<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Guia Prático de Troubleshooting Avançado de VPN Check Point com VPN Debug in Brazil</title>
    <link>https://community.checkpoint.com/t5/Brazil/Guia-Pr%C3%A1tico-de-Troubleshooting-Avan%C3%A7ado-de-VPN-Check-Point-com/m-p/273061#M42</link>
    <description>&lt;P&gt;obrigado mestre&lt;/P&gt;</description>
    <pubDate>Tue, 10 Mar 2026 22:33:26 GMT</pubDate>
    <dc:creator>WiliRGasparetto</dc:creator>
    <dc:date>2026-03-10T22:33:26Z</dc:date>
    <item>
      <title>Guia Prático de Troubleshooting Avançado de VPN Check Point com VPN Debug</title>
      <link>https://community.checkpoint.com/t5/Brazil/Guia-Pr%C3%A1tico-de-Troubleshooting-Avan%C3%A7ado-de-VPN-Check-Point-com/m-p/273045#M40</link>
      <description>&lt;P&gt;&lt;STRONG&gt;Atenção (impacto operacional):&lt;/STRONG&gt; VPN debug e, principalmente, kernel debug podem gerar alto volume de logs e degradar performance. Use &lt;STRONG&gt;janela controlada&lt;/STRONG&gt;, preferencialmente com &lt;STRONG&gt;acesso via console&lt;/STRONG&gt;, e &lt;STRONG&gt;sempre com filtros&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;1) Mentalidade correta: o que você precisa provar (e em qual camada)&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Antes de “ligar debug”, defina a hipótese e a evidência esperada:&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Camada 0 — Conectividade IKE/NAT-T&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;O peer responde em &lt;STRONG&gt;UDP/500&lt;/STRONG&gt; (IKE) e, se houver NAT, em &lt;STRONG&gt;UDP/4500&lt;/STRONG&gt; (NAT-T)?&lt;/LI&gt;
&lt;LI&gt;Há bloqueio upstream? Roteamento assimétrico? ISP fazendo ALG?&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;Camada 1 — Negociação IKE (Phase 1 / IKE SA)&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Proposals compatíveis (encryption/integrity/DH)?&lt;/LI&gt;
&lt;LI&gt;Autenticação bate (PSK/cert/ID)?&lt;/LI&gt;
&lt;LI&gt;Cert chain/CRL/tempo (clock skew) OK?&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;Camada 2 — Child SA / Phase 2 (Traffic Selectors)&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Encryption Domain/TS batem nos dois lados?&lt;/LI&gt;
&lt;LI&gt;NAT Exemption correto?&lt;/LI&gt;
&lt;LI&gt;O tráfego “casa” em policy e entra na VPN?&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;Camada 3 — Data Plane&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;ESP (proto 50) sai/entra? Há drops no kernel?&lt;/LI&gt;
&lt;LI&gt;A aceleração (SecureXL) está interferindo? Precisa reproduzir em path não acelerado?&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;2) Preparação (antes do debug)&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;2.1 Checklist mínimo (evita debug desnecessário)&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Confirme &lt;STRONG&gt;hora/NTP&lt;/STRONG&gt; (muito comum quebrar cert/ike).&lt;/LI&gt;
&lt;LI&gt;Confirme &lt;STRONG&gt;policy instalada&lt;/STRONG&gt; e regras permitindo IKE/NAT-T (UDP/500, UDP/4500) e ESP (proto 50) entre os peers.&lt;/LI&gt;
&lt;LI&gt;Confirme &lt;STRONG&gt;rota para o peer&lt;/STRONG&gt; e &lt;STRONG&gt;retorno&lt;/STRONG&gt; (especialmente multi-ISP).&lt;/LI&gt;
&lt;LI&gt;Confirme &lt;STRONG&gt;NAT Exemption&lt;/STRONG&gt; (site-to-site) e se não há NAT “surpresa” no caminho.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;2.2 Tenha o “alvo” do debug definido&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Use IPs reais do caso; abaixo um &lt;STRONG&gt;exemplo seguro&lt;/STRONG&gt; (IPs de documentação):&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Peer remoto (public):&lt;/STRONG&gt; 203.0.113.10&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Local (public):&lt;/STRONG&gt; 198.51.100.5&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Rede local:&lt;/STRONG&gt; 10.10.10.0/24&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Rede remota:&lt;/STRONG&gt; 10.20.20.0/24&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;3) Coleta padrão (CheckMates-ready): 3 sessões e logs consistentes&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Sessão A — VPN debug (user space)&lt;/STRONG&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Entre em &lt;STRONG&gt;Expert&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Zere/controle o volume&lt;/STRONG&gt; antes de iniciar:&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;vpn debug trunc ALL=5&lt;/P&gt;
&lt;P&gt;Esse comando ajusta o nível/truncamento de debug e é o baseline recomendado para iniciar com granularidade sem explodir volume.&amp;nbsp;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Ative VPN debug:&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;vpn debug on&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;(Opcional, mas muito útil) Habilite timestamps no debug:&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;vpn debug timeon&lt;/P&gt;
&lt;P&gt;O objetivo é correlacionar com tcpdump / fw monitor / eventos de rota.&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Acompanhe os logs &lt;STRONG&gt;em tempo real&lt;/STRONG&gt; (em outra aba, se quiser):&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;tail -f $FWDIR/log/vpnd.elg&lt;/P&gt;
&lt;P&gt;tail -f $FWDIR/log/ike.elg&lt;/P&gt;
&lt;P&gt;O VPN debug grava evidências nos arquivos &lt;STRONG&gt;vpnd.elg&lt;/STRONG&gt; e &lt;STRONG&gt;ike.elg&lt;/STRONG&gt; em $FWDIR/log/.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Quando usar “ikefail”&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Se o problema é intermitente e você quer capturar “somente falhas”:&lt;/P&gt;
&lt;P&gt;vpn debug ikefail&lt;/P&gt;
&lt;P&gt;Esse modo foca em eventos de falha para reduzir ruído.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Sessão B — Captura de rede (tcpdump) para IKE/NAT-T/ESP&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;A ideia aqui é responder, com prova: &lt;STRONG&gt;“o peer respondeu?”&lt;/STRONG&gt;, &lt;STRONG&gt;“houve migração para NAT-T?”&lt;/STRONG&gt;, &lt;STRONG&gt;“ESP está fluindo?”&lt;/STRONG&gt;.&lt;/P&gt;
&lt;P&gt;tcpdump -ni &amp;lt;iface_wan&amp;gt; -vvv "(udp port 500 or udp port 4500 or proto 50)"&lt;/P&gt;
&lt;P&gt;Interpretação prática:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Só vê &lt;STRONG&gt;UDP/500&lt;/STRONG&gt; e nada volta → bloqueio/rota/ACL upstream.&lt;/LI&gt;
&lt;LI&gt;Vê &lt;STRONG&gt;UDP/500&lt;/STRONG&gt; e depois &lt;STRONG&gt;UDP/4500&lt;/STRONG&gt; → NAT-T em ação (normal quando há NAT).&lt;/LI&gt;
&lt;LI&gt;Vê &lt;STRONG&gt;ESP (proto 50)&lt;/STRONG&gt; saindo mas não voltando → retorno/ACL/ISP/roteamento assimétrico ou drop remoto.&lt;/LI&gt;
&lt;LI&gt;Vê ESP indo e voltando, mas app não passa → provável &lt;STRONG&gt;Phase 2 / selectors / NAT exemption / policy&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Sessão C — (Opcional) IKE monitor (snoop) quando você precisa “ver a conversa”&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Se precisar de visibilidade adicional, use o monitor do VPN debug:&lt;/P&gt;
&lt;P&gt;vpn debug mon&lt;/P&gt;
&lt;P&gt;Isso gera um arquivo do tipo snoop (por exemplo, ikemonitor.snoop) para análise. &lt;STRONG&gt;Atenção&lt;/STRONG&gt;: pode registrar informações sensíveis em cenários de XAUTH (ex.: senha). Use apenas quando necessário e com governança.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Para parar:&lt;/P&gt;
&lt;P&gt;vpn debug moff&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;4) Quando (e como) entrar em Kernel Debug sem derrubar o ambiente&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Regra de ouro: &lt;STRONG&gt;não rode kernel debug “no escuro”&lt;/STRONG&gt;. Primeiro filtre por &lt;STRONG&gt;IP/5-tuple/VPN peer&lt;/STRONG&gt;, depois capture.&lt;/P&gt;
&lt;P&gt;A documentação do GAiA descreve filtros de kernel debug para reduzir o output apenas ao tráfego relevante e evitar ruído/perda de performance.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;4.1 Filtrar por VPN peer (mais direto para incidentes VPN)&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Antes de iniciar o kernel debug, aplique filtro:&lt;/P&gt;
&lt;P&gt;fw ctl set int simple_debug_filter_off 1&lt;/P&gt;
&lt;P&gt;fw ctl set str simple_debug_filter_vpn_1 "203.0.113.10"&lt;/P&gt;
&lt;P&gt;O parâmetro simple_debug_filter_vpn_&amp;lt;N&amp;gt; filtra mensagens por peer VPN.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;4.2 Filtrar por 5-tuple (quando o problema é um fluxo específico)&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Exemplo (HTTP de teste entre duas redes):&lt;/P&gt;
&lt;P&gt;fw ctl set int simple_debug_filter_off 1&lt;/P&gt;
&lt;P&gt;fw ctl set str simple_debug_filter_saddr_1 "10.10.10.50"&lt;/P&gt;
&lt;P&gt;fw ctl set str simple_debug_filter_daddr_1 "10.20.20.80"&lt;/P&gt;
&lt;P&gt;fw ctl set int simple_debug_filter_dport_1 443&lt;/P&gt;
&lt;P&gt;fw ctl set int simple_debug_filter_proto_1 6&lt;/P&gt;
&lt;P&gt;A doc detalha a lógica &lt;STRONG&gt;AND&lt;/STRONG&gt; (mesmo índice) e &lt;STRONG&gt;OR&lt;/STRONG&gt; (índices diferentes), inclusive quando você precisa cobrir &lt;STRONG&gt;os dois sentidos&lt;/STRONG&gt; do fluxo.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;4.3 Desabilitar filtros ao final (higiene obrigatória)&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;fw ctl set int simple_debug_filter_off 1&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;5) Sequência prática “end-to-end” (copiar/colar)&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Início (Sessão A)&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;vpn debug trunc ALL=5&lt;/P&gt;
&lt;P&gt;vpn debug timeon&lt;/P&gt;
&lt;P&gt;vpn debug on&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Captura rede (Sessão B)&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;tcpdump -ni &amp;lt;iface_wan&amp;gt; -vvv "(udp port 500 or udp port 4500 or proto 50)"&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;(Opcional) IKE monitor (Sessão C)&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;vpn debug mon&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Reproduza o problema&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Suba o túnel / gere tráfego do domínio criptografado&lt;/LI&gt;
&lt;LI&gt;Marque horário exato do teste (para correlacionar logs)&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;Encerramento (Sessão A)&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;vpn debug off&lt;/P&gt;
&lt;P&gt;vpn debug timeoff&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Encerramento do monitor (se usado)&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;vpn debug moff&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Se você ativou kernel debug filters&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;fw ctl set int simple_debug_filter_off 1&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;6) O que procurar nos logs (padrão “diagnóstico por evidência”)&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;6.1 Falha em IKE (Phase 1 / IKE SA)&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Padrões comuns:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;STRONG&gt;“no proposal chosen”&lt;/STRONG&gt; → mismatch de proposal (enc/integrity/DH) entre peers.&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;“invalid ID / ID mismatch”&lt;/STRONG&gt; → Peer ID/config de identidade divergente (DN/FQDN/IP).