<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic R80.10 VSX Performance Issue - VPN tunnel encryption failed in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/R80-10-VSX-Performance-Issue-VPN-tunnel-encryption-failed/m-p/36770#M7727</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Currently we are having one VPN tunnel performance issue and need your help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have a dedicated VS (VS4) as a site2site VPN gateway and there is only one VPN tunnel running with remote gateway a Fortigate firewall device.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The issue is during the large file transfer (SFTP) through the VPN tunnel, the data pipe was closed without a reason and the transfer failed. We managed to capture the packet drops as below:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;;[kern];[tid_8];[fw4_0];fw_log_drop_conn: Packet &amp;lt;dir 1, 10.92.47.4:42216 -&amp;gt; 10.56.61.101:22 IPP 6&amp;gt;, &lt;STRONG&gt;dropped by do_outbound, Reason: encryption failed;&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And actually when we removed the filter of the IP address from the zdebug command, we can see more drops on different traffic streams with the same reason as above.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;While watching the output of "fwaccel stats -d", we can see the counters for "Encryption Errors" and "Decryption Errors" keep increasing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Reason Value Reason Value&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;-------------------- --------------- -------------------- ---------------&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;general reason 2 PXL decision 22376&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;fragment error 0 hl - spoof viol 0&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;F2F not allowed 0 hl - TCP viol 0&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;corrupted packet 0 hl - new conn 0&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;clr pkt on vpn 41790 partial conn 0&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt;encrypt failed 36731&lt;/STRONG&gt; drop template 0&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt;decrypt failed 34614018&lt;/STRONG&gt; outb - no conn 20&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;interface down 0 cluster error 0&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;XMT error 0 template quota 0&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;anti spoofing 0 Attack mitigation 0&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;local spoofing 0 sanity error 0&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;monitored spoofed 1383646751 QXL decision 0&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The command "fwaccel conns | grep "10.56.61.101" helped confirm that the encryption/decryption is offloaded to SecureXL.&lt;BR /&gt; &lt;EM&gt;10.56.61.101 22 10.92.47.4 36654 6 ...AC......... 2/0 0/2 0 0&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt; 10.56.61.101 22 10.92.47.4 36090 6 ...AC......... 2/0 0/2 0 0&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt; 10.92.47.4 36654 10.56.61.101 22 6 ...AC......... 2/0 0/2 0 0&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt; 10.92.47.4 36090 10.56.61.101 22 6 ...AC......... 2/0 0/2 0 0&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have logged case with TAC&amp;nbsp;and provided all information we could however so far we have not got any clear indication what caused the encryption/decryption error.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One thing we would like to test is to follow the suggestion from Timothy Hall in below discussions to use the commands &lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;"sim vpn off; fwaccel off; fwaccel on" to see if we are still getting errors when the encryption/decryption is handled by INSPECT. However we have never done that and don't understand the possible impact so would like someone to share his experience on this?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.checkpoint.com/thread/6148"&gt;R80.10 gateway, can't set sim_clamp_vpn_mss&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.checkpoint.com/thread/7630"&gt;ICMP is sometimes drop when send via IPSec Tunnel&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And what else could cause this issue? If the issue is gone without SecureXL, shall we just keep it as it is?&amp;nbsp;I believe SecureXL is still good to offload the encryption and decryption traffic so even the workaround works it cannot last long and still we need to find the root cause.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope someone can help out here.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;David&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 27 Feb 2019 23:58:23 GMT</pubDate>
    <dc:creator>David_Guan</dc:creator>
    <dc:date>2019-02-27T23:58:23Z</dc:date>
    <item>
