<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Issues migrating from Cisco ASA to Check Point in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issues-migrating-from-Cisco-ASA-to-Check-Point/m-p/73470#M11809</link>
    <description>&lt;P&gt;Hi Di,&lt;/P&gt;&lt;P&gt;Regarding your questions:&lt;/P&gt;&lt;P&gt;1. Have you verified the crypto map on Cisco's side? Also the inspection parameters for encrypted traffic?&lt;/P&gt;&lt;P&gt;2. I suppose you're using Domain based VPN, where only the shared networks would bring up the tunnel. You should use an universal tunnel (a tunnel for each pair of Gateways with Internet routing defined on Community) with proper ACL on Cisco's side (&lt;A href="https://community.cisco.com/t5/vpn-and-anyconnect/default-route-inside-site-to-site-vpn-tunnel/td-p/2155621" target="_blank" rel="noopener"&gt;https://community.cisco.com/t5/vpn-and-anyconnect/default-route-inside-site-to-site-vpn-tunnel/td-p/2155621&lt;/A&gt;) or switch to Route based VPN instead; both options in order to allow required internet access for networks C and D. NAT also plays an important role, all rules probably must be set manually on Check Point GW.&lt;/P&gt;&lt;P&gt;3. As long you have a route through the right interface, you can create VPN tunnels on point to point links without issues. You can use the Link Selection's option "Calculate IP based on network topology". Obviously all your peers should point to the Check Point gateway instead Cisco router.&lt;/P&gt;</description>
    <pubDate>Mon, 27 Jan 2020 17:51:00 GMT</pubDate>
    <dc:creator>KennyManrique</dc:creator>
    <dc:date>2020-01-27T17:51:00Z</dc:date>
    <item>
      <title>Issues migrating from Cisco ASA to Check Point</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issues-migrating-from-Cisco-ASA-to-Check-Point/m-p/73426#M11808</link>
      <description>&lt;P&gt;Hi Mates&lt;/P&gt;&lt;P&gt;Just to give more information about the issue I am facing with a customer network.&lt;/P&gt;&lt;P&gt;We are migrating the infrastructure from Cisco ASA to Check Point Firewall, everything seems to be working fine but we have this problem that I need help on how I can achieve the same cenario using Check Point. We are using R80.20&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="NET DIAGRAM.PNG" style="width: 744px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/4242i1E0E1C47FA11A89E/image-dimensions/744x750?v=v2" width="744" height="750" role="button" title="NET DIAGRAM.PNG" alt="NET DIAGRAM.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;There is sit-to-site VPN between the Cisco Router and Check Point. the machines on Networks C and D must communicate with the machines in Networks A and B (vice-versa) using this site-to-site VPN between Check Point and Cisco Router. In addition to that, Networks C and D must also go to the internet through the site-to-site VPN with Check Point that is connected to the internet.&amp;nbsp;&lt;/P&gt;&lt;P&gt;The site-to-site VPN tunel is closed using the Ips: X.X.X.1 from the Firewall and the Peer is X.X.X.2, in order to allow communication between the Networks A and B and Networks C and D, I am doing NAT on the Firewall. Hence, if a host on network A is trying to connect to the Host on network C, the IP of the host in the network A is NATted to the Firewalls IP (X.X.X.1) and vice-versa.&lt;/P&gt;&lt;P&gt;So we have this cenario:&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Networks C and D area able to communicate with Network A and B, and they are also going to the internet through the tunel.&lt;/LI&gt;&lt;LI&gt;Network A and B are able to access the internet as well using the F.F.F.2&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;STRONG&gt;Problem&lt;/STRONG&gt;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Network A and B are ONLY able to ping Network C and D, and nothing else. You cannot run RDP or SSH from Network A and B to networks C and D.&lt;/LI&gt;&lt;LI&gt;There are some services on Network C that are published on the Internet; these services are also not working.&lt;/LI&gt;&lt;LI&gt;Another issue that I will be facing too is the fact that with Cisco ASA, they have different site-to-site VPN with their partners using point-to-point links, how can I have Check Point having multiple site-to-site VPN using different interfaces. For example, there is tunnel with Cisco router using X.X.X.1 address, and another tunel with the partner using the F.F.F.1.&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;Your help will be appreciated&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance&lt;/P&gt;&lt;P&gt; &lt;/P&gt;</description>
      <pubDate>Mon, 27 Jan 2020 09:20:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issues-migrating-from-Cisco-ASA-to-Check-Point/m-p/73426#M11808</guid>
      <dc:creator>Di_Junior</dc:creator>
      <dc:date>2020-01-27T09:20:17Z</dc:date>
    </item>
    <item>
      <title>Re: Issues migrating from Cisco ASA to Check Point</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issues-migrating-from-Cisco-ASA-to-Check-Point/m-p/73470#M11809</link>
      <description>&lt;P&gt;Hi Di,&lt;/P&gt;&lt;P&gt;Regarding your questions:&lt;/P&gt;&lt;P&gt;1. Have you verified the crypto map on Cisco's side? Also the inspection parameters for encrypted traffic?&lt;/P&gt;&lt;P&gt;2. I suppose you're using Domain based VPN, where only the shared networks would bring up the tunnel. You should use an universal tunnel (a tunnel for each pair of Gateways with Internet routing defined on Community) with proper ACL on Cisco's side (&lt;A href="https://community.cisco.com/t5/vpn-and-anyconnect/default-route-inside-site-to-site-vpn-tunnel/td-p/2155621" target="_blank" rel="noopener"&gt;https://community.cisco.com/t5/vpn-and-anyconnect/default-route-inside-site-to-site-vpn-tunnel/td-p/2155621&lt;/A&gt;) or switch to Route based VPN instead; both options in order to allow required internet access for networks C and D. NAT also plays an important role, all rules probably must be set manually on Check Point GW.&lt;/P&gt;&lt;P&gt;3. As long you have a route through the right interface, you can create VPN tunnels on point to point links without issues. You can use the Link Selection's option "Calculate IP based on network topology". Obviously all your peers should point to the Check Point gateway instead Cisco router.&lt;/P&gt;</description>
      <pubDate>Mon, 27 Jan 2020 17:51:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issues-migrating-from-Cisco-ASA-to-Check-Point/m-p/73470#M11809</guid>
      <dc:creator>KennyManrique</dc:creator>
      <dc:date>2020-01-27T17:51:00Z</dc:date>
    </item>
    <item>
      <title>Re: Issues migrating from Cisco ASA to Check Point</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issues-migrating-from-Cisco-ASA-to-Check-Point/m-p/73472#M11810</link>
      <description>&lt;P&gt;Hi Kenny&lt;BR /&gt;&lt;BR /&gt;1. Have you verified the crypto map on Cisco's side? Also the inspection parameters for encrypted traffic?&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;On Cisco S«side the crypto map we have only the Network C and D subnets. And on Check Point I have "All IP addresses behind the clusyter....."&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Where can I check the inspection parameters for encrypted traffic?&amp;nbsp;&lt;/STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;2. I suppose you're using Domain based VPN, where only the shared networks would bring up the tunnel. You should use an universal tunnel (a tunnel for each pair of Gateways with Internet routing defined on Community) with proper ACL on Cisco's side (&lt;A href="https://community.cisco.com/t5/vpn-and-anyconnect/default-route-inside-site-to-site-vpn-tunnel/td-p/" target="_blank" rel="noopener"&gt;https://community.cisco.com/t5/vpn-and-anyconnect/default-route-inside-site-to-site-vpn-tunnel/td-p/&lt;/A&gt;...) or switch to Route based VPN instead; both options in order to allow required internet access for networks C and D. NAT also plays an important role, all rules probably must be set manually on Check Point GW.&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;Yes I am using Domain based VPN. I am thinking about switching to Route based VPN, any special recommendations about route-based VPN.&lt;/STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;3. As long you have a route through the right interface, you can create VPN tunnels on point to point links without issues. You can use the Link Selection's option "Calculate IP based on network topology". Obviously all your peers should point to the Check Point gateway instead Cisco router.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;So in this case create VPN tunnels using route based VPN right?&lt;/STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;Thank you&lt;/P&gt;</description>
      <pubDate>Mon, 27 Jan 2020 18:11:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issues-migrating-from-Cisco-ASA-to-Check-Point/m-p/73472#M11810</guid>
      <dc:creator>Di_Junior</dc:creator>
      <dc:date>2020-01-27T18:11:56Z</dc:date>
    </item>
    <item>
      <title>Re: Issues migrating from Cisco ASA to Check Point</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issues-migrating-from-Cisco-ASA-to-Check-Point/m-p/73477#M11811</link>
      <description>In this environment I would for sure check out VTI's and run dynamic routing across them.&lt;BR /&gt;On top of that why are you using hide NAT between the to area's when you have routing setup already? It just does not make sense and it makes troubleshooting more difficult.</description>
      <pubDate>Mon, 27 Jan 2020 18:45:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issues-migrating-from-Cisco-ASA-to-Check-Point/m-p/73477#M11811</guid>
      <dc:creator>Maarten_Sjouw</dc:creator>
      <dc:date>2020-01-27T18:45:14Z</dc:date>
    </item>
    <item>
      <title>Re: Issues migrating from Cisco ASA to Check Point</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issues-migrating-from-Cisco-ASA-to-Check-Point/m-p/73480#M11812</link>
      <description>Hi Maarten&lt;BR /&gt;&lt;BR /&gt;The customer does not use dynamic routing protocols, it only uses static routing.&lt;BR /&gt;The hide NAT was configured to give the Network C and D access to the internet. Any other sugestion?&lt;BR /&gt;&lt;BR /&gt;Thanks</description>
      <pubDate>Mon, 27 Jan 2020 19:52:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issues-migrating-from-Cisco-ASA-to-Check-Point/m-p/73480#M11812</guid>
      <dc:creator>Di_Junior</dc:creator>
      <dc:date>2020-01-27T19:52:31Z</dc:date>
    </item>
    <item>
      <title>Re: Issues migrating from Cisco ASA to Check Point</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issues-migrating-from-Cisco-ASA-to-Check-Point/m-p/73488#M11813</link>
      <description>I said you CAN use dynamic routing, in this case static routing will also work.&lt;BR /&gt;The hide NAT in this case is best done on the CP, not on the Cisco.</description>
      <pubDate>Mon, 27 Jan 2020 22:28:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issues-migrating-from-Cisco-ASA-to-Check-Point/m-p/73488#M11813</guid>
      <dc:creator>Maarten_Sjouw</dc:creator>
      <dc:date>2020-01-27T22:28:26Z</dc:date>
    </item>
    <item>
      <title>Re: Issues migrating from Cisco ASA to Check Point</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issues-migrating-from-Cisco-ASA-to-Check-Point/m-p/73524#M11814</link>
      <description>Hi Maarten&lt;BR /&gt;&lt;BR /&gt;NAT is being done by Check Point.</description>
      <pubDate>Tue, 28 Jan 2020 09:04:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issues-migrating-from-Cisco-ASA-to-Check-Point/m-p/73524#M11814</guid>
      <dc:creator>Di_Junior</dc:creator>
      <dc:date>2020-01-28T09:04:32Z</dc:date>
    </item>
    <item>
      <title>Re: Issues migrating from Cisco ASA to Check Point</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issues-migrating-from-Cisco-ASA-to-Check-Point/m-p/73526#M11815</link>
      <description>So again when using the IPSEC why use NAT inside that tunnel?&lt;BR /&gt;And on another point there why use a tunnel at all?</description>
      <pubDate>Tue, 28 Jan 2020 09:47:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issues-migrating-from-Cisco-ASA-to-Check-Point/m-p/73526#M11815</guid>
      <dc:creator>Maarten_Sjouw</dc:creator>
      <dc:date>2020-01-28T09:47:13Z</dc:date>
    </item>
    <item>
      <title>Re: Issues migrating from Cisco ASA to Check Point</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issues-migrating-from-Cisco-ASA-to-Check-Point/m-p/73528#M11816</link>
      <description>Hi Maarten&lt;BR /&gt;&lt;BR /&gt;For some reason the customer used to have tunel internally because the Core Switch and the firewall is housed in a Datacenter outside their control.&lt;BR /&gt;&lt;BR /&gt;You are correct about doing NAT inside the tunel, i will check the possibility of stopping doing NAT.&lt;BR /&gt;&lt;BR /&gt;Just a random question:&lt;BR /&gt;I am trying to figured out of VTI works, and there is something that I wish to understand. in Check Point documentation they say VPN Tunel ID must be the same on both ends. I am trying to implement VTI with Cisco, how can I achieve this?&lt;BR /&gt;&lt;BR /&gt;Thanks in advance&lt;BR /&gt;</description>
      <pubDate>Tue, 28 Jan 2020 09:56:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issues-migrating-from-Cisco-ASA-to-Check-Point/m-p/73528#M11816</guid>
      <dc:creator>Di_Junior</dc:creator>
      <dc:date>2020-01-28T09:56:28Z</dc:date>
    </item>
    <item>
      <title>Re: Issues migrating from Cisco ASA to Check Point</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issues-migrating-from-Cisco-ASA-to-Check-Point/m-p/73529#M11817</link>
      <description>have a look at this thread:&lt;BR /&gt;&lt;A href="https://community.checkpoint.com/t5/Access-Control-Products/Domain-based-VPN-to-ANY-0-0-0-0-0-R80-20-question/m-p/73115" target="_blank"&gt;https://community.checkpoint.com/t5/Access-Control-Products/Domain-based-VPN-to-ANY-0-0-0-0-0-R80-20-question/m-p/73115&lt;/A&gt;</description>
      <pubDate>Tue, 28 Jan 2020 10:17:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issues-migrating-from-Cisco-ASA-to-Check-Point/m-p/73529#M11817</guid>
      <dc:creator>Maarten_Sjouw</dc:creator>
      <dc:date>2020-01-28T10:17:24Z</dc:date>
    </item>
  </channel>
</rss>

