<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: R77.30 VPN to AWS - Manually defined encryption domain (subnet clash) in Cloud Firewall</title>
    <link>https://community.checkpoint.com/t5/Cloud-Firewall/R77-30-VPN-to-AWS-Manually-defined-encryption-domain-subnet/m-p/24247#M3934</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You can try some of the solutions listed here:&lt;/P&gt;&lt;P&gt;&lt;A class="link-titled" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk106837&amp;amp;partition=General&amp;amp;product=IPSec" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk106837&amp;amp;partition=General&amp;amp;product=IPSec"&gt;Troubleshooting Overlapping Encryption Domains Issues&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If I recall correctly, I've used some crazy NAT rules to phantom objects to overcome similar issue.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 19 Jan 2018 19:00:45 GMT</pubDate>
    <dc:creator>Vladimir</dc:creator>
    <dc:date>2018-01-19T19:00:45Z</dc:date>
    <item>
      <title>R77.30 VPN to AWS - Manually defined encryption domain (subnet clash)</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/R77-30-VPN-to-AWS-Manually-defined-encryption-domain-subnet/m-p/24246#M3933</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Folks,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I was hoping you could help me out with a query. I'm in the process of setting up a VPN to Amazon AWS. Following the checkpoint guide below.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Solution ID: sk100726&lt;/P&gt;&lt;P&gt;&lt;A class="link-titled" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk100726" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk100726"&gt;How to configure IPsec VPN tunnel between Check Point Security Gateway and Amazon Web Services VPC using static routes&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I had a question around the statement below:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-1 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/62173_pastedImage_2.png" style="width: 620px; height: 47px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What needs to be done in the instance that a local network that will be served by the AWS VPN is already defined manually as part of another existing VPN domain on the R77.30 cluster?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am unable to remove it from the existing VPN domain as per the instruction because the local subnet will continue to require access via the existing VPN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance guys.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 19 Jan 2018 10:09:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/R77-30-VPN-to-AWS-Manually-defined-encryption-domain-subnet/m-p/24246#M3933</guid>
      <dc:creator>Denis_Clancy</dc:creator>
      <dc:date>2018-01-19T10:09:11Z</dc:date>
    </item>
    <item>
      <title>Re: R77.30 VPN to AWS - Manually defined encryption domain (subnet clash)</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/R77-30-VPN-to-AWS-Manually-defined-encryption-domain-subnet/m-p/24247#M3934</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You can try some of the solutions listed here:&lt;/P&gt;&lt;P&gt;&lt;A class="link-titled" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk106837&amp;amp;partition=General&amp;amp;product=IPSec" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk106837&amp;amp;partition=General&amp;amp;product=IPSec"&gt;Troubleshooting Overlapping Encryption Domains Issues&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If I recall correctly, I've used some crazy NAT rules to phantom objects to overcome similar issue.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 19 Jan 2018 19:00:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/R77-30-VPN-to-AWS-Manually-defined-encryption-domain-subnet/m-p/24247#M3934</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2018-01-19T19:00:45Z</dc:date>
    </item>
    <item>
      <title>Re: R77.30 VPN to AWS - Manually defined encryption domain (subnet clash)</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/R77-30-VPN-to-AWS-Manually-defined-encryption-domain-subnet/m-p/24248#M3935</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank Vladimir, I'll dig through that article.&lt;/P&gt;&lt;P&gt;Denis&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 22 Jan 2018 09:48:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/R77-30-VPN-to-AWS-Manually-defined-encryption-domain-subnet/m-p/24248#M3935</guid>
      <dc:creator>Denis_Clancy</dc:creator>
      <dc:date>2018-01-22T09:48:55Z</dc:date>
    </item>
  </channel>
</rss>

