- Products
- Learn
- Local User Groups
- Partners
- More
AI Security Masters
E1: How AI is Reshaping Our World
MVP 2026: Submissions
Are Now Open!
What's New in R82.10?
Watch NowOverlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
Hello everyone,
I have a site to site VPN ( Checkpoint to checkpoint, IKEv2 only). A few days ago, everything was working fine. but since yesterday, traffic is ok in one way, and it's dropped by the firewall for the other way, with the error message below:
Enryption Fail Reason: "Packet is dropped because there is no valid SA - please refer to solution sk19423 in SecureKnowledge Database for more information"
I've checked the configuration, everything looks fine. The fact that is work one day and stopped working the next can't be a config issue..I think..
Does anyone have any idea what might be the root cause ?
Thank you,
Insufficient information. That error message is a symptom of your problem (interesting traffic could not be encrypted and forwarded because no VPN tunnel is present), not the actual cause. You should have some other error messages that will be more helpful such as "no proposal chosen", "no response from peer", "Invalid ID", "Received a Cleartext Packet within an Encrypted Connection", "Packet was Decrypted, but Policy Says Packet Should not have been decrypted", etc.
@Timothy_Hall and @the_rock Thank you for your reply.
I have checked and there is no other error message. The enryption is working again and nothing has been changed to make it work. I will check further tomorrow and see if there is anything unsual.
@the_rock The option "Keep IKE SAs" is already enabled.
Ok, sounds good...maybe also make sure to check "keep all connections" under connection persistence under gateway properties (somewhere on the left menu at the bottom). Honestly, dont ask me why this is relevant, but I had seen it help with VPN tunnels many times.
Andy
As Andy advised, you should definitely enable IKE debugging. You can do so with this command on the firewall:
vpn debug ikeon
If you are using a cluster, you should enable it on both members. If you control both sides of the VPN, you should enable it on both sides. You then need to wait until you get a successful negotiation and start seeing the problem again. "Packet is dropped because there is no valid SA" always means the traffic was flagged as interesting for a particular VPN community and was held while the keys were negotiated, but the key negotiation failed. To figure out what's wrong from an IKE debug, you want a successful negotiation and a failing negotiation. The difference between them is the most certain way to figure out what's wrong.
Tim is right, very generic error...did you try run ike debug? Also, there is a setting in global properties to "keep ike SAs", check that and push policy. Is under menu -> global properties -> advanced -> configuration -> VPN I believe
Andy
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 4 | |
| 3 | |
| 2 | |
| 2 | |
| 1 | |
| 1 | |
| 1 | |
| 1 | |
| 1 |
Tue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Thu 18 Dec 2025 @ 10:00 AM (CET)
Cloud Architect Series - Building a Hybrid Mesh Security Strategy across cloudsTue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Thu 18 Dec 2025 @ 10:00 AM (CET)
Cloud Architect Series - Building a Hybrid Mesh Security Strategy across cloudsThu 08 Jan 2026 @ 05:00 PM (CET)
AI Security Masters Session 1: How AI is Reshaping Our WorldAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY