<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: VPN Troubleshooting Commands in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-Troubleshooting-Commands/m-p/250381#M48952</link>
    <description>&lt;P&gt;It's possible one of the various VPN kernel debugs might show you this information.&lt;BR /&gt;Capturing the relevant traffic and viewing it into IKEView is probably quicker/easier.&lt;/P&gt;</description>
    <pubDate>Mon, 02 Jun 2025 19:46:46 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2025-06-02T19:46:46Z</dc:date>
    <item>
      <title>VPN Troubleshooting Commands</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-Troubleshooting-Commands/m-p/39636#M13069</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;TABLE class="j-table jiveBorder" style="border: 1px solid #c6c6c6;" width="100%"&gt;&lt;THEAD&gt;&lt;TR style="background-color: #efefef; height: 24px;"&gt;&lt;TH style="height: 24px;"&gt;Commands&lt;/TH&gt;&lt;TH style="height: 24px;"&gt;Descriptions&lt;/TH&gt;&lt;/TR&gt;&lt;/THEAD&gt;&lt;TBODY&gt;&lt;TR style="height: 24px;"&gt;&lt;TD style="height: 24px;"&gt;&lt;STRONG style="font-family: 'times new roman', times, serif;"&gt;&lt;EM&gt;vpn tu&lt;/EM&gt;&lt;/STRONG&gt;&lt;/TD&gt;&lt;TD style="height: 24px;"&gt;&lt;STRONG style="font-family: 'times new roman', times, serif;"&gt;&lt;EM&gt;VPN utility, allows you to rekey vpn&lt;/EM&gt;&lt;/STRONG&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 24px;"&gt;&lt;TD style="height: 24px;"&gt;&lt;STRONG style="font-family: 'times new roman', times, serif;"&gt;&lt;EM&gt;vpn ipafile_check ipassignment.conf detail‏&lt;/EM&gt;&lt;/STRONG&gt;&lt;/TD&gt;&lt;TD style="height: 24px;"&gt;&lt;STRONG style="font-family: 'times new roman', times, serif;"&gt;&lt;EM&gt;Verifies the ipassignment.conf file&lt;/EM&gt;&lt;/STRONG&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 24px;"&gt;&lt;TD style="height: 24px;"&gt;&lt;STRONG style="font-family: 'times new roman', times, serif;"&gt;&lt;EM&gt;dtps lic&lt;/EM&gt;&lt;/STRONG&gt;&lt;/TD&gt;&lt;TD style="height: 24px;"&gt;&lt;STRONG style="font-family: 'times new roman', times, serif;"&gt;&lt;EM&gt;show desktop policy license status&lt;/EM&gt;&lt;/STRONG&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 24px;"&gt;&lt;TD style="height: 24px;"&gt;&lt;STRONG style="font-family: 'times new roman', times, serif;"&gt;&lt;EM&gt;cpstat -f all polsrv&lt;/EM&gt;&lt;/STRONG&gt;&lt;/TD&gt;&lt;TD style="height: 24px;"&gt;&lt;STRONG style="font-family: 'times new roman', times, serif;"&gt;&lt;EM&gt;show status of the dtps&lt;/EM&gt;&lt;/STRONG&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 24px;"&gt;&lt;TD style="height: 24px;"&gt;&lt;STRONG style="font-family: 'times new roman', times, serif;"&gt;&lt;EM&gt;vpn shell&lt;/EM&gt;&lt;/STRONG&gt;&lt;/TD&gt;&lt;TD style="height: 24px;"&gt;&lt;STRONG style="font-family: 'times new roman', times, serif;"&gt;&lt;EM&gt;Start the VPN shell&lt;/EM&gt;&lt;/STRONG&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 24px;"&gt;&lt;TD style="height: 24px;"&gt;&lt;STRONG style="font-family: 'times new roman', times, serif;"&gt;&lt;EM&gt;vpn shell /tunnels/delete/IKE/peer/[peer ip]&lt;/EM&gt;&lt;/STRONG&gt;&lt;/TD&gt;&lt;TD style="height: 24px;"&gt;&lt;STRONG style="font-family: 'times new roman', times, serif;"&gt;&lt;EM&gt;delete IKE SA&lt;/EM&gt;&lt;/STRONG&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 24px;"&gt;&lt;TD style="height: 24px;"&gt;&lt;STRONG style="font-family: 'times new roman', times, serif;"&gt;&lt;EM&gt;vpn shell /tunnels/delete/IPsec/peer/[peer ip]&lt;/EM&gt;&lt;/STRONG&gt;&lt;/TD&gt;&lt;TD style="height: 24px;"&gt;&lt;STRONG style="font-family: 'times new roman', times, serif;"&gt;&lt;EM&gt;delete Phase 2 SA&lt;/EM&gt;&lt;/STRONG&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 24px;"&gt;&lt;TD style="height: 24px;"&gt;&lt;STRONG style="font-family: 'times new roman', times, serif;"&gt;&lt;EM&gt;vpn shell /show/tunnels/ike/peer/[peer ip]&lt;/EM&gt;&lt;/STRONG&gt;&lt;/TD&gt;&lt;TD style="height: 24px;"&gt;&lt;STRONG style="font-family: 'times new roman', times, serif;"&gt;&lt;EM&gt;show IKE SA&lt;/EM&gt;&lt;/STRONG&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 24px;"&gt;&lt;TD style="height: 24px;"&gt;&lt;STRONG style="font-family: 'times new roman', times, serif;"&gt;&lt;EM&gt;vpn shell /show/tunnels/ipsec/peer/[peer ip]&lt;/EM&gt;&lt;/STRONG&gt;&lt;/TD&gt;&lt;TD style="height: 24px;"&gt;&lt;STRONG style="font-family: 'times new roman', times, serif;"&gt;&lt;EM&gt;show Phase 2 SA&lt;/EM&gt;&lt;/STRONG&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 24px;"&gt;&lt;TD style="height: 24px;"&gt;&lt;STRONG style="font-family: 'times new roman', times, serif;"&gt;&lt;EM&gt;vpn shell show interface detailed [VTI name]&lt;/EM&gt;&lt;/STRONG&gt;&lt;/TD&gt;&lt;TD style="height: 24px;"&gt;&lt;STRONG style="font-family: 'times new roman', times, serif;"&gt;&lt;EM&gt;show VTI detail&lt;/EM&gt;&lt;/STRONG&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 24px;"&gt;&lt;TD style="height: 24px;"&gt;&lt;STRONG style="font-family: 'times new roman', times, serif;"&gt;&lt;EM&gt;vpn debug ikeon|ikeoff&lt;/EM&gt;&lt;/STRONG&gt;&lt;/TD&gt;&lt;TD style="height: 24px;"&gt;&lt;STRONG style="font-family: 'times new roman', times, serif;"&gt;&lt;EM&gt;Debug IKE into $FWDIR/log/ike.elg. Analyze ike.elg with the IKEView tool&lt;/EM&gt;&lt;/STRONG&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 24px;"&gt;&lt;TD style="height: 24px;"&gt;&lt;STRONG style="font-family: 'times new roman', times, serif;"&gt;&lt;EM&gt;vpn debug on|off&lt;/EM&gt;&lt;/STRONG&gt;&lt;/TD&gt;&lt;TD style="height: 24px;"&gt;&lt;STRONG style="font-family: 'times new roman', times, serif;"&gt;&lt;EM&gt;Debug VPN into $FWDIR/log/vpnd.elg. Analyze vpnd.elg with the IKEView tool&lt;/EM&gt;&lt;/STRONG&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 24px;"&gt;&lt;TD style="height: 24px;"&gt;&lt;STRONG style="font-family: 'times new roman', times, serif;"&gt;&lt;EM&gt;vpn debug trunc&lt;/EM&gt;&lt;/STRONG&gt;&lt;/TD&gt;&lt;TD style="height: 24px;"&gt;&lt;STRONG style="font-family: 'times new roman', times, serif;"&gt;&lt;EM&gt;Truncate and stamp logs, enable IKE &amp;amp; VPN debug&lt;/EM&gt;&lt;/STRONG&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 24px;"&gt;&lt;TD style="height: 24px;"&gt;&lt;STRONG style="font-family: 'times new roman', times, serif;"&gt;&lt;EM&gt;vpn drv stat&lt;/EM&gt;&lt;/STRONG&gt;&lt;/TD&gt;&lt;TD style="height: 24px;"&gt;&lt;STRONG style="font-family: 'times new roman', times, serif;"&gt;&lt;EM&gt;Show status of VPN-1 kernel module&lt;/EM&gt;&lt;/STRONG&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 24px;"&gt;&lt;TD style="height: 24px;"&gt;&lt;STRONG style="font-family: 'times new roman', times, serif;"&gt;&lt;EM&gt;vpn overlap_encdom&lt;/EM&gt;&lt;/STRONG&gt;&lt;/TD&gt;&lt;TD style="height: 24px;"&gt;&lt;STRONG style="font-family: 'times new roman', times, serif;"&gt;&lt;EM&gt;Show, if any, overlapping VPN domains&lt;/EM&gt;&lt;/STRONG&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 24px;"&gt;&lt;TD style="height: 24px;"&gt;&lt;STRONG style="font-family: 'times new roman', times, serif;"&gt;&lt;EM&gt;vpn macutil &amp;lt;user&amp;gt;&lt;/EM&gt;&lt;/STRONG&gt;&lt;/TD&gt;&lt;TD style="height: 24px;"&gt;&lt;STRONG style="font-family: 'times new roman', times, serif;"&gt;&lt;EM&gt;Show MAC for Secure Remote user &amp;lt;user&amp;gt;&lt;/EM&gt;&lt;/STRONG&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 24px;"&gt;&lt;TD style="height: 24px;"&gt;&lt;STRONG style="font-family: 'times new roman', times, serif;"&gt;&lt;EM&gt;vpn ver [-k]&lt;/EM&gt;&lt;/STRONG&gt;&lt;/TD&gt;&lt;TD style="height: 24px;"&gt;&lt;STRONG style="font-family: 'times new roman', times, serif;"&gt;&lt;EM&gt;Check VPN-1 major and minor version as well as build number and latest hotfix. Use -k for kernal version&amp;nbsp;&lt;/EM&gt;&lt;/STRONG&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Jul 2018 11:49:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-Troubleshooting-Commands/m-p/39636#M13069</guid>
      <dc:creator>Ramawatar_Maury</dc:creator>
      <dc:date>2018-07-12T11:49:10Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Troubleshooting Commands</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-Troubleshooting-Commands/m-p/39637#M13070</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Nice summary. Speaking about debug commands procedure is written in more SK articles. At least good one for start is the&amp;nbsp;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk33327"&gt;sk33327 - How to generate a valid VPN debug, IKE debug and FW Monitor&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 12 Jul 2018 12:51:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-Troubleshooting-Commands/m-p/39637#M13070</guid>
      <dc:creator>Petr_Hantak</dc:creator>
      <dc:date>2018-07-12T12:51:18Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Troubleshooting Commands</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-Troubleshooting-Commands/m-p/39638#M13071</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Good commands and lastly IKE Info Viewer is the best tool to troubleshoot VPN.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 13 Jul 2018 18:47:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-Troubleshooting-Commands/m-p/39638#M13071</guid>
      <dc:creator>Gaurav_Pandya</dc:creator>
      <dc:date>2018-07-13T18:47:14Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Troubleshooting Commands</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-Troubleshooting-Commands/m-p/46771#M13072</link>
      <description>&lt;P&gt;So looking at the information on the "IKEView Tool" in sk30994, it seems it can only display information captured in a debug. Is there a way to see in realtime the remaining key lifetimes on Phase1 and Phase2 SAs, or other details such as Phase2 SA local and remote identities? This could easily be done on ASA, but I can't seem to find it on Check Point gateways.&lt;/P&gt;</description>
      <pubDate>Wed, 13 Mar 2019 15:49:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-Troubleshooting-Commands/m-p/46771#M13072</guid>
      <dc:creator>Jesse</dc:creator>
      <dc:date>2019-03-13T15:49:37Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Troubleshooting Commands</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-Troubleshooting-Commands/m-p/56060#M13073</link>
      <description>&lt;P&gt;Same Question!&lt;/P&gt;</description>
      <pubDate>Tue, 18 Jun 2019 12:24:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-Troubleshooting-Commands/m-p/56060#M13073</guid>
      <dc:creator>Robert_Dietrich</dc:creator>
      <dc:date>2019-06-18T12:24:37Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Troubleshooting Commands</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-Troubleshooting-Commands/m-p/230837#M44439</link>
      <description>&lt;P&gt;apparently not anymore&lt;/P&gt;</description>
      <pubDate>Fri, 25 Oct 2024 18:28:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-Troubleshooting-Commands/m-p/230837#M44439</guid>
      <dc:creator>gerb</dc:creator>
      <dc:date>2024-10-25T18:28:21Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Troubleshooting Commands</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-Troubleshooting-Commands/m-p/231056#M44506</link>
      <description>&lt;P&gt;You kick and ancient topic from 2018.&lt;/P&gt;
&lt;P&gt;Here is the relevant SK made for this time period:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk180488" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk180488&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 28 Oct 2024 21:53:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-Troubleshooting-Commands/m-p/231056#M44506</guid>
      <dc:creator>Lesley</dc:creator>
      <dc:date>2024-10-28T21:53:00Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Troubleshooting Commands</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-Troubleshooting-Commands/m-p/250280#M48897</link>
      <description>&lt;P&gt;Hello,&lt;BR /&gt;Is there any command that captures the traffic on both P1 and P2?&lt;BR /&gt;Is it possible to check it through the CLI, or do you necessarily have to capture the data and check it in IKEView Tool?&lt;/P&gt;</description>
      <pubDate>Sat, 31 May 2025 04:27:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-Troubleshooting-Commands/m-p/250280#M48897</guid>
      <dc:creator>Matlu</dc:creator>
      <dc:date>2025-05-31T04:27:42Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Troubleshooting Commands</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-Troubleshooting-Commands/m-p/250381#M48952</link>
      <description>&lt;P&gt;It's possible one of the various VPN kernel debugs might show you this information.&lt;BR /&gt;Capturing the relevant traffic and viewing it into IKEView is probably quicker/easier.&lt;/P&gt;</description>
      <pubDate>Mon, 02 Jun 2025 19:46:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-Troubleshooting-Commands/m-p/250381#M48952</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2025-06-02T19:46:46Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Troubleshooting Commands</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-Troubleshooting-Commands/m-p/257705#M50485</link>
      <description>&lt;P&gt;Hello,&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/7"&gt;@PhoneBoy&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;When you have VPN tunnel errors with “&lt;STRONG&gt;intermittent&lt;/STRONG&gt;” drops that occurred &lt;STRONG&gt;a couple of days ago&lt;/STRONG&gt;, is it possible to detect the root cause of these problems in the ‘&lt;STRONG&gt;messages&lt;/STRONG&gt;’ or “&lt;STRONG&gt;dmesg&lt;/STRONG&gt;” files of our FW?&lt;BR /&gt;Or is this information stored somewhere else?&lt;BR /&gt;Cheers.&lt;/P&gt;</description>
      <pubDate>Fri, 19 Sep 2025 05:14:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-Troubleshooting-Commands/m-p/257705#M50485</guid>
      <dc:creator>Matlu</dc:creator>
      <dc:date>2025-09-19T05:14:39Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Troubleshooting Commands</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-Troubleshooting-Commands/m-p/257772#M50503</link>
      <description>&lt;P&gt;Issues with the VPN would not likely manifest itself in Gaia OS logs.&lt;BR /&gt;Possibly cpview has something and it might also show in the regular access policy logs (depending on the nature of the failure).&lt;/P&gt;</description>
      <pubDate>Fri, 19 Sep 2025 16:49:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-Troubleshooting-Commands/m-p/257772#M50503</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2025-09-19T16:49:55Z</dc:date>
    </item>
  </channel>
</rss>

