<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How do I change the local id for an IKEv2 IPsec VPN? in SASE and Remote Access</title>
    <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/How-do-I-change-the-local-id-for-an-IKEv2-IPsec-VPN/m-p/234868#M12863</link>
    <description>&lt;P&gt;We found a way to configure R81.10 gw to use IP address for IKEv2 ID according to link selection "Calculate IP based on network topology" setting:&lt;/P&gt;&lt;P&gt;This command needs to be executed on the gateway:&lt;/P&gt;&lt;P&gt;&lt;EM&gt;ckp_regedit -a SOFTWARE/CheckPoint/VPN1 BestRoutingSenderIP True&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;This workaround is described in sk108600 under&lt;EM&gt; "Scenario 2 - IKE Main Mode negotiation fails on 3rd party peer because it expects FQDN as ID".&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 06 Dec 2024 11:36:51 GMT</pubDate>
    <dc:creator>imamuzic</dc:creator>
    <dc:date>2024-12-06T11:36:51Z</dc:date>
    <item>
      <title>How do I change the local id for an IKEv2 IPsec VPN?</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/How-do-I-change-the-local-id-for-an-IKEv2-IPsec-VPN/m-p/14786#M12852</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm using a Checkpoint VSX with R77.30, configuring it via SmartConsole.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There I have set up an IPsec VPN with &lt;STRONG&gt;IKEv2&lt;/STRONG&gt; to a Cisco device.&lt;/P&gt;&lt;P&gt;The peer is telling me that he gets an odd remote-id for this VPN, so that I have investigated this using `vpn debug trunc` and looking into&amp;nbsp;$FWDIR/log/ikev2.xmll afterwards. There I found the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;BLOCKQUOTE class="jive_macro_quote jive-quote jive_text_macro"&gt;&lt;P&gt;less $FWDIR/log/ikev2.xmll&lt;/P&gt;&lt;P&gt;...&lt;BR /&gt;&amp;lt;Exchange serial="71386" Peer="ipsec-peer" Dir="Outbound" Type="Authentication"&amp;gt;&lt;BR /&gt; &amp;lt;peerIP&amp;gt;1.2.3.4&amp;lt;/peerIP&amp;gt;&lt;BR /&gt; &amp;lt;Message Valid="Yes" Initiator="Yes" Response="No" higherVer="No"&amp;gt;&lt;BR /&gt; &amp;lt;arrivalTime&amp;gt;2018-12-10T20:17:59&amp;lt;/arrivalTime&amp;gt;&lt;BR /&gt; &amp;lt;MsgID&amp;gt;1&amp;lt;/MsgID&amp;gt;&lt;BR /&gt; &amp;lt;initSPI&amp;gt;d6f9fd7e1034a6cd&amp;lt;/initSPI&amp;gt;&lt;BR /&gt; &amp;lt;respSPI&amp;gt;3ab383fc5bf849bd&amp;lt;/respSPI&amp;gt;&lt;BR /&gt; &amp;lt;Next&amp;gt;Encr&amp;lt;/Next&amp;gt;&lt;BR /&gt; &amp;lt;Version&amp;gt;2.0&amp;lt;/Version&amp;gt;&lt;BR /&gt; &amp;lt;Type&amp;gt;Authentication&amp;lt;/Type&amp;gt;&lt;BR /&gt; &amp;lt;Length&amp;gt;320&amp;lt;/Length&amp;gt;&lt;BR /&gt; &amp;lt;Payloads&amp;gt;&lt;BR /&gt; &amp;lt;Payload Type="IDi" Next="Auth" Length="12" Critical="No"&amp;gt;&lt;BR /&gt; &amp;lt;Type&amp;gt;IPV4_ADDR&amp;lt;/Type&amp;gt;&lt;BR /&gt; &amp;lt;Data&amp;gt;&lt;STRONG&gt;9.a.b.c&lt;/STRONG&gt;&amp;lt;/Data&amp;gt;&lt;BR /&gt; &amp;lt;/Payload&amp;gt;&lt;BR /&gt;...&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;The remote-id that the peer mentioned is my local-id (IDi) in the debug file (9.a.b.c). This is the address of the management interface of the Checkpoint.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What I want to configure instead of 9.a.b.c is the address of the outgoing interface (5.6.7.8). I have looked up&amp;nbsp;the VPN Administration Guide for R77 Versions but didn't find an answer.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can anyone help me?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Mathias&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 Dec 2018 13:30:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/How-do-I-change-the-local-id-for-an-IKEv2-IPsec-VPN/m-p/14786#M12852</guid>
      <dc:creator>Mathias_Weidner</dc:creator>
      <dc:date>2018-12-11T13:30:23Z</dc:date>
    </item>
    <item>
      <title>Re: How do I change the local id for an IKEv2 IPsec VPN?</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/How-do-I-change-the-local-id-for-an-IKEv2-IPsec-VPN/m-p/14787#M12853</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Do you have Link Selection configured with the correct IP Address?&lt;/P&gt;&lt;P&gt;This is set here:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-1 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/76408_pastedImage_1.png" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After you've done this, renew the VPN certificate and install policy:&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-2 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/76409_pastedImage_2.png" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 15 Dec 2018 05:36:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/How-do-I-change-the-local-id-for-an-IKEv2-IPsec-VPN/m-p/14787#M12853</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-12-15T05:36:06Z</dc:date>
    </item>
    <item>
      <title>Re: How do I change the local id for an IKEv2 IPsec VPN?</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/How-do-I-change-the-local-id-for-an-IKEv2-IPsec-VPN/m-p/14788#M12854</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I tried this but it didn't resovle the issue.&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 23 Jan 2019 13:53:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/How-do-I-change-the-local-id-for-an-IKEv2-IPsec-VPN/m-p/14788#M12854</guid>
      <dc:creator>Steve_Vandegaer</dc:creator>
      <dc:date>2019-01-23T13:53:18Z</dc:date>
    </item>
    <item>
      <title>Re: How do I change the local id for an IKEv2 IPsec VPN?</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/How-do-I-change-the-local-id-for-an-IKEv2-IPsec-VPN/m-p/14789#M12855</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Which choice did you make, the main IP or the actual external interface IP?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 23 Jan 2019 18:47:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/How-do-I-change-the-local-id-for-an-IKEv2-IPsec-VPN/m-p/14789#M12855</guid>
      <dc:creator>Maarten_Sjouw</dc:creator>
      <dc:date>2019-01-23T18:47:57Z</dc:date>
    </item>
    <item>
      <title>Re: How do I change the local id for an IKEv2 IPsec VPN?</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/How-do-I-change-the-local-id-for-an-IKEv2-IPsec-VPN/m-p/53997#M12856</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;We have selected here "Selected address from topology table" and used the externalIP.&lt;BR /&gt;The Gateway Object was defined with the RFC1918 IP (InternalIP).&lt;/P&gt;&lt;P&gt;It seems that IKEv2 is not using the setting in "Link Selection", it uses the "General Properties" IPv4 Address.&lt;BR /&gt;We tried many settings but IKEv2 is always using as the IDi the Gateway IPv4 Address.&lt;/P&gt;&lt;P&gt;Does someone know how to change this without chaning the IPv4 Object IPv4?&lt;/P&gt;&lt;P&gt;Thanks,&lt;BR /&gt;Peter&lt;/P&gt;</description>
      <pubDate>Tue, 21 May 2019 08:56:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/How-do-I-change-the-local-id-for-an-IKEv2-IPsec-VPN/m-p/53997#M12856</guid>
      <dc:creator>Peter_Baumann</dc:creator>
      <dc:date>2019-05-21T08:56:04Z</dc:date>
    </item>
    <item>
      <title>Re: How do I change the local id for an IKEv2 IPsec VPN?</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/How-do-I-change-the-local-id-for-an-IKEv2-IPsec-VPN/m-p/80029#M12857</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I have this problem to and I found the &lt;SPAN&gt;sk44978 "Check Point gateways always send main IP address as IKE Main Mode ID"&amp;nbsp;&lt;/SPAN&gt;that I thought explained it:&amp;nbsp;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk44978&amp;amp;partition=Basic&amp;amp;product=IPSec" target="_blank" rel="noopener"&gt;https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk44978&amp;amp;partition=Basic&amp;amp;product=IPSec&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Then I was confused again when I got to the bottom of the solution as it states:&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;"For R80.30:&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;In R80.30, Check Point gateways no longer use the main IP of the gateway as IKE ID, when using IKEV2, and when link selection is configured to use another interface than the main IP (which is the default)."&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;I have currently experiencing this problem and we are running R80.30, We have the gateway explicitly configured to use the external public IP address:&lt;/P&gt;&lt;DIV class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 765px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/5215i18314245FB35F563/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;In the ikemonitor.snoop capture that we took, it is clear to see that the ID is set the main IP of the firewall cluster:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/5213i3B1E8064B338D223/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;The Cisco router terminating the site to site IPsec has to match the 10.88.1.30 for the connection to be successful&lt;/P&gt;&lt;P&gt;Should this truly be fixed in R80.30, or is the SK mistaken?&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Michael&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 27 Mar 2020 21:11:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/How-do-I-change-the-local-id-for-an-IKEv2-IPsec-VPN/m-p/80029#M12857</guid>
      <dc:creator>Michael_Horne</dc:creator>
      <dc:date>2020-03-27T21:11:46Z</dc:date>
    </item>
    <item>
      <title>Re: How do I change the local id for an IKEv2 IPsec VPN?</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/How-do-I-change-the-local-id-for-an-IKEv2-IPsec-VPN/m-p/98938#M12858</link>
      <description>&lt;P&gt;Hi Michael, I am having the exact same issue on r80.30. I have configured an interface with an external IP and have selected this in the Link selection but as above the Checkpoint firewall still uses the internal IP within the IDi payload. Did anyone ever get back to you on this from support?&lt;/P&gt;</description>
      <pubDate>Tue, 13 Oct 2020 07:18:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/How-do-I-change-the-local-id-for-an-IKEv2-IPsec-VPN/m-p/98938#M12858</guid>
      <dc:creator>figdungiven</dc:creator>
      <dc:date>2020-10-13T07:18:12Z</dc:date>
    </item>
    <item>
      <title>Re: How do I change the local id for an IKEv2 IPsec VPN?</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/How-do-I-change-the-local-id-for-an-IKEv2-IPsec-VPN/m-p/98941#M12859</link>
      <description>&lt;P&gt;Main mode IP for IKEv2 should use one set up through Link Selection, as SK states, with R80.30 and up. Make sure you install policy after the change. If not working, please raise with TAC&lt;/P&gt;</description>
      <pubDate>Tue, 13 Oct 2020 07:37:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/How-do-I-change-the-local-id-for-an-IKEv2-IPsec-VPN/m-p/98941#M12859</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2020-10-13T07:37:58Z</dc:date>
    </item>
    <item>
      <title>Re: How do I change the local id for an IKEv2 IPsec VPN?</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/How-do-I-change-the-local-id-for-an-IKEv2-IPsec-VPN/m-p/114001#M12860</link>
      <description>&lt;P&gt;Checkpoint keep saying that Link Selection should work with IKEv2 in R80.30.&amp;nbsp; This has never worked for me and we always have to go back to Ikev1 for tunnels where we need to set the local ID.&lt;/P&gt;</description>
      <pubDate>Thu, 18 Mar 2021 17:18:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/How-do-I-change-the-local-id-for-an-IKEv2-IPsec-VPN/m-p/114001#M12860</guid>
      <dc:creator>Michael_Horne</dc:creator>
      <dc:date>2021-03-18T17:18:35Z</dc:date>
    </item>
    <item>
      <title>Re: How do I change the local id for an IKEv2 IPsec VPN?</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/How-do-I-change-the-local-id-for-an-IKEv2-IPsec-VPN/m-p/116214#M12861</link>
      <description>&lt;P&gt;I agree; CheckPoint is woefully mistaken in saying that Link Selection settings will influence the IKEv2 ID, regardless of software version.&amp;nbsp; &amp;nbsp;The only way to set the IKEv2 ID is to change the Main IP of the gateway (IP address referenced in SmartConsole).&amp;nbsp; &amp;nbsp;In my case, this means the Management server and gateways communicate via Internet, which is stupid, but it does work.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;FYI: the Link Selection -&amp;gt; Source IP address setting will influence the&amp;nbsp;&lt;EM&gt;&lt;STRONG&gt;source IP address of the packet&lt;/STRONG&gt;&lt;/EM&gt;&amp;nbsp;when initiating.&amp;nbsp; You can easily see this in a packet capture:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="python"&gt;# (eth0 = 10.0.0.2/24, route to 203.0.113.188 10.0.0.1, eth1 = 10.1.1.111/24)

[Expert@check-point-cloudguard-byol-1-vm:0]# tcpdump -n -i eth0 host 203.0.113.188
14:41:09.095484 IP 10.1.1.111.isakmp &amp;gt; 203.0.113.188.isakmp: isakmp: parent_sa ikev2_init[I]
14:41:17.033617 IP 10.1.1.111.isakmp &amp;gt; 203.0.113.188.isakmp: isakmp: parent_sa ikev2_init[I]
14:41:17.094507 IP 10.1.1.111.isakmp &amp;gt; 203.0.113.188.isakmp: isakmp: parent_sa ikev2_init[I]
14:41:28.407587 IP 10.1.1.111.isakmp &amp;gt; 203.0.113.188.isakmp: isakmp: parent_sa ikev2_init[I]
14:41:42.199983 IP 10.1.1.111.isakmp &amp;gt; 203.0.113.188.isakmp: isakmp: parent_sa ikev2_init[I]
14:41:43.199885 IP 10.1.1.111.isakmp &amp;gt; 203.0.113.188.isakmp: isakmp: parent_sa ikev2_init[I]
14:41:44.406724 IP 10.1.1.111.isakmp &amp;gt; 203.0.113.188.isakmp: isakmp: parent_sa ikev2_init[I]
14:41:44.614057 IP 10.1.1.111.isakmp &amp;gt; 203.0.113.188.isakmp: isakmp: parent_sa ikev2_init[I]&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For CheckPoint gateways behind an NAT, this setting needs to be overridden to "topology table -&amp;gt; (IP address of external interface), or "IP address of chosen interface".&amp;nbsp; Leaving this as the main IP will cause the CheckPoint to perform IP spoofing against itself and all VPNs will fail, whether IKEv1 or IKEv2.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 16 Apr 2021 20:19:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/How-do-I-change-the-local-id-for-an-IKEv2-IPsec-VPN/m-p/116214#M12861</guid>
      <dc:creator>johnnyringo</dc:creator>
      <dc:date>2021-04-16T20:19:01Z</dc:date>
    </item>
    <item>
      <title>Re: How do I change the local id for an IKEv2 IPsec VPN?</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/How-do-I-change-the-local-id-for-an-IKEv2-IPsec-VPN/m-p/116215#M12862</link>
      <description>&lt;P&gt;FWIW though I came across this thread while troubleshooting an R80.40 standalone gateway in Google Cloud (the clusters do not have this issue because their Main IP is the floating external IP address).&amp;nbsp;&amp;nbsp;Even after setting the other side to accept the CheckPoint's Main IP, I still could not get policy-based VPNs working when the CheckPoint side initiated traffic.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Running &lt;EM&gt;debug crypto ipsec&lt;/EM&gt; on the other side (Cisco), it would show the CheckPoint sending the main IP in the Phase 2 Transform sets.&amp;nbsp; The Cisco would then reject the SA request because it was expecting either public IPs or private IPs, not a mix of both.&lt;/P&gt;&lt;P&gt;In working with support it seems there is a fix for this in the latest R80.30 Jumbo Hotfix.&amp;nbsp; Here's the steps:&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Verify the other side will accept the CheckPoint's Main IP as the IKEv2 remote ID.&amp;nbsp; On a Cisco router for example, this is done with &lt;EM&gt;&lt;STRONG&gt;match identity remote address&lt;/STRONG&gt;&lt;/EM&gt; under &lt;EM&gt;&lt;STRONG&gt;crypto ikev2 profile&lt;/STRONG&gt;&lt;/EM&gt;&lt;/LI&gt;&lt;LI&gt;Upgrade CheckPoint to latest&amp;nbsp; R80.30 Jumbo Hotfix, which should be Take 273&lt;/LI&gt;&lt;LI&gt;Under IPSec VPN -&amp;gt; Link Selection -&amp;gt; Always use this IP address -&amp;gt; Statically NATed IP, enter the public IP of the gateway (example: 192.0.2.21)&lt;/LI&gt;&lt;LI&gt;Set Link Selection -&amp;gt; Source IP address settings to to either topology table (ip address of external interface) &lt;EM&gt;or&lt;/EM&gt; IP address of chosen interface.&amp;nbsp; I prefer the latter just in case the eth0 IP address changes.&amp;nbsp;&amp;nbsp;&lt;/LI&gt;&lt;LI&gt;Under IPSec VPN -&amp;gt; VPN Advanced, Verify NAT Traversal is enabled, which is the default&lt;/LI&gt;&lt;LI&gt;Verify the other side also has NAT-T support&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;An initial SA with the public IPs as /32s will then be created, even without traffic:&lt;/P&gt;&lt;LI-CODE lang="python"&gt;+-----------------------------------------+-----------------------+---------------------+
