- Products
- Learn
- Local User Groups
- Partners
- More
MVP 2026: Submissions
Are Now Open!
What's New in R82.10?
10 December @ 5pm CET / 11am ET
Announcing Quantum R82.10!
Learn MoreOverlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
Hi,
I have come upon this issue where a customer is trying to access a Network scope behind a tunnel that is terminating on a 3rd party device.
So the topology is the following
Client VPN client with remote office IP 10.1.1.2 want´s to reach Server Behind Tunnel Terminating on 3rd party firewall with IP 192.168.2.2
Checkpoint has route for 192.168.2.0/24 -> 3rd party device
3rd Party device has route to 10.1.1.0/24 -> checkpoint
Network 192.168.2.0/24 is part of Enc Domain of Checkpoint for Remote VPN
Problem is when the client tries to reach network packet is forwarded to server, return packet however is blocked by checkpoint with following error:
Dropped by vpn_verify, reason : Clear packet on encrypted connection;
I don´t understand the drop because the packet should be Clear text and only be encrypted by the checkpoint and decrypted by the client, I don´t see the difference between this and any other network access, I wondering if It has to do with the Topology since this network is not directly connected, however there is a route so it should be "known" in terms of topology.
After this I tried adding the Remote Office Pool to the Enc. Domain of the Gateway, however this simply changed the error output to:
No Decryption Message
I think the second error is because now the Gateway thinks it needs to Decrypt and it´s clear text or something..
A visual network diagram would be helpful.
Traffic is initiated on Remote VPN side:
I can see in FW monitor the traffic being send to destination network and I can also see on 3rd party the traffic being send to server.
The return traffic hits the 3rd party device and get´s blocked on checkpoint side with described errors.

Sounds like the remote end is not encrypting the reply traffic for some reason.
Can you confirm it is received cleartext on the Check Point?
It should not encrypt the reply, the reply is decrypted on 3rd party firewall correctly, send as clear text to Checkpoint and should then be encrypted to be sent to the Remote VPN tunnel.
The original packet is Encrypted on Client Side, decrypted on Checkpoint side and send as Clear text to 3rd party device, then encrypted and send to server (server sits behind some other device this I don´t know).
There is a tunnel Between 3rd Party and some other gateway and destination network is behind this.
So the traffic flow between Checkpoint and 3rd party is always unencrypted.
Have you done any of the steps in this SK?
Troubleshooting "Clear text packet should be encrypted" error in ClusterXL
Hi,
Do you have any specific section in mind by referring this?
Yeah, now that I look at it a bit more closely, probably not ![]()
Do you have a TAC case on this?
Hi Ricardo,
do you know if this scenario is supported or working,
I need to do something similar but I am not sure it is supported.
I want to know if you approached TAC before I start to configure and test it
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 21 | |
| 20 | |
| 16 | |
| 8 | |
| 7 | |
| 3 | |
| 3 | |
| 3 | |
| 3 | |
| 3 |
Fri 12 Dec 2025 @ 10:00 AM (CET)
Check Mates Live Netherlands: #41 AI & Multi Context ProtocolTue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Fri 12 Dec 2025 @ 10:00 AM (CET)
Check Mates Live Netherlands: #41 AI & Multi Context ProtocolTue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!About CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY