<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Ipsec VPN issue with checkpoint in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-issue-with-checkpoint/m-p/12091#M8862</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Friends,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have an IPsec VPN tunnel configured with&amp;nbsp; CheckPoint firewall.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;Basically, when our Phase 1 expires after 24 hours, if a Phase 2 key is still within its 1 hour lifetime, we receive no response back.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;Only after the Phase 2 key expires and a new Phase 1 SA is negotiated that we can pass traffic.&amp;nbsp; This happens every day, exactly when Phase 1 expires:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please suggest.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Satish&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 22 Jul 2015 15:51:26 GMT</pubDate>
    <dc:creator>Satish</dc:creator>
    <dc:date>2015-07-22T15:51:26Z</dc:date>
    <item>
      <title>Ipsec VPN issue with checkpoint</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-issue-with-checkpoint/m-p/12091#M8862</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Friends,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have an IPsec VPN tunnel configured with&amp;nbsp; CheckPoint firewall.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;Basically, when our Phase 1 expires after 24 hours, if a Phase 2 key is still within its 1 hour lifetime, we receive no response back.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;Only after the Phase 2 key expires and a new Phase 1 SA is negotiated that we can pass traffic.&amp;nbsp; This happens every day, exactly when Phase 1 expires:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please suggest.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Satish&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 22 Jul 2015 15:51:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-issue-with-checkpoint/m-p/12091#M8862</guid>
      <dc:creator>Satish</dc:creator>
      <dc:date>2015-07-22T15:51:26Z</dc:date>
    </item>
    <item>
      <title>Re: Ipsec VPN issue with checkpoint</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-issue-with-checkpoint/m-p/12092#M8863</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;From CKPT's sk42315:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"Based on the IKE debug, see that after the Main Mode key negotiation, the 3rd party VPN device deletes the phase2 SPI, and similarly after the phase2 key negotiation, it deletes the SPI. This is due to a difference in how Check Point and some 3rd party peers handle phase2 keys after a phase1 renegotiation.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Check Point also deletes all phase2 keys for a specific phase1 SA after a phase1 renegotiation. Others continue to use the same phase2 keys until their normal expiry time. This causes something like a race condition where the tunnel will drop for about 10-15 minutes until the 2 peers can get SAs back in sync and the tunnel completes the negotiations.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Solution&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This problem was fixed. The fix is included in: Check Point R77.10&lt;/P&gt;&lt;P&gt;Check Point recommends to always upgrade to the most recent version (upgrade Security Gateway).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For lower / other versions, modify the settings on the Check Point Security Gateway to be consistent with the 3rd party settings.&lt;/P&gt;&lt;P&gt;Proceed as follows: On the Check Point Security Gateway, run:&lt;/P&gt;&lt;P&gt;ckp_regedit -a SOFTWARE/CheckPoint/VPN1 DontDelIpsecSPI_OnP1Del -n 1&lt;/P&gt;&lt;P&gt;Run cpstop Run cpstart&lt;/P&gt;&lt;P&gt;Run the command cat HKLM_registry.data | grep DontDel from $CPDIR/registry and verify the output."&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 22 Jul 2015 21:17:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-issue-with-checkpoint/m-p/12092#M8863</guid>
      <dc:creator>andreip</dc:creator>
      <dc:date>2015-07-22T21:17:55Z</dc:date>
    </item>
    <item>
      <title>Re: Ipsec VPN issue with checkpoint</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-issue-with-checkpoint/m-p/12093#M8864</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Andreip,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;we are already running R77.20.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Satish &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 Jul 2015 16:29:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-issue-with-checkpoint/m-p/12093#M8864</guid>
      <dc:creator>Satish</dc:creator>
      <dc:date>2015-07-23T16:29:45Z</dc:date>
    </item>
    <item>
      <title>Re: Ipsec VPN issue with checkpoint</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-issue-with-checkpoint/m-p/12094#M8865</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Satish,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Based on your previous discussions, I assume you already checked the DPD &amp;amp; tunnel monitoring on PANW side.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cluster on CKPT side ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To understand which side is persisting on using the expired P1 I would do it the hard way, disabling SecureXL &amp;amp; clearing P1 and running VPND under debug for a while (export TDERROR_ALL_ALL=5 &amp;amp;&amp;amp; export VPND_DEBUG=1 &amp;amp;&amp;amp; cpstop -fwflag -proc &amp;amp;&amp;amp; cpstart) or plain vpn debug trunc &amp;amp; analysis in IKEView on CKPT side &amp;amp; correlating info with debug ike global on debug &amp;amp; tail follow yes mp-log ikemgr.log on PANW side.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;andreip&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 Jul 2015 21:45:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-issue-with-checkpoint/m-p/12094#M8865</guid>
      <dc:creator>andreip</dc:creator>
      <dc:date>2015-07-23T21:45:39Z</dc:date>
    </item>
    <item>
      <title>Re: Ipsec VPN issue with checkpoint</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-issue-with-checkpoint/m-p/12095#M8866</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Check logs on both sites during the rekey or down time. In checkpoint(cp) just filter by public IP address to see the rekeys in smarviewtracker, in PAN it's showed in the system logs subtype VPN. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could be several things:&lt;/P&gt;&lt;P&gt;-Cp has support for DPD in your current version, try enabling/disabling DPD on both sites. In checkpoint you need to set up a 'Permanent tunnel'&lt;/P&gt;&lt;P&gt;-Proxy mismatch, checkpoint creates supernetting by default. The most easy thing is to select "One SA per gateway" under "Tunnel management" in your VPN community (checkpoint) and no using proxy-ID in your PA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Give them a try but the logs will help you out. If that doesn't work try setting up debugs on both sides or opening a support case with the 'Responder' firewall vendor.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regards,&lt;/P&gt;&lt;P&gt;G&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 05 Aug 2015 21:48:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ipsec-vpn-issue-with-checkpoint/m-p/12095#M8866</guid>
      <dc:creator>glastra1</dc:creator>
      <dc:date>2015-08-05T21:48:18Z</dc:date>
    </item>
  </channel>
</rss>

