- Products
- Learn
- Local User Groups
- Partners
- More
MVP 2026: Submissions
Are Now Open!
What's New in R82.10?
Watch NowOverlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
Hi,
A nice new feature in VSX R81 is that we can create vpnt interfaces on a virtual firewall, using vsx_provisioning_tool on the SMS/MDS. We have a VSX setup with SMS, running both on R81.10 with JHF take 87.
We want to setup a new S2S VPN (routebased) with Azure. I managed to do that using sk176249.
Now the tunnel is up (phase 1 and 2) and BGP traffic from azure arives at our firewall. We will use BGP over the tunnel and now I am facing 2 different issues causing the BGP peer in active state instead of established.
1) BGP traffic from azure arives at our firewall, but is dropped with the reason "According to the policy the packet should not have been decrypted"
Normally with a policy based VPN, the VPN domains is the first thing I look at. But now we do use routed based and I have configured empty VPN domains as mentoined in the sk.
There is a route for the BGP peer in Azure (connected to vpnt interface).
2) BGP traffic initiated from our firewall, uses a funny ip as its source ip.
This traffic was first dropped ofcourse on our firewall since the rule I created uses the expected source ip. I tried to accept the traffic and use source NAT for this specifc traffic. Now the traffic is accepted, but not encrypted and routed over the tunnel.
Any tips to troubleshoot any further are welcome.
The first problem was solved by changing the alias of the vpnt interfaces. The alias of the interface needs to be exactly the same as the name of the interopable device object where this interface will be used for.
The second problem is solved by using NAT with the correct vpnt interfaces.
Are you using a configuration similar to: https://support.checkpoint.com/results/sk/sk176249 ?
Yes. I used the sk to configure the VPN.
Recommend a TAC case here to investigate: https://help.checkpoint.com
The first problem was solved by changing the alias of the vpnt interfaces. The alias of the interface needs to be exactly the same as the name of the interopable device object where this interface will be used for.
The second problem is solved by using NAT with the correct vpnt interfaces.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 19 | |
| 17 | |
| 14 | |
| 8 | |
| 7 | |
| 3 | |
| 3 | |
| 3 | |
| 3 | |
| 2 |
Tue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Thu 18 Dec 2025 @ 10:00 AM (CET)
Cloud Architect Series - Building a Hybrid Mesh Security Strategy across cloudsTue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Thu 18 Dec 2025 @ 10:00 AM (CET)
Cloud Architect Series - Building a Hybrid Mesh Security Strategy across cloudsAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY