<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Some traffic is redirected to VPN tunnel without IPSec VPN Configuration in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/Some-traffic-is-redirected-to-VPN-tunnel-without-IPSec-VPN/m-p/28667#M5841</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi&amp;nbsp;Everyone,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have some case that is quite weird, my customer has Security Gateway R80.10 with HF T121 running at the moment.&lt;/P&gt;&lt;P&gt;The problem is when users that's behind Check Point does not get access to Public IP Address of Fortigate sometimes.&lt;/P&gt;&lt;P&gt;This only happens to Fortigate FW3 ( 203.xxx.xxx.138 ) refer screenshot below and there are no IPSec configuration of both sides&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="" class="image-1 jive-image j-img-original" src="https://community.checkpoint.com/legacyfs/online/checkpoint/78010_qh1.jpg" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the screenshot if the connectivity is being successfully to destination IP address, look at on column blade is showing firewall and https inspection. We do configure as a bypass for those IP public this is expected behavior&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="" class="image-2 jive-image j-img-original" src="https://community.checkpoint.com/legacyfs/online/checkpoint/78023_qh2.jpg" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But they sometimes can not get access to that web portal page due to the traffic is redirect to VPN tunnel, look at on&amp;nbsp;&lt;SPAN&gt;column blade is showing&amp;nbsp;VPN blade&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="" class="image-3 jive-image j-img-original" src="https://community.checkpoint.com/legacyfs/online/checkpoint/78024_qh3.jpg" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This problem happens intermittent&amp;nbsp;without a cause, I have already opened case to TAC but they can not find out something wrong as well&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I ran zdebug drop command during the issue was occurring and below is output&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;[Expert@cpgateway:0]# fw ctl zdebug drop |grep 203.xxx.xxxx.138&lt;BR /&gt;;[cpu_1];[fw4_2];fw_log_drop_ex: Packet proto=6 202.xxx.xxx.197:53651 -&amp;gt; 203.xxx.xxx.138:443 dropped by vpn_encrypt_chain Reason: encrypt drop;&lt;BR /&gt;;[cpu_1];[fw4_2];fw_log_drop_ex: Packet proto=6 202.xxx.xxx.197:53651 -&amp;gt; 203.xxx.xxx.xxx:443 dropped by vpn_encrypt_chain Reason: encrypt drop;&lt;BR /&gt;;[cpu_1];[fw4_2];fw_log_drop_ex: Packet proto=6 202.xxx.xxx.197:53651 -&amp;gt; 203.xxx.xxx.xxx:443 dropped by vpn_encrypt_chain Reason: encrypt drop;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From Access Control Policy, we have configured rule with source to dest and with all any service and https inspection rule with bypass for those Fortigate Public IP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I do not know the root cause of this case, does any one can help or guide me to check more and find the root cause ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Really appreciate and thanks in advance.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Sarm&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 30 Jan 2019 06:52:38 GMT</pubDate>
    <dc:creator>Sarm_Chanatip</dc:creator>
    <dc:date>2019-01-30T06:52:38Z</dc:date>
    <item>
      <title>Some traffic is redirected to VPN tunnel without IPSec VPN Configuration</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Some-traffic-is-redirected-to-VPN-tunnel-without-IPSec-VPN/m-p/28667#M5841</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi&amp;nbsp;Everyone,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have some case that is quite weird, my customer has Security Gateway R80.10 with HF T121 running at the moment.&lt;/P&gt;&lt;P&gt;The problem is when users that's behind Check Point does not get access to Public IP Address of Fortigate sometimes.&lt;/P&gt;&lt;P&gt;This only happens to Fortigate FW3 ( 203.xxx.xxx.138 ) refer screenshot below and there are no IPSec configuration of both sides&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="" class="image-1 jive-image j-img-original" src="https://community.checkpoint.com/legacyfs/online/checkpoint/78010_qh1.jpg" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the screenshot if the connectivity is being successfully to destination IP address, look at on column blade is showing firewall and https inspection. We do configure as a bypass for those IP public this is expected behavior&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="" class="image-2 jive-image j-img-original" src="https://community.checkpoint.com/legacyfs/online/checkpoint/78023_qh2.jpg" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But they sometimes can not get access to that web portal page due to the traffic is redirect to VPN tunnel, look at on&amp;nbsp;&lt;SPAN&gt;column blade is showing&amp;nbsp;VPN blade&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="" class="image-3 jive-image j-img-original" src="https://community.checkpoint.com/legacyfs/online/checkpoint/78024_qh3.jpg" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This problem happens intermittent&amp;nbsp;without a cause, I have already opened case to TAC but they can not find out something wrong as well&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I ran zdebug drop command during the issue was occurring and below is output&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;[Expert@cpgateway:0]# fw ctl zdebug drop |grep 203.xxx.xxxx.138&lt;BR /&gt;;[cpu_1];[fw4_2];fw_log_drop_ex: Packet proto=6 202.xxx.xxx.197:53651 -&amp;gt; 203.xxx.xxx.138:443 dropped by vpn_encrypt_chain Reason: encrypt drop;&lt;BR /&gt;;[cpu_1];[fw4_2];fw_log_drop_ex: Packet proto=6 202.xxx.xxx.197:53651 -&amp;gt; 203.xxx.xxx.xxx:443 dropped by vpn_encrypt_chain Reason: encrypt drop;&lt;BR /&gt;;[cpu_1];[fw4_2];fw_log_drop_ex: Packet proto=6 202.xxx.xxx.197:53651 -&amp;gt; 203.xxx.xxx.xxx:443 dropped by vpn_encrypt_chain Reason: encrypt drop;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From Access Control Policy, we have configured rule with source to dest and with all any service and https inspection rule with bypass for those Fortigate Public IP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I do not know the root cause of this case, does any one can help or guide me to check more and find the root cause ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Really appreciate and thanks in advance.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Sarm&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 30 Jan 2019 06:52:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Some-traffic-is-redirected-to-VPN-tunnel-without-IPSec-VPN/m-p/28667#M5841</guid>
      <dc:creator>Sarm_Chanatip</dc:creator>
      <dc:date>2019-01-30T06:52:38Z</dc:date>
    </item>
    <item>
      <title>Re: Some traffic is redirected to VPN tunnel without IPSec VPN Configuration</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Some-traffic-is-redirected-to-VPN-tunnel-without-IPSec-VPN/m-p/28668#M5842</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The TAC is the right place for this inquiry.&lt;/P&gt;&lt;P&gt;Please send me the SR number in a private message.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 31 Jan 2019 02:15:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Some-traffic-is-redirected-to-VPN-tunnel-without-IPSec-VPN/m-p/28668#M5842</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-01-31T02:15:43Z</dc:date>
    </item>
    <item>
      <title>Re: Some traffic is redirected to VPN tunnel without IPSec VPN Configuration</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Some-traffic-is-redirected-to-VPN-tunnel-without-IPSec-VPN/m-p/28669#M5843</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Are there any VPN Communities that your Check Point gateway is a member of?&amp;nbsp; Is your Check Point terminating any Remote Access VPN tunnels?&amp;nbsp; If the answer to both questions is no (and you are quite sure about that), uncheck the "IPSec VPN" blade product checkbox on the firewall and run enabled_blades on the firewall after reinstalling policy to verify.&amp;nbsp; The IPSec VPN blade seems to be on by default in most installations, even when it is not really needed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If there are other tunnels and you can't uncheck it, the only situation that would cause an encrypt action is the source IP falling within your firewall's VPN domain and the destination IP address falling into the VPN domain of a VPN peer's object.&amp;nbsp; Is there any kind of object representing 203.xxx.xxx.138?&amp;nbsp; If so what kind of object is it?&amp;nbsp; It should just be a simple host, not an interoperable device, externally managed gateway type, or Check Point host.&amp;nbsp; The only other situation that could cause this would be a VPN Tunnel Interface being present in a route-based VPN setup which you are pretty unlikely to have present.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Might also be interesting to show all known VPN domains in your config with the tool below, the 203.xxx.xxx.138 address of the Fortinet should NOT appear anywhere in the output:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.checkpoint.com/docs/DOC-3021"&gt;Show VPN Routing on CLI&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px;"&gt;--&lt;/P&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px;"&gt;CheckMates Break Out Sessions Speaker&lt;/P&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px;"&gt;CPX 2019 Las Vegas &amp;amp; Vienna - Tuesday@13:30&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 31 Jan 2019 03:57:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Some-traffic-is-redirected-to-VPN-tunnel-without-IPSec-VPN/m-p/28669#M5843</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2019-01-31T03:57:45Z</dc:date>
    </item>
    <item>
      <title>Re: Some traffic is redirected to VPN tunnel without IPSec VPN Configuration</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Some-traffic-is-redirected-to-VPN-tunnel-without-IPSec-VPN/m-p/28670#M5844</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Timothy&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sorry for late replying, I just gathered all of information and screenshots to you and please see answers of your questions below&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;Are there any VPN Communities that your Check Point gateway is a member of?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;-&amp;nbsp;&amp;nbsp;&amp;nbsp;Yes, there is only Remote Access VPN&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;&lt;IMG __jive_id="78105" alt="" class="image-1 jive-image j-img-original" src="/legacyfs/online/checkpoint/78105_Remote Access VPN Community.jpg" /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;&lt;IMG __jive_id="78108" alt="" class="image-4 jive-image j-img-original" src="/legacyfs/online/checkpoint/78108_ipsec vpn 1.jpg" /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;&lt;SPAN&gt;Is there any kind of object representing 203.xxx.xxx.138?&amp;nbsp;&lt;SPAN style="background-color: #ffffff;"&gt;If so what kind of object is it?&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;&lt;SPAN&gt;- It's just normal host object&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;&lt;SPAN&gt;&lt;IMG alt="" class="image-6 jive-image j-img-original" src="/legacyfs/online/checkpoint/78111_host object 1.jpg" /&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;&lt;SPAN&gt;Regarding of VPN domain, please see screenshot below&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;&lt;SPAN&gt;&lt;IMG __jive_id="78107" alt="" class="image-3 jive-image j-img-original" src="/legacyfs/online/checkpoint/78107_vpn routing domain.jpg" /&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;&lt;SPAN&gt;Below is an example of log when is not able to get access the destination IP address&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;&lt;SPAN&gt;&lt;IMG __jive_id="78109" alt="" class="image-5 jive-image j-img-original" src="https://community.checkpoint.com/legacyfs/online/checkpoint/78109_2019-02-02_162915.jpg" /&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 02 Feb 2019 09:31:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Some-traffic-is-redirected-to-VPN-tunnel-without-IPSec-VPN/m-p/28670#M5844</guid>
      <dc:creator>Sarm_Chanatip</dc:creator>
      <dc:date>2019-02-02T09:31:48Z</dc:date>
    </item>
    <item>
      <title>Re: Some traffic is redirected to VPN tunnel without IPSec VPN Configuration</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Some-traffic-is-redirected-to-VPN-tunnel-without-IPSec-VPN/m-p/28671#M5845</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;OK it looks like the Check Point is inappropriately trying to encrypt that traffic into a VPN tunnel associated with the RemoteAccess VPN Community.&amp;nbsp; My guess based on this limited information is the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) When there is no one behind Fortigate FW3 currently doing a Remote Access VPN to the Check Point, the User can get access to the Public IP Address of Fortigate FW3 just fine, the traffic goes in the clear.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) When there *is* someone behind Fortigate FW3 currently doing a Remote Access VPN to the Check Point, their Remote Access VPN traffic leaving the Fortigate FW3 is NATted to the same external IP address in use by the Fortigate FW3 for its portal.&amp;nbsp; As such, when a User at the Check Point site tries to initiate a connection the Public IP Address of Fortigate FW3, there is already an existing VPN tunnel with that address so the Check Point thinks it needs to be encrypted.&amp;nbsp; Unfortunately that is not the case so the encryption fails on the Check Point side.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Solution: use a different IP address to NAT outbound connections initiated from behind the Fortigate FW3 (such as Remote Access VPN connections) other than the Fortigate FW3 external interface 203.xxx.xxx.138 if possible.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px;"&gt;--&lt;/P&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px;"&gt;CheckMates Break Out Sessions Speaker&lt;/P&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px;"&gt;CPX 2019 Las Vegas &amp;amp; Vienna - Tuesday@13:30&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 04 Feb 2019 13:49:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Some-traffic-is-redirected-to-VPN-tunnel-without-IPSec-VPN/m-p/28671#M5845</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2019-02-04T13:49:47Z</dc:date>
    </item>
  </channel>
</rss>

