<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: S2S VPN - IKE fragmentation / Support of RFC7383 in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-VPN-IKE-fragmentation-Support-of-RFC7383/m-p/178997#M32797</link>
    <description>&lt;P&gt;I also only see one TAC case where this RFC is even mentioned, much less any mentions in documentation and such.&lt;BR /&gt;Based on what you've described, support for this is an RFE that should be consulted with your local Check Point office.&lt;BR /&gt;If you want 100% confirmation, please consult with the TAC.&lt;/P&gt;</description>
    <pubDate>Tue, 25 Apr 2023 02:09:21 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2023-04-25T02:09:21Z</dc:date>
    <item>
      <title>S2S VPN - IKE fragmentation / Support of RFC7383</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-VPN-IKE-fragmentation-Support-of-RFC7383/m-p/178566#M32704</link>
      <description>&lt;P&gt;Dear all,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We are currently facing issues when building a S2S VPN to a Cisco ASA. Due to a IPS / IDS security applicance between the two gateways, IKE packets were dropped because there are fragmentated.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;The tunnel is / should be initiated by the Cisco ASA.&lt;/LI&gt;&lt;LI&gt;When testing the initiation from the CheckPoint, IKE packets fare ariving at the Cisco ASA but the replies are getting blocked.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As a workaround, the security appliance has been adjusted to not block the fragemented packets in this context, but we have to find a solution for this.&lt;/P&gt;&lt;P&gt;The adminstrators of the remote gateways are passing the buck to us right now. They state that the Cisco is supporting and trying to use the mechanism provided / described in RFC 7383 (&lt;A href="https://www.rfc-editor.org/rfc/rfc7383.html" target="_blank"&gt;https://www.rfc-editor.org/rfc/rfc7383.html&lt;/A&gt;) but the CheckPoint is not willing to negotiate the IKE fragmentation.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So two questions arise.&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Does CheckPoint support the RFC 7383 and in case it does, must it be enabled in the configuration. Unfortunately was I not able to find anything concerning this.&lt;/LI&gt;&lt;LI&gt;Have you ever faced a similar issue when connecting to a Cisco ASA and I case you have, how have you fixed the issue?&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I found the&amp;nbsp;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk98074&amp;amp;partition=Advanced&amp;amp;product=IPSec" target="_blank"&gt;https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk98074&amp;amp;partition=Advanced&amp;amp;product=IPSec&lt;/A&gt;&amp;nbsp;but this does not really give a hint for what I am looking for, atleast for my understanding.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Anyway I wonder if this RFC / the support of the RFC is really the issue. Why?&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;When the IDS / IPS is active we see no packet at all from the remote gateway. How can the (missing?) support for the RFC on the CheckPoint then be the issue?&lt;/LI&gt;&lt;LI&gt;Even if the CheckPoint does not support the RFC. Why does the Cisco ASA not send smaller packets by configuring the local input / interface settings?&lt;/LI&gt;&lt;LI&gt;The VPN is established via 500/udp and the usage of PSK. The initial packets should not be too big.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanking you in advance.&lt;/P&gt;</description>
      <pubDate>Thu, 20 Apr 2023 06:47:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-VPN-IKE-fragmentation-Support-of-RFC7383/m-p/178566#M32704</guid>
      <dc:creator>k_b</dc:creator>
      <dc:date>2023-04-20T06:47:05Z</dc:date>
    </item>
    <item>
      <title>Re: S2S VPN - IKE fragmentation / Support of RFC7383</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-VPN-IKE-fragmentation-Support-of-RFC7383/m-p/178569#M32705</link>
      <description>&lt;P&gt;As the CP includes a very goog IPS this topology is rather looking strange... I would assume that without the 3rd appliance as MITM all would work !&lt;/P&gt;</description>
      <pubDate>Thu, 20 Apr 2023 07:02:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-VPN-IKE-fragmentation-Support-of-RFC7383/m-p/178569#M32705</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2023-04-20T07:02:06Z</dc:date>
    </item>
    <item>
      <title>Re: S2S VPN - IKE fragmentation / Support of RFC7383</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-VPN-IKE-fragmentation-Support-of-RFC7383/m-p/178574#M32707</link>
      <description>&lt;P&gt;The CPs are part of a larger network, which is (also) protected by the IPS, so that CPs would not any impact of the other aspects / parts of the larger network. And yes you are correct: Without the 3rd appliance everything is working well. But we do not have any impact on this device, this is like a part of the network in between which we are only using.&lt;/P&gt;</description>
      <pubDate>Thu, 20 Apr 2023 07:32:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-VPN-IKE-fragmentation-Support-of-RFC7383/m-p/178574#M32707</guid>
      <dc:creator>k_b</dc:creator>
      <dc:date>2023-04-20T07:32:22Z</dc:date>
    </item>
    <item>
      <title>Re: S2S VPN - IKE fragmentation / Support of RFC7383</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-VPN-IKE-fragmentation-Support-of-RFC7383/m-p/178575#M32708</link>
      <description>&lt;P&gt;So i would assume that the 3rd appliance is the culprit...&lt;/P&gt;</description>
      <pubDate>Thu, 20 Apr 2023 07:34:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-VPN-IKE-fragmentation-Support-of-RFC7383/m-p/178575#M32708</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2023-04-20T07:34:10Z</dc:date>
    </item>
    <item>
      <title>Re: S2S VPN - IKE fragmentation / Support of RFC7383</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-VPN-IKE-fragmentation-Support-of-RFC7383/m-p/178766#M32739</link>
      <description>&lt;P&gt;From your description, it sounds like the middle device is the culprit, not our gateway.&lt;BR /&gt;This is going to require a TAC case: &lt;A href="https://help.checkpoint.com" target="_blank"&gt;https://help.checkpoint.com&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Apr 2023 19:58:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-VPN-IKE-fragmentation-Support-of-RFC7383/m-p/178766#M32739</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2023-04-21T19:58:55Z</dc:date>
    </item>
    <item>
      <title>Re: S2S VPN - IKE fragmentation / Support of RFC7383</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-VPN-IKE-fragmentation-Support-of-RFC7383/m-p/178831#M32761</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Thank you so far for the replies. Yes, the IPS is currently causing the issue but only because the IKE packets are getting fragmented. As described in the RFC it is recommended to avoid such a fragmentation by implementing RFC 7383. For simplfy the whole case I would like to ask only following two questions.&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Does CheckPoint support the RFC 7383 and in case it does, must it be enabled in the configuration?&lt;/LI&gt;&lt;LI&gt;Did you ever encountered such an fragmentation issue in the past? And in case you did, how did you solve this?&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;With kind regards&lt;/P&gt;</description>
      <pubDate>Sun, 23 Apr 2023 14:06:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-VPN-IKE-fragmentation-Support-of-RFC7383/m-p/178831#M32761</guid>
      <dc:creator>k_b</dc:creator>
      <dc:date>2023-04-23T14:06:26Z</dc:date>
    </item>
    <item>
      <title>Re: S2S VPN - IKE fragmentation / Support of RFC7383</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-VPN-IKE-fragmentation-Support-of-RFC7383/m-p/178835#M32762</link>
      <description>&lt;P&gt;What is the MTU between points A &amp;amp; B, have you isolated where the fragmentation occurs?&lt;/P&gt;</description>
      <pubDate>Sun, 23 Apr 2023 14:45:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-VPN-IKE-fragmentation-Support-of-RFC7383/m-p/178835#M32762</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2023-04-23T14:45:24Z</dc:date>
    </item>
    <item>
      <title>Re: S2S VPN - IKE fragmentation / Support of RFC7383</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-VPN-IKE-fragmentation-Support-of-RFC7383/m-p/178877#M32771</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;The MTU size is 1500 bytes. The fragmentation takes place between the ASA and the ISP, I guess directly at the ASA. This device is supporting the mentioned RFC and tries to negotiate this IKEv2 fragmentation with the CheckPoint. Due to the fact that the CheckPoint (at least in the current configuration) does not response as expected to this negotiation, the ASA does not use the fragmentation on the IKEv2 level and sends out a the fragmentated IP packets.&lt;/P&gt;</description>
      <pubDate>Mon, 24 Apr 2023 04:23:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-VPN-IKE-fragmentation-Support-of-RFC7383/m-p/178877#M32771</guid>
      <dc:creator>k_b</dc:creator>
      <dc:date>2023-04-24T04:23:23Z</dc:date>
    </item>
    <item>
      <title>Re: S2S VPN - IKE fragmentation / Support of RFC7383</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-VPN-IKE-fragmentation-Support-of-RFC7383/m-p/178880#M32772</link>
      <description>&lt;P&gt;Why are they being fragmented if there is no MTU mismatch - how big are the IKE messages!?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 24 Apr 2023 07:24:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-VPN-IKE-fragmentation-Support-of-RFC7383/m-p/178880#M32772</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2023-04-24T07:24:34Z</dc:date>
    </item>
    <item>
      <title>Re: S2S VPN - IKE fragmentation / Support of RFC7383</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-VPN-IKE-fragmentation-Support-of-RFC7383/m-p/178997#M32797</link>
      <description>&lt;P&gt;I also only see one TAC case where this RFC is even mentioned, much less any mentions in documentation and such.&lt;BR /&gt;Based on what you've described, support for this is an RFE that should be consulted with your local Check Point office.&lt;BR /&gt;If you want 100% confirmation, please consult with the TAC.&lt;/P&gt;</description>
      <pubDate>Tue, 25 Apr 2023 02:09:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-VPN-IKE-fragmentation-Support-of-RFC7383/m-p/178997#M32797</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2023-04-25T02:09:21Z</dc:date>
    </item>
    <item>
      <title>Re: S2S VPN - IKE fragmentation / Support of RFC7383</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-VPN-IKE-fragmentation-Support-of-RFC7383/m-p/179105#M32837</link>
      <description>&lt;P&gt;Thank you all so far. I will contact the TAC and try to get an confirmation.&lt;/P&gt;</description>
      <pubDate>Tue, 25 Apr 2023 15:56:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-VPN-IKE-fragmentation-Support-of-RFC7383/m-p/179105#M32837</guid>
      <dc:creator>k_b</dc:creator>
      <dc:date>2023-04-25T15:56:55Z</dc:date>
    </item>
    <item>
      <title>Re: S2S VPN - IKE fragmentation / Support of RFC7383</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-VPN-IKE-fragmentation-Support-of-RFC7383/m-p/198134#M37051</link>
      <description>&lt;P&gt;The solution can be easily be found by searching&lt;/P&gt;
&lt;P&gt;ike fragmentation&amp;nbsp;&lt;/P&gt;
&lt;P&gt;in the support center.&lt;/P&gt;
&lt;P&gt;It is the first result&lt;/P&gt;
&lt;DIV id="tinyMceEditor_3c54a9260834daeakselrod_0" class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV id="tinyMceEditor_3c54a9260834daeakselrod_1" class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;P&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk126092" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk126092&lt;/A&gt;&lt;BR /&gt;Please note that the RFC state clearly:&lt;/P&gt;
&lt;P&gt;2.4. Using IKE Fragmentation&lt;/P&gt;
&lt;P&gt;IKE fragmentation MUST NOT be used unless both peers have indicated&lt;BR /&gt;their support for it. After that, it is up to the initiator of each&lt;BR /&gt;exchange to decide whether or not to use it.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In my opinion the real questions are 2:&lt;/P&gt;
&lt;P&gt;1) Why the customers are not moving to OCSP which is what is recommended these days and the following OCSP for IKEv2 explain this in details&amp;nbsp;&amp;nbsp;&lt;A href="https://datatracker.ietf.org/doc/html/rfc4806" target="_blank"&gt;https://datatracker.ietf.org/doc/html/rfc4806&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;2) Why the CRL grew so much and why it is not being cleaned (removing revoked certs). There is no reason CRL will grow to such sizes that will require fragmentation. If it does , the root cause need to be investigated and resolved.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 16 Nov 2023 12:26:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-VPN-IKE-fragmentation-Support-of-RFC7383/m-p/198134#M37051</guid>
      <dc:creator>eakselrod</dc:creator>
      <dc:date>2023-11-16T12:26:57Z</dc:date>
    </item>
  </channel>
</rss>

