Site-to-Site IPSec between Check Point and 3rd Party Gateway: Sophos
Issue is present on VSX deployment on one Virtual System
We've checked the policy several times, and there is no issues like lifetime mismatch, etc...
VPN Tunnel is up but we keep receiving errors:
Informational Exchange Received: Delete IPSEC-SA from Peer: X.X.X.X; SPIs: 00003ada
Tunnel with IKEv1 is up, with IKEv2 is down with error:
Quick Mode Failed to match proposal: Transform: AES-256, SHA1, Group 2 (1024 bit), Tunnel; Reason: Wrong value for: Key Length
DPD Responder Mode:is enabled
"Note: The DPD mechanism is based on IKE SA keys. In some situations, the Check Point Security Gateway deletes IKE SAs, and a VPN peer, usually a 3rd Party gateway, sends DPD requests and does not receive a response. As a result, the VPN peer concludes that the Check Point Security Gateway is down. The VPN peer can then delete the IKE and IPsec keys, which causes encrypted traffic from the Check Point Security Gateway to be dropped by the remote peer."
In SmartConsole
click Menu > Global properties > Advanced > ConfigureClick VPN Advanced Properties > VPN IKE properties.
Select keep_IKE_SAs.
Click OK.
Install the Access Control Policy. - this is already enable
Should I try to change the settings with GuiDBEdit Tool?
___________________________________________________________________
I have no experience in working with DPD and I need someone who can help me with that.
Am I even looking in the right direction?
Many thanks!