- Products
- Learn
- Local User Groups
- Partners
- More
Policy Insights and Policy Auditor in Action
19 November @ 5pm CET / 11am ET
Access Control and Threat Prevention Best Practices
Watch HereOverlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
always see multiple SAs on IPsec tunnel ( VPN tu output) , is that normal. ( site 2 site VPN )
I configured one vpn tunnel per pair of hosts
Yes that is normal, especially when you configure "pair of hosts" as there will be a new Phase 2/IPSec tunnel created for every possible combination of hosts communicating through the VPN. Here is the overall process and how the various VPN Tunnel Sharing settings fit into it:
The size of the object (i.e. host or network w/ mask) used in the Firewall/Network policy layer permitting the VPN traffic does not matter as far as what is proposed by the Check Point in Phase 2, it just needs an Accept action for anything to happen at all.
One accepted, the Check Point looks at the destination IP address and which VPN peer's VPN domain it falls into.
Once the VPN peer is selected, next it determines what VPN Community that peer is a member of so it knows what VPN settings to use for the proposal.
Once IKE Phase 1 is complete, to determine what to propose in Phase 2 as far as subnets, the firewall first looks at the "VPN Tunnel Sharing" settings on the VPN peer object. By default this set to "use the community settings" which means it will follow the "VPN Tunnel Sharing" settings on the VPN Community object itself. The VPN Tunnel Sharing setting defined on the VPN peer object will take precedence if it is not set to "use the community settings".
Regardless of where VPN Tunnel Sharing is set, here is what the settings mean:
The proposal of subnets can be controlled much more precisely through use of the subnet_for_range_and_peer directive, see scenario 1 of sk108600: VPN Site-to-Site with 3rd party for how to set this up. This directive will almost certainly need to be employed when setting up interoperable VPNs with Juniper, Fortinet, & Sonicwall as these vendors are quite picky about what subnets/Proxy-IDs they will accept in a Phase 2 proposal.
Also note that the ability to define a separate VPN domain per individual VPN Community is on the roadmap and will hopefully become available at some point. Edit: The ability to override VPN domains per-VPN Community was added in R80.40.
--
Second Edition of my "Max Power" Firewall Book
Now Available at http://www.maxpowerfirewalls.com
when I use one tunnel per pair of hosts, the tunnel works initially, after a point of time, the connectivity from specific source is rejected by the remote peer as it sees as wrong SPI.the same time the remote peer accepts the packets from other source server( which is in the same subnet) as it is coming from new tunnel. why it is so?
What you are describing is probably an SA lifetime mismatch between your firewall and the VPN peer, or your VPN peer is unexpectedly expiring the tunnel early due to a data lifesize or VPN idle timer. Make sure the SA lifetime timer is set the same on both sides for IKE Phase 1 but especially IPSec/IKE Phase 2. Note that Check Point expresses the Phase 1 timer in minutes and Phase 2 timer in seconds, whereas most other vendors express both values in seconds. Also make sure the peer has disabled any VPN idle timers, and has also disabled the data lifesize or set it to an unreachably high value.
--
Second Edition of my "Max Power" Firewall Book
Now Available at http://www.maxpowerfirewalls.com
what is that VPN idle timers and data life size?
peer log says SA xxxxxx not found
SA Lifetimes are set here on Check Point:

Data lifesizes are not set in the SmartDashboard/SmartConsole, see Scenario 6 of this SK:
sk108600: VPN Site-to-Site with 3rd party
--
Second Edition of my "Max Power" Firewall Book
Now Available at http://www.maxpowerfirewalls.com
I set the tunnel as one tunnel per subnet, still I see the multiple SAs on both phase 1 and phase2.
P eer .x.x.x , xxxxx SAs:
IKE SA <xxxx,yyyyyyy>
IKE SA <********,************>
IKE SA <********,************>
Peer 172.22.128.103 , DB-TEST-REB23-VPN SAs:
IKE SA <********,************>
INBOUND:
OUTBOUND:
IKE SA <********,************>
INBOUND:
1.********,************(i: 0)
OUTBOUND:
1. ********,************ (i: 0)
IKE SA <********,************>
INBOUND:
OUTBOUND:
The tunnel works only for few hours. then it is down. what could be the reason
It is normal to have multiple SAs. Please read my prior postings in this thread telling you what to check.
--
Second Edition of my "Max Power" Firewall Book
Now Available at http://www.maxpowerfirewalls.com
It is NOT normal to have multiple IKE "Phase 1" SA's. You should only have one Phase 1 SA per VPN End Point. It IS normal to have multiple IPSEC "Phase 2" SA's - usually one per Subnet pair (or according to the 3 options mentioned above as per Hosts/Subnets/Gateway).
If you have more than 1 Phase 1 SA then something is usually wrong.
It is NOT normal to have more than 1 IKE "Phase 1" SA Per VPN Gateway Endpoint. It is normal to have more than 1 IPSEC "Phase 2" SA. You should only ever have one IKE "Phase 1" SA per VPN Gateway pair and usually multiple "Phase 2" SAs according to the 3 options mentioned above (per host/subnet/gateway), if you have more than one host or subnet configured to communicate over the VPN. I assume there might be just the one Phase 2 SA if you select "gateway" though I have never tested that setting.
If you have more than 1 IKE "Phase 1" SA then you probably have some sort of problem; Phase 1 Settings mismatch would be the top candidate.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 4 | |
| 3 | |
| 1 | |
| 1 | |
| 1 | |
| 1 | |
| 1 | |
| 1 | |
| 1 | |
| 1 |
Wed 26 Nov 2025 @ 12:00 PM (COT)
Panama City: Risk Management a la Parrilla: ERM, TEM & Meat LunchThu 04 Dec 2025 @ 12:30 PM (SGT)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - APACThu 04 Dec 2025 @ 03:00 PM (CET)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - EMEAThu 04 Dec 2025 @ 02:00 PM (EST)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - AmericasThu 04 Dec 2025 @ 12:30 PM (SGT)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - APACThu 04 Dec 2025 @ 03:00 PM (CET)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - EMEAThu 04 Dec 2025 @ 02:00 PM (EST)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - AmericasWed 26 Nov 2025 @ 12:00 PM (COT)
Panama City: Risk Management a la Parrilla: ERM, TEM & Meat LunchAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY