Have any of you every encountered an issue with a site to site IPSec VPN where you have multiple subnets on one side and at what seems to be random times one or a few of those subnets lose all connectivity to the far end?
At my Headquarters location I have the IPSec VPN running on a Check Point appliance running 80.30 with jumbo hotfix accumulator take 196. The Branch office has a third party device (Palo Alto).
Twice this week a handful of subnets at Headquarters lost connectivity to the private network at the Branch office while other subnets continued to operate fine. In both instances connectivity restored itself in about an hour without any manual intervention.
During these partial outages the logs in SmartConsole's logging show traffic from the subnet(s) in question being encrypted and sent on their way to the Branch office. On the Branch end that traffic never appears.
I would open a TAC case but I don't know if they will be able to tshoot this unless the problem is currently happening.
My VPN settings are as follows:
No NAT-T
IKEv2 only
Phase 1:
AES-128
SHA256
DH Group 19
Phase 2:
AES-GCM-128
SHA 256
PFS Group 19
No compression
Phase 1 and 2 renegotiation times were left at the defaults of 1440 minutes and 3600 seconds.
All of the subnets needed are in the Check Point encryption domain and on the Branch end the subnets have Proxy-ID's in the Palo Alto.
Per the "Max Power 2020" book I know I am not using the recommended settings for VPNs with third party devices (IKEv2 and PFS), but I wanted to try for the additional security in this case.
If IKEv2 or PFS is the issue here would it affect all subnets or none?
I am aware of SK165003 where when NAT-T is used traffic needs to be initiated from the far end third party device for traffic to actually start traversing the tunnel properly, but I am not using NAT-T in this case.
Any ideas?