<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: IKEV1 VPN with AWS Peer (Non VTI) - Incoming traffic stop working randomly after P2 renegotation in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IKEV1-VPN-with-AWS-Peer-Non-VTI-Incoming-traffic-stop-working/m-p/191783#M35395</link>
    <description>&lt;P&gt;Can you send output of below from CP?&lt;/P&gt;
&lt;P&gt;vpn tu tlist -p peer_ip (just replace peer_ip with aws IP address)&lt;/P&gt;
&lt;P&gt;Btw, does anything change if you reset the tunnel on both ends?&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
    <pubDate>Wed, 06 Sep 2023 23:12:28 GMT</pubDate>
    <dc:creator>the_rock</dc:creator>
    <dc:date>2023-09-06T23:12:28Z</dc:date>
    <item>
      <title>IKEV1 VPN with AWS Peer (Non VTI) - Incoming traffic stop working randomly after P2 renegotation</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IKEV1-VPN-with-AWS-Peer-Non-VTI-Incoming-traffic-stop-working/m-p/191771#M35392</link>
      <description>&lt;P&gt;We have a VPN set up against AWS. Normally in this VPN the traffic is bidirectional, but we have noticed that randomly the traffic that is originated from the peer does not arrive or stops passing through the VPN after a P2 renegotiation and begins to arrive when the P2 is renegotiated again. In other words, if P2 was renegotiated at 1:30 p.m., the 3600 second timer expires, and it is regenerated at 2:30 p.m., here it starts working again.&lt;/P&gt;&lt;P&gt;When the traffic stops passing, in our firewall we see these logs:&lt;/P&gt;&lt;P&gt;Log1:&lt;/P&gt;&lt;P&gt;Id: 0abf0bd2-1dcc-2726-64f8-ca1ecb4a022c&lt;BR /&gt;Marker: @A@@B@1694024864@C@11152905&lt;BR /&gt;Log Server Origin: 10.191.11.210&lt;BR /&gt;Time: 2023-09-06T18:51:10Z&lt;BR /&gt;Interface Direction: inbound&lt;BR /&gt;Interface Name: daemon&lt;BR /&gt;Id Generated By Indexer:false&lt;BR /&gt;First: true&lt;BR /&gt;Sequence number: 225&lt;BR /&gt;Source: 34.195.30.101&lt;BR /&gt;IP Protocol: 0&lt;BR /&gt;Destination Port: 0&lt;BR /&gt;Encryption Failure: Unknown SPI: 0x5a4211c for IPsec packet.&lt;BR /&gt;VPN Peer Gateway: 34.195.30.101&lt;BR /&gt;Scheme: IKE&lt;BR /&gt;VPN Feature: IKE&lt;BR /&gt;Action: Drop&lt;BR /&gt;Type: Log&lt;BR /&gt;Blade:VPN&lt;BR /&gt;Origin: FW_GPRS_DURAN&lt;BR /&gt;Service: 0/0&lt;BR /&gt;Access Rule Number: 0&lt;BR /&gt;Interface: daemon&lt;BR /&gt;Description:&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Log2:&lt;/P&gt;&lt;P&gt;Id: 0abf0bd2-1d4c-2726-64f8-ca78a54f004c&lt;BR /&gt;Marker: @A@@B@1694024864@C@11863241&lt;BR /&gt;Log Server Origin: 10.191.11.210&lt;BR /&gt;Time: 2023-09-06T18:52:40Z&lt;BR /&gt;Interface Direction: inbound&lt;BR /&gt;Interface Name: bond10.644&lt;BR /&gt;Id Generated By Indexer:false&lt;BR /&gt;First: true&lt;BR /&gt;Sequence number: 43&lt;BR /&gt;LogID: 404840&lt;BR /&gt;Source: 34.195.30.101&lt;BR /&gt;Destination: 190.111.65.126&lt;BR /&gt;IP Protocol: 50&lt;BR /&gt;Encryption Fail Reason: Packet is dropped because an IPsec SA associated with the SPI on the received IPsec packet could not be found&lt;BR /&gt;Member ID: 1_11&lt;BR /&gt;Action: Drop&lt;BR /&gt;Type: Connection&lt;BR /&gt;Policy Name: ClusterGPRSDuran_Ckp&lt;BR /&gt;Policy Management: Manager64k&lt;BR /&gt;DB Tag: {848FD104-DE25-9944-BC90-38D724932081}&lt;BR /&gt;Policy Date: 2023-09-05T20:22:13Z&lt;BR /&gt;Blade: Firewall&lt;BR /&gt;Origin: FW_GPRS_DURAN&lt;BR /&gt;Service: 50&lt;BR /&gt;Product Family: Access&lt;BR /&gt;Logid: 1&lt;BR /&gt;Interface: bond10.644&lt;BR /&gt;Description: ESP Traffic Dropped from 34.195.30.101 to 190.111.65.126&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;The strange thing is that if I go to see the SPIs with the VPN TU command, the gateway does have them registered.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Our enviroment is 64000 chassis R81.10 JHF take 109.&lt;/P&gt;&lt;P&gt;L4 distribution mode enabled.&lt;/P&gt;&lt;P&gt;I attached the evidence here.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 06 Sep 2023 19:51:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IKEV1-VPN-with-AWS-Peer-Non-VTI-Incoming-traffic-stop-working/m-p/191771#M35392</guid>
