- Products
- Learn
- Local User Groups
- Partners
- More
Quantum Spark Management Unleashed!
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
SharePoint CVEs and More!
I have a R80.40 lab with three Check Point gateways. One distributed environment (managed by separate management server) and the other two are standalone (gateway and management on same device).
I have site to site VPNs configured as follows: -
1. from Main GW to Remote GW1
2. from Main GW to Remote GW2
VPNs show in SmartView monitor as Up - Phase I but when I look at vpn tu on the cli I see phase II tunnels formed: -
SAs of all instances:
Peer 192.168.101.11 , RemoteGW1 SAs:
IKE SA <b026ba653a85f493,13cd8ad810ce962a>
INBOUND:
1. 0x97698d60 (i: 0)
OUTBOUND:
1. 0x5c3cf41e (i: 0)
Peer 192.168.101.12 , RemoteGW2 SAs:
IKE SA <c33a8776de4d53f1,62554189591c0af1>
INBOUND:
1. 0xa306b733 (i: 1)
OUTBOUND:
1. 0x53ff98e0 (i: 1)
the IKE.elg also shows three messages in quick mode.
I have also cleared the tunnel down and brought it up by initiating traffic firstly from local network (issuing a ping from PC1 to remote PC 2) and then secondly from remote network (issuing ping from remote PC2 to local PC1).
Has anyone seen this before?
Hi @scottikon
This issue always occurs if both gateways are in the same external network with the external interface.
Add a router instance beetween VPN gateways in your LAB:
internal network A <> Gateway A <> Router <> Gateway B <> internal network B)
<---VPN--->
Unfortunately I put a virtual SRX in packet mode (router) in between the Check Point external interfaces and the VPN is still showing as Phase I. Even though tunnel utility shows full VPN established and the logs show encrypt/decrypt and quick mode key installs.
I too observed this in our production environment with R80.40. I am installing latest Hotfix to see if it resolves the issue.
Hello Mates,
Does anybody have any update regarding this symptom? I can observe this behaviour after upgrading from R80.20 to R80.40 JHA48.
All of the S2S tunnels operate noramlly, but in SmartView Monitor all of them show State UP - Phase 1
Additionally it is production environment, not lab.
Thanks for all,
Gabor
Same here. But I don't mind as long as VPN actually works.
The problem with this cosmetical issue is, that it hides the actual and real status of the VPN tunnels.
The issue is being investigated by the R&D.
SmartView Monitor is a separate and legacy dashboard. Does anybody know if it will be integrated into the inified console?
Best regards,
Gabor
We have the same problem with our R80.40 Clusters (JHF 67 and 77) and we opened a case and hopefully Check Point will fix this soon. For us this is not just a cosmetical issue as we rely on that VPN status for monitoring. It's not only the status in the SmartView but also directly via SNMP so we currently don't get any notification if a VPN goes down etc.
Of course I can check the status manually (if something seems broken) but that's not the point. I wonder how other people monitor the status of their VPNs...
Hello to Everybody,
The SR was closed - Check Point R&D provided a custom hotfix regarding this issue. Thanks for their development.
We haven't tried the custom hotfix as it is not a good practice imo. We are waiting for the custom hotfix will be integrated to a JHA GA.
Thank you for letting us know. I agree, since this is cosmetic, better to wait for it to be included in the next JHF,
We received the hotfix and I tried in a lab environment and it indeed solved the cosmetic issue
Is the custom hotfix (?number?) available ?
fw1_wrapper_HOTFIX_R80_40_JHF_T48_605_MAIN_GA_FULL.tgz - so it is suitable to this exact software version & JHA combination imo.
Is there on that would apply to R80.40 Clusters with JHA T77 ?
I don't know, so I can't recommend it to use. The best way is to open a TAC SR for this purpose or wait for an upcoming JHA GA, which contains this fix.
Hi ,
We have the same issue on two clients R80.40 JHF T78.
One was a new install - conversion from ASA - waisted hours thinking the vpns were not coming up !!!! 😞
Opened TAC case.
Hi Darren,
It is good to know that the fix wasn't integrated into the latest JHA GA - thank you for sharing this information.
Best regards,
BoGa
it's said that take 99 is going to include the fix
That would be great, thank you for the information 🙂
Hi @Florin_Dumitru , @BoGa
A fix for this issue will be part of the next JHF ongoing take – the take number is not final yet (99 is not the correct take #).
Hi ,
Just wanted to post an update here - that I experienced this issue at two other clients.
1 x was an upgrade from R80.30 to R80.40 JHFT78 another was a fresh install on R80.40 JHF69 - then upgrade to JHF78.
It seems there is an actual issue with the OID - since external monitoring systems were also getting phase 1 up from the snmp queries against the tunnel status.
I was given a portfix by TAC and this fixed the issue.
So there is a custom fix available hope it goes main train soon.
(This is not just a simple "cosmetic issue" for some clients - their NOC's monitor these vpns since they are business critical - an incorrect output from SNMP disables their ability to accurate track the VPN's functionality and ensure they are meeting their SLA's)
Regards
I have seen similar issues in R80.20, R80.30 and R80.40.
Started to monitor VPN connectivity via SNMP following the sk63663
The SNMP Response should return an integer, whose value has the following meanings:
Right now I think it is due to timing issues with IKE and IPSEC rekeys.
Recommended settings are
IKE Rekey: 1440 (24 hours)
IPSEC rekey: 3600 seconds (1 hour)
so right now I am adjusting all my 3rd party site2site connection to comply to this recommendation and I keep monitoring the tunnel state and then monitoring the ping between a remote IP in the encryption domain.
As an emergency if I cannot get a vpn back online either because if the the following conditions.
While running vpn tu tlist -p <remote peer> it says there is an IPSEC SA but I still cannot ping remote ip inside the encryption domain
Next I would check vpn tu using the CLI vpn tunnel client and check for IKE or IPSEC vpn tunnel has an active tunnel.
Next I would do a tcpdump -penni any host <remote peer> to check if any traffic flows between the public ip and remote peer public ip.
I would as last try clear vpn connection tables. Please note! it will drop all vpn tunnels both s2s and vpn clients.
If one clears the vpn connection table one also need to clear the vpn tunnels afterwards.
@scottikon Your issue is confirmed and there is a tailored hotfix available to remove it, see sk169121.
Thanks for the update.
Hi Robert,
I don't see it fixes my issue.
The link to support center relates to SmarView are not viewing the vpn tunnel status correct.
I am using CLI with command "vpn tu" and there is it not active but it stills keeps the tunnel up and cannot be cleared.
@Kim_Moberg do you have a TAC case for that?
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
User | Count |
---|---|
9 | |
7 | |
6 | |
6 | |
5 | |
5 | |
5 | |
5 | |
5 | |
5 |
Fri 12 Sep 2025 @ 10:00 AM (CEST)
CheckMates Live Netherlands - Sessie 38: Harmony Email & CollaborationTue 16 Sep 2025 @ 02:00 PM (EDT)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - AmericasWed 17 Sep 2025 @ 04:00 PM (AEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - APACWed 17 Sep 2025 @ 03:00 PM (CEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - EMEAThu 18 Sep 2025 @ 03:00 PM (CEST)
Bridge the Unmanaged Device Gap with Enterprise Browser - EMEAFri 12 Sep 2025 @ 10:00 AM (CEST)
CheckMates Live Netherlands - Sessie 38: Harmony Email & CollaborationTue 16 Sep 2025 @ 02:00 PM (EDT)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - AmericasWed 17 Sep 2025 @ 04:00 PM (AEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - APACWed 17 Sep 2025 @ 03:00 PM (CEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - EMEAThu 18 Sep 2025 @ 03:00 PM (CEST)
Bridge the Unmanaged Device Gap with Enterprise Browser - EMEAThu 18 Sep 2025 @ 02:00 PM (EDT)
Bridge the Unmanaged Device Gap with Enterprise Browser - AmericasAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY