<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: CP1575 L2TP VPN Remote Access in Spark Firewall (SMB)</title>
    <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/CP1575-L2TP-VPN-Remote-Access/m-p/272151#M13716</link>
    <description>&lt;P&gt;The connection was established successfully,&lt;BR /&gt;your advice helped.&lt;/P&gt;&lt;P&gt;The following restrictions apply:&lt;BR /&gt;the 'IP address for Office Mode' parameter must be set in the Remote Access Users.&lt;BR /&gt;Authorization algorithm - only SHA1&lt;BR /&gt;PFS Group - only modp1024&lt;/P&gt;&lt;P&gt;I tried to influence the PFS Group using the parameter,&lt;BR /&gt;\\SOFTWARE\\CheckPoint\\VPN1 users_hash_capacity&lt;BR /&gt;replacing the value with 2048,&lt;BR /&gt;but to no avail — the connection was don't established.&lt;/P&gt;&lt;P&gt;Can you tell me how to correctly configure the authorization algorithm and PFS Group parameters?&lt;/P&gt;</description>
    <pubDate>Sat, 28 Feb 2026 13:31:34 GMT</pubDate>
    <dc:creator>PavelSpiridonov</dc:creator>
    <dc:date>2026-02-28T13:31:34Z</dc:date>
    <item>
      <title>CP1575 L2TP VPN Remote Access</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/CP1575-L2TP-VPN-Remote-Access/m-p/271821#M13694</link>
      <description>&lt;P&gt;Hello!&lt;/P&gt;&lt;P&gt;When attempting to establish an L2TP VPN connection between the CP1575 and a third-party router (Mikrotik),&lt;BR /&gt;an error occurs: 'IKE failure: Quick Mode New DH key received during Quick Mode from peer, but Perfect Forward Secrecy is not set in the community.'&lt;BR /&gt;However, the standard Windows L2TP client successfully connects to the CP1575.&lt;/P&gt;&lt;P&gt;This issue has already been discussed, but in that case, the client was Linux.&lt;/P&gt;&lt;P&gt;Unfortunately, the Linux solution isn't applicable in my case:&lt;BR /&gt;the Mikrotik L2TP client doesn't have an option to affect the PFS parameter.&lt;/P&gt;&lt;P&gt;I noticed that the CP1575 has an 'Enable PFS' setting.&lt;BR /&gt;However, it's only available under 'Site to Site VPN'.&lt;BR /&gt;Is it possible to find such a setting for L2TP VPN?&lt;BR /&gt;Perhaps it can be found through the Gaia Clish?&lt;/P&gt;</description>
      <pubDate>Tue, 24 Feb 2026 09:01:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/CP1575-L2TP-VPN-Remote-Access/m-p/271821#M13694</guid>
      <dc:creator>PavelSpiridonov</dc:creator>
      <dc:date>2026-02-24T09:01:28Z</dc:date>
    </item>
    <item>
      <title>Re: CP1575 L2TP VPN Remote Access</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/CP1575-L2TP-VPN-Remote-Access/m-p/271885#M13702</link>
      <description>&lt;P&gt;You can try to do the following two in Expert mode:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;ckp_regedit -a \\SOFTWARE\\CheckPoint\\VPN1 force_ra_pfs -n 1&lt;/LI&gt;
&lt;LI&gt;fw_configload&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;These steps are similar to what's in the Remote Access VPN on non-Spark gateways:&amp;nbsp;&lt;A href="https://sc1.checkpoint.com/documents/R82/WebAdminGuides/EN/CP_R82_RemoteAccessVPN_AdminGuide/Content/Topics-VPNRG/Remote-Access-Advanced-Configuration.htm#Perfect_Forward_Secrecy_(PFS)" target="_blank"&gt;https://sc1.checkpoint.com/documents/R82/WebAdminGuides/EN/CP_R82_RemoteAccessVPN_AdminGuide/Content/Topics-VPNRG/Remote-Access-Advanced-Configuration.htm#Perfect_Forward_Secrecy_(PFS)&lt;/A&gt;&lt;BR /&gt;The second step is the "install security policy" step.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 24 Feb 2026 23:42:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/CP1575-L2TP-VPN-Remote-Access/m-p/271885#M13702</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2026-02-24T23:42:47Z</dc:date>
    </item>
    <item>
      <title>Re: CP1575 L2TP VPN Remote Access</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/CP1575-L2TP-VPN-Remote-Access/m-p/272151#M13716</link>
      <description>&lt;P&gt;The connection was established successfully,&lt;BR /&gt;your advice helped.&lt;/P&gt;&lt;P&gt;The following restrictions apply:&lt;BR /&gt;the 'IP address for Office Mode' parameter must be set in the Remote Access Users.&lt;BR /&gt;Authorization algorithm - only SHA1&lt;BR /&gt;PFS Group - only modp1024&lt;/P&gt;&lt;P&gt;I tried to influence the PFS Group using the parameter,&lt;BR /&gt;\\SOFTWARE\\CheckPoint\\VPN1 users_hash_capacity&lt;BR /&gt;replacing the value with 2048,&lt;BR /&gt;but to no avail — the connection was don't established.&lt;/P&gt;&lt;P&gt;Can you tell me how to correctly configure the authorization algorithm and PFS Group parameters?&lt;/P&gt;</description>
      <pubDate>Sat, 28 Feb 2026 13:31:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/CP1575-L2TP-VPN-Remote-Access/m-p/272151#M13716</guid>
      <dc:creator>PavelSpiridonov</dc:creator>
      <dc:date>2026-02-28T13:31:34Z</dc:date>
    </item>
    <item>
      <title>Re: CP1575 L2TP VPN Remote Access</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/CP1575-L2TP-VPN-Remote-Access/m-p/272251#M13721</link>
      <description>&lt;P&gt;Not sure it is possible to do that, unfortunately.&lt;BR /&gt;Suggest consulting with TAC.&lt;/P&gt;</description>
      <pubDate>Mon, 02 Mar 2026 17:41:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/CP1575-L2TP-VPN-Remote-Access/m-p/272251#M13721</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2026-03-02T17:41:12Z</dc:date>
    </item>
  </channel>
</rss>

