<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: VPN between Palo Alto and Check Point firewall in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-between-palo-alto-and-check-point-firewall/m-p/307993#M79942</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;Double check your phase1 and 2 match.&lt;/P&gt;&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClGkCAK" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClGkCAK&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;And troubleshooting guide.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClivCAC" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClivCAC&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cheers!&lt;/P&gt;</description>
    <pubDate>Sat, 25 Jan 2020 18:46:42 GMT</pubDate>
    <dc:creator>OtakarKlier</dc:creator>
    <dc:date>2020-01-25T18:46:42Z</dc:date>
    <item>
      <title>VPN between Palo Alto and Check Point firewall</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-between-palo-alto-and-check-point-firewall/m-p/307979#M79939</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I am trying to establish a successful VPN connection between my Palo Alto firewall and a Check Point firewall. The VPN tunnel on the Palo Alto side shows all green for phase 1 and 2, however on the Check Point side I keep getting a failure per the log "IKE failure no response from peer".&lt;/P&gt;&lt;P&gt;In the "Monitor" &amp;gt; "System" log of the Palo Alto the message I am seeing is "ike-nego-p2-proxy-id-bad" "IKE phase-2 negotiation failed when processing proxy ID. cannot find matching phase-2 tunnel for received proxy ID. received local ID 10.30.30.0/24 type IPv_4_subnet protocol 0 port 0, received remote id: 10.10.10.0/24 type IPv4_subnet protocol 0 port 0.&lt;/P&gt;&lt;P&gt;On the Check Point side the local network is the 10.10.10.0/24. I am using a "encryption domain" on the Check Point.&lt;/P&gt;&lt;P&gt;I do not have any Proxy ID's configured on the Palo Alto side. I am under the impression that routing the traffic for destination 10.10.10.0/24 to the tunnel interface as a static route is all that is needed to identify the remote private network.&lt;/P&gt;&lt;P&gt;On the Palo Alto for the IKE crypto profile I am using Suite-B-GCM-128, and IPSec Crypto Profile Suite-B-GCM-128.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have tried a proxy ID on the palo alto side with local being 10.30.30.0/24 (the local Palo Alto private network) and remote 10.10.10.0/24 (the Check Point side private network) and that brought the tunnel on the Palo Alto side down.&amp;nbsp; After this I only have a green light for IKE Info under status of the IPsec Tunnels area.&lt;/P&gt;</description>
      <pubDate>Sat, 25 Jan 2020 15:55:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-between-palo-alto-and-check-point-firewall/m-p/307979#M79939</guid>
      <dc:creator>mjensen40400</dc:creator>
      <dc:date>2020-01-25T15:55:17Z</dc:date>
    </item>
    <item>
      <title>Re: VPN between Palo Alto and Check Point firewall</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-between-palo-alto-and-check-point-firewall/m-p/307985#M79940</link>
      <description>&lt;P&gt;After removing the proxy ID on the Palo Alto side I now receive:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="palo.PNG" style="width: 273px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/23623i3198B2B2D8DFEBFC/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="palo.PNG" alt="palo.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any help on this will be greatly appreciated!&lt;/P&gt;</description>
      <pubDate>Sat, 25 Jan 2020 16:11:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-between-palo-alto-and-check-point-firewall/m-p/307985#M79940</guid>
      <dc:creator>mjensen40400</dc:creator>
      <dc:date>2020-01-25T16:11:41Z</dc:date>
    </item>
    <item>
      <title>Re: VPN between Palo Alto and Check Point firewall</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpn-between-palo-alto-and-check-point-firewall/m-p/307993#M79942</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;Double check your phase1 and 2 match.&lt;/P&gt;&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClGkCAK" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClGkCAK&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;And troubleshooting guide.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClivCAC" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClivCAC&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cheers!&lt;/P&gt;</description>
      <pubDate>Sat, 25 Jan 2020 18:46:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpn-between-palo-alto-and-check-point-firewall/m-p/307993#M79942</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2020-01-25T18:46:42Z</dc:date>
    </item>
  </channel>
</rss>

