Create a Post
Showing results for 
Search instead for 
Did you mean: 

How to deeply delete any IKE/IPsec information linked to a Peer

Hi all,

today i tried to move, on customer side, a VPN with thirdy-party from their Cisco to their Check point, scenario:

Move from: Third Party---VPN---Cisco---clear traffic--CheckPoint

Move to: Third Party---VPN---CheckPoint


Spent hours in troubleshooting, then we decided to rollback from check point to Cisco, but some traffic continued to not work.... so i discovered that a lot of test was probably invalidate by the following behavoir:


when rollback was decided, i removed on mgmt the CheckPoint gateway from the community, disabled all rules... basically deleted everything, only Community with remote peer left on management.

Installed, vpn tunnel down on CheckPoint and UP again with cisco, but still some traffic, originated behind check point and routed to the Cisco for encryption, was not working.

On FW, after tunnel disruption was done, i  continued to have the following output despite Community was destroyed:


Not working traffic by fw ctl zdebug + drop | grep IPnotResponding:



Then, roughly after 1 hour, when the above SA with "No outbound SA" disappeared, no more drop on zdebug and traffic started to work again. But now i don't wanna know WHY this behavoir... (but it should be discussed too i think...)


i'm pretty sure the same behavoir created to me a lot of problem in the past, especially during a change in configuration on P2.

So i'm going to the question, vpn tu (7) seems to not work properly for such cases, how can i DEEPLY clear any IKE/IPSec SA associated to a vpn? i tried to find a way to delete the MSA/MSPI by his identifier but no luck, any suggestion ???

0 Kudos
14 Replies

Good question...I checked with vpn tu tlist -h command, but cant see option for delete. I also typed vpn and when you hit enter, it gives bunch of stuff, but nothing really similar to what you need. Lets see if someone else may know.


Champion Champion

As this tool of mine shows, vpn tu del PEER_IP might help.


hi danny, i'm not sure but i think that vpn tu del PEER_IP is a "shortcut" to the option 5 on vpn tu... and option 5 is a "lighter" version of option 7 (it preserve IKE SA) it should not help

0 Kudos

anyway, I THINK that any attempt to delete the SA it will fail because in such cases, there is "NO outbound SA" and here  we are trying to delete an MSA/MSPI, that is something different:

  • MSA - "Meta SA".

    • Contains:
      • Methods
      • Encapsulation scheme (ESP, AH, UDP)
      • Encryption algorithm
      • Data integrity algorithm
      • Peer identity
      • Peer address
      • User name (for Remote Access client)
      • Intended use (IPsec IDs)
      • Access to Current usable SA (outbound only)
    • MSA is bi-directional.
    • Inbound SAs point to the MSA.
    • The MSA points to an outbound SA.
    • When SAs are rekeyed and replaced, the MSA is not. It is just updated.
    • An encrypted connection is marked with an MSPI (handle for the MSA).

MSPI - "Meta SPI" = peer + methods + IDs.

  • MSPI is not a standard concept and exists only in Check Point VPN kernel.
  • MSPI is actually a tunnel identifier. It is a local counter that uniquely identifies a tunnel on the given machine.
    In cluster topology it needs to be translated from the MSPI of peer cluster member to the local MSPI.
  • MSPI is an index to the MSA (Meta SA), which contains fields common to all SAs with the same peer, methods, IDs, where:
    • Peer - peer gateway IP address
    • Methods - per rule (community) parameters
    • IDs - client/server or their containing subnets
  • When a new IPsec tunnel is established, a new MSPI is created by, it get the next free MSPI number, and the MSPI counter is increased.
  • When an IPsec tunnel is closed, the MSPI counter is decreased.

that is probably the root cause of the trafffic problem, but, coming back to the thread question, this is why any attempt to delete that entry will fail with any "delete SA" command.... of course these are only my assumptions, need a vpn king here to be sure 🙂 

0 Kudos

Clearly this information is stored in one or more table entries.
The trick is figuring out which one (using fw tab).
From there, you can delete the entries with fw tab -x (I believe).

0 Kudos

Hello Phoneboy,

Don't you think there should be an easier way to do this?
Having traffic outages after deleting all related VPN configuration because the CP firewall still has some entries in some tables that you need to dig deep and if lucky you may find it(probably not).. 

CP needs to understand that customers are getting less and less tolerant to this kind of quirks..



100% agree

Not only customers, administrators like us too...


It's possible this particular issue is not known or not encountered often enough.
However, I tend to think vpn tu should either offer an option for this or do it as part of one of the existing options.
I'll ask around. 

I believe the correct table to find this in (per is called meta_sas.
You can use fw tab -x to delete the relevant entry in the connections table.
Other tables are also listed there. 

0 Kudos

vpn tu (option 7) works perfectly fine in case both peers are Check Point gateways while the "vpn tu" command is executed AT THE SAME TIME on both Check Point peers.

Another option can be to use SAM rule on Check Point gateway to reject connection to/from peer.

Kind regards,
Jozko Mrkvicka

the problem is getting critical with other customer

we converted a problematic vpn policy based in vpn route based. Despite the tunnel was resetted, "No outbound SA" still there and i clearly see with my eyes on ASA side that check point keep tried to negotiate some subnets !! 

At that time we was on route-based, so empty group + one vpn per gateway pair


Need absolutely to underestand how to clean that f****g cache

0 Kudos

How can i clean all that P1 entries for a VPN Peer?




tried: vpn tu (7), vpn accel off, removed gateway from community for 10minutes....

0 Kudos

When I asked about this problem previously, I was told that this issue needs to be handled via the TAC.
It is likely some sort of bug that is causing this.

0 Kudos
Legend Legend

I'd suspect that the withdrawal of IKE negotiation duties from vpnd and re-implementation of that into the new iked daemon in R81.10+ may have something to do with these problems, and this transition may have broken something in how vpn tu interacts with it.  Something perhaps for R&D to look into.  @CheckPointerXL I assume you are running at least R81.10 and iked is running on your gateway?

Gateway Performance Optimization R81.20 Course
now available at
0 Kudos

correct, it seems that compulsively doing vpn tu->optin 7-ip peer it works.... maybe it's a case, but it worked last two times (only for Phase2)

0 Kudos


Epsum factorial non deposit quid pro quo hic escorol.

Upcoming Events

    CheckMates Events