<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Site to Site Traffic inbound decrypt but no packets forwarded to destination in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-Traffic-inbound-decrypt-but-no-packets-forwarded-to/m-p/139735#M21352</link>
    <description>&lt;P&gt;Check your VPN domains for both peers; your peer's VPN domain is overlapping inappropriately with your own firewall.&amp;nbsp; Also possible that the VPN domain is overlapping between two of your firewall's peers.&amp;nbsp; Not sure if this command works on SMB appliances but try this from expert mode to highlight the overlap:&amp;nbsp;&amp;nbsp;&lt;STRONG&gt;vpn overlap_encdom communities –s&lt;/STRONG&gt;.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Also possible the traffic is getting inappropriately NATed by the peer before placing it into the VPN tunnel, make sure "Disable NAT in VPN Community" is set in the VPN Community properties.&lt;/P&gt;</description>
    <pubDate>Thu, 27 Jan 2022 18:08:59 GMT</pubDate>
    <dc:creator>Timothy_Hall</dc:creator>
    <dc:date>2022-01-27T18:08:59Z</dc:date>
    <item>
      <title>Site to Site Traffic inbound decrypt but no packets forwarded to destination</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-Traffic-inbound-decrypt-but-no-packets-forwarded-to/m-p/139646#M21335</link>
      <description>&lt;P&gt;I am replacing some aging Checkpoint R71 appliances with 1590 appliances and am testing a very simple IPSEC VPN Site to Site VPN from a linux based StrongSwan user.&lt;/P&gt;&lt;P&gt;According to VPN Tunnels link and tcpdump, the VPN appears established with ESP sequence numbers increasing when I ping from the remote site inbound to the Checkpoint 1590. The traffic however does not leave the Chckpoint 1590 internal interface to the destination host and I cannot figure out why.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The log on the checkpoint shows:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Capture99.JPG" style="width: 464px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/15118iD9B19E874A6C6494/image-size/large?v=v2&amp;amp;px=999" role="button" title="Capture99.JPG" alt="Capture99.JPG" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Capture11.JPG" style="width: 355px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/15120i3112E3292BD8C882/image-size/large?v=v2&amp;amp;px=999" role="button" title="Capture11.JPG" alt="Capture11.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;and:&lt;/DIV&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class=""&gt;fw ctl zdebug + all |grep -A 1 "Monitor" | grep "192.168"&lt;/DIV&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class=""&gt;WAN:i0 (tcpt inbound)[60]:192.168.236.100 -&amp;gt; 10.110.116.20 (TCP) len=60 id=53997;&lt;BR /&gt;WAN:i1 (vpn multik forward in)[60]:192.168.236.100 -&amp;gt; 10.110.116.20 (TCP) len=60 id=53997;&lt;BR /&gt;WAN:i2 (vpn decrypt)[60]:192.168.236.100 -&amp;gt; 10.110.116.20 (TCP) len=60 id=53997;&lt;BR /&gt;WAN:i3 (l2tp inbound)[60]:192.168.236.100 -&amp;gt; 10.110.116.20 (TCP) len=60 id=53997;&lt;BR /&gt;WAN:i4 (Stateless verifications (in))[60]:192.168.236.100 -&amp;gt; 10.110.116.20 (TCP) len=60 id=53997;&lt;BR /&gt;WAN:i5 (fw multik misc proto forwarding)[60]:192.168.236.100 -&amp;gt; 10.110.116.20 (TCP) len=60 id=53997;&lt;BR /&gt;WAN:i6 (fw early SIP NAT)[60]:192.168.236.100 -&amp;gt; 10.110.116.20 (TCP) len=60 id=53997;&lt;BR /&gt;WAN:i7 (vpn tagging inbound)[60]:192.168.236.100 -&amp;gt; 10.110.116.20 (TCP) len=60 id=53997;&lt;BR /&gt;WAN:i8 (vpn decrypt verify)[60]:192.168.236.100 -&amp;gt; 10.110.116.20 (TCP) len=60 id=53997;&lt;BR /&gt;WAN:i9 (fw VM inbound )[60]:192.168.236.100 -&amp;gt; 10.110.116.20 (TCP) len=60 id=53997;&lt;BR /&gt;WAN:I10 (vpn policy inbound)[60]:192.168.236.100 -&amp;gt; 10.110.116.20 (TCP) len=60 id=53997;&lt;BR /&gt;WAN:I11 (vpn before offload)[60]:192.168.236.100 -&amp;gt; 10.110.116.20 (TCP) len=60 id=53997;&lt;BR /&gt;WAN:I12 (fw offload inbound)[60]:192.168.236.100 -&amp;gt; 10.110.116.20 (TCP) len=60 id=53997;&lt;/DIV&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class=""&gt;I am really after ideas on how I can further debug this issue please, I have an access rule which allows 192.168.236.100 any TCP port to 10.110.116.20&lt;/DIV&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class=""&gt;Anyhelp hints or pointers would be greatly appreciated&lt;/DIV&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class=""&gt;Regards&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;BR /&gt;Dek&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;</description>
      <pubDate>Thu, 27 Jan 2022 02:40:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-Traffic-inbound-decrypt-but-no-packets-forwarded-to/m-p/139646#M21335</guid>
      <dc:creator>DekPlent</dc:creator>
      <dc:date>2022-01-27T02:40:01Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site Traffic inbound decrypt but no packets forwarded to destination</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-Traffic-inbound-decrypt-but-no-packets-forwarded-to/m-p/139734#M21351</link>
      <description>&lt;P&gt;Today I am seeing drops for the traffic and now :&lt;/P&gt;&lt;DIV&gt;&lt;SPAN&gt;fw ctl zdebug drop&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;SPAN&gt;;2401729;[cpu_3];[fw4_3];fw_log_drop_ex: Packet proto=6 &lt;A href="http://192.168.236.100:33430" target="_blank" rel="noopener"&gt;192.168.236.100:33430&lt;/A&gt; -&amp;gt; &lt;A href="http://10.110.116.20:22" target="_blank" rel="noopener"&gt;10.110.116.20:22&lt;/A&gt; dropped by vpn_drop_and_log Reason: According to the policy the packet should not have been decrypted;&lt;BR /&gt;@;2401741;[cpu_1];[fw4_1];fw_log_drop_ex: Packet proto=6 &lt;A href="http://192.168.236.100:33430" target="_blank" rel="noopener"&gt;192.168.236.100:33430&lt;/A&gt; -&amp;gt; &lt;A href="http://10.110.116.20:22" target="_blank" rel="noopener"&gt;10.110.116.20:22&lt;/A&gt; dropped by vpn_drop_and_log Reason: According to the policy the packet should not have been decrypted;&lt;BR /&gt;@;2401767;[cpu_3];[fw4_3];fw_log_drop_ex: Packet proto=6 &lt;A href="http://192.168.236.100:33430" target="_blank" rel="noopener"&gt;192.168.236.100:33430&lt;/A&gt; -&amp;gt; &lt;A href="http://10.110.116.20:22" target="_blank" rel="noopener"&gt;10.110.116.20:22&lt;/A&gt; dropped by vpn_drop_and_log Reason: According to the policy the packet should not have been decrypted;&lt;BR /&gt;@;2401819;[cpu_2];[fw4_2];fw_log_drop_ex: Packet proto=6 &lt;A href="http://192.168.236.100:33430" target="_blank" rel="noopener"&gt;192.168.236.100:33430&lt;/A&gt; -&amp;gt; &lt;A href="http://10.110.116.20:22" target="_blank" rel="noopener"&gt;10.110.116.20:22&lt;/A&gt; dropped by vpn_drop_and_log Reason: According to the policy the packet should not have been decrypted;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is there a fundamental option which I have not clicked?&amp;nbsp; In the older R71 just specifying the rule was part of a particular VPN site/ community was enough but I do not see the option to do this on the R80.20 webgui&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks again,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 27 Jan 2022 17:51:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-Traffic-inbound-decrypt-but-no-packets-forwarded-to/m-p/139734#M21351</guid>
      <dc:creator>DekPlent</dc:creator>
      <dc:date>2022-01-27T17:51:25Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site Traffic inbound decrypt but no packets forwarded to destination</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-Traffic-inbound-decrypt-but-no-packets-forwarded-to/m-p/139735#M21352</link>
      <description>&lt;P&gt;Check your VPN domains for both peers; your peer's VPN domain is overlapping inappropriately with your own firewall.&amp;nbsp; Also possible that the VPN domain is overlapping between two of your firewall's peers.&amp;nbsp; Not sure if this command works on SMB appliances but try this from expert mode to highlight the overlap:&amp;nbsp;&amp;nbsp;&lt;STRONG&gt;vpn overlap_encdom communities –s&lt;/STRONG&gt;.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Also possible the traffic is getting inappropriately NATed by the peer before placing it into the VPN tunnel, make sure "Disable NAT in VPN Community" is set in the VPN Community properties.&lt;/P&gt;</description>
      <pubDate>Thu, 27 Jan 2022 18:08:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-Traffic-inbound-decrypt-but-no-packets-forwarded-to/m-p/139735#M21352</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2022-01-27T18:08:59Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site Traffic inbound decrypt but no packets forwarded to destination</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-Traffic-inbound-decrypt-but-no-packets-forwarded-to/m-p/139741#M21354</link>
      <description>&lt;P&gt;Thanks for your reply, Timothy&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I will take a look at the possible NAT at the remote end&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Meanwhile, the command that you suggested returned the following&lt;/P&gt;&lt;P&gt;# vpn overlap_encdom communities -s&lt;BR /&gt;arrange_objects: Not supported&lt;/P&gt;&lt;P&gt;No overlapping encryption domain.&lt;/P&gt;&lt;P&gt;Thanks again,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Dek&lt;/P&gt;</description>
      <pubDate>Thu, 27 Jan 2022 18:40:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-Traffic-inbound-decrypt-but-no-packets-forwarded-to/m-p/139741#M21354</guid>
      <dc:creator>DekPlent</dc:creator>
      <dc:date>2022-01-27T18:40:07Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site Traffic inbound decrypt but no packets forwarded to destination</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-Traffic-inbound-decrypt-but-no-packets-forwarded-to/m-p/139742#M21355</link>
      <description>&lt;P&gt;From my experience, I see 2 most likely reasons for this...either NAT, or vpn domains mismatch.&lt;/P&gt;</description>
      <pubDate>Thu, 27 Jan 2022 18:50:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-Traffic-inbound-decrypt-but-no-packets-forwarded-to/m-p/139742#M21355</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2022-01-27T18:50:03Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site Traffic inbound decrypt but no packets forwarded to destination</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-Traffic-inbound-decrypt-but-no-packets-forwarded-to/m-p/139814#M21382</link>
      <description>&lt;P&gt;So I have decided to use a completely different destination network but still seeing the decrypt log messages (open padlock) but no traffic is getting to the destination host.&lt;/P&gt;&lt;P&gt;What is the definition of a decrypt in this instance?&lt;/P&gt;&lt;P&gt;Are there any more inspection points after the decrypt that could implicitly drop the pkt without an actual drop showing in the logs? On the R71 solution I do see a decrypt for successful traffic and that is routed to the destination system successfully, but not on this 1590 running R80.20.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks again&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Dek&lt;/P&gt;</description>
      <pubDate>Fri, 28 Jan 2022 10:58:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-Traffic-inbound-decrypt-but-no-packets-forwarded-to/m-p/139814#M21382</guid>
      <dc:creator>DekPlent</dc:creator>
      <dc:date>2022-01-28T10:58:24Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site Traffic inbound decrypt but no packets forwarded to destination</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-Traffic-inbound-decrypt-but-no-packets-forwarded-to/m-p/139817#M21385</link>
      <description>&lt;P&gt;Right it's working now. I had to define a destination network object 10.110.103.0/24 for the destination network despite the checkpoint already having a leg on this destination network and leaving the default option set in VPN -&amp;gt;&amp;nbsp; Advanced :&lt;/P&gt;&lt;P&gt;Local encryption domain is defined &lt;SPAN class=""&gt;automatically according to topology.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;and the one liner command listed at &lt;A href="https://community.checkpoint.com/t5/Security-Gateways/One-liner-to-show-VPN-topology-on-gateways/td-p/57975" target="_blank" rel="noopener"&gt;https://community.checkpoint.com/t5/Security-Gateways/One-liner-to-show-VPN-topology-on-gateways/td-p/57975&lt;/A&gt;&amp;nbsp; already listing the local network as a valid encryption domain.&lt;/P&gt;&lt;P&gt;VPN Gateway &amp;gt; &amp;lt;External IP of Checkpoint&amp;gt;&lt;BR /&gt;Encryption domain&lt;BR /&gt;10.110.103.0 - 10.110.103.255&lt;/P&gt;&lt;P&gt;But hey that's one to remember.. Thanks for the input which inspired me to dig deeper in other areas etc.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Dek&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 28 Jan 2022 11:39:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-Traffic-inbound-decrypt-but-no-packets-forwarded-to/m-p/139817#M21385</guid>
      <dc:creator>DekPlent</dc:creator>
      <dc:date>2022-01-28T11:39:16Z</dc:date>
    </item>
  </channel>
</rss>

