<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Issue with Site-to-Site VPN between Checkpoint and Cisco ASA in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/issue-with-site-to-site-vpn-between-checkpoint-and-cisco-asa/m-p/5306376#M1121650</link>
    <description>&lt;P&gt;There's no option for Checkpoint set specific &lt;SPAN&gt;identity(unless you enabled&amp;nbsp;aggressive mode for IKEv1)&lt;/SPAN&gt;, so I don't know what&lt;SPAN&gt;&amp;nbsp;identity does it send, but ASA site is configured to&lt;BR /&gt;crypto isakmp identity address&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 07 Jul 2025 09:03:13 GMT</pubDate>
    <dc:creator>ORZpasserAtw</dc:creator>
    <dc:date>2025-07-07T09:03:13Z</dc:date>
    <item>
      <title>Issue with Site-to-Site VPN between Checkpoint and Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/issue-with-site-to-site-vpn-between-checkpoint-and-cisco-asa/m-p/5303955#M1121525</link>
      <description>&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;LAN:192.168.88.254/24&lt;/TD&gt;&lt;TD&gt;ASA5505&lt;BR /&gt;&lt;SPAN&gt;(branch)&lt;/SPAN&gt;&lt;/TD&gt;&lt;TD&gt;WAN:60.0.0.1&lt;/TD&gt;&lt;TD&gt;------Internet------&lt;/TD&gt;&lt;TD&gt;WAN:59.0.0.1&lt;/TD&gt;&lt;TD&gt;CP1555&lt;BR /&gt;(HQ)&lt;/TD&gt;&lt;TD&gt;LAN:192.168.169.254/24&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;Cisco Adaptive Security Appliance Software Version 9.2(3)&lt;BR /&gt;&lt;SPAN&gt;Checkpoint 1500 Appliance Version R81.10.10 (996002945)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Here's&amp;nbsp;partial running config&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;object-group network local-network&lt;BR /&gt;network-object 192.168.88.0 255.255.255.0&lt;BR /&gt;object-group network remote-network&lt;BR /&gt;network-object 192.168.169.0 255.255.255.0&lt;BR /&gt;access-list asa-router-vpn extended permit ip object-group local-network object-group remote-netw ork&lt;BR /&gt;access-list asa-router-vpn2 extended permit ip object-group remote-network object-group local-net work&lt;BR /&gt;access-list alloweverything standard permit any4&lt;BR /&gt;nat (inside,outside) source dynamic obj-192.168.88.0 interface&lt;BR /&gt;nat (inside,outside) source static local-network local-network destination static remote-network remote-network no-proxy-arp route-lookup&lt;BR /&gt;crypto ipsec ikev1 transform-set ESP-AES-MD5 esp-aes esp-md5-hmac&lt;BR /&gt;crypto ipsec security-association lifetime seconds 120&lt;BR /&gt;crypto ipsec security-association pmtu-aging infinite&lt;BR /&gt;crypto map outside_map 10 match address asa-router-vpn&lt;BR /&gt;crypto map outside_map 10 set peer 59.0.0.1&lt;BR /&gt;crypto map outside_map 10 set ikev1 transform-set ESP-AES-MD5&lt;BR /&gt;crypto map outside_map interface outside&lt;BR /&gt;crypto ca trustpool policy&lt;BR /&gt;crypto isakmp identity hostname&lt;BR /&gt;crypto ikev1 enable outside&lt;BR /&gt;crypto ikev1 policy 10&lt;BR /&gt;authentication pre-share&lt;BR /&gt;encryption aes&lt;BR /&gt;hash md5&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 300&lt;BR /&gt;tunnel-group 59.0.0.1 type ipsec-l2l&lt;BR /&gt;tunnel-group 59.0.0.1 ipsec-attributes&lt;BR /&gt;ikev1 pre-shared-key *****&lt;BR /&gt;isakmp keepalive threshold 15 retry 10&lt;/P&gt;&lt;P&gt;sh cry isa sa&lt;/P&gt;&lt;P&gt;IKEv1 SAs:&lt;/P&gt;&lt;P&gt;Active SA: 1&lt;BR /&gt;Rekey SA: 1 (A tunnel will report 1 Active and 1 Rekey SA during rekey)&lt;BR /&gt;Total IKE SA: 2&lt;/P&gt;&lt;P&gt;1 IKE Peer: 59.0.0.1&lt;BR /&gt;Type : L2L Role : responder&lt;BR /&gt;Rekey : no State : MM_REKEY_DONE_H2&lt;BR /&gt;2 IKE Peer: 59.0.0.1&lt;BR /&gt;Type : L2L Role : responder&lt;BR /&gt;Rekey : yes State : MM_ACTIVE_REKEY&lt;/P&gt;&lt;P&gt;There are no IKEv2 SAs&lt;/P&gt;&lt;P&gt;sh cry ipsec sa&lt;/P&gt;&lt;P&gt;There are no ipsec sas&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Checkpoint side config:&lt;/P&gt;&lt;P&gt;Connection type: Hostname or IP address&lt;BR /&gt;60.0.0.1&lt;BR /&gt;Pre-Shared Secret:&amp;nbsp;*****&lt;BR /&gt;&lt;SPAN&gt;Encryption domain:&lt;/SPAN&gt;manually&lt;BR /&gt;Site Name: HQ_subnet 192.168.88.0/24&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Encryption settings:Custom&lt;BR /&gt;IKE (Phase 1)&lt;BR /&gt;Encryption:AES-128&lt;BR /&gt;Authentication:MD5&lt;BR /&gt;DH Group: Group 2&lt;BR /&gt;Renegotiate every: 5 minutes&lt;BR /&gt;IPSec (Phase 2)&lt;BR /&gt;Encryption:AES-128&lt;BR /&gt;Authentication:MD5&lt;BR /&gt;[Disabled] Perfect Forward Secrecy&lt;BR /&gt;Renegotiate every: 120 seconds&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;[Disabled]&amp;nbsp;&lt;SPAN&gt;Remote gateway is a Check Point Security Gateway&lt;BR /&gt;[Enabled]Enable permanent VPN tunnels&lt;BR /&gt;[Enabled]Disable NAT for this site&lt;BR /&gt;[Disabled]Allow traffic to the Internet from remote site through this Security Gateway&lt;BR /&gt;Encryption Method:IKEv1&lt;BR /&gt;[Disabled]Enable aggressive mode for IKEv1&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 30 Jun 2025 09:31:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issue-with-site-to-site-vpn-between-checkpoint-and-cisco-asa/m-p/5303955#M1121525</guid>
      <dc:creator>ORZpasserAtw</dc:creator>
      <dc:date>2025-06-30T09:31:40Z</dc:date>
    </item>
    <item>
      <title>Re: Issue with Site-to-Site VPN between Checkpoint and Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/issue-with-site-to-site-vpn-between-checkpoint-and-cisco-asa/m-p/5304190#M1121545</link>
      <description>&lt;P&gt;Can You explain more what issue here&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Mon, 30 Jun 2025 22:47:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issue-with-site-to-site-vpn-between-checkpoint-and-cisco-asa/m-p/5304190#M1121545</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2025-06-30T22:47:09Z</dc:date>
    </item>
    <item>
      <title>Re: Issue with Site-to-Site VPN between Checkpoint and Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/issue-with-site-to-site-vpn-between-checkpoint-and-cisco-asa/m-p/5304324#M1121547</link>
      <description>&lt;P&gt;Could you try to remove the isakmp keepalives from under the tunnel group and clear the tunnel and see if this makes any difference please?&lt;/P&gt;</description>
      <pubDate>Tue, 01 Jul 2025 10:51:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issue-with-site-to-site-vpn-between-checkpoint-and-cisco-asa/m-p/5304324#M1121547</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2025-07-01T10:51:22Z</dc:date>
    </item>
    <item>
      <title>Re: Issue with Site-to-Site VPN between Checkpoint and Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/issue-with-site-to-site-vpn-between-checkpoint-and-cisco-asa/m-p/5304417#M1121556</link>
      <description>&lt;P&gt;removed, no help.&lt;/P&gt;&lt;P&gt;also It's sometimes says&amp;nbsp;&lt;SPAN&gt;MM_ACTIVE,&amp;nbsp; but&amp;nbsp;no IPSEC&amp;nbsp;SAs displayed&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 01 Jul 2025 14:40:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issue-with-site-to-site-vpn-between-checkpoint-and-cisco-asa/m-p/5304417#M1121556</guid>
      <dc:creator>ORZpasserAtw</dc:creator>
      <dc:date>2025-07-01T14:40:29Z</dc:date>
    </item>
    <item>
      <title>Re: Issue with Site-to-Site VPN between Checkpoint and Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/issue-with-site-to-site-vpn-between-checkpoint-and-cisco-asa/m-p/5304433#M1121557</link>
      <description>&lt;P&gt;Nothing else comes to mind. Try to check this link just to make sure nothing was missed on the CheckPoint configuration side please. Also, could you please run the following debug commands and share the sanitized output for review?&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.linkedin.com/pulse/how-tos-configure-site-to-site-vpn-between-check-point-carvalho" target="_blank"&gt;How To's: Configure Site-to-Site VPN between Check Point firewall and Cisco ASA firewall&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;debug crypto ikev1 127&lt;BR /&gt;debug crypto ipsec 127&lt;/P&gt;</description>
      <pubDate>Tue, 01 Jul 2025 15:12:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issue-with-site-to-site-vpn-between-checkpoint-and-cisco-asa/m-p/5304433#M1121557</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2025-07-01T15:12:37Z</dc:date>
    </item>
    <item>
      <title>Re: Issue with Site-to-Site VPN between Checkpoint and Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/issue-with-site-to-site-vpn-between-checkpoint-and-cisco-asa/m-p/5304442#M1121558</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1892812"&gt;@ORZpasserAtw&lt;/a&gt;&amp;nbsp;you are sending the hostname (not the default) as the IKE identity, is the Check Point Firewall expecting to match the IKE identity on your hostname or the IP address? Normally it would expect receive the IP address to match against.&lt;/P&gt;
&lt;P&gt;Run debugs as&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/284594"&gt;@Aref Alsouqi&lt;/a&gt;&amp;nbsp;suggested, this will provide a clue.&lt;/P&gt;</description>
      <pubDate>Tue, 01 Jul 2025 15:23:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issue-with-site-to-site-vpn-between-checkpoint-and-cisco-asa/m-p/5304442#M1121558</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2025-07-01T15:23:12Z</dc:date>
    </item>
    <item>
      <title>Re: Issue with Site-to-Site VPN between Checkpoint and Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/issue-with-site-to-site-vpn-between-checkpoint-and-cisco-asa/m-p/5306185#M1121639</link>
      <description>&lt;P&gt;Any news&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Sun, 06 Jul 2025 16:33:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issue-with-site-to-site-vpn-between-checkpoint-and-cisco-asa/m-p/5306185#M1121639</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2025-07-06T16:33:19Z</dc:date>
    </item>
    <item>
      <title>Re: Issue with Site-to-Site VPN between Checkpoint and Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/issue-with-site-to-site-vpn-between-checkpoint-and-cisco-asa/m-p/5306373#M1121647</link>
      <description>&lt;P&gt;I am 100% Sure pre-shared key is matched&lt;/P&gt;&lt;P&gt;Jul 07 16:48:50 [IKEv1]IKE Receiver: Packet received on 60.0.0.1:500 from 59.0.0.1:500&lt;BR /&gt;Jul 07 16:48:50 [IKEv1]IP = 59.0.0.1, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + VENDOR (13) + NONE (0) total length : 148&lt;BR /&gt;Jul 07 16:48:50 [IKEv1 DEBUG]IP = 59.0.0.1, processing SA payload&lt;BR /&gt;Jul 07 16:48:50 [IKEv1 DEBUG]IP = 59.0.0.1, Oakley proposal is acceptable&lt;BR /&gt;Jul 07 16:48:50 [IKEv1 DEBUG]IP = 59.0.0.1, processing VID payload&lt;BR /&gt;Jul 07 16:48:50 [IKEv1 DEBUG]IP = 59.0.0.1, Received NAT-Traversal RFC VID&lt;BR /&gt;Jul 07 16:48:50 [IKEv1 DEBUG]IP = 59.0.0.1, processing VID payload&lt;BR /&gt;Jul 07 16:48:50 [IKEv1 DEBUG]IP = 59.0.0.1, processing IKE SA payload&lt;BR /&gt;Jul 07 16:48:50 [IKEv1 DEBUG]IP = 59.0.0.1, IKE SA Proposal # 1, Transform # 1 acceptable Matches global IKE entry # 2&lt;BR /&gt;Jul 07 16:48:50 [IKEv1 DEBUG]IP = 59.0.0.1, constructing ISAKMP SA payload&lt;BR /&gt;Jul 07 16:48:50 [IKEv1]IP = 59.0.0.1, NAT-T disabled in crypto map outside_map 1.&lt;BR /&gt;Jul 07 16:48:50 [IKEv1 DEBUG]IP = 59.0.0.1, constructing Fragmentation VID + extended capabilities payload&lt;BR /&gt;Jul 07 16:48:50 [IKEv1]IP = 59.0.0.1, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + SA (1) + VENDOR (13) + NONE (0) total length : 108&lt;BR /&gt;Jul 07 16:48:50 [IKEv1]IKE Receiver: Packet received on 60.0.0.1:500 from 59.0.0.1:500&lt;BR /&gt;Jul 07 16:48:50 [IKEv1]IP = 59.0.0.1, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + KE (4) + NONCE (10) + VENDOR (13) + NONE (0) total length : 332&lt;BR /&gt;Jul 07 16:48:50 [IKEv1 DEBUG]IP = 59.0.0.1, processing ke payload&lt;BR /&gt;Jul 07 16:48:50 [IKEv1 DEBUG]IP = 59.0.0.1, processing ISA_KE payload&lt;BR /&gt;Jul 07 16:48:50 [IKEv1 DEBUG]IP = 59.0.0.1, processing nonce payload&lt;BR /&gt;Jul 07 16:48:50 [IKEv1 DEBUG]IP = 59.0.0.1, processing VID payload&lt;BR /&gt;Jul 07 16:48:50 [IKEv1 DEBUG]IP = 59.0.0.1, Received DPD VID&lt;BR /&gt;Jul 07 16:48:50 [IKEv1 DEBUG]IP = 59.0.0.1, constructing ke payload&lt;BR /&gt;Jul 07 16:48:50 [IKEv1 DEBUG]IP = 59.0.0.1, constructing nonce payload&lt;BR /&gt;Jul 07 16:48:50 [IKEv1 DEBUG]IP = 59.0.0.1, constructing Cisco Unity VID payload&lt;BR /&gt;Jul 07 16:48:50 [IKEv1 DEBUG]IP = 59.0.0.1, constructing xauth V6 VID payload&lt;BR /&gt;Jul 07 16:48:50 [IKEv1 DEBUG]IP = 59.0.0.1, Send IOS VID&lt;BR /&gt;Jul 07 16:48:50 [IKEv1 DEBUG]IP = 59.0.0.1, Constructing ASA spoofing IOS Vendor ID payload (version: 1.0.0, capabilities: 20000001)&lt;BR /&gt;Jul 07 16:48:50 [IKEv1 DEBUG]IP = 59.0.0.1, constructing VID payload&lt;BR /&gt;Jul 07 16:48:50 [IKEv1 DEBUG]IP = 59.0.0.1, Send Altiga/Cisco VPN3000/Cisco ASA GW VID&lt;BR /&gt;Jul 07 16:48:50 [IKEv1]IP = 59.0.0.1, Connection landed on tunnel_group 59.0.0.1&lt;BR /&gt;Jul 07 16:48:50 [IKEv1 DEBUG]Group = 59.0.0.1, IP = 59.0.0.1, Generating keys for Responder...&lt;BR /&gt;Jul 07 16:48:50 [IKEv1]IP = 59.0.0.1, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + KE (4) + NONCE (10) + VENDOR (13) + VENDOR (13) + VENDOR (13) + VENDOR (13) + NONE (0) total length : 384&lt;BR /&gt;Jul 07 16:48:50 [IKEv1]IKE Receiver: Packet received on 60.0.0.1:500 from 59.0.0.1:500&lt;BR /&gt;Jul 07 16:48:50 [IKEv1]IP = 59.0.0.1, IKE_DECODE RECEIVED Message (msgid=0) with payloads : HDR + ID (5) + HASH (8) + NONE (0) total length : 64&lt;BR /&gt;Jul 07 16:48:50 [IKEv1 DEBUG]Group = 59.0.0.1, IP = 59.0.0.1, processing ID payload&lt;BR /&gt;Jul 07 16:48:50 [IKEv1 DECODE]Group = 59.0.0.1, IP = 59.0.0.1, ID_IPV4_ADDR ID received&lt;BR /&gt;59.0.0.1&lt;BR /&gt;Jul 07 16:48:50 [IKEv1 DEBUG]Group = 59.0.0.1, IP = 59.0.0.1, processing hash payload&lt;BR /&gt;Jul 07 16:48:50 [IKEv1 DEBUG]Group = 59.0.0.1, IP = 59.0.0.1, Computing hash for ISAKMP&lt;BR /&gt;Jul 07 16:48:50 [IKEv1]IP = 59.0.0.1, Connection landed on tunnel_group 59.0.0.1&lt;BR /&gt;Jul 07 16:48:50 [IKEv1 DEBUG]Group = 59.0.0.1, IP = 59.0.0.1, constructing ID payload&lt;BR /&gt;Jul 07 16:48:50 [IKEv1 DEBUG]Group = 59.0.0.1, IP = 59.0.0.1, constructing hash payload&lt;BR /&gt;Jul 07 16:48:50 [IKEv1 DEBUG]Group = 59.0.0.1, IP = 59.0.0.1, Computing hash for ISAKMP&lt;BR /&gt;Jul 07 16:48:50 [IKEv1]IP = 59.0.0.1, IKE_DECODE SENDING Message (msgid=0) with payloads : HDR + ID (5) + HASH (8) + NONE (0) total length : 64&lt;BR /&gt;Jul 07 16:48:50 [IKEv1]Group = 59.0.0.1, IP = 59.0.0.1, Failure during phase 1 rekeying attempt due to collision&lt;BR /&gt;Jul 07 16:48:50 [IKEv1 DEBUG]Group = 59.0.0.1, IP = 59.0.0.1, IKE MM Responder FSM error history (struct &amp;amp;0x00007f33ec7f10d0) &amp;lt;state&amp;gt;, &amp;lt;event&amp;gt;: MM_DONE, EV_ERROR--&amp;gt;MM_SND_MSG6_H, EV_SND_MSG_OK--&amp;gt;MM_SND_MSG6_H, EV_SND_MSG--&amp;gt;MM_SND_MSG6, EV_SND_MSG--&amp;gt;MM_BLD_MSG6, EV_ENCRYPT_OK--&amp;gt;MM_BLD_MSG6, NullEvent--&amp;gt;MM_BLD_MSG6, EV_ENCRYPT_MSG--&amp;gt;MM_BLD_MSG6, EV_CHECK_IA&lt;BR /&gt;Jul 07 16:48:50 [IKEv1 DEBUG]Group = 59.0.0.1, IP = 59.0.0.1, IKE SA MM:f7dc1825 terminating: flags 0x01000002, refcnt 0, tuncnt 0&lt;BR /&gt;Jul 07 16:48:50 [IKEv1 DEBUG]Group = 59.0.0.1, IP = 59.0.0.1, sending delete/delete with reason message&lt;BR /&gt;Jul 07 16:48:50 [IKEv1 DEBUG]Group = 59.0.0.1, IP = 59.0.0.1, constructing blank hash payload&lt;BR /&gt;Jul 07 16:48:50 [IKEv1 DEBUG]Group = 59.0.0.1, IP = 59.0.0.1, constructing IKE delete payload&lt;BR /&gt;Jul 07 16:48:50 [IKEv1 DEBUG]Group = 59.0.0.1, IP = 59.0.0.1, constructing qm hash payload&lt;BR /&gt;Jul 07 16:48:50 [IKEv1]IP = 59.0.0.1, IKE_DECODE SENDING Message (msgid=dece7d8b) with payloads : HDR + HASH (8) + DELETE (12) + NONE (0) total length : 80&lt;/P&gt;</description>
      <pubDate>Mon, 07 Jul 2025 10:02:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issue-with-site-to-site-vpn-between-checkpoint-and-cisco-asa/m-p/5306373#M1121647</guid>
      <dc:creator>ORZpasserAtw</dc:creator>
      <dc:date>2025-07-07T10:02:10Z</dc:date>
    </item>
    <item>
      <title>Re: Issue with Site-to-Site VPN between Checkpoint and Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/issue-with-site-to-site-vpn-between-checkpoint-and-cisco-asa/m-p/5306376#M1121650</link>
      <description>&lt;P&gt;There's no option for Checkpoint set specific &lt;SPAN&gt;identity(unless you enabled&amp;nbsp;aggressive mode for IKEv1)&lt;/SPAN&gt;, so I don't know what&lt;SPAN&gt;&amp;nbsp;identity does it send, but ASA site is configured to&lt;BR /&gt;crypto isakmp identity address&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 07 Jul 2025 09:03:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issue-with-site-to-site-vpn-between-checkpoint-and-cisco-asa/m-p/5306376#M1121650</guid>
      <dc:creator>ORZpasserAtw</dc:creator>
      <dc:date>2025-07-07T09:03:13Z</dc:date>
    </item>
    <item>
      <title>Re: Issue with Site-to-Site VPN between Checkpoint and Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/issue-with-site-to-site-vpn-between-checkpoint-and-cisco-asa/m-p/5306385#M1121651</link>
      <description>&lt;P&gt;&lt;SPAN&gt;lifetime 300 &amp;lt;&amp;lt;- this so so short make it longer' this 300 sec i.e. 5 min sure you will face issue&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Recommend value 86400 (24 hr)&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;MHM&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 07 Jul 2025 09:35:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issue-with-site-to-site-vpn-between-checkpoint-and-cisco-asa/m-p/5306385#M1121651</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2025-07-07T09:35:42Z</dc:date>
    </item>
    <item>
      <title>Re: Issue with Site-to-Site VPN between Checkpoint and Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/issue-with-site-to-site-vpn-between-checkpoint-and-cisco-asa/m-p/5306859#M1121676</link>
      <description>&lt;P&gt;"&lt;SPAN&gt;Jul 07 16:48:50 [IKEv1]Group = 59.0.0.1, IP = 59.0.0.1, Failure during phase 1 rekeying attempt due to collision"&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Based on this link, this error appears when there is a discrepancy in the ISAKMP lifetime which doesn't seem to be the case here, so I'm not really sure why you are getting that error. What options do you have on CheckPoint for phase 1 lifetime? is it only in minutes or can you set it in seconds?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/81824-common-ipsec-trouble.html#solution06" target="_blank"&gt;Troubleshoot Common L2L and Remote Access IPsec VPN Issues - Cisco&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 08 Jul 2025 09:26:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issue-with-site-to-site-vpn-between-checkpoint-and-cisco-asa/m-p/5306859#M1121676</guid>
      <dc:creator>Aref Alsouqi</dc:creator>
      <dc:date>2025-07-08T09:26:23Z</dc:date>
    </item>
    <item>
      <title>Re: Issue with Site-to-Site VPN between Checkpoint and Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/issue-with-site-to-site-vpn-between-checkpoint-and-cisco-asa/m-p/5306903#M1121679</link>
      <description>&lt;P&gt;I already tried change Checkpoint phase 1 r&lt;SPAN&gt;enegotiate timer before, and Its default is&amp;nbsp;1440 minutes(24 hr)&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 08 Jul 2025 11:33:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issue-with-site-to-site-vpn-between-checkpoint-and-cisco-asa/m-p/5306903#M1121679</guid>
      <dc:creator>ORZpasserAtw</dc:creator>
      <dc:date>2025-07-08T11:33:08Z</dc:date>
    </item>
    <item>
      <title>Re: Issue with Site-to-Site VPN between Checkpoint and Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/issue-with-site-to-site-vpn-between-checkpoint-and-cisco-asa/m-p/5306907#M1121681</link>
      <description>&lt;P&gt;Both peer need to use same lifetime i.e.&lt;/P&gt;
&lt;P&gt;Asa and checkpoint must have same lifetime (24 hr)&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Tue, 08 Jul 2025 11:57:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issue-with-site-to-site-vpn-between-checkpoint-and-cisco-asa/m-p/5306907#M1121681</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2025-07-08T11:57:29Z</dc:date>
    </item>
    <item>
      <title>Re: Issue with Site-to-Site VPN between Checkpoint and Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/issue-with-site-to-site-vpn-between-checkpoint-and-cisco-asa/m-p/5306918#M1121683</link>
      <description>&lt;P&gt;Are you configuring the Checkpoint VPN using "traditional" or "community/simplified" mode?&lt;/P&gt;&lt;P&gt;Checkpoint default phase 1 to 1440 minutes (24 hours), and phase 2 to 3600 seconds (1 hour).&amp;nbsp; ASA I think has the phase 1 default to 86400 seconds (24 hours) and phase 2 to 28800 seconds (8 hours).&amp;nbsp; &amp;nbsp; Make sure both sides matches.&lt;/P&gt;&lt;P&gt;Edit:&amp;nbsp; Also please replace "&lt;SPAN&gt;crypto isakmp identity hostname" with "crypto isakmp identity address".&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 08 Jul 2025 12:40:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/issue-with-site-to-site-vpn-between-checkpoint-and-cisco-asa/m-p/5306918#M1121683</guid>
      <dc:creator>adamscottmaster2013</dc:creator>
      <dc:date>2025-07-08T12:40:23Z</dc:date>
    </item>
  </channel>
</rss>

