- Products
- Learn
- Local User Groups
- Partners
- More
Step Into the Future of
AI-Powered Cyber Security
The State of Ransomware Q1 2026
Key Trends and Their Impact
AI Security Masters E8:
Claude Mythos: New Era in Cyber Security
Blueprint Architecture for Securing
The AI Factory & AI Data Center
Call For Papers
Your Expertise. Our Stage
CheckMates Go:
CheckMates Fest
Site-to-Site IPSec between Check Point and 3rd Party Gateway: Sophos
Issue is present on VSX deployment on one Virtual System
We've checked the policy several times, and there is no issues like lifetime mismatch, etc...
VPN Tunnel is up but we keep receiving errors:
Informational Exchange Received: Delete IPSEC-SA from Peer: X.X.X.X; SPIs: 00003ada
Tunnel with IKEv1 is up, with IKEv2 is down with error:
Quick Mode Failed to match proposal: Transform: AES-256, SHA1, Group 2 (1024 bit), Tunnel; Reason: Wrong value for: Key Length
DPD Responder Mode:is enabled
"Note: The DPD mechanism is based on IKE SA keys. In some situations, the Check Point Security Gateway deletes IKE SAs, and a VPN peer, usually a 3rd Party gateway, sends DPD requests and does not receive a response. As a result, the VPN peer concludes that the Check Point Security Gateway is down. The VPN peer can then delete the IKE and IPsec keys, which causes encrypted traffic from the Check Point Security Gateway to be dropped by the remote peer."
In SmartConsole
click Menu > Global properties > Advanced > ConfigureClick VPN Advanced Properties > VPN IKE properties.
Select keep_IKE_SAs.
Click OK.
Install the Access Control Policy. - this is already enable
Should I try to change the settings with GuiDBEdit Tool?
DPD responder mode
Permanent tunnel mode based on DPD
___________________________________________________________________
I have no experience in working with DPD and I need someone who can help me with that.
Am I even looking in the right direction?
Many thanks!
Hey @SinisaZG
What version is this? I ask, because I believe back in R80.40, when permanent tunnel option is enabled in vpn community, there is no need to change anything in guidbedit for dpd and Im referring to below.
Andy
Sorry I I forgot to put the version. R81.20, Take 76.
The settings are the same as yours.
On your CP object participating in the vpn tunnel, IF its set to permant tunnel as below, then guidbedit should say dpd, NOT tunnel test.
Andy
I tried that already... same error.
I would make sure both cp object AND interoperable are set to dpd and same in the community and then install policy and test. If same issue, then run basic vpn debug and see what shows up on the other end.
I would also confirm 100% phase 2 settings do indeed match on both sides.
vpn debug trunc
vpn debug ikeon
-replicate the issue
vpn debug ikeoff
disable debug -> fw ctl debug 0
get ike* and vpnd* files from $FWDIR/log dir
Andy
100% phase 2 settings do indeed match on both sides - checked several times.
VPN: 'iked' is disabled. or vpn: Address 'X.X.X.X' is not handled by any IKED daemon
I will create a TAC case for this, thanks for help.
Are you sure the Sophos is not set for AES-256-GCM in Phase 2? Not the same as AES-256. As a test try setting P2 to AES-128 and see what happens.
Yep, I am sure that settings are the same. Already tried with AES-128.
See if either of below helps.
Andy
https://support.checkpoint.com/results/sk/sk13836
I will create a TAC case for this, thanks for help.
Happy to do remote if you are allowed to, let me know.
Andy
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 6 | |
| 4 | |
| 4 | |
| 3 | |
| 2 | |
| 2 | |
| 2 | |
| 2 | |
| 2 | |
| 2 |
Fri 29 May 2026 @ 09:00 AM (EDT)
Caracas: Executive Breakfast: Innovación en Ciberseguridad – IA y Threat IntelligenceTue 02 Jun 2026 @ 06:00 PM (IDT)
Under the Hood | Check Point SASE: Identity Integration & Access Policy Design Best PracticesThu 04 Jun 2026 @ 02:00 PM (CEST)
Deep Dive Webinar: New CloudGuard GWLB Deployment Without NAT Gateways - EuropeTue 02 Jun 2026 @ 06:00 PM (IDT)
Under the Hood | Check Point SASE: Identity Integration & Access Policy Design Best PracticesThu 04 Jun 2026 @ 02:00 PM (CEST)
Deep Dive Webinar: New CloudGuard GWLB Deployment Without NAT Gateways - EuropeThu 04 Jun 2026 @ 07:00 PM (IDT)
Deep Dive Webinar: New CloudGuard GWLB Deployment Without NAT Gateways - AmericaFri 12 Jun 2026 @ 10:00 AM (CEST)
CheckMates Live Netherlands - Sessie 47: Continuous Threat Exposure ManagementThu 18 Jun 2026 @ 10:00 AM (CEST)
The Cloud Architects Series: Check Point WAF - The Next Generation of AI powered protectionFri 29 May 2026 @ 09:00 AM (EDT)
Caracas: Executive Breakfast: Innovación en Ciberseguridad – IA y Threat IntelligenceAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY