<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic CloudGuard AWS HA to third party - VPN Tunnel Instability? BGP/ICMP traffic in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CloudGuard-AWS-HA-to-third-party-VPN-Tunnel-Instability-BGP-ICMP/m-p/242073#M47027</link>
    <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hi all,&lt;/P&gt;
&lt;P&gt;i'm facing some weird issue with a AWS cluster VPN to third party gateways.&lt;/P&gt;
&lt;P&gt;At random times, also after 2 or 3 days, tunnel stucks and reset is needed.&lt;/P&gt;
&lt;P&gt;From the capture i see that traffic is correctly encapsulated/decapsulated.&lt;/P&gt;
&lt;P&gt;The cluster has external private ip of course.&lt;/P&gt;
&lt;DIV id="tinyMceEditorCheckPointerXL_2" class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;P&gt;Now i'm going to describe difference between working and not working tunnels:&lt;/P&gt;
&lt;P&gt;WORKING TUNNEL&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; - tcpdump it shows packet sent/received on port 4500&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; - fw monitor it shows correctly bgp sent/received and echo request/reply received&lt;/P&gt;
&lt;P&gt;NOT WORKING TUNNEL&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; - tcpdump it show that check point peer sent packet on 4500, remote peer answer with ESP packet (not encapsulated)&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2025-02-23 211351.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/29692i7816C6A1D3FB5B44/image-size/medium?v=v2&amp;amp;px=400" role="button" title="2025-02-23 211351.png" alt="2025-02-23 211351.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; - fw monitor does not show reply when pinging ptp (it doesn't work), and bgp traffic sent it as id=0:&lt;/P&gt;
&lt;P&gt;[vs_0][fw_2] vpnt29:O[44]: 192.168.14.1 -&amp;gt; 192.168.14.2 (TCP) len=52 &lt;STRONG&gt;id=0&lt;/STRONG&gt;&lt;BR /&gt;TCP: 179 -&amp;gt; 60813 .S..A. seq=c8049c10 ack=7a7186a1&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;on working tunnels id=XXX is incremental&lt;/P&gt;
&lt;DIV id="tinyMceEditorCheckPointerXL_1" class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;P&gt;SO, the strange part is that VPN seems to be good (Phase1/2 UP and traffic is encrypted/decrypted), but BGP is down and i cannot ping the remote VTI.&lt;/P&gt;
&lt;P&gt;vpn tu del it fix the issue&lt;/P&gt;
&lt;P&gt;environment is r81.20 T98&lt;/P&gt;
&lt;P&gt;Action taken:&lt;/P&gt;
&lt;P&gt;Enabled&amp;nbsp;&lt;SPAN&gt;offer_nat_t_initator, enabled dpd responder&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;any idea?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sun, 23 Feb 2025 20:32:38 GMT</pubDate>
    <dc:creator>CheckPointerXL</dc:creator>
    <dc:date>2025-02-23T20:32:38Z</dc:date>
    <item>
      <title>CloudGuard AWS HA to third party - VPN Tunnel Instability? BGP/ICMP traffic</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CloudGuard-AWS-HA-to-third-party-VPN-Tunnel-Instability-BGP-ICMP/m-p/242073#M47027</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hi all,&lt;/P&gt;
&lt;P&gt;i'm facing some weird issue with a AWS cluster VPN to third party gateways.&lt;/P&gt;
&lt;P&gt;At random times, also after 2 or 3 days, tunnel stucks and reset is needed.&lt;/P&gt;
&lt;P&gt;From the capture i see that traffic is correctly encapsulated/decapsulated.&lt;/P&gt;
&lt;P&gt;The cluster has external private ip of course.&lt;/P&gt;
&lt;DIV id="tinyMceEditorCheckPointerXL_2" class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;P&gt;Now i'm going to describe difference between working and not working tunnels:&lt;/P&gt;
&lt;P&gt;WORKING TUNNEL&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; - tcpdump it shows packet sent/received on port 4500&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; - fw monitor it shows correctly bgp sent/received and echo request/reply received&lt;/P&gt;
&lt;P&gt;NOT WORKING TUNNEL&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; - tcpdump it show that check point peer sent packet on 4500, remote peer answer with ESP packet (not encapsulated)&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2025-02-23 211351.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/29692i7816C6A1D3FB5B44/image-size/medium?v=v2&amp;amp;px=400" role="button" title="2025-02-23 211351.png" alt="2025-02-23 211351.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; - fw monitor does not show reply when pinging ptp (it doesn't work), and bgp traffic sent it as id=0:&lt;/P&gt;
&lt;P&gt;[vs_0][fw_2] vpnt29:O[44]: 192.168.14.1 -&amp;gt; 192.168.14.2 (TCP) len=52 &lt;STRONG&gt;id=0&lt;/STRONG&gt;&lt;BR /&gt;TCP: 179 -&amp;gt; 60813 .S..A. seq=c8049c10 ack=7a7186a1&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;on working tunnels id=XXX is incremental&lt;/P&gt;
&lt;DIV id="tinyMceEditorCheckPointerXL_1" class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;P&gt;SO, the strange part is that VPN seems to be good (Phase1/2 UP and traffic is encrypted/decrypted), but BGP is down and i cannot ping the remote VTI.&lt;/P&gt;
&lt;P&gt;vpn tu del it fix the issue&lt;/P&gt;
&lt;P&gt;environment is r81.20 T98&lt;/P&gt;
&lt;P&gt;Action taken:&lt;/P&gt;
&lt;P&gt;Enabled&amp;nbsp;&lt;SPAN&gt;offer_nat_t_initator, enabled dpd responder&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;any idea?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 23 Feb 2025 20:32:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CloudGuard-AWS-HA-to-third-party-VPN-Tunnel-Instability-BGP-ICMP/m-p/242073#M47027</guid>
      <dc:creator>CheckPointerXL</dc:creator>
      <dc:date>2025-02-23T20:32:38Z</dc:date>
    </item>
    <item>
      <title>Re: CloudGuard AWS HA to third party - VPN Tunnel Instability? BGP/ICMP traffic</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CloudGuard-AWS-HA-to-third-party-VPN-Tunnel-Instability-BGP-ICMP/m-p/242437#M47082</link>
      <description>&lt;P&gt;The obvious question always is if the tunnels were working fine before, what's changed? Patched recently?&lt;/P&gt;&lt;P&gt;Does tunnels have issues after pushing policy?&amp;nbsp; (Global properties&amp;gt;AdvancedConfiguration&amp;gt;VPN Advanced Properties&amp;gt; VPN IKE properties&amp;gt; Turn on keep_IKE_SAs&lt;/P&gt;&lt;P&gt;For the VPN tunnel sharing are they configured for per subnet pair or per gateway pair.&lt;/P&gt;&lt;P&gt;With that said I would suggest contacting TAC if it's an option.&lt;/P&gt;&lt;P&gt;But regardless you should run a vpn debug before the issue presents itself, so that you can review the logs yourself and also be able to provide the information to TAC.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best Practice - Run this command to start the VPN debug:&lt;/P&gt;&lt;P&gt;vpn debug trunc ALL=5&lt;/P&gt;&lt;P&gt;Best Practice - Run one of these commands to stop the VPN daemon debug:&lt;/P&gt;&lt;P&gt;vpn debug off&lt;/P&gt;&lt;P&gt;vpn debug truncoff&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Run this command to see what file it logs to&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;run&amp;nbsp;"vpn iked calc &amp;lt;peer IP&amp;gt;"&amp;nbsp;on the relevant gateway&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Example: vpn iked calc X.X.X.X (ExternalIP of Remote gateway)&lt;BR /&gt;vpn: Address X.X.X.X is handled by IKED 2&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Files you can review and give to TAC&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;# $FWDIR/log/iked*&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;# $FWDIR/log/vpnd*&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 26 Feb 2025 15:02:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CloudGuard-AWS-HA-to-third-party-VPN-Tunnel-Instability-BGP-ICMP/m-p/242437#M47082</guid>
      <dc:creator>Jon_C</dc:creator>
      <dc:date>2025-02-26T15:02:43Z</dc:date>
    </item>
  </channel>
</rss>

