Hi all, been having a frustrating issue on a IKEv2 S2S VPN from our ASA to the customer’s Checkpoint and wondering if anyone has encountered anything similar.
Basically, both sides can bring up the tunnel with interesting traffic with both phases negotiating successfully - however, when the tunnel is brought up from the ASA side the tunnel is unstable; we only seem to get unidirectional traffic (see bytes tx but nothing rx) - TCP pings from the ASA time out, and then the tunnel tears itself down after a couple of minutes with log messages simply saying ‘reason: peer lost’. When the tunnel is brought up from the Checkpoint side however, the tunnel comes up and there are zero issues - we can successfully TCP ping from the ASA and the tunnel doesn’t tear itself down.
During troubleshooting the engineer on the Checkpoint side confirmed that the tunnel comes up with both phases negotiated correctly when initiated from the ASA, and then said he was seeing the tunnel tear down due to DPD on the ASA (apparently they have disabled DPD on the Checkpoint).
As such, I have disabled DPD for this tunnel (setting the Idle Timeout on the tunnel’s group policy to Unlimited - I believe this disables DPD correct?) but I’m still seeing the same issues when initiating the tunnel from the ASA.
Q1: Post change I am seeing logs - “Local: x.x.x.x:4500 Remote: x.x.x.x:4500 Username: x.x.x.x IKEv2 need to send a DPD message to peer” → is this saying the ASA has received a DPD R-U-There message and needs to respond or is it saying the ASA is sending R-U-There messages to the Checkpoint and needs a response?
Q2: One difference I have noticed when the tunnel is initiated from the Checkpoint is that the tunnel SA is listed as “IKEv2 IPsecOverNatT” whereas when the tunnel is initiated from the ASA the SA is listed as just “IKEv2 IPsec”. I would say this is the biggest indicator of the issue, but I can’t figure out why it would be causing an issue when NAT-T is enabled on the ASA and presumably it’s enabled on the Checkpoint if tunnels initiated from there negotiate with an ipsecovernatt SA. Does anyone have any past experience with a situation similar to this?
EDIT:
Believe I’ve finally cracked it, disabling DPD stopped the tunnel tearing itself down so quickly after being initiated but the tunnel still seemed to be stuck and unable to reach the subnets in the remote encrypt domain (lots of UDP:4500 packets discarded in the logs), I’ve just disabled NAT-Traversal for this tunnel on the ASA and boom, I can bring the tunnel up with successful TCP pings.
To be sure the issue is resolved I’ll need the customer to try initiating the tunnel from their side as it may be that the tunnel can only be brought up from their side with the use of NAT-T (potentially some funny PAT/NAT on their side that they didn’t tell me about).
Thanks for the suggestions and input.
Edit2: Customer tested and tunnel can be brought up in a working state from both sides now, job done
Cheers, Lie