<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Strange behaviour after R80.20 upgrade in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Strange-behaviour-after-R80-20-upgrade/m-p/51915#M12751</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;After completing in-place upgrading our ClusterXL pair from R80.10 to R80.20 we are now experiencing some VPN traffic issues.&lt;/P&gt;&lt;P&gt;We have 14 VPN tunnels between Cisco 887 routers (all in the same community) and &lt;STRONG&gt;they were all working perfectly prior to the upgrade&lt;/STRONG&gt;.&lt;/P&gt;&lt;P&gt;After the upgrade we are seeing the following 2 scenarios:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Issue 1: GRE Tunnels stop working when a policy is installed. (Similar to issue 2)&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Configuration:&lt;/P&gt;&lt;P&gt;[GRE Router] – [FW CLUSTER] ------- vpn ------- [Cisco 887] --- [Cisco switch]&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;|___________________&amp;nbsp; GRE Tunnel&amp;nbsp; &amp;nbsp;___________________|&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When a policy is installed the sites that utilize a GRE across the VPN’s stop working. They will start working again after a variable time ranging from several minutes/hours.&lt;/P&gt;&lt;P&gt;I can get them working immediately again by failing the cluster to the standby member. I can then fail back and everything keeps working.&lt;/P&gt;&lt;P&gt;While it is experiencing the Issue:&lt;/P&gt;&lt;P&gt;- SSH through the VPN works to the Cisco 887 devices.&amp;nbsp;&lt;/P&gt;&lt;P&gt;- Pings work to the Cisco switch interface.&lt;/P&gt;&lt;P&gt;- Other traffic does not get to the Cisco Switch interface. The Cisco switch interface is the GRE tunnel end point so GRE tunnel drops.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Issue 2: VPN Sites with only a Cisco 887&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Configuration:&lt;/P&gt;&lt;P&gt;[FW CLUSTER] ------- vpn ------- [Cisco 887] – [Devices e.g. UPS, Cardax]&lt;/P&gt;&lt;P&gt;All VPN links are stating they are up and ping traffic works to all devices. Several sites (not all) are having the below issues where traffic does not work.&lt;/P&gt;&lt;P&gt;- SSH and telnet to the Cisco 887 across the VPN does not work.&lt;/P&gt;&lt;P&gt;- Telnet SSH and HTTP does not work to the UPS connected to the Cisco 887.&lt;/P&gt;&lt;P&gt;- Ping is successful across the VPN to the Cisco 887 and the UPS.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;- Disabling SecureXL – all the above traffic works&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;- Enabling SecureXL – New connections stop working. Existing sessions (e.g. SSH) continue to work.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;The following will usually resolve the issue:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;- &lt;/STRONG&gt;selecting ‘vpn tu’ - Option 7 – Delete all IPsec+IKE SAs for a given peer (GW)&lt;/P&gt;&lt;P&gt;Sometimes the above doesn't work and it may work by selecting option 5 after doing option 7&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;I have just logged a case with checkpoint.&lt;/P&gt;&lt;P&gt;If anyone has any ideas or has seen this before I'd appreciate any assistance as I'm not sure what to do next?&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also:&lt;/P&gt;&lt;P&gt;Rebooting the Cisco 887 does not resolve the issue.&lt;/P&gt;&lt;P&gt;Both firewalls in the cluster have been rebooted (they were done separately – I have not rebooted both at the same time)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 26 Apr 2019 02:26:50 GMT</pubDate>
    <dc:creator>Andrew</dc:creator>
    <dc:date>2019-04-26T02:26:50Z</dc:date>
    <item>
      <title>Strange behaviour after R80.20 upgrade</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Strange-behaviour-after-R80-20-upgrade/m-p/51915#M12751</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;After completing in-place upgrading our ClusterXL pair from R80.10 to R80.20 we are now experiencing some VPN traffic issues.&lt;/P&gt;&lt;P&gt;We have 14 VPN tunnels between Cisco 887 routers (all in the same community) and &lt;STRONG&gt;they were all working perfectly prior to the upgrade&lt;/STRONG&gt;.&lt;/P&gt;&lt;P&gt;After the upgrade we are seeing the following 2 scenarios:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Issue 1: GRE Tunnels stop working when a policy is installed. (Similar to issue 2)&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Configuration:&lt;/P&gt;&lt;P&gt;[GRE Router] – [FW CLUSTER] ------- vpn ------- [Cisco 887] --- [Cisco switch]&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;|___________________&amp;nbsp; GRE Tunnel&amp;nbsp; &amp;nbsp;___________________|&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When a policy is installed the sites that utilize a GRE across the VPN’s stop working. They will start working again after a variable time ranging from several minutes/hours.&lt;/P&gt;&lt;P&gt;I can get them working immediately again by failing the cluster to the standby member. I can then fail back and everything keeps working.&lt;/P&gt;&lt;P&gt;While it is experiencing the Issue:&lt;/P&gt;&lt;P&gt;- SSH through the VPN works to the Cisco 887 devices.&amp;nbsp;&lt;/P&gt;&lt;P&gt;- Pings work to the Cisco switch interface.&lt;/P&gt;&lt;P&gt;- Other traffic does not get to the Cisco Switch interface. The Cisco switch interface is the GRE tunnel end point so GRE tunnel drops.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Issue 2: VPN Sites with only a Cisco 887&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Configuration:&lt;/P&gt;&lt;P&gt;[FW CLUSTER] ------- vpn ------- [Cisco 887] – [Devices e.g. UPS, Cardax]&lt;/P&gt;&lt;P&gt;All VPN links are stating they are up and ping traffic works to all devices. Several sites (not all) are having the below issues where traffic does not work.&lt;/P&gt;&lt;P&gt;- SSH and telnet to the Cisco 887 across the VPN does not work.&lt;/P&gt;&lt;P&gt;- Telnet SSH and HTTP does not work to the UPS connected to the Cisco 887.&lt;/P&gt;&lt;P&gt;- Ping is successful across the VPN to the Cisco 887 and the UPS.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;- Disabling SecureXL – all the above traffic works&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;- Enabling SecureXL – New connections stop working. Existing sessions (e.g. SSH) continue to work.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;The following will usually resolve the issue:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;- &lt;/STRONG&gt;selecting ‘vpn tu’ - Option 7 – Delete all IPsec+IKE SAs for a given peer (GW)&lt;/P&gt;&lt;P&gt;Sometimes the above doesn't work and it may work by selecting option 5 after doing option 7&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;I have just logged a case with checkpoint.&lt;/P&gt;&lt;P&gt;If anyone has any ideas or has seen this before I'd appreciate any assistance as I'm not sure what to do next?&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also:&lt;/P&gt;&lt;P&gt;Rebooting the Cisco 887 does not resolve the issue.&lt;/P&gt;&lt;P&gt;Both firewalls in the cluster have been rebooted (they were done separately – I have not rebooted both at the same time)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 26 Apr 2019 02:26:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Strange-behaviour-after-R80-20-upgrade/m-p/51915#M12751</guid>
      <dc:creator>Andrew</dc:creator>
      <dc:date>2019-04-26T02:26:50Z</dc:date>
    </item>
    <item>
      <title>Re: Strange behaviour after R80.20 upgrade</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Strange-behaviour-after-R80-20-upgrade/m-p/52071#M12752</link>
      <description>&lt;P&gt;About to test this to see if it resolves the issue:&lt;/P&gt;&lt;P&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk148872" target="_blank"&gt;https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk148872&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 28 Apr 2019 22:18:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Strange-behaviour-after-R80-20-upgrade/m-p/52071#M12752</guid>
      <dc:creator>Andrew</dc:creator>
      <dc:date>2019-04-28T22:18:47Z</dc:date>
    </item>
    <item>
      <title>Re: Strange behaviour after R80.20 upgrade</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Strange-behaviour-after-R80-20-upgrade/m-p/63556#M12753</link>
      <description>&lt;P&gt;HI Andrew,&lt;/P&gt;&lt;P&gt;After upgrading to r80.20 I experience&amp;nbsp;&lt;STRONG&gt;Issue 1: GRE Tunnels stop working when a policy is installed.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Did you find a solution?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;thanks.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;andy&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 24 Sep 2019 12:17:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Strange-behaviour-after-R80-20-upgrade/m-p/63556#M12753</guid>
      <dc:creator>andy_currigan</dc:creator>
      <dc:date>2019-09-24T12:17:33Z</dc:date>
    </item>
    <item>
      <title>Re: Strange behaviour after R80.20 upgrade</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Strange-behaviour-after-R80-20-upgrade/m-p/63558#M12754</link>
      <description>forgot to mention that vpn in our case is not ended on our checkpoint so the sk you mention in our case can't be the solution&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal" target="_blank"&gt;https://supportcenter.checkpoint.com/supportcenter/portal&lt;/A&gt;?&lt;BR /&gt;eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk148872</description>
      <pubDate>Tue, 24 Sep 2019 12:33:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Strange-behaviour-after-R80-20-upgrade/m-p/63558#M12754</guid>
      <dc:creator>andy_currigan</dc:creator>
      <dc:date>2019-09-24T12:33:46Z</dc:date>
    </item>
    <item>
      <title>Re: Strange behaviour after R80.20 upgrade</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Strange-behaviour-after-R80-20-upgrade/m-p/64031#M12755</link>
      <description>&lt;P&gt;Hi Andy,&lt;/P&gt;&lt;P&gt;SK148872 resolved our issue.&lt;/P&gt;&lt;P&gt;Checkpoint support worked through our issue to get to the resolution.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Good luck.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 01 Oct 2019 06:29:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Strange-behaviour-after-R80-20-upgrade/m-p/64031#M12755</guid>
      <dc:creator>Andrew</dc:creator>
      <dc:date>2019-10-01T06:29:32Z</dc:date>
    </item>
  </channel>
</rss>

