Hi
I got a route based VPN between 1575 SMB and a 6500 gateways.
On Smartconsole it looks like this:
![smartconsole-test7.JPG smartconsole-test7.JPG](https://community.checkpoint.com/t5/image/serverpage/image-id/27549i9EA5084D342C9EB6/image-size/large?v=v2&px=999)
Where the SMB that got the problem is test7
![test71.JPG test71.JPG](https://community.checkpoint.com/t5/image/serverpage/image-id/27550i373A92C890ADE550/image-size/large?v=v2&px=999)
On Smartevent monitor test7 is waiting:
![test72.JPG test72.JPG](https://community.checkpoint.com/t5/image/serverpage/image-id/27551i751ADADC4A1934E1/image-size/large?v=v2&px=999)
The problem began immediately after upgrading the SMS to take 76.
What’s odd is that the tunnel is still functioning correctly. On the other side, there’s a Cisco AP that connects to its WLC on my side without any issues!
I checked sic_info.elg on SMB I could see this log:
CLIENT; process: fw; my port: 42545; peer port: 18191; my ip addr: 192.168.7.10; peer ip addr: x.x.x.x; sic service type: EntitlementManager; fwasync state: SIC_CLIENT_GET_SICNAME; error id: 111; SIC Error for EntitlementManager: Peer sent wrong DN: CN=fw01,O=xxxx.xxxx.xxxx.xxxxxx
On 6500 cluster object the CN=fwcl
I wonder why the SMB is getting CN=fw01, where fw01 is a gateway on fwcl cluster!
How to import the correct certificate to the SMB, is it "Reinitialize Trusted communication"?