Symptoms | |||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||
Cause | |||||||||||||||||||||||||||||||
The Error message indicates a failure in the IPSec Security Association negotiations process: specifically a function timeout occurred. The two most common causes of function timeouts are:
The message indicates the SA's expired, but does not indicate the root cause of the problem. Other SmartView Tracker messages, before or after the "sk19423 Error", provide more information about the issue. | |||||||||||||||||||||||||||||||
Solution | |||||||||||||||||||||||||||||||
Most of the time, this message is displayed due to interoperability issues. In such cases the VPN-1 VPN Interoperability document should assist you in resolving your issue. You can also review SmartView Tracker for other information/error messages before or after the "sk19423 error". Specifically, check to see if an IKE negotiation has failed or succeeded: Procedure:
Be sure to verify the system clocks for all Security Gateways included in the VPN are synchronized. Unsynchronized system clocks can contribute to the symptom. If the negotiation was successful: A log entry in SmartView Tracker is displayed. The "Action" field of this entry displays the text "Key Install" and the "Information" field reads "IKE: Quick Mode completion". In case the IKE negotiation was successful, no corrective action for the "sk19423 error" is required. If the negotiation failed: Log entries display the "Encryption Scheme" field containing the text "IKE". The log entries vary but more accurately pinpoint the problem. Use these information/error messages to search SecureKnowledge for specific fix(es). If additional IKE error messages do not exist, and a VPN connection is not working, generate a VPN debug report and open a Service Request with Check Point Support. Troubleshooting encryption errors that spawn the sk19423 message in various configurations: These encryption failures occur when no IPSEC SA (Security Association) is found for a connection. Log message: "Packet is dropped because an IPSEC SA associated with the SPI on the received IPSEC packet could not be found."
|
Labels
- Cheat Sheets (7)
- Checkpoint (159)
- Cisco (24)
- Commands (5)
- Fortigate (2)
- Frame-Relay (9)
- Linux (3)
- Netscaler (29)
- Netscreen (2)
- Nokia (7)
- UNIX (2)
Live Traffic
Error: "Packet is dropped because there is no valid SA - please refer to solution sk19423 in SecureKnowledge Database for more information"
12/30/2010 04:21:00 AM
Posted by MK | Filed Under Checkpoint | 1 Comments
Comments
Search This Blog
Blog Archive
-
▼
2010
(146)
-
▼
December
(13)
- What's New in R75
- Error: "Packet is dropped because there is no vali...
- How to configure automatic backups in SecurePlatform
- How to Set Up a Site-to-Site VPN with a 3rd-party ...
- How to Configure Management HA
- How To Troubleshoot Memory Leaks on IPSO
- How to troubleshoot failovers in ClusterXL
- Backup procedures for Checkpoint
- Best practices Checkpoint Provider-1
- Check Point logging issues when the Management Ser...
- Checkpoint : Nokia Hardware - Model - Serial Number
- TCP DUMP - Deep Inside
- R75 was released!
-
▼
December
(13)
Check validity certificate gateway. Gateway properties-ipsec vpn-repository certificate-renew. Go install policy