Create a Post
cancel
Showing results for 
Search instead for 
Did you mean: 
fjmg
Participant
Jump to solution

Checkpoint 81.10 1800 Appliance VPN clients reconnecting

I'm having problems with my gateway 1800 R81.10. Since early this morning, VPN clients keep reconnecting. They connect, but after a short time, they restart without allowing access to anything.
I've already checked the logs on the firewall's web portal and haven't found any errors.
Forgive my inexperience, but is there any troubleshooting I can do to understand what is wrong?

0 Kudos
1 Solution

Accepted Solutions
fjmg
Participant

the situation is stable since upgrade to 81.10 version and following these TAC instructions:

Please clear the cache files related to the certificate and make sure that the following steps are performed:
1. The hashed-name certificates found on relevant SMB appliances via this Expert Mode command:

find / -name *.crt

2. All hashed-name certificates deleted via Expert Mode command "rm":
Example:
rm /pfrm2.0/config1/f08dfji3hf9du3.crt


Once Above procedure is done, please try to reinitialize internal certificates on SMB appliance and after this try to connect via Remote Access VPN.

 

View solution in original post

0 Kudos
6 Replies
henfii
Participant

Hello,

what version of FW do you have on GW?  

is a specific group of users defined or a specific destination instead of Any regarding VPN?

I registered the same problem in the case when a source or destination other than Any from R81.10.10, R81.10.08 and earlier did not have this problem. If it is R81.10.10, I can try to place here a solution that helped me (at least with local management, I can't verify the central one at the moment).

0 Kudos
fjmg
Participant

Hi @henfii 

 

thanks for the reply

yes I was with 81.08 and VPN AD validation

the TAC advice me to upgrade to 81.10.

not solved but is better, right now we still get disconnected but it holds for a few hours.

0 Kudos
PhoneBoy
Admin
Admin

Some debugging is in order: https://support.checkpoint.com/results/sk/sk62482 
TAC will probably have to analyze the output.

0 Kudos
fjmg
Participant

thanks, that's wat we send to TAC.

0 Kudos
Lesley
Leader Leader
Leader

what is running on the clients itself? Is that updated? 

You see traffic drops in logs from VPN ip(office mode pool ip) and or public IP they are connecting from?

How is the load of that firewall during the day? 

-------
If you like this post please give a thumbs up(kudo)! 🙂
0 Kudos
fjmg
Participant

the situation is stable since upgrade to 81.10 version and following these TAC instructions:

Please clear the cache files related to the certificate and make sure that the following steps are performed:
1. The hashed-name certificates found on relevant SMB appliances via this Expert Mode command:

find / -name *.crt

2. All hashed-name certificates deleted via Expert Mode command "rm":
Example:
rm /pfrm2.0/config1/f08dfji3hf9du3.crt


Once Above procedure is done, please try to reinitialize internal certificates on SMB appliance and after this try to connect via Remote Access VPN.

 

0 Kudos

Leaderboard

Epsum factorial non deposit quid pro quo hic escorol.

Upcoming Events

    CheckMates Events