<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Domain based VPN to ANY (0.0.0.0/0) R80.20 question in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Domain-based-VPN-to-ANY-0-0-0-0-0-R80-20-question/m-p/73298#M11768</link>
    <description>&lt;P&gt;From my reading,&amp;nbsp;&lt;SPAN&gt;sk44852 is only about the negotiation. I hesitate to recommend user.def modifications in any circumstance because they're extremely easy to forget when upgrading a SmartCenter. In this case, a universal negotiation could be forced easily enough using the community.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;I'm not sure a universal negotiation is the problem, though. There is no way to specify a rule is only valid when&amp;nbsp;&lt;EM&gt;not&lt;/EM&gt; using a VPN. All you can do is specify the rule isn't restricted to a particular VPN. I think a route-based VPN is the solution to that part of the requirements, and they negotiate universal tunnels as a side-effect of how they work. You still can't say a rule only works for traffic not using the VPN, but you can use the routing table to select whether the VPN or some other connection should be tried first.&lt;/P&gt;</description>
    <pubDate>Fri, 24 Jan 2020 14:14:48 GMT</pubDate>
    <dc:creator>Bob_Zimmerman</dc:creator>
    <dc:date>2020-01-24T14:14:48Z</dc:date>
    <item>
      <title>Domain based VPN to ANY (0.0.0.0/0) R80.20 question</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Domain-based-VPN-to-ANY-0-0-0-0-0-R80-20-question/m-p/73115#M11763</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;I am trying to create a VPN to a 3rd party using a backup Tunnel where possible using a destination of ANY on http/https. I only want this rule to be hit after other rules that will NOT route through the tunnel so it will be lower in the rule base. My questions are&lt;/P&gt;&lt;P&gt;1. Can I use a VPN to ANY 0.0.0.0 using Domain based VPN as I only want this rule to be hit after other rules have been satisfied.&lt;/P&gt;&lt;P&gt;2. When defining the local domain e.g 172.16.10.0/24 do I just add it to the Topology/VPN part? what if other subnets exist do they need to be added to the SA?&amp;nbsp;&lt;/P&gt;&lt;P&gt;3. Can I add a backup tunnel into the start community? if so what is the metric or mechanism that says primary is A secondary is B?&lt;/P&gt;&lt;P&gt;Thanks in advance&lt;/P&gt;&lt;P&gt;Al&lt;/P&gt;</description>
      <pubDate>Thu, 23 Jan 2020 10:06:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Domain-based-VPN-to-ANY-0-0-0-0-0-R80-20-question/m-p/73115#M11763</guid>
      <dc:creator>Alan_Camelo1</dc:creator>
      <dc:date>2020-01-23T10:06:43Z</dc:date>
    </item>
    <item>
      <title>Re: Domain based VPN to ANY (0.0.0.0/0) R80.20 question</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Domain-based-VPN-to-ANY-0-0-0-0-0-R80-20-question/m-p/73118#M11764</link>
      <description>&lt;P&gt;Apart from&amp;nbsp;CP R80.20 SitetoSite VPN AdminGuide you should look into:&lt;/P&gt;
&lt;P&gt;&lt;A class="cp_link sc_ellipsis" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk44852&amp;amp;partition=Advanced&amp;amp;product=IPSec" target="_blank" rel="noopener"&gt;sk44852: How to configure a Site-to-Site &lt;STRONG&gt;VPN&lt;/STRONG&gt; with a universal tunnel&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A class="cp_link sc_ellipsis" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk108600&amp;amp;partition=Advanced&amp;amp;product=IPSec" target="_blank" rel="noopener"&gt;sk108600: &lt;STRONG&gt;VPN&lt;/STRONG&gt; Site-to-Site with 3rd party&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A class="cp_link sc_ellipsis" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk104760&amp;amp;partition=Advanced&amp;amp;product=IPSec" target="_blank" rel="noopener"&gt;sk104760: ATRG: &lt;STRONG&gt;VPN&lt;/STRONG&gt; Core&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A class="cp_link sc_ellipsis" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk164355&amp;amp;partition=General&amp;amp;product=IPSec" target="_blank"&gt;sk164355: &lt;STRONG&gt;VPN&lt;/STRONG&gt; &lt;STRONG&gt;redundancy&lt;/STRONG&gt; does not work when establishing an IPsec &lt;STRONG&gt;VPN&lt;/STRONG&gt; Tunnel with a third-party peer&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 23 Jan 2020 11:13:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Domain-based-VPN-to-ANY-0-0-0-0-0-R80-20-question/m-p/73118#M11764</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2020-01-23T11:13:35Z</dc:date>
    </item>
    <item>
      <title>Re: Domain based VPN to ANY (0.0.0.0/0) R80.20 question</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Domain-based-VPN-to-ANY-0-0-0-0-0-R80-20-question/m-p/73122#M11765</link>
      <description>Thanks for the quick reply, the setup in sk44852 seems more relevant but it implies that you want to send all Zeros as a local network, what I want is the remote defined as all Zero's 0.0.0.0/0.&lt;BR /&gt;"the local Check Point Security Gateway will send all 0's (zero's) for the network address and netmask for these networks:"</description>
      <pubDate>Thu, 23 Jan 2020 11:22:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Domain-based-VPN-to-ANY-0-0-0-0-0-R80-20-question/m-p/73122#M11765</guid>
      <dc:creator>Alan_Camelo1</dc:creator>
      <dc:date>2020-01-23T11:22:19Z</dc:date>
    </item>
    <item>
      <title>Re: Domain based VPN to ANY (0.0.0.0/0) R80.20 question</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Domain-based-VPN-to-ANY-0-0-0-0-0-R80-20-question/m-p/73124#M11766</link>
      <description>&lt;P&gt;&lt;SPAN&gt;sk44852 &amp;nbsp;is the solution, just read it more carefully:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Topology:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;(internal network 10.2.2.0/24)-[Check Point Security Gateway]---{universal VPN tunnel}---(IP 172.16.5.10)-[Remote VPN Peer]-(internal network 192.168.4.0/24)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 23 Jan 2020 11:54:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Domain-based-VPN-to-ANY-0-0-0-0-0-R80-20-question/m-p/73124#M11766</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2020-01-23T11:54:55Z</dc:date>
    </item>
    <item>
      <title>Re: Domain based VPN to ANY (0.0.0.0/0) R80.20 question</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Domain-based-VPN-to-ANY-0-0-0-0-0-R80-20-question/m-p/73134#M11767</link>
      <description>Thank you, appreciate your help. Just to clarify this is for the remote encryption domain right? I have read it again and its still not very clear.</description>
      <pubDate>Thu, 23 Jan 2020 13:26:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Domain-based-VPN-to-ANY-0-0-0-0-0-R80-20-question/m-p/73134#M11767</guid>
      <dc:creator>Alan_Camelo1</dc:creator>
      <dc:date>2020-01-23T13:26:52Z</dc:date>
    </item>
    <item>
      <title>Re: Domain based VPN to ANY (0.0.0.0/0) R80.20 question</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Domain-based-VPN-to-ANY-0-0-0-0-0-R80-20-question/m-p/73298#M11768</link>
      <description>&lt;P&gt;From my reading,&amp;nbsp;&lt;SPAN&gt;sk44852 is only about the negotiation. I hesitate to recommend user.def modifications in any circumstance because they're extremely easy to forget when upgrading a SmartCenter. In this case, a universal negotiation could be forced easily enough using the community.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;I'm not sure a universal negotiation is the problem, though. There is no way to specify a rule is only valid when&amp;nbsp;&lt;EM&gt;not&lt;/EM&gt; using a VPN. All you can do is specify the rule isn't restricted to a particular VPN. I think a route-based VPN is the solution to that part of the requirements, and they negotiate universal tunnels as a side-effect of how they work. You still can't say a rule only works for traffic not using the VPN, but you can use the routing table to select whether the VPN or some other connection should be tried first.&lt;/P&gt;</description>
      <pubDate>Fri, 24 Jan 2020 14:14:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Domain-based-VPN-to-ANY-0-0-0-0-0-R80-20-question/m-p/73298#M11768</guid>
      <dc:creator>Bob_Zimmerman</dc:creator>
      <dc:date>2020-01-24T14:14:48Z</dc:date>
    </item>
    <item>
      <title>Re: Domain based VPN to ANY (0.0.0.0/0) R80.20 question</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Domain-based-VPN-to-ANY-0-0-0-0-0-R80-20-question/m-p/73418#M11769</link>
      <description>&lt;P&gt;Many thanks for all your help and comments, I will continue to research and if I find anything I'll let you know.&lt;/P&gt;</description>
      <pubDate>Mon, 27 Jan 2020 08:44:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Domain-based-VPN-to-ANY-0-0-0-0-0-R80-20-question/m-p/73418#M11769</guid>
      <dc:creator>Alan_Camelo1</dc:creator>
      <dc:date>2020-01-27T08:44:28Z</dc:date>
    </item>
    <item>
      <title>Re: Domain based VPN to ANY (0.0.0.0/0) R80.20 question</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Domain-based-VPN-to-ANY-0-0-0-0-0-R80-20-question/m-p/76531#M11770</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;Many thanks for your comments, I managed to get a routed VPN up and running with a 3rd party vendor and all seems OK apart from some issues with getting to a host behind the vpn. I added a vti interface and attached to the remote end point defined then added a static route and all seems to be in place. However I have noticed the following route.&lt;/P&gt;&lt;P&gt;C 0.0.0.0/26 is directly connected, vpnt10(down)&lt;/P&gt;&lt;P&gt;when doing a vpn tu the p1 and p2 are up so all appears OK, can anyone please comment on the above route and why it mentions down? Also when I look at the vti interface counters they do increase when sending some test traffic.&lt;/P&gt;&lt;P&gt;Thanks in advance&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 27 Feb 2020 09:17:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Domain-based-VPN-to-ANY-0-0-0-0-0-R80-20-question/m-p/76531#M11770</guid>
      <dc:creator>Alan_Camelo1</dc:creator>
      <dc:date>2020-02-27T09:17:12Z</dc:date>
    </item>
  </channel>
</rss>

