spark side? If so, can you share working configuration ? Because I think there might be configuration issue or compatibility issue at QS side.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 12 Feb 2025 03:16:23 GMT</pubDate>
    <dc:creator>chanthar_tak</dc:creator>
    <dc:date>2025-02-12T03:16:23Z</dc:date>
    <item>
      <title>Site to Site VPN between Quantum Spark and 3rd party Juniper SRX</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Site-to-Site-VPN-between-Quantum-Spark-and-3rd-party-Juniper-SRX/m-p/240982#M40208</link>
      <description>&lt;P&gt;We are doing a Site to Site VPN Route based Preshared key- between 3rd party firewall (Static IP) and&amp;nbsp; Quantum spark (Dynamic IP with SIM card)&lt;/P&gt;&lt;P&gt;Although Phase1 and Phase 2 is up, traffic is not passing through IPSec tunnel. We have configured everything Security Policies. and showing policy hit counts at 3rd party firewall site. But still no traffic passing. checking with TAC doesn't resolve the issue yet and they point ISP might have a problem.&lt;/P&gt;&lt;P&gt;Did anyone have experiences similar scenarios - Dynamic IP at Quantum spark side? If so, can you share working configuration ? Because I think there might be configuration issue or compatibility issue at QS side.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 12 Feb 2025 03:16:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Site-to-Site-VPN-between-Quantum-Spark-and-3rd-party-Juniper-SRX/m-p/240982#M40208</guid>
      <dc:creator>chanthar_tak</dc:creator>
      <dc:date>2025-02-12T03:16:23Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site VPN between Quantum Spark and 3rd party Juniper SRX</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Site-to-Site-VPN-between-Quantum-Spark-and-3rd-party-Juniper-SRX/m-p/241062#M40221</link>
      <description>&lt;P&gt;How would the remote party 'know' if the dynamic IP on your side changes? Does the ISP allow ESP (50) , 4500 and UDP500? I would assume so, because p1 and p2 is up. Check this with tcpdump -&amp;gt; tcpdump -nni any host X.X.X.X&amp;nbsp;&lt;/P&gt;
&lt;P&gt;x.x.x.x is remote peer IP. Ask them to send traffic or you send traffic. You need to see encrypted ESP traffic and IKE500. If you see traffic incomming from remote peer you know ISP allows traffic.&lt;/P&gt;
&lt;P&gt;Would recommend static IP.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 12 Feb 2025 20:41:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Site-to-Site-VPN-between-Quantum-Spark-and-3rd-party-Juniper-SRX/m-p/241062#M40221</guid>
      <dc:creator>Lesley</dc:creator>
      <dc:date>2025-02-12T20:41:55Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site VPN between Quantum Spark and 3rd party Juniper SRX</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Site-to-Site-VPN-between-Quantum-Spark-and-3rd-party-Juniper-SRX/m-p/241065#M40223</link>
      <description>&lt;P&gt;We configured hostname on QS so SRX can identify IKE aggressive peer ID. SRX has existing dynamic IPsec tunnels so we can assume ISP allow IKE traffic.&lt;/P&gt;&lt;P&gt;At QS side, we need to use dynamic IP because will use SIM card.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is it possible QS has compatibility issue with dynamic IPsec?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 13 Feb 2025 00:11:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Site-to-Site-VPN-between-Quantum-Spark-and-3rd-party-Juniper-SRX/m-p/241065#M40223</guid>
      <dc:creator>chanthar_tak</dc:creator>
      <dc:date>2025-02-13T00:11:09Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site VPN between Quantum Spark and 3rd party Juniper SRX</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Site-to-Site-VPN-between-Quantum-Spark-and-3rd-party-Juniper-SRX/m-p/241066#M40224</link>
      <description>&lt;P&gt;I forgot to mention when we check TCP dump we don't see reply packets at QS. At SRX side, we verified it has replied decrypted packets. Also, we are seeing Phase1 is established on SRX with random port from checkpoint.&lt;/P&gt;</description>
      <pubDate>Thu, 13 Feb 2025 00:15:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Site-to-Site-VPN-between-Quantum-Spark-and-3rd-party-Juniper-SRX/m-p/241066#M40224</guid>
      <dc:creator>chanthar_tak</dc:creator>
      <dc:date>2025-02-13T00:15:31Z</dc:date>
    </item>
  </channel>
</rss>

