- Products
- Learn
- Local User Groups
- Partners
- More
MVP 2026: Submissions
Are Now Open!
What's New in R82.10?
Watch NowOverlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
Hi,
could someone direct me how I can adjust the setting to avoid VPN Tunnel termination due to "possible replay attack".
I do have the issue described in sk94984. The issue exists only for one Tunnel. The issue is gone when I disable the replay check. Now I wanted to turn it back on and adjust the window size. In the SK they only say to adjust it to the relevant value.
In the logs I do have the message:
Warning: possible replay attack. Sequence Number 1490945 (Expected 1491179)
Currently I used 1200 as window size but the tunnel is still being terminated.
How can I determine / calculate the value? Seem that it isn’t just 1491179-1490945
Thanks
R80.40 T94
Response from TAC:
Connect with SmartConsole to the Security Management Server / Domain Management Server.
Close all SmartConsole windows (SmartDashboard, SmartView Tracker, SmartView Monitor, etc.).
Verify by running the "cpstat mg" command on Security Management Server / in the context of each Domain Management Server.
Connect with GuiDBedit Tool to the Security Management Server / Domain Management Server.
In the upper left pane, go to Table - Network Objects - network_objects.
In the upper right pane, select the relevant Security Gateway / Cluster object.
Press CTRL+F (or go to Search menu - Find) - paste ipsec.replay_counter_window_size - click on Find Next.
In the lower pane, right-click on the ipsec.replay_counter_window_size - select Edit... - delete the default value of 64 - enter the relevant value - click on OK.
Save the changes: go to File menu - click on Save All.
Close the GuiDBedit Tool.
Connect with SmartConsole to the Security Management Server / Domain Management Server.
Install the policy onto the relevant Security Gateway / Cluster object.
Keep in mind that the default value is 64, and there is no desired value - you will need to lower or higher it until it reaches the correct value where this issue does not re-appear.
Better use the information found in sk94984: VPN traffic is dropped with "Encryption failure: Warning: possible replay attack" log and involve TAC if this does not help.
Hi Günter,
as mentioned above I followed the SK94984. But i didn't want to have the reply check disabled in general. So i decided to do the route descibed in the additional part of the SK and adjust the window size. I did adjust it to 1200 the log shows it triggered even it was only 234 as from the logs.
regards
Florian
So i would suggest to involve TAC !
Response from TAC:
Connect with SmartConsole to the Security Management Server / Domain Management Server.
Close all SmartConsole windows (SmartDashboard, SmartView Tracker, SmartView Monitor, etc.).
Verify by running the "cpstat mg" command on Security Management Server / in the context of each Domain Management Server.
Connect with GuiDBedit Tool to the Security Management Server / Domain Management Server.
In the upper left pane, go to Table - Network Objects - network_objects.
In the upper right pane, select the relevant Security Gateway / Cluster object.
Press CTRL+F (or go to Search menu - Find) - paste ipsec.replay_counter_window_size - click on Find Next.
In the lower pane, right-click on the ipsec.replay_counter_window_size - select Edit... - delete the default value of 64 - enter the relevant value - click on OK.
Save the changes: go to File menu - click on Save All.
Close the GuiDBedit Tool.
Connect with SmartConsole to the Security Management Server / Domain Management Server.
Install the policy onto the relevant Security Gateway / Cluster object.
Keep in mind that the default value is 64, and there is no desired value - you will need to lower or higher it until it reaches the correct value where this issue does not re-appear.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 19 | |
| 17 | |
| 14 | |
| 8 | |
| 7 | |
| 3 | |
| 3 | |
| 3 | |
| 3 | |
| 2 |
Tue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Thu 18 Dec 2025 @ 10:00 AM (CET)
Cloud Architect Series - Building a Hybrid Mesh Security Strategy across cloudsTue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Thu 18 Dec 2025 @ 10:00 AM (CET)
Cloud Architect Series - Building a Hybrid Mesh Security Strategy across cloudsAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY