<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Site to site VPN drops with Dynamic DNS in Spark Firewall (SMB)</title>
    <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Site-to-site-VPN-drops-with-Dynamic-DNS/m-p/156073#M7289</link>
    <description>&lt;P&gt;Thanks mate, I will take a look at those SKs and provide more information.&lt;/P&gt;&lt;P&gt;P.S. When I type&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;[Expert@appliance]# fw ctl get int vpn_force_nat_t
vpn_force_nat_t = 0&lt;/LI-CODE&gt;&lt;P&gt;it's disabled on every appliance.&lt;/P&gt;</description>
    <pubDate>Wed, 31 Aug 2022 11:13:07 GMT</pubDate>
    <dc:creator>obsidian11</dc:creator>
    <dc:date>2022-08-31T11:13:07Z</dc:date>
    <item>
      <title>Site to site VPN drops with Dynamic DNS</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Site-to-site-VPN-drops-with-Dynamic-DNS/m-p/155889#M7277</link>
      <description>&lt;P&gt;Greetings,&lt;/P&gt;&lt;P&gt;I'm wondering what can cause this issue, I have 2 appliances (locally managed) from&amp;nbsp;&lt;EM&gt;Check Point 700&lt;/EM&gt;&lt;SPAN&gt;&amp;nbsp;Appliance family&amp;nbsp;&lt;/SPAN&gt;(730 &amp;amp; 790). On both of them, there is DDNS feature enabled (because those two are DAIP gateways - don't have static WAN IP), provider is no-ip.com and domains *.ddns.net&amp;nbsp;successfully point to proper dynamic IPs.&lt;/P&gt;&lt;P&gt;When my friends and I try to establish site to site vpn between those peers, when we put IP addresses (dynamic ones) everything seems fine. However, when we put host names instead of those IPs, tunnel won't go up.&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Has anyone run into the same problem?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;P.S. Other settings are default ones (authentication: pre-shared secret; encryption: default etc.)&lt;/P&gt;</description>
      <pubDate>Mon, 29 Aug 2022 13:02:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Site-to-site-VPN-drops-with-Dynamic-DNS/m-p/155889#M7277</guid>
      <dc:creator>obsidian11</dc:creator>
      <dc:date>2022-08-29T13:02:23Z</dc:date>
    </item>
    <item>
      <title>Re: Site to site VPN drops with Dynamic DNS</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Site-to-site-VPN-drops-with-Dynamic-DNS/m-p/155895#M7278</link>
      <description>&lt;P&gt;Did you follow this sk:&amp;nbsp;&lt;A class="cp_link sc_ellipsis" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk109048&amp;amp;partition=Advanced&amp;amp;product=IPSec" target="_blank"&gt;sk109048: How to create Site-to-Site VPN between 2 locally managed DAIP 1100/600 Appliances&lt;/A&gt;&amp;nbsp;?&lt;/P&gt;
&lt;P&gt;This one is newer:&amp;nbsp;&lt;A class="cp_link sc_ellipsis" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk112213&amp;amp;partition=Advanced&amp;amp;product=Quantum" target="_blank"&gt;sk112213: How to configure Certificate based Site to Site VPN between two locally managed SMB Appliances&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 29 Aug 2022 13:12:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Site-to-site-VPN-drops-with-Dynamic-DNS/m-p/155895#M7278</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2022-08-29T13:12:40Z</dc:date>
    </item>
    <item>
      <title>Re: Site to site VPN drops with Dynamic DNS</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Site-to-site-VPN-drops-with-Dynamic-DNS/m-p/156064#M7287</link>
      <description>&lt;P&gt;Honestly I didn't try this certificate based configuration (as I said, all other gateways are configured via pre-shared key for s2s vpn), but what I did after reading those 2 articles/guides was&amp;nbsp;reinitializing certificates and now I have 2 scenarios..&lt;/P&gt;&lt;P&gt;There is always green checkmark (tunnels are up), but..&lt;/P&gt;&lt;P&gt;When I put hostname for the first gateway, and dynamic IP for the second gateway everything works fine.&lt;/P&gt;&lt;P&gt;However, if I put hostnames for both gateways, there is still green checkmark (signalizing that tunnel is up), but it's not working..&lt;/P&gt;&lt;P&gt;Any ideas why this happens? I mean configurations are almost same as other gateways from same appliances family.&lt;/P&gt;</description>
      <pubDate>Wed, 31 Aug 2022 10:14:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Site-to-site-VPN-drops-with-Dynamic-DNS/m-p/156064#M7287</guid>
      <dc:creator>obsidian11</dc:creator>
      <dc:date>2022-08-31T10:14:27Z</dc:date>
    </item>
    <item>
      <title>Re: Site to site VPN drops with Dynamic DNS</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Site-to-site-VPN-drops-with-Dynamic-DNS/m-p/156072#M7288</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Could be a NAT-T issue, see sk167116: In locally managed appliances, the parameter "vpn_force_nat_t" does not force NAT-T if the remote site is configured using a hostname. Refer to &lt;/SPAN&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk162472" target="_blank" rel="noopener"&gt;sk162472&lt;/A&gt;&lt;SPAN&gt; for more information.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;LI-WRAPPER&gt;&lt;/LI-WRAPPER&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 31 Aug 2022 10:35:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Site-to-site-VPN-drops-with-Dynamic-DNS/m-p/156072#M7288</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2022-08-31T10:35:08Z</dc:date>
    </item>
    <item>
      <title>Re: Site to site VPN drops with Dynamic DNS</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Site-to-site-VPN-drops-with-Dynamic-DNS/m-p/156073#M7289</link>
      <description>&lt;P&gt;Thanks mate, I will take a look at those SKs and provide more information.&lt;/P&gt;&lt;P&gt;P.S. When I type&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;[Expert@appliance]# fw ctl get int vpn_force_nat_t
vpn_force_nat_t = 0&lt;/LI-CODE&gt;&lt;P&gt;it's disabled on every appliance.&lt;/P&gt;</description>
      <pubDate>Wed, 31 Aug 2022 11:13:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Site-to-site-VPN-drops-with-Dynamic-DNS/m-p/156073#M7289</guid>
      <dc:creator>obsidian11</dc:creator>
      <dc:date>2022-08-31T11:13:07Z</dc:date>
    </item>
  </channel>
</rss>

