<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Remote Access VPN &amp;amp; Site-to-Site tunnels broken (“invalid cookie” / SA desync) after upgrade in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/Remote-Access-VPN-amp-Site-to-Site-tunnels-broken-invalid-cookie/m-p/260276#M43988</link>
    <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Appliance Type:&lt;/STRONG&gt; Quantum Spark (locally managed)&lt;BR /&gt;&lt;STRONG&gt;Previous version:&lt;/STRONG&gt; R81.10.15 – stable&lt;BR /&gt;&lt;STRONG&gt;Upgraded to:&lt;/STRONG&gt; R81.10.17&amp;nbsp;&lt;BR /&gt;&lt;STRONG&gt;Deployment Mode:&lt;/STRONG&gt; Locally Managed&lt;/P&gt;&lt;HR /&gt;&lt;H3&gt;&lt;STRONG&gt;Issue Summary&lt;/STRONG&gt;&lt;/H3&gt;&lt;P&gt;After upgrading from &lt;STRONG&gt;R81.10.15 → R81.10.17&lt;/STRONG&gt;, both &lt;STRONG&gt;Remote Access VPN (Mobile Access clients)&lt;/STRONG&gt; and &lt;STRONG&gt;Site-to-Site VPNs&lt;/STRONG&gt; began repeatedly dropping and re-negotiating.&lt;BR /&gt;Reverting back to &lt;STRONG&gt;R81.10.15&lt;/STRONG&gt; immediately restores stable operation.&lt;/P&gt;&lt;P&gt;Typical loop seen in the logs:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;SPAN&gt;&lt;SPAN class=""&gt;VPN&lt;/SPAN&gt; tunnel test failure caused a tunnel deletion &lt;SPAN class=""&gt;on&lt;/SPAN&gt; peer &amp;lt;SITE&amp;gt; (xxx.xxx.xxx.xxx) Phase1 Received Notification from Peer: invalid cookie A VPN tunnel is created &lt;SPAN class=""&gt;on&lt;/SPAN&gt;&amp;nbsp;&amp;lt;SITE&amp;gt; (&lt;SPAN class=""&gt;xxx.xxx.xxx.xxx&lt;/SPAN&gt;) &lt;/SPAN&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The same pattern repeats every few seconds.&lt;BR /&gt;Remote Access users cannot complete Phase 1 — they hang during IKE negotiation.&lt;/P&gt;&lt;H3&gt;&lt;STRONG&gt;Suspected Related Changes in R81.10.17&lt;/STRONG&gt;&lt;/H3&gt;&lt;OL&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;SMBGWY-17136 – CRL/OCSP validation updated to HTTP/1.1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;“Updated CRL and OCSP validation in Remote Access VPN, Site-to-Site VPN, and HTTPS Inspection to use HTTP/1.1 instead of HTTP/1.0. Ensures compatibility with DigiCert’s new requirements and prevents certificate validation failures.”&lt;/P&gt;&lt;P&gt;&amp;nbsp;Possible impact:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;If outbound &lt;STRONG&gt;HTTP/1.1&lt;/STRONG&gt; traffic to CRL/OCSP responders (e.g. DigiCert) is blocked, proxied, or inspected, certificate validation may fail.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;The gateway aborts IKE Phase 1, logs &lt;STRONG&gt;‘invalid cookie’&lt;/STRONG&gt;, and restarts negotiation.&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;SMBGWY-12630 – IKE SA handling change&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;“IKE SA information is now stored in the kernel only after the authentication exchange completes.”&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Possible impact:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;Stricter SA state tracking can expose peers that expect pre-auth SA behavior.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Half-open or resumed connections (common for mobile clients) now fail → “invalid cookie” or SA desync messages.&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;SMBGWY-16556 – Third NTP Server Option&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;May introduce &lt;STRONG&gt;time skew&lt;/STRONG&gt; if new NTP source (time.google.com) differs from existing ones → invalid cert validity or OCSP responses.&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;SMBGWY-16544 – VIP/Cluster IP Advertising&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;Could briefly advertise physical IPs after reboot, confusing VPN peers.&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;HR /&gt;&lt;H3&gt;&lt;STRONG&gt;Environment&lt;/STRONG&gt;&lt;/H3&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;Remote Access: Check Point Mobile&amp;nbsp;&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Site-to-Site: AES-128 SHA256&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;No proxy – direct Internet connectivity&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;NTP verified correct before upgrade&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;HR /&gt;&lt;H3&gt;&lt;STRONG&gt;Tests Performed&lt;/STRONG&gt;&lt;/H3&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;Verified PSK / certs unchanged.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Cleared all SAs via gui&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;No upstream inspection or NAT changes.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Full stability restored immediately upon rollback to R81.10.15.&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;HR /&gt;&lt;H3&gt;&lt;STRONG&gt;Questions for the Community&lt;/STRONG&gt;&lt;/H3&gt;&lt;OL&gt;&lt;LI&gt;&lt;P&gt;Has anyone else seen &lt;STRONG&gt;Remote Access VPN fail&lt;/STRONG&gt; after the HTTP/1.1 revocation-check change (&lt;STRONG&gt;SMBGWY-17136&lt;/STRONG&gt;) ?&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Are there any known &lt;STRONG&gt;hotfixes or SKs&lt;/STRONG&gt; addressing “invalid cookie” / SA desync after upgrading to R81.10.17 ?&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Is there a &lt;STRONG&gt;way to disable CRL/OCSP validation&lt;/STRONG&gt; temporarily in &lt;STRONG&gt;locally managed mode&lt;/STRONG&gt; for testing?&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Would a full SA flush on both peers be sufficient to adapt to the new IKE SA handling logic, or is configuration alignment required?&lt;/P&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;HR /&gt;&lt;H3&gt;&lt;STRONG&gt;Workaround&lt;/STRONG&gt;&lt;/H3&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;Rolling back to &lt;STRONG&gt;R81.10.15&lt;/STRONG&gt; restores stable RA and S2S VPN operation.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;On R81.10.17, even after clearing all SAs and re-initiating, tunnels continue to flap with “invalid cookie.”&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;HR /&gt;&lt;H3&gt;&lt;STRONG&gt;Request&lt;/STRONG&gt;&lt;/H3&gt;&lt;P&gt;If anyone has:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;encountered similar RA/S2S breakage post-upgrade,&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;applied a fix or hotfix, or&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;has insight into &lt;STRONG&gt;SMBGWY-17136 / 12630&lt;/STRONG&gt; behavior in R81.10.17,&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;please share your findings or any relevant SK article references (e.g. sk183884 or related).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;</description>
    <pubDate>Sun, 19 Oct 2025 21:00:13 GMT</pubDate>
    <dc:creator>MrDazanaCom</dc:creator>
    <dc:date>2025-10-19T21:00:13Z</dc:date>
    <item>
      <title>Remote Access VPN &amp; Site-to-Site tunnels broken (“invalid cookie” / SA desync) after upgrade</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Remote-Access-VPN-amp-Site-to-Site-tunnels-broken-invalid-cookie/m-p/260276#M43988</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Appliance Type:&lt;/STRONG&gt; Quantum Spark (locally managed)&lt;BR /&gt;&lt;STRONG&gt;Previous version:&lt;/STRONG&gt; R81.10.15 – stable&lt;BR /&gt;&lt;STRONG&gt;Upgraded to:&lt;/STRONG&gt; R81.10.17&amp;nbsp;&lt;BR /&gt;&lt;STRONG&gt;Deployment Mode:&lt;/STRONG&gt; Locally Managed&lt;/P&gt;&lt;HR /&gt;&lt;H3&gt;&lt;STRONG&gt;Issue Summary&lt;/STRONG&gt;&lt;/H3&gt;&lt;P&gt;After upgrading from &lt;STRONG&gt;R81.10.15 → R81.10.17&lt;/STRONG&gt;, both &lt;STRONG&gt;Remote Access VPN (Mobile Access clients)&lt;/STRONG&gt; and &lt;STRONG&gt;Site-to-Site VPNs&lt;/STRONG&gt; began repeatedly dropping and re-negotiating.&lt;BR /&gt;Reverting back to &lt;STRONG&gt;R81.10.15&lt;/STRONG&gt; immediately restores stable operation.&lt;/P&gt;&lt;P&gt;Typical loop seen in the logs:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;SPAN&gt;&lt;SPAN class=""&gt;VPN&lt;/SPAN&gt; tunnel test failure caused a tunnel deletion &lt;SPAN class=""&gt;on&lt;/SPAN&gt; peer &amp;lt;SITE&amp;gt; (xxx.xxx.xxx.xxx) Phase1 Received Notification from Peer: invalid cookie A VPN tunnel is created &lt;SPAN class=""&gt;on&lt;/SPAN&gt;&amp;nbsp;&amp;lt;SITE&amp;gt; (&lt;SPAN class=""&gt;xxx.xxx.xxx.xxx&lt;/SPAN&gt;) &lt;/SPAN&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The same pattern repeats every few seconds.&lt;BR /&gt;Remote Access users cannot complete Phase 1 — they hang during IKE negotiation.&lt;/P&gt;&lt;H3&gt;&lt;STRONG&gt;Suspected Related Changes in R81.10.17&lt;/STRONG&gt;&lt;/H3&gt;&lt;OL&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;SMBGWY-17136 – CRL/OCSP validation updated to HTTP/1.1&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;“Updated CRL and OCSP validation in Remote Access VPN, Site-to-Site VPN, and HTTPS Inspection to use HTTP/1.1 instead of HTTP/1.0. Ensures compatibility with DigiCert’s new requirements and prevents certificate validation failures.”&lt;/P&gt;&lt;P&gt;&amp;nbsp;Possible impact:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;If outbound &lt;STRONG&gt;HTTP/1.1&lt;/STRONG&gt; traffic to CRL/OCSP responders (e.g. DigiCert) is blocked, proxied, or inspected, certificate validation may fail.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;The gateway aborts IKE Phase 1, logs &lt;STRONG&gt;‘invalid cookie’&lt;/STRONG&gt;, and restarts negotiation.&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;SMBGWY-12630 – IKE SA handling change&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;“IKE SA information is now stored in the kernel only after the authentication exchange completes.”&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Possible impact:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;Stricter SA state tracking can expose peers that expect pre-auth SA behavior.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Half-open or resumed connections (common for mobile clients) now fail → “invalid cookie” or SA desync messages.&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;SMBGWY-16556 – Third NTP Server Option&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;May introduce &lt;STRONG&gt;time skew&lt;/STRONG&gt; if new NTP source (time.google.com) differs from existing ones → invalid cert validity or OCSP responses.&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;SMBGWY-16544 – VIP/Cluster IP Advertising&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;Could briefly advertise physical IPs after reboot, confusing VPN peers.&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;HR /&gt;&lt;H3&gt;&lt;STRONG&gt;Environment&lt;/STRONG&gt;&lt;/H3&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;Remote Access: Check Point Mobile&amp;nbsp;&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Site-to-Site: AES-128 SHA256&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;No proxy – direct Internet connectivity&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;NTP verified correct before upgrade&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;HR /&gt;&lt;H3&gt;&lt;STRONG&gt;Tests Performed&lt;/STRONG&gt;&lt;/H3&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;Verified PSK / certs unchanged.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Cleared all SAs via gui&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;No upstream inspection or NAT changes.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Full stability restored immediately upon rollback to R81.10.15.&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;HR /&gt;&lt;H3&gt;&lt;STRONG&gt;Questions for the Community&lt;/STRONG&gt;&lt;/H3&gt;&lt;OL&gt;&lt;LI&gt;&lt;P&gt;Has anyone else seen &lt;STRONG&gt;Remote Access VPN fail&lt;/STRONG&gt; after the HTTP/1.1 revocation-check change (&lt;STRONG&gt;SMBGWY-17136&lt;/STRONG&gt;) ?&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Are there any known &lt;STRONG&gt;hotfixes or SKs&lt;/STRONG&gt; addressing “invalid cookie” / SA desync after upgrading to R81.10.17 ?&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Is there a &lt;STRONG&gt;way to disable CRL/OCSP validation&lt;/STRONG&gt; temporarily in &lt;STRONG&gt;locally managed mode&lt;/STRONG&gt; for testing?&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Would a full SA flush on both peers be sufficient to adapt to the new IKE SA handling logic, or is configuration alignment required?&lt;/P&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;HR /&gt;&lt;H3&gt;&lt;STRONG&gt;Workaround&lt;/STRONG&gt;&lt;/H3&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;Rolling back to &lt;STRONG&gt;R81.10.15&lt;/STRONG&gt; restores stable RA and S2S VPN operation.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;On R81.10.17, even after clearing all SAs and re-initiating, tunnels continue to flap with “invalid cookie.”&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;HR /&gt;&lt;H3&gt;&lt;STRONG&gt;Request&lt;/STRONG&gt;&lt;/H3&gt;&lt;P&gt;If anyone has:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;encountered similar RA/S2S breakage post-upgrade,&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;applied a fix or hotfix, or&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;has insight into &lt;STRONG&gt;SMBGWY-17136 / 12630&lt;/STRONG&gt; behavior in R81.10.17,&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;please share your findings or any relevant SK article references (e.g. sk183884 or related).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;</description>
      <pubDate>Sun, 19 Oct 2025 21:00:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Remote-Access-VPN-amp-Site-to-Site-tunnels-broken-invalid-cookie/m-p/260276#M43988</guid>
      <dc:creator>MrDazanaCom</dc:creator>
      <dc:date>2025-10-19T21:00:13Z</dc:date>
    </item>
    <item>
      <title>Re: Remote Access VPN &amp; Site-to-Site tunnels broken (“invalid cookie” / SA desync) after upgrade</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Remote-Access-VPN-amp-Site-to-Site-tunnels-broken-invalid-cookie/m-p/261031#M44133</link>
      <description>&lt;P&gt;Best is to open a support ticket with TAC.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 27 Oct 2025 13:01:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Remote-Access-VPN-amp-Site-to-Site-tunnels-broken-invalid-cookie/m-p/261031#M44133</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2025-10-27T13:01:59Z</dc:date>
    </item>
  </channel>
</rss>

