<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Site to Site IPsec VPN with Strongswan in Spark Firewall (SMB)</title>
    <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Site-to-Site-IPsec-VPN-with-Strongswan/m-p/227547#M11462</link>
    <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/96699"&gt;@ANANTADSULE&lt;/a&gt;&amp;nbsp;Ping me directly if you like, we can do remote session...Im just studying for Microsoft exam I have tomorrow, but I can help, not an issue.&lt;/P&gt;
&lt;P&gt;Let me know.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
    <pubDate>Mon, 23 Sep 2024 12:06:22 GMT</pubDate>
    <dc:creator>the_rock</dc:creator>
    <dc:date>2024-09-23T12:06:22Z</dc:date>
    <item>
      <title>Site to Site IPsec VPN with Strongswan</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Site-to-Site-IPsec-VPN-with-Strongswan/m-p/227450#M11445</link>
      <description>&lt;P&gt;Dear All,&lt;/P&gt;&lt;P&gt;I'm trying to create IPsec tunnel with Strong Swan with below configuration.&lt;/P&gt;&lt;P&gt;Left Side is Strong Swan&lt;/P&gt;&lt;P&gt;Right Side is Checkpoint R81.10.10(945)&lt;/P&gt;&lt;P&gt;--------------------------&lt;/P&gt;&lt;P&gt;conn ho&lt;BR /&gt;type=tunnel&lt;BR /&gt;auto=start&lt;BR /&gt;keyexchange=ikev2&lt;BR /&gt;authby=secret&lt;BR /&gt;left=%defaultroute&lt;BR /&gt;leftid=13.126.xx.xx&lt;BR /&gt;leftsubnet=10.90.0.0/20&lt;BR /&gt;right=59.94.xx.xx&lt;BR /&gt;rightid=%any&lt;BR /&gt;rightsubnet = 192.168.10.0/26&lt;BR /&gt;ike=aes256-sha256-modp1024!&lt;BR /&gt;esp=aes256-sha256!&lt;BR /&gt;aggressive=no&lt;BR /&gt;forceencaps=yes&lt;BR /&gt;leftauth=psk&lt;BR /&gt;rightauth=psk&lt;BR /&gt;keyingtries=%forever&lt;BR /&gt;ikelifetime=28800s&lt;BR /&gt;lifetime=3600s&lt;BR /&gt;dpddelay=20s&lt;BR /&gt;dpdtimeout=120s&lt;BR /&gt;dpdaction=restart&lt;/P&gt;&lt;P&gt;------------------------------&lt;/P&gt;&lt;P&gt;Checkpoint config screenshot attached.&lt;/P&gt;</description>
      <pubDate>Sat, 21 Sep 2024 12:34:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Site-to-Site-IPsec-VPN-with-Strongswan/m-p/227450#M11445</guid>
      <dc:creator>ANANTADSULE</dc:creator>
      <dc:date>2024-09-21T12:34:50Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site IPsec VPN with Strongswan</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Site-to-Site-IPsec-VPN-with-Strongswan/m-p/227451#M11446</link>
      <description>&lt;P&gt;We need more info. Where does it fail, phase 1, phase 2? Did you do any tcpdumps, debugs? Also, any relevant logs would help, for sure.&lt;/P&gt;
&lt;P&gt;Best,&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Sat, 21 Sep 2024 14:41:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Site-to-Site-IPsec-VPN-with-Strongswan/m-p/227451#M11446</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-09-21T14:41:06Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site IPsec VPN with Strongswan</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Site-to-Site-IPsec-VPN-with-Strongswan/m-p/227523#M11455</link>
      <description>&lt;P&gt;Hello Sir,&lt;/P&gt;&lt;P&gt;VPN debug logs &amp;amp; VPN tunnel screenshot attached herewith.&lt;/P&gt;</description>
      <pubDate>Mon, 23 Sep 2024 09:28:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Site-to-Site-IPsec-VPN-with-Strongswan/m-p/227523#M11455</guid>
      <dc:creator>ANANTADSULE</dc:creator>
      <dc:date>2024-09-23T09:28:43Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site IPsec VPN with Strongswan</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Site-to-Site-IPsec-VPN-with-Strongswan/m-p/227528#M11457</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Informational exchange: Sending notification to peer: Invalid IKE SPI IKE SPIs: 0faf1db83dbbed18:f534262a58300b19, Refer to sk181787 for elaboration on this reason&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 23 Sep 2024 10:20:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Site-to-Site-IPsec-VPN-with-Strongswan/m-p/227528#M11457</guid>
      <dc:creator>ANANTADSULE</dc:creator>
      <dc:date>2024-09-23T10:20:14Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site IPsec VPN with Strongswan</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Site-to-Site-IPsec-VPN-with-Strongswan/m-p/227529#M11458</link>
      <description>&lt;P&gt;will check later.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Mon, 23 Sep 2024 10:38:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Site-to-Site-IPsec-VPN-with-Strongswan/m-p/227529#M11458</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-09-23T10:38:13Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site IPsec VPN with Strongswan</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Site-to-Site-IPsec-VPN-with-Strongswan/m-p/227534#M11459</link>
      <description>&lt;P&gt;Only Phase 1 comes up &amp;amp; then got down&lt;/P&gt;</description>
      <pubDate>Mon, 23 Sep 2024 11:16:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Site-to-Site-IPsec-VPN-with-Strongswan/m-p/227534#M11459</guid>
      <dc:creator>ANANTADSULE</dc:creator>
      <dc:date>2024-09-23T11:16:14Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site IPsec VPN with Strongswan</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Site-to-Site-IPsec-VPN-with-Strongswan/m-p/227537#M11460</link>
      <description>&lt;P&gt;Just had a quick look and I see below messages. I would make sure everything in phase 1 is matching, including pSK, because there are only so many things that could be mismatched. Also, is this supposed to be permanent tunnel or not? I ask because it shows DPD errors.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Line 707: [iked 11923 4156895088]@AMALCO-HO[23 Sep 14:44:44] fwipsechost_from_ipxaddr: calling GetEntryXIsakmpObjectsHash for 13.126.XX.XX returned obj: 0x91d1ee8&lt;BR /&gt;Line 716: [iked 11923 4156895088]@AMALCO-HO[23 Sep 14:44:44] GetEntryXIsakmpObjectsHash: received ipaddr: 13.126.XX.XX as key, found fwobj: AWS_VPN_BSNL&lt;BR /&gt;Line 717: [iked 11923 4156895088]@AMALCO-HO[23 Sep 14:44:44] fwipsechost_from_ipxaddr: calling GetEntryXIsakmpObjectsHash for 13.126.XX.XX returned obj: 0x91d1ee8&lt;BR /&gt;Line 718: [iked 11923 4156895088]@AMALCO-HO[23 Sep 14:44:44] canonize_gw: Canonized ip is the same as original ip 13.126.XX.XX&lt;BR /&gt;Line 721: [iked 11923 4156895088]@AMALCO-HO[23 Sep 14:44:44][tunnel] UDPConnection::UDPConnection: Enter (copy ctor) peer: 13.126.XX.XX&lt;BR /&gt;Line 728: [iked 11923 4156895088]@AMALCO-HO[23 Sep 14:44:44][ikev2] ikeExchangeFlowHandler::createResponderExchange: entering. peer: 13.126.XX.XX, peer_ip: 13.126.XX.XX, my_ip: 59.94.XX.XX, port: 4500, local_os_ifn: 0, local_ifn: -1&lt;BR /&gt;Line 735: [iked 11923 4156895088]@AMALCO-HO[23 Sep 14:44:44][ikev2] peer: (ext addr: 13.126.XX.XX). peer_ip: 0.0.0.0 Using port 4500&lt;BR /&gt;Line 741: [iked 11923 4156895088]@AMALCO-HO[23 Sep 14:44:44][ikev2] doCreateOrder: enter with peer 13.126.XX.XX peer_ip 13.126.XX.XX&lt;BR /&gt;Line 742: [iked 11923 4156895088]@AMALCO-HO[23 Sep 14:44:44][ikev2] ikev2Mediator::getIKEPeerObj: entering: ipaddr 13.126.XX.XX&lt;BR /&gt;Line 743: [iked 11923 4156895088]@AMALCO-HO[23 Sep 14:44:44] GetEntryXIsakmpObjectsHash: received ipaddr: 13.126.XX.XX as key, found fwobj: AWS_VPN_BSNL&lt;BR /&gt;Line 744: [iked 11923 4156895088]@AMALCO-HO[23 Sep 14:44:44] fwipsechost_from_ipxaddr: calling GetEntryXIsakmpObjectsHash for 13.126.XX.XX returned obj: 0x91d1ee8&lt;BR /&gt;Line 749: [iked 11923 4156895088]@AMALCO-HO[23 Sep 14:44:44][ikev2] ikeSimpOrder::createVpnDbHandle: found a common community with 13.126.XX.XX. Not using granular crypto settings.&lt;BR /&gt;Line 755: [iked 11923 4156895088]@AMALCO-HO[23 Sep 14:44:44][ikev2] ikeSimpOrder::setIPs: Set Peer: 13.126.XX.XX, IP to use: 13.126.XX.XX&lt;BR /&gt;Line 756: [iked 11923 4156895088]@AMALCO-HO[23 Sep 14:44:44][ikev2] ikeSimpOrder::setTunnelIPs: Peer: 13.126.XX.XX, My_ip: 0.0.0.0 Peer_ip: 0.0.0.0, local_ifn -1, local_os_ifn 0&lt;BR /&gt;Line 806: [iked 11923 4156895088]@AMALCO-HO[23 Sep 14:44:44][ikev2] peer: (ext addr: 13.126.XX.XX). peer_ip: 0.0.0.0 Using port 4500&lt;BR /&gt;Line 819: [iked 11923 4156895088]@AMALCO-HO[23 Sep 14:44:44][ikev2] peer: (ext addr: 13.126.XX.XX). peer_ip: 0.0.0.0 Using port 4500&lt;BR /&gt;Line 836: [iked 11923 4156895088]@AMALCO-HO[23 Sep 14:44:44] canonize_gw_legacy: enter 13.126.XX.XX&lt;BR /&gt;Line 837: [iked 11923 4156895088]@AMALCO-HO[23 Sep 14:44:44] GetEntryXIsakmpObjectsHash: received ipaddr: 13.126.XX.XX as key, found fwobj: AWS_VPN_BSNL&lt;BR /&gt;Line 869: [iked 11923 4156895088]@AMALCO-HO[23 Sep 14:44:44][io] [SOCKETS][IKE]: Sending 84 IKE bytes to 13.126.XX.XX&lt;BR /&gt;Line 870: [iked 11923 4156895088]@AMALCO-HO[23 Sep 14:44:44][ikev2] ikev2Mediator::sendPacket: Sent 80 bytes using NAT-T (IPv4) to 13.126.XX.XX&lt;BR /&gt;Line 1052: [iked 11923 4156895088]@AMALCO-HO[23 Sep 14:44:54][tunnel] tnlmon_transmitter_cb: entering: key &amp;lt;13.126.XX.XX, 1&amp;gt;&lt;BR /&gt;Line 1054: [iked 11923 4156895088]@AMALCO-HO[23 Sep 14:44:54] canonize_gw_legacy: enter 13.126.XX.XX&lt;BR /&gt;Line 1055: [iked 11923 4156895088]@AMALCO-HO[23 Sep 14:44:54] GetEntryXIsakmpObjectsHash: received ipaddr: 13.126.XX.XX as key, found fwobj: AWS_VPN_BSNL&lt;BR /&gt;Line 1057: [iked 11923 4156895088]@AMALCO-HO[23 Sep 14:44:54][tunnel] tnlmon_transmitter_cb: Gateway IP is: 13.126.XX.XX&lt;BR /&gt;Line 1058: [iked 11923 4156895088]@AMALCO-HO[23 Sep 14:44:54][tunnel] tnlmon_transmitter_cb: try to send DPD Request to GW 13.126.XX.XX&lt;BR /&gt;Line 1059: [iked 11923 4156895088]@AMALCO-HO[23 Sep 14:44:54][tunnel] tnlmon_transmitter_cb: pKey-&amp;gt;gateway:13.126.XX.XX, pKey-&amp;gt;type:1, timeout:30&lt;BR /&gt;Line 1060: [iked 11923 4156895088]@AMALCO-HO[23 Sep 14:44:54][tunnel] send_dpd: entering: peer 13.126.XX.XX, transmitter_interval 30&lt;BR /&gt;Line 1061: [iked 11923 4156895088]@AMALCO-HO[23 Sep 14:44:54][tunnel] get_dpd_initiator_peers_hash: search for peer 13.126.XX.XX&lt;BR /&gt;Line 1062: [iked 11923 4156895088]@AMALCO-HO[23 Sep 14:44:54][tunnel] get_dpd_initiator_peers_hash: found peer 13.126.XX.XX in dpd_initiator_peers hash&lt;BR /&gt;Line 1064: [iked 11923 4156895088]@AMALCO-HO[23 Sep 14:44:54][tunnel] get_dpd_initiator_peers_hash: search for peer 13.126.XX.XX&lt;BR /&gt;Line 1065: [iked 11923 4156895088]@AMALCO-HO[23 Sep 14:44:54][tunnel] get_dpd_initiator_peers_hash: found peer 13.126.XX.XX in dpd_initiator_peers hash&lt;BR /&gt;Line 1066: [iked 11923 4156895088]@AMALCO-HO[23 Sep 14:44:54][tunnel] update_peer_in_dpd_initiator_peers_hash: peer 13.126.XX.XX, call CB: 1&lt;BR /&gt;Line 1067: [iked 11923 4156895088]@AMALCO-HO[23 Sep 14:44:54] GetEntryXIsakmpObjectsHash: received ipaddr: 13.126.XX.XX as key, found fwobj: AWS_VPN_BSNL&lt;BR /&gt;Line 1068: [iked 11923 4156895088]@AMALCO-HO[23 Sep 14:44:54] fwipsechost_from_ipxaddr: calling GetEntryXIsakmpObjectsHash for 13.126.XX.XX returned obj: 0x91d1ee8&lt;BR /&gt;Line 1075: [iked 11923 4156895088]@AMALCO-HO[23 Sep 14:44:54][tunnel] send_dpd_notification: entering: peer 13.126.XX.XX&lt;BR /&gt;Line 1076: [iked 11923 4156895088]@AMALCO-HO[23 Sep 14:44:54][tunnel] get_dpd_initiator_peers_hash: search for peer 13.126.XX.XX&lt;BR /&gt;Line 1077: [iked 11923 4156895088]@AMALCO-HO[23 Sep 14:44:54][tunnel] get_dpd_initiator_peers_hash: found peer 13.126.XX.XX in dpd_initiator_peers hash&lt;BR /&gt;Line 1078: [iked 11923 4156895088]@AMALCO-HO[23 Sep 14:44:54] GetEntryXIsakmpObjectsHash: received ipaddr: 13.126.XX.XX as key, found fwobj: AWS_VPN_BSNL&lt;BR /&gt;Line 1079: [iked 11923 4156895088]@AMALCO-HO[23 Sep 14:44:54] fwipsechost_from_ipxaddr: calling GetEntryXIsakmpObjectsHash for 13.126.XX.XX returned obj: 0x91d1ee8&lt;BR /&gt;Line 1084: [iked 11923 4156895088]@AMALCO-HO[23 Sep 14:44:54][ikev2] invoke_send_DPD: enter with peer: 13.126.XX.XX peer_ip: inx invalid type (0) my_ip: inx invalid type (0) local_ifn: -1&lt;BR /&gt;Line 1085: [iked 11923 4156895088]@AMALCO-HO[23 Sep 14:44:54][ikev2] ikev2Mediator::getSPIsByPeer: looking in peer_ikesa table for: &amp;lt;peer=13.126.XX.XX, user_hash=0, local_ifn=-1, peer_ip=inx invalid type (0)&amp;gt; ip_type=1&lt;BR /&gt;Line 1092: [iked 11923 4156895088]@AMALCO-HO[23 Sep 14:44:54][ikev2] peer: (ext addr: 13.126.XX.XX). peer_ip: 0.0.0.0 Using port 4500&lt;BR /&gt;Line 1098: [iked 11923 4156895088]@AMALCO-HO[23 Sep 14:44:54][ikev2] ikeExchangeFlowHandler::SendDPD: Send DPD to peer 13.126.XX.XX and SPIs a62a8a4d6eb13b93:0cbf35aa7f2baf9f, timeout is 30&lt;BR /&gt;Line 1099: [iked 11923 4156895088]@AMALCO-HO[23 Sep 14:44:54][ikev2] doCreateOrder: enter with peer 13.126.XX.XX peer_ip 0.0.0.0&lt;BR /&gt;Line 1100: [iked 11923 4156895088]@AMALCO-HO[23 Sep 14:44:54][ikev2] ikev2Mediator::getIKEPeerObj: entering: ipaddr 13.126.XX.XX&lt;BR /&gt;Line 1101: [iked 11923 4156895088]@AMALCO-HO[23 Sep 14:44:54] GetEntryXIsakmpObjectsHash: received ipaddr: 13.126.XX.XX as key, found fwobj: AWS_VPN_BSNL&lt;BR /&gt;Line 1102: [iked 11923 4156895088]@AMALCO-HO[23 Sep 14:44:54] fwipsechost_from_ipxaddr: calling GetEntryXIsakmpObjectsHash for 13.126.XX.XX returned obj: 0x91d1ee8&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot_1.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/27736i9AFFFE9817B3F2BB/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Screenshot_1.png" alt="Screenshot_1.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt; &lt;/P&gt;</description>
      <pubDate>Mon, 23 Sep 2024 11:31:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Site-to-Site-IPsec-VPN-with-Strongswan/m-p/227537#M11460</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-09-23T11:31:53Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site IPsec VPN with Strongswan</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Site-to-Site-IPsec-VPN-with-Strongswan/m-p/227539#M11461</link>
      <description>&lt;P&gt;I cant sadly paste the content of the sk, as it would violate community policies, but I had a quick look at it and it pretty much alligns with what I mentioned in my last response to check settings for phase 1, that they match on both ends.&lt;/P&gt;
&lt;P&gt;Best,&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Mon, 23 Sep 2024 11:34:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Site-to-Site-IPsec-VPN-with-Strongswan/m-p/227539#M11461</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-09-23T11:34:44Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site IPsec VPN with Strongswan</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Site-to-Site-IPsec-VPN-with-Strongswan/m-p/227547#M11462</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/96699"&gt;@ANANTADSULE&lt;/a&gt;&amp;nbsp;Ping me directly if you like, we can do remote session...Im just studying for Microsoft exam I have tomorrow, but I can help, not an issue.&lt;/P&gt;
&lt;P&gt;Let me know.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Mon, 23 Sep 2024 12:06:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Site-to-Site-IPsec-VPN-with-Strongswan/m-p/227547#M11462</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-09-23T12:06:22Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site IPsec VPN with Strongswan</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Site-to-Site-IPsec-VPN-with-Strongswan/m-p/227564#M11464</link>
      <description>&lt;P&gt;You still can post a link to that SK, or just it's ID&lt;/P&gt;</description>
      <pubDate>Mon, 23 Sep 2024 13:46:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Site-to-Site-IPsec-VPN-with-Strongswan/m-p/227564#M11464</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2024-09-23T13:46:43Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site IPsec VPN with Strongswan</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Site-to-Site-IPsec-VPN-with-Strongswan/m-p/227577#M11466</link>
      <description>&lt;P&gt;Here is the link.&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/96699"&gt;@ANANTADSULE&lt;/a&gt;&amp;nbsp;, if you can access it, you can check that error mentioned, but as I mentioned, it pretty much boils down to making sure everything in phase 1 matches on both ends.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk181787" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk181787&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 23 Sep 2024 14:24:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Site-to-Site-IPsec-VPN-with-Strongswan/m-p/227577#M11466</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-09-23T14:24:50Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site IPsec VPN with Strongswan</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Site-to-Site-IPsec-VPN-with-Strongswan/m-p/227836#M11483</link>
      <description>&lt;P&gt;Yes,This is permanent tunnel.&lt;/P&gt;&lt;P&gt;What we can do to match or identify the exact issue with Phase 2.&lt;/P&gt;&lt;P&gt;Please help&lt;/P&gt;</description>
      <pubDate>Wed, 25 Sep 2024 07:00:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Site-to-Site-IPsec-VPN-with-Strongswan/m-p/227836#M11483</guid>
      <dc:creator>ANANTADSULE</dc:creator>
      <dc:date>2024-09-25T07:00:15Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site IPsec VPN with Strongswan</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Site-to-Site-IPsec-VPN-with-Strongswan/m-p/228853#M11536</link>
      <description>&lt;P&gt;Hey guys,&lt;/P&gt;
&lt;P&gt;Just to update quick, I had remote with Anant and below is what we observed.&lt;/P&gt;
&lt;P&gt;-tunnel shows as UP on both sides&lt;/P&gt;
&lt;P&gt;-on CP 1500 smb appliance, running vpn tu list peer_ike and peer_ipsec flags show entries, meaning both phase 1 and 2 are working&lt;/P&gt;
&lt;P&gt;-now, through rules are there and vpn domains are 100% correct, all works from strongswan side, but NOT cp end, log shows according to policy, packet should not have been decrypted&lt;/P&gt;
&lt;P&gt;Since there is built in gui vpn debug tool, probably good idea to give that a go. I also advised to try reset tunnel on both ends.&lt;/P&gt;
&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/96699"&gt;@ANANTADSULE&lt;/a&gt;&amp;nbsp;, if you could, I would also reboot smb after hours.&lt;/P&gt;
&lt;P&gt;Alternatively, I would also open TAC case and see what they say. Sorry mate, wish I was more skilled with smb appliances...&lt;/P&gt;
&lt;P&gt;Best,&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Thu, 03 Oct 2024 12:51:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Site-to-Site-IPsec-VPN-with-Strongswan/m-p/228853#M11536</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-10-03T12:51:59Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site IPsec VPN with Strongswan</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Site-to-Site-IPsec-VPN-with-Strongswan/m-p/228934#M11545</link>
      <description>&lt;P&gt;Dear all,&lt;/P&gt;&lt;P&gt;I have opened case&lt;A class="" title="6-0004079065" href="https://help.checkpoint.com/s/case/500J5000005u16pIAA/ip-sec-site-to-site-vpn-with-3rd-party" target="_blank" rel="noopener noreferrer"&gt; ID 6-0004079065&lt;/A&gt; with TAC &amp;amp; hope for quicker resolution.&lt;/P&gt;&lt;P&gt;I also request you all the experts and checkpoint team to support in this issue.&lt;/P&gt;&lt;P&gt;Thanks Andy for your valuable time.&lt;/P&gt;&lt;P&gt;Your help is highly appreciated.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 04 Oct 2024 11:34:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Site-to-Site-IPsec-VPN-with-Strongswan/m-p/228934#M11545</guid>
      <dc:creator>ANANTADSULE</dc:creator>
      <dc:date>2024-10-04T11:34:40Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site IPsec VPN with Strongswan</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Site-to-Site-IPsec-VPN-with-Strongswan/m-p/228955#M11548</link>
      <description>&lt;P&gt;Any time man, I am always happy to do remote. Please show TAC things we checked over zoom, I believe its important.&lt;/P&gt;
&lt;P&gt;Best,&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Fri, 04 Oct 2024 18:06:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Site-to-Site-IPsec-VPN-with-Strongswan/m-p/228955#M11548</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-10-04T18:06:57Z</dc:date>
    </item>
  </channel>
</rss>

