- CheckMates
- :
- Products
- :
- Quantum
- :
- Remote Access VPN
- :
- Re: Phase -2 not working in the Ipsec tunnel
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Mute
- Printer Friendly Page
Are you a member of CheckMates?
×- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Phase -2 not working in the Ipsec tunnel
We have multiple sub nets in the local encryption domain(checkpoint firewall ) . and only one subnet for the remote peer encryption domain. Remote peer is a non checkpoint device.
Once we have initiated the ping from central gateway to remote gateway , I see that Phase 1 is up.
Phase2 not. Ike .elg file shows that P1 - main mode - all 6 packets good.
P2- quick mode , the first packet itself ( QM packet 1) itself failed. is the QM packet I see that IP address of central gateway and remote peer.
when I initiate a ping from the device behind the firewall , though the IP is listed in the subnet , it is not encrypted.
what could be wrong in configuration?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
I would start by looking at the logs in SmartLog/SmartConsole and seeing if there are any errors noted.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
no errors. should I see the central gateway IP and peer gateway IP of P2- message 1 or the IPs of both side encryption domain?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Depends on the log message in question.
You should certainly see the VPN establish itself in the logs between the two gateways.
If you're not seeing errors in SmartLog, then the traffic is probably being accepted by a rule that doesn't involve encryption.
Do you see what log the traffic from the original (unencrypted) traffic is accepted on?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
I see that it is accepted by an explicit rule. only the thing is it is not encrypted
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Did you exclude IPSEC group under vpn community?
Kim
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
yes. that was one of the issue.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Whenever you setup vpn tunnels and you test with icmp make sure to change the global properties for icmp traffic to be accepted before last, because any traffic matches implied rules will never get encrypted.
For phase 2 negotiation issue, your best friend is sk108600 scenario 1
Thanks