<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Check Point &amp;amp; Palo Alto IPSEC VPN - proxy ID configuration &amp;amp; Issues in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/Check-Point-amp-Palo-Alto-IPSEC-VPN-proxy-ID-configuration-amp/m-p/269159#M45153</link>
    <description>&lt;P&gt;Here is how you fix all that.&lt;/P&gt;
&lt;P&gt;Set BOTH enc domains to empty groups for needed vpn community, make sure its set as permanent tunnel, per gateway enabled in tunnel management, and create rule based on what access is needed.&lt;/P&gt;
&lt;P&gt;Push policy, test.&lt;/P&gt;</description>
    <pubDate>Thu, 29 Jan 2026 23:58:27 GMT</pubDate>
    <dc:creator>the_rock</dc:creator>
    <dc:date>2026-01-29T23:58:27Z</dc:date>
    <item>
      <title>Check Point &amp; Palo Alto IPSEC VPN - proxy ID configuration &amp; Issues</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Check-Point-amp-Palo-Alto-IPSEC-VPN-proxy-ID-configuration-amp/m-p/269154#M45152</link>
      <description>&lt;P&gt;I have an existing Check Point only mesh VPN setup amongst numerous sites.&lt;/P&gt;&lt;P&gt;I have a new site that is running Palo Alto VPN.&lt;/P&gt;&lt;P&gt;I want to incorporate this new site running Palo Alto into the existing Check Point mesh VPN.&lt;/P&gt;&lt;P&gt;I have it all configured; IKE is up, IPSEC Tunnel is up &amp;amp; showing green. Traffic initiated from host on Palo Alto end traverses tunnel just fine and works. Traffic initiated from Check Point end does not work. Does not reach Palo Alto side, does not show in packet captures.&lt;/P&gt;&lt;P&gt;I understand that Check Point is policy based, and Palo Alto is route based and as per &lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClW8CAK" target="_self"&gt;this Palo Alto KB&lt;/A&gt; that it won't work unless Proxy IDs are configured to match Check Point.&lt;/P&gt;&lt;P&gt;Currently, I have NO proxy IDs configured and traffic flows 1-way as mentioned.&lt;/P&gt;&lt;P&gt;Check Point end has encryption domain with many networks in it.&lt;/P&gt;&lt;P&gt;Palo Alto end entire site is behind 10.222.0.0/16.&lt;/P&gt;&lt;P&gt;Interoperable object for the Palo Alto is created on Check Point config and is part of the mesh, 10.222.0.0/16 defined in the topology encryption domain.&lt;/P&gt;&lt;P&gt;What should I be setting the Proxy IDs to on Palo Alto to make this work? Can this even work? Or is this square peg round hole?&lt;/P&gt;&lt;P&gt;If I set any specific proxy IDs on Palo side, this is what I see in the logs on Palo below. The tunnel does go down for about 30 seconds then comes back up and returns to 1-way traffic, with this error repeating endlessly:&lt;BR /&gt;&lt;EM&gt;Configured proxy-IDs do not match the proxy-IDs in the IPSec proposal. Please ensure that proxy-IDs match in the configuration on both sides. cannot find matching phase-2 tunnel for received proxy ID. received local id: 0.0.0.0/0 type IPv4_subnet protocol 0 port 0, received remote id: 0.0.0.0/0 type IPv4_subnet protocol 0 port 0&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;If I go with no proxy IDs at all, I don't get any errors like above, but it's still just 1-way traffic.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 29 Jan 2026 22:59:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Check-Point-amp-Palo-Alto-IPSEC-VPN-proxy-ID-configuration-amp/m-p/269154#M45152</guid>
      <dc:creator>Mike137843</dc:creator>
      <dc:date>2026-01-29T22:59:53Z</dc:date>
    </item>
    <item>
      <title>Re: Check Point &amp; Palo Alto IPSEC VPN - proxy ID configuration &amp; Issues</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Check-Point-amp-Palo-Alto-IPSEC-VPN-proxy-ID-configuration-amp/m-p/269159#M45153</link>
      <description>&lt;P&gt;Here is how you fix all that.&lt;/P&gt;
&lt;P&gt;Set BOTH enc domains to empty groups for needed vpn community, make sure its set as permanent tunnel, per gateway enabled in tunnel management, and create rule based on what access is needed.&lt;/P&gt;
&lt;P&gt;Push policy, test.&lt;/P&gt;</description>
      <pubDate>Thu, 29 Jan 2026 23:58:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Check-Point-amp-Palo-Alto-IPSEC-VPN-proxy-ID-configuration-amp/m-p/269159#M45153</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2026-01-29T23:58:27Z</dc:date>
    </item>
    <item>
      <title>Re: Check Point &amp; Palo Alto IPSEC VPN - proxy ID configuration &amp; Issues</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Check-Point-amp-Palo-Alto-IPSEC-VPN-proxy-ID-configuration-amp/m-p/269164#M45156</link>
