<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: VPN tunnel between checkpoints in Cloud Firewall</title>
    <link>https://community.checkpoint.com/t5/Cloud-Firewall/VPN-tunnel-between-checkpoints/m-p/162999#M703</link>
    <description>&lt;P&gt;You definitely want to consider calling TAC to verify your configuration. &amp;nbsp;At first glance, this looks like you are running into the known collision between route-based VPN and domain-based VPN (VPN encryption domain groups). &amp;nbsp;To work around this, you can define VPN domains-per-community for each gateway. &amp;nbsp;Be sure you have an empty object group (yep, a group with zero objects in it). &amp;nbsp;Edit the community, select the center and start gateways, then edit the VPN domain on each gateway to use the empty group object.&lt;/P&gt;
&lt;P&gt;I'd also suggest unchecking "allow all encrypted traffic" in the community. &amp;nbsp;This could lead to these sorts of unintended consequences, but you can try with/without it.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Typically, for route-based VPNs, you need to use VPN Directional match in the rules. &amp;nbsp;You first need to enable directional match in Global Properties - VPN - Advanced. &amp;nbsp;In a given VPN rule for those gateways, edit the VPN column, and choose "Directional match" option, and create three separate entries:&lt;/P&gt;
&lt;P&gt;internal_clear -&amp;gt; &amp;lt;community name&amp;gt;&lt;/P&gt;
&lt;P&gt;&amp;lt;community name&amp;gt; -&amp;gt; internal_clear&lt;/P&gt;
&lt;P&gt;&amp;lt;community name&amp;gt; -&amp;gt; &amp;lt;community name&amp;gt;&lt;/P&gt;
&lt;P&gt;You said you have BGP between VPN peers, so I presume you have VTIs configured and operational. &amp;nbsp;You will want to review your route-maps to make sure you are dong AS PATH filtering, possibly pre-pending, to make sure you don't have one gateway end up being an inadvertent hub (unless you want that; but then you have to edit your VPN directional match rules to allow traffic to flow correctly).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Good luck!&lt;/P&gt;</description>
    <pubDate>Wed, 23 Nov 2022 23:01:08 GMT</pubDate>
    <dc:creator>Duane_Toler</dc:creator>
    <dc:date>2022-11-23T23:01:08Z</dc:date>
    <item>
      <title>VPN tunnel between checkpoints</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/VPN-tunnel-between-checkpoints/m-p/162929#M701</link>
      <description>&lt;P&gt;Hi, guys nice to be part of this community.&lt;/P&gt;&lt;P&gt;This is my first time with checkpoint and I'm facing bizarre behavior.&lt;/P&gt;&lt;P&gt;We have a&amp;nbsp;Check Point Gaia R81.10 cloud version running on AWS; on the other hand, a Cluster XL 81.10.&lt;/P&gt;&lt;P&gt;Both of them have multiple (at least 5) IPsec VPN tunnels to different non-checkpoint gateways that are working without any problem. We use those tunnels to share BGP routes between the gw and CP-FWs&lt;/P&gt;&lt;P&gt;The issue starts when we try to create a VPN tunnel with the CP on AWS and the Cluster using the next config.&lt;/P&gt;&lt;P&gt;VPN COMMUNITY: TEST&amp;nbsp;&lt;/P&gt;&lt;P&gt;Star Community&amp;nbsp;&lt;/P&gt;&lt;P&gt;center: CP-AWS&amp;nbsp; Satellite: CP-CLUSTER XL&lt;/P&gt;&lt;P&gt;VPN domain route-based,&lt;/P&gt;&lt;P&gt;allow traffic,&lt;/P&gt;&lt;P&gt;any encryption,&lt;/P&gt;&lt;P&gt;tunnel management per gateway no permanent&lt;/P&gt;&lt;P&gt;and then everything by default&amp;nbsp;&lt;/P&gt;&lt;P&gt;As soon as we create the tunnel we saw in the Checkpoint smartview Monitor that the tunnel was created with the incorrect members.&lt;/P&gt;&lt;P&gt;Like: on TEST community CP-CLUSTER XL to NONCPGW(an interoperable device)&lt;/P&gt;&lt;P&gt;They are not (CP-AWS and the NONCPGW) in the same subnet or something similar, the only thing that they share is that both of the CP-FW have a tunnel and a session BGP to this&amp;nbsp;NONCPGW.&lt;/P&gt;&lt;P&gt;Did you face this behavior before? maybe an SK related?&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 23 Nov 2022 12:51:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/VPN-tunnel-between-checkpoints/m-p/162929#M701</guid>
      <dc:creator>Roh_oh</dc:creator>
      <dc:date>2022-11-23T12:51:51Z</dc:date>
    </item>
    <item>
      <title>Re: VPN tunnel between checkpoints</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/VPN-tunnel-between-checkpoints/m-p/162972#M702</link>
      <description>&lt;P&gt;Not sure how the gateway would handle getting the same set of routes from multiple gateways with Route-Based VPN.&lt;BR /&gt;The only thing I can suggest outside of a TAC case is to filter the relevant routes from the other peer.&lt;/P&gt;</description>
      <pubDate>Wed, 23 Nov 2022 18:35:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/VPN-tunnel-between-checkpoints/m-p/162972#M702</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2022-11-23T18:35:32Z</dc:date>
    </item>
    <item>
      <title>Re: VPN tunnel between checkpoints</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/VPN-tunnel-between-checkpoints/m-p/162999#M703</link>
      <description>&lt;P&gt;You definitely want to consider calling TAC to verify your configuration. &amp;nbsp;At first glance, this looks like you are running into the known collision between route-based VPN and domain-based VPN (VPN encryption domain groups). &amp;nbsp;To work around this, you can define VPN domains-per-community for each gateway. &amp;nbsp;Be sure you have an empty object group (yep, a group with zero objects in it). &amp;nbsp;Edit the community, select the center and start gateways, then edit the VPN domain on each gateway to use the empty group object.&lt;/P&gt;
&lt;P&gt;I'd also suggest unchecking "allow all encrypted traffic" in the community. &amp;nbsp;This could lead to these sorts of unintended consequences, but you can try with/without it.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Typically, for route-based VPNs, you need to use VPN Directional match in the rules. &amp;nbsp;You first need to enable directional match in Global Properties - VPN - Advanced. &amp;nbsp;In a given VPN rule for those gateways, edit the VPN column, and choose "Directional match" option, and create three separate entries:&lt;/P&gt;
&lt;P&gt;internal_clear -&amp;gt; &amp;lt;community name&amp;gt;&lt;/P&gt;
&lt;P&gt;&amp;lt;community name&amp;gt; -&amp;gt; internal_clear&lt;/P&gt;
&lt;P&gt;&amp;lt;community name&amp;gt; -&amp;gt; &amp;lt;community name&amp;gt;&lt;/P&gt;
&lt;P&gt;You said you have BGP between VPN peers, so I presume you have VTIs configured and operational. &amp;nbsp;You will want to review your route-maps to make sure you are dong AS PATH filtering, possibly pre-pending, to make sure you don't have one gateway end up being an inadvertent hub (unless you want that; but then you have to edit your VPN directional match rules to allow traffic to flow correctly).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Good luck!&lt;/P&gt;</description>
      <pubDate>Wed, 23 Nov 2022 23:01:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/VPN-tunnel-between-checkpoints/m-p/162999#M703</guid>
      <dc:creator>Duane_Toler</dc:creator>
      <dc:date>2022-11-23T23:01:08Z</dc:date>
    </item>
    <item>
      <title>Re: VPN tunnel between checkpoints</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/VPN-tunnel-between-checkpoints/m-p/163009#M704</link>
      <description>&lt;P&gt;I agree with&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/694"&gt;@Duane_Toler&lt;/a&gt;&amp;nbsp;, he brought up very good points. You also need to consider the following things...&lt;/P&gt;
&lt;P&gt;-empty enc domain for the 3rd party&lt;/P&gt;
&lt;P&gt;-VTI (virtual tunnel interface) config&lt;/P&gt;
&lt;P&gt;-vpn config file from AWS side&lt;/P&gt;
&lt;P&gt;Check out below post where I provided some info, hope it helps. If you need clarification, happy to help you. I get its CP to CP, but since AWS platform is involved, it may have to route based.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.checkpoint.com/t5/Security-Gateways/Route-based-VPN-failover-issue/m-p/155553#M26519" target="_blank" rel="noopener"&gt;https://community.checkpoint.com/t5/Security-Gateways/Route-based-VPN-failover-issue/m-p/155553#M26519&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 24 Nov 2022 01:49:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/VPN-tunnel-between-checkpoints/m-p/163009#M704</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2022-11-24T01:49:38Z</dc:date>
    </item>
    <item>
      <title>Re: VPN tunnel between checkpoints</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/VPN-tunnel-between-checkpoints/m-p/163164#M705</link>
      <description>&lt;P&gt;Thank you guys, your clarifications are very useful!&lt;/P&gt;&lt;P&gt;Agreed with all your comments I will follow this with the TAC. I find a workaround, using ike2 only but is not a solution for me.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks again&lt;/P&gt;</description>
      <pubDate>Fri, 25 Nov 2022 11:00:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/VPN-tunnel-between-checkpoints/m-p/163164#M705</guid>
      <dc:creator>Roh_oh</dc:creator>
      <dc:date>2022-11-25T11:00:50Z</dc:date>
    </item>
    <item>
      <title>Re: VPN tunnel between checkpoints</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/VPN-tunnel-between-checkpoints/m-p/163170#M706</link>
      <description>&lt;P&gt;Glad the post helped you. As I said, if you need more clarification, let me know!&lt;/P&gt;</description>
      <pubDate>Fri, 25 Nov 2022 11:33:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/VPN-tunnel-between-checkpoints/m-p/163170#M706</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2022-11-25T11:33:26Z</dc:date>
    </item>
  </channel>
</rss>

