I am currently testing CloudGuard Network. Previously I have a working Site-2-Site VPN working to my on-premises 6700. Both were managed by the same Management server (again on-prem).
Today I unfortunately had to change the External IP of my 6700 due to ISP requirements.
I am seeing that the 6700 is still using the old external IP which of course is failing:
# tcpdump -nni any host 20.151.201.XX and port 4500 tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on any, link-type LINUX_SLL (Linux cooked), capture size 262144 bytes
14:54:41.350998 IP 64.114.54.YY.4500 > 20.151.201.XX.4500: UDP-encap: ESP(spi=0x03270274,seq=0x163), length 100 14:54:41.351001 ethertype IPv4, IP 64.114.54.YY.4500 > 20.151.201.XX.4500: UDP-encap: ESP(spi=0x03270274,seq=0x163), length 100
14:54:41.550805 IP 64.114.54.YY.4500 > 20.151.201.XX.4500: UDP-encap: ESP(spi=0x03270274,seq=0x164), length 100 14:54:41.550807 ethertype IPv4, IP 64.114.54.YY.4500 > 20.151.201.XX.4500: UDP-encap: ESP(spi=0x03270274,seq=0x164), length 100
14:54:41.924931 IP 64.114.54.YY.4500 > 20.151.201.XX.4500: UDP-encap: ESP(spi=0x03270274,seq=0x165), length 100 14:54:41.924933 ethertype IPv4, IP 64.114.54.YY.4500 > 20.151.201.XX.4500: UDP-encap: ESP(spi=0x03270274,seq=0x165), length 100
The only way I have fixed this previously is to push a new policy, which I can't do with the policy down.
My next thought is to attach a new temp public IP to the backend vnet, but I think the policy will block that too.
I do have a case open with Support, but thought I would try here as well.
Anything else I can try?