      <description>&lt;P&gt;I see two possibles ways:&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Possible approaches to fix this:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Option 1 – Align Proxy-IDs (policy-based):&lt;/STRONG&gt;&lt;BR /&gt;Explicitly define Proxy-IDs on the Palo Alto side that match the required networks on the Check Point side (you can summarize if possible).&lt;BR /&gt;On Check Point, make sure the correct VPN Domains are defined for the Palo Alto peer and double-check that security rules allow traffic &lt;STRONG&gt;both directions&lt;/STRONG&gt;.&lt;BR /&gt;Also review NAT: confirm if a bidirectional No-NAT rule is needed or if any existing NAT rule may be interfering.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Option 2 – Go fully route-based:&lt;/STRONG&gt;&lt;BR /&gt;Create a &lt;STRONG&gt;dedicated VPN community&lt;/STRONG&gt; for this the Palo Alto and configure the tunnel as &lt;STRONG&gt;route-based on both sides&lt;/STRONG&gt; (Check Point and Palo Alto), relying on routing instead of Proxy-IDs or VPN Domain to control traffic.&lt;/P&gt;</description>
      <pubDate>Fri, 30 Jan 2026 00:14:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Check-Point-amp-Palo-Alto-IPSEC-VPN-proxy-ID-configuration-amp/m-p/269164#M45156</guid>
      <dc:creator>israelfds95</dc:creator>
      <dc:date>2026-01-30T00:14:32Z</dc:date>
    </item>
    <item>
      <title>Re: Check Point &amp; Palo Alto IPSEC VPN - proxy ID configuration &amp; Issues</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Check-Point-amp-Palo-Alto-IPSEC-VPN-proxy-ID-configuration-amp/m-p/269165#M45157</link>
      <description>&lt;P&gt;100% true!&lt;/P&gt;</description>
      <pubDate>Fri, 30 Jan 2026 00:16:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Check-Point-amp-Palo-Alto-IPSEC-VPN-proxy-ID-configuration-amp/m-p/269165#M45157</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2026-01-30T00:16:10Z</dc:date>
    </item>
    <item>
      <title>Re: Check Point &amp; Palo Alto IPSEC VPN - proxy ID configuration &amp; Issues</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Check-Point-amp-Palo-Alto-IPSEC-VPN-proxy-ID-configuration-amp/m-p/269182#M45164</link>
      <description>&lt;P&gt;Would recommend to perform vpn debug first.&lt;/P&gt;
&lt;P&gt;b4 testing: vpn debug trunc&amp;nbsp;&lt;/P&gt;
&lt;P&gt;after: vpn debug truncoff&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Then look at the logs using ikeview&lt;BR /&gt;on m end in such cases this was always the first step.&lt;/P&gt;</description>
      <pubDate>Fri, 30 Jan 2026 05:54:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Check-Point-amp-Palo-Alto-IPSEC-VPN-proxy-ID-configuration-amp/m-p/269182#M45164</guid>
      <dc:creator>Vincent_Bacher</dc:creator>
      <dc:date>2026-01-30T05:54:28Z</dc:date>
    </item>
    <item>
      <title>Re: Check Point &amp; Palo Alto IPSEC VPN - proxy ID configuration &amp; Issues</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Check-Point-amp-Palo-Alto-IPSEC-VPN-proxy-ID-configuration-amp/m-p/269193#M45170</link>
      <description>&lt;P&gt;Yes, totally valid thing to do.&lt;/P&gt;</description>
      <pubDate>Fri, 30 Jan 2026 12:05:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Check-Point-amp-Palo-Alto-IPSEC-VPN-proxy-ID-configuration-amp/m-p/269193#M45170</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2026-01-30T12:05:59Z</dc:date>
    </item>
    <item>
      <title>Re: Check Point &amp; Palo Alto IPSEC VPN - proxy ID configuration &amp; Issues</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Check-Point-amp-Palo-Alto-IPSEC-VPN-proxy-ID-configuration-amp/m-p/269211#M45180</link>
      <description>&lt;P&gt;If you change settings for the Meshed, you change it for all your peers.&lt;/P&gt;
&lt;P&gt;We don't use mesh much unless all members are completely managed by the same manager, but generally IPSEC VPN are defined to 3rd parties.&lt;/P&gt;
&lt;P&gt;So you could actually create a separate star community with the PAN and you central CP and allow routing through the center so that your central GW can perform VPN routing. This makes sense as it's a deviation to your "All-CP" meshed topology.&lt;/P&gt;
&lt;P&gt;This wya, you can modify VPN options without nuking your entire BPN mesh. You can then use "one tunnel per gateway" and so on to use an universal ID (0.0.0.0/0), or as mentioned, go route-based which is also efficient - except that annoying obligation to automatically fetch topology. You can'r create a VTI manually in the topology.&lt;/P&gt;
&lt;P&gt;With route-based, you don't deal with encryption domains as it's empty, just routing.&lt;/P&gt;</description>
      <pubDate>Fri, 30 Jan 2026 13:40:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Check-Point-amp-Palo-Alto-IPSEC-VPN-proxy-ID-configuration-amp/m-p/269211#M45180</guid>
      <dc:creator>Alex-</dc:creator>
      <dc:date>2026-01-30T13:40:30Z</dc:date>
    </item>
    <item>
      <title>Re: Check Point &amp; Palo Alto IPSEC VPN - proxy ID configuration &amp; Issues</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Check-Point-amp-Palo-Alto-IPSEC-VPN-proxy-ID-configuration-amp/m-p/269213#M45182</link>
      <description>&lt;P&gt;This is the option I would prefer as well, same reasons and I never used mesh.&lt;/P&gt;</description>
      <pubDate>Fri, 30 Jan 2026 13:43:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Check-Point-amp-Palo-Alto-IPSEC-VPN-proxy-ID-configuration-amp/m-p/269213#M45182</guid>
      <dc:creator>Vincent_Bacher</dc:creator>
      <dc:date>2026-01-30T13:43:30Z</dc:date>
    </item>
    <item>
      <title>Re: Check Point &amp; Palo Alto IPSEC VPN - proxy ID configuration &amp; Issues</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Check-Point-amp-Palo-Alto-IPSEC-VPN-proxy-ID-configuration-amp/m-p/269214#M45183</link>
      <description>&lt;P&gt;I never ever recall creating vpn community as mesh when setting up cloud providers VPN tunnel in smart console and always worked fine.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 30 Jan 2026 13:48:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Check-Point-amp-Palo-Alto-IPSEC-VPN-proxy-ID-configuration-amp/m-p/269214#M45183</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2026-01-30T13:48:21Z</dc:date>
    </item>
    <item>
      <title>Re: Check Point &amp; Palo Alto IPSEC VPN - proxy ID configuration &amp; Issues</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Check-Point-amp-Palo-Alto-IPSEC-VPN-proxy-ID-configuration-amp/m-p/269215#M45184</link>
      <description>&lt;P&gt;The use case of Mesh here is if the locations need to communicate together and are geographically diverse, so the central routing could cause latency.&lt;/P&gt;
&lt;P&gt;But I had a similar case where an external DR site had to be connected which didn't work well in the mesh, it was solved by VPN routing and a dedicated community.&lt;/P&gt;</description>
      <pubDate>Fri, 30 Jan 2026 13:52:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Check-Point-amp-Palo-Alto-IPSEC-VPN-proxy-ID-configuration-amp/m-p/269215#M45184</guid>
      <dc:creator>Alex-</dc:creator>
      <dc:date>2026-01-30T13:52:18Z</dc:date>
    </item>
    <item>
      <title>Re: Check Point &amp; Palo Alto IPSEC VPN - proxy ID configuration &amp; Issues</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Check-Point-amp-Palo-Alto-IPSEC-VPN-proxy-ID-configuration-amp/m-p/269216#M45185</link>
      <description>&lt;P&gt;Exactly! I recall even all CP sk articles about this also suggest to create community as star.&lt;/P&gt;</description>
      <pubDate>Fri, 30 Jan 2026 13:55:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Check-Point-amp-Palo-Alto-IPSEC-VPN-proxy-ID-configuration-amp/m-p/269216#M45185</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2026-01-30T13:55:04Z</dc:date>
    </item>
    <item>
      <title>Re: Check Point &amp; Palo Alto IPSEC VPN - proxy ID configuration &amp; Issues</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Check-Point-amp-Palo-Alto-IPSEC-VPN-proxy-ID-configuration-amp/m-p/269222#M45188</link>
      <description>&lt;P&gt;Thanks for the responses! So given above comments vs. your initial reply, would you recommend then just creating a separate Star VPN community with the Palo Alto and the subset of Check Point sites that need to connect to it? Would the Palo interoperable be the Central, and the Check Point sites the satellites?&lt;/P&gt;</description>
      <pubDate>Fri, 30 Jan 2026 14:34:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Check-Point-amp-Palo-Alto-IPSEC-VPN-proxy-ID-configuration-amp/m-p/269222#M45188</guid>
      <dc:creator>Mike137843</dc:creator>
      <dc:date>2026-01-30T14:34:45Z</dc:date>
    </item>
    <item>
      <title>Re: Check Point &amp; Palo Alto IPSEC VPN - proxy ID configuration &amp; Issues</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Check-Point-amp-Palo-Alto-IPSEC-VPN-proxy-ID-configuration-amp/m-p/269224#M45189</link>
      <description>&lt;P&gt;Yes and no. Star community yes, centre gateway is CP, satellite PAN. Give both empty group vpn domains,but JUST for that specific community. Set tunnel as permenent, per gateway in tunnel mgmt, like below.&lt;/P&gt;
&lt;P&gt;The rule itself, set it per subnets that need to communicate.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot_1.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/32984i9D10FC2BF5615F19/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Screenshot_1.png" alt="Screenshot_1.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt; &lt;/P&gt;</description>
      <pubDate>Fri, 30 Jan 2026 14:37:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Check-Point-amp-Palo-Alto-IPSEC-VPN-proxy-ID-configuration-amp/m-p/269224#M45189</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2026-01-30T14:37:33Z</dc:date>
    </item>
  </channel>
</rss>

