Create a Post
cancel
Showing results for 
Search instead for 
Did you mean: 
arvindteemul1
Collaborator

VPN Configuration between Check Point and FortiGate

Hi Mates,

A VPN has been configured between a Check Point R81 and Fortinet version 7.6 firewalls. After the initial VPN configuration, traffic is successfully traversing the two firewalls. If there is no traffic continually traversing the VPN for more than an hour, then the VPN appears to be broken and does not allow any traffic outbound from Check Point, unless the VPN reconfiguration is carried out on the Check Point firewall, however inbound traffic to the Check Point firewall is working fine.

Any suggestions to fix this?

0 Kudos
10 Replies
Gaurav_Pandya
Advisor

Enable permanent tunnel option with specific community and test.

Permanent tunnel.PNG

0 Kudos
Don_Paterson
Advisor
Advisor

@arvindteemul1 

The Permanent Tunnels feature will send a UPD 18234 packet (tunnel testing) which is proprietary, so the FN gateway will not understand it. It may work just because of the traffic flow in the tunnel.

What do the logs say?


https://sc1.checkpoint.com/documents/R81.20/WebAdminGuides/EN/CP_R81.20_SitetoSiteVPN_AdminGuide/Con...

 

0 Kudos
the_rock
Legend
Legend

Ah, fortiOS 7.6.x, lots of new features, but still feature release, so I would stick with 7.4, which is latest mature code : - )

Anywho...make sure on Fortigate, setting auto keep alive is enabled and on CP exactly what the guys mentioned.

Andy

 

0 Kudos
Lesley
Authority Authority
Authority

Sounds like VPN timers are not the same on both sides. Would check p1 and p2 on both side and make sure they match. 

Are you sure you run R81? and not R81.10 or R81.20? If so upgrade due EOL status 

-------
If you like this post please give a thumbs up(kudo)! 🙂
0 Kudos
Don_Paterson
Advisor
Advisor

the_rock
Legend
Legend

Always great sk to refer to, Don.

0 Kudos
Duane_Toler
Advisor

On hour is default phase2 re-key timer (as @Lesley noted.  Be sure your implied rules enable VPN control connections and that you aren't trying to control IKE, IPsec, and (if applicable) NAT-T connections in your security policy.

 

--
Ansible for Check Point APIs series: https://www.youtube.com/@EdgeCaseScenario and Substack
0 Kudos
arvindteemul1
Collaborator

thanks to all for your input...awaiting access to the firewall to check on the suggested items...will keep you posted!

On another note, while I'm cross referencing another firewall, I came across a typo in the Implied Policy section of R81.20, see attached:

 

 

 

the_rock
Legend
Legend

Personally, I would never change those without checking with TAC first.

Andy

0 Kudos
Duane_Toler
Advisor

You have Remote Access control connections disabled.  This needs to be enabled for all of IPsec to function.  You also have Accept ICMP Requests enabled, which is not the default (and you almost certainly do not want this).  Someone has modified these implied rules in the past.  You should review the defaults again and re-align these..  Here's a screenshot from sk179346.

 

https://sc1.checkpoint.com/sc/SolutionsStatics/sk179346/implied%20rules202205261210461.png

 

--
Ansible for Check Point APIs series: https://www.youtube.com/@EdgeCaseScenario and Substack
0 Kudos

Leaderboard

Epsum factorial non deposit quid pro quo hic escorol.

Upcoming Events

    CheckMates Events