Cisco ASA Checkpoint firewall Site to Site Tunnel

Hello EE
Have anyone of you folks ever had any issues with traffic not passing through randomly between a cisco asa 5510 8.2(5) and a checkpoint FW?
I dont have access to the checkpoint firewall nor do i know much about the appliance.

Just to clarify the tunnel from the cisco side shows everything is peachy but once a month or so traffic will stop flowing for about 30 mins. then it magically fixes it self. During the outage running "show crypto isakmp sa" and show crypto ipsec sa" shows everything is fine.
i have another tunnel to another cisco asa and it's totally fine.

I am stumped on this but ran across this post on the cisco forums that is very identical to my issue.

https://supportforums.cisco.com/discussion/11327601/cant-fix-problem-between-asa-checkpoint-vpn

any input or second opinions are welcome
Thanks
LVL 4
El FierroNetwork EngineerAsked:
Who is Participating?
 
El FierroConnect With a Mentor Network EngineerAuthor Commented:
we reset both sides of the tunnel to make sure both sides matched phase 1 and 2 security
0
 
SIM50Commented:
It's hard to tell with the info you provided. During the outage,  when you do sh cry ipsec sa, do you see encaps but no decaps or decaps but no encaps? Are there any related messages in the syslog? Is the other side up? Do you have DPD setup?
0
 
El FierroNetwork EngineerAuthor Commented:
its an oddity because from both ends it seems fine from whatt the heckpoint fw guy said. hes pointing the finger at cisco of course....would super netting or the simplified /traditional cuz routing issues on the checkpoint cause this? during one of the outages a couple of servers were accessible via rdp and icmp from the asa to checkpoint...just trying to get some feedback.
0
Improve Your Query Performance Tuning

In this FREE six-day email course, you'll learn from Janis Griffin, Database Performance Evangelist. She'll teach 12 steps that you can use to optimize your queries as much as possible and see measurable results in your work. Get started today!

 
SIM50Commented:
during one of the outages a couple of servers were accessible via rdp and icmp from the asa to checkpoint...just trying to get some feedback.

Check encaps and decaps. If you see encaps but no decaps, something happened to the traffic on the other side. It doesn't necessary have to be a vpn issue. It could be routing, server down and etc.
0
 
El FierroNetwork EngineerAuthor Commented:
when i ran the "sh crypto ipsec sa peer x.x.x.x" i did see encaps, the only decaps i saw was for the 2 servers that were up but within 15 mins they were unavailable.the checkpoint guy said it looks like the traffice isnt getting encrypted on your end. he pointed at my asa but i was able to get to my other tunnel perfectly fine....sporadically happens so i will have to wait and see when it happens again.
0
 
SIM50Connect With a Mentor Commented:
If you see encaps, it means your traffic is being encrypted and sent through the tunnel.
0
 
El FierroNetwork EngineerAuthor Commented:
right, here is a kicker ...during that period when everything on that end is unreachable i can't get any icmp replies and the trace route dies. i can ping and access resources my other tunnels resources,internet is up and running fine. btw the other tunnels end is a asa. that's why i am wondering what kind of tweaking must be done on each end.
0
 
SIM50Commented:
during one of the outages a couple of servers were accessible via rdp and icmp from the asa to checkpoint

during that period when everything on that end is unreachable i can't get any icmp replies and the trace route dies

So is it completely unreachable or only some IP's?

Ask Checkpoint admin to provide you with relevant logs and ask him to also do a packet capture.
0
 
El FierroNetwork EngineerAuthor Commented:
we gradually noticed when those outages have happened not everything goes out at once, one server/resource at at time to the point that all ips/servers in this tunnel are unreachable for a small time window. i don't do anything but wait and it fixes it self...they said that they saw a several phase 2 ike errors.don't know how old, but they cleared them...during one of their log checks for traffic activity they didnt see any rdp in their logs yet our dba guy was rdp'd onto the server,he even disconnected and reconnected fine.....they told me to call cisco which i think is a cop out imo.they say everything is fine on our end from they see. i've never encountered something like this and i've set up cisco to sonicwall a few times aside from cisco to cisco which has been over a dozen times. ...there has to be some kind of policy or route summarization that may be causing this.
0
 
El FierroNetwork EngineerAuthor Commented:
because we had to reset both sides of the vpn tunnel configs
0
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

All Courses

From novice to tech pro — start learning today.