<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Site-Site Tunnel with NAT to a second Tunnel in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-Site-Tunnel-with-NAT-to-a-second-Tunnel/m-p/56770#M12556</link>
    <description>What is the encryption domain defined as on your Gateway?&lt;BR /&gt;It should include ALL the subnets that need to communicate with the remote peer.</description>
    <pubDate>Thu, 27 Jun 2019 02:33:42 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2019-06-27T02:33:42Z</dc:date>
    <item>
      <title>Site-Site Tunnel with NAT to a second Tunnel</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-Site-Tunnel-with-NAT-to-a-second-Tunnel/m-p/56559#M12555</link>
      <description>&lt;P&gt;Hello all,&lt;/P&gt;&lt;P&gt;I'm in no way a experienced admin of Check Point, this is a situation that I was tasked with because no one else would take it.&lt;BR /&gt;I'm used to work with palo and asa devices, so I might be missing something here.&lt;/P&gt;&lt;P&gt;This is the basic layout:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Untitled.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/1670i99693AC991E7A147/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Untitled.png" alt="Untitled.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Due to whatever policies, 10.13.1.x can't be connected directly to 1.1.1.1, so the solution was to create the tunnel between devices 1 and 2.&lt;/P&gt;&lt;P&gt;Device 1 is a Fortinet that I have no control over.&lt;BR /&gt;The tunnel between device 2 and 10.13.1.x already exists and is ok.&lt;BR /&gt;&lt;BR /&gt;I have assigned 172.31.221.201 to a internal interface on device 2, that is a Check Point device, and created access and nat rules that I can see applied on logs when I telnet one of the allowed ports from 10.13.1.11 to 172.31.201.82&lt;BR /&gt;&lt;BR /&gt;Phase 1 is ok,&amp;nbsp; but the admin of device 1 says it sees device 2 trying to negotiate the 10.13.1.x subnet but not 172.31.221.x on phase 2. Is there any way I can force 2 to negotiate only the wanted subnet?&lt;/P&gt;&lt;P&gt;Should I create a new gateway object for this new tunnel and set the topology to this address? On a palo device I would create a new IKE gateway for each tunnel I want to establish. Is this the same logic on Check Point?&lt;/P&gt;&lt;P&gt;Thank you for any help you provide.&lt;/P&gt;</description>
      <pubDate>Tue, 13 Aug 2019 13:48:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-Site-Tunnel-with-NAT-to-a-second-Tunnel/m-p/56559#M12555</guid>
      <dc:creator>DFR_</dc:creator>
      <dc:date>2019-08-13T13:48:48Z</dc:date>
    </item>
    <item>
      <title>Re: Site-Site Tunnel with NAT to a second Tunnel</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-Site-Tunnel-with-NAT-to-a-second-Tunnel/m-p/56770#M12556</link>
      <description>What is the encryption domain defined as on your Gateway?&lt;BR /&gt;It should include ALL the subnets that need to communicate with the remote peer.</description>
      <pubDate>Thu, 27 Jun 2019 02:33:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-Site-Tunnel-with-NAT-to-a-second-Tunnel/m-p/56770#M12556</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-06-27T02:33:42Z</dc:date>
    </item>
    <item>
      <title>Re: Site-Site Tunnel with NAT to a second Tunnel</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-Site-Tunnel-with-NAT-to-a-second-Tunnel/m-p/60232#M12557</link>
      <description>&lt;P&gt;It wasn't solved, but thank you for the reply,&lt;/P&gt;&lt;P&gt;I had people with CheckPoint certs look at the config and nothing seemed wrong, but it wouldn't work as intended.&lt;/P&gt;&lt;P&gt;In the end, a few quirks like this one became deal breakers for the techs on the client team, so we replaced that demo device with something else they were more familiar with.&lt;/P&gt;</description>
      <pubDate>Tue, 13 Aug 2019 13:47:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-Site-Tunnel-with-NAT-to-a-second-Tunnel/m-p/60232#M12557</guid>
      <dc:creator>DFR_</dc:creator>
      <dc:date>2019-08-13T13:47:06Z</dc:date>
    </item>
  </channel>
</rss>

