<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: 2 Tunnels (Active - Backup ) inside the same Site-to-Site VPN community in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/2-Tunnels-Active-Backup-inside-the-same-Site-to-Site-VPN/m-p/144292#M22665</link>
    <description>&lt;P&gt;Start with&amp;nbsp;&lt;SPAN&gt;sk108600 scenario 4.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Please also confirm your DPD settings and if the problem also presents after installing policy see also&amp;nbsp;&lt;SPAN&gt;sk142355.&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 21 Mar 2022 12:56:03 GMT</pubDate>
    <dc:creator>Chris_Atkinson</dc:creator>
    <dc:date>2022-03-21T12:56:03Z</dc:date>
    <item>
      <title>2 Tunnels (Active - Backup ) inside the same Site-to-Site VPN community</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/2-Tunnels-Active-Backup-inside-the-same-Site-to-Site-VPN/m-p/144272#M22664</link>
      <description>&lt;P&gt;Hi Checkmates,&lt;/P&gt;&lt;P&gt;I am facing a problem with a Site-to-Site VPN with AWS and i want your help.&lt;/P&gt;&lt;P&gt;I have established a&amp;nbsp;Site-to-Site VPN with AWS and i have 2 Satellite Gateways acting as Primary - Backup.&lt;/P&gt;&lt;P&gt;The problem is that the VPN connectivity is continuously dropping and from AWS they told us that my Checkpoint Gateway&amp;nbsp;is sending a delete of the IPSEC Phase 2 SAs.&amp;nbsp;This also happens just after a successful phase 1 renegotiation. When AWS receives a request to delete the SA, the request is honored. Tunnel is restored after CGW eventually sends a request to negotiate Phase2.&lt;/P&gt;&lt;P&gt;I have already see all the vpnd logs and ike.elg but i am not seeing something that could help me.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do you know if Checkpoint can cause this problem because is trying to send the traffic at both tunnels in the same time;&lt;/P&gt;&lt;P&gt;Do you know how Checkpoint handles the traffic selection when you have two remote peers inside the same&amp;nbsp;Site-to-Site VPN with the same encryption domain;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you!&lt;/P&gt;</description>
      <pubDate>Mon, 21 Mar 2022 10:17:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/2-Tunnels-Active-Backup-inside-the-same-Site-to-Site-VPN/m-p/144272#M22664</guid>
      <dc:creator>Michalis89</dc:creator>
      <dc:date>2022-03-21T10:17:49Z</dc:date>
    </item>
    <item>
      <title>Re: 2 Tunnels (Active - Backup ) inside the same Site-to-Site VPN community</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/2-Tunnels-Active-Backup-inside-the-same-Site-to-Site-VPN/m-p/144292#M22665</link>
      <description>&lt;P&gt;Start with&amp;nbsp;&lt;SPAN&gt;sk108600 scenario 4.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Please also confirm your DPD settings and if the problem also presents after installing policy see also&amp;nbsp;&lt;SPAN&gt;sk142355.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 21 Mar 2022 12:56:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/2-Tunnels-Active-Backup-inside-the-same-Site-to-Site-VPN/m-p/144292#M22665</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2022-03-21T12:56:03Z</dc:date>
    </item>
    <item>
      <title>Re: 2 Tunnels (Active - Backup ) inside the same Site-to-Site VPN community</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/2-Tunnels-Active-Backup-inside-the-same-Site-to-Site-VPN/m-p/144683#M22666</link>
      <description>&lt;P&gt;Thank you very much Chris for your help!! Indeed i cheched the value&amp;nbsp;&lt;EM&gt;ike_keep_child_sa_interop_devices and i found that it was set to false after the upgrade to R81.10.&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;We opened a ticket our Contractor in order to arrange a maintenance windows in order to change this value.&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;I will inform you after the action is completed and if the problem resolved&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 24 Mar 2022 14:11:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/2-Tunnels-Active-Backup-inside-the-same-Site-to-Site-VPN/m-p/144683#M22666</guid>
      <dc:creator>Michalis89</dc:creator>
      <dc:date>2022-03-24T14:11:58Z</dc:date>
    </item>
    <item>
      <title>Re: 2 Tunnels (Active - Backup ) inside the same Site-to-Site VPN community</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/2-Tunnels-Active-Backup-inside-the-same-Site-to-Site-VPN/m-p/145072#M22667</link>
      <description>&lt;P&gt;Hey&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/65803"&gt;@Michalis89&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I had an issue that sounds like yours with AWS VPNs in R80.30 and R80.40. &amp;nbsp;Working with a TAC escalation engineer (and suggestion&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/3630"&gt;@Chris_Atkinson&lt;/a&gt;&amp;nbsp; for&amp;nbsp;&lt;SPAN&gt;sk142355), I enabled "keep_IKE_SAs" in the Global Properties "scary place" in that SK.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;I also ran a VPN debug at the same time, and see the message in the debug output:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;[vpnd .... [29 Mar 18:48:41] CachedObject::istrue: Cache miss: keep_IKE_SAs: true (1)&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Good luck!&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;PS: i call it the "scary place" when I tell customers so they won't go traipsing through it cavalierly &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 30 Mar 2022 15:19:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/2-Tunnels-Active-Backup-inside-the-same-Site-to-Site-VPN/m-p/145072#M22667</guid>
      <dc:creator>Duane_Toler</dc:creator>
      <dc:date>2022-03-30T15:19:40Z</dc:date>
    </item>
    <item>
      <title>Re: 2 Tunnels (Active - Backup ) inside the same Site-to-Site VPN community</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/2-Tunnels-Active-Backup-inside-the-same-Site-to-Site-VPN/m-p/145074#M22668</link>
      <description>&lt;P&gt;Hi Duane and Thank you for your reply! I totally agree with you with the "scary place" &lt;span class="lia-unicode-emoji" title=":grinning_face_with_smiling_eyes:"&gt;😄&lt;/span&gt;&lt;BR /&gt;We have already enable the option&amp;nbsp;&lt;SPAN&gt;"keep_IKE_SAs" in the Global Properties&amp;nbsp;in order to set the Checkpoint as a DPD responder.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;We also make the action that&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/3630"&gt;@Chris_Atkinson&lt;/a&gt;&amp;nbsp;mentioned and we set the value of&amp;nbsp;&lt;EM&gt;ike_keep_child_sa_interop_devices to true but nothing changed. The tunnels towards AWS are not stable.&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;EM&gt;After a lot of investigation i think that the solution to the problem is to set VTU Tunnels towards AWS. This is the only way to support Active - Backup Site-to-Site VPN tunnels inside the same VPN community.&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;EM&gt;The only drawback at this solution is that VTI Tunnels supported only from R81 and above.&amp;nbsp;&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 30 Mar 2022 15:41:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/2-Tunnels-Active-Backup-inside-the-same-Site-to-Site-VPN/m-p/145074#M22668</guid>
      <dc:creator>Michalis89</dc:creator>
      <dc:date>2022-03-30T15:41:16Z</dc:date>
    </item>
    <item>
      <title>Re: 2 Tunnels (Active - Backup ) inside the same Site-to-Site VPN community</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/2-Tunnels-Active-Backup-inside-the-same-Site-to-Site-VPN/m-p/145075#M22669</link>
      <description>&lt;P&gt;AH! &amp;nbsp;Are you doing it as 'domain-based' VPN or 'route-based' VPN? &amp;nbsp; My customer AWS VPN is route-based VPN (albeit with static routes). &amp;nbsp;The interoperable object has a VPN domain with a group object that is empty (no group members).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;AWS has the VPN template you can download and follow the config samples in their document. &amp;nbsp;You have to do their template because when you download it, they supply the local/remote IPv4 addresses for your VPN tunnel CLISH commands. &amp;nbsp;It'll be 169.254.xxx.yyy&lt;/P&gt;
&lt;P&gt;Then do static-route for the remote LAN behind the AWS gateways. &amp;nbsp;In your security policy, you'll use VPN directional matches for traffic to/from the AWS VPN domain. &amp;nbsp;In the community, you'll have DPD with Permanent Tunnels.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;With this setup, I see in my VPN debug the "DPD_R_U_THERE" and "DPD_ACK" IKE messages. &amp;nbsp;This is on R80.30, too.&lt;/P&gt;
&lt;P&gt;As weird as it seems, the AWS template had the perfect config for it. &amp;nbsp;I was surprised. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 30 Mar 2022 15:58:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/2-Tunnels-Active-Backup-inside-the-same-Site-to-Site-VPN/m-p/145075#M22669</guid>
      <dc:creator>Duane_Toler</dc:creator>
      <dc:date>2022-03-30T15:58:08Z</dc:date>
    </item>
    <item>
      <title>Re: 2 Tunnels (Active - Backup ) inside the same Site-to-Site VPN community</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/2-Tunnels-Active-Backup-inside-the-same-Site-to-Site-VPN/m-p/145076#M22670</link>
      <description>&lt;P&gt;Hi,&lt;BR /&gt;&lt;BR /&gt;VTI is supported on R80.X.&lt;/P&gt;&lt;P&gt;And yes, AWS VPNs are normally confiugred with VTI + Routing&lt;/P&gt;</description>
      <pubDate>Wed, 30 Mar 2022 15:58:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/2-Tunnels-Active-Backup-inside-the-same-Site-to-Site-VPN/m-p/145076#M22670</guid>
      <dc:creator>Juan_</dc:creator>
      <dc:date>2022-03-30T15:58:23Z</dc:date>
    </item>
    <item>
      <title>Re: 2 Tunnels (Active - Backup ) inside the same Site-to-Site VPN community</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/2-Tunnels-Active-Backup-inside-the-same-Site-to-Site-VPN/m-p/145086#M22671</link>
      <description>&lt;P&gt;Hi Juan,&lt;/P&gt;&lt;P&gt;Based on the below sk(sk79700) for VSX environments the VTI feature is supported from R81 version and later.&lt;/P&gt;&lt;P&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk79700" target="_blank"&gt;VSX supported features (checkpoint.com)&lt;/A&gt;&lt;/P&gt;&lt;P&gt;I believe the only solution is to upgrade my gateways to R81.10 and configure the specific Site-to-Site VPN VPN community with VTI and Routed Mode&lt;/P&gt;</description>
      <pubDate>Wed, 30 Mar 2022 18:36:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/2-Tunnels-Active-Backup-inside-the-same-Site-to-Site-VPN/m-p/145086#M22671</guid>
      <dc:creator>Michalis89</dc:creator>
      <dc:date>2022-03-30T18:36:56Z</dc:date>
    </item>
    <item>
      <title>Re: 2 Tunnels (Active - Backup ) inside the same Site-to-Site VPN community</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/2-Tunnels-Active-Backup-inside-the-same-Site-to-Site-VPN/m-p/145088#M22672</link>
      <description>&lt;P&gt;Oh. VSX. &amp;nbsp;Yeah that's different. &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt; &amp;nbsp; "add vpn tunnel" is not a CLISH command in VSX (as of R80.40). &amp;nbsp;You'll need R81+ indeed.&lt;/P&gt;</description>
      <pubDate>Wed, 30 Mar 2022 19:21:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/2-Tunnels-Active-Backup-inside-the-same-Site-to-Site-VPN/m-p/145088#M22672</guid>
      <dc:creator>Duane_Toler</dc:creator>
      <dc:date>2022-03-30T19:21:36Z</dc:date>
    </item>
    <item>
      <title>Re: 2 Tunnels (Active - Backup ) inside the same Site-to-Site VPN community</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/2-Tunnels-Active-Backup-inside-the-same-Site-to-Site-VPN/m-p/145116#M22728</link>
      <description>&lt;P&gt;Hi Duane, we have already done all of the above but with Domain-based VPN.&lt;/P&gt;&lt;P&gt;Unfortunately we have to upgrade to R81 version and higher in order to make this configuration stable for our VSX environment.&lt;/P&gt;</description>
      <pubDate>Thu, 31 Mar 2022 10:03:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/2-Tunnels-Active-Backup-inside-the-same-Site-to-Site-VPN/m-p/145116#M22728</guid>
      <dc:creator>Michalis89</dc:creator>
      <dc:date>2022-03-31T10:03:00Z</dc:date>
    </item>
  </channel>
</rss>

