- Products
- Learn
- Local User Groups
- Partners
- More
MVP 2026: Submissions
Are Now Open!
What's New in R82.10?
10 December @ 5pm CET / 11am ET
Announcing Quantum R82.10!
Learn MoreOverlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
Hello
i configured s2s vpn between checkpoint(R80.10) and sophos xg firewall. sophos behind networks can access to our networks.but dns request not running. sophos network can ping to the dns server. bunt not resolve name. i took some dumps.and i saw that sophos sent DNS request and checkpoint took Dns request and sent to the dns server and Dns server answered to the request.and checkpoint sent dns answer to the sophos. but i can not see the dns answer with tcpdump on sophos. when i checked logs,i saw these logs:



Based on your TCP dump your dns traffic is leaving in the clear and not passing through the vpn tunnel. I think need to configure the DNS implied rules in global properties to be set to last or before last (Any Traffic matches implied rules will not be encrypted) and make sure you have a configure rule in the policy to allow DNS

The log that you attached doesn't give me much information because it don't see which protocol or ports, it means you have key management issue and the checkpoint tried to encrypt packet but it doesn't have key for it. You need to run vpnd and ike debug to see which side is deleting the keys and make sure that the encrytion domains are configured correctly on both sides.
Thanks
i am attaching log screen again.i have already enabled "Accept domain name over udp".but nothing changed.
how can i understand that traffic entered to the vpn tunnel with tcpdump? what i must see in log screen?


Start here: Troubleshooting "No valid SA" error
It seems key management issue. for some reason the peer sending traffic using a key that is no longer exists on checkpoint gateway.
You might need a TAC ticket. Double check the encryption domains on both sides and try IKEV1 to make troubleshooting easier.
if encryption domain correct and checkpoint proposing the correct network IDs try Scenario 4 from the following SK
Hi
our version is r80.10 take 112 and the problem is solved for our version at scenario 4 in sk which you said.
i saw that i can see traffics in and out direction when remote side send dns traffic.(traffic was accepting with implied rule)

when we monitored with fw monitor, i saw incoming traffic but i couldnt see outgoing traffic for dns traffic.
i realized that if remote side send icmp traffic, everything is ok,i can see incoming and outgoing traffic.

i saw that some spi deletion. i dont know its normal or not
thanks
You are filtering for the private IPs. you need wide open packet captures.when traffic gets encrypted you see ESP packet with the public IPs of the firewalls. R80.10 has the following i I o O e E(R77.30 has i I o O)
the traffic will be encrypted between e and E.
For the SA deletion as long both sides delete the keys based on the request and negotiate new keys that should be ok, we need to avoid situation where one side deleted a key and the other side still using it for encryption.
Thanks
Hello
i took new dump. i cant see "eE" state. our version .s 80.10. is it normal?

remote side dump:

you still filtering. you need to do fw monitor without filtered and dump it to a file after that review in wireshark.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 16 | |
| 12 | |
| 8 | |
| 7 | |
| 7 | |
| 4 | |
| 3 | |
| 3 | |
| 2 | |
| 2 |
Fri 12 Dec 2025 @ 10:00 AM (CET)
Check Mates Live Netherlands: #41 AI & Multi Context ProtocolTue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Fri 12 Dec 2025 @ 10:00 AM (CET)
Check Mates Live Netherlands: #41 AI & Multi Context ProtocolTue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Thu 18 Dec 2025 @ 10:00 AM (CET)
Cloud Architect Series - Building a Hybrid Mesh Security Strategy across cloudsAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY