• Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 83
  • Last Modified:

Cisco ASA Checkpoint firewall Site to Site Tunnel

Hello EE
Have anyone of you folks ever had any issues with traffic not passing through randomly between a cisco asa 5510 8.2(5) and a checkpoint FW?
I dont have access to the checkpoint firewall nor do i know much about the appliance.

Just to clarify the tunnel from the cisco side shows everything is peachy but once a month or so traffic will stop flowing for about 30 mins. then it magically fixes it self. During the outage running "show crypto isakmp sa" and show crypto ipsec sa" shows everything is fine.
i have another tunnel to another cisco asa and it's totally fine.

I am stumped on this but ran across this post on the cisco forums that is very identical to my issue.

https://supportforums.cisco.com/discussion/11327601/cant-fix-problem-between-asa-checkpoint-vpn

any input or second opinions are welcome
Thanks
0
El Fierro
Asked:
El Fierro
  • 6
  • 4
2 Solutions
 
SIM50Commented:
It's hard to tell with the info you provided. During the outage,  when you do sh cry ipsec sa, do you see encaps but no decaps or decaps but no encaps? Are there any related messages in the syslog? Is the other side up? Do you have DPD setup?
0
 
El FierroNetwork EngineerAuthor Commented:
its an oddity because from both ends it seems fine from whatt the heckpoint fw guy said. hes pointing the finger at cisco of course....would super netting or the simplified /traditional cuz routing issues on the checkpoint cause this? during one of the outages a couple of servers were accessible via rdp and icmp from the asa to checkpoint...just trying to get some feedback.
0
 
SIM50Commented:
during one of the outages a couple of servers were accessible via rdp and icmp from the asa to checkpoint...just trying to get some feedback.

Check encaps and decaps. If you see encaps but no decaps, something happened to the traffic on the other side. It doesn't necessary have to be a vpn issue. It could be routing, server down and etc.
0
Windows Server 2016: All you need to know

Learn about Hyper-V features that increase functionality and usability of Microsoft Windows Server 2016. Also, throughout this eBook, you’ll find some basic PowerShell examples that will help you leverage the scripts in your environments!

 
El FierroNetwork EngineerAuthor Commented:
when i ran the "sh crypto ipsec sa peer x.x.x.x" i did see encaps, the only decaps i saw was for the 2 servers that were up but within 15 mins they were unavailable.the checkpoint guy said it looks like the traffice isnt getting encrypted on your end. he pointed at my asa but i was able to get to my other tunnel perfectly fine....sporadically happens so i will have to wait and see when it happens again.
0
 
SIM50Commented:
If you see encaps, it means your traffic is being encrypted and sent through the tunnel.
0
 
El FierroNetwork EngineerAuthor Commented:
right, here is a kicker ...during that period when everything on that end is unreachable i can't get any icmp replies and the trace route dies. i can ping and access resources my other tunnels resources,internet is up and running fine. btw the other tunnels end is a asa. that's why i am wondering what kind of tweaking must be done on each end.
0
 
SIM50Commented:
during one of the outages a couple of servers were accessible via rdp and icmp from the asa to checkpoint

during that period when everything on that end is unreachable i can't get any icmp replies and the trace route dies

So is it completely unreachable or only some IP's?

Ask Checkpoint admin to provide you with relevant logs and ask him to also do a packet capture.
0
 
El FierroNetwork EngineerAuthor Commented:
we gradually noticed when those outages have happened not everything goes out at once, one server/resource at at time to the point that all ips/servers in this tunnel are unreachable for a small time window. i don't do anything but wait and it fixes it self...they said that they saw a several phase 2 ike errors.don't know how old, but they cleared them...during one of their log checks for traffic activity they didnt see any rdp in their logs yet our dba guy was rdp'd onto the server,he even disconnected and reconnected fine.....they told me to call cisco which i think is a cop out imo.they say everything is fine on our end from they see. i've never encountered something like this and i've set up cisco to sonicwall a few times aside from cisco to cisco which has been over a dozen times. ...there has to be some kind of policy or route summarization that may be causing this.
0
 
El FierroNetwork EngineerAuthor Commented:
we reset both sides of the tunnel to make sure both sides matched phase 1 and 2 security
0
 
El FierroNetwork EngineerAuthor Commented:
because we had to reset both sides of the vpn tunnel configs
0

Featured Post

What Security Threats Are We Predicting for 2018?

Cryptocurrency, IoT botnets, MFA, and more! Hackers are already planning their next big attacks for 2018. Learn what you might face, and how to defend against it with our 2018 security predictions.

  • 6
  • 4
Tackle projects and never again get stuck behind a technical roadblock.
Join Now