
Set the maximum concurrent IKE connections there. In NG FP3, you can configure a firewall to support more IKE negotiations by editing the gateway object and going to the Capacity Optimization frame. Connections that have this message associated with them in the log will fail. If you see this "AddNegotiation" message, it means that FireWall-1 is handling more than 200 key negotiations at once. Look for IP protocol 50 or UDP port 500 packets.ġ1.15 AddNegotiation: Try to Handle Too Many NegotiationsĪ key negotiation occurs when a connection is first established from one host to another. Check to make sure the remote firewall is properly receiving the IP packets by using a packet sniffer.

Something is blocking communication between the VPN endpoints. The remote firewall is not set up with encryption. The remote end does not currently have a rule that will decrypt the packet.

The same is true for firewall B?its encryption domain should contain all the hosts behind firewall B, any translated IP addresses, and firewall B itself if it is used as a hide address. The firewall should be included if it is used as the hide address. The encryption domain for firewall A should contain all the hosts behind firewall A and any translated IP addresses (including hides). The "No response from peer" error message usually points to one of the following problems. If the packets are not reaching the gateway, FireWall-1 cannot encrypt or decrypt them. You may also want to use a packet sniffer (e.g., tcpdump, snoop, fw monitor) to verify that packets are reaching the gateway. Rules to permit IKE and ESP to the firewall Sometimes you may need to put explicit rules in the firewall permitting this traffic. IP protocols 50 and 51 (for any IPSec-related scheme)Īlso, you should make sure that NAT is not being performed on any of the packets.

If there are any filtering routers along the way, make sure they permit the following protocols: 11.13 General Troubleshooting Guidelines for VPN ProblemsĮnsure that the appropriate kinds of traffic are being permitted between the two endpoints. Note that any error messages you see in the SmartView Tracker/Log Viewer are documented in the Check Point manuals. The following is a list of common problems and resolutions that relate to establishing a VPN.
