<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: site-to-site VPN - Encryption domain issue in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/site-to-site-VPN-Encryption-domain-issue/m-p/67963#M12092</link>
    <description>&lt;P&gt;Just check on your Sophos which enc domain Check Point is announcing, enter this data into your Sophos VPN configuration and you should be good. Keep in mind that Check Point also renders the external IP addresses of the VPN gateways as part of the enc domain.&lt;/P&gt;</description>
    <pubDate>Thu, 21 Nov 2019 05:55:35 GMT</pubDate>
    <dc:creator>Danny</dc:creator>
    <dc:date>2019-11-21T05:55:35Z</dc:date>
    <item>
      <title>site-to-site VPN - Encryption domain issue</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/site-to-site-VPN-Encryption-domain-issue/m-p/67911#M12089</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I am facing a strange issue. We have site-to-site VPN with 3rd party. We have Checkpoint, they have Sophos UTM. Tunnel is working only one direction.&amp;nbsp;&lt;/P&gt;&lt;P&gt;- Sophos &amp;gt;&amp;gt; Checkpoint - working fine&lt;/P&gt;&lt;P&gt;- Checkpoint &amp;gt;&amp;gt; Sophos - not working&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;IkeView tool says Phase1 is ok, Phase2 is failing when Checkpoint initiates the tunnel. Only QM packet 1. After that I receive an error:&lt;/P&gt;&lt;P&gt;&lt;FONT size="1 2 3 4 5 6 7"&gt;Notify Payload&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="1 2 3 4 5 6 7"&gt;Next Payload: NONE&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="1 2 3 4 5 6 7"&gt;Reserved: 0&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="1 2 3 4 5 6 7"&gt;Length: 00 0c (12)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="1 2 3 4 5 6 7"&gt;DOI: 00 00 00 01 (1)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="1 2 3 4 5 6 7"&gt;ProtID: 1&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="1 2 3 4 5 6 7"&gt;SPI Size: 0&lt;/FONT&gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;FONT size="1 2 3 4 5 6 7"&gt;Notify Type: 18 (INVALID-ID-INFORMATION)&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I also noticed in VPNd.ELG this:&lt;/P&gt;&lt;P&gt;&lt;FONT size="3"&gt;[] vpn_ipsec_spi_notify: spi 0, 127.0.0.1, peer x.x.x.x, proto 50, my range 172.16.16.0-172.16.16.255, &lt;STRONG&gt;peer range 192.168.203.0-192.168.203.255,&lt;/STRONG&gt;&amp;nbsp;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;However in dashboard I have:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;My encryption domain: 172.16.16.0/24&lt;/LI&gt;&lt;LI&gt;Interoperable device encryption domain: &lt;STRONG&gt;192.168.200.0/22&lt;/STRONG&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;From CLI I am getting correct enc. domain:&lt;/P&gt;&lt;P&gt;5:04:09 x.x.x.x &amp;gt; :(+);From:192.168.200.0;,To:192.168.203.255;CPTFMT_sep:;;Peer:x.x.x.x;,allowed_peers_table_id:0;,gw_conf:0;,community_id:5;,subnet_support:1;,&lt;STRONG&gt;from:192.168.200.0;,to:192.168.203.255;&lt;/STRONG&gt;product:VPN-1 &amp;amp; FireWall-1;product_family:Network&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any ideas/hints on what to check, change to get this working?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks indeed.&lt;/P&gt;</description>
      <pubDate>Wed, 20 Nov 2019 14:06:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/site-to-site-VPN-Encryption-domain-issue/m-p/67911#M12089</guid>
      <dc:creator>mselecky</dc:creator>
      <dc:date>2019-11-20T14:06:18Z</dc:date>
    </item>
    <item>
      <title>Re: site-to-site VPN - Encryption domain issue</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/site-to-site-VPN-Encryption-domain-issue/m-p/67941#M12090</link>
      <description>&lt;P&gt;Find a Quick Mode Key Install log from when the Sophos has initiated the VPN, I'll guarantee they aren't asking for the entire 192.168.200.0/22 from you.&amp;nbsp; In the Community setting try setting VPN Tunnel Sharing to "one tunnel per pair of hosts", reinstall policy and try again from the Check Point side.&amp;nbsp; If it works you need to configure the table.def file to more precisely control how the Check Point proposes subnets, see sk108600 Scenario 1.&lt;/P&gt;</description>
      <pubDate>Wed, 20 Nov 2019 21:07:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/site-to-site-VPN-Encryption-domain-issue/m-p/67941#M12090</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2019-11-20T21:07:09Z</dc:date>
    </item>
    <item>
      <title>Re: site-to-site VPN - Encryption domain issue</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/site-to-site-VPN-Encryption-domain-issue/m-p/67948#M12091</link>
      <description>&lt;P&gt;The issue with 3rd party VPN interoperability keeps coming up over the years and it most often results in editing the files.&lt;/P&gt;
&lt;P&gt;IMHO, it is a high time for Check Point to implement the GUI options for these modifications. This will not only simplify configuration, but will also allow admins to be aware of the particulars while using SmartConsole.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 21 Nov 2019 00:33:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/site-to-site-VPN-Encryption-domain-issue/m-p/67948#M12091</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2019-11-21T00:33:58Z</dc:date>
    </item>
    <item>
      <title>Re: site-to-site VPN - Encryption domain issue</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/site-to-site-VPN-Encryption-domain-issue/m-p/67963#M12092</link>
      <description>&lt;P&gt;Just check on your Sophos which enc domain Check Point is announcing, enter this data into your Sophos VPN configuration and you should be good. Keep in mind that Check Point also renders the external IP addresses of the VPN gateways as part of the enc domain.&lt;/P&gt;</description>
      <pubDate>Thu, 21 Nov 2019 05:55:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/site-to-site-VPN-Encryption-domain-issue/m-p/67963#M12092</guid>
      <dc:creator>Danny</dc:creator>
      <dc:date>2019-11-21T05:55:35Z</dc:date>
    </item>
    <item>
      <title>Re: site-to-site VPN - Encryption domain issue</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/site-to-site-VPN-Encryption-domain-issue/m-p/67970#M12093</link>
      <description>&lt;P&gt;As others suggested this is going to be the old issue of the Check Point supernetting multiple subnets&lt;/P&gt;&lt;P&gt;Check with the Sophos EXACTLY how they have defined the EncDomain.&lt;/P&gt;&lt;P&gt;Have they actually defined as 192.168.200.0/22&amp;nbsp; or have they actually defined as&amp;nbsp;192.168.200.0/24,&amp;nbsp;192.168.201.0/24,&amp;nbsp;192.168.202.0/24,&amp;nbsp;192.168.203.0/24&lt;/P&gt;&lt;P&gt;As you are seeing&amp;nbsp;&lt;SPAN&gt;vpn_ipsec_spi_notify: spi 0, 127.0.0.1, peer x.x.x.x, proto 50, my range 172.16.16.0-172.16.16.255,&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;peer range 192.168.203.0-192.168.203.255&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Then I would suggest that they have multiple /24 subnets defined and that is what they are expecting&lt;/P&gt;&lt;P&gt;Check Point is notorious for this with 3rd Party VPN where will supernet&amp;nbsp;&lt;/P&gt;&lt;P&gt;As Timothy Hall said is going to&amp;nbsp;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk108600&amp;amp;partition=Advanced&amp;amp;product=IPSec#Scenario%201" target="_blank"&gt;https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk108600&amp;amp;partition=Advanced&amp;amp;product=IPSec#Scenario%201&lt;/A&gt;&lt;/P&gt;&lt;P&gt;and look at Scenario 1&lt;/P&gt;&lt;P&gt;You can then look at disabling the Supernetting and define the Remote Encryption Domain EXACTLY has they have in terms of using multiple /24 subnets rather then a single /22.&lt;/P&gt;&lt;P&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk101219#Third%20party%20connectivity%20improvements" target="_blank"&gt;https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk101219#Third%20party%20connectivity%20improvements&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Section 4 gives further details of the 3rd Party connectivity improvements&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 21 Nov 2019 07:29:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/site-to-site-VPN-Encryption-domain-issue/m-p/67970#M12093</guid>
      <dc:creator>mdjmcnally</dc:creator>
      <dc:date>2019-11-21T07:29:46Z</dc:date>
    </item>
    <item>
      <title>Re: site-to-site VPN - Encryption domain issue</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/site-to-site-VPN-Encryption-domain-issue/m-p/68002#M12094</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;thanks for your reply. In IKE View tool I see this:&lt;/P&gt;&lt;P&gt;&lt;FONT size="2"&gt;QM packet 1 (06:29:21) - Wed Nov 20 2019&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="2"&gt;ID:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;STRONG&gt;(192.168.200.0 255.255.252.0)&lt;/STRONG&gt; - (172.16.16.0 255.255.255.0)&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="2"&gt;Transport: UDP (IPv4)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;PeerIP: 365675aa&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;PeerPort: 500&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Peer Name: GW_x.x.x.x&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="2"&gt;&amp;lt;== Received from peer x.x.x.x&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;Checkpoint replied back:&lt;/P&gt;&lt;P&gt;&lt;FONT size="2"&gt;QM packet 2 (06:29:21) - Wed Nov 20 2019&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="2"&gt;ID:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;&lt;STRONG&gt;(192.168.200.0 255.255.252.0)&lt;/STRONG&gt; - (172.16.16.0 255.255.255.0)&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="2"&gt;Transport: UDP (IPv4)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;PeerIP: 365675aa&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;PeerPort: 500&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="2"&gt;Peer Name: GW_x.x.x.x&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="2"&gt;==&amp;gt; Sent to peer x.x.x.x&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This when Sophos initiated communication and it works.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Tunnel management is configured to:&amp;nbsp;&lt;SPAN&gt;"one tunnel per pair of hosts".&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I can try to implement a suggested solution from Scenario 1, but CMA is leveraged so I have to follow the change process that can take several weeks. Is there any way how to test it from the gateway configuration perspective? Gateway is for now, under my control so I can change what I need.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks indeed.&lt;/P&gt;</description>
      <pubDate>Thu, 21 Nov 2019 12:25:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/site-to-site-VPN-Encryption-domain-issue/m-p/68002#M12094</guid>
      <dc:creator>mselecky</dc:creator>
      <dc:date>2019-11-21T12:25:44Z</dc:date>
    </item>
    <item>
      <title>Re: site-to-site VPN - Encryption domain issue</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/site-to-site-VPN-Encryption-domain-issue/m-p/68003#M12095</link>
      <description>&lt;P&gt;You need to check on the Sophos what it receives from the Check Point when Check Point is initiating the tunnel.&lt;/P&gt;</description>
      <pubDate>Thu, 21 Nov 2019 12:29:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/site-to-site-VPN-Encryption-domain-issue/m-p/68003#M12095</guid>
      <dc:creator>Danny</dc:creator>
      <dc:date>2019-11-21T12:29:07Z</dc:date>
    </item>
    <item>
      <title>Re: site-to-site VPN - Encryption domain issue</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/site-to-site-VPN-Encryption-domain-issue/m-p/68013#M12096</link>
      <description>&lt;P&gt;OK so Sophos is sending&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;(192.168.200.0 255.255.252.0) which is the /22&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Check Point is sending&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;peer range 192.168.203.0-192.168.203.255 which is a /24&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;You will need to get the Check Point to send a /22 for the 192.168.200.0/22&lt;/STRONG&gt;&amp;nbsp;Network for this to work&lt;/P&gt;&lt;P&gt;Both are sending&amp;nbsp;&lt;SPAN&gt;172.16.16.0/24 so no issue there.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Would suggest Per Subnet for the Tunnel Management which would be a SmartConsole change and Policy Installation and then recheck with the vpn debug and ikeview&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 21 Nov 2019 14:11:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/site-to-site-VPN-Encryption-domain-issue/m-p/68013#M12096</guid>
      <dc:creator>mdjmcnally</dc:creator>
      <dc:date>2019-11-21T14:11:35Z</dc:date>
    </item>
    <item>
      <title>Re: site-to-site VPN - Encryption domain issue</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/site-to-site-VPN-Encryption-domain-issue/m-p/68027#M12097</link>
      <description>&lt;P&gt;The strangest thing is that I have in dashboard /22, but in IKEview I see that Checkpoint sends /24 proposal.&lt;/P&gt;</description>
      <pubDate>Thu, 21 Nov 2019 15:19:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/site-to-site-VPN-Encryption-domain-issue/m-p/68027#M12097</guid>
      <dc:creator>mselecky</dc:creator>
      <dc:date>2019-11-21T15:19:06Z</dc:date>
    </item>
    <item>
      <title>Re: site-to-site VPN - Encryption domain issue</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/site-to-site-VPN-Encryption-domain-issue/m-p/68029#M12098</link>
      <description>&lt;P&gt;The issue has been resolved.&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;The Sophos had /22 local encryption domain, so we changed it to multiple /24 subnets&lt;/LI&gt;&lt;LI&gt;The checkpoint had /22 remote encryption domain in the dashboard, but somehow proposed /24 (as per IKEview), So I changed the configuration in the dashboard to multiple /24 subnets.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Checkpoint tunnel management was changed to "per subnet" (per host and per gateway were rejected).&lt;/P&gt;&lt;P&gt;Now the tunnel is working in both directions.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks all of you for such great support.&lt;/P&gt;</description>
      <pubDate>Thu, 21 Nov 2019 15:32:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/site-to-site-VPN-Encryption-domain-issue/m-p/68029#M12098</guid>
      <dc:creator>mselecky</dc:creator>
      <dc:date>2019-11-21T15:32:14Z</dc:date>
    </item>
  </channel>
</rss>

