<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Packet Loss over Site-to-Site VPN in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Packet-Loss-over-Site-to-Site-VPN/m-p/120193#M17005</link>
    <description>&lt;P&gt;What was the issue and resolution?&lt;/P&gt;</description>
    <pubDate>Wed, 02 Jun 2021 12:26:59 GMT</pubDate>
    <dc:creator>genisis__</dc:creator>
    <dc:date>2021-06-02T12:26:59Z</dc:date>
    <item>
      <title>Packet Loss over Site-to-Site VPN</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Packet-Loss-over-Site-to-Site-VPN/m-p/119703#M16934</link>
      <description>&lt;P&gt;Hi. We've started to have some packet loss issues between 2 of our offices. Office A has R80.40 gateways and office B has R80.30 gateways. Office B is the office where users have reported the issue in not being able to print (print server is in Office A),&amp;nbsp;&lt;/P&gt;&lt;P&gt;Office B isn't getting these issues with our other office which is running R80.30. We ran pathping and can see that packet loss occurs at the Office A side of the tunnel when the packet gets to the external VIP of our cluster. Pinging from A to B shows packet loss as soon as that packet hits the internal VIP of the gateway.&lt;/P&gt;&lt;P&gt;Apart from the cluster upgrade, which happened last week, no other changes have been made. This particular issue only seems to have started yesterday so we're not quite sure why this is. Could it be caused by the differences in OS on each side of the tunnel?&lt;/P&gt;</description>
      <pubDate>Fri, 28 May 2021 12:03:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Packet-Loss-over-Site-to-Site-VPN/m-p/119703#M16934</guid>
      <dc:creator>Wyman</dc:creator>
      <dc:date>2021-05-28T12:03:13Z</dc:date>
    </item>
    <item>
      <title>Re: Packet Loss over Site-to-Site VPN</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Packet-Loss-over-Site-to-Site-VPN/m-p/119715#M16936</link>
      <description>&lt;P&gt;It could be MTU issues or similar.&lt;BR /&gt;Packet captures from the relevant gateway might give you an idea what’s going on.&lt;/P&gt;</description>
      <pubDate>Fri, 28 May 2021 15:25:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Packet-Loss-over-Site-to-Site-VPN/m-p/119715#M16936</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-05-28T15:25:59Z</dc:date>
    </item>
    <item>
      <title>Re: Packet Loss over Site-to-Site VPN</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Packet-Loss-over-Site-to-Site-VPN/m-p/119772#M16951</link>
      <description>&lt;P&gt;As Phoneboy said this sounds like an MTU issue; I would assume printing will send max size packets that would run afoul of a low MTU somewhere.&amp;nbsp; First off, check the MTU on all interfaces of the upgraded members and make sure they are 1500 along with the rest of the interface settings.&amp;nbsp; Doubtful that Gaia 3.10 is the cause of your issue but it is a newer OS with updated drivers and such and some interface settings may not have quite made it through the upgrade.&lt;/P&gt;
&lt;P&gt;How was the upgrade performed precisely at Office A?&amp;nbsp; In-place with CPUSE or a reimage/new box with a reconfiguration by hand?&amp;nbsp; Either way you could have lost your fwkern.conf file (or others) that may have had some kind of MTU mitigation settings in it.&amp;nbsp; See this thread for a list of files that may have had customizations in them that were lost during the upgrade that you will need to reintroduce:&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Security-Gateways/Hand-edited-Files-to-Check-After-Gateway-Upgrade-Fresh-load/m-p/116319" target="_blank" rel="noopener"&gt;https://community.checkpoint.com/t5/Security-Gateways/Hand-edited-Files-to-Check-After-Gateway-Upgrade-Fresh-load/m-p/116319&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Also this SK sounds kind of similar to your issue, what Jumbo HFA level are you utilizing with your R80.40 boxes?&lt;/P&gt;
&lt;P&gt;&lt;A class="cp_link sc_ellipsis" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk167953&amp;amp;partition=Advanced&amp;amp;product=SecureXL" target="_blank" rel="noopener" data-hasqtip="29" aria-describedby="qtip-29"&gt;sk167953: Traffic is dropped with "dropped by fwmultik_process_f2p_cookie_inner Reason: fwmultik_f2p_cookie_outbound_and_routing failed&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 29 May 2021 21:27:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Packet-Loss-over-Site-to-Site-VPN/m-p/119772#M16951</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2021-05-29T21:27:27Z</dc:date>
    </item>
    <item>
      <title>Re: Packet Loss over Site-to-Site VPN</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Packet-Loss-over-Site-to-Site-VPN/m-p/119786#M16952</link>
      <description>&lt;P&gt;Thats a tough one to figure out. Phoneboy and Tim made good points, though I would find it a bit odd that upgrade would have caused any issues with MTU. I dont think it matters at all as far as OS version, I see people still have vpn tunnels between R77.30 gateways and R81 and works with no issues. Personally, I would contact TAC, just to verify that something with the config had not changed on the upgraded cluster.&lt;/P&gt;</description>
      <pubDate>Sun, 30 May 2021 02:52:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Packet-Loss-over-Site-to-Site-VPN/m-p/119786#M16952</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2021-05-30T02:52:12Z</dc:date>
    </item>
    <item>
      <title>Re: Packet Loss over Site-to-Site VPN</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Packet-Loss-over-Site-to-Site-VPN/m-p/119791#M16955</link>
      <description>&lt;P&gt;As 'The_Rock' suggests, sounds like a TAC case, but also worth gathering the below to then submit to TAC.&lt;/P&gt;
&lt;P&gt;Ensure your running JHFA118&amp;nbsp; on R80.40(latest GA release), R80.30 is JHFA228 (May want to consider latest ongoing take which is JHFA236 which has been out almost 3 weeks now so its getting close to GA).&lt;/P&gt;
&lt;P&gt;Gather cpinfos from Office A and Office B&lt;BR /&gt;tcpdumps from Office A and Office B&lt;BR /&gt;Do some VPN debugging on both sites:&lt;BR /&gt;vpn debug trunc&lt;BR /&gt;vpn debug on TDERROR_ALL_ALL=5&lt;/P&gt;
&lt;P&gt;replicate issue&lt;/P&gt;
&lt;P&gt;vpn debug off&lt;BR /&gt;vpn debug ikeoff&lt;/P&gt;
&lt;P&gt;Collect $FWDIR/log/vpnd.elg from both devices.&lt;/P&gt;
&lt;P&gt;Ensure MTU Path discovery is working (I think there was a post about MTU discovery and allowing inbound access to ICMP type 3 code 4, but I would whitelist access to the gateways for this rather then generic inbound access to the gateways)&lt;/P&gt;
&lt;P&gt;b.t.w Is Office A a virtual system or a physical gateway?&lt;/P&gt;
&lt;P&gt;I think with the above you will be giving TAC allot to go on to escalate quickly if required.&lt;/P&gt;</description>
      <pubDate>Sun, 30 May 2021 10:39:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Packet-Loss-over-Site-to-Site-VPN/m-p/119791#M16955</guid>
      <dc:creator>genisis__</dc:creator>
      <dc:date>2021-05-30T10:39:07Z</dc:date>
    </item>
    <item>
      <title>Re: Packet Loss over Site-to-Site VPN</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Packet-Loss-over-Site-to-Site-VPN/m-p/119837#M16956</link>
      <description>&lt;P&gt;All very valid points and Im positive thats what TAC would ask him for anyway : )&lt;/P&gt;</description>
      <pubDate>Sun, 30 May 2021 17:37:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Packet-Loss-over-Site-to-Site-VPN/m-p/119837#M16956</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2021-05-30T17:37:46Z</dc:date>
    </item>
    <item>
      <title>Re: Packet Loss over Site-to-Site VPN</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Packet-Loss-over-Site-to-Site-VPN/m-p/120187#M17002</link>
      <description>&lt;P&gt;Thanks for the tips, everyone. The performance looks to have improved but I will keep this for future reference.&lt;/P&gt;</description>
      <pubDate>Wed, 02 Jun 2021 11:53:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Packet-Loss-over-Site-to-Site-VPN/m-p/120187#M17002</guid>
      <dc:creator>Wyman</dc:creator>
      <dc:date>2021-06-02T11:53:44Z</dc:date>
    </item>
    <item>
      <title>Re: Packet Loss over Site-to-Site VPN</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Packet-Loss-over-Site-to-Site-VPN/m-p/120193#M17005</link>
      <description>&lt;P&gt;What was the issue and resolution?&lt;/P&gt;</description>
      <pubDate>Wed, 02 Jun 2021 12:26:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Packet-Loss-over-Site-to-Site-VPN/m-p/120193#M17005</guid>
      <dc:creator>genisis__</dc:creator>
      <dc:date>2021-06-02T12:26:59Z</dc:date>
    </item>
    <item>
      <title>Re: Packet Loss over Site-to-Site VPN</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Packet-Loss-over-Site-to-Site-VPN/m-p/120197#M17006</link>
      <description>&lt;P&gt;Hi. It looks to have been caused by high bandwidth utilisation.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 02 Jun 2021 12:48:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Packet-Loss-over-Site-to-Site-VPN/m-p/120197#M17006</guid>
      <dc:creator>Wyman</dc:creator>
      <dc:date>2021-06-02T12:48:31Z</dc:date>
    </item>
    <item>
      <title>Re: Packet Loss over Site-to-Site VPN</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Packet-Loss-over-Site-to-Site-VPN/m-p/120198#M17007</link>
      <description>&lt;P&gt;Thanks for letting us know, thats interesting.&lt;/P&gt;</description>
      <pubDate>Wed, 02 Jun 2021 12:49:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Packet-Loss-over-Site-to-Site-VPN/m-p/120198#M17007</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2021-06-02T12:49:39Z</dc:date>
    </item>
  </channel>
</rss>

