- Products
- Learn
- Local User Groups
- Partners
- More
Introduction to Lakera:
Securing the AI Frontier!
Quantum Spark Management Unleashed!
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
SharePoint CVEs and More!
Hello,
I am facing a strange issue. We have site-to-site VPN with 3rd party. We have Checkpoint, they have Sophos UTM. Tunnel is working only one direction.
- Sophos >> Checkpoint - working fine
- Checkpoint >> Sophos - not working
IkeView tool says Phase1 is ok, Phase2 is failing when Checkpoint initiates the tunnel. Only QM packet 1. After that I receive an error:
Notify Payload
Next Payload: NONE
Reserved: 0
Length: 00 0c (12)
DOI: 00 00 00 01 (1)
ProtID: 1
SPI Size: 0
Notify Type: 18 (INVALID-ID-INFORMATION)
I also noticed in VPNd.ELG this:
[] vpn_ipsec_spi_notify: spi 0, 127.0.0.1, peer x.x.x.x, proto 50, my range 172.16.16.0-172.16.16.255, peer range 192.168.203.0-192.168.203.255,
However in dashboard I have:
From CLI I am getting correct enc. domain:
5:04:09 x.x.x.x > :(+);From:192.168.200.0;,To:192.168.203.255;CPTFMT_sep:;;Peer:x.x.x.x;,allowed_peers_table_id:0;,gw_conf:0;,community_id:5;,subnet_support:1;,from:192.168.200.0;,to:192.168.203.255;product:VPN-1 & FireWall-1;product_family:Network
Any ideas/hints on what to check, change to get this working?
Thanks indeed.
As others suggested this is going to be the old issue of the Check Point supernetting multiple subnets
Check with the Sophos EXACTLY how they have defined the EncDomain.
Have they actually defined as 192.168.200.0/22 or have they actually defined as 192.168.200.0/24, 192.168.201.0/24, 192.168.202.0/24, 192.168.203.0/24
As you are seeing vpn_ipsec_spi_notify: spi 0, 127.0.0.1, peer x.x.x.x, proto 50, my range 172.16.16.0-172.16.16.255, peer range 192.168.203.0-192.168.203.255
Then I would suggest that they have multiple /24 subnets defined and that is what they are expecting
Check Point is notorious for this with 3rd Party VPN where will supernet
As Timothy Hall said is going to https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solut...
and look at Scenario 1
You can then look at disabling the Supernetting and define the Remote Encryption Domain EXACTLY has they have in terms of using multiple /24 subnets rather then a single /22.
Section 4 gives further details of the 3rd Party connectivity improvements
Find a Quick Mode Key Install log from when the Sophos has initiated the VPN, I'll guarantee they aren't asking for the entire 192.168.200.0/22 from you. In the Community setting try setting VPN Tunnel Sharing to "one tunnel per pair of hosts", reinstall policy and try again from the Check Point side. If it works you need to configure the table.def file to more precisely control how the Check Point proposes subnets, see sk108600 Scenario 1.
The issue with 3rd party VPN interoperability keeps coming up over the years and it most often results in editing the files.
IMHO, it is a high time for Check Point to implement the GUI options for these modifications. This will not only simplify configuration, but will also allow admins to be aware of the particulars while using SmartConsole.
Hi,
thanks for your reply. In IKE View tool I see this:
QM packet 1 (06:29:21) - Wed Nov 20 2019
ID:
(192.168.200.0 255.255.252.0) - (172.16.16.0 255.255.255.0)
Transport: UDP (IPv4)
PeerIP: 365675aa
PeerPort: 500
Peer Name: GW_x.x.x.x
<== Received from peer x.x.x.x
Checkpoint replied back:
QM packet 2 (06:29:21) - Wed Nov 20 2019
ID:
(192.168.200.0 255.255.252.0) - (172.16.16.0 255.255.255.0)
Transport: UDP (IPv4)
PeerIP: 365675aa
PeerPort: 500
Peer Name: GW_x.x.x.x
==> Sent to peer x.x.x.x
This when Sophos initiated communication and it works.
Tunnel management is configured to: "one tunnel per pair of hosts".
I can try to implement a suggested solution from Scenario 1, but CMA is leveraged so I have to follow the change process that can take several weeks. Is there any way how to test it from the gateway configuration perspective? Gateway is for now, under my control so I can change what I need.
Thanks indeed.
You need to check on the Sophos what it receives from the Check Point when Check Point is initiating the tunnel.
OK so Sophos is sending
(192.168.200.0 255.255.252.0) which is the /22
Check Point is sending
peer range 192.168.203.0-192.168.203.255 which is a /24
You will need to get the Check Point to send a /22 for the 192.168.200.0/22 Network for this to work
Both are sending 172.16.16.0/24 so no issue there.
Would suggest Per Subnet for the Tunnel Management which would be a SmartConsole change and Policy Installation and then recheck with the vpn debug and ikeview
The strangest thing is that I have in dashboard /22, but in IKEview I see that Checkpoint sends /24 proposal.
Just check on your Sophos which enc domain Check Point is announcing, enter this data into your Sophos VPN configuration and you should be good. Keep in mind that Check Point also renders the external IP addresses of the VPN gateways as part of the enc domain.
As others suggested this is going to be the old issue of the Check Point supernetting multiple subnets
Check with the Sophos EXACTLY how they have defined the EncDomain.
Have they actually defined as 192.168.200.0/22 or have they actually defined as 192.168.200.0/24, 192.168.201.0/24, 192.168.202.0/24, 192.168.203.0/24
As you are seeing vpn_ipsec_spi_notify: spi 0, 127.0.0.1, peer x.x.x.x, proto 50, my range 172.16.16.0-172.16.16.255, peer range 192.168.203.0-192.168.203.255
Then I would suggest that they have multiple /24 subnets defined and that is what they are expecting
Check Point is notorious for this with 3rd Party VPN where will supernet
As Timothy Hall said is going to https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solut...
and look at Scenario 1
You can then look at disabling the Supernetting and define the Remote Encryption Domain EXACTLY has they have in terms of using multiple /24 subnets rather then a single /22.
Section 4 gives further details of the 3rd Party connectivity improvements
The issue has been resolved.
Checkpoint tunnel management was changed to "per subnet" (per host and per gateway were rejected).
Now the tunnel is working in both directions.
Thanks all of you for such great support.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
User | Count |
---|---|
15 | |
12 | |
8 | |
6 | |
6 | |
6 | |
5 | |
5 | |
4 | |
3 |
Tue 30 Sep 2025 @ 08:00 AM (EDT)
Tips and Tricks 2025 #13: Strategic Cyber Assessments: How to Strengthen Your Security PostureTue 07 Oct 2025 @ 10:00 AM (CEST)
Cloud Architect Series: AI-Powered API Security with CloudGuard WAFTue 30 Sep 2025 @ 08:00 AM (EDT)
Tips and Tricks 2025 #13: Strategic Cyber Assessments: How to Strengthen Your Security PostureThu 09 Oct 2025 @ 10:00 AM (CEST)
CheckMates Live BeLux: Discover How to Stop Data Leaks in GenAI Tools: Live Demo You Can’t Miss!Wed 22 Oct 2025 @ 11:00 AM (EDT)
Firewall Uptime, Reimagined: How AIOps Simplifies Operations and Prevents OutagesAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY