- Products
- Learn
- Local User Groups
- Partners
- More
MVP 2026: Submissions
Are Now Open!
What's New in R82.10?
Watch NowOverlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
We currently utilize certificate based VPNs between our main cluster and Fortinet and Starlink appliances.
These devices are installed on moving devices.
We see that the VPNs are established but after a while they go down and we were in logs the different types of errors:
"Main mode local machine configured not to responde to unknow IP address and or not included in the remoteaccess community"
"VPN failed to resolve gateway IP address"
We analyzed the SK related to these issues but we understand that they do not apply to this case.
We were also surprised to see inconsistencies in the IPs we had in the established tunnels when we consulted them through the VPN tu tlist command.
Does anyone have any suggestion of what we could analyze?
What is the sk?
Hi
The SK are sk132332, sk119301 and sk117713 but none of them apply to our case
I assume these "moving devices" are Dynamic IP.
Are the necessary interoperable objects defined as such?
One issue with DAIP VPN endpoints is that we don't know what IP address they're coming from.
In the case of a Check Point-managed gateway, most likely there is a persistent connection with management that we can use to determine the remote IP to use.
In the case of interoperable objects, we don't have such a mechanism and can only use traffic initiated from the remote VPN to learn about the IP in use.
I assume the errors occur when the IP association "times out" due to inactivity.
The fix for this is likely to have something periodically generate traffic through the VPN tunnel to keep it (and the IP association) active.
We have a mechanism called network probe to do this periodically starting in R82.
If on an earlier release, some other host will need to periodically generate traffic.
Hello PhoneBoy
Thank you very much for your response. We're using DAIP in this case to use certificates.
I asked you, would DPD also be a viable option, or would the survey you mentioned earlier only work for us in this case?
Thanks
DPD will definitely help here.
Implementing DPD definitely won't hurt here.
Curious... what do you mean by "after a while"? What time interval (be as precise as you can) is this?
I'll hazard a guess, however: if it's 1 hour, then this is an IPsec phase 2 re-key issue. Make sure you have the VPN control connections enabled in your Global Properties, or be certain to have IPsec NAT-Traversal (UDP 4500) allowed in your ruleset.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 19 | |
| 17 | |
| 13 | |
| 8 | |
| 7 | |
| 3 | |
| 3 | |
| 3 | |
| 3 | |
| 2 |
Tue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Thu 18 Dec 2025 @ 10:00 AM (CET)
Cloud Architect Series - Building a Hybrid Mesh Security Strategy across cloudsTue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Thu 18 Dec 2025 @ 10:00 AM (CET)
Cloud Architect Series - Building a Hybrid Mesh Security Strategy across cloudsAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY