<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: GRE flapping -- three vendors pointing fingers in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/GRE-flapping-three-vendors-pointing-fingers/m-p/109821#M14998</link>
    <description>&lt;P&gt;Hey Tim -- sincere thanks.&amp;nbsp; &amp;nbsp; &amp;nbsp;Hand to forehead moment -- and why Checkpoint recommends IPSEC over GRE -- that the tunneled GRE traffic is cleartext.&amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/P&gt;&lt;P&gt;thanks for taking the time on diagram with annotation.&amp;nbsp; this great.&amp;nbsp; &amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 04 Feb 2021 15:28:38 GMT</pubDate>
    <dc:creator>Garrett_DirSec</dc:creator>
    <dc:date>2021-02-04T15:28:38Z</dc:date>
    <item>
      <title>GRE flapping -- three vendors pointing fingers</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/GRE-flapping-three-vendors-pointing-fingers/m-p/109715#M14976</link>
      <description>&lt;P&gt;Hello --&lt;/P&gt;&lt;P&gt;Cisco interior router trying to maintain a GRE tunnel with regional zScaler cloud through a checkpoint R80.20-based cluster (latest GA HFA applied).&lt;/P&gt;&lt;P&gt;The GRE tunnel is flapping sporadically and everyone pointing fingers at each other.&lt;/P&gt;&lt;P&gt;CP TAC involved and simply did a "fw montor ..." traffic capture of proto 47 (GRE) to assert "we're passing the traffic".&lt;/P&gt;&lt;P&gt;However, the devil is in the details and wondering if anyone else encountered such an issue and have recommendations?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;update #1:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; if GRE keepalives are turned OFF on Cisco router, the GRE tunnel stays up.&lt;/P&gt;&lt;P&gt;ideally, we would like to do "fw monitor ..." specifically for GRE keepalives and validate NAT being properly applied on CP cluster.&amp;nbsp; This is current area of focus.&lt;/P&gt;&lt;P&gt;reference:&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/ip/generic-routing-encapsulation-gre/63760-gre-keepalives-63760.html" target="_blank" rel="noopener"&gt;How GRE Keepalives works HERE.&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks -GA&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 03 Feb 2021 18:57:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/GRE-flapping-three-vendors-pointing-fingers/m-p/109715#M14976</guid>
      <dc:creator>Garrett_DirSec</dc:creator>
      <dc:date>2021-02-03T18:57:53Z</dc:date>
    </item>
    <item>
      <title>Re: GRE flapping -- three vendors pointing fingers</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/GRE-flapping-three-vendors-pointing-fingers/m-p/109746#M14982</link>
      <description>&lt;P&gt;This filter should focus on all traffic between the two routers with a GRE-tunneled Protocol Type of zero (which is indicative a GRE keepalive) and should show you the packet arriving and leaving so you can verify the firewall is not somehow mishandling it:&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;cppcap -f "proto gre and ip[33:2]=0x00 and host 1.2.3.4 and host 5.6.7.8"&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;The&lt;STRONG&gt; ip[33:2]&lt;/STRONG&gt; is an offset to where I believe the tunneled IP Protocol Type is located, with 0x00 matching a keepalive.&amp;nbsp; I think I calculated that offset correctly but don't have any live GRE traffic to test with it.&lt;/P&gt;
&lt;P&gt;As I mentioned in my &lt;EM&gt;Max Capture&lt;/EM&gt; course, NAT can impact this matching so you will probably need to construct a slightly more complex filter to take into account pre-NAT and post-NAT matching IP combinations.&amp;nbsp; I only had a few examples of offsets such as these in &lt;EM&gt;Max Capture&lt;/EM&gt; because normally there is some kind of predefined macro available to match the header fields you want, but matching protocol GRE/17 in the outer header (&lt;STRONG&gt;proto gre&lt;/STRONG&gt;) was all that was available.&lt;/P&gt;</description>
      <pubDate>Wed, 03 Feb 2021 22:28:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/GRE-flapping-three-vendors-pointing-fingers/m-p/109746#M14982</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2021-02-03T22:28:07Z</dc:date>
    </item>
    <item>
      <title>Re: GRE flapping -- three vendors pointing fingers</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/GRE-flapping-three-vendors-pointing-fingers/m-p/109749#M14983</link>
      <description>&lt;P&gt;Hey&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/597"&gt;@Timothy_Hall&lt;/a&gt;&amp;nbsp; -&amp;nbsp; sincere thanks for msg!&amp;nbsp; &amp;nbsp;I hope you and family are good.&lt;/P&gt;&lt;P&gt;A couple questions:&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Honestly, I'm not familiar with cppcap.&amp;nbsp; &amp;nbsp;I understand it's a less resource intensive version of standard tcpdump on GAIA.&amp;nbsp; Why use cppcap (or tcpdump) over standard "fw monitor..." with relevant options?&amp;nbsp; &amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/SecureKnowledge/CPPCAP-Alternative-to-tcpdump-on-Gaia/ba-p/396" target="_blank" rel="noopener"&gt;(REF HERE).&lt;/A&gt;&lt;/LI&gt;&lt;LI&gt;while digesting the cisco article on &lt;A href="https://www.cisco.com/c/en/us/support/docs/ip/generic-routing-encapsulation-gre/63760-gre-keepalives-63760.html" target="_blank" rel="noopener"&gt;GRE Keepalives&lt;/A&gt; , the following diagram makes me question specifically which Protocol Type we should be looking for.&amp;nbsp; &amp;nbsp; In the case of diagram below, the outter header is Protocol Type = IP, while the inner header is Protocol Type = 0.&amp;nbsp; &amp;nbsp; Do I understand correctly that cppcap will "see" the outter header (PT=IP) but not interior header (PT=0)?&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="gre-encap1.jpg" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/10444iDBC9BC9EBFE9BC5C/image-size/large?v=v2&amp;amp;px=999" role="button" title="gre-encap1.jpg" alt="gre-encap1.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 03 Feb 2021 22:43:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/GRE-flapping-three-vendors-pointing-fingers/m-p/109749#M14983</guid>
      <dc:creator>Garrett_DirSec</dc:creator>
      <dc:date>2021-02-03T22:43:25Z</dc:date>
    </item>
    <item>
      <title>Re: GRE flapping -- three vendors pointing fingers</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/GRE-flapping-three-vendors-pointing-fingers/m-p/109754#M14984</link>
      <description>&lt;P&gt;You can try something like this on CP -&amp;gt; fw monitor -e "accept port 1723 and proto 47;"&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;See what you get...thats GRE port and protocol, so should give you something. BUT, Im wondering though if it will, since you said CP is just a passthrough?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Wed, 03 Feb 2021 23:51:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/GRE-flapping-three-vendors-pointing-fingers/m-p/109754#M14984</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2021-02-03T23:51:56Z</dc:date>
    </item>
    <item>
      <title>Re: GRE flapping -- three vendors pointing fingers</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/GRE-flapping-three-vendors-pointing-fingers/m-p/109756#M14985</link>
      <description>&lt;P&gt;These days &lt;STRONG&gt;cppcap&lt;/STRONG&gt; is my preferred tool unless a special situation is present where you must use something else, but since GRE traffic is not accelerated by SecureXL and always goes F2F (that may have changed in R80.20 - can't remember), you could certainly use&lt;STRONG&gt; fw monitor -e&lt;/STRONG&gt; if you want.&lt;/P&gt;
&lt;P&gt;The&amp;nbsp;&lt;STRONG&gt;ip[33:2]&lt;/STRONG&gt; offset I calculated is going after the rightmost tunneled GRE Protocol Type of 0, the &lt;STRONG&gt;proto gre&lt;/STRONG&gt; is going for the outer IP Protocol header Protocol Type which is not shown in that diagram.&amp;nbsp; Unlike IPSec traffic, GRE is not encrypted so &lt;STRONG&gt;cppcap&lt;/STRONG&gt; or &lt;STRONG&gt;fw monitor&lt;/STRONG&gt; can see into the tunneled GRE header just fine.&amp;nbsp; See below, I'm sure if I screwed up someone will be happy to correct me:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="GRE_keepalive.png" style="width: 627px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/10445i6F0F5E1CCC97A6CE/image-size/large?v=v2&amp;amp;px=999" role="button" title="GRE_keepalive.png" alt="GRE_keepalive.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 03 Feb 2021 23:56:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/GRE-flapping-three-vendors-pointing-fingers/m-p/109756#M14985</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2021-02-03T23:56:09Z</dc:date>
    </item>
    <item>
      <title>Re: GRE flapping -- three vendors pointing fingers</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/GRE-flapping-three-vendors-pointing-fingers/m-p/109757#M14986</link>
      <description>&lt;P&gt;Im sure you are correct, Im just an old school guy, thats all : ))&lt;/P&gt;</description>
      <pubDate>Thu, 04 Feb 2021 00:07:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/GRE-flapping-three-vendors-pointing-fingers/m-p/109757#M14986</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2021-02-04T00:07:12Z</dc:date>
    </item>
    <item>
      <title>Re: GRE flapping -- three vendors pointing fingers</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/GRE-flapping-three-vendors-pointing-fingers/m-p/109821#M14998</link>
      <description>&lt;P&gt;Hey Tim -- sincere thanks.&amp;nbsp; &amp;nbsp; &amp;nbsp;Hand to forehead moment -- and why Checkpoint recommends IPSEC over GRE -- that the tunneled GRE traffic is cleartext.&amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/P&gt;&lt;P&gt;thanks for taking the time on diagram with annotation.&amp;nbsp; this great.&amp;nbsp; &amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 04 Feb 2021 15:28:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/GRE-flapping-three-vendors-pointing-fingers/m-p/109821#M14998</guid>
      <dc:creator>Garrett_DirSec</dc:creator>
      <dc:date>2021-02-04T15:28:38Z</dc:date>
    </item>
  </channel>
</rss>

