- Products
- Learn
- Local User Groups
- Partners
- More
Quantum Spark Management Unleashed!
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
SharePoint CVEs and More!
Hi team,
I have a VPN set up between a CHECKPOINT R80.40 and a CISCO ASA Version 9.16(1)
and I can't have traffic to go from one side to the other successfully as I see traffic being blocked at checkpoints side.
The tunnel is up...
This is what I get on the logs
This is from checkpoint to ASA
This is from the ASA to the checkpoint
Yes, thats where you would do it. So, just to be sure, what I would do is this...set spoofing to detect on internal interface and also add external IP of the Cisco into option on external interface "dont check packets from", push policy and test.
You can also refer to below links for the reference:
Andy
Looks like the remote end isn't encrypting traffic to us.
I'd check the configuration on the ASA side.
There’s not enough information being shown in the log screenshots you’ve provided.
Please show a full log card for one of the drops.
Also, we’ll need to see what the precise rulebase in question is.
Hi PhoneBoy,
As you can see on the images the first one is the rule allowing bidirectioanl traffic. The second one is traffic from checkpoint side to ASA. And the third one traffic from ASA to CheckPoint.
I don't know what you mean by: precise rulebase in question is.
As you can
Hello,
Double click on one of the drop logs (ASA to CheckPoint), go to matching rules tab and check which rule is being applied. According to the screenshots i only can imagine network 192.168.52.0/X is not properly configured on your AUPEC_NET_52 or MINFIN_AUPEC_NET object, the one that is supposed to be the remote encryption domain. Also check drop reason on the log card.
Regards
Hi RS_Daniel,
Please see the image below.
It does not say which rule dropped it.
Spoofing drop, probably caused by defining the entire 192.168.0.0/12 supernet on the topology of your internal interface which is a common mistake. Exclude 192.168.52.0/24 from the topology of your external interface (bond0.10) on the firewall/cluster object and it should start working.
Hi Timothy,
Is the exclusion done as in the image below? If so, I have done it and it still not working. Sorry for my ignorance as I'm new to checkpoint and this is my first time setting up a VPN tunnel on checkpoint gateway.
Appears to be a routing problem as you have "Calculate topology automatically based on routing" set. Uncheck that and properly define External/Internal & the correct topology manually on all your interfaces. This is probably your issue.
Yes, thats where you would do it. So, just to be sure, what I would do is this...set spoofing to detect on internal interface and also add external IP of the Cisco into option on external interface "dont check packets from", push policy and test.
You can also refer to below links for the reference:
Andy
Thanks every one it's working now. The issue was the anti-spoofing.
Glad we could help!
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
User | Count |
---|---|
19 | |
12 | |
8 | |
7 | |
7 | |
6 | |
6 | |
4 | |
4 | |
3 |
Thu 18 Sep 2025 @ 03:00 PM (CEST)
Bridge the Unmanaged Device Gap with Enterprise Browser - EMEAThu 18 Sep 2025 @ 02:00 PM (EDT)
Bridge the Unmanaged Device Gap with Enterprise Browser - AmericasMon 22 Sep 2025 @ 03:00 PM (CEST)
Defending Hyperconnected AI-Driven Networks with Hybrid Mesh Security EMEAMon 22 Sep 2025 @ 02:00 PM (EDT)
Defending Hyperconnected AI-Driven Networks with Hybrid Mesh Security AMERThu 18 Sep 2025 @ 03:00 PM (CEST)
Bridge the Unmanaged Device Gap with Enterprise Browser - EMEAThu 18 Sep 2025 @ 02:00 PM (EDT)
Bridge the Unmanaged Device Gap with Enterprise Browser - AmericasMon 22 Sep 2025 @ 03:00 PM (CEST)
Defending Hyperconnected AI-Driven Networks with Hybrid Mesh Security EMEAAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY