<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: VPN disconnections in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/VPN-disconnections/m-p/47729#M9300</link>
    <description>&lt;P&gt;Stop all interesting traffic on both sides, then clear the tunnels on both ends with &lt;STRONG&gt;vpn tu&lt;/STRONG&gt; and &lt;STRONG&gt;clear crypto isakmp sa&lt;/STRONG&gt; and &lt;STRONG&gt;clear crypto ipsec sa.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Now try initiating interesting traffic from the Check Point side only, do all needed tunnels come up and work?&lt;/P&gt;
&lt;P&gt;Again stop all interesting traffic on both sides, then clear the tunnels on both ends with &lt;STRONG&gt;vpn tu&lt;/STRONG&gt; and &lt;STRONG&gt;clear crypto isakmp sa &lt;/STRONG&gt;and &lt;STRONG&gt;clear crypto ipsec sa.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Now try initiating interesting traffic from the Cisco side only, do all needed tunnels come up and work?&amp;nbsp; My guess is one or the other of these tests will fail which indicates a Phase 2 subnet/Proxy-ID negotiation mismatch.&amp;nbsp; You need to ensure that either end can successfully initiate all needed tunnels to the other end.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 19 Mar 2019 13:51:23 GMT</pubDate>
    <dc:creator>Timothy_Hall</dc:creator>
    <dc:date>2019-03-19T13:51:23Z</dc:date>
    <item>
      <title>VPN disconnections</title>
      <link>https://community.checkpoint.com/t5/General-Topics/VPN-disconnections/m-p/47624#M9289</link>
      <description>&lt;P&gt;&lt;SPAN&gt;We are having vpn disconnections in our platform. At the beginning of this issue, we had vpn disconnections every hour. VPN Phase 2 fell and the other end (CISCO) did not notice, not renegotiating phase 2. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;We have changed the timers for both end-devices VPN to 8 hours and now the issue occurs every 8 hours. When the error happens, the messages are: "Unknown SPIs appear".&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Why these errors are being showed? ANy idea about solve it?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Gaia R80.10&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 19 Mar 2019 10:32:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/VPN-disconnections/m-p/47624#M9289</guid>
      <dc:creator>Jesus_Cano</dc:creator>
      <dc:date>2019-03-19T10:32:43Z</dc:date>
    </item>
    <item>
      <title>Re: VPN disconnections</title>
      <link>https://community.checkpoint.com/t5/General-Topics/VPN-disconnections/m-p/47628#M9290</link>
      <description>double check | in detail | the whole Crypto Suite params and it's compatibility, some ASA's for example on an old IOS does not accept or even play with AES128 or higher. Sometimes you need to follow best practice from both vendors though.&lt;BR /&gt;I'd say that IKE "match" or rather mismatch is the cause most likely and based on my experience I can only tell you one thing then:&lt;BR /&gt;- analyze SPI messages&lt;BR /&gt;- see logs for details&lt;BR /&gt;- debug vpn on both platforms&lt;BR /&gt;- check the matching Proxy-ID's / IKE ID's &lt;BR /&gt;- check encryption domain params and the PFS if on both or not etc.&lt;BR /&gt;&lt;BR /&gt;proper t-shooting and you'll be good to go &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;</description>
      <pubDate>Tue, 19 Mar 2019 10:39:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/VPN-disconnections/m-p/47628#M9290</guid>
      <dc:creator>Jerry</dc:creator>
      <dc:date>2019-03-19T10:39:17Z</dc:date>
    </item>
    <item>
      <title>Re: VPN disconnections</title>
      <link>https://community.checkpoint.com/t5/General-Topics/VPN-disconnections/m-p/47696#M9291</link>
      <description>&lt;P&gt;If you use IKEv2, check with the peer if they're using a set of different encryption parameter for the VPN tunnel.&lt;/P&gt;&lt;P&gt;I noticed that Check Point gateways have an issue with more than 3 different proposals and will drop the tunnel after phase 2 re-negotiation.&lt;/P&gt;&lt;P&gt;A solution would be to either remove the not needed parameter on the ASA or set the tunnel parameter on the Check Point to the first matching ASA set.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Markus&lt;/P&gt;</description>
      <pubDate>Tue, 19 Mar 2019 11:53:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/VPN-disconnections/m-p/47696#M9291</guid>
      <dc:creator>Markus_Genser</dc:creator>
      <dc:date>2019-03-19T11:53:47Z</dc:date>
    </item>
    <item>
      <title>Re: VPN disconnections</title>
      <link>https://community.checkpoint.com/t5/General-Topics/VPN-disconnections/m-p/47729#M9300</link>
      <description>&lt;P&gt;Stop all interesting traffic on both sides, then clear the tunnels on both ends with &lt;STRONG&gt;vpn tu&lt;/STRONG&gt; and &lt;STRONG&gt;clear crypto isakmp sa&lt;/STRONG&gt; and &lt;STRONG&gt;clear crypto ipsec sa.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Now try initiating interesting traffic from the Check Point side only, do all needed tunnels come up and work?&lt;/P&gt;
&lt;P&gt;Again stop all interesting traffic on both sides, then clear the tunnels on both ends with &lt;STRONG&gt;vpn tu&lt;/STRONG&gt; and &lt;STRONG&gt;clear crypto isakmp sa &lt;/STRONG&gt;and &lt;STRONG&gt;clear crypto ipsec sa.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Now try initiating interesting traffic from the Cisco side only, do all needed tunnels come up and work?&amp;nbsp; My guess is one or the other of these tests will fail which indicates a Phase 2 subnet/Proxy-ID negotiation mismatch.&amp;nbsp; You need to ensure that either end can successfully initiate all needed tunnels to the other end.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 19 Mar 2019 13:51:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/VPN-disconnections/m-p/47729#M9300</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2019-03-19T13:51:23Z</dc:date>
    </item>
  </channel>
</rss>

