<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SMB 1550 (R81.10.17) VPN S2S Instability with Azure HA Cluster in Spark Firewall (SMB)</title>
    <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SMB-1550-R81-10-17-VPN-S2S-Instability-with-Azure-HA-Cluster/m-p/263333#M13454</link>
    <description>&lt;P&gt;Sounds like&amp;nbsp;there are other issues involved above and beyond what&amp;nbsp;SMBGWY-12630 fixed.&lt;/P&gt;</description>
    <pubDate>Thu, 20 Nov 2025 15:53:30 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2025-11-20T15:53:30Z</dc:date>
    <item>
      <title>SMB 1550 (R81.10.17) VPN S2S Instability with Azure HA Cluster</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SMB-1550-R81-10-17-VPN-S2S-Instability-with-Azure-HA-Cluster/m-p/263231#M13453</link>
      <description>&lt;P&gt;Hi everyone,&lt;/P&gt;&lt;P&gt;I’d like to share a case we’ve been troubleshooting for about a month now to see if anyone has run into something similar or has ideas on what might be going on.&lt;/P&gt;&lt;P&gt;We have an &lt;STRONG&gt;SMB 1550&lt;/STRONG&gt; running &lt;STRONG&gt;R81.10.17 (build 996004721)&lt;/STRONG&gt; establishing a Site-to-Site VPN to an &lt;STRONG&gt;HA Cluster hosted in Azure&lt;/STRONG&gt;. The remote site has been reporting &lt;STRONG&gt;intermittent VPN failures&lt;/STRONG&gt;, and the only way to restore connectivity is to &lt;STRONG&gt;reboot the SMB appliance&lt;/STRONG&gt;. Initially, the issue occurred every &lt;STRONG&gt;3–4 days&lt;/STRONG&gt;; after updating to the current build (due to the resolved issue &lt;STRONG&gt;SMBGWY-12630&lt;/STRONG&gt;, which is related to VPN stability), the frequency changed to &lt;STRONG&gt;about once per week&lt;/STRONG&gt;.&lt;/P&gt;&lt;HR /&gt;&lt;H2&gt;&lt;STRONG&gt;Observed Behavior During the Incident&lt;/STRONG&gt;&lt;/H2&gt;&lt;P&gt;On the &lt;STRONG&gt;Azure Cluster&lt;/STRONG&gt; side:&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;&lt;P&gt;We notice the problem because the SMB stops receiving traffic that normally comes through the VPN.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Running vpn tu tlist -p &amp;lt;SMB DAIP&amp;gt; shows that &lt;STRONG&gt;every 1–5 minutes the cluster attempts to establish a new tunnel&lt;/STRONG&gt; toward the SMB. Tunnel info changes as if a fresh negotiation occurred.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;A full vpn tu shows a long list of SAs that appear healthy.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Comparing both outputs, we confirmed that &lt;STRONG&gt;each new entry seen in vpn tu tlist corresponds to a newly created SA&lt;/STRONG&gt;.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Packet capture (tcpdump) reveals:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;From the &lt;STRONG&gt;cluster’s private VIP to the SMB’s public IP&lt;/STRONG&gt;, we &lt;EM&gt;do&lt;/EM&gt; see encrypted ESP traffic.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;From the &lt;STRONG&gt;SMB public IP to the cluster’s private VIP&lt;/STRONG&gt;, instead of ESP we see &lt;STRONG&gt;what look like renegotiation attempts (IKE/NAT-T)&lt;/STRONG&gt;.&lt;BR /&gt;This is a piece of the capture:&lt;BR /&gt;20:37:02.532607 IP [VIP private cluster].4500 &amp;gt; [Public IP SMB].4500: UDP-encap: ESP(spi=0x0ab11aaf,seq=0x37), length 100&lt;BR /&gt;20:37:02.532614 IP [VIP private cluster].4500 &amp;gt; [Public IP SMB].4500: UDP-encap: ESP(spi=0x0ab11aaf,seq=0x37), length 100&lt;BR /&gt;20:37:03.680310 IP [VIP private cluster].4500 &amp;gt; [Public IP SMB].4500: UDP-encap: ESP(spi=0x0ab11aaf,seq=0x38), length 132&lt;BR /&gt;20:37:03.680314 IP [VIP private cluster].4500 &amp;gt; [Public IP SMB].4500: UDP-encap: ESP(spi=0x0ab11aaf,seq=0x38), length 132&lt;BR /&gt;20:37:04.727356 IP [Public IP SMB].500 &amp;gt; [VIP private cluster].500: isakmp: parent_sa ikev2_init[I]&lt;BR /&gt;20:37:04.727356 IP [Public IP SMB].500 &amp;gt; [VIP private cluster].500: isakmp: parent_sa ikev2_init[I]&lt;BR /&gt;20:37:04.734975 IP [VIP private cluster].500 &amp;gt; [Public IP SMB].500: isakmp: parent_sa ikev2_init[R]&lt;BR /&gt;20:37:04.734978 IP [VIP private cluster].500 &amp;gt; [Public IP SMB].500: isakmp: parent_sa ikev2_init[R]&lt;BR /&gt;20:37:04.803387 IP [Public IP SMB].4500 &amp;gt; [VIP private cluster].4500: NONESP-encap: isakmp: child_sa ikev2_auth[I]&lt;BR /&gt;20:37:04.803387 IP [Public IP SMB].4500 &amp;gt; [VIP private cluster].4500: NONESP-encap: isakmp: child_sa ikev2_auth[I]&lt;BR /&gt;20:37:04.812500 IP [VIP private cluster].4500 &amp;gt; [Public IP SMB].4500: NONESP-encap: isakmp: child_sa ikev2_auth[R]&lt;BR /&gt;20:37:04.812505 IP [VIP private cluster].4500 &amp;gt; [Public IP SMB].4500: NONESP-encap: isakmp: child_sa ikev2_auth[R]&lt;BR /&gt;20:37:04.997259 IP [VIP private cluster].4500 &amp;gt; [Public IP SMB].4500: UDP-encap: ESP(spi=0x0ab11aaf,seq=0x39), length 132&lt;BR /&gt;20:37:04.997263 IP [VIP private cluster].4500 &amp;gt; [Public IP SMB].4500: UDP-encap: ESP(spi=0x0ab11aaf,seq=0x39), length 132&lt;BR /&gt;20:37:05.016337 IP [VIP private cluster].4500 &amp;gt; [Public IP SMB].4500: UDP-encap: ESP(spi=0x244c5ab3,seq=0x1), length 100&lt;BR /&gt;20:37:05.016340 IP [VIP private cluster].4500 &amp;gt; [Public IP SMB].4500: UDP-encap: ESP(spi=0x244c5ab3,seq=0x1), length 100&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;Once the client reboots the SMB → everything works again until the next occurrence.&lt;/P&gt;&lt;HR /&gt;&lt;H2&gt;&lt;STRONG&gt;TAC Interaction So Far&lt;/STRONG&gt;&lt;/H2&gt;&lt;P&gt;TAC requested two rounds of VPN debugs:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;The first attempt didn’t capture any information on the Azure cluster side.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;The second attempt failed because the debugs weren’t started simultaneously on both ends.&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;We’re now waiting for the next incident so we can run both debugs in sync and also collect a &lt;STRONG&gt;traffic capture on the Azure side&lt;/STRONG&gt; to confirm whether the cluster’s public IP is receiving packets from the SMB's public IP at the time of failure.&lt;/P&gt;&lt;P&gt;We’re still checking whether it's possible to run this validation directly from any Azure resource based on the architecture.&lt;/P&gt;&lt;HR /&gt;&lt;H2&gt;&lt;STRONG&gt;Additional Context&lt;/STRONG&gt;&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;This issue started &lt;EM&gt;before&lt;/EM&gt; upgrading the SMB.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;The upgrade was applied because &lt;STRONG&gt;SMBGWY-12630&lt;/STRONG&gt; sounded highly relevant to VPN stability.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;After upgrading, the &lt;STRONG&gt;frequency changed&lt;/STRONG&gt;, which suggests the behavior is at least partially software-related.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;The Azure cluster keeps sending encrypted traffic outward, but the SMB seems to fall into a renegotiation loop.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Any hints or shared experiences are appreciated — this has all the signs of one of those “it only fixes itself when you reboot it” demons.&lt;/P&gt;&lt;P&gt;Thanks in advance.&lt;/P&gt;</description>
      <pubDate>Wed, 19 Nov 2025 16:56:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SMB-1550-R81-10-17-VPN-S2S-Instability-with-Azure-HA-Cluster/m-p/263231#M13453</guid>
      <dc:creator>jennyado</dc:creator>
      <dc:date>2025-11-19T16:56:12Z</dc:date>
    </item>
    <item>
      <title>Re: SMB 1550 (R81.10.17) VPN S2S Instability with Azure HA Cluster</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SMB-1550-R81-10-17-VPN-S2S-Instability-with-Azure-HA-Cluster/m-p/263333#M13454</link>
      <description>&lt;P&gt;Sounds like&amp;nbsp;there are other issues involved above and beyond what&amp;nbsp;SMBGWY-12630 fixed.&lt;/P&gt;</description>
      <pubDate>Thu, 20 Nov 2025 15:53:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SMB-1550-R81-10-17-VPN-S2S-Instability-with-Azure-HA-Cluster/m-p/263333#M13454</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2025-11-20T15:53:30Z</dc:date>
    </item>
  </channel>
</rss>

