- Products
- Learn
- Local User Groups
- Partners
- More
Introduction to Lakera:
Securing the AI Frontier!
Quantum Spark Management Unleashed!
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
SharePoint CVEs and More!
Hi all,
So, we're currently having issue with our IPSec vpn tunnel, where all of the tunnels stuck at phase 1 when i saw the status on SmartView Monitor. Btw, we are using ClusterXL that has two cluster member (80.20 gateway).
Log for outbound traffic via ipsec tunnel shows encrypted status. But there is no inbound traffic.
Our log indicates that ESP Traffics are dropped and "Packet is dropped because an IPsec SA associated with the SPI on the received IPsec packet could not be found" and there is also error regarding Unknown SPI.
I looked for list of IKE and IPSEC sa using "vpn tu" on the active cluster member (FW-1). It showed nothing. There are no IKE and IPSEC sa on the active cluster. But on the standby member (FW-2), it showed the list of IKE and IPSEC sa.
I tried to bring up the standby member (FW-2), but the error still the same. Now it's the opposite. The IPSEC and IKE did not show up on FW-1 (active member), but they were present on the FW-2 (standby member).
Now i'm thinking about disabling and enabling the IPSec VPN software blade for the cluster. how do you think of this?
Kindly need your help and advise regarding this issues.
> Our log indicates that ESP Traffics are dropped and "Packet is dropped because an IPsec SA associated with the SPI on the received IPsec packet could not be found" and there is also error regarding Unknown SPI.
The other end doesn't realize the tunnel is dead and is continuing to send traffic referencing a tunnel that no longer exists on the Check Point side. The other end needs to reset its tunnels, this is most typically caused in an interoperable VPN scenario where "Delete SA" notifications are not being handled properly between the peers after a peer gateway restarts, or the IKE Phase 1 and Phase 2 SA timers do not match between the two sides.
I am facing the same issue.
Any solution on this? Already opened a support case, but they don't seem to know what to do...
I have exactly the same problem with one VPN location.
We have 2 other VPN locations what operates without any issues.
We moved to R80.40 and since then we have the problem with one site-to-site VPN.
The VPN tunnel diconnects from our main site but the SMB (1450) holds still the VPN.
So the VPN isn't coming back until I remove the tunnel from the SMB (vpn tu).
What for host objects did you delete?
Host object with the public IP address or object with internal ip addresses?
Hi,
Public IP address.
I think your case is different. Have you tried turning on "Permanent Tunnels"?
Hi,
yes, yesterday I changed it back to a permanent tunnel and today I the problem is worse than the other days.
VPN tunnel disconnected 4 times now.
It came back aftet deleting the SAs from the SMB (vpn tu).
"Packet is dropped because an IPsec SA associated with the SPI on the received IPsec packet could not be found"
"Unknown SPI: 0x627e7f34 for UDP encapsulated IPsec packet."
I opend a ticket some weeks ago but they couldn't help.
Nothing in ike and vpn logs what could explain the problem.
Maybe it's time for the solution?
The problem was the firmware of our 6000 check point in our headquarter.
Some weeks after my post here check point released a new firmware with a LOT bugfixes regarding ipsec.
Since then the problems are gone.
@Lars_S_ you are answering a thread which is two years old. What are you trying to say?
Tell us please - what version did you go to that fixed the issue? And what was it on before if possible?
Command line: "fw ver" and "show version all"
Hi all,
So, we're currently having issue with our IPSec vpn tunnel, where all of the tunnels stuck at phase 1 when i saw the status on SmartView Monitor. Btw, we are using ClusterXL that has two cluster member (80.20 gateway).
Log for outbound traffic via ipsec tunnel shows encrypted status. But there is no inbound traffic.
Our log indicates that ESP Traffics are dropped and "Packet is dropped because an IPsec SA associated with the SPI on the received IPsec packet could not be found" and there is also error regarding Unknown SPI.
I looked for list of IKE and IPSEC sa using "vpn tu" on the active cluster member (FW-1). It showed nothing. There are no IKE and IPSEC sa on the active cluster. But on the standby member (FW-2), it showed the list of IKE and IPSEC sa.
I tried to bring up the standby member (FW-2), but the error still the same. Now it's the opposite. The IPSEC and IKE did not show up on FW-1 (active member), but they were present on the FW-2 (standby member).
Now i'm thinking about disabling and enabling the IPSec VPN software blade for the cluster. how do you think of this?
Kindly need your help and advise regarding this issues.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
User | Count |
---|---|
15 | |
12 | |
8 | |
6 | |
6 | |
6 | |
5 | |
5 | |
4 | |
3 |
Tue 30 Sep 2025 @ 08:00 AM (EDT)
Tips and Tricks 2025 #13: Strategic Cyber Assessments: How to Strengthen Your Security PostureTue 07 Oct 2025 @ 10:00 AM (CEST)
Cloud Architect Series: AI-Powered API Security with CloudGuard WAFTue 30 Sep 2025 @ 08:00 AM (EDT)
Tips and Tricks 2025 #13: Strategic Cyber Assessments: How to Strengthen Your Security PostureThu 09 Oct 2025 @ 10:00 AM (CEST)
CheckMates Live BeLux: Discover How to Stop Data Leaks in GenAI Tools: Live Demo You Can’t Miss!Wed 22 Oct 2025 @ 11:00 AM (EDT)
Firewall Uptime, Reimagined: How AIOps Simplifies Operations and Prevents OutagesAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY