<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Route Based VPN - Configuration in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Route-Based-VPN-Configuration/m-p/51006#M12986</link>
    <description>&lt;P&gt;Hello Checkmates,&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am&amp;nbsp; implementing a hub and spoke topology using Checkpoint devices across our MPLS. All spoke checkpoint devices will be configured to route to the internet via the Hub Checkpoint.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am trying to setup Route based VPNs and I need some clarifications on the following.&amp;nbsp;&lt;/P&gt;&lt;P&gt;First is VTI supposed to work like GRE tunnels (we define tunnel local IPs, tunnel source and tunnel destination)? since it also allows routing protocols through IPSec tunnels.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2. Remote Address under the VTI - Is this suppose to be&amp;nbsp; the public IP of the peer gateway's external interface&amp;nbsp; or the local Private IP on the VTI of peer gateway.&amp;nbsp; Image below from checkpoint support center shows local (10.10.10.10) and remote (20.20.20.20). I was thinking they have to be on the same subnet for reachability&amp;nbsp; (local 10.10.10.10 and remote 10.10.10.11)&amp;nbsp; &amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="img 3.PNG" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/852iBDB05F96CFD602E3/image-size/large?v=v2&amp;amp;px=999" role="button" title="img 3.PNG" alt="img 3.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;3. For OSPF routing&amp;nbsp; I am using the GUI configuration - Do I have to select the VTI as part of the ospf interfaces for it form neighborship with the peer? I have selected all active LAN interfaces on the Checkpoint devices and I plan to use ospf default information originate to pass default route from Hub to Spoke devices.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you in anticipation.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 16 Apr 2019 00:36:18 GMT</pubDate>
    <dc:creator>Dami</dc:creator>
    <dc:date>2019-04-16T00:36:18Z</dc:date>
    <item>
      <title>Route Based VPN - Configuration</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Route-Based-VPN-Configuration/m-p/51006#M12986</link>
      <description>&lt;P&gt;Hello Checkmates,&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am&amp;nbsp; implementing a hub and spoke topology using Checkpoint devices across our MPLS. All spoke checkpoint devices will be configured to route to the internet via the Hub Checkpoint.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am trying to setup Route based VPNs and I need some clarifications on the following.&amp;nbsp;&lt;/P&gt;&lt;P&gt;First is VTI supposed to work like GRE tunnels (we define tunnel local IPs, tunnel source and tunnel destination)? since it also allows routing protocols through IPSec tunnels.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2. Remote Address under the VTI - Is this suppose to be&amp;nbsp; the public IP of the peer gateway's external interface&amp;nbsp; or the local Private IP on the VTI of peer gateway.&amp;nbsp; Image below from checkpoint support center shows local (10.10.10.10) and remote (20.20.20.20). I was thinking they have to be on the same subnet for reachability&amp;nbsp; (local 10.10.10.10 and remote 10.10.10.11)&amp;nbsp; &amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="img 3.PNG" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/852iBDB05F96CFD602E3/image-size/large?v=v2&amp;amp;px=999" role="button" title="img 3.PNG" alt="img 3.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;3. For OSPF routing&amp;nbsp; I am using the GUI configuration - Do I have to select the VTI as part of the ospf interfaces for it form neighborship with the peer? I have selected all active LAN interfaces on the Checkpoint devices and I plan to use ospf default information originate to pass default route from Hub to Spoke devices.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you in anticipation.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 16 Apr 2019 00:36:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Route-Based-VPN-Configuration/m-p/51006#M12986</guid>
      <dc:creator>Dami</dc:creator>
      <dc:date>2019-04-16T00:36:18Z</dc:date>
    </item>
    <item>
      <title>Re: Route Based VPN - Configuration</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Route-Based-VPN-Configuration/m-p/51330#M12987</link>
      <description>VTI is similar to GRE in that traffic routed through the interface is encrypted.&lt;BR /&gt;The difference with VTI is that the encapsulation is IPSEC.&lt;BR /&gt;VTI interfaces are "point to point" and do not have to be on the same subnet.&lt;BR /&gt;The VTI IP addresses are private.&lt;BR /&gt;If you want OSPF to communicate routes over the VTI interface to the peer at the other end, it must be enabled on both ends of the VTI interface.</description>
      <pubDate>Fri, 19 Apr 2019 00:59:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Route-Based-VPN-Configuration/m-p/51330#M12987</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-04-19T00:59:27Z</dc:date>
    </item>
  </channel>
</rss>

