<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Site to Site VPN issue (Checkpoint To ASA) in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/Site-to-Site-VPN-issue-Checkpoint-To-ASA/m-p/262192#M44332</link>
    <description>&lt;P&gt;I would say these days MOST people would use route based VPN tunnels, that appears to be the norm anyway.&lt;/P&gt;</description>
    <pubDate>Fri, 07 Nov 2025 17:20:07 GMT</pubDate>
    <dc:creator>the_rock</dc:creator>
    <dc:date>2025-11-07T17:20:07Z</dc:date>
    <item>
      <title>Site to Site VPN issue (Checkpoint To ASA)</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Site-to-Site-VPN-issue-Checkpoint-To-ASA/m-p/261966#M44303</link>
      <description>&lt;P class=""&gt;&lt;SPAN class=""&gt;Dear team,&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Hope you are all doing great.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;I am experiencing an issue with a previously working VPN tunnel connected to a server behind an ASA firewall. My side is running Checkpoint R81.2. The problem began yesterday, when l was configuring a route based VPN which l later deleted after it failed.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;When I run a&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class=""&gt;tracert&lt;/SPAN&gt;&lt;SPAN class=""&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;to the VPN IP from inside my network, the traffic fails at my firewall with an "Insufficient message passed" error. I can send traffic to the other site, but l am not receiving any return traffic. The engineers on the server side are observing the same behavior – they can send traffic to me but cannot receive anything from my end.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;The VPN logs on our Checkpoint firewall show the following error:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN&gt;Connection terminated before the Security Gateway was able &lt;SPAN class=""&gt;to&lt;/SPAN&gt; make &lt;SPAN class=""&gt;a&lt;/SPAN&gt; decision: Insufficient data passed. To learn more see sk113479. First possible rule: Layer: Application &amp;amp; URL Filtering, Rule: &lt;SPAN class=""&gt;5&lt;/SPAN&gt;. Missing classifier objects: &lt;SPAN class=""&gt;1&lt;/SPAN&gt;: APPLICATION&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;I have confirmed that the VPN tunnel (Phase 1 and Phase 2) is establishing successfully, and basic routing appears to be correct. The issue seems to reside in the application filtering or inspection layer. I also checked the encryption settings for my VPN communities and those on the server — they match. There is currently no proxy between my side and the remote end.&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Your contributions and insights into resolving this would be highly appreciated.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;BR /&gt;Thank you&lt;/P&gt;</description>
      <pubDate>Thu, 06 Nov 2025 09:53:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Site-to-Site-VPN-issue-Checkpoint-To-ASA/m-p/261966#M44303</guid>
      <dc:creator>Louis136208</dc:creator>
      <dc:date>2025-11-06T09:53:24Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site VPN issue (Checkpoint To ASA)</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Site-to-Site-VPN-issue-Checkpoint-To-ASA/m-p/262019#M44306</link>
      <description>&lt;P&gt;The error message has nothing to do with your VPN issue but a function of your policy configuration.&lt;BR /&gt;This is described in the SK mentioned in the error message:&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/sk/sk113479" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk113479&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;What messages/errors are seen on the ASA side?&lt;/P&gt;</description>
      <pubDate>Thu, 06 Nov 2025 15:52:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Site-to-Site-VPN-issue-Checkpoint-To-ASA/m-p/262019#M44306</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2025-11-06T15:52:22Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site VPN issue (Checkpoint To ASA)</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Site-to-Site-VPN-issue-Checkpoint-To-ASA/m-p/262051#M44314</link>
      <description>&lt;P&gt;What phoneboy said, error is not related to the vpn. This simply means that there is no data in the connection. So there is SYN -&amp;gt; but no packets back, or any data to work with.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We need some errors to work with. Try to search logs for remote peer IP , as dst or as src. Do the same for remote network range.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 06 Nov 2025 19:56:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Site-to-Site-VPN-issue-Checkpoint-To-ASA/m-p/262051#M44314</guid>
      <dc:creator>Lesley</dc:creator>
      <dc:date>2025-11-06T19:56:22Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site VPN issue (Checkpoint To ASA)</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Site-to-Site-VPN-issue-Checkpoint-To-ASA/m-p/262052#M44315</link>
      <description>&lt;P&gt;I agree with the guys. Just to be thorough with this, I would do basic debug on both sides, it may give more info.&lt;/P&gt;
&lt;P&gt;CP:&lt;/P&gt;
&lt;P&gt;vpn debug trunc&lt;/P&gt;
&lt;P&gt;vpn debug ikeon&lt;/P&gt;
&lt;P&gt;-generate traffic&lt;/P&gt;
&lt;P&gt;vpn debug ikeoff&lt;/P&gt;
&lt;P&gt;Check ike* and vpnd* files in $FWDIR/log dir&lt;/P&gt;
&lt;P&gt;Cisco:&lt;/P&gt;
&lt;P&gt;debug crypto condition peer x.x.x.x&lt;/P&gt;
&lt;P&gt;debug crypto ikev1 200&lt;/P&gt;
&lt;P&gt;debug crypto ipsec 200&lt;/P&gt;
&lt;P&gt;to cancel all debugs-&amp;gt; undebug all&lt;/P&gt;</description>
      <pubDate>Thu, 06 Nov 2025 20:02:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Site-to-Site-VPN-issue-Checkpoint-To-ASA/m-p/262052#M44315</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-11-06T20:02:57Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site VPN issue (Checkpoint To ASA)</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Site-to-Site-VPN-issue-Checkpoint-To-ASA/m-p/262191#M44331</link>
      <description>&lt;P data-start="0" data-end="119"&gt;If Phase 1 and Phase 2 are established for incoming and outgoing, the issue may also be caused by a few other problems:&lt;/P&gt;
&lt;OL data-start="121" data-end="181" data-is-last-node="" data-is-only-node=""&gt;
&lt;LI data-start="121" data-end="177"&gt;Check with the "vpn tu" tool whether you can see an incoming and an outgoing tunnel in Phase 2.&lt;BR /&gt;# vpn tu&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;LI data-start="121" data-end="177"&gt;
&lt;P data-start="124" data-end="177"&gt;Check whether the routing into the tunnel is correct.&lt;BR /&gt;#&amp;nbsp;fw tab -f -t vpn_routing –u&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-start="179" data-end="181" data-is-last-node=""&gt;Check whether “Disable NAT inside the VPN community” is enabled in the VPN Community’s “Advanced” settings. If not, try enabling it — this is a common mistake.&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;LI data-start="179" data-end="181" data-is-last-node=""&gt;On the ASA, the tunnel is rebuilt not only based on time settings but also after a certain amount of data (in MB) has been transferred. Check Point cannot handle this. Disable this setting on the ASA side.&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;LI data-start="179" data-end="181" data-is-last-node=""&gt;Check with tcpdump whether IPsec packets are being sent to the ASA. If you see packets there, the issue might also be on the ASA side.&lt;BR /&gt;# tcpdump -nn -vv -i [vpn interface] host [externel ip ASA]&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;LI data-start="179" data-end="181" data-is-last-node=""&gt;Run a VPN debug as&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/38213"&gt;@the_rock&lt;/a&gt;&amp;nbsp;(Andy) described.&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;
&lt;LI data-start="179" data-end="181" data-is-last-node=""&gt;If that doesn’t help, send a screenshot of the error message in the log.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;PS:&amp;nbsp;&lt;BR /&gt;Check Point normally uses policy-based VPN. On the ASA, you’re using routing-based VPN. &lt;BR /&gt;If you want to use routing-based VPN on Check Point site, you need to configure a VPN interface.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 07 Nov 2025 16:29:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Site-to-Site-VPN-issue-Checkpoint-To-ASA/m-p/262191#M44331</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2025-11-07T16:29:55Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site VPN issue (Checkpoint To ASA)</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Site-to-Site-VPN-issue-Checkpoint-To-ASA/m-p/262192#M44332</link>
      <description>&lt;P&gt;I would say these days MOST people would use route based VPN tunnels, that appears to be the norm anyway.&lt;/P&gt;</description>
      <pubDate>Fri, 07 Nov 2025 17:20:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Site-to-Site-VPN-issue-Checkpoint-To-ASA/m-p/262192#M44332</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-11-07T17:20:07Z</dc:date>
    </item>
  </channel>
</rss>