&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;“peer not responding”&lt;/STRONG&gt; → rede/ACL/rota/NAT-T/ISP (prove com tcpdump).&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;Como fechar diagnóstico com prova&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Se tcpdump não mostra resposta do peer em UDP/500/4500 → não é “config VPN”, é &lt;STRONG&gt;conectividade&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI&gt;Se há resposta e a troca para em um ponto fixo → volte ao ike.elg/vpnd.elg com timestamps para achar o motivo.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;6.2 Falha em Phase 2 / Selectors&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Sinais típicos:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;IKE sobe, mas tráfego não passa.&lt;/LI&gt;
&lt;LI&gt;ESP não aparece ou aparece só em um sentido.&lt;/LI&gt;
&lt;LI&gt;Sessões “casa em rule errada” por NAT/route.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;Prova&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;tcpdump com proto 50 confirma ESP.&lt;/LI&gt;
&lt;LI&gt;vpnd.elg normalmente denuncia TS/encryption domain divergente.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;7) VSX (quando aplicável)&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Antes de qualquer coleta, entre no VS correto:&lt;/P&gt;
&lt;P&gt;vsenv &amp;lt;VSID&amp;gt;&lt;/P&gt;
&lt;P&gt;E só então execute as etapas acima (cada VS tem seus próprios contextos e logs).&lt;/P&gt;</description>
      <pubDate>Tue, 10 Mar 2026 20:37:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Brazil/Guia-Pr%C3%A1tico-de-Troubleshooting-Avan%C3%A7ado-de-VPN-Check-Point-com/m-p/273045#M40</guid>
      <dc:creator>WiliRGasparetto</dc:creator>
      <dc:date>2026-03-10T20:37:56Z</dc:date>
    </item>
    <item>
      <title>Re: Guia Prático de Troubleshooting Avançado de VPN Check Point com VPN Debug</title>
      <link>https://community.checkpoint.com/t5/Brazil/Guia-Pr%C3%A1tico-de-Troubleshooting-Avan%C3%A7ado-de-VPN-Check-Point-com/m-p/273057#M41</link>
      <description>&lt;P&gt;Sensacional, parabéns pelo artigo!&amp;nbsp;&lt;span class="lia-unicode-emoji" title=":clapping_hands:"&gt;👏&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 10 Mar 2026 21:50:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Brazil/Guia-Pr%C3%A1tico-de-Troubleshooting-Avan%C3%A7ado-de-VPN-Check-Point-com/m-p/273057#M41</guid>
      <dc:creator>PedroRFernandes</dc:creator>
      <dc:date>2026-03-10T21:50:26Z</dc:date>
    </item>
    <item>
      <title>Re: Guia Prático de Troubleshooting Avançado de VPN Check Point com VPN Debug</title>
      <link>https://community.checkpoint.com/t5/Brazil/Guia-Pr%C3%A1tico-de-Troubleshooting-Avan%C3%A7ado-de-VPN-Check-Point-com/m-p/273061#M42</link>
      <description>&lt;P&gt;obrigado mestre&lt;/P&gt;</description>
      <pubDate>Tue, 10 Mar 2026 22:33:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Brazil/Guia-Pr%C3%A1tico-de-Troubleshooting-Avan%C3%A7ado-de-VPN-Check-Point-com/m-p/273061#M42</guid>
      <dc:creator>WiliRGasparetto</dc:creator>
      <dc:date>2026-03-10T22:33:26Z</dc:date>
    </item>
    <item>
      <title>Re: Guia Prático de Troubleshooting Avançado de VPN Check Point com VPN Debug</title>
      <link>https://community.checkpoint.com/t5/Brazil/Guia-Pr%C3%A1tico-de-Troubleshooting-Avan%C3%A7ado-de-VPN-Check-Point-com/m-p/273983#M45</link>
      <description>&lt;P&gt;obrigado mestre&lt;/P&gt;</description>
      <pubDate>Mon, 23 Mar 2026 13:55:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Brazil/Guia-Pr%C3%A1tico-de-Troubleshooting-Avan%C3%A7ado-de-VPN-Check-Point-com/m-p/273983#M45</guid>
      <dc:creator>WiliRGasparetto</dc:creator>
      <dc:date>2026-03-23T13:55:41Z</dc:date>
    </item>
  </channel>
</rss>

