<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: VPN gateway random UDP traffic to CP peers? in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/VPN-gateway-random-UDP-traffic-to-CP-peers/m-p/209002#M34628</link>
    <description>&lt;P&gt;UDP 18234 is a tunnel test feature.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;The behavior you described&amp;nbsp;could be related to Check Point's VPN tunnel testing feature.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The VPN tunnel testing protocol is designed to ensure that the VPN tunnels are functioning properly and can handle traffic. It periodically sends test packets between the gateways to verify the connectivity and integrity of the VPN tunnels.&lt;/P&gt;</description>
    <pubDate>Mon, 18 Mar 2024 12:36:10 GMT</pubDate>
    <dc:creator>_Val_</dc:creator>
    <dc:date>2024-03-18T12:36:10Z</dc:date>
    <item>
      <title>VPN gateway random UDP traffic to CP peers?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/VPN-gateway-random-UDP-traffic-to-CP-peers/m-p/208629#M34567</link>
      <description>&lt;P&gt;Hi CheckMates,&lt;/P&gt;
&lt;P&gt;I'm seeing some strange traffic I cannot explain and I was wondering if anyone knew what is causing this. Our central VPN gateway seems to be connecting to all our remote VPN site's CP gateways with seemingly random high UDP ports. The VPNs are working fine otherwise, but I have no idea which process is causing this. Anyone got any idea why this is happening and how I can stop it?&lt;/P&gt;
&lt;P&gt;So in the screenshot below the source is the public IP of the active member of our central VPN cluster, the destinations are various public IP's of the Check Points at our remote sites that are in a star community with the central gateway.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="VPN.jpg" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/24844i10E432CB2EDAFEA5/image-size/medium?v=v2&amp;amp;px=400" role="button" title="VPN.jpg" alt="VPN.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt; &lt;/P&gt;</description>
      <pubDate>Wed, 13 Mar 2024 10:53:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/VPN-gateway-random-UDP-traffic-to-CP-peers/m-p/208629#M34567</guid>
      <dc:creator>Nik_Bloemers</dc:creator>
      <dc:date>2024-03-13T10:53:46Z</dc:date>
    </item>
    <item>
      <title>Re: VPN gateway random UDP traffic to CP peers?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/VPN-gateway-random-UDP-traffic-to-CP-peers/m-p/208632#M34568</link>
      <description>&lt;P&gt;Are the drops out of state or cleanup drops?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Looks like the UDP source port to me that is dropped&lt;/P&gt;
&lt;P&gt;Capture will tell you.&lt;/P&gt;
&lt;P&gt;I suspect the firewall itself is not starting an UDP connection like this but it is the source port from ESP traffic (500,4500)&lt;/P&gt;</description>
      <pubDate>Wed, 13 Mar 2024 11:17:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/VPN-gateway-random-UDP-traffic-to-CP-peers/m-p/208632#M34568</guid>
      <dc:creator>Lesley</dc:creator>
      <dc:date>2024-03-13T11:17:12Z</dc:date>
    </item>
    <item>
      <title>Re: VPN gateway random UDP traffic to CP peers?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/VPN-gateway-random-UDP-traffic-to-CP-peers/m-p/208642#M34573</link>
      <description>&lt;P&gt;They are cleanup drops. The peers are not behind NAT-T. And then the destination port should be 500/4500, not some random UDP high port. It's the destination port in the log, not the source port.&lt;/P&gt;</description>
      <pubDate>Wed, 13 Mar 2024 12:01:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/VPN-gateway-random-UDP-traffic-to-CP-peers/m-p/208642#M34573</guid>
      <dc:creator>Nik_Bloemers</dc:creator>
      <dc:date>2024-03-13T12:01:58Z</dc:date>
    </item>
    <item>
      <title>Re: VPN gateway random UDP traffic to CP peers?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/VPN-gateway-random-UDP-traffic-to-CP-peers/m-p/208811#M34592</link>
      <description>&lt;P&gt;I had this but cannot remember the solution.&lt;BR /&gt;Is it tunnel testing, permanent tunnels or Dead Peer Detection creating this?&lt;BR /&gt;i.e. If on, turn off to test&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 14 Mar 2024 22:47:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/VPN-gateway-random-UDP-traffic-to-CP-peers/m-p/208811#M34592</guid>
      <dc:creator>spottex</dc:creator>
      <dc:date>2024-03-14T22:47:51Z</dc:date>
    </item>
    <item>
      <title>Re: VPN gateway random UDP traffic to CP peers?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/VPN-gateway-random-UDP-traffic-to-CP-peers/m-p/208853#M34593</link>
      <description>&lt;P&gt;What is the source port, anything consistent?&lt;/P&gt;</description>
      <pubDate>Fri, 15 Mar 2024 09:06:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/VPN-gateway-random-UDP-traffic-to-CP-peers/m-p/208853#M34593</guid>
      <dc:creator>emmap</dc:creator>
      <dc:date>2024-03-15T09:06:11Z</dc:date>
    </item>
    <item>
      <title>Re: VPN gateway random UDP traffic to CP peers?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/VPN-gateway-random-UDP-traffic-to-CP-peers/m-p/208856#M34594</link>
      <description>&lt;P&gt;Permanent tunnels are enabled, but it's all CP &amp;lt;-&amp;gt; CP, so using tunnel_test. The tunnel_test traffic is getting encrypted and is a completely different port then the ones we're seeing dropped. Tunnel_test is all UDP 18234, hitting the implied rule.&lt;/P&gt;</description>
      <pubDate>Fri, 15 Mar 2024 09:20:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/VPN-gateway-random-UDP-traffic-to-CP-peers/m-p/208856#M34594</guid>
      <dc:creator>Nik_Bloemers</dc:creator>
      <dc:date>2024-03-15T09:20:45Z</dc:date>
    </item>
    <item>
      <title>Re: VPN gateway random UDP traffic to CP peers?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/VPN-gateway-random-UDP-traffic-to-CP-peers/m-p/208862#M34596</link>
      <description>&lt;P&gt;please share the source ports.&lt;/P&gt;
&lt;P&gt;Also maybe traffic capture and VPN debug will tell you more. I think it is DPD&lt;/P&gt;</description>
      <pubDate>Fri, 15 Mar 2024 10:29:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/VPN-gateway-random-UDP-traffic-to-CP-peers/m-p/208862#M34596</guid>
      <dc:creator>Lesley</dc:creator>
      <dc:date>2024-03-15T10:29:31Z</dc:date>
    </item>
    <item>
      <title>Re: VPN gateway random UDP traffic to CP peers?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/VPN-gateway-random-UDP-traffic-to-CP-peers/m-p/208942#M34619</link>
      <description>&lt;P&gt;I have a rule of thumb, never treat a Check Point issue with logic &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 17 Mar 2024 19:28:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/VPN-gateway-random-UDP-traffic-to-CP-peers/m-p/208942#M34619</guid>
      <dc:creator>spottex</dc:creator>
      <dc:date>2024-03-17T19:28:25Z</dc:date>
    </item>
    <item>
      <title>Re: VPN gateway random UDP traffic to CP peers?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/VPN-gateway-random-UDP-traffic-to-CP-peers/m-p/208997#M34626</link>
      <description>&lt;P&gt;I've checked the source port, which strangely does seem to be tunnel_test (UDP 18234). So that's even stranger, since I also see seperate succesful encrypt logs for them. It's like it's sending the tunnel tests twice?&lt;/P&gt;</description>
      <pubDate>Mon, 18 Mar 2024 12:16:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/VPN-gateway-random-UDP-traffic-to-CP-peers/m-p/208997#M34626</guid>
      <dc:creator>Nik_Bloemers</dc:creator>
      <dc:date>2024-03-18T12:16:50Z</dc:date>
    </item>
    <item>
      <title>Re: VPN gateway random UDP traffic to CP peers?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/VPN-gateway-random-UDP-traffic-to-CP-peers/m-p/209000#M34627</link>
      <description>&lt;P&gt;maybe this SK will send you in the right direction&lt;/P&gt;
&lt;P&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk163835" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk163835&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 18 Mar 2024 12:27:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/VPN-gateway-random-UDP-traffic-to-CP-peers/m-p/209000#M34627</guid>
      <dc:creator>Lesley</dc:creator>
      <dc:date>2024-03-18T12:27:46Z</dc:date>
    </item>
    <item>
      <title>Re: VPN gateway random UDP traffic to CP peers?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/VPN-gateway-random-UDP-traffic-to-CP-peers/m-p/209002#M34628</link>
      <description>&lt;P&gt;UDP 18234 is a tunnel test feature.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;The behavior you described&amp;nbsp;could be related to Check Point's VPN tunnel testing feature.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The VPN tunnel testing protocol is designed to ensure that the VPN tunnels are functioning properly and can handle traffic. It periodically sends test packets between the gateways to verify the connectivity and integrity of the VPN tunnels.&lt;/P&gt;</description>
      <pubDate>Mon, 18 Mar 2024 12:36:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/VPN-gateway-random-UDP-traffic-to-CP-peers/m-p/209002#M34628</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2024-03-18T12:36:10Z</dc:date>
