<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SD WAN and Domain based VPN in SD-WAN</title>
    <link>https://community.checkpoint.com/t5/SD-WAN/SD-WAN-and-Domain-based-VPN/m-p/265714#M275</link>
    <description>&lt;P&gt;Mostly yes to all of the above. SD WAN sees the tunnel as up. At times during testing we've been able to get traffic one way and not the other. At other times no traffic period. The monitor commands do not show why it's not being encrypted. As best we can tell SD WAN is simply not sending the traffic across the tunnel. We can see the SD WAN dashboard that traffic isn't even hitting the steering object despite having the rules from the guide in place.&lt;/P&gt;</description>
    <pubDate>Thu, 18 Dec 2025 18:37:53 GMT</pubDate>
    <dc:creator>cjames88</dc:creator>
    <dc:date>2025-12-18T18:37:53Z</dc:date>
    <item>
      <title>SD WAN and Domain based VPN</title>
      <link>https://community.checkpoint.com/t5/SD-WAN/SD-WAN-and-Domain-based-VPN/m-p/265670#M269</link>
      <description>&lt;P&gt;I'm looking for people that are successfully using SDWAN and domain based VPN on both GAIA and GAIA embedded devices. We are currently waiting on our vendor to get a time scheduled with a checkpoint engineer to figure out why SD WAN won't allow traffic to pass thru the tunnel in our environment. Our vendor has confirmed we did everything correct per checkpoint documentation, which is why it's been escalated to checkpoint. At this point I'm just looking for anyone that has this successfully working and can tell me some things they ran into not in the documentation I should take a look at.&lt;/P&gt;</description>
      <pubDate>Thu, 18 Dec 2025 15:29:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SD-WAN/SD-WAN-and-Domain-based-VPN/m-p/265670#M269</guid>
      <dc:creator>cjames88</dc:creator>
      <dc:date>2025-12-18T15:29:28Z</dc:date>
    </item>
    <item>
      <title>Re: SD WAN and Domain based VPN</title>
      <link>https://community.checkpoint.com/t5/SD-WAN/SD-WAN-and-Domain-based-VPN/m-p/265702#M270</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;please send me in private the SR number and I will try to assist,&lt;/P&gt;</description>
      <pubDate>Thu, 18 Dec 2025 17:27:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SD-WAN/SD-WAN-and-Domain-based-VPN/m-p/265702#M270</guid>
      <dc:creator>AmirArama</dc:creator>
      <dc:date>2025-12-18T17:27:12Z</dc:date>
    </item>
    <item>
      <title>Re: SD WAN and Domain based VPN</title>
      <link>https://community.checkpoint.com/t5/SD-WAN/SD-WAN-and-Domain-based-VPN/m-p/265704#M271</link>
      <description>&lt;P&gt;I have access from Perimeter 81 (sase) to CP onprem and Azure cluster, mind you, it is route based.&lt;/P&gt;</description>
      <pubDate>Thu, 18 Dec 2025 17:59:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SD-WAN/SD-WAN-and-Domain-based-VPN/m-p/265704#M271</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-12-18T17:59:05Z</dc:date>
    </item>
    <item>
      <title>Re: SD WAN and Domain based VPN</title>
      <link>https://community.checkpoint.com/t5/SD-WAN/SD-WAN-and-Domain-based-VPN/m-p/265710#M272</link>
      <description>&lt;P&gt;I don't actually have the SR, my vendor has it. At this point I'm just grasping at straws trying to figure out what I missed.&lt;/P&gt;</description>
      <pubDate>Thu, 18 Dec 2025 18:32:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SD-WAN/SD-WAN-and-Domain-based-VPN/m-p/265710#M272</guid>
      <dc:creator>cjames88</dc:creator>
      <dc:date>2025-12-18T18:32:34Z</dc:date>
    </item>
    <item>
      <title>Re: SD WAN and Domain based VPN</title>
      <link>https://community.checkpoint.com/t5/SD-WAN/SD-WAN-and-Domain-based-VPN/m-p/265711#M273</link>
      <description>&lt;P&gt;This is a pretty different scenario. This is checkpoint to checkpoint VPN with SD WAN running on the appliance. From best we can tell SD WAN isn't letting traffic be sent across the tunnels.&lt;/P&gt;</description>
      <pubDate>Thu, 18 Dec 2025 18:33:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SD-WAN/SD-WAN-and-Domain-based-VPN/m-p/265711#M273</guid>
      <dc:creator>cjames88</dc:creator>
      <dc:date>2025-12-18T18:33:26Z</dc:date>
    </item>
    <item>
      <title>Re: SD WAN and Domain based VPN</title>
      <link>https://community.checkpoint.com/t5/SD-WAN/SD-WAN-and-Domain-based-VPN/m-p/265713#M274</link>
      <description>&lt;P&gt;Some questions&lt;/P&gt;
&lt;P&gt;1) Is tunnel up?&lt;/P&gt;
&lt;P&gt;2) If yes to 1, is it ONLY failing one way?&lt;/P&gt;
&lt;P&gt;3) If no to 1, which phase does ot fail on, phase 1 or 2?&lt;/P&gt;
&lt;P&gt;4) Did you run fw monitor/tcpdump/zdebug to see why it fails?&lt;/P&gt;</description>
      <pubDate>Thu, 18 Dec 2025 18:34:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SD-WAN/SD-WAN-and-Domain-based-VPN/m-p/265713#M274</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-12-18T18:34:57Z</dc:date>
    </item>
    <item>
      <title>Re: SD WAN and Domain based VPN</title>
      <link>https://community.checkpoint.com/t5/SD-WAN/SD-WAN-and-Domain-based-VPN/m-p/265714#M275</link>
      <description>&lt;P&gt;Mostly yes to all of the above. SD WAN sees the tunnel as up. At times during testing we've been able to get traffic one way and not the other. At other times no traffic period. The monitor commands do not show why it's not being encrypted. As best we can tell SD WAN is simply not sending the traffic across the tunnel. We can see the SD WAN dashboard that traffic isn't even hitting the steering object despite having the rules from the guide in place.&lt;/P&gt;</description>
      <pubDate>Thu, 18 Dec 2025 18:37:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SD-WAN/SD-WAN-and-Domain-based-VPN/m-p/265714#M275</guid>
      <dc:creator>cjames88</dc:creator>
      <dc:date>2025-12-18T18:37:53Z</dc:date>
    </item>
    <item>
      <title>Re: SD WAN and Domain based VPN</title>
      <link>https://community.checkpoint.com/t5/SD-WAN/SD-WAN-and-Domain-based-VPN/m-p/265716#M276</link>
      <description>&lt;P&gt;Fair enough, thats good info to go on. Follow up question...how is tunnel management tab set in VPN community in smart console? I ask this, because it is 100% relevant...reason I say that is because say if you have mix of hosts/subnets in enc.domain, then it would change what option to select.&lt;/P&gt;</description>
      <pubDate>Thu, 18 Dec 2025 18:40:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SD-WAN/SD-WAN-and-Domain-based-VPN/m-p/265716#M276</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-12-18T18:40:38Z</dc:date>
    </item>
    <item>
      <title>Re: SD WAN and Domain based VPN</title>
      <link>https://community.checkpoint.com/t5/SD-WAN/SD-WAN-and-Domain-based-VPN/m-p/265717#M277</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/113377"&gt;@cjames88&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;And also, how is link selection set?&lt;/P&gt;</description>
      <pubDate>Thu, 18 Dec 2025 18:41:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SD-WAN/SD-WAN-and-Domain-based-VPN/m-p/265717#M277</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-12-18T18:41:51Z</dc:date>
    </item>
    <item>
      <title>Re: SD WAN and Domain based VPN</title>
      <link>https://community.checkpoint.com/t5/SD-WAN/SD-WAN-and-Domain-based-VPN/m-p/265722#M278</link>
      <description>&lt;P&gt;in general, overlay traffic must match SD-WAN overlay rule.&lt;BR /&gt;&lt;BR /&gt;you can attach the following outputs from both peers here if you prefer&lt;BR /&gt;&lt;BR /&gt;fw monitor -F "&amp;lt;src&amp;gt;,0,&amp;lt;dst&amp;gt;,0,0" -F "&amp;lt;dst&amp;gt;,0,&amp;lt;src&amp;gt;,0,0"&amp;nbsp;&lt;BR /&gt;example:&lt;BR /&gt;fw monitor -F "192.168.1.1,0,192.168.10.1,0,0" -F "192.168.10.1,0,192.168.1.1,0,0"&lt;BR /&gt;&lt;BR /&gt;fw ctl zdebug + drop while greping client or server IP&lt;BR /&gt;for example:&lt;BR /&gt;fw ctl zdebug + drop | grep 192.168.10.1&lt;BR /&gt;&lt;BR /&gt;#initiate&amp;nbsp;the connection&lt;BR /&gt;&lt;BR /&gt;check which tunnel chosen to carry the conn:&lt;BR /&gt;vpn tu conn &amp;lt;src&amp;gt; - &amp;lt;dst&amp;gt; - - (run that while the conn already opened)&lt;BR /&gt;&lt;BR /&gt;copy the outputs.&lt;BR /&gt;&lt;BR /&gt;you can also check on which SD-WAN rule the traffic matches if you don't see it in logs by:&lt;BR /&gt;fw ctl zdebug -m SDWANRB + all | grep PROB&lt;BR /&gt;#initiate the connection&lt;/P&gt;</description>
      <pubDate>Thu, 18 Dec 2025 19:02:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SD-WAN/SD-WAN-and-Domain-based-VPN/m-p/265722#M278</guid>
      <dc:creator>AmirArama</dc:creator>
      <dc:date>2025-12-18T19:02:42Z</dc:date>
    </item>
  </channel>
</rss>

