- Products
- Learn
- Local User Groups
- Partners
- More
Introduction to Lakera:
Securing the AI Frontier!
Quantum Spark Management Unleashed!
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
SharePoint CVEs and More!
Our security gateway sometimes drops packets from IPSec tunnel. The workaround is usually to reinstall policy and the issue will be fixed for a few days.
By using the "fw ctl zdebug drop" to capture the drop message, it says "failed to resolve SA (VPN Error code 01)".
But in the kernel debug, it looks like it cannot find the connection in the connections table.
Has anyone encounter similar issue and has a solution? Thanks in advance!
;20Jun2019 3:30:27.466084;[cpu_1];[fw4_2];fwconn_lookup: not found in connections table;
;20Jun2019 3:30:27.466088;[cpu_1];[fw4_2];forward_if_not_mine: forwarded to another instance (rc=0);
....
;20Jun2019 3:30:27.466102;[cpu_1];[fw4_2];fwconn_key_lookup_ex: conn
10.13.1.29:0 IPP 10,0,0,0,0,UUID: 00000000-0000-0000-00-0-0-0-0-0-0-0, 0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0>
not found in connections table;
.....
;20Jun2019 3:30:27.466268;[cpu_1];[fw4_2];fwconn_key_lookup_ex: conn
172.28.0.126:15 IPP 10,0,0,0,0,UUID: 00000000-0000-0000-00-0-0-0-0-0-0-0, 0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0>
not found in connections table;
;20Jun2019 3:30:27.466282;[cpu_1];[fw4_2];
vpnk_conn_log: in the kernel - calling fwchainlog_delayed_rulebase_log with alert -1 ;
;20Jun2019 3:30:27.466284;[cpu_1];[fw4_2];
action = 0
schemename = IKE
user =
methods = ESP: AES-256 + SHA384 + PFS (group 2)
fail_reason = Encryption/Decryption failure, failed to resolve SA (VPN Error code 01)
xpo_loghandle = 0
community_loghandle = 0
Did you ever get a solution to this? We have the exact same problem on R80.20
Followed sk122532 which did not solve.
Assuming you have at least Jumbo HFA 47 installed, try disabling SecureXL acceleration for VPN with the vpn accel off command. Note that doing so will cause a disruption of all current VPN tunnels, read sk151114: "fwaccel off" does not affect disabling acceleration of VPN tunnels in R80.20 and above thoroughly before doing anything.
Thanks, yes we are JHF 47.
I will give this a try, unfortunately it is a bit difficult to test if it was successful, we have the issue happen only once every 2 weeks or so. I like doing it on the basis of per peer, as only 2 route based vpn's are affected where-as my dozen policy based vpn's have never had a hitch in years.
Hello Ryan,
Did someone provided any update, as we are receiving the exact same issue on are checkpoint G/Ws running on R80.10 Take 272.
vpn_drop_and_log Reason: Encryption/Decryption failure, failed to resolve SA (VPN Error code 01);
vpn_encrypt_chain Reason: Could not change connection vpn interface.;
And we have static route-based VPN tunnels integrated with AWS.
Regards
Mrigen
Hi Timothy,
Unfortunately turning VPN accel off has not solved the issue. I performed that change for two peer IP's last week but we had another re-occurrence of the issue after that,
TAC has not been able to assist, just told me to try my luck with the latest Jumbo. (I will patch the gateways so they continue to investigate).
I have a debug taken from when the issue occurred if you are interested to take a look?
One new message I hadn't noticed before was this:
dropped by vpn_encrypt_chain Reason: Could not change connection vpn interface.;
that is showing for every session
Is this a route-based VPN using VTI's? If so check this out:
Hello, yes its route based with VTI's (static routing only though)
Interestingly, i did have to delete and re-create the interfaces for a separate reason (and did the JHF 91) and have not had a reoccurance of the issue.. so far 🙂
Should give an update, issue still reoccurs once a week roughly. Previously it was every day.
The only notable thing with this vpn is, remote side gets switched off every night to save money on azure. The live ones that don't get switched off have never once had this issue.
@Albert_Chang did you ever get a fix for this?
OK so if turning off SecureXL had no effect it is not an issue with IPSec, but IKE. Interoperable VPNs have had a longstanding problem with not handling "Delete SA" notifications correctly when one side of the tunnel goes down prior to the SA Lifetime expiration. See if you have any interesting error messages getting logged to $FWDIR/log/vpnd.elg around the time of the issue.
Looks like Azure supports DPD in a route-based configuration, enabling that would be the best way to deal with this issue. See sk108600: VPN Site-to-Site with 3rd party, scenario 5, be sure to enable DPD on the Azure end too. Alternatively you could try to significantly shorten up your IKE Phase 1 and Phase 2 SA Lifetimes on both ends so it detects the problem quicker and recovers from it.
Thanks for reply, that is not a bad idea, I had tried the other method and made the lifetimes the longest supported values which seemed to make it a bit better but still had occurrences weekly.
I've turned it down to 10 minute p1 and 5 min p2. Will see if that helps. If not ill take a look into DPD.
cheers
Unfortunately, 5 minute lifetime has not solved the issue. tunnel still went down and doesn't come back up until a policy push is completed.
Ill look into DPD.
Hi Ryan,
We had DPD enabled but that did not fix the issue. We are still working with Checkpoint support for investigating the issue.
Bummer, sounds like you may be in bug territory now.
I had the same error (encryption/decryption failure, failed to resolve sa (vpn error code 01))... and it does seem to be related to a Checkpoint bug.
I can get the VPN tunnel up and running again by just publishing any change associated with the gateway and installing the policy. In my case I change the vpn interface description.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
User | Count |
---|---|
12 | |
12 | |
9 | |
7 | |
7 | |
6 | |
6 | |
5 | |
5 | |
5 |
Tue 07 Oct 2025 @ 10:00 AM (CEST)
Cloud Architect Series: AI-Powered API Security with CloudGuard WAFThu 09 Oct 2025 @ 10:00 AM (CEST)
CheckMates Live BeLux: Discover How to Stop Data Leaks in GenAI Tools: Live Demo You Can’t Miss!Thu 09 Oct 2025 @ 10:00 AM (CEST)
CheckMates Live BeLux: Discover How to Stop Data Leaks in GenAI Tools: Live Demo You Can’t Miss!Wed 22 Oct 2025 @ 11:00 AM (EDT)
Firewall Uptime, Reimagined: How AIOps Simplifies Operations and Prevents OutagesAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY