<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: VPN Encryption Issues with tunnel to Azure in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-Encryption-Issues-with-tunnel-to-Azure/m-p/132022#M19520</link>
    <description>&lt;P&gt;Just a quick update:&lt;/P&gt;&lt;P&gt;Applying the Hotfix did not solve the issue. After further reviewing with our Azure Team, we figured out a misconfiguration of the routing table in Azure, so the encryption domains did not match.&amp;nbsp;&lt;/P&gt;&lt;P&gt;After fixing this, we see at least no further drops but it's still not working. Although, I guess it's not related to our Checkpoint configuration, as no issues can be seen now.&lt;/P&gt;&lt;P&gt;Thanks for your support though!&lt;/P&gt;</description>
    <pubDate>Tue, 19 Oct 2021 05:12:58 GMT</pubDate>
    <dc:creator>T_Sonnberger</dc:creator>
    <dc:date>2021-10-19T05:12:58Z</dc:date>
    <item>
      <title>VPN Encryption Issues with tunnel to Azure</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-Encryption-Issues-with-tunnel-to-Azure/m-p/130307#M19136</link>
      <description>&lt;P&gt;Dear CPUG,&lt;/P&gt;&lt;P&gt;I have a strange issue with a tunnel to Azure.&lt;/P&gt;&lt;P&gt;The tunnel is up and running and we have routed two networks to Azure successfully for a long time. Now I have added a third network to the encryption domain to extend the remote range.&lt;/P&gt;&lt;P&gt;For this new network, I can't get a working connection...&lt;/P&gt;&lt;P&gt;Within Smart Log, I see that it is routed into the correct VPN community and is encrypted the same way, as the working networks.&lt;/P&gt;&lt;P&gt;However, for SSH traffic, I do not see any drops in Smart Log and for ICPM I see:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Encryption/Decryption failure, failed to resolve SA (VPN Error code 01)&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;I have applied&amp;nbsp;sk122532 with no success...&lt;/P&gt;&lt;P&gt;fw ctl zdebug + drop shows me different reasons, why it's blocked:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;@;452435048;[cpu_3];[fw4_0];fw_log_drop_ex: Packet proto=6 s.s.s.s:1034 -&amp;gt; d.d.d.d:22 dropped by fwmultik_process_f2p_cookie_inner Reason: fwmultik_f2p_cookie_outbound_and_routing failed;&lt;BR /&gt;@;452460291;[cpu_3];[fw4_0];fw_log_drop_ex: Packet proto=1 s.s.s.s:2048 -&amp;gt; d.d.d.d:13732 dropped by chain_ipsec_methods_ok Reason: vpn_decrypt_methods_ok failed;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Which brought me to:&amp;nbsp;&lt;SPAN&gt;sk167953 - but then I wonder, why it is working for the other two subnets in the encryption domain.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Looking on a fw monitor:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;[vs_0][fw_2] eth1-01:i[44]: s.s.s.s-&amp;gt; d.d.d.d (TCP) len=52 id=10707&lt;BR /&gt;TCP: 31479 -&amp;gt; 22 .S.... seq=d355f30b ack=00000000&lt;BR /&gt;[vs_0][fw_2] eth1-01:I[44]: s.s.s.s -&amp;gt; d.d.d.d (TCP) len=52 id=10707&lt;BR /&gt;TCP: 31479 -&amp;gt; 22 .S.... seq=d355f30b ack=00000000&lt;BR /&gt;[vs_0][fw_2] eth1-01:o[44]: s.s.s.s -&amp;gt; d.d.d.d (TCP) len=52 id=10707&lt;BR /&gt;TCP: 31479 -&amp;gt; 22 .S.... seq=d355f30b ack=00000000&lt;BR /&gt;[vs_0][fw_2] eth1-01:O[44]: s.s.s.s&amp;nbsp;-&amp;gt; d.d.d.d (TCP) len=52 id=10707&lt;BR /&gt;TCP: 31479 -&amp;gt; 22 .S.... seq=d355f30b ack=00000000&lt;BR /&gt;[vs_0][fw_0] eth1-01:Oe[44]: s.s.s.s -&amp;gt; d.d.d.d (TCP) len=52 id=10707&lt;BR /&gt;TCP: 31479 -&amp;gt; 22 .S.... seq=d355f30b ack=00000000&lt;BR /&gt;[vs_0][fw_2] eth1-03:i[44]: s.s.s.s -&amp;gt; d.d.d.d (TCP) len=52 id=10707&lt;BR /&gt;TCP: 31479 -&amp;gt; 22 .S.... seq=d355f30b ack=00000000&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;It apprears to exit the physical internet interface (eth1-03) while I do not see this, for working connections?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do you have any ideas, what to check? Might it be a routing issue on Azures end?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any hint would be highly appreaciated! Thanks in advance!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;BR,&lt;/P&gt;&lt;P&gt;Thomas&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 27 Sep 2021 07:06:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-Encryption-Issues-with-tunnel-to-Azure/m-p/130307#M19136</guid>
      <dc:creator>T_Sonnberger</dc:creator>
      <dc:date>2021-09-27T07:06:29Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Encryption Issues with tunnel to Azure</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-Encryption-Issues-with-tunnel-to-Azure/m-p/130413#M19164</link>
      <description>&lt;P&gt;P.s. We are running R80.30 Take 200&lt;/P&gt;&lt;P&gt;Restarting the tunnel did not make any changes.&lt;/P&gt;&lt;P&gt;BR,&lt;/P&gt;&lt;P&gt;Thomas&lt;/P&gt;</description>
      <pubDate>Tue, 28 Sep 2021 04:25:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-Encryption-Issues-with-tunnel-to-Azure/m-p/130413#M19164</guid>
      <dc:creator>T_Sonnberger</dc:creator>
      <dc:date>2021-09-28T04:25:13Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Encryption Issues with tunnel to Azure</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-Encryption-Issues-with-tunnel-to-Azure/m-p/130416#M19165</link>
      <description>&lt;P&gt;No idea, but it seems like the next step would be to apply a later JHF as suggested by the SK.&lt;/P&gt;</description>
      <pubDate>Tue, 28 Sep 2021 05:59:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-Encryption-Issues-with-tunnel-to-Azure/m-p/130416#M19165</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-09-28T05:59:32Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Encryption Issues with tunnel to Azure</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-Encryption-Issues-with-tunnel-to-Azure/m-p/132022#M19520</link>
      <description>&lt;P&gt;Just a quick update:&lt;/P&gt;&lt;P&gt;Applying the Hotfix did not solve the issue. After further reviewing with our Azure Team, we figured out a misconfiguration of the routing table in Azure, so the encryption domains did not match.&amp;nbsp;&lt;/P&gt;&lt;P&gt;After fixing this, we see at least no further drops but it's still not working. Although, I guess it's not related to our Checkpoint configuration, as no issues can be seen now.&lt;/P&gt;&lt;P&gt;Thanks for your support though!&lt;/P&gt;</description>
      <pubDate>Tue, 19 Oct 2021 05:12:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-Encryption-Issues-with-tunnel-to-Azure/m-p/132022#M19520</guid>
      <dc:creator>T_Sonnberger</dc:creator>
      <dc:date>2021-10-19T05:12:58Z</dc:date>
    </item>
  </channel>
</rss>

