<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: No ICMP traffic trough VPN  after migration in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/No-ICMP-traffic-trough-VPN-after-migration/m-p/239738#M46515</link>
    <description>&lt;P&gt;So the remote gateway isn't sending the return traffic?&lt;BR /&gt;Hopefully TAC can assist you in getting to the bottom of it.&lt;/P&gt;</description>
    <pubDate>Mon, 27 Jan 2025 20:41:30 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2025-01-27T20:41:30Z</dc:date>
    <item>
      <title>No ICMP traffic trough VPN  after migration</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/No-ICMP-traffic-trough-VPN-after-migration/m-p/239123#M46399</link>
      <description>&lt;P&gt;Dear CheckMates,&lt;/P&gt;&lt;P&gt;We encounter some strange behavior after the migration of our checkpoint cluster.&lt;/P&gt;&lt;P&gt;We changed the hardware from Check Point 5600 to Check Point Quantum Force 9100 appliances.&lt;/P&gt;&lt;P&gt;The steps we have taken for a successful full migration are:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Current state -&amp;gt; A is active, and B is stand-by&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;[5600 B] Poweroff the R81.20 the standby cluster member (5600 B)&lt;/LI&gt;&lt;LI&gt;[9100 B] Connect to R81.20 new member and configure interfaces and routes,... with the same settings from the old [5600 B].&lt;/LI&gt;&lt;LI&gt;Install SIC, add license, change cluster version, fix cluster member topology, install policy on gateway [9100 B] (remove flag "if fails")&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;[5600 A] remains active&lt;/P&gt;&lt;P&gt;4. [5600 A] Poweroff the R81.20 appliance (5600&lt;/P&gt;&lt;P&gt;5. The [9100 B] become active&lt;/P&gt;&lt;P&gt;6. [9100 A] Connect to R81.20 new second member and configure interfaces and routes, with the same settings as the old [5600 A]&lt;/P&gt;&lt;P&gt;7. Install SIC, add license, fix cluster member topology, install policy on both new gateways (add flag "if fails")&lt;/P&gt;&lt;P&gt;After the successful migration we encounter that there is no ping traffic through the VPN Tunnels of the VPN Community. The VPN Community are branch offices with Check Point devices.&lt;/P&gt;&lt;P&gt;We pushed to all the Check Point the correct policy set.&lt;/P&gt;&lt;P&gt;So, after some digging, we see that the ICMP traffic is routed through the VPN tunnel but not receiving on the other side. Other Protocols such as SSH or https are working fine but no ICMP.&amp;nbsp;&lt;/P&gt;&lt;P&gt;The old cluster is running on R81.20 JHF take 86 the new cluster is running on R81.20 JHF take 92.&lt;/P&gt;&lt;P&gt;That’s the only difference between the cluster’s devices. due to a short migration we could not update the devices to take 96.&amp;nbsp;&lt;/P&gt;&lt;P&gt;So have some one any ideas ?!&lt;/P&gt;&lt;P&gt;Thanks for helping,&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 21 Jan 2025 08:19:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/No-ICMP-traffic-trough-VPN-after-migration/m-p/239123#M46399</guid>
      <dc:creator>JacWev</dc:creator>
      <dc:date>2025-01-21T08:19:39Z</dc:date>
    </item>
    <item>
      <title>Re: No ICMP traffic trough VPN  after migration</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/No-ICMP-traffic-trough-VPN-after-migration/m-p/239210#M46406</link>
      <description>&lt;P&gt;Curious how you validated the ICMP is going through the tunnel.&lt;BR /&gt;Did you use a tcpdump/fw monitor to see if the ICMP traffic left the remote gateway?&lt;/P&gt;</description>
      <pubDate>Tue, 21 Jan 2025 15:47:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/No-ICMP-traffic-trough-VPN-after-migration/m-p/239210#M46406</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2025-01-21T15:47:18Z</dc:date>
    </item>
    <item>
      <title>Re: No ICMP traffic trough VPN  after migration</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/No-ICMP-traffic-trough-VPN-after-migration/m-p/239637#M46498</link>
      <description>&lt;P&gt;Hi Phoneboy,&amp;nbsp;&lt;/P&gt;&lt;P&gt;Today we had a remote session with TAC. We see traffic is entering the tunnel received bij the other and return traffic is not send.&amp;nbsp;&lt;/P&gt;&lt;P&gt;When we change the VPN community settings and we pushed a policy the gateway is rebooting.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Strange behavior, Check Point is investigating the problem.&lt;/P&gt;</description>
      <pubDate>Sun, 26 Jan 2025 13:56:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/No-ICMP-traffic-trough-VPN-after-migration/m-p/239637#M46498</guid>
      <dc:creator>JacWev</dc:creator>
      <dc:date>2025-01-26T13:56:52Z</dc:date>
    </item>
    <item>
      <title>Re: No ICMP traffic trough VPN  after migration</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/No-ICMP-traffic-trough-VPN-after-migration/m-p/239738#M46515</link>
      <description>&lt;P&gt;So the remote gateway isn't sending the return traffic?&lt;BR /&gt;Hopefully TAC can assist you in getting to the bottom of it.&lt;/P&gt;</description>
      <pubDate>Mon, 27 Jan 2025 20:41:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/No-ICMP-traffic-trough-VPN-after-migration/m-p/239738#M46515</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2025-01-27T20:41:30Z</dc:date>
    </item>
    <item>
      <title>Re: No ICMP traffic trough VPN  after migration</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/No-ICMP-traffic-trough-VPN-after-migration/m-p/239741#M46517</link>
      <description>&lt;P&gt;ICMP traffic is always supposed to go slowpath with no acceleration, however the 9100 appliance is a Quantum Force appliance and will have UPPAK enabled by default.&amp;nbsp; You may want to try disabling UPPAK to see what happens, as I've seen some strange VPN behavior with UPPAK at a customer's site.&amp;nbsp; This was for IPSec traffic transiting the gateway (but not terminating on it) but that was supposed to go slowpath too:&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/sk/sk182775" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;sk182775: Packet loss (fwconn_key_init_links failed) for ESP packets when using User-Mode SecureXL.&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;This was fixed in Take 90 (which you have), but you may have a slightly different issue.&amp;nbsp; Another step would be to disable all acceleration for that tunnel with &lt;STRONG&gt;vpn accel off (VPN Peer IP)&lt;/STRONG&gt; although I doubt that will have any effect on the issue.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 27 Jan 2025 21:08:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/No-ICMP-traffic-trough-VPN-after-migration/m-p/239741#M46517</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2025-01-27T21:08:54Z</dc:date>
    </item>
    <item>
      <title>Re: No ICMP traffic trough VPN  after migration</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/No-ICMP-traffic-trough-VPN-after-migration/m-p/240746#M46710</link>
      <description>&lt;P&gt;Hi Timothy,&amp;nbsp;&lt;/P&gt;&lt;P&gt;When we switch to kernel settings the problem is gone. With cpconfig -&amp;gt; SecureXL -&amp;gt; kernel mode. We changed is on both FW's in the the cluster.&amp;nbsp; Now we are able to ping trough te VPN. Thanks for pointing this out.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Kind Regard,&amp;nbsp;&lt;/P&gt;&lt;P&gt;Jaco Wevers&lt;/P&gt;</description>
      <pubDate>Sun, 09 Feb 2025 12:41:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/No-ICMP-traffic-trough-VPN-after-migration/m-p/240746#M46710</guid>
      <dc:creator>JacWev</dc:creator>
      <dc:date>2025-02-09T12:41:28Z</dc:date>
    </item>
    <item>
      <title>Re: No ICMP traffic trough VPN  after migration</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/No-ICMP-traffic-trough-VPN-after-migration/m-p/240747#M46711</link>
      <description>&lt;P&gt;Glad to hear that helped.&amp;nbsp; However any time you have to disable SecureXL partially, or switch from the default UPPAK mode back to KPPAK mode (assuming it is not a known limitation of UPPAK), that situation is a bug that should be reported to TAC.&amp;nbsp; I'll be talking about UPPAK extensively in my CPX Vegas speech.&lt;/P&gt;</description>
      <pubDate>Sun, 09 Feb 2025 14:01:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/No-ICMP-traffic-trough-VPN-after-migration/m-p/240747#M46711</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2025-02-09T14:01:52Z</dc:date>
    </item>
  </channel>
</rss>

