Create a Post
cancel
Showing results for 
Search instead for 
Did you mean: 
NorthernNetGuy
Advisor

VPN - Only one way traffic

I have an issue with one my my VPN tunnels only allowing one way traffic. its a B2B tunnel for an APN. My APN connected devices are able to communicate to on site resources over the tunnel, but my on site devices can't communicate with the devices on their encryption domain. (r81.20, 3.10)

Checking the logs I found the following : 

"dropped by fw_ipsec_encrypt_on_tunnel_instance Reason: No error - tunnel is not yet established;"

This VPN is configured as a Star community, the Encryption settings are all correct and match. It is configured as "One VPN tunnel per Gateway Pair",  with VPN routing of "To center or throug hthe center to other satellites..." , and "disable nat inside the vpn community"

We have a few tunnels that probably have poor configurations. Multiple have our encryption domain as 10.0.0.0/8.

My other tunnel are functioning fine. I expect we have a configuration issue that I'm not seeing.

 

Help is appeciated. Thank you

 

0 Kudos
5 Replies
Lesley
Leader Leader
Leader

Tunnel is Check Point to Check Point?

10/8 is quite big, maybe there is an overlap? 

-------
If you like this post please give a thumbs up(kudo)! 🙂
0 Kudos
NorthernNetGuy
Advisor

Tunnel is Checkpoint to unknown from a different business, they wouldn't provide their platform.

10/8 is  huge, but the destination is 172.16.160.0/20, so no overlap within the tunnel.

0 Kudos
Timothy_Hall
Legend Legend
Legend

One tunnel per gateway pair will cause your Check Point as the initiator to negotiate a universal tunnel (0.0.0.0/0,0.0.0.0/0) in IKE Phase 2, which the other side will not usually accept (unless they are configured for route-based VPN which does not appear to be the case).  However when the other side initiates the tunnel they will negotiate specific subnets that are a subset of a universal tunnel, which your Check Point will accept.

Set it to pair of subnets, then on the community members screen override the VPN domains for the two members and make sure they PRECISELY match the peer's config.  Check Point and Cisco will generally accept proposed subsets of their VPN domains, whereas most other vendors will not and silently drop the Phase 2 proposal, leading to the "tunnel is not yet established" error.

After doing this if the problem still exists and you are set for IKEv2, try IKEv1 which tends to be a bit more interoperable. 

 

Gateway Performance Optimization R81.20 Course
now available at maxpowerfirewalls.com
0 Kudos
NorthernNetGuy
Advisor

Hi Tim,

Thank you for the explanation. Does the gateway pair setting  force IKEv2 even if I have the 'IKEv1 for IPV4 and v2 for ipv6' encryption method? (we dont use 6).

Also does the gateway pair setting, forcing a 0.0.0.0/0 domain, overwrite any VPN domain entered in the gateways section?

I'll validate what the other site has as our encryption domain, and book a window to perform and test this change.  I believe they are using Cisco, but I'll wait for their confirmation.

 

0 Kudos
PhoneBoy
Admin
Admin

The "one tunnel per gateway pair" does not change the actual encryption domain, only what is negotiated with the VPN peer.

0 Kudos

Leaderboard

Epsum factorial non deposit quid pro quo hic escorol.

Upcoming Events

    CheckMates Events