<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Double encryption - hosts in spoke networks want to form IPSec over our route based VTIs in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Double-encryption-hosts-in-spoke-networks-want-to-form-IPSec/m-p/90676#M10993</link>
    <description>&lt;P&gt;Hi PhoneBoy,&lt;/P&gt;&lt;P&gt;I'm aware of your legendary status around these parts, so thanks for your input.. (hoping flattery helps)&lt;/P&gt;&lt;P&gt;Our Security Gateway has the following versions:&lt;/P&gt;&lt;DIV class="x-field x-form-item x-field-default"&gt;&lt;DIV class="x-form-item-body "&gt;&lt;UL&gt;&lt;LI&gt;Gateway Release:&amp;nbsp; &amp;nbsp;CheckPoint GAIA R80.30&lt;/LI&gt;&lt;LI&gt;Kernel:&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;3.10.0-693cpx86_64&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;Build Number:&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 273&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;SPAN&gt;The manager has the following versions:&lt;/SPAN&gt;&lt;/P&gt;&lt;DIV class="x-field x-form-item x-field-default"&gt;&lt;DIV class="x-form-item-body "&gt;&lt;UL&gt;&lt;LI&gt;Gateway Release:&amp;nbsp; &amp;nbsp;CheckPoint GAIA R80.30&lt;/LI&gt;&lt;LI&gt;Kernel:&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;3.10.0-957.5.1cpx86_64&lt;/LI&gt;&lt;LI&gt;Build Number:&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 200&lt;/LI&gt;&lt;LI&gt;I can see that there's a take 196 update available, although the take 191 we're on isn't that old and can upgrade if appropriate&lt;/LI&gt;&lt;/UL&gt;&lt;DIV class="webui4-overview-portlet-value"&gt;Both of these are deployed from the AWS R80.30 AMIs and are around 2 months old.&lt;/DIV&gt;&lt;DIV class="webui4-overview-portlet-value"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="webui4-overview-portlet-value"&gt;It does seem something along the lines of the gateway trying to manage the IPSec going through it in some way.. initial thoughts being it assumed it should respond to the IKE itself and simply didn't know how (psk/enc type etc]? With every Windows device on any Windows domain trying to run IKE to every other Windows machine, there's a lot of IKE passing through here being blocked which can't be good for performance tbh, and we don't really mind it being outside of our log visibility (we know the source/destination ranges and whether they'd be trusted). The main one is the source/dest in question, which the IPSec over us 'as a cable' is pretty important.&lt;/DIV&gt;&lt;DIV class="webui4-overview-portlet-value"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="webui4-overview-portlet-value"&gt;If these aren't the versions required, I'm happy to provide more information,, Just looking for clues really as the log isn't overly descriptive&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;</description>
    <pubDate>Mon, 06 Jul 2020 13:39:20 GMT</pubDate>
    <dc:creator>IanS94</dc:creator>
    <dc:date>2020-07-06T13:39:20Z</dc:date>
    <item>
      <title>Double encryption - hosts in spoke networks want to form IPSec over our route based VTIs</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Double-encryption-hosts-in-spoke-networks-want-to-form-IPSec/m-p/90565#M10991</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;We have multiple spoke networks connected over IPSec VPN (numbered VTI, Route based VPN), with BGP.&lt;/P&gt;&lt;P&gt;These have been configured with an empty encryption domain and work seamlessly for all traffic types with wire mode or without.. except for IPSec over the top of our VPN tunnels which doesn’t work in either wire or firewall configuration. With wire mode off, the logs show it’s hitting our allow rule, but the log is saying “Drop” and&lt;SPAN&gt;&amp;nbsp;“Failed to enforce VPN policy (11)”&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;A customer has a hard requirement to form IPSec encryption from their host, from within their network, to a host in another network we also VPN with. MTUs are set correctly and this worked previously inside tunnels from Palo Alto firewalls natively, without any issues or extra configuration&lt;/P&gt;&lt;P&gt;It seems likely the empty encryption domain is causing some fuss&lt;/P&gt;&lt;P&gt;Is there guidance available around why IPSec within our VPN is any different to say, TLS within our VPN, and more importantly, is it possible to allow this type of traffic to flow over our firewalls, without losing key requirements we have (BGP route based vpn)&lt;/P&gt;&lt;P&gt;Kind Regards,&lt;/P&gt;&lt;P&gt;Ian&lt;/P&gt;</description>
      <pubDate>Sun, 05 Jul 2020 10:52:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Double-encryption-hosts-in-spoke-networks-want-to-form-IPSec/m-p/90565#M10991</guid>
      <dc:creator>IanS94</dc:creator>
      <dc:date>2020-07-05T10:52:50Z</dc:date>
    </item>
    <item>
      <title>Re: Double encryption - hosts in spoke networks want to form IPSec over our route based VTIs</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Double-encryption-hosts-in-spoke-networks-want-to-form-IPSec/m-p/90621#M10992</link>
      <description>I don't think it's the empty encryption domain per-se that's causing the issue, it's that IPsec is treated differently by the gateway than other traffic.&lt;BR /&gt;What precise versions of code are involved here?</description>
      <pubDate>Mon, 06 Jul 2020 01:59:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Double-encryption-hosts-in-spoke-networks-want-to-form-IPSec/m-p/90621#M10992</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-07-06T01:59:47Z</dc:date>
    </item>
    <item>
      <title>Re: Double encryption - hosts in spoke networks want to form IPSec over our route based VTIs</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Double-encryption-hosts-in-spoke-networks-want-to-form-IPSec/m-p/90676#M10993</link>
      <description>&lt;P&gt;Hi PhoneBoy,&lt;/P&gt;&lt;P&gt;I'm aware of your legendary status around these parts, so thanks for your input.. (hoping flattery helps)&lt;/P&gt;&lt;P&gt;Our Security Gateway has the following versions:&lt;/P&gt;&lt;DIV class="x-field x-form-item x-field-default"&gt;&lt;DIV class="x-form-item-body "&gt;&lt;UL&gt;&lt;LI&gt;Gateway Release:&amp;nbsp; &amp;nbsp;CheckPoint GAIA R80.30&lt;/LI&gt;&lt;LI&gt;Kernel:&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;3.10.0-693cpx86_64&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;Build Number:&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 273&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;SPAN&gt;The manager has the following versions:&lt;/SPAN&gt;&lt;/P&gt;&lt;DIV class="x-field x-form-item x-field-default"&gt;&lt;DIV class="x-form-item-body "&gt;&lt;UL&gt;&lt;LI&gt;Gateway Release:&amp;nbsp; &amp;nbsp;CheckPoint GAIA R80.30&lt;/LI&gt;&lt;LI&gt;Kernel:&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;3.10.0-957.5.1cpx86_64&lt;/LI&gt;&lt;LI&gt;Build Number:&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 200&lt;/LI&gt;&lt;LI&gt;I can see that there's a take 196 update available, although the take 191 we're on isn't that old and can upgrade if appropriate&lt;/LI&gt;&lt;/UL&gt;&lt;DIV class="webui4-overview-portlet-value"&gt;Both of these are deployed from the AWS R80.30 AMIs and are around 2 months old.&lt;/DIV&gt;&lt;DIV class="webui4-overview-portlet-value"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="webui4-overview-portlet-value"&gt;It does seem something along the lines of the gateway trying to manage the IPSec going through it in some way.. initial thoughts being it assumed it should respond to the IKE itself and simply didn't know how (psk/enc type etc]? With every Windows device on any Windows domain trying to run IKE to every other Windows machine, there's a lot of IKE passing through here being blocked which can't be good for performance tbh, and we don't really mind it being outside of our log visibility (we know the source/destination ranges and whether they'd be trusted). The main one is the source/dest in question, which the IPSec over us 'as a cable' is pretty important.&lt;/DIV&gt;&lt;DIV class="webui4-overview-portlet-value"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="webui4-overview-portlet-value"&gt;If these aren't the versions required, I'm happy to provide more information,, Just looking for clues really as the log isn't overly descriptive&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;</description>
      <pubDate>Mon, 06 Jul 2020 13:39:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Double-encryption-hosts-in-spoke-networks-want-to-form-IPSec/m-p/90676#M10993</guid>
      <dc:creator>IanS94</dc:creator>
      <dc:date>2020-07-06T13:39:20Z</dc:date>
    </item>
    <item>
      <title>Re: Double encryption - hosts in spoke networks want to form IPSec over our route based VTIs</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Double-encryption-hosts-in-spoke-networks-want-to-form-IPSec/m-p/90688#M10994</link>
      <description>That's more than sufficient for my purposes &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;BR /&gt;What some customers do is "exclude" this traffic from encryption, which is a setting in the VPN community.&lt;BR /&gt;And there appears to be bug related to this in R80.40 with Route-Based VPNs.&lt;BR /&gt;However, it sounds like you want IPsec in IPsec in this case.&lt;BR /&gt;A TAC case will most likely be required to troubleshoot this.</description>
      <pubDate>Mon, 06 Jul 2020 14:54:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Double-encryption-hosts-in-spoke-networks-want-to-form-IPSec/m-p/90688#M10994</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-07-06T14:54:36Z</dc:date>
    </item>
    <item>
      <title>Re: Double encryption - hosts in spoke networks want to form IPSec over our route based VTIs</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Double-encryption-hosts-in-spoke-networks-want-to-form-IPSec/m-p/90824#M10995</link>
      <description>&lt;P&gt;Just posting for reference here in case people are looking for this in future&lt;/P&gt;&lt;P&gt;We had a call with TAC who highlighted&amp;nbsp;sk106241&lt;/P&gt;&lt;P&gt;Of course, this could be determined to be the relevant solution for particular issues people looking at this are seeing, although nothing should be taken as a given, and the fix/issue for us may not be the exact fix/issue for you etc - always check first I guess.&lt;/P&gt;&lt;P&gt;The logs are no longer displaying dropped and the "Failed to enforce VPN policy (11)" error, and we'll be testing it tomorrow when resources are available to test. We went with the temporary (until reboot) version for now, and will throw in the permanent global variable should this be proven to resolve the issue.&lt;/P&gt;&lt;P&gt;Thanks for your assistance here, has been good to confirm it's not just me missing something obvious&lt;/P&gt;</description>
      <pubDate>Tue, 07 Jul 2020 23:20:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Double-encryption-hosts-in-spoke-networks-want-to-form-IPSec/m-p/90824#M10995</guid>
      <dc:creator>IanS94</dc:creator>
      <dc:date>2020-07-07T23:20:05Z</dc:date>
    </item>
  </channel>
</rss>