      <title>R80.10 VSX Performance Issue - VPN tunnel encryption failed</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R80-10-VSX-Performance-Issue-VPN-tunnel-encryption-failed/m-p/36770#M7727</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Currently we are having one VPN tunnel performance issue and need your help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have a dedicated VS (VS4) as a site2site VPN gateway and there is only one VPN tunnel running with remote gateway a Fortigate firewall device.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The issue is during the large file transfer (SFTP) through the VPN tunnel, the data pipe was closed without a reason and the transfer failed. We managed to capture the packet drops as below:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;;[kern];[tid_8];[fw4_0];fw_log_drop_conn: Packet &amp;lt;dir 1, 10.92.47.4:42216 -&amp;gt; 10.56.61.101:22 IPP 6&amp;gt;, &lt;STRONG&gt;dropped by do_outbound, Reason: encryption failed;&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And actually when we removed the filter of the IP address from the zdebug command, we can see more drops on different traffic streams with the same reason as above.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;While watching the output of "fwaccel stats -d", we can see the counters for "Encryption Errors" and "Decryption Errors" keep increasing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Reason Value Reason Value&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;-------------------- --------------- -------------------- ---------------&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;general reason 2 PXL decision 22376&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;fragment error 0 hl - spoof viol 0&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;F2F not allowed 0 hl - TCP viol 0&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;corrupted packet 0 hl - new conn 0&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;clr pkt on vpn 41790 partial conn 0&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt;encrypt failed 36731&lt;/STRONG&gt; drop template 0&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;STRONG&gt;decrypt failed 34614018&lt;/STRONG&gt; outb - no conn 20&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;interface down 0 cluster error 0&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;XMT error 0 template quota 0&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;anti spoofing 0 Attack mitigation 0&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;local spoofing 0 sanity error 0&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;monitored spoofed 1383646751 QXL decision 0&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The command "fwaccel conns | grep "10.56.61.101" helped confirm that the encryption/decryption is offloaded to SecureXL.&lt;BR /&gt; &lt;EM&gt;10.56.61.101 22 10.92.47.4 36654 6 ...AC......... 2/0 0/2 0 0&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt; 10.56.61.101 22 10.92.47.4 36090 6 ...AC......... 2/0 0/2 0 0&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt; 10.92.47.4 36654 10.56.61.101 22 6 ...AC......... 2/0 0/2 0 0&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt; 10.92.47.4 36090 10.56.61.101 22 6 ...AC......... 2/0 0/2 0 0&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have logged case with TAC&amp;nbsp;and provided all information we could however so far we have not got any clear indication what caused the encryption/decryption error.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One thing we would like to test is to follow the suggestion from Timothy Hall in below discussions to use the commands &lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;"sim vpn off; fwaccel off; fwaccel on" to see if we are still getting errors when the encryption/decryption is handled by INSPECT. However we have never done that and don't understand the possible impact so would like someone to share his experience on this?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.checkpoint.com/thread/6148"&gt;R80.10 gateway, can't set sim_clamp_vpn_mss&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.checkpoint.com/thread/7630"&gt;ICMP is sometimes drop when send via IPSec Tunnel&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And what else could cause this issue? If the issue is gone without SecureXL, shall we just keep it as it is?&amp;nbsp;I believe SecureXL is still good to offload the encryption and decryption traffic so even the workaround works it cannot last long and still we need to find the root cause.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope someone can help out here.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;David&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 27 Feb 2019 23:58:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R80-10-VSX-Performance-Issue-VPN-tunnel-encryption-failed/m-p/36770#M7727</guid>
      <dc:creator>David_Guan</dc:creator>
      <dc:date>2019-02-27T23:58:23Z</dc:date>
    </item>
    <item>
      <title>Re: R80.10 VSX Performance Issue - VPN tunnel encryption failed</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R80-10-VSX-Performance-Issue-VPN-tunnel-encryption-failed/m-p/36771#M7728</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Disabling SecureXL is a useful troubleshooting step, but it should never be "the solution" to a problem. &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When you do packet captures, do you see packets on that same session that are close to or at the MTU limit?&lt;/P&gt;&lt;P&gt;Possibly any related ICMP messages?&lt;/P&gt;&lt;P&gt;And have you tried enabling MSS clamping?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 28 Feb 2019 01:02:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R80-10-VSX-Performance-Issue-VPN-tunnel-encryption-failed/m-p/36771#M7728</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-02-28T01:02:29Z</dc:date>
    </item>
    <item>
      <title>Re: R80.10 VSX Performance Issue - VPN tunnel encryption failed</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R80-10-VSX-Performance-Issue-VPN-tunnel-encryption-failed/m-p/36772#M7729</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Dameon,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for the suggestions.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We managed to capture the packets while enabling the debug on Checkpoint. We did find a lot of encrypted packets on the tcpdump with more than 1500bytes. And from fw monitor capture could find quite a few ICMP Type 3 Code 4 messages (Destination Unreachable, need fragmentation) from the SFTP server to our MFT gateway which was trying to pull bulk of data. The SFTP server kept sending the same ICMP Type 3 Code 4 messages and then MFT gateway&amp;nbsp; reinitiated the TCP session by sending TCP SYN packet so I guess it failed the original session. We still need to capture the packets on both end servers as well to understand what happened but I believe the SecureXL encryption errors should be related to the ICMP Type 3 Code 4 messages.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also I will try to get the current MSS clamping settings on the Checkpoint. I don't believe this has been set before so most probably they are with the default settings. What is the default behaviour? How is Checkpoint R80.10&amp;nbsp;SecureXL&amp;nbsp;dealing with the over-sized MTUs and the ICMP Type 3 Code 4 messages?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="" class="image-1 jive-image" height="557" src="/legacyfs/online/checkpoint/79716_Screen Shot 2019-03-02 at 3.59.58 pm.png" width="559" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="" class="image-2 jive-image j-img-original" src="/legacyfs/online/checkpoint/79717_Screen Shot 2019-03-02 at 4.00.37 pm.png" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="" class="image-3 jive-image j-img-original" src="/legacyfs/online/checkpoint/79730_Screen Shot 2019-03-02 at 4.01.05 pm.png" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 02 Mar 2019 05:06:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R80-10-VSX-Performance-Issue-VPN-tunnel-encryption-failed/m-p/36772#M7729</guid>
      <dc:creator>David_Guan</dc:creator>
      <dc:date>2019-03-02T05:06:11Z</dc:date>
    </item>
    <item>
      <title>Re: R80.10 VSX Performance Issue - VPN tunnel encryption failed</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R80-10-VSX-Performance-Issue-VPN-tunnel-encryption-failed/m-p/36773#M7730</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If the sftp server is sending packets that are at or near MTU, then when you add the IPSec headers, the packets will be above the MTU value.&lt;/P&gt;&lt;P&gt;It gets a little more complicated if that packet has "don't fragment" set in it's headers.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'd start with this SK for some background:&amp;nbsp;&lt;A class="link-titled" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk98074" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk98074"&gt;MTU and Fragmentation Issues in IPsec VPN&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;That will probably lead you to this SK:&amp;nbsp;&lt;A class="link-titled" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk101219" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk101219"&gt;New VPN features in R77.20 and later&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Basically you want to "clamp" MSS on traffic going through the VPN so you don't end up with oversized IPsec traffic.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 02 Mar 2019 14:57:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R80-10-VSX-Performance-Issue-VPN-tunnel-encryption-failed/m-p/36773#M7730</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-03-02T14:57:44Z</dc:date>
    </item>
    <item>
      <title>Re: R80.10 VSX Performance Issue - VPN tunnel encryption failed</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R80-10-VSX-Performance-Issue-VPN-tunnel-encryption-failed/m-p/46846#M9078</link>
      <description>&lt;P&gt;Thanks PhoneBoy!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have read through both articles you recommended and identified that in our environment only fw_clamp_vpn_mss is enabled while sim_clamp_vpn_mss is still disabled. We are scheduling one change to enable sim_clamp_vpn_mss and if it does not work as mentioned in&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/General-Topics/R80-10-gateway-can-t-set-sim-clamp-vpn-mss/td-p/11852" target="_blank"&gt;https://community.checkpoint.com/t5/General-Topics/R80-10-gateway-can-t-set-sim-clamp-vpn-mss/td-p/11852&lt;/A&gt;, we will disable the SecureXL on VPN traffic only so as to force all VPN traffic to go via the INSPECT.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Will keep you posted.&lt;/P&gt;</description>
      <pubDate>Thu, 14 Mar 2019 04:26:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R80-10-VSX-Performance-Issue-VPN-tunnel-encryption-failed/m-p/46846#M9078</guid>
      <dc:creator>David_Guan</dc:creator>
      <dc:date>2019-03-14T04:26:12Z</dc:date>
    </item>
  </channel>
</rss>

