Dear all,
We have a site-to-site VPN community. Central Device is Resilience NE20,
Satalite devices are Nokia IP30/IP40. Central VPN gateway installed Checkpoint
NGX R60 with HFA05, SmartCenter version is NGX R65.
>From last week, one remote site using IP40 got into trouble, the VPN
>connection up and down several time a day.
Here is what I have done for troubleshooting:
1. The internet of remote site is PPPoE, physical line is fiber, ISP has
confirmed that the line is OK.
2. When the VPN connection is down, I can still saw packets arrived at central
gateway via SmartView Tracker.
3. I have compared the configuration between problem device and others, the
configuration seemed OK.
4. I have detached the problem edge object from the community in
SmartDashboard, and deleted the edge object. Then I recreated it and added it
to the community. After several hours, the VPN connection up-and-down continued.
5. I have checked the VPN tunnel via checkpoint cli on central VPN gateway. I
found that there're much more entry under IKE sa and IPsec sa for problem site
than other normal sites. I have attached 3 text files, one is VPN tunnels
information of problem site, other two files are information of normal sites.
The problem has lasted over 1 week, I really need your help to identify the
cause and resolve it.
best regards
yabin yang
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
+++ information of problem site
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
************************* on remote VPN device IP40 *************************
NokiaIP40:39> show vpn tunnels
site src dst encryption duration
username status
Enterprise 59.61.107.181 218.78.209.65 AES-256/SHA1 0:00:56:48
N/A ok
src start src end dst start dst end encryption
duration
59.61.107.181 59.61.107.181 134.127.0.0 134.127.255.255 AES-128/MD5
0:00:35:38
59.61.107.181 59.61.107.181 134.132.0.0 134.132.255.255 AES-128/MD5
0:00:46:14
134.153.19.0 134.153.19.255 218.78.209.65 218.78.209.65 AES-128/MD5
0:00:56:47
59.61.107.181 59.61.107.181 218.78.209.65 218.78.209.65 AES-128/MD5
0:00:56:42
134.153.19.0 134.153.19.255 134.132.0.0 134.132.255.255 AES-128/MD5
0:00:56:47
134.153.19.0 134.153.19.255 134.127.0.0 134.127.255.255 AES-128/MD5
0:00:56:48
134.153.19.0 134.153.19.255 134.124.0.0 134.125.255.255 AES-128/MD5
0:00:55:54
134.153.19.0 134.153.19.255 134.122.0.0 134.123.255.255 AES-128/MD5
0:00:56:41
NokiaIP40:40>
************************* on central VPN device NE20 *************************
VPN shell:[/] > /tunnels/show/IKE/peer 0.0.0.38
Peer 0.0.0.38:
1. IKE SA <501dfd4d35d59b54,4a9aad61b9a4d690>:
2. IKE SA <a2f6c84aebaeef41,b5e019cca89336c9>:
3. IKE SA <2ebf19f6015512dc,2bfe2e050c95fba5>:
4. IKE SA <a9d2ea3044de9d55,63a7acfdc926c766>:
5. IKE SA <433bfe1aacb6cc75,7416c886824c9ca3>:
6. IKE SA <7685ea7fc59b27bf,508bbea8b5c47cef>:
7. IKE SA <7955a2c1b607a37f,100aad3968a266e7>:
8. IKE SA <1db629336b386bfc,7636b8b257357f43>:
9. IKE SA <8ade721199dfdd50,32b3c250e480aa2b>:
10. IKE SA <80803df76204ee1c,01ef1647e5934372>:
11. IKE SA <af2adde3001ebac1,792fccbafcc8f40b>:
12. IKE SA <c10d544a8f70cdce,ba6ed5451fce4ecd>:
13. IKE SA <c318192dc1bfc125,835007f010d7f80a>:
14. IKE SA <59f353383c30584c,1f176834a8285294>:
15. IKE SA <3a0dacf667332bb5,19befd44c1e0af5d>:
16. IKE SA <137d31e9dcb41f84,6a450b4984bf2138>:
17. IKE SA <aaac65b9abfa73bb,7956e27ec54b32d9>:
VPN shell:[/] > /tunnels/show/IPSEC/peer 0.0.0.38
Peer 0.0.0.38:
INBOUND:
1. 0xa74a7de9
2. 0x5fe28dc2
3. 0xb5ebbc52
4. 0x941113a8
5. 0xfa8b153d
6. 0x9327a72
7. 0xe6da70d6
INBOUND:
1. 0xeca8ec2a
2. 0xc3883555
3. 0xac06a3d0
4. 0x5ebf4a2e
5. 0x68e59041
6. 0xc75bd4e2
7. 0xd79df5de
8. 0xe2d271fb
INBOUND:
1. 0x3cdc9541
2. 0xf82230fc
3. 0x263df9d7
4. 0x8bf825d9
5. 0xc55c185d
6. 0xe6bbefef
7. 0xe4e080ff
OUTBOUND:
1. 0x2c6ec23a
2. 0x2c6ec23c
3. 0x2c6ec23e
4. 0x2c6ec240
5. 0x2c6ec242
6. 0x2c6ec244
7. 0x2c6ec246
VPN shell:[/] >
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
+++ information of working site
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
************************* on remote VPN device IP40 *************************
NokiaIP40:4> show vpn tunnels
site src dst encryption duration
username status
Enterprise 218.16.240.210 218.78.209.65 AES-256/SHA1 0:07:18:10
N/A ok
src start src end dst start dst end encryption
duration
134.142.19.0 134.142.19.255 218.78.209.65 218.78.209.65 AES-128/MD5
0:00:27:42
218.16.240.210 218.16.240.210 134.132.0.0 134.132.255.255 AES-128/MD5
0:00:44:38
134.142.19.0 134.142.19.255 134.127.0.0 134.127.255.255 AES-128/MD5
0:00:31:44
134.142.19.0 134.142.19.255 134.132.0.0 134.132.255.255 AES-128/MD5
0:00:37:38
218.16.240.210 218.16.240.210 218.78.209.65 218.78.209.65 AES-128/MD5
0:00:42:43
134.142.19.0 134.142.19.255 134.122.0.0 134.123.255.255 AES-128/MD5
0:00:01:15
134.142.19.0 134.142.19.255 134.124.0.0 134.125.255.255 AES-128/MD5
0:00:09:37
NokiaIP40:5>
************************* on central VPN device NE20 *************************
VPN shell:[/] > /tunnels/show/IKE/peer 0.0.0.23
Peer 0.0.0.23:
1. IKE SA <3ac677291d7e84ad,0149f16cd735e215>:
VPN shell:[/] > /tunnels/show/IPSEC/peer 0.0.0.23
Peer 0.0.0.23:
INBOUND:
1. 0xb59f12e0
2. 0xbb77f7b0
3. 0x177f9ede
4. 0xf067e293
5. 0xa939f955
6. 0xf1d1235b
7. 0xf790b8a8
OUTBOUND:
1. 0xc802a6ae
2. 0xc802a6b0
3. 0xc802a6b1
4. 0xc802a6b2
5. 0xc802a6b3
6. 0xc802a6b4
7. 0xc802a6b6
VPN shell:[/] >
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
+++ information of another working site
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
************************* on remote VPN device IP40 *************************
NokiaIP40:36> show vpn tunnels
site src dst encryption duration
username status
Enterprise 121.34.57.71 218.78.209.65 AES-256/SHA1 0:06:15:32
N/A ok
src start src end dst start dst end encryption
duration
121.34.57.71 121.34.57.71 134.127.0.0 134.127.255.255 AES-128/MD5
0:00:14:09
134.147.19.0 134.147.19.255 218.78.209.65 218.78.209.65 AES-128/MD5
0:00:27:28
121.34.57.71 121.34.57.71 134.132.0.0 134.132.255.255 AES-128/MD5
0:00:32:02
121.34.57.71 121.34.57.71 218.78.209.65 218.78.209.65 AES-128/MD5
0:00:18:28
134.147.19.0 134.147.19.255 134.132.0.0 134.132.255.255 AES-128/MD5
0:00:25:13
134.147.19.0 134.147.19.255 134.127.0.0 134.127.255.255 AES-128/MD5
0:00:27:01
134.147.19.0 134.147.19.255 134.128.0.0 134.128.255.255 AES-128/MD5
0:00:50:21
134.147.19.0 134.147.19.255 134.124.0.0 134.125.255.255 AES-128/MD5
0:00:26:34
134.147.19.0 134.147.19.255 134.122.0.0 134.123.255.255 AES-128/MD5
0:00:27:19
NokiaIP40:37>
************************* on central VPN device NE20 *************************
VPN shell:[/] > /tunnels/show/IKE/peer 0.0.0.25
Peer 0.0.0.25:
1. IKE SA <3744df03d0218304,33266f199b42e50c>:
VPN shell:[/] > /tunnels/show/IPSEC/peer 0.0.0.25
Peer 0.0.0.25:
INBOUND:
1. 0x895bafe8
2. 0xa786cba9
3. 0x20ed8f5
4. 0xe288b602
5. 0xa81e6e00
6. 0xcd95a38a
7. 0x9422137d
8. 0x865dc83b
9. 0x24639564
OUTBOUND:
1. 0x18985372
2. 0x18985373
3. 0x18985374
4. 0x18985375
5. 0x18985376
6. 0x18985377
7. 0x18985378
8. 0x1898537a
9. 0x1898537b
VPN shell:[/] >
=================================================
To set vacation, Out-Of-Office, or away messages,
send an email to [EMAIL PROTECTED]
in the BODY of the email add:
set fw-1-mailinglist nomail
=================================================
To unsubscribe from this mailing list,
please see the instructions at
http://www.checkpoint.com/services/mailing.html
=================================================
If you have any questions on how to change your
subscription options, email
[EMAIL PROTECTED]
=================================================