<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: R81.10 JHF T87 | IPSEC VPN - Secondary Cluster Member Not Receiving VPN Traffic in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-10-JHF-T87-IPSEC-VPN-Secondary-Cluster-Member-Not-Receiving/m-p/176912#M32409</link>
    <description>&lt;P&gt;I reached out to TAC which pointed to&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/sk/sk180542" target="_self"&gt;sk180542&lt;/A&gt;&amp;nbsp;which led me to &lt;A href="https://community.checkpoint.com/t5/Security-Gateways/R80-40-JHF-120-S2S-VPN-issue/m-p/126611/highlight/true#M24757" target="_self"&gt;this post&lt;/A&gt;:&lt;/P&gt;
&lt;P&gt;While the sk article says a hotfix may be necessary, just running the following commands resolved the issue:&lt;/P&gt;
&lt;P&gt;1) fw tab -t orig_route_params -x -y&lt;/P&gt;
&lt;P&gt;2) vpn tu del all&lt;/P&gt;</description>
    <pubDate>Fri, 31 Mar 2023 14:37:36 GMT</pubDate>
    <dc:creator>B_P</dc:creator>
    <dc:date>2023-03-31T14:37:36Z</dc:date>
    <item>
      <title>R81.10 JHF T87 | IPSEC VPN - Secondary Cluster Member Not Receiving VPN Traffic</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-10-JHF-T87-IPSEC-VPN-Secondary-Cluster-Member-Not-Receiving/m-p/174673#M31801</link>
      <description>&lt;P&gt;In an Active/Passive HA cluster, VPN works great with the primary cluster member yet fails to pass traffic for two out of three remote sites when secondary member is active.&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Secondary cluster member,&amp;nbsp;SITE-01-FW02, shows an established IKEv2 IPSEC VPN.&lt;/LI&gt;&lt;LI&gt;VPN TU shows refreshing VPN tunnels after dropping peer with "Delete all IPsec+IKE SAs", etc.&lt;/LI&gt;&lt;LI&gt;Traffic is encrypted at SITE-01 end and decrypted at SITE-02, yet reverse only shows encrypted at SITE-02 with nothing showing up at SITE-01.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;How can a secondary cluster member have issues like this, especially considering the VPN appears to be establishing just fine. Everything else works with it.&lt;/P&gt;&lt;P&gt;*edit: added active/passive ha verbiage&lt;/P&gt;</description>
      <pubDate>Tue, 14 Mar 2023 18:49:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-10-JHF-T87-IPSEC-VPN-Secondary-Cluster-Member-Not-Receiving/m-p/174673#M31801</guid>
      <dc:creator>B_P</dc:creator>
      <dc:date>2023-03-14T18:49:02Z</dc:date>
    </item>
    <item>
      <title>Re: R81.10 JHF T87 | IPSEC VPN - Secondary Cluster Member Not Receiving VPN Traffic</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-10-JHF-T87-IPSEC-VPN-Secondary-Cluster-Member-Not-Receiving/m-p/174676#M31803</link>
      <description>&lt;P&gt;Nothing would pass through backup cluster member, since no traffic would ever hit standby member anyway. Thats mind you if its HA, or is this load sharing?&lt;/P&gt;</description>
      <pubDate>Mon, 13 Mar 2023 23:09:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-10-JHF-T87-IPSEC-VPN-Secondary-Cluster-Member-Not-Receiving/m-p/174676#M31803</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-03-13T23:09:36Z</dc:date>
    </item>
    <item>
      <title>Re: R81.10 JHF T87 | IPSEC VPN - Secondary Cluster Member Not Receiving VPN Traffic</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-10-JHF-T87-IPSEC-VPN-Secondary-Cluster-Member-Not-Receiving/m-p/174813#M31828</link>
      <description>&lt;P&gt;It's an Active/Passive HA cluster.&lt;/P&gt;</description>
      <pubDate>Tue, 14 Mar 2023 18:47:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-10-JHF-T87-IPSEC-VPN-Secondary-Cluster-Member-Not-Receiving/m-p/174813#M31828</guid>
      <dc:creator>B_P</dc:creator>
      <dc:date>2023-03-14T18:47:40Z</dc:date>
    </item>
    <item>
      <title>Re: R81.10 JHF T87 | IPSEC VPN - Secondary Cluster Member Not Receiving VPN Traffic</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-10-JHF-T87-IPSEC-VPN-Secondary-Cluster-Member-Not-Receiving/m-p/174815#M31830</link>
      <description>&lt;P&gt;Let me make sure I understand this properly. So say, just as an example, you have a cluster HA (active/passive), lets call it cp-cluster and say cp01 is master and cp02 is standby. Are you saying that when cp01 is active, all works fine, but if cp02 is active and cp01 is stanby, thats when you have a problem connecting to 2 out of 3 remote sites?&lt;/P&gt;
&lt;P&gt;If so, then we would need to run bunch of captures and vpn debugs to figure out why&lt;/P&gt;
&lt;P&gt;vpn debug trunc&lt;/P&gt;
&lt;P&gt;vpn debug ikeon&lt;/P&gt;
&lt;P&gt;-generate some traffic&lt;/P&gt;
&lt;P&gt;vpn debug ikeoff&lt;/P&gt;
&lt;P&gt;Get ike/elg and vpnd.elg files from $FWDIR.log dir&lt;/P&gt;
&lt;P&gt;Also, would not hurt to run fw monitor commands to see what happens with the traffic.&lt;/P&gt;
&lt;P&gt;Cheers mate.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Tue, 14 Mar 2023 19:09:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-10-JHF-T87-IPSEC-VPN-Secondary-Cluster-Member-Not-Receiving/m-p/174815#M31830</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-03-14T19:09:01Z</dc:date>
    </item>
    <item>
      <title>Re: R81.10 JHF T87 | IPSEC VPN - Secondary Cluster Member Not Receiving VPN Traffic</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-10-JHF-T87-IPSEC-VPN-Secondary-Cluster-Member-Not-Receiving/m-p/174825#M31834</link>
      <description>&lt;P&gt;What "link-selection" settings are configured and is the routing for the peer addresses the same on both cluster members - following default route?&lt;/P&gt;
&lt;P&gt;Also is there anything different between the 3 remote sites, are they all the same vendor gateways etc?&lt;/P&gt;</description>
      <pubDate>Tue, 14 Mar 2023 23:09:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-10-JHF-T87-IPSEC-VPN-Secondary-Cluster-Member-Not-Receiving/m-p/174825#M31834</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2023-03-14T23:09:35Z</dc:date>
    </item>
    <item>
      <title>Re: R81.10 JHF T87 | IPSEC VPN - Secondary Cluster Member Not Receiving VPN Traffic</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-10-JHF-T87-IPSEC-VPN-Secondary-Cluster-Member-Not-Receiving/m-p/176300#M32270</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/38213"&gt;@the_rock&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;but if cp02 is active and cp01 is stanby, thats when you have a problem connecting to 2 out of 3 remote sites?&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;That's correct. I even saw it where the 3rd site that does work with cp02 would sometimes not work with cp01. The only thing that stood out to me in the vpnd.elg was this&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;&lt;EM&gt;message [tunnel] tnlmon_transmitter_tt_cb: Gateway = 10.80.5.3, type = 1 =&amp;gt; Error = 1&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;This was in site-02 firewall and that IP is the cluster IP for the site-01.&lt;/P&gt;&lt;P&gt;The setup is a IKEv2 VPN and one thing I noticed with 'vpn tu' on the secondary fw is there are a lot of IKEv1 tunnels. Not sure why that is. I also can't drop and re-establish the tunnels with option 7 "Delete all IPsec+IKE SAs for a given peer (GW)".&lt;/P&gt;</description>
      <pubDate>Mon, 27 Mar 2023 13:50:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-10-JHF-T87-IPSEC-VPN-Secondary-Cluster-Member-Not-Receiving/m-p/176300#M32270</guid>
      <dc:creator>B_P</dc:creator>
      <dc:date>2023-03-27T13:50:04Z</dc:date>
    </item>
    <item>
      <title>Re: R81.10 JHF T87 | IPSEC VPN - Secondary Cluster Member Not Receiving VPN Traffic</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-10-JHF-T87-IPSEC-VPN-Secondary-Cluster-Member-Not-Receiving/m-p/176303#M32272</link>
      <description>&lt;P&gt;Link selection is "Use DNS resolving &amp;gt; Gateway's name and domain". All the routes are the same and all the sites use Check Point gateways.&lt;/P&gt;</description>
      <pubDate>Mon, 27 Mar 2023 13:52:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-10-JHF-T87-IPSEC-VPN-Secondary-Cluster-Member-Not-Receiving/m-p/176303#M32272</guid>
      <dc:creator>B_P</dc:creator>
      <dc:date>2023-03-27T13:52:12Z</dc:date>
    </item>
    <item>
      <title>Re: R81.10 JHF T87 | IPSEC VPN - Secondary Cluster Member Not Receiving VPN Traffic</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-10-JHF-T87-IPSEC-VPN-Secondary-Cluster-Member-Not-Receiving/m-p/176912#M32409</link>
      <description>&lt;P&gt;I reached out to TAC which pointed to&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/sk/sk180542" target="_self"&gt;sk180542&lt;/A&gt;&amp;nbsp;which led me to &lt;A href="https://community.checkpoint.com/t5/Security-Gateways/R80-40-JHF-120-S2S-VPN-issue/m-p/126611/highlight/true#M24757" target="_self"&gt;this post&lt;/A&gt;:&lt;/P&gt;
&lt;P&gt;While the sk article says a hotfix may be necessary, just running the following commands resolved the issue:&lt;/P&gt;
&lt;P&gt;1) fw tab -t orig_route_params -x -y&lt;/P&gt;
&lt;P&gt;2) vpn tu del all&lt;/P&gt;</description>
      <pubDate>Fri, 31 Mar 2023 14:37:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-10-JHF-T87-IPSEC-VPN-Secondary-Cluster-Member-Not-Receiving/m-p/176912#M32409</guid>
      <dc:creator>B_P</dc:creator>
      <dc:date>2023-03-31T14:37:36Z</dc:date>
    </item>
    <item>
      <title>Re: R81.10 JHF T87 | IPSEC VPN - Secondary Cluster Member Not Receiving VPN Traffic</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-10-JHF-T87-IPSEC-VPN-Secondary-Cluster-Member-Not-Receiving/m-p/176913#M32410</link>
      <description>&lt;P&gt;Thanks for sharing!&lt;/P&gt;</description>
      <pubDate>Fri, 31 Mar 2023 14:42:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-10-JHF-T87-IPSEC-VPN-Secondary-Cluster-Member-Not-Receiving/m-p/176913#M32410</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-03-31T14:42:25Z</dc:date>
    </item>
    <item>
      <title>Re: R81.10 JHF T87 | IPSEC VPN - Secondary Cluster Member Not Receiving VPN Traffic</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-10-JHF-T87-IPSEC-VPN-Secondary-Cluster-Member-Not-Receiving/m-p/177285#M32487</link>
      <description>&lt;P&gt;sk mentions:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;The&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;CODE&gt;orig_route_params&lt;/CODE&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;file shows the physical IP address of the cluster member instead of the cluster's Virtual IP Address (VIP).&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;how can we check it?&lt;/P&gt;</description>
      <pubDate>Tue, 04 Apr 2023 15:45:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-10-JHF-T87-IPSEC-VPN-Secondary-Cluster-Member-Not-Receiving/m-p/177285#M32487</guid>
      <dc:creator>CheckPointerXL</dc:creator>
      <dc:date>2023-04-04T15:45:52Z</dc:date>
    </item>
    <item>
      <title>Re: R81.10 JHF T87 | IPSEC VPN - Secondary Cluster Member Not Receiving VPN Traffic</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-10-JHF-T87-IPSEC-VPN-Secondary-Cluster-Member-Not-Receiving/m-p/177615#M32540</link>
      <description>&lt;P&gt;I got this site from TAC: &lt;A href="https://www.browserling.com/tools/hex-to-ip" target="_blank"&gt;https://www.browserling.com/tools/hex-to-ip&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Paste just one section of numbers in there. So if the output starts with "&amp;lt;c0a80519," paste in just c0a80519 and it will convert to 192.168.5.25.&lt;/P&gt;</description>
      <pubDate>Thu, 06 Apr 2023 19:37:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R81-10-JHF-T87-IPSEC-VPN-Secondary-Cluster-Member-Not-Receiving/m-p/177615#M32540</guid>
      <dc:creator>B_P</dc:creator>
      <dc:date>2023-04-06T19:37:03Z</dc:date>
    </item>
  </channel>
</rss>

