- Products
- Learn
- Local User Groups
- Partners
- More
CheckMates Fifth Birthday
Celebrate with Us!
days
hours
minutes
seconds
Join the CHECKMATES Everywhere Competition
Submit your picture to win!
Check Point Proactive support
Free trial available for 90 Days!
As YOU DESERVE THE BEST SECURITY
Upgrade to our latest GA Jumbo
The 2022 MITRE Engenuity ATT&CK®
Evaluations Results Are In!
Now Available: SmartAwareness Security Training
Training Built to Educate and Engage
MITRE ATT&CK
Inside Check Point products!
CheckFlix!
All Videos In One Space
Have any of you every encountered an issue with a site to site IPSec VPN where you have multiple subnets on one side and at what seems to be random times one or a few of those subnets lose all connectivity to the far end?
At my Headquarters location I have the IPSec VPN running on a Check Point appliance running 80.30 with jumbo hotfix accumulator take 196. The Branch office has a third party device (Palo Alto).
Twice this week a handful of subnets at Headquarters lost connectivity to the private network at the Branch office while other subnets continued to operate fine. In both instances connectivity restored itself in about an hour without any manual intervention.
During these partial outages the logs in SmartConsole's logging show traffic from the subnet(s) in question being encrypted and sent on their way to the Branch office. On the Branch end that traffic never appears.
I would open a TAC case but I don't know if they will be able to tshoot this unless the problem is currently happening.
My VPN settings are as follows:
No NAT-T
IKEv2 only
Phase 1:
AES-128
SHA256
DH Group 19
Phase 2:
AES-GCM-128
SHA 256
PFS Group 19
No compression
Phase 1 and 2 renegotiation times were left at the defaults of 1440 minutes and 3600 seconds.
All of the subnets needed are in the Check Point encryption domain and on the Branch end the subnets have Proxy-ID's in the Palo Alto.
Per the "Max Power 2020" book I know I am not using the recommended settings for VPNs with third party devices (IKEv2 and PFS), but I wanted to try for the additional security in this case.
If IKEv2 or PFS is the issue here would it affect all subnets or none?
I am aware of SK165003 where when NAT-T is used traffic needs to be initiated from the far end third party device for traffic to actually start traversing the tunnel properly, but I am not using NAT-T in this case.
Any ideas?
Hard to say if IKEv2 the issue; my overall recommendation is to always try IKEv2 first and see how it works, but do not hesitate to go back to IKEv1 in an interoperable scenario if issues arise.
Make sure that the data lifesize option on the Palo Alto is disabled or set to an unreachably high value. Also ensure that there is no VPN tunnel idle timer set on the Palo side.
Edit: Since you only seem to be only losing some subnets, it could suggest a problem with subsequent Phase 2 negotiations which perform PFS. So first step might be to try disabling PFS but still use IKEv2.
Hi @Mike_Jensen,
use this oneliner to debug the P1 and P2 issue quick and easy in realtime.
ONELINER - Ease VPN Debug - with IKE live view
Hi PhoneBoy,
I double checked the lifetime for phase 1 and 2 and they are identical on both devices.
Hard to say if IKEv2 the issue; my overall recommendation is to always try IKEv2 first and see how it works, but do not hesitate to go back to IKEv1 in an interoperable scenario if issues arise.
Make sure that the data lifesize option on the Palo Alto is disabled or set to an unreachably high value. Also ensure that there is no VPN tunnel idle timer set on the Palo side.
Edit: Since you only seem to be only losing some subnets, it could suggest a problem with subsequent Phase 2 negotiations which perform PFS. So first step might be to try disabling PFS but still use IKEv2.
The GCM versions of AES should work with IKEv1 but they are relatively new, which of course often causes problems with interoperability until everything settles out between the different firewall vendors over the years...
After a couple of TAC cases for this it was determined that a value in GuiDBedit was not set to the R80 default. My policy had at some point been migrated from 77.x and the value for "ike_keep_child_sa_interop_devices" was set to false. This value was changed to "true" (the R80 default) and this VPN has been working a lot better since.
Hi @Mike_Jensen,
use this oneliner to debug the P1 and P2 issue quick and easy in realtime.
ONELINER - Ease VPN Debug - with IKE live view
About CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY