- Products
- Learn
- Local User Groups
- Partners
- More
Introduction to Lakera:
Securing the AI Frontier!
Quantum Spark Management Unleashed!
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
SharePoint CVEs and More!
Today I was Billy Big Balls and upgraded a customer from R80.20 to R81.10. All went well, except site-to-site VPN tunnels didn't come back up.
"zdebug" showed outbound IKE dropping on the cleanup rule.
Previously this worked via the Global "Accept outgoing traffic from the gateway" tick box.
This box is still ticked, but doesn't seem to be working... hence maybe this is a bug?
I've added a security rule to allow outbound IKE and the tunnels all came back.
So - one to be aware of if you go to R81.10 and your tunnels stay down.
Thanks for sharing your experience with us.
I've also informed TAC.
Just out of curiosity, can you send us a screenshot of the rule you had to change/add?
Hmm, that would give the customer away 😉
The rule was literally
SRC: My cluster object
DST: Azure object
Service: IKE (UDP/500)
Action: Accept
The tunnel came straight back up then. For 3 years prior, that rule hasn't been needed. So I'm assuming at this point that the "accept outgoing traffic from gateway" tick box is no longer doing what it says on the tin in R81.10?
Thats fair : ). I have a feeling this could be a bug if you never needed that sort of rule before. Personally, I cannot recall anyone having to do so going back to even before R54.
In you screenshot, this option is set to "Before Last".
Have you changed that from default?
@biskit : Do you also have "Before Last" there?
If I remember correctly, default in new databases for this option is "First" for many years. Maybe this is the problem why R&D did not found this problem in yet?
@Tobias_Moritz ...I am pretty sure by default it has always been "before last", even in older releases. I had a quick look for R77.30 and it also shows "before last". Also checked production R80.;40 and R81 and it shows the same.
Yes - that's the right tick box. Mine is also set to "before last", which technically should still allow IKE out before hitting the cleanup rule. Maybe there's something TAC can do to troubleshoot why it isn't working. They did reply saying "there is no bug with VPN" so I replied back agreeing, and saying the problem is the tick box not doing what it did prior to the upgrade. I'll see where the SR takes me... Maybe some language barriers to overcome first 😂
Well, no language barrier there lol. Before last option does exactly what it says...which literally means that whatever is listed as you said, it would be accepted before clean up rule. Anyway, keep us posted, this is quite interesting.
Do you see hits on this manually created IKE rule ?
Do you have implied rules logging ?
Yes, I see hits on the new IKE rule.
I didn't have implied rule logging on.
As this is a production environment I'll struggle to go back and test stuff now without a maintenance window. I've got a case with TAC though (who still think I'm reporting a VPN problem rather than the global properties tick box problem) so I'll see where that leads me...
Did you install the policy after upgrade to R81.10 without doing any modifications with the policy? Simple policy push after cluster has been upgraded.
But anyway, here we go, freshly released/tested version and first issue within the day(s) ...
I am wondering if there will be any version without bugs...
Yep - policy was installed.
The gateway had "Initial Policy" after the upgrade, so it needed a policy install...
Hi
Have’nt seen this error before.
what take of R81.10 do you run?
Have been running R81.10 take 335 in EA in production with almost 200 site2site tunnels and didnt see this issue.
I find this release very stable and but again maybe a combo of different setups can trigger different bugs that haven’t seen before.
BTW were you able to download the GA version from supportcenter? I have only been able to find the scalable version to download not the main train version.
I'm on the same version - R81.10 Take 335, which I downloaded straight from CPUSE in the WebUI yesterday.
I have no such issues on R81.10 myself. IKE traffic is hitting rule 0 / implied rule as per usual. Implied_rules.def lives on the management server. Did you do an in-place upgrade of the management server? Or did you go with an advanced upgrade?
Would be interesting to see your $FWDIR/lib/implied_rules.def file. There have been changes to the implied_rules.def in newer versions. Might the upgrade somehow have kept the old version instead of going with the newer one? This tends to be a possible issue when installing Jumbo Hotfixes that makes changes to implied_rules.def. If the JHF installation notices that you are not running a default implied_rules.def it will create a copy like implied_rules_HFA_R81_JUMBO_HF_take34.def and not overwrite the one you have which might cause issues.
Have you verified global properties on the R81.10 management to make sure "Accept Remote Access control connections" are still activated after the upgrade?
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
User | Count |
---|---|
15 | |
11 | |
7 | |
6 | |
6 | |
6 | |
6 | |
4 | |
4 | |
4 |
Wed 24 Sep 2025 @ 03:00 PM (CEST)
Bereit für NIS2: Strategische Werkzeuge für Ihre Compliance-Reise 2025Thu 25 Sep 2025 @ 03:00 PM (IDT)
NIS2 Compliance in 2025: Tactical Tools to Assess, Secure, and ComplyWed 24 Sep 2025 @ 03:00 PM (CEST)
Bereit für NIS2: Strategische Werkzeuge für Ihre Compliance-Reise 2025Thu 25 Sep 2025 @ 03:00 PM (IDT)
NIS2 Compliance in 2025: Tactical Tools to Assess, Secure, and ComplyThu 09 Oct 2025 @ 10:00 AM (CEST)
CheckMates Live BeLux: Discover How to Stop Data Leaks in GenAI Tools: Live Demo You Can’t Miss!Wed 22 Oct 2025 @ 11:00 AM (EDT)
Firewall Uptime, Reimagined: How AIOps Simplifies Operations and Prevents OutagesAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY