- Products
- Learn
- Local User Groups
- Partners
- More
MVP 2026: Submissions
Are Now Open!
What's New in R82.10?
10 December @ 5pm CET / 11am ET
Announcing Quantum R82.10!
Learn MoreOverlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
Hi Folks,
This is really weird issue I am facing. I was on single firewall which is being managed by separate management server. I am now migrating the setup on cluster. This firewall is on R80.30.
Now I got the one more appliance of same model hence I decided to configure that appliance as a cluster (This is R80.40)and let it be a single member in cluster. So if the activity is successful I could then format existing firewall and directly add it as a secondary in cluster.
Everything went as planned and able to restore all the things correctly except vpn tunnel which was policy based. I can see the tunnel is up both the P1 and P2 are up but I don't see the traffic is being encrypted in smart log. Policy was not matching,
I did all the things I could do but still no luck. The one weird thing I observed that I was able to ping peer IP from new cluster member. Which was not happening from old member and this is a expected behavior.
Finally now I have taken the fw ctl debug and analyzing it,
Any hints are much appreciated.
TIA
Blason R
Maybe try vpn accel off peer_ip?
Andy
Make sure clustering is enabled in cpconfig from the CLI of the new gateway. Failure to have this set (even in a cluster of one) will have all kinds of strange effects if the gateway is configured as a cluster in SmartConsole.
Recheck the VPN domain of the cluster object and of the peer, source IP must fall into the VPN domain of the cluster object AND destination must fall within the defined VPN domain of the peer for encryption to start.
The rule permitting the traffic into the VPN tunnel must match the pre-NAT IP addresses for both source and destination if you are NATting traffic into the tunnel to avoid a RFC1918 conflict. Try setting the VPN column of the rule that is supposed to permit the traffic to "Any" and see if that helps.
Also a common element that can get lost in configuration transfers is failing to set "Disable NAT in VPN Community" if you don't need to NAT traffic into the VPN tunnel.
Other than that we will need to see the Key Install messages for the IKE negotiation to diagnose further, specifically the Proxy-IDs/subnets that are negotiated.
Great point @Timothy_Hall about clustering. I had customer once only set one member in cluster object in smart console (they were waiting for other one to be configured the next day) and guy forgot to set clustering to enabled from cpconfig. Honestly, I never logically thought either before then that it was needed in such situations, but definitely is.
Live and learn : - )
Andy
Well if that is the case then when I run cphaprob stat it shows as a Active member; that indicates HA module has started. Since we had to revert to old appliance I do not have the new cluster handy to run those commands and see.
Any way I am investigating kernel debugs and see.
K, fair enough. Im not really sure what TAC uses to analyze those large kernel debug files, but I know in the past, they had something internal (that was not available to customers...at least thats what TAC esc. guy from DTAC told me once)
Andy
Hmm - well I am just using vim tricks to search for the destination IP address and then relevant errors.
You can do that too...not sure how effective it is on really large files, but I used it before.
If files can be sent securely, I would be happy to have a look as well myself, as long as you can provide all the relevant info.
Cheers,
Andy
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 16 | |
| 13 | |
| 8 | |
| 7 | |
| 6 | |
| 4 | |
| 4 | |
| 3 | |
| 3 | |
| 2 |
Fri 12 Dec 2025 @ 10:00 AM (CET)
Check Mates Live Netherlands: #41 AI & Multi Context ProtocolTue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Fri 12 Dec 2025 @ 10:00 AM (CET)
Check Mates Live Netherlands: #41 AI & Multi Context ProtocolTue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!About CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY