<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: CheckPoint VPN R77.30/R80.20 vs. Cisco ASA 5516 in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CheckPoint-VPN-R77-30-R80-20-vs-Cisco-ASA-5516/m-p/49647#M12955</link>
    <description>&lt;P&gt;In the properties of the VPN Community object under VPN Tunnel Sharing, select the option "one tunnel per pair of hosts" and reinstall policy.&lt;/P&gt;</description>
    <pubDate>Wed, 03 Apr 2019 01:58:32 GMT</pubDate>
    <dc:creator>Timothy_Hall</dc:creator>
    <dc:date>2019-04-03T01:58:32Z</dc:date>
    <item>
      <title>CheckPoint VPN R77.30/R80.20 vs. Cisco ASA 5516</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CheckPoint-VPN-R77-30-R80-20-vs-Cisco-ASA-5516/m-p/49604#M12953</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;it's my first post in about 25 years installing CP (first one was an 4.1 on NT 4.0 Server).&lt;/P&gt;&lt;P&gt;I configured as usual my VPN and other site is very collaborative.&lt;/P&gt;&lt;P&gt;IKE Phase 1 is OK!&lt;/P&gt;&lt;P&gt;IPSEC Phase 2 starts it appears in VPN TU -&amp;gt; 2 menu ... but no INBOUND/OUTBOUND created.&lt;/P&gt;&lt;P&gt;I tried to follow almost any SK, now I also configured user.def.FW1 (I,m testing both on old R77.30 appliance and new R80.20 openserver vmware).&lt;/P&gt;&lt;P&gt;My problem I supposed is to export only one HOST 192.168.220.1/32 (yes, 255.255.255.255) to reach another single host 10.103.201.95/32 ... I already asked other side to create Network Object on Cisco and not Host Object, but no way.&lt;/P&gt;&lt;P&gt;I really don't know how to fix this problem,&lt;BR /&gt;if somebody had same issue and wants to share solution,&lt;/P&gt;&lt;P&gt;Although tomorrow morning I'll open a ticket to Support and I try to fix with them.&lt;/P&gt;&lt;P&gt;I prefer to study solution and to debug, instead of directly ask for support, but this time it seems to be grater than me.&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Francesco.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 02 Apr 2019 17:01:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CheckPoint-VPN-R77-30-R80-20-vs-Cisco-ASA-5516/m-p/49604#M12953</guid>
      <dc:creator>Francesco_Bonat</dc:creator>
      <dc:date>2019-04-02T17:01:51Z</dc:date>
    </item>
    <item>
      <title>Re: CheckPoint VPN R77.30/R80.20 vs. Cisco ASA 5516</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CheckPoint-VPN-R77-30-R80-20-vs-Cisco-ASA-5516/m-p/49645#M12954</link>
      <description>&lt;P&gt;What is the full path to the user.def.FW1 you are modifying?&amp;nbsp;Since you're using R80.20 to manage R77.30, you need to modify the one in the R77.x Backward Compatibility directory.&lt;/P&gt;
&lt;P&gt;This thread may also be helpful in debugging:&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Access-Control-Products/VPN-Troubleshooting-Commands/m-p/39636#M92" target="_blank"&gt;https&lt;span class="lia-unicode-emoji" title=":confused_face:"&gt;😕&lt;/span&gt;/community.checkpoint.com/t5/Access-Control-Products/VPN-Troubleshooting-Commands/m-p/39636#M92&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 03 Apr 2019 01:51:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CheckPoint-VPN-R77-30-R80-20-vs-Cisco-ASA-5516/m-p/49645#M12954</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-04-03T01:51:28Z</dc:date>
    </item>
    <item>
      <title>Re: CheckPoint VPN R77.30/R80.20 vs. Cisco ASA 5516</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CheckPoint-VPN-R77-30-R80-20-vs-Cisco-ASA-5516/m-p/49647#M12955</link>
      <description>&lt;P&gt;In the properties of the VPN Community object under VPN Tunnel Sharing, select the option "one tunnel per pair of hosts" and reinstall policy.&lt;/P&gt;</description>
      <pubDate>Wed, 03 Apr 2019 01:58:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CheckPoint-VPN-R77-30-R80-20-vs-Cisco-ASA-5516/m-p/49647#M12955</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2019-04-03T01:58:32Z</dc:date>
    </item>
    <item>
      <title>Re: CheckPoint VPN R77.30/R80.20 vs. Cisco ASA 5516</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CheckPoint-VPN-R77-30-R80-20-vs-Cisco-ASA-5516/m-p/51017#M12956</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;thanks for your answer,&lt;/P&gt;&lt;P&gt;I'm using two different gateways one full stand-alone R77.30 and another full stand-alone R80.20,&lt;/P&gt;&lt;P&gt;both have same problem. I'm testing solution proposed by another user to change one tunnel per host pair.&lt;/P&gt;&lt;P&gt;I'm modifying correct .user.def files, I followed info found on SK.&lt;/P&gt;</description>
      <pubDate>Tue, 16 Apr 2019 06:13:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CheckPoint-VPN-R77-30-R80-20-vs-Cisco-ASA-5516/m-p/51017#M12956</guid>
      <dc:creator>Francesco_Bonat</dc:creator>
      <dc:date>2019-04-16T06:13:27Z</dc:date>
    </item>
  </channel>
</rss>