    </item>
    <item>
      <title>Re: VPN gateway random UDP traffic to CP peers?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/VPN-gateway-random-UDP-traffic-to-CP-peers/m-p/209006#M34629</link>
      <description>&lt;P&gt;Also,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To stop this behavior, you can disable the VPN tunnel testing feature. Here are the steps to disable VPN tunnel testing in Check Point:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;
&lt;P&gt;Log in to the SmartConsole (Check Point management interface).&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;Go to the "Network Management" tab.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;Select "VPN" from the left-hand menu.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;In the VPN section, click on "VPN Tunnel Sharing".&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;In the "VPN Tunnel Sharing" window, select the relevant VPN community.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;Click on the "Advanced" button.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;In the "Advanced VPN Tunnel Sharing" window, uncheck the option for "Enable VPN tunnel testing".&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;Click "OK" to save the changes.&lt;/P&gt;
&lt;/LI&gt;
&lt;/OL&gt;</description>
      <pubDate>Mon, 18 Mar 2024 13:05:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/VPN-gateway-random-UDP-traffic-to-CP-peers/m-p/209006#M34629</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2024-03-18T13:05:49Z</dc:date>
    </item>
    <item>
      <title>Re: VPN gateway random UDP traffic to CP peers?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/VPN-gateway-random-UDP-traffic-to-CP-peers/m-p/209007#M34630</link>
      <description>&lt;P&gt;Is this a joke? If not, can you please elaborate?&lt;/P&gt;</description>
      <pubDate>Mon, 18 Mar 2024 13:06:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/VPN-gateway-random-UDP-traffic-to-CP-peers/m-p/209007#M34630</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2024-03-18T13:06:46Z</dc:date>
    </item>
    <item>
      <title>Re: VPN gateway random UDP traffic to CP peers?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/VPN-gateway-random-UDP-traffic-to-CP-peers/m-p/209008#M34631</link>
      <description>&lt;P&gt;I've tried making a No NAT for the tunnel_test traffic, but it's still getting NATted behind the cluster IP (which is fine) and random UDP high ports (which is not, it should stay the standard tunnel_test port) based on an implied rule it seems from the logs.&lt;/P&gt;</description>
      <pubDate>Mon, 18 Mar 2024 13:20:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/VPN-gateway-random-UDP-traffic-to-CP-peers/m-p/209008#M34631</guid>
      <dc:creator>Nik_Bloemers</dc:creator>
      <dc:date>2024-03-18T13:20:46Z</dc:date>
    </item>
    <item>
      <title>Re: VPN gateway random UDP traffic to CP peers?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/VPN-gateway-random-UDP-traffic-to-CP-peers/m-p/209013#M34632</link>
      <description>&lt;P&gt;Not quite sure where you want me to go. The only tab called 'Network Management' that I know of is on gateway objects.&lt;/P&gt;</description>
      <pubDate>Mon, 18 Mar 2024 13:36:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/VPN-gateway-random-UDP-traffic-to-CP-peers/m-p/209013#M34632</guid>
      <dc:creator>Nik_Bloemers</dc:creator>
      <dc:date>2024-03-18T13:36:17Z</dc:date>
    </item>
    <item>
      <title>Re: VPN gateway random UDP traffic to CP peers?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/VPN-gateway-random-UDP-traffic-to-CP-peers/m-p/209020#M34633</link>
      <description>&lt;P&gt;Fair enough, let's try a different approach:&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://sc1.checkpoint.com/documents/R80.40/WebAdminGuides/EN/CP_R80.40_SitetoSiteVPN_AdminGuide/Topics-VPNSG/Tunnel-Management.htm" target="_blank"&gt;https://sc1.checkpoint.com/documents/R80.40/WebAdminGuides/EN/CP_R80.40_SitetoSiteVPN_AdminGuide/Topics-VPNSG/Tunnel-Management.htm&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 18 Mar 2024 14:30:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/VPN-gateway-random-UDP-traffic-to-CP-peers/m-p/209020#M34633</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2024-03-18T14:30:20Z</dc:date>
    </item>
    <item>
      <title>Re: VPN gateway random UDP traffic to CP peers?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/VPN-gateway-random-UDP-traffic-to-CP-peers/m-p/209022#M34635</link>
      <description>&lt;P&gt;Thanks, but that doesn't describe anything about disabling tunnel testing.&lt;/P&gt;
&lt;P&gt;Also, I don't want to disable tunnel_testing, I want the gateway to stop source port NATing it for some strange reason &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;The tunnels themselves all work, but the log is getting unnecesarrily spammed with the high UDP port traffic hitting the cleanup rule, while it should be accepted on an implied rule as a control connection.&lt;/P&gt;</description>
      <pubDate>Mon, 18 Mar 2024 14:37:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/VPN-gateway-random-UDP-traffic-to-CP-peers/m-p/209022#M34635</guid>
      <dc:creator>Nik_Bloemers</dc:creator>
      <dc:date>2024-03-18T14:37:13Z</dc:date>
    </item>
    <item>
      <title>Re: VPN gateway random UDP traffic to CP peers?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/VPN-gateway-random-UDP-traffic-to-CP-peers/m-p/209064#M34653</link>
      <description>&lt;P&gt;What I really meant but generalized as I say that a lot on conference tshoot calls. Especially when other Vendor FW's are involved it is usually CP weird behavior or CP interpretation of RFC's differ a lot from other vendors - exact example not coming to mind but there was a couple with IPsec VPNs we had to adjust behaviors to make compatible.&lt;BR /&gt;&lt;BR /&gt;Also where customers saying "this 'should' be how it is behaving because of how such and such is configured" which I will not accept as an answer until I see the behavior happening/Not happening.&lt;BR /&gt;&lt;BR /&gt;Then if logic does not prevail it is usually a coding issue.&lt;BR /&gt;E.g.1 Return decrypted traffic reaching the FW but not re-entering the tunnel and silently dropped - R&amp;amp;D hotfix.&lt;BR /&gt;E.g.2 Cert CRL default changed in jumboHF to OCSP. The FW not able to reach OCSP and should revert to CRL URL but does not. VPN cert auth fails. R&amp;amp;D fix for IkeV2 needed.&lt;BR /&gt;I have a few more examples from the past few years I could go find from saved notes.&lt;/P&gt;</description>
      <pubDate>Wed, 20 Mar 2024 21:33:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/VPN-gateway-random-UDP-traffic-to-CP-peers/m-p/209064#M34653</guid>
      <dc:creator>spottex</dc:creator>
      <dc:date>2024-03-20T21:33:03Z</dc:date>
    </item>
    <item>
      <title>Re: VPN gateway random UDP traffic to CP peers?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/VPN-gateway-random-UDP-traffic-to-CP-peers/m-p/231265#M38641</link>
      <description>&lt;P&gt;Did you ever find a solution for this? We are seeing the same thing - I think I know what is happening.&lt;/P&gt;
&lt;P&gt;1. Remote Check Point gateway sends tunnel test packet (destination port UDP 18234) to central Check Point gateway.&lt;BR /&gt;2. Central Check Point gateway receives packet, and NATs destination to a different interface/IP on the central gateway (as described in sk102729).&lt;BR /&gt;3. Central Check Point gateway replies to the tunnel test packet, using source of NAT'd interface&lt;BR /&gt;4. Remote Check Point gateway receives the reply to its tunnel test packet, but from different IP address - the IP address of the NAT'd interface on the central gateway - and drops the packet.&lt;/P&gt;
&lt;P&gt;Our logs are filled with dropped traffic with source port of UDP 18234 and destination port of random high UDP port (which correspond to source port of the original tunnel test packets).&lt;/P&gt;
&lt;P&gt;I don't know if this is impacting anything other than my sanity and perhaps status of tunnel as shown in SmartView Monitor, but it is annoying.&lt;/P&gt;
&lt;P&gt;Dave&lt;/P&gt;</description>
      <pubDate>Wed, 30 Oct 2024 16:38:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/VPN-gateway-random-UDP-traffic-to-CP-peers/m-p/231265#M38641</guid>
      <dc:creator>David_C1</dc:creator>
      <dc:date>2024-10-30T16:38:54Z</dc:date>
    </item>
    <item>
      <title>Re: VPN gateway random UDP traffic to CP peers?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/VPN-gateway-random-UDP-traffic-to-CP-peers/m-p/231325#M38649</link>
      <description>&lt;P&gt;I never managed to actually solve it, I just made a specific anti-log rule for the involved gateways so it's not a waste of log capacity.&amp;nbsp; The rule has 14 million hits in about 6 months.&lt;/P&gt;</description>
      <pubDate>Thu, 31 Oct 2024 06:43:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/VPN-gateway-random-UDP-traffic-to-CP-peers/m-p/231325#M38649</guid>
      <dc:creator>Nik_Bloemers</dc:creator>
      <dc:date>2024-10-31T06:43:58Z</dc:date>
    </item>
  </channel>
</rss>