      <dc:creator>bryanastudillo</dc:creator>
      <dc:date>2023-09-06T19:51:58Z</dc:date>
    </item>
    <item>
      <title>Re: IKEV1 VPN with AWS Peer (Non VTI) - Incoming traffic stop working randomly after P2 renegotation</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IKEV1-VPN-with-AWS-Peer-Non-VTI-Incoming-traffic-stop-working/m-p/191777#M35393</link>
      <description>&lt;P&gt;When did this start happening?&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Wed, 06 Sep 2023 22:58:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IKEV1-VPN-with-AWS-Peer-Non-VTI-Incoming-traffic-stop-working/m-p/191777#M35393</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-09-06T22:58:21Z</dc:date>
    </item>
    <item>
      <title>Re: IKEV1 VPN with AWS Peer (Non VTI) - Incoming traffic stop working randomly after P2 renegotation</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IKEV1-VPN-with-AWS-Peer-Non-VTI-Incoming-traffic-stop-working/m-p/191781#M35394</link>
      <description>&lt;P&gt;Good question. The problem started exactly after I upgraded the chassis from R80.20SP to R81.10 JHF take 109.&lt;/P&gt;</description>
      <pubDate>Wed, 06 Sep 2023 23:08:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IKEV1-VPN-with-AWS-Peer-Non-VTI-Incoming-traffic-stop-working/m-p/191781#M35394</guid>
      <dc:creator>bryanastudillo</dc:creator>
      <dc:date>2023-09-06T23:08:59Z</dc:date>
    </item>
    <item>
      <title>Re: IKEV1 VPN with AWS Peer (Non VTI) - Incoming traffic stop working randomly after P2 renegotation</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IKEV1-VPN-with-AWS-Peer-Non-VTI-Incoming-traffic-stop-working/m-p/191783#M35395</link>
      <description>&lt;P&gt;Can you send output of below from CP?&lt;/P&gt;
&lt;P&gt;vpn tu tlist -p peer_ip (just replace peer_ip with aws IP address)&lt;/P&gt;
&lt;P&gt;Btw, does anything change if you reset the tunnel on both ends?&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Wed, 06 Sep 2023 23:12:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IKEV1-VPN-with-AWS-Peer-Non-VTI-Incoming-traffic-stop-working/m-p/191783#M35395</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-09-06T23:12:28Z</dc:date>
    </item>
    <item>
      <title>Re: IKEV1 VPN with AWS Peer (Non VTI) - Incoming traffic stop working randomly after P2 renegotation</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IKEV1-VPN-with-AWS-Peer-Non-VTI-Incoming-traffic-stop-working/m-p/191792#M35396</link>
      <description>&lt;P&gt;The output of that command during the failure is attached here in this post, it is called "vpn your tlist".&lt;/P&gt;&lt;P&gt;If the VPN is restarted from either end it starts working again.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 06 Sep 2023 23:34:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IKEV1-VPN-with-AWS-Peer-Non-VTI-Incoming-traffic-stop-working/m-p/191792#M35396</guid>
      <dc:creator>bryanastudillo</dc:creator>
      <dc:date>2023-09-06T23:34:57Z</dc:date>
    </item>
    <item>
      <title>Re: IKEV1 VPN with AWS Peer (Non VTI) - Incoming traffic stop working randomly after P2 renegotation</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IKEV1-VPN-with-AWS-Peer-Non-VTI-Incoming-traffic-stop-working/m-p/191794#M35397</link>
      <description>&lt;P&gt;Right, sorry, my bad. In that case, I would open TAC case and see what they say. Personally, easy debug you can do yourself.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;
&lt;P&gt;vpn debug trunc&lt;/P&gt;
&lt;P&gt;vpn debug ikeon&lt;/P&gt;
&lt;P&gt;-generate some traffic&lt;/P&gt;
&lt;P&gt;vpn debug ikeoff&lt;/P&gt;
&lt;P&gt;Get ike.elg and vpnd.elg from $FWDIRlog dir&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Wed, 06 Sep 2023 23:37:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IKEV1-VPN-with-AWS-Peer-Non-VTI-Incoming-traffic-stop-working/m-p/191794#M35397</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-09-06T23:37:53Z</dc:date>
    </item>
    <item>
      <title>Re: IKEV1 VPN with AWS Peer (Non VTI) - Incoming traffic stop working randomly after P2 renegotation</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IKEV1-VPN-with-AWS-Peer-Non-VTI-Incoming-traffic-stop-working/m-p/191795#M35398</link>
      <description>&lt;P&gt;I ALREADY have a case open but I still don't have an answer. In the debugs it practically says the same as the logs.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;messages like that:&lt;/P&gt;&lt;P&gt;W_GPRS_DURAN-ch01-11[5 Sep 15:31:04][tunnel] RequestBySPI: no match for spi b5b53723, owner 7f000001, peer 101.30.195.34 - will send Delete PL&lt;/P&gt;</description>
      <pubDate>Wed, 06 Sep 2023 23:42:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IKEV1-VPN-with-AWS-Peer-Non-VTI-Incoming-traffic-stop-working/m-p/191795#M35398</guid>
      <dc:creator>bryanastudillo</dc:creator>
      <dc:date>2023-09-06T23:42:01Z</dc:date>
    </item>
    <item>
      <title>Re: IKEV1 VPN with AWS Peer (Non VTI) - Incoming traffic stop working randomly after P2 renegotation</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IKEV1-VPN-with-AWS-Peer-Non-VTI-Incoming-traffic-stop-working/m-p/191797#M35399</link>
      <description>&lt;P&gt;I dug through my old notes way back when I was helping someone with this, probably back from R65 days (I know, I know, there was no aws then haha), BUT...it was between CP and Cisco, literally same issue and we fixed it by enabling option to "keep all connections" under connections persistence on gateway properties and also "keep ike SAs" under global properties (advanced at the bottom and then vpn somewhere).&lt;/P&gt;
&lt;P&gt;I dont have access to smart console right now, but can log in if you want me to find options Im referring to. Just watching "Jeopardy", nothing too exciting lol&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Wed, 06 Sep 2023 23:51:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IKEV1-VPN-with-AWS-Peer-Non-VTI-Incoming-traffic-stop-working/m-p/191797#M35399</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-09-06T23:51:51Z</dc:date>
    </item>
    <item>
      <title>Re: IKEV1 VPN with AWS Peer (Non VTI) - Incoming traffic stop working randomly after P2 renegotation</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IKEV1-VPN-with-AWS-Peer-Non-VTI-Incoming-traffic-stop-working/m-p/191800#M35400</link>
      <description>&lt;P&gt;Keep ike sas is already activated, I will check the other option. Thanks for your help.&lt;/P&gt;</description>
      <pubDate>Wed, 06 Sep 2023 23:56:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IKEV1-VPN-with-AWS-Peer-Non-VTI-Incoming-traffic-stop-working/m-p/191800#M35400</guid>
      <dc:creator>bryanastudillo</dc:creator>
      <dc:date>2023-09-06T23:56:14Z</dc:date>
    </item>
    <item>
      <title>Re: IKEV1 VPN with AWS Peer (Non VTI) - Incoming traffic stop working randomly after P2 renegotation</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IKEV1-VPN-with-AWS-Peer-Non-VTI-Incoming-traffic-stop-working/m-p/191802#M35401</link>
      <description>&lt;P&gt;Will log in and send a screenshot, give me 5 mins.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Wed, 06 Sep 2023 23:58:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IKEV1-VPN-with-AWS-Peer-Non-VTI-Incoming-traffic-stop-working/m-p/191802#M35401</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-09-06T23:58:10Z</dc:date>
    </item>
    <item>
      <title>Re: IKEV1 VPN with AWS Peer (Non VTI) - Incoming traffic stop working randomly after P2 renegotation</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IKEV1-VPN-with-AWS-Peer-Non-VTI-Incoming-traffic-stop-working/m-p/191804#M35402</link>
      <description>&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot_1.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/22361iAFDFFCFC56B1A820/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Screenshot_1.png" alt="Screenshot_1.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt; &lt;/P&gt;</description>
      <pubDate>Thu, 07 Sep 2023 00:01:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IKEV1-VPN-with-AWS-Peer-Non-VTI-Incoming-traffic-stop-working/m-p/191804#M35402</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-09-07T00:01:48Z</dc:date>
    </item>
    <item>
      <title>Re: IKEV1 VPN with AWS Peer (Non VTI) - Incoming traffic stop working randomly after P2 renegotation</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IKEV1-VPN-with-AWS-Peer-Non-VTI-Incoming-traffic-stop-working/m-p/191831#M35413</link>
      <description>&lt;P&gt;I already have this option enable.&amp;nbsp;I have noticed that the initiator of the negotiations is always AWS. I have lowered the phase 2 timer on my side from 1 hour to 45 minutes, so far it has negotiated twice and now the Check Point side is starting renegotiations.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 07 Sep 2023 01:29:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IKEV1-VPN-with-AWS-Peer-Non-VTI-Incoming-traffic-stop-working/m-p/191831#M35413</guid>
      <dc:creator>bryanastudillo</dc:creator>
      <dc:date>2023-09-07T01:29:04Z</dc:date>
    </item>
    <item>
      <title>Re: IKEV1 VPN with AWS Peer (Non VTI) - Incoming traffic stop working randomly after P2 renegotation</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IKEV1-VPN-with-AWS-Peer-Non-VTI-Incoming-traffic-stop-working/m-p/191832#M35414</link>
      <description>&lt;P&gt;Thats one option in case like this. I checked an official SK for tunnel config to aws and shows phase 1 420 mins and phase 2 3600 seconds.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Thu, 07 Sep 2023 01:35:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IKEV1-VPN-with-AWS-Peer-Non-VTI-Incoming-traffic-stop-working/m-p/191832#M35414</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-09-07T01:35:26Z</dc:date>
    </item>
    <item>
      <title>Re: IKEV1 VPN with AWS Peer (Non VTI) - Incoming traffic stop working randomly after P2 renegotation</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IKEV1-VPN-with-AWS-Peer-Non-VTI-Incoming-traffic-stop-working/m-p/191833#M35415</link>
      <description>&lt;P&gt;Sorry, 480 mins&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk100726" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk100726&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 07 Sep 2023 01:37:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IKEV1-VPN-with-AWS-Peer-Non-VTI-Incoming-traffic-stop-working/m-p/191833#M35415</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-09-07T01:37:03Z</dc:date>
    </item>
    <item>
      <title>Re: IKEV1 VPN with AWS Peer (Non VTI) - Incoming traffic stop working randomly after P2 renegotation</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IKEV1-VPN-with-AWS-Peer-Non-VTI-Incoming-traffic-stop-working/m-p/191917#M35434</link>
      <description>&lt;P&gt;Hello.&lt;/P&gt;
&lt;P&gt;Do these commands work for both IKEv1 and IKEv2?&lt;/P&gt;
&lt;P&gt;In IKEv2, it is the same file to extract, for review?&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;</description>
      <pubDate>Thu, 07 Sep 2023 14:29:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IKEV1-VPN-with-AWS-Peer-Non-VTI-Incoming-traffic-stop-working/m-p/191917#M35434</guid>
      <dc:creator>Matlu</dc:creator>
      <dc:date>2023-09-07T14:29:48Z</dc:date>
    </item>
    <item>
      <title>Re: IKEV1 VPN with AWS Peer (Non VTI) - Incoming traffic stop working randomly after P2 renegotation</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IKEV1-VPN-with-AWS-Peer-Non-VTI-Incoming-traffic-stop-working/m-p/191918#M35435</link>
      <description>&lt;P&gt;Yes bro, its the same.&lt;/P&gt;</description>
      <pubDate>Thu, 07 Sep 2023 14:30:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IKEV1-VPN-with-AWS-Peer-Non-VTI-Incoming-traffic-stop-working/m-p/191918#M35435</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-09-07T14:30:48Z</dc:date>
    </item>
  </channel>
</rss>

