Troubleshooting SD-WAN ""
For background information, see SD-WAN Connection Type - "Overlay".
Symptom:
After an SD-WAN link failover, the "" traffic is disconnected and stops passing.
Solution:
-
In Infinity Portal > Quantum SD-WAN application > Network view > SD-WAN Policy page:
-
In the Steering Behavior object "Overlay", make sure you selected the WAN link, to which you expected the traffic to fall back.
As a result, this "" traffic and probing traffic would match the "" steering behavior that uses the WAN link.
-
Make sure that this "" traffic and probing traffic do not match a rule with the Steering Behavior object "Breakout".
-
-
On the Security Gateway, after the SD-WAN link failover:
-
Connect to the command line on the Security Gateway.
-
Log in to Gaia Clish..
-
Make sure that you have at least one VPN tunnel in the status "Up" with the VPN peer:
-
Run:
cpview -
At the top, click Advanced tab > SD-WAN page.
-
Refer to the section Overlay Probing Results > column State.
-
-
Make sure that you have at least one VPN tunnel in the status "Up" with the VPN peer:
-
Run:
cpview -
At the top, click Advanced tab > SD-WAN page.
-
Refer to the section Overlay Probing Results > column State.
-
-
Examine the routing table:
show routeAfter the previously active SD-WAN interface goes down, you must make sure that there is still another active route (either the default route or a static route) that includes the destination for the "" connection.
Without such an active route, the operating system cannot route the "" traffic.
The SD-WAN selects the route to the "" destination (and not the operating system based on a static route).
This route in the operating system is necessary only for the "" traffic to flow from the inbound chain to the outbound chain, where the Security Gateway encrypts the traffic, and SD-WAN selects the best VPN transport to the VPN peer.
-
Examine the VPN connections and their VPN tunnels:
Syntax:
vpn tu conn <Source IP> <Source Port> <Destination IP> <Destination Port> <Protocol>
Note - The minus character "
-" is a wildcard "any".For more information, refer to the CLI Reference Guide for your version > Chapter "VPN Commands" > Section "vpn" > Section "vpn tu".
Example 1:
vpn tu conn - - - - -Example 2:
vpn tu conn 192.168.10.10 - 192.168.20.10 443 6
-
Symptom:
CPView > Advanced > SD-WAN page shows that the state of the "" probing is "DOWN".
Solution:
-
Make sure the nexthop device for the SD-WAN interface is up.
-
Connect to the command line on the Security Gateway.
-
Log in to Gaia Clish..
-
Make sure the VPN tunnel is established and "Up" from the SD-WAN interface to the required interface on the VPN peer:
For more information about these commands, refer to the CLI Reference Guide for your version > Chapter "VPN Commands" > Section "vpn" > Section "vpn tu".
-
Run:
vpn tuand enter the digit 2 for the option "List all IPsec SAs".
-
Run:
vpn tu tlistIf the command output does not show Outbound SA or IPsec SA, then the VPN tunnel is "down".
Example of a "
vpn tu tlist" output:-
The top section shows "
No outbound SA". Meaning, this VPN tunnel is "down". -
The bottom section shows a value in the "
Out SPI" field. Meaning, this VPN tunnel is "up".
-
-
Run:
vpn tu conn <Source IP Address> – <Destination IP Address> – 1
Note - The minus character "
-" is a wildcard "any" because ICMP does not use traffic ports.Example:
vpn tu conn 192.168.3.57 – 172.16.4.68 – 1Run this command with the IP addresses of the overlay probing connection that is down.
The connection must be encrypted and must pass through a VPN tunnel that is "up".
-
-
If the VPN tunnel is "down", then understand why:
-
Examine the Security Gateway logs in SmartConsole / SmartView.
Filter for the applicable Source IP address, Destination IP address, and Ports 500 (IKE) and 4500 (NAT-T).
Determine whether the VPN peers send and respond to the IKE negotiation traffic.
-
Capture the traffic on the Security Gateway with FW Monitor (sk30583).
Filter for the applicable Source IP address, Destination IP address, and Ports 500 (IKE) and 4500 (NAT-T).
Determine whether the VPN peers send and respond to the IKE negotiation traffic.
-
Examine the Security Gateway logs in SmartConsole / SmartView.
Filter for the action "
Key Install".Determine the reason for the failure. For example, an invalid IPsec certificate. The Source IP address of a VPN Gateway is not known to its VPN peer (Invalid ID).
For additional information, see: sk164840, sk88780, sk112054.
-
Collect the VPN debug as described in sk180488.
-
Contact Check Point Support and include the CLI outputs, VPN debug outputs, and log files.
-
-
If VPN tunnel is "up", but CPView shows it as "down", then the Security Gateway does not receive the ICMP Replies from the VPN peer.
-
Make sure the Security Policy on each VPN peer explicitly allows the ICMP Echo Request traffic between these VPN peers on their external interfaces.
-
Make sure the SD-WAN Policy:
-
Matches the ICMP Echo Request traffic between these VPN peers on the "" steering object.
-
Has all available WAN interfaces selected.
-
-
Make sure the Encryption Domain of the Security Gateway does not include the subnets of the SD-WAN peer.
If the Encryption Domain contains the VPN peer subnets, the Security Gateway does not encrypt the traffic it sends to the VPN peer.
-
Capture the traffic on the Security Gateway with FW Monitor (sk30583).
Use the "
-F" parameter to filter for the ICMP package between the Security Gateway and its VPN peer.Example syntax (port "
0" means "any"):fw monitor -F "192.168.22.33,0,141.10.60.1,0,1" -F "172.20.44.55,0,192.168.22.33,0,1"The FW Monitor traffic capture must show:
-
The ICMP Echo Request traffic from the Security Gateway (encrypted in the Pre-Outbound chain "
oE") to the VPN peer. -
The ICMP Echo Reply traffic from the VPN peer to the Security Gateway (decrypted in the Pre-Inbound chain "
iD").
If this ICMP traffic is not encrypted, then:
-
In SmartConsole, examine the Access Control policy.
Make sure there is an explicit rule to accept this ICMP traffic.
-
Open the Security Gateway object > expand Network Management > click VPN Domain.
Make sure you did not exclude the external interface that establish the VPN tunnel from the VPN Domain.
-
Make sure you did not exclude this ICMP traffic in the
crypt.deffile (see sk25675). -
Make sure you did not exclude this ICMP traffic in the corresponding VPN Community object on the Excluded Services page.
If the ICMP Echo Reply traffic from the VPN peer to the Security Gateway does not get to the Post-Inbound chain "
I", then determine why the Security Gateway drops it:-
Examine the Security Gateway logs in SmartConsole / SmartView.
-
Collect the kernel debug:
For more information about the kernel debug procedure on a Security Gateway, see the Security Gateway Guide for your version > chapter "Kernel Debug".
fw ctl zdebug -m fw + drop | grep 'value'
-
-
Symptom:
CPView > Advanced > SDWAN > Probing > the section "Steering Objects Results" does not show the "" steering objects.
Cause:
This is by design.
CPView shows only the "Local Breakout" and "Backhaul" steering objects.
Symptom:
FW Monitor (sk30583) traffic capture of the "" traffic between a client and a server does not show the expected outbound interface on Post-Outbound chain "O".
Cause:
FW Monitor shows the outbound interface based on the routing table.
This does not mean that it was the actual interface that routed the packet.
Solution:
To see the real interface that routed the traffic, do one of these:
-
In the applicable Security Gateway logs, examine the "SD-WAN" section.
-
Capture the ESP / NAT-T traffic with the CPPCAP tool (sk141412) in the Expert mode:
cppcap -i <Name of Interface> -f "esp or port 4500" -o /var/log/cppcap_ESP_NATT.cap -
Examine the VPN connections and their VPN tunnels:
Syntax:
vpn tu conn <Source IP> <Source Port> <Destination IP> <Destination Port> <Protocol>
Note - The minus character "
-" is a wildcard "any".For more information, refer to the CLI Reference Guide for your version > Chapter "VPN Commands" > Section "vpn" > Section "vpn tu".
Example 1:
vpn tu conn - - - - -Example 2:
vpn tu conn 192.168.10.10 - 192.168.20.10 443 6
Symptom:
-
CPView > Advanced > SDWAN > Probing > the section "Overlay Probing Results" does not show the expected VPN Transports to VPN peers.
-
Infinity Portal > Quantum SD-WAN > Monitor view > Dashboard page > Overlay Tunnels Monitoring tab does not shows the expected VPN transports to VPN peers.
For example, there are no VPN transports to a specific VPN Peer, or to a specific interface of a VPN peer.
The kernel debug "
fw ctl zdebug -m fw + drop" on the Security Gateway (see Troubleshooting SD-WAN with Kernel Debug) may show these traffic drops between the IP addresses of the interfaces on the local Security Gateway and the IP addresses of the interfaces on the VPN Peer Security Gateway:
fw_log_drop_ex: Packet proto=1 <Local IP Address>:0 -> <Peer IP Address>:<Port> dropped by vpn_encrypt_chain Reason: encrypt drop; sdwan_get_vpn_transport_id: Could not find transport id, vpn_transport=[<Peer IP Address>, 12, <Peer IP Address>] kiss_htab_bl_get_ret_val=-1 (_set1); vpn_sdwan_get_transport: Could not find transport entry in defaults transports for peer gateway <Peer IP Address>, conn=<dir 1, <Local IP Address>:0 -> <Peer IP Address>:<Port>IPP 1> rule_uuid=<UUID>.;
Solution:
-
In SmartConsole, make sure the names of interfaces in the object of each involved VPN Peer Security Gateway match the names of interfaces in the Operating System.
-
In the object for a Security Gateway that runs the Gaia OS, go to the page Network Management.
-
In the object for a Quantum Spark Gateway that runs the OS, go to the page Topology.
Important - In a cluster object, the names of the Cluster Virtual Interfaces must be identical to the corresponding physical / virtual interfaces on the cluster members. For example, if you paired the interfaces on cluster members with the names "
eth1", then the Cluster Virtual Interface must also have the name "eth1". -
-
In SmartConsole, make sure the involved VPN Peer Security Gateways / Clusters participate in the correct VPN Community.
-
Make sure the involved VPN Peer Security Gateways / Cluster Members have SD-WAN enabled and the Nano-Agent is running and communicating with the Internet:
Note - In a cluster, run these commands on each cluster member.
-
Run:
cpsdwan statThe output must show the SD-WAN policy is installed.
-
Run:
cpnano -sThe output must show the SD-WAN Nano-Services are running, and the connectivity to the Internet did not fail.
-
-
If you recently made changes in the objects of the involved VPN Peer Security Gateways / Clusters, then install the Access Control policy on each VPN Peer Security Gateway / Cluster.
-
On each VPN Peer Security Gateway / Cluster Member, run:
jq . $FWDIR/state/local/SDWAN/sdwan_steering_policy.jsonThe output must show the relevant Security Gateway / each relevant Cluster Member in the section "
sdwan_steering_vpn_peers".-
If the VPN peer does not appear in the output at all, it most probably means one of these (other causes are also possible):
-
The local Security Gateway / Cluster does not have the SD-WAN information about that VPN peer from Infinity Portal.
-
The local Security Gateway / Cluster does not participate in the same VPN community with this VPN peer.
-
-
If the VPN peer appears in the output, then in the section of this VPN peer, the sub-section "
interfaces" must show the configured interfaces and must show the "Circuit ID" number for each interface.
Important - Make sure the same interface name appears in all these places:
-
In the Gaia operating system on the Security Gateway / each Cluster Member.
-
In SmartConsole > Security Gateway / Cluster object > Network Management page.
-
In the
sdwan_steering_policy.jsonfile > in the section "interfaces" > in the "name" value.
-
-
In the upper section of the output, the section "
sdwan_steering_vpn_local" must show the configured interfaces and must show the "Circuit ID" number for each interface for the local Security Gateway / Cluster Member. -
When the VPN Peer Security Gateways / Clusters are managed by the same Security Management Server / Domain Management Server:
-
The section "
sdwan_steering_vpn_local" and the section "sdwan_steering_vpn_peers" must show the same "Domain UUID" value. If the value is not the same in these sections, then these VPN Peers behave if they are managed by different Management Servers. -
If you configured a Global VPN Community on a Multi-Domain Security Management Server, and the VPN Peer Security Gateways / Cluster are managed by different Domain Management Servers:
-
The section "
sdwan_steering_vpn_local" and the section "sdwan_steering_vpn_peers" will show different "Domain UUID" values. -
The section "
sdwan_steering_vpn_peers" will show the names of interfaces on the VPN peers managed as "ifc-<Number>".
Support for "" in a Global VPN Community is available in:
-
R82 and higher
-
R81.20 Jumbo Hotfix Accumulator Take 79 and higher
-
-
Important:
-
If the "
Circuit ID" numbers for the local Security Gateway / Cluster Member and for the VPN Peer are different, then the VPN Transport cannot be created between them. This is by design. -
It is not supported to use a dummy object that represents a Management Server.
For example, in the Security Gateway / Cluster object properties > on the Fetch Policy page.
-
-
Examine the
$FWDIR/log/sdwan_steering.elgfile for errors about the VPN Peer. -
Examine the VPN tunnel details with dedicated tools:
-
Run:
vpn tu tlistThe output must show tunnels with "
From:" and "To:" fields indicating the SD-WAN interfaces on the local Security Gateway / Cluster Member and on the VPN Peer. -
Run:
vpn tu conn - - - - -The output must show connections that are passing between these:
-
Encryption Domain of the local Security Gateway / Cluster Member
-
Encryption Domain of the VPN Peer
The output must show connections with "
From:" and "To:" fields indicating the SD-WAN interfaces on the local Security Gateway / Cluster Member and on the VPN Peer. -
If the above dedicated tools show the VPN tunnels and VPN connections, then this may be a display issue in the CPView tool.
-
-
If the issue persists, then contact Check Point Support and include these files from each the involved Security Gateway:
-
CPinfo file (sk92739)
-
$FWDIR/log/sdwan_steering.elg -
$FWDIR/log/cpsdwan.elg -
$FWDIR/state/local/SDWAN/sdwan_steering_policy.json -
/var/log/nano_agent/cp-nano-sdwan.dbg -
/var/log/nano_agent/cp-nano-orchestration.dbg -
Run this command and include the output file "
/var/log/vpn_tu_tlist.txt":vpn tu tlist >> /var/log/vpn_tu_tlist.txt -
Run this command and include the output file "
/var/log/vpn_tu_conn.txt":vpn tu conn - - - - - >> /var/log/vpn_tu_conn.txt -
Screenshot from CPView:
-
Run:
cpview -
At the top, click Advanced > SDWAN > Probing.
-
If needed, scroll to down to the relevant section.
-
Take a screenshot - press the "C" key.
-
Press the CTRL+C keys to exit the CPView tool.
-
Include the screenshot file "
cpview_<PID>.cap<Number>"This file is created in the current working directory, in which you ran the
cpviewcommand.Example:
cpview_25117.cap0
-
-
Symptoms:
After enabling SD-WAN "" on a Security Gateway, or after adding multiple SD-WAN VPN Peers:
-
Output of the "
top" command shows significant increase in the CPU load in the processes "fw_worker".CPView (sk101878) > CPU > Overview shows significant increase in the CPU load in the "
CoreXL_FW" instances. -
Output of the "
fw tab -t connections -u -s" command (see sk65133) shows significant increase in the number of concurrent connections (the#VALScolumn). -
Output of the "
fwaccel conns" command shows that ICMP connections are forwarded to the Firewall kernel.
Cause:
-
Each SD-WAN "" Peer sends ICMP Echo Request packets to probe the configured next hop (see SD-WAN Probing and Configuring Steering Behavior).
-
When the value of the kernel parameter "
fw_allow_simultaneous_ping" is set to "1" (one), the Security Gateway handles each ICMP Echo Request packet as a new ICMP connection. Therefore, the Security Gateway does not accelerate these ICMP connections in SecureXL, but forwards them to the Firewall kernel for complete inspection.
|
|
Important - Understand why the value of this kernel parameter was set to "1". There are cases when this value is required, so traffic sent directly to Cluster Members over a Site to Site VPN tunnel can reach them. See sk26874. |
Solution:
-
Connect to the command line on the Security Gateway.
-
Log in to Gaia Clish or the Expert mode.
-
Get the current value of the kernel parameter "
fw_allow_simultaneous_ping":fw ctl get int fw_allow_simultaneous_ping -
If the current value of this kernel parameter is "1" (one), then set its value to "0" (zero) temporarily:
fw ctl set int fw_allow_simultaneous_ping 0 -
Examine the CPU load in one of these ways:
-
Run "
cpview" > go to CPU > Overview > examine the CPU load in the "CoreXL_FW" instances. -
Run "
top" > examine the CPU load in the processes "fw_worker".
-
-
To set the value of this kernel parameter to "0" (zero) permanently, run:
fw ctl set -f int fw_allow_simultaneous_ping 0
Symptoms:
-
Traffic that should be routed through the VTI is not encrypted and is sent in clear-text.
-
Local outgoing connections from the SD-WAN Security Gateway's VTI to the remote VPN peer's VTI (for example, BGP traffic) are not encrypted and are sent in clear-text.
-
Kernel debug on the SD-WAN Security Gateway may show this message (when the debug flag "
fw ctl debug -m VPN + policy" is enabled):init_encryption_params: Traffic accepted by a breakout rule - change to clear
Cause:
The traffic is matching a Local Breakout rule, which by design disables VPN encryption.
Solution:
Make sure that all VPN traffic matches an SD-WAN rule with the "Overlay" behavior and not with the "Internet > Local Breakout Only" behavior.
Environment:
-
Product: Quantum Security Gateway / Quantum Spark
-
Features:
-
SD-WAN (Site-to-Site VPN over multiple transports)
-
IPsec VPN (Domain-Based VPN or Route-Based VPN)
-
Symptom:
-
Some or all connections do not pass over a Site-to-Site VPN between SD-WAN peers.
-
Applications that should use (encrypted via SD-WAN transports) fail, or time out.
-
SD-WAN transports appear configured, but specific connections do not work as expected.
Troubleshooting:
Run the following checks on both peers, filtering the same connection on both sides.
On each Security Gateway, run (see the CLI Reference Guide for your version > "fw monitor"):
|
|
In the filters, replace the example IP addresses with your applicable source and destination IP addresses.
Examine how the packet passes through the inspection points in the Security Gateway:
-
"
i" – Packet is entering from NIC (pre-inbound) -
"
I" – Packet is after the inbound chain (post-inbound) -
"
o" – Packet is before the outbound chain (pre-outbound) -
"
O" – Packet is leaving NIC (post-outbound) – should be "Oe" for encrypted traffic
i" chain (no "I", "o", "O")
Cause:
The Security Gateway probably dropped this packet.
If the connection appears only at the "i" inspection point, it usually means the packet was dropped very early (unless destination NAT changes the destination IP address, so it no longer matches your "fw monitor" filter).
Next steps:
-
Connect to the command line on the Security Gateway.
-
Log in to the Expert mode.
-
Start the script capture:
script /var/log/drops.txt -
Run the kernel debug for drops:
fw ctl zdebug + drop -
Reproduce the problematic connection.
-
Stop the script capture.
Press the CTRL+D keys.
-
Examine the output file for relevant drops:
/var/log/drops.txt
If you see this line:
|
|
this means:
-
There is no SD-WAN rule match for this connection.
-
Because traffic requires an SD-WAN rule, the packet is dropped.
Additional prints that can indicate the same issue - usually requires further verification in a full kernel debug (see Troubleshooting SD-WAN with Kernel Debug):
|
|
|
|
|
|
In such cases, the Security Gateway log in SmartConsole may show the action as "Accept" instead of "Encrypt".
Solution:
-
Make sure your SD-WAN rule base covers this traffic with an steering object.
-
Verify that:
-
Source, destination, services, and applications match the rule.
-
The SD-WAN profile that contains this rule is correctly assigned to both peers.
-
You can verify the rule match for this connection with this command in the Expert mode:
fw ctl zdebug -m SDWANRB all | grep PROB
-
i", "I" chains (no "o", "O")
Cause:
-
The operating system on the Security Gateway does not have a route to the destination.
-
There is no routed outbound interface, so the Security Gateway cannot forward the packet.
-
For the R82 Security Gateway that runs SecureXL in the UPPAK mode, there may be a route to the destination that points to a dead next hop (no ARP resolution).
Next steps:
-
Connect to the command line on the Security Gateway.
-
Log in to Gaia Clish.
-
Examine the static routes:
show route
Solution:
-
Ensure you have default routes with different priorities for all your ISPs.
-
If needed, add specific routes to all networks via private links (for example, MPLS interfaces).
-
In Route-Based VPN setups, make sure routes to remote networks point to the VTI interfaces that connect to the VPN peer.
-
For the R82 Security Gateway that runs SecureXL in the UPPAK mode, make sure that the active route points to a live next hop.
i", "I", "o" chains (no "O")
Cause:
The Security Gateway stops processing the packet during the outbound - before it could send it / encrypt it (unless source NAT changes the source IP address and your "fw monitor" filter no longer matches).
To see where exactly the Security Gateway stops processing the packet, add "-p all" in the syntax:
|
|
In the filters, replace the example IP addresses with your applicable source and destination IP addresses.
|
|
Warning - This syntax prints many lines. This increases the CPU utilization on the Security Gateway. |
Use this "fw monitor" syntax together with a full kernel debug (see Troubleshooting SD-WAN with Kernel Debug) to understand where and why the connection stops (for example, VPN policy, routing, SD-WAN).
i", "I", "o", "O", "Oe"
This usually indicates that the Security Gateway routed and encrypted the packet.
In rare cases, even when the packet reaches the "Oe" chain, it may still fail to be encrypted at a later stage. In such scenarios, a relevant drop is usually visible when running:
|
|
For these cases, collect a full kernel debug together with VPN debug.
To confirm that the packet was successfully encapsulated and sent over the wire, run the tcpdump command on both sides for ESP or NAT-T packets that carry the encapsulated traffic. This helps verify that the packet was transmitted and whether it was received by the peer gateway.
vpn tu conn" command while reproducing the problematic connection
Syntax:
|
|
|
|
Note - The minus character " |
For more information, refer to the CLI Reference Guide for your version > Chapter "VPN Commands" > Section "vpn" > Section "vpn tu".
The output for a normally encrypted connection should look similar to this:
instance <X>: 'src=[<IP>,<sport>], dest=[<IP>,<dport>], <Protocol>' Encrypted +-----------------------------------------+-----------------------+---------------------+ | Peer: <Main Peer IP> - <Peer Name> | MSA: XXXXXXXXXX | i: 1 ref: X | | From: <Local Tunnel Interface IP> | | i: 3 ref: X | | To: <Remote Tunnel Interface IP> | | | | Methods: ESP Tunnel PFS AES-256 SHA1 g..| | | | My TS: x.x.x.x/x | | | | Peer TS: x.x.x.x/x | | | | MSPI: XXXXXX (i: 1, p: 0) | Out SPI: XXXXXX | | | Tunnel created: <DATE,TIME> | [Optional:NAT-T] | | | Tunnel expiration: <DATE,TIME> | | | +-----------------------------------------+-----------------------+---------------------+ |
On the receiving Security Gateway, the "vpn tu conn" command will show the tunnel details for the reply packets of this connection.
Based on the "vpn tu conn" output, follow the applicable scenario below.
vpn tu conn" output shows "From" and "To" fields and valid "Out SPI"
If the "vpn tu conn" output shows:
-
The "
From" and "To" fields (then this is a Tunnel Per Interface (TPI) transport - the SDWAN-style) -
A valid "
Out SPI"
then the traffic is encrypted.
If the connection still does not work:
-
Run the "
fw monitor" command on both Security Gateways to see where packets or replies are failing. -
Run the "
tcpdump" command on both Security Gateways to make sure the ESP / NAT-T packets (encapsulated data) reach the other side without loss. -
Collect a full kernel debug on both Security Gateways (see Troubleshooting SD-WAN with Kernel Debug).
vpn tu conn" output does not show "From" and "To" fields
If the "vpn tu conn" output does not show the "From" and "To" fields, this tunnel is using the Legacy Link Selection (not the SD-WAN TPI Overlay)
-
Verify the peer is identified as an SD-WAN Peer in:
CPView (sk101878) > Advanced > SD-WAN > Overlay probing results
-
If the CPView does not show the peer, refer to:
vpn tu conn" output shows "From" and "To" fields, does not show valid "Out SPI", shows tunnel state as "Disconnected
If the "vpn tu conn" output:
-
Show the "
From" and "To" fields -
Does not show a valid "
Out SPI" -
Shows the tunnel state as "
Disconnected"
then the VPN tunnel is Down, and the connection is still trying to use it.
In the "fw ctl zdebug + drop" output you will see drops like this:
|
|
Troubleshooting:
-
Check if other TPI tunnels to this peer are connected:
vpn tu tlist -p <Main IP address of Peer>If there are other connected TPI tunnels, the connection should have used them:
-
Make sure the traffic is covered by an steering object that uses all available WAN links.
-
If CPView (sk101878) > Advanced > SD-WAN > Overlay probing results shows all transports to this peer as "
DOWN", even though there are VPN tunnels in the status "UP" (as the "vpn tu tlist" command shows), this can explain why a random tunnel is chosen for a connection. In this case, follow Troubleshooting SD-WAN "Overlay".
-
-
If there are no other connected tunnels to this peer:
-
Capture the IKE negotiation traffic on both peers:
tcpdump -nnei <Name of Interface> host <IP Address of Tunnel Peer> and port 500 or port 4500 -
Verify:
-
No NAT is applied on outbound IKE packets:
-
Source IP address is as expected.
-
Source ports remain 500 / 4500 (not translated to a high port).
-
-
All packets flow in both directions.
-
No drops for IKE packets ("
fw ctl zdebug + drop").
-
-
Collect the VPN debug on both sides:
-
Contact Check Point Support to investigate the IKE negotiation issue.
-
vpn tu conn" output shows "instance <X> ... Clear"
Make sure the traffic is not matching these:
-
Implied rules.
-
Services that you excluded in the settings of the applicable VPN Community.
If it is unclear why the traffic is handled in clear, enable the kernel debug. For more information, see the Security Gateway Guide for your version > chapter "Kernel Debug".
If the "vpn tu conn" output shows:
|
|
instead of:
|
|
this means the Security Gateway did not attempt to encrypt the connection, and sent the traffic in clear.
Troubleshooting:
-
For Domain-Based VPN, make sure the applicable source IP address and destination IP address are included in the VPN Domains on both peers:
fw tab -t vpn_routing -u -
For Route-Based VPN:
-
Make sure the destination IP address is routed through the VTI of the VPN peer.
Run in Gaia Clish:
show route -
In the "
fw monitor", the outbound interface (o,O) should be the VTI. -
Make sure the VTI is valid. Otherwise, the Security Gateway drops the traffic ("
fw ctl zdebug + drop"). -
SD-WAN Local Breakout Only - make sure the connection is not matching a Local Breakout Only steering object that forces clear-text routing instead of VPN / for Route-Based VPN.
-
Check the SD-WAN rule matching for the connection in the Expert mode:
fw ctl zdebug -m SDWANRB all | grep PROB -
Verify the connection matches the expected rule.
-
-
Use this procedure when:
-
There are VPN tunnels in the status "UP" to the VPN peer.
-
The VPN peer is identified as an SD-WAN peer.
-
But Overlay traffic still does not work as expected.
Follow the instructions in Troubleshooting SD-WAN with Kernel Debug.