<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: &amp;quot;Packet is dropped because there is no valid SA&amp;quot; after Management Server upgrade in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/quot-Packet-is-dropped-because-there-is-no-valid-SA-quot-after/m-p/126934#M18366</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/38213"&gt;@the_rock&lt;/a&gt;&amp;nbsp;, no, only three VPNs have this issue. Other 10+ work as before.&lt;/P&gt;&lt;P&gt;We didn't perform in-place upgrade, but migrated MNGT to another server. Let's see if I can get old file and compare them.&lt;/P&gt;</description>
    <pubDate>Fri, 13 Aug 2021 12:35:37 GMT</pubDate>
    <dc:creator>Exonix</dc:creator>
    <dc:date>2021-08-13T12:35:37Z</dc:date>
    <item>
      <title>"Packet is dropped because there is no valid SA" after Management Server upgrade</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/quot-Packet-is-dropped-because-there-is-no-valid-SA-quot-after/m-p/126907#M18358</link>
      <description>&lt;P&gt;Hi everyone,&lt;/P&gt;&lt;P&gt;We had following infrastructure:&lt;/P&gt;&lt;P&gt;- one management server R77.30&lt;BR /&gt;- one security gateway R77.20&lt;/P&gt;&lt;P&gt;Recently we upgraded management server to R80.40 and after that all VPNs with 3rd party peers have got a problem &lt;STRONG&gt;even if VPN is established&lt;/STRONG&gt;:&lt;/P&gt;&lt;P&gt;"Packet is dropped because there is no valid SA - please refer to solution sk19423 in SecureKnowledge Database for more information"&lt;/P&gt;&lt;P&gt;What we tried:&lt;/P&gt;&lt;P&gt;- dissabled suppernetting for a community (&lt;SPAN&gt;&lt;STRONG&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk108600#Scenario%201" target="_self"&gt;changed&lt;/A&gt;&lt;/STRONG&gt; the&amp;nbsp;&lt;/SPAN&gt;&lt;EM&gt;ike_p2_enable_supernet_from_R80.20&lt;/EM&gt;&lt;SPAN&gt;&amp;nbsp;parameter from "by_global" to "false"&lt;/SPAN&gt;)&lt;/P&gt;&lt;P&gt;- reset SA for a peer (#vpn tu, 7 Peer-IP)&lt;/P&gt;&lt;P&gt;both didn't help.&lt;/P&gt;&lt;P&gt;How can we fix this issue?&lt;/P&gt;&lt;P&gt;Thank you in advance!&lt;/P&gt;</description>
      <pubDate>Fri, 13 Aug 2021 08:51:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/quot-Packet-is-dropped-because-there-is-no-valid-SA-quot-after/m-p/126907#M18358</guid>
      <dc:creator>Exonix</dc:creator>
      <dc:date>2021-08-13T08:51:41Z</dc:date>
    </item>
    <item>
      <title>Re: "Packet is dropped because there is no valid SA" after Management Server upgrade</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/quot-Packet-is-dropped-because-there-is-no-valid-SA-quot-after/m-p/126920#M18363</link>
      <description>&lt;P&gt;That "packet is dropped as their is no valid SA" message is just a symptom of your problem, not the actual problem.&amp;nbsp; Look at the other VPN logs surrounding this message, you should see the actual cause such as "no proposal chosen", "no response from peer" or something like that.&lt;/P&gt;
&lt;P&gt;It is likely that you had some manual per-peer VPN domain definitions in the $FWDIR/conf/user.def.FW1 file on your old R77.30 SMS that did not survive the upgrade; these are common with third-party VPN peers such as Sonicwall/Fortinet/Juniper which are extremely picky about what Phase 2 subnets/Proxy-IDs they will accept.&amp;nbsp; See Scenario 1 of&amp;nbsp;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk108600&amp;amp;partition=Advanced&amp;amp;product=IPSec" target="_blank" rel="noopener"&gt;sk108600: VPN Site-to-Site with 3rd party&lt;/A&gt;.&amp;nbsp; Note that the user.def* file name has changed in R80.40, and the customized contents of the original $FWDIR/conf/user.def.FW1 file must be placed in the&amp;nbsp;$FWDIR/conf/user.def.R77CMP file on your R80.40 SMS to work properly.&amp;nbsp; See&amp;nbsp;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk98239" target="_blank" rel="noopener"&gt;sk98239 - Location of 'user.def' files on Security Management Server&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 13 Aug 2021 12:13:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/quot-Packet-is-dropped-because-there-is-no-valid-SA-quot-after/m-p/126920#M18363</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2021-08-13T12:13:57Z</dc:date>
    </item>
    <item>
      <title>Re: "Packet is dropped because there is no valid SA" after Management Server upgrade</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/quot-Packet-is-dropped-because-there-is-no-valid-SA-quot-after/m-p/126930#M18364</link>
      <description>&lt;P&gt;Timothy Hall is correct...it definitely could be the fact that some of those files have changed on the mgmt server. So you are saying all if your tunnels are showing same thing?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 13 Aug 2021 12:26:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/quot-Packet-is-dropped-because-there-is-no-valid-SA-quot-after/m-p/126930#M18364</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2021-08-13T12:26:44Z</dc:date>
    </item>
    <item>
      <title>Re: "Packet is dropped because there is no valid SA" after Management Server upgrade</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/quot-Packet-is-dropped-because-there-is-no-valid-SA-quot-after/m-p/126934#M18366</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/38213"&gt;@the_rock&lt;/a&gt;&amp;nbsp;, no, only three VPNs have this issue. Other 10+ work as before.&lt;/P&gt;&lt;P&gt;We didn't perform in-place upgrade, but migrated MNGT to another server. Let's see if I can get old file and compare them.&lt;/P&gt;</description>
      <pubDate>Fri, 13 Aug 2021 12:35:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/quot-Packet-is-dropped-because-there-is-no-valid-SA-quot-after/m-p/126934#M18366</guid>
      <dc:creator>Exonix</dc:creator>
      <dc:date>2021-08-13T12:35:37Z</dc:date>
    </item>
    <item>
      <title>Re: "Packet is dropped because there is no valid SA" after Management Server upgrade</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/quot-Packet-is-dropped-because-there-is-no-valid-SA-quot-after/m-p/126936#M18367</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/597"&gt;@Timothy_Hall&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;currently we use "One VPN tunnel per subnet pair" that means Encryption Domain is defined manually like before upgrade. And it wasn't in-place upgrade, but migtration to another host.&lt;/P&gt;&lt;P&gt;The solution that you gave, I have already tried: &lt;SPAN&gt;changed the&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;EM&gt;ike_p2_enable_supernet_from_R80.20&lt;/EM&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;parameter from "by_global" to "&lt;STRONG&gt;false&lt;/STRONG&gt;". I've opened&amp;nbsp;GuiDBedit and this change is still present. And now I have an interesting thing:&lt;BR /&gt;- we did migration 10th Aug.&lt;BR /&gt;- we changed "&lt;STRONG&gt;&lt;EM&gt;ike_p2_enable_supernet_from_R80.20&lt;/EM&gt;&lt;/STRONG&gt;" 12th Aug&lt;BR /&gt;- but I see, that&amp;nbsp;user.def.FW1 still has last modified date 10th Aug, and&amp;nbsp;user.def.R77CMP even Jan. 2020.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Any ideas?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 13 Aug 2021 13:05:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/quot-Packet-is-dropped-because-there-is-no-valid-SA-quot-after/m-p/126936#M18367</guid>
      <dc:creator>Exonix</dc:creator>
      <dc:date>2021-08-13T13:05:27Z</dc:date>
    </item>
    <item>
      <title>Re: "Packet is dropped because there is no valid SA" after Management Server upgrade</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/quot-Packet-is-dropped-because-there-is-no-valid-SA-quot-after/m-p/126938#M18368</link>
      <description>&lt;P&gt;Right, I see what you mean. Hm, if only 3 are broken, thats even more puzzling...yea, if you have old file to compare, that would definitely help. Just curious...those 3 that fail, are they all CP to 3rd party or cloud provider or cp to cp? What about ones that do work? Any permanent tunnels?&lt;/P&gt;</description>
      <pubDate>Fri, 13 Aug 2021 13:39:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/quot-Packet-is-dropped-because-there-is-no-valid-SA-quot-after/m-p/126938#M18368</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2021-08-13T13:39:05Z</dc:date>
    </item>
    <item>
      <title>Re: "Packet is dropped because there is no valid SA" after Management Server upgrade</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/quot-Packet-is-dropped-because-there-is-no-valid-SA-quot-after/m-p/126939#M18369</link>
      <description>&lt;P&gt;All CP to 3rd party. non-permanent, but we constantly monitore some remote hosts.&lt;/P&gt;&lt;P&gt;But we also have another CP to 3rd party (like Cisco) and they still work.&lt;/P&gt;</description>
      <pubDate>Fri, 13 Aug 2021 13:43:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/quot-Packet-is-dropped-because-there-is-no-valid-SA-quot-after/m-p/126939#M18369</guid>
      <dc:creator>Exonix</dc:creator>
      <dc:date>2021-08-13T13:43:30Z</dc:date>
    </item>
    <item>
      <title>Re: "Packet is dropped because there is no valid SA" after Management Server upgrade</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/quot-Packet-is-dropped-because-there-is-no-valid-SA-quot-after/m-p/126940#M18370</link>
      <description>&lt;P&gt;I get it...thats why I find that very confusing. One thing I would check is vpn settings in guidbedit for say community that works and one that does not...see if you can spot any major differences.&lt;/P&gt;</description>
      <pubDate>Fri, 13 Aug 2021 13:47:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/quot-Packet-is-dropped-because-there-is-no-valid-SA-quot-after/m-p/126940#M18370</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2021-08-13T13:47:17Z</dc:date>
    </item>
    <item>
      <title>Re: "Packet is dropped because there is no valid SA" after Management Server upgrade</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/quot-Packet-is-dropped-because-there-is-no-valid-SA-quot-after/m-p/126959#M18374</link>
      <description>&lt;P&gt;Sigh please read my prior post again...&lt;/P&gt;
&lt;P&gt;Yes the Cisco one still works because Cisco is less strict about the subnets/Proxy-IDs it will accept unlike Fortinet/Sonicwall/Juniper and doesn't need user.def* modifications to work typically.&lt;/P&gt;
&lt;P&gt;Everything else you mentioned in your last reply (One VPN tunnel per subnet pair, ike_p2_enable_supernet_from_R80.20) is not relevant to the contents of the $FWDIR/conf/user.def.FW1 which will override all that.&amp;nbsp; Find the $FWDIR/conf/user.def.FW1 file on your original R77.30 SMS (not the upgraded R80.40 one) and I can *guarantee* you have &lt;STRONG&gt;subnet_for_range_and_peer&lt;/STRONG&gt; directives in there.&amp;nbsp; Those directives need to be placed in the $FWDIR/conf/user.def.R77CMP file on your upgraded R80.40 SMS, and then reinstall policy to your gateways.&amp;nbsp; Full stop.&lt;/P&gt;</description>
      <pubDate>Fri, 13 Aug 2021 18:44:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/quot-Packet-is-dropped-because-there-is-no-valid-SA-quot-after/m-p/126959#M18374</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2021-08-13T18:44:32Z</dc:date>
    </item>
    <item>
      <title>Re: "Packet is dropped because there is no valid SA" after Management Server upgrade</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/quot-Packet-is-dropped-because-there-is-no-valid-SA-quot-after/m-p/126961#M18376</link>
      <description>&lt;P&gt;Lets hope that works for him...fingers crossed!&lt;/P&gt;</description>
      <pubDate>Fri, 13 Aug 2021 18:53:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/quot-Packet-is-dropped-because-there-is-no-valid-SA-quot-after/m-p/126961#M18376</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2021-08-13T18:53:48Z</dc:date>
    </item>
    <item>
      <title>Re: "Packet is dropped because there is no valid SA" after Management Server upgrade</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/quot-Packet-is-dropped-because-there-is-no-valid-SA-quot-after/m-p/127028#M18395</link>
      <description>&lt;P&gt;thank you very much. it did help.&lt;/P&gt;</description>
      <pubDate>Mon, 16 Aug 2021 08:05:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/quot-Packet-is-dropped-because-there-is-no-valid-SA-quot-after/m-p/127028#M18395</guid>
      <dc:creator>Exonix</dc:creator>
      <dc:date>2021-08-16T08:05:23Z</dc:date>
    </item>
  </channel>
</rss>