| Peer: 203.0.113.188 - cisco-router    | MSA: ffffc9004aebb220 | i: 1  ref:     2    |
| Methods: ESP Tunnel PFS AES-128 SHA1 g..|                       |                     |
| My TS: 192.0.2.21                     |                       |                     |
| Peer TS: 203.0.113.188                    |                       |                     |
| MSPI:	   800001 (i:  1, p:  0)          | Out SPI: cf538552     |                     |
| Tunnel created:      Apr 16 16:49:15    |                       |                     |
| Tunnel expiration:   Apr 16 17:49:15    |                       |                     |
+-----------------------------------------+-----------------------+---------------------+&lt;/LI-CODE&gt;&lt;P&gt;Then, when either sides sends interior traffic, additional SAs will be brought with the interior subnets:&lt;/P&gt;&lt;LI-CODE lang="python"&gt;+-----------------------------------------+-----------------------+---------------------+
| Peer: 203.0.113.188 - cisco-router    | MSA: ffffc9004aebb6f8 | i: 0  ref: -- 60/60 |
| Methods: ESP Tunnel PFS AES-128 SHA1 g..|                       | i: 1  ref:     3    |
| My TS: 10.22.222.0/24                    |                       |                     |
| Peer TS: 172.31.33.0/24                   |                       |                     |
| MSPI:	   800002 (i:  1, p:  0)          | Out SPI: 0cf6c107     |                     |
| Tunnel created:      Apr 16 16:51:53    |                       |                     |
| Tunnel expiration:   Apr 16 17:51:53    |                       |                     |
+-----------------------------------------+-----------------------+---------------------+&lt;/LI-CODE&gt;&lt;P&gt;I'll admit here I don't fully understand why this only works when NAT-T is enabled, and it smells more like a hack that a design fix.&amp;nbsp; But thought I'd pass it on.&lt;/P&gt;</description>
      <pubDate>Fri, 16 Apr 2021 20:56:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/How-do-I-change-the-local-id-for-an-IKEv2-IPsec-VPN/m-p/116215#M12862</guid>
      <dc:creator>johnnyringo</dc:creator>
      <dc:date>2021-04-16T20:56:12Z</dc:date>
    </item>
    <item>
      <title>Re: How do I change the local id for an IKEv2 IPsec VPN?</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/How-do-I-change-the-local-id-for-an-IKEv2-IPsec-VPN/m-p/234868#M12863</link>
      <description>&lt;P&gt;We found a way to configure R81.10 gw to use IP address for IKEv2 ID according to link selection "Calculate IP based on network topology" setting:&lt;/P&gt;&lt;P&gt;This command needs to be executed on the gateway:&lt;/P&gt;&lt;P&gt;&lt;EM&gt;ckp_regedit -a SOFTWARE/CheckPoint/VPN1 BestRoutingSenderIP True&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;This workaround is described in sk108600 under&lt;EM&gt; "Scenario 2 - IKE Main Mode negotiation fails on 3rd party peer because it expects FQDN as ID".&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 06 Dec 2024 11:36:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/How-do-I-change-the-local-id-for-an-IKEv2-IPsec-VPN/m-p/234868#M12863</guid>
      <dc:creator>imamuzic</dc:creator>
      <dc:date>2024-12-06T11:36:51Z</dc:date>
    </item>
    <item>
      <title>Re: How do I change the local id for an IKEv2 IPsec VPN?</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/How-do-I-change-the-local-id-for-an-IKEv2-IPsec-VPN/m-p/234986#M12864</link>
      <description>&lt;P&gt;Interesting.&amp;nbsp; Do you know if it's required for R81.20?&amp;nbsp; Reason I ask is I noticed the IPSec VPN Link Selection settings changed between versions for HA Clusters in GCP:&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;IP Selection by Remote Peer&lt;/STRONG&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;R81.10: Always use this IP address &amp;gt; Main IP&lt;/LI&gt;
&lt;LI&gt;R81.20: Always use this IP address &amp;gt; Statically NATed IP: &amp;lt;Public IP of the Cluster&amp;gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&lt;STRONG&gt;Outgoing Route Selection &amp;gt; Source IP Address settings&lt;/STRONG&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;R81.10: Manual &amp;gt; IP Address of chosen interface&lt;/LI&gt;
&lt;LI&gt;R81.20: Automatic&lt;/LI&gt;
&lt;/OL&gt;</description>
      <pubDate>Sat, 07 Dec 2024 17:00:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/How-do-I-change-the-local-id-for-an-IKEv2-IPsec-VPN/m-p/234986#M12864</guid>
      <dc:creator>johnnyringo</dc:creator>
      <dc:date>2024-12-07T17:00:13Z</dc:date>
    </item>
    <item>
      <title>Re: How do I change the local id for an IKEv2 IPsec VPN?</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/How-do-I-change-the-local-id-for-an-IKEv2-IPsec-VPN/m-p/235024#M12865</link>
      <description>&lt;P&gt;Not sure if this 'ckp_regedit' fix is required on R81.20 too, but in R81.10 without this fix the gateway always uses the Main IP as IKEv2 ID. The only exception from this (per our testing) is if you use "Selected address from topology table" or "Statically NATed IP" options under "IP Selection by Remote Peer" section combined with "Operating system routing table" under "Outgoing Route Selection" section. The only trouble in this case is that you end up with a single IKE ID that must be accepted by all IKE peers which is fine in a typical Internet perimeter scenario, but in our case we had a multiple point tu point links terminated on their respective external interfaces connecting to respective IKEv2 peers. Wihtout modifying remote peer's configuration or routing topology, this 'chkp_regedit' fix was the only way to make Check Point GW behaves as, for example, Cisco ASA/FTD or Palo Alto regarding using IP address as IKEv2 ID.&lt;/P&gt;</description>
      <pubDate>Sun, 08 Dec 2024 15:05:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/How-do-I-change-the-local-id-for-an-IKEv2-IPsec-VPN/m-p/235024#M12865</guid>
      <dc:creator>imamuzic</dc:creator>
      <dc:date>2024-12-08T15:05:58Z</dc:date>
    </item>
    <item>
      <title>Re: How do I change the local id for an IKEv2 IPsec VPN?</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/How-do-I-change-the-local-id-for-an-IKEv2-IPsec-VPN/m-p/242986#M12866</link>
      <description>&lt;P&gt;Hello imamuzic.&lt;/P&gt;&lt;P&gt;From what I understood, did you manage to send the interface ID depending on where the traffic comes in?? ... My scenario is:&lt;/P&gt;&lt;P&gt;I have two WAN links with different ISPs and the problem I'm having when establishing the VPNs is that the Cluster ID is sent, so the Third Party FWs know my connection through the Cluster's internal IP, so I'm looking for my FW to present itself with the IP where it receives the connection, that is, if the connection comes through ISP 1, my checkpoint responds with the IP of that interface and if it comes through ISP 2, it responds with the IP of this interface.&lt;/P&gt;&lt;P&gt;I don't know if it was the same thing you had, if so, did it work for you with "chkp_regedit"?&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 04 Mar 2025 19:28:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/How-do-I-change-the-local-id-for-an-IKEv2-IPsec-VPN/m-p/242986#M12866</guid>
      <dc:creator>karmarin</dc:creator>
      <dc:date>2025-03-04T19:28:18Z</dc:date>
    </item>
    <item>
      <title>Re: How do I change the local id for an IKEv2 IPsec VPN?</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/How-do-I-change-the-local-id-for-an-IKEv2-IPsec-VPN/m-p/243045#M12867</link>
      <description>&lt;P&gt;we had a similar issue and 'chkp_regedit' solved it... I hope you will make it too.&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Igor&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 05 Mar 2025 07:44:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/How-do-I-change-the-local-id-for-an-IKEv2-IPsec-VPN/m-p/243045#M12867</guid>
      <dc:creator>imamuzic</dc:creator>
      <dc:date>2025-03-05T07:44:17Z</dc:date>
    </item>
  </channel>
</rss>

