<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: IPSEC VPN Tunnel going down during data transfer in Cloud Firewall</title>
    <link>https://community.checkpoint.com/t5/Cloud-Firewall/IPSEC-VPN-Tunnel-going-down-during-data-transfer/m-p/92275#M2147</link>
    <description>&lt;P&gt;Hi Phoneboy,&lt;/P&gt;&lt;P&gt;the&amp;nbsp; issue got resolved&amp;nbsp;&lt;/P&gt;&lt;P&gt;TAC analyzed the VPN debugs and found that, Check Point is receiving Phase-II&amp;nbsp;&lt;BR /&gt;lifetime in KiloBytes from the peer end ASA fw.&lt;BR /&gt;By default Check Point doesn't support or accept the lifetime in KiloBytes:&lt;BR /&gt;&amp;lt;== Remote peer(X.X.X.X)&lt;BR /&gt;SA Life Type:&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;Seconds&lt;BR /&gt;SA Life Duration:&amp;nbsp;&amp;nbsp; &amp;nbsp;28800&lt;BR /&gt;SA Life Type:&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;KiloBytes&lt;BR /&gt;SA Life Duration:&amp;nbsp;&amp;nbsp; &amp;nbsp;4608000&lt;BR /&gt;Encapsulation Mode:&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;BR /&gt;Authentication Alg:&amp;nbsp;&amp;nbsp; &amp;nbsp;HMAC-SHA1&lt;BR /&gt;Key Length:&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;256&lt;BR /&gt;==&amp;gt; Sent to peer X.X.X.X&lt;BR /&gt;Notify Type:&amp;nbsp;&amp;nbsp; &amp;nbsp;24576 (RESPONDER-LIFETIME)&lt;BR /&gt;SPI:&lt;BR /&gt;68 88 bd 2a&lt;BR /&gt;Notify Data:&lt;BR /&gt;80 01 00 02 00 02 00 04 00 00 00 00&lt;BR /&gt;SA Life Type:&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;KiloBytes&lt;BR /&gt;SA Life Duration:&amp;nbsp;&amp;nbsp; &amp;nbsp;0&lt;BR /&gt;Here Check Point is replying with lifetime as 0, it means we do not support or accept it.&lt;BR /&gt;You will be able to see several kinds of the issue where the re-keying process will fail due to renegotiation and when Phase-II is initiated by peer end.&lt;BR /&gt;As a workaround, you can disable the lifetime in KiloBytes from the peer end. I believe the peer end is Cisco ASA so you can use the following command to verify.&lt;BR /&gt;:"sh run all | i crypto-map".&lt;BR /&gt;If you can see the set lifetime, kindly change it to Unlimited using the commands:&lt;BR /&gt;crypto map map-name seq-num set security-association lifetime {seconds number | kilobytes { number | unlimited }}&lt;BR /&gt;&lt;BR /&gt;For more information please refer the following documents:&lt;BR /&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/asa/asa-command-reference/A-H/cmdref1/c6.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/asa/asa-command-reference/A-H/cmdref1/c6.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;An alternative solution, you can enable the lifetime in kilobytes in Check Point device as well by following the sk108600 scenario 6. (By default it is off)&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
    <pubDate>Thu, 23 Jul 2020 16:06:36 GMT</pubDate>
    <dc:creator>ankitsharma6623</dc:creator>
    <dc:date>2020-07-23T16:06:36Z</dc:date>
    <item>
      <title>IPSEC VPN Tunnel going down during data transfer</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/IPSEC-VPN-Tunnel-going-down-during-data-transfer/m-p/92016#M2145</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;we have IPSEC tunnel between ASA deployed on data center &amp;amp; Checkpoint deployed on Azure.&lt;/P&gt;&lt;P&gt;The tunnel is working fine for the last 8 month for all the servers.&amp;nbsp; &amp;nbsp;we recently added a application server behind ASA firewall and a SQL server behind Checkpoint firewall as part of encryption domain.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When application server is fetching the data from SQL server the tunnel goes down after processing 1 lac&amp;nbsp; to 2lac records.&lt;/P&gt;&lt;P&gt;NO PFS is configured. the tunnel sharing setting are set to &lt;STRONG&gt;One VPN tunnel per subnet pair&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;CPU and RAM utilization are ok.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So what could be the issue.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Ankit Sharma&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 21 Jul 2020 07:11:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/IPSEC-VPN-Tunnel-going-down-during-data-transfer/m-p/92016#M2145</guid>
      <dc:creator>ankitsharma6623</dc:creator>
      <dc:date>2020-07-21T07:11:09Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC VPN Tunnel going down during data transfer</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/IPSEC-VPN-Tunnel-going-down-during-data-transfer/m-p/92272#M2146</link>
      <description>&lt;P&gt;When you say the the VPN "goes down" what is the precise behavior observed?&lt;BR /&gt;What errors/logs do you see?&lt;BR /&gt;What version/JHF?&lt;/P&gt;</description>
      <pubDate>Thu, 23 Jul 2020 15:41:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/IPSEC-VPN-Tunnel-going-down-during-data-transfer/m-p/92272#M2146</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-07-23T15:41:02Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC VPN Tunnel going down during data transfer</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/IPSEC-VPN-Tunnel-going-down-during-data-transfer/m-p/92275#M2147</link>
      <description>&lt;P&gt;Hi Phoneboy,&lt;/P&gt;&lt;P&gt;the&amp;nbsp; issue got resolved&amp;nbsp;&lt;/P&gt;&lt;P&gt;TAC analyzed the VPN debugs and found that, Check Point is receiving Phase-II&amp;nbsp;&lt;BR /&gt;lifetime in KiloBytes from the peer end ASA fw.&lt;BR /&gt;By default Check Point doesn't support or accept the lifetime in KiloBytes:&lt;BR /&gt;&amp;lt;== Remote peer(X.X.X.X)&lt;BR /&gt;SA Life Type:&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;Seconds&lt;BR /&gt;SA Life Duration:&amp;nbsp;&amp;nbsp; &amp;nbsp;28800&lt;BR /&gt;SA Life Type:&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;KiloBytes&lt;BR /&gt;SA Life Duration:&amp;nbsp;&amp;nbsp; &amp;nbsp;4608000&lt;BR /&gt;Encapsulation Mode:&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;BR /&gt;Authentication Alg:&amp;nbsp;&amp;nbsp; &amp;nbsp;HMAC-SHA1&lt;BR /&gt;Key Length:&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;256&lt;BR /&gt;==&amp;gt; Sent to peer X.X.X.X&lt;BR /&gt;Notify Type:&amp;nbsp;&amp;nbsp; &amp;nbsp;24576 (RESPONDER-LIFETIME)&lt;BR /&gt;SPI:&lt;BR /&gt;68 88 bd 2a&lt;BR /&gt;Notify Data:&lt;BR /&gt;80 01 00 02 00 02 00 04 00 00 00 00&lt;BR /&gt;SA Life Type:&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;KiloBytes&lt;BR /&gt;SA Life Duration:&amp;nbsp;&amp;nbsp; &amp;nbsp;0&lt;BR /&gt;Here Check Point is replying with lifetime as 0, it means we do not support or accept it.&lt;BR /&gt;You will be able to see several kinds of the issue where the re-keying process will fail due to renegotiation and when Phase-II is initiated by peer end.&lt;BR /&gt;As a workaround, you can disable the lifetime in KiloBytes from the peer end. I believe the peer end is Cisco ASA so you can use the following command to verify.&lt;BR /&gt;:"sh run all | i crypto-map".&lt;BR /&gt;If you can see the set lifetime, kindly change it to Unlimited using the commands:&lt;BR /&gt;crypto map map-name seq-num set security-association lifetime {seconds number | kilobytes { number | unlimited }}&lt;BR /&gt;&lt;BR /&gt;For more information please refer the following documents:&lt;BR /&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/asa/asa-command-reference/A-H/cmdref1/c6.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/asa/asa-command-reference/A-H/cmdref1/c6.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;An alternative solution, you can enable the lifetime in kilobytes in Check Point device as well by following the sk108600 scenario 6. (By default it is off)&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 23 Jul 2020 16:06:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/IPSEC-VPN-Tunnel-going-down-during-data-transfer/m-p/92275#M2147</guid>
      <dc:creator>ankitsharma6623</dc:creator>
      <dc:date>2020-07-23T16:06:36Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC VPN Tunnel going down during data transfer</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/IPSEC-VPN-Tunnel-going-down-during-data-transfer/m-p/92276#M2148</link>
      <description>&lt;P&gt;Issue got resolved post making the required change on ASA firewall. i.e we set the data limit ASA from xxxxxxKB &amp;nbsp;to unlimited in crypto map settings using below command.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;crypto map map-name seq-num set security-association lifetime {seconds number | kilobytes { number | unlimited }}&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;“3rd party VPN peer proposes Phase 2 lifetime in kilobytes&lt;/P&gt;&lt;P&gt;Symptoms:&lt;/P&gt;&lt;P&gt;A Phase 2 lifetime in &lt;STRONG&gt;kilobytes&lt;/STRONG&gt; is configured on the &lt;STRONG&gt;3rd party VPN peer&lt;/STRONG&gt;. Therefore, it offers it in addition to the lifetime in seconds.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This means the peer wants to renegotiate the tunnel at the end of the &lt;STRONG&gt;lifetime in seconds, or after the number of specified kilobytes has been encrypted - whichever happens first.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;On the Check Point Security Gateway, Phase 2 lifetime is configured only in seconds. Therefore, even though it accepts the proposal for Phase 2 lifetime from 3rd party VPN peer in kilobytes, it also sends back a "RESPONDER-LIFETIME" notification to notify that it is only going to enforce the Phase 2 lifetime in seconds.&lt;/P&gt;&lt;P&gt;With some 3rd party VPN vendors, it is necessary to match the exact initiator's proposal, including the lifetime in kilobytes. Otherwise, they will drop the tunnel and initiate a new negotiation over and over again.”&lt;/P&gt;</description>
      <pubDate>Thu, 23 Jul 2020 16:09:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/IPSEC-VPN-Tunnel-going-down-during-data-transfer/m-p/92276#M2148</guid>
      <dc:creator>ankitsharma6623</dc:creator>
      <dc:date>2020-07-23T16:09:13Z</dc:date>
    </item>
  </channel>
</rss>

