Hi all,
today i tried to move, on customer side, a VPN with thirdy-party from their Cisco to their Check point, scenario:
Move from: Third Party---VPN---Cisco---clear traffic--CheckPoint
Move to: Third Party---VPN---CheckPoint
Spent hours in troubleshooting, then we decided to rollback from check point to Cisco, but some traffic continued to not work.... so i discovered that a lot of test was probably invalidate by the following behavoir:
when rollback was decided, i removed on mgmt the CheckPoint gateway from the community, disabled all rules... basically deleted everything, only Community with remote peer left on management.
Installed, vpn tunnel down on CheckPoint and UP again with cisco, but still some traffic, originated behind check point and routed to the Cisco for encryption, was not working.
On FW, after tunnel disruption was done, i continued to have the following output despite Community was destroyed:
Not working traffic by fw ctl zdebug + drop | grep IPnotResponding:
Then, roughly after 1 hour, when the above SA with "No outbound SA" disappeared, no more drop on zdebug and traffic started to work again. But now i don't wanna know WHY this behavoir... (but it should be discussed too i think...)
i'm pretty sure the same behavoir created to me a lot of problem in the past, especially during a change in configuration on P2.
So i'm going to the question, vpn tu (7) seems to not work properly for such cases, how can i DEEPLY clear any IKE/IPSec SA associated to a vpn? i tried to find a way to delete the MSA/MSPI by his identifier but no luck, any suggestion ???