- Products
- Learn
- Local User Groups
- Partners
- More
MVP 2026: Submissions
Are Now Open!
What's New in R82.10?
Watch NowOverlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
Hello guys 🙂
We are trying to implement a site to site VPN, and we are getting the "Encryption Failure: according to the policy the packet should not have been decrypted" error message.
I would like to know if you have some recommendations about it, and if it's rather good to open an SR to check this,
The details are:
Error message:
Domains:
Local domain
172.18.8.0/24
Remote Domain
172.20.1.0/24
Local and remote domains on the other company side:
Recent troubleshooting details:
1.- We checked that remote network is configured on the antispoofing interface exceptions.
2.- As showed on the latest images, domain configuration matches on both sides
3.- Configured on Gaia remote network routes:
3.1.- In fact, despite the static route, a show route destination against the remote network shows de default route (Internet) as next hop:
4.- We have tried using and inbound NAT, but error message persists either with or without NAT.
5.- Some people at work said that the remote device (A linksys small business VPN router) might be incompatible with our R80.20 Security Gateway
6.- I have followed sk64060 recommendations, but, despite I have changed in many times the remote and local subnets, verified the encryption domain configurations, and also reseted the tunnel via SmartView Monitor and the vpn tu utility, we are still getting the same error message.
Thank you in advance!
Heine
Hello Benedikt, first of all, thank you!
In fact, our customer in its local domain had the whole class B network from 172.16.0.0 to 172.31.255.255.
I realized of that after running the script that you gave me on your reply.
So, thank you again and sorry for not notice about the main cause of my issue.
Greetings!
Hi, i just ran into the same error. We have a similiar setup. We checked everything like you and found no typical error.
In our case, both CPs were centrally managed. We split a giant /16 net into multiple /24's in Site A and adjusted the routing. After re-reading the Topology in Site A(Network management -> get interfaces) , pushing the policy to the gateway, the CP in Site B had this error messages, while the CP in Site A was passing it normally.
After some time, i figured out that the CP in Site B also needs a policy installation after editing the Topology on Site A, because otherwise it doesnt seem to match. Worth to mention, in Site A we are using the "... based on routing information" Feature for Topology and VPN Domain.
Hope it helps somebody
Cheers
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 19 | |
| 17 | |
| 14 | |
| 8 | |
| 7 | |
| 3 | |
| 3 | |
| 3 | |
| 3 | |
| 2 |
Tue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Thu 18 Dec 2025 @ 10:00 AM (CET)
Cloud Architect Series - Building a Hybrid Mesh Security Strategy across cloudsTue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Thu 18 Dec 2025 @ 10:00 AM (CET)
Cloud Architect Series - Building a Hybrid Mesh Security Strategy across cloudsAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY