<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: what information do we need from the remote site customer when creating site to site VPN? in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/what-information-do-we-need-from-the-remote-site-customer-when/m-p/7265#M13026</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm pretty sure in an externally managed gateway scenario, you're not exchanging topology automatically.&lt;/P&gt;&lt;P&gt;Basically all it's saying is that your local definition should be the same as it is defined on the remote site (using similar subnet definitions, settings, etc).&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 24 Sep 2018 14:50:56 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2018-09-24T14:50:56Z</dc:date>
    <item>
      <title>what information do we need from the remote site customer when creating site to site VPN?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/what-information-do-we-need-from-the-remote-site-customer-when/m-p/7253#M13014</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;what information do we need from the remote site customer when creating site to site VPN?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 08 Oct 2017 22:20:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/what-information-do-we-need-from-the-remote-site-customer-when/m-p/7253#M13014</guid>
      <dc:creator>jamal_shah</dc:creator>
      <dc:date>2017-10-08T22:20:18Z</dc:date>
    </item>
    <item>
      <title>Re: what information do we need from the remote site customer when creating site to site VPN?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/what-information-do-we-need-from-the-remote-site-customer-when/m-p/7254#M13015</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;At a very high level:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Remote subnets you will access&lt;/LI&gt;&lt;LI&gt;Remote subnets that will access your resources&lt;/LI&gt;&lt;LI&gt;The agreed-upon encryption algorithms&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;It gets a bit more complicated if both ends of the VPN are using the same address space.&lt;/P&gt;&lt;P&gt;See more here:&amp;nbsp;&lt;A class="link-titled" href="https://sc1.checkpoint.com/documents/R80.10/WebAdminGuides/EN/CP_R80.10_SitetoSiteVPN_AdminGuide/html_frameset.htm" title="https://sc1.checkpoint.com/documents/R80.10/WebAdminGuides/EN/CP_R80.10_SitetoSiteVPN_AdminGuide/html_frameset.htm"&gt;Site to Site VPN R80.10 - Part of Check Point Infinity&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 09 Oct 2017 03:46:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/what-information-do-we-need-from-the-remote-site-customer-when/m-p/7254#M13015</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2017-10-09T03:46:08Z</dc:date>
    </item>
    <item>
      <title>Re: what information do we need from the remote site customer when creating site to site VPN?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/what-information-do-we-need-from-the-remote-site-customer-when/m-p/7255#M13016</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You need to exchange information with the remote site customer as he needs to configure the VPN on his side as well and therefore needs to know the external IP address of your VPN gateway, encryption domain, encryption settings and other data.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best practice is to fill out a &lt;STRONG&gt;VPN Datasheet&lt;/STRONG&gt; like this one:&lt;/P&gt;&lt;TABLE class="j-table jiveBorder" style="border: 1px solid #c6c6c6;" width="100%"&gt;&lt;THEAD&gt;&lt;TR style="background-color: #efefef;"&gt;&lt;TH style="width: 54.7764%;"&gt;VPN Site 1&lt;/TH&gt;&lt;TH style="width: 43.8984%;"&gt;VPN Site 2&lt;/TH&gt;&lt;/TR&gt;&lt;/THEAD&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD style="width: 54.7764%;"&gt;&lt;STRONG&gt;Company A&lt;/STRONG&gt;&lt;/TD&gt;&lt;TD style="width: 43.8984%;"&gt;&lt;STRONG&gt;Company B&lt;/STRONG&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="width: 54.7764%;"&gt;Requested by:&lt;/TD&gt;&lt;TD style="width: 43.8984%;"&gt;Requested by:&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="width: 54.7764%;"&gt;Planning contact:&lt;/TD&gt;&lt;TD style="width: 43.8984%;"&gt;Planning contact:&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="width: 54.7764%;"&gt;Responsible for installation:&lt;/TD&gt;&lt;TD style="width: 43.8984%;"&gt;Responsible for installation:&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD colspan="2" style="width: 98.6748%;"&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD colspan="2" style="background-color: #ebebeb; width: 98.6748%;"&gt;&lt;STRONG&gt;VPN Gateway&lt;/STRONG&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="width: 54.7764%;"&gt;Hardware Vendor &amp;amp; Version: Check Point R&lt;SPAN style="color: #d9d9d9;"&gt;__.__&lt;/SPAN&gt;&lt;/TD&gt;&lt;TD style="width: 43.8984%;"&gt;Hardware Vendor &amp;amp; Version:&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="width: 54.7764%;"&gt;External IP address:&lt;/TD&gt;&lt;TD style="width: 43.8984%;"&gt;External IP address:&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="width: 54.7764%;"&gt;&lt;P&gt;Encryption Domain / Crypto Map:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Additional NAT-IPs if Source NAT is required:&lt;/LI&gt;&lt;/UL&gt;&lt;/TD&gt;&lt;TD style="width: 43.8984%;"&gt;Encryption Domain / Crypto Map:&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD colspan="2" style="width: 98.6748%;"&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD colspan="2" style="background-color: #d0edb2; width: 98.6748%;"&gt;&lt;STRONG&gt;VPN Phase 1 (IKE)&lt;/STRONG&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="width: 54.7764%;"&gt;&lt;P&gt;Key Management:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;EM&gt;IKEv1 for IPv4, IKEv2 for IPv6&lt;BR /&gt;&lt;/EM&gt;&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;&lt;EM&gt;IKEv2 only&lt;BR /&gt;&lt;/EM&gt;&lt;/STRONG&gt;&lt;/LI&gt;&lt;LI&gt;&lt;EM&gt;Prefer IKEv2, support IKEv1&lt;/EM&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/TD&gt;&lt;TD style="width: 43.8984%;"&gt;&lt;P&gt;Key Management:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;EM&gt;IKEv1&lt;/EM&gt;&lt;/LI&gt;&lt;LI&gt;&lt;EM&gt;IKEv2&lt;/EM&gt;&lt;/LI&gt;&lt;LI&gt;&lt;EM&gt;Prefer IKEv2, support IKEv1&lt;/EM&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="width: 54.7764%;"&gt;&lt;P&gt;DH-Group (Diffie-Hellman):&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;EM&gt;Group 1 (768 bit)&lt;/EM&gt;&lt;/LI&gt;&lt;LI&gt;&lt;EM&gt;Group 2 (1024 bit)&lt;/EM&gt;&lt;/LI&gt;&lt;LI&gt;&lt;EM&gt;Group 5 (1536 bit)&lt;/EM&gt;&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;&lt;EM&gt;Group 14 (2048 bit)&lt;/EM&gt;&lt;/STRONG&gt;&lt;/LI&gt;&lt;LI&gt;&lt;EM&gt;Group 19 (256-bit ECP)&lt;/EM&gt;&lt;/LI&gt;&lt;LI&gt;&lt;EM&gt;Group 20 (384-bit ECP)&lt;/EM&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/TD&gt;&lt;TD style="width: 43.8984%;"&gt;DH-Group (Diffie-Hellman):&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="width: 54.7764%;"&gt;&lt;P&gt;Encryption Algorithm:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;&lt;EM&gt;AES-256&lt;/EM&gt;&lt;/STRONG&gt;&lt;/LI&gt;&lt;LI&gt;&lt;EM&gt;3DES&lt;/EM&gt;&lt;/LI&gt;&lt;LI&gt;&lt;EM&gt;DES&lt;/EM&gt;&lt;/LI&gt;&lt;LI&gt;&lt;EM&gt;CAST&lt;/EM&gt;&lt;/LI&gt;&lt;LI&gt;&lt;EM&gt;&lt;A href="https://en.wikipedia.org/wiki/GOST_(block_cipher)"&gt;GOST&lt;/A&gt;&lt;/EM&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/TD&gt;&lt;TD style="width: 43.8984%;"&gt;Encryption Algorithm:&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="width: 54.7764%;"&gt;&lt;P&gt;Hash / Data Integrity:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;EM&gt;MD5&lt;/EM&gt;&lt;/LI&gt;&lt;LI&gt;&lt;EM&gt;SHA1&lt;/EM&gt;&lt;/LI&gt;&lt;LI&gt;&lt;EM&gt;&lt;STRONG&gt;SHA-256 (SHA-2)&lt;/STRONG&gt;&lt;BR /&gt;&lt;/EM&gt;&lt;/LI&gt;&lt;LI&gt;&lt;EM&gt;SHA-384 (SHA-2)&lt;BR /&gt;&lt;/EM&gt;&lt;/LI&gt;&lt;LI&gt;&lt;EM&gt;AES-XCBC&lt;/EM&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/TD&gt;&lt;TD style="width: 43.8984%;"&gt;Hash:&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="width: 54.7764%;"&gt;&lt;P&gt;Pseudo Random Function (PRF):&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;EM&gt;No&lt;/EM&gt;&lt;/LI&gt;&lt;LI&gt;&lt;EM&gt;Yes: &lt;STRONG&gt;SHA-256 (SHA-2)&lt;/STRONG&gt;&lt;/EM&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/TD&gt;&lt;TD style="width: 43.8984%;"&gt;&lt;P&gt;Pseudo Random Function (PRF):&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;EM&gt;No&lt;/EM&gt;&lt;/LI&gt;&lt;LI&gt;&lt;EM&gt;Yes:&lt;/EM&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="width: 54.7764%;"&gt;&lt;P&gt;Authentication Method:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2175-howto-set-up-certificate-based-vpns-with-check-point-appliances-r77-edition"&gt;Certificate&lt;/A&gt;&lt;/LI&gt;&lt;LI&gt;Pre-Shared Secret&lt;/LI&gt;&lt;/UL&gt;&lt;/TD&gt;&lt;TD style="width: 43.8984%;"&gt;&lt;P&gt;Authentication Method:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2175-howto-set-up-certificate-based-vpns-with-check-point-appliances-r77-edition"&gt;Certificate&lt;/A&gt;&lt;/LI&gt;&lt;LI&gt;Pre-Shared Secret&lt;/LI&gt;&lt;/UL&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="width: 54.7764%;"&gt;&lt;P&gt;SA Lifetime / Renegotiation time: &lt;SPAN style="color: #999999;"&gt;1440 min. (Default)&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="width: 43.8984%;"&gt;&lt;P&gt;SA Lifetime:&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD colspan="2" style="width: 54.7764%;"&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD colspan="2" style="background-color: #d0edb2; width: 98.6748%;"&gt;&lt;P&gt;&lt;STRONG&gt;VPN Phase 2 (IPSec)&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="width: 54.7764%;"&gt;&lt;P&gt;Encapsulation: ESP&lt;/P&gt;&lt;/TD&gt;&lt;TD style="width: 43.8984%;"&gt;&lt;P&gt;Encapsulation: ESP&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="width: 54.7764%;"&gt;&lt;P&gt;Perfect Forward Secrecy (PFS): &lt;SPAN style="color: #000000;"&gt;&lt;STRONG&gt;Yes&lt;/STRONG&gt; / No&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="width: 43.8984%;"&gt;&lt;P&gt;Perfect Forward Secrecy (PFS): &lt;SPAN style="color: #000000;"&gt;&lt;STRONG&gt;Yes&lt;/STRONG&gt; / No&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="width: 54.7764%;"&gt;&lt;P&gt;DH-Group (Diffie-Hellman):&lt;/P&gt;&lt;P&gt;Group 1 (768 bit)&lt;/P&gt;&lt;P&gt;Group 2 (1024 bit)&lt;/P&gt;&lt;P&gt;Group 5 (1536 bit)&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Group 14 (2048 bit)&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Group 19 (256-bit ECP)&lt;/P&gt;&lt;P&gt;Group 20 (384-bit ECP)&lt;/P&gt;&lt;/TD&gt;&lt;TD style="width: 43.8984%;"&gt;&lt;P&gt;DH-Group (Diffie-Hellman):&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="width: 54.7764%;"&gt;&lt;P&gt;Encryption Algorithm:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;EM&gt;3DES&lt;/EM&gt;&lt;/LI&gt;&lt;LI&gt;&lt;EM&gt;AES-128&lt;/EM&gt;&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;&lt;EM&gt;AES-256&lt;/EM&gt;&lt;/STRONG&gt;&lt;/LI&gt;&lt;LI&gt;&lt;EM&gt;AES-GCM-128&lt;/EM&gt;&lt;/LI&gt;&lt;LI&gt;&lt;EM&gt;AES-GCM-256&lt;/EM&gt;&lt;/LI&gt;&lt;LI&gt;&lt;EM&gt;DES&lt;/EM&gt;&lt;/LI&gt;&lt;LI&gt;&lt;EM&gt;CAST&lt;/EM&gt;&lt;/LI&gt;&lt;LI&gt;&lt;EM&gt;&lt;A href="https://en.wikipedia.org/wiki/GOST_(block_cipher)"&gt;GOST&lt;/A&gt;&lt;/EM&gt;&lt;/LI&gt;&lt;LI&gt;&lt;EM&gt;DES-40CP&lt;/EM&gt;&lt;/LI&gt;&lt;LI&gt;&lt;EM&gt;CAST-40&lt;/EM&gt;&lt;/LI&gt;&lt;LI&gt;&lt;EM&gt;NULL&lt;/EM&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/TD&gt;&lt;TD style="width: 43.8984%;"&gt;&lt;P&gt;Encryption Algorithm:&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="width: 54.7764%;"&gt;&lt;P&gt;Hash / Data Integrity:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;EM&gt;MD5&lt;/EM&gt;&lt;/LI&gt;&lt;LI&gt;&lt;EM&gt;SHA1&lt;/EM&gt;&lt;/LI&gt;&lt;LI&gt;&lt;EM&gt;&lt;STRONG&gt;SHA-256 (SHA-2)&lt;/STRONG&gt;&lt;BR /&gt;&lt;/EM&gt;&lt;/LI&gt;&lt;LI&gt;&lt;EM&gt;SHA-384 (SHA-2)&lt;BR /&gt;&lt;/EM&gt;&lt;/LI&gt;&lt;LI&gt;&lt;EM&gt;AES-XCBC&lt;/EM&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/TD&gt;&lt;TD style="width: 43.8984%;"&gt;&lt;P&gt;Hash:&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="width: 54.7764%;"&gt;&lt;P&gt;Aggressive Mode: &lt;SPAN style="color: #000000;"&gt;Yes / &lt;STRONG&gt;No&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="width: 43.8984%;"&gt;&lt;P&gt;Aggressive Mode: &lt;SPAN style="color: #000000;"&gt;Yes / &lt;STRONG&gt;No&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="width: 54.7764%;"&gt;&lt;P&gt;SA Lifetime: &lt;SPAN style="color: #999999;"&gt;3600 sec. (Default)&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="width: 43.8984%;"&gt;&lt;P&gt;SA Lifetime:&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD colspan="2" style="width: 54.7764%;"&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD colspan="2" style="background-color: #ebebeb; width: 98.6748%;"&gt;&lt;STRONG&gt;VPN Tunnel Sharing&lt;BR /&gt;&lt;/STRONG&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="width: 54.7764%;"&gt;&lt;UL&gt;&lt;LI&gt;&lt;SPAN style="color: #000000;"&gt;&lt;EM&gt;One VPN tunnel per each pair of hosts&lt;/EM&gt;&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="color: #000000;"&gt;&lt;STRONG&gt;&lt;EM&gt;One VPN tunnel per subnet pair (Default)&lt;/EM&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="color: #000000;"&gt;&lt;EM&gt;One VPN tunnel per Gateway pair&lt;/EM&gt;&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/TD&gt;&lt;TD style="width: 43.8984%;"&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD colspan="2" style="width: 54.7764%;"&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD colspan="2" style="background-color: #ebebeb; width: 98.6748%;"&gt;&lt;STRONG&gt;VPN NAT Options&lt;BR /&gt;&lt;/STRONG&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="width: 54.7764%;"&gt;&lt;P&gt;Disable NAT inside the VPN traffic: &lt;SPAN style="color: #999999;"&gt;Yes / &lt;STRONG&gt;No&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD style="width: 43.8984%;"&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD colspan="2" style="width: 54.7764%;"&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD colspan="2" style="background-color: #ebebeb; width: 98.6748%;"&gt;&lt;P&gt;&lt;STRONG&gt;VPN Interesting Traffic&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="width: 54.7764%;"&gt;&lt;P&gt;Inbound from Site 2:&lt;/P&gt;&lt;/TD&gt;&lt;TD style="width: 43.8984%;"&gt;Inbound from Site 1:&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD style="width: 54.7764%;"&gt;&lt;P&gt;Outbound to Site 2:&lt;/P&gt;&lt;/TD&gt;&lt;TD style="width: 43.8984%;"&gt;Outbound to Site 1:&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 09 Oct 2017 07:14:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/what-information-do-we-need-from-the-remote-site-customer-when/m-p/7255#M13016</guid>
      <dc:creator>Danny</dc:creator>
      <dc:date>2017-10-09T07:14:34Z</dc:date>
    </item>
    <item>
      <title>Re: what information do we need from the remote site customer when creating site to site VPN?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/what-information-do-we-need-from-the-remote-site-customer-when/m-p/7256#M13017</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;A great worksheet, just want to emphasize that the Phase 1 SA Lifetime is expressed by Check Point in minutes, while the Phase 2 SA Lifetime is expressed by Check Point in seconds.&amp;nbsp; Most other vendors express both values in seconds.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If these values are mismatched between the two sites the VPN will still start and appear to work, but for an interoperable VPN situation in particular Delete SAs don't always work correctly.&amp;nbsp; This will cause seemingly random hangs of the VPN tunnel that can be rectified by killing the tunnel via "vpn tu", at which point the VPN will immediately pop back up and start working...until the hang happens again.&amp;nbsp; Also watch out for early tunnel expirations due to a Data Lifesize limit being reached or a VPN idle timer expiring.&amp;nbsp; Enabling Permanent Tunnels (and enabling DPD with it for interoperable VPNs) is strongly recommended.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&lt;BR /&gt; My book "Max Power: Check Point Firewall Performance Optimization" &lt;BR /&gt; now available via &lt;A href="http://maxpowerfirewalls.com" target="_blank"&gt;http://maxpowerfirewalls.com&lt;/A&gt;.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 09 Oct 2017 13:18:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/what-information-do-we-need-from-the-remote-site-customer-when/m-p/7256#M13017</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2017-10-09T13:18:21Z</dc:date>
    </item>
    <item>
      <title>Re: what information do we need from the remote site customer when creating site to site VPN?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/what-information-do-we-need-from-the-remote-site-customer-when/m-p/7257#M13018</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That is very helpful &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 09 Oct 2017 17:22:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/what-information-do-we-need-from-the-remote-site-customer-when/m-p/7257#M13018</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2017-10-09T17:22:04Z</dc:date>
    </item>
    <item>
      <title>Re: what information do we need from the remote site customer when creating site to site VPN?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/what-information-do-we-need-from-the-remote-site-customer-when/m-p/7258#M13019</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;For Phase 1 Encryption Algorithm:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;&lt;EM&gt;AES-256&lt;/EM&gt;&lt;/STRONG&gt;&lt;STRONG&gt;&lt;/STRONG&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;STRONG&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;Is it CBC or ECB?&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 05 Jan 2018 14:34:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/what-information-do-we-need-from-the-remote-site-customer-when/m-p/7258#M13019</guid>
      <dc:creator>besal_mon</dc:creator>
      <dc:date>2018-01-05T14:34:24Z</dc:date>
    </item>
    <item>
      <title>Re: what information do we need from the remote site customer when creating site to site VPN?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/what-information-do-we-need-from-the-remote-site-customer-when/m-p/7259#M13020</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Pretty sure it is CBC: &lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk105119&amp;amp;partition=General&amp;amp;product=IPSec" style="max-width: 840px;"&gt;sk105119: Best Practices - VPN Performance&lt;/A&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&lt;BR /&gt; My Book "Max Power: Check Point Firewall Performance Optimization" &lt;BR /&gt; Second Edition Coming Soon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 05 Jan 2018 18:47:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/what-information-do-we-need-from-the-remote-site-customer-when/m-p/7259#M13020</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2018-01-05T18:47:18Z</dc:date>
    </item>
    <item>
      <title>Re: what information do we need from the remote site customer when creating site to site VPN?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/what-information-do-we-need-from-the-remote-site-customer-when/m-p/7260#M13021</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Danny,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you post the .doc version of the VPN worksheet?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 24 Sep 2018 12:42:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/what-information-do-we-need-from-the-remote-site-customer-when/m-p/7260#M13021</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2018-09-24T12:42:18Z</dc:date>
    </item>
    <item>
      <title>Re: what information do we need from the remote site customer when creating site to site VPN?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/what-information-do-we-need-from-the-remote-site-customer-when/m-p/7261#M13022</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I created the above datasheet from scratch within this Jive portal using html tables and standard text formatting. Therefore I don't have a .doc version but you should be able to easily copy it from here into any .doc.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 24 Sep 2018 13:27:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/what-information-do-we-need-from-the-remote-site-customer-when/m-p/7261#M13022</guid>
      <dc:creator>Danny</dc:creator>
      <dc:date>2018-09-24T13:27:23Z</dc:date>
    </item>
    <item>
      <title>Re: what information do we need from the remote site customer when creating site to site VPN?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/what-information-do-we-need-from-the-remote-site-customer-when/m-p/7262#M13023</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks Danny. I've exported it to a document and copy/pasted it in Word and it looks fine.&lt;/P&gt;&lt;P&gt;I'd like to ask you a question though: for Check Point to Check Point externally managed gateway, one of the pre-requisites is the topology data exchange and it is not included in this document.&lt;/P&gt;&lt;P&gt;Is it still a requirement in R80.10 (I believe it is referencing older documents in the R80.10&amp;nbsp; Advanced VPN Configuration Guide) and if so, can you add it to your template?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 24 Sep 2018 13:39:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/what-information-do-we-need-from-the-remote-site-customer-when/m-p/7262#M13023</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2018-09-24T13:39:15Z</dc:date>
    </item>
    <item>
      <title>Re: what information do we need from the remote site customer when creating site to site VPN?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/what-information-do-we-need-from-the-remote-site-customer-when/m-p/7263#M13024</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In my experience this is not a pre-requisite. I'm using many of these configurations and never exchanged the entire topology data, just the networks that are part of the interesting traffic.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 24 Sep 2018 13:57:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/what-information-do-we-need-from-the-remote-site-customer-when/m-p/7263#M13024</guid>
      <dc:creator>Danny</dc:creator>
      <dc:date>2018-09-24T13:57:12Z</dc:date>
    </item>
    <item>
      <title>Re: what information do we need from the remote site customer when creating site to site VPN?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/what-information-do-we-need-from-the-remote-site-customer-when/m-p/7264#M13025</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can someone from Check Point provide a definitive answer to the topology exchange requirements between externally managed gateways?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;According to the Advanced VPN Configuration Guide:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin: 3.0pt 0in 3.0pt 0in;"&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;To configure a VPN using pre-shared secrets, with the external Security Gateways as satellites in a star VPN Community, proceed as follows:&lt;/SPAN&gt;&lt;/P&gt;&lt;OL&gt;&lt;LI style="text-indent: 0in; margin: 6.0pt 0in .0001pt .5in;"&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt; &lt;/SPAN&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;Define the Network Object(s) of the Security Gateways that are internally managed. In particular, be sure to do the following:&lt;/SPAN&gt;&lt;UL&gt;&lt;LI style="text-indent: 0in; margin: 3.0pt 0in .0001pt 1.0in;"&gt;&lt;SPAN style="font-size: 10.0pt; color: black;"&gt; &lt;/SPAN&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;In the&amp;nbsp;&lt;STRONG&gt;General Properties&lt;/STRONG&gt;page of the Security Gateway object, select&amp;nbsp;&lt;STRONG&gt;VPN&lt;/STRONG&gt;.&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI style="text-indent: 0in; margin: 3.0pt 0in .0001pt 1.0in;"&gt;&lt;SPAN style="font-size: 10.0pt; color: black;"&gt; &lt;/SPAN&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;In the&amp;nbsp;&lt;STRONG&gt;Topology&lt;/STRONG&gt;page, define the&amp;nbsp;&lt;STRONG&gt;Topology&lt;/STRONG&gt;, and the&amp;nbsp;&lt;STRONG&gt;VPN Domain&lt;/STRONG&gt;. If the VPN Domain does not contain all the IP addresses behind the Security Gateway, define the VPN domain manually by defining a group or network of machines and setting them as the VPN Domain.&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI style="text-indent: 0in; margin: 6.0pt 0in .0001pt .5in;"&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt; &lt;/SPAN&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;Define the Network Object(s) of the externally managed Security Gateway(s).&lt;/SPAN&gt;&lt;UL&gt;&lt;LI style="text-indent: 0in; margin: 3.0pt 0in .0001pt 1.0in;"&gt;&lt;SPAN style="font-size: 10.0pt; color: black;"&gt; &lt;/SPAN&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;If it is not a Check Point Security Gateway, define an Interoperable Device object from:&amp;nbsp;&lt;STRONG&gt;Manage &amp;gt; Network Objects... &amp;gt; New... &amp;gt; Interoperable Device...&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI style="text-indent: 0in; margin: 3.0pt 0in .0001pt 1.0in;"&gt;&lt;SPAN style="font-size: 10.0pt; color: black;"&gt; &lt;/SPAN&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;If it is a Check Point Security Gateway, In the&amp;nbsp;&lt;STRONG&gt;Network Objects&lt;/STRONG&gt;tree, right click and select&amp;nbsp;&lt;STRONG&gt;New &amp;gt; Check Point &amp;gt; Externally Managed Security Gateway...&lt;/STRONG&gt;.&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI style="text-indent: 0in; margin: 6.0pt 0in .0001pt .5in;"&gt;&lt;SPAN style="font-size: 10.5pt; color: black; background: yellow;"&gt; &lt;/SPAN&gt;&lt;SPAN style="font-size: 10.5pt; color: black; background: yellow;"&gt;Set the various attributes of the peer Security Gateway. In particular, be sure to do the following:&lt;/SPAN&gt;&lt;UL&gt;&lt;LI style="text-indent: 0in; margin: 3.0pt 0in .0001pt 1.0in;"&gt;&lt;SPAN style="font-size: 10.0pt; color: black;"&gt; &lt;/SPAN&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;In the&amp;nbsp;&lt;STRONG&gt;General Properties&lt;/STRONG&gt;page of the Security Gateway object, select&amp;nbsp;&lt;STRONG&gt;VPN&lt;/STRONG&gt;&amp;nbsp;(for an Externally Managed Check Point Security Gateway object only).&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI style="text-indent: 0in; margin: 3.0pt 0in .0001pt 1.0in;"&gt;&lt;SPAN style="font-size: 10.0pt; color: black;"&gt; &lt;/SPAN&gt;&lt;SPAN style="font-size: 10.5pt; color: black; background: yellow;"&gt;In the&amp;nbsp;&lt;STRONG&gt;Topology&lt;/STRONG&gt;page, define the&amp;nbsp;&lt;STRONG&gt;Topology&lt;/STRONG&gt;&amp;nbsp;and the&amp;nbsp;&lt;STRONG&gt;VPN Domain&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;&amp;nbsp;using the VPN Domain information obtained from the peer administrator. If the VPN Domain does not contain all the IP addresses behind the Security Gateway, define the VPN domain manually by defining a group or network of machines and setting them as the VPN Domain.&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI style="text-indent: 0in; margin: 6.0pt 0in .0001pt .5in;"&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt; &lt;/SPAN&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;Define the Community. The following details assume that a Star Community was chosen, but a Meshed Community is an option as well. If working with a Mesh community, ignore the difference between the Central Security Gateways and the Satellite Security Gateways.&lt;/SPAN&gt;&lt;UL&gt;&lt;LI style="text-indent: 0in; margin: 3.0pt 0in .0001pt 1.0in;"&gt;&lt;SPAN style="font-size: 10.0pt; color: black;"&gt; &lt;/SPAN&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;Agree with the peer administrator about the various IKE properties and set them in the&amp;nbsp;&lt;STRONG&gt;VPN Properties&lt;/STRONG&gt;page and the&amp;nbsp;&lt;STRONG&gt;Advanced Properties&lt;/STRONG&gt;&amp;nbsp;page of the community object.&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI style="text-indent: 0in; margin: 3.0pt 0in .0001pt 1.0in;"&gt;&lt;SPAN style="font-size: 10.0pt; color: black;"&gt; &lt;/SPAN&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;Define the Central Security Gateways. These will usually be the internally managed ones. If there is no another Community defined for them, decide whether or not to mesh the central Security Gateways. If they are already in a Community, do not mesh the central Security Gateways.&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI style="text-indent: 0in; margin: 3.0pt 0in .0001pt 1.0in;"&gt;&lt;SPAN style="font-size: 10.0pt; color: black;"&gt; &lt;/SPAN&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;Define the Satellite Security Gateways. These will usually be the external ones.&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI style="text-indent: 0in; margin: 6.0pt 0in .0001pt .5in;"&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt; &lt;/SPAN&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;Agree on a pre-shared secret with the administrator of the external Community members. Then, in the&amp;nbsp;&lt;STRONG&gt;Shared Secret&lt;/STRONG&gt;page of the community, select&amp;nbsp;&lt;STRONG&gt;Use Only Shared Secret for all External Members&lt;/STRONG&gt;. For each external peer, enter the pre-shared secret.&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI style="text-indent: 0in; margin: 6.0pt 0in .0001pt .5in;"&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt; &lt;/SPAN&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;Define the relevant access rules in the Security Policy. Add the Community in the&amp;nbsp;&lt;STRONG&gt;VPN&lt;/STRONG&gt;column, the services in the&amp;nbsp;&lt;STRONG&gt;Service&lt;/STRONG&gt;&amp;nbsp;column, the desired&amp;nbsp;&lt;STRONG&gt;Action&lt;/STRONG&gt;, and the appropriate&amp;nbsp;&lt;STRONG&gt;Track&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI style="text-indent: 0in; margin: 6.0pt 0in .0001pt .5in;"&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt; &lt;/SPAN&gt;&lt;SPAN style="font-size: 10.5pt; color: black;"&gt;Install the Security Policy.&lt;/SPAN&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 24 Sep 2018 14:41:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/what-information-do-we-need-from-the-remote-site-customer-when/m-p/7264#M13025</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2018-09-24T14:41:21Z</dc:date>
    </item>
    <item>
      <title>Re: what information do we need from the remote site customer when creating site to site VPN?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/what-information-do-we-need-from-the-remote-site-customer-when/m-p/7265#M13026</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm pretty sure in an externally managed gateway scenario, you're not exchanging topology automatically.&lt;/P&gt;&lt;P&gt;Basically all it's saying is that your local definition should be the same as it is defined on the remote site (using similar subnet definitions, settings, etc).&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 24 Sep 2018 14:50:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/what-information-do-we-need-from-the-remote-site-customer-when/m-p/7265#M13026</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-09-24T14:50:56Z</dc:date>
    </item>
    <item>
      <title>Re: what information do we need from the remote site customer when creating site to site VPN?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/what-information-do-we-need-from-the-remote-site-customer-when/m-p/7266#M13027</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That I understand. The issue is that with any other device or peer, the exchange of the topology data is not required.&lt;/P&gt;&lt;P&gt;We are simply specifying Encryption Domain and external IP of the peer (in addition to crypto settings).&lt;/P&gt;&lt;P&gt;What makes Externally managed CP gateway different that it requires (if it still does) the topology data?&lt;/P&gt;&lt;P&gt;I am working now with one of my clients that is trying to peer with someone also running CP, but they are refusing to provide their topology data. So I am trying to get to the bottom of issue here to see if it is really a mandatory pre-requisite.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 24 Sep 2018 15:19:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/what-information-do-we-need-from-the-remote-site-customer-when/m-p/7266#M13027</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2018-09-24T15:19:46Z</dc:date>
    </item>
    <item>
      <title>Re: what information do we need from the remote site customer when creating site to site VPN?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/what-information-do-we-need-from-the-remote-site-customer-when/m-p/149605#M24008</link>
      <description>&lt;P&gt;Is this table still valid? Im my opionion, yes&lt;/P&gt;&lt;P&gt;any suggestion appreciated&lt;/P&gt;&lt;P&gt;thank you&lt;/P&gt;</description>
      <pubDate>Fri, 27 May 2022 09:59:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/what-information-do-we-need-from-the-remote-site-customer-when/m-p/149605#M24008</guid>
      <dc:creator>CheckPointerXL</dc:creator>
      <dc:date>2022-05-27T09:59:09Z</dc:date>
    </item>
    <item>
      <title>Re: what information do we need from the remote site customer when creating site to site VPN?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/what-information-do-we-need-from-the-remote-site-customer-when/m-p/182872#M33545</link>
      <description>&lt;P&gt;Thank you very much for the table.&lt;BR /&gt;&lt;BR /&gt;A quick question, we face a requirement to use AES-GCM-256 algorithm in phase 1.&lt;BR /&gt;&lt;BR /&gt;I guess this is still not supported, is it?&lt;BR /&gt;&lt;BR /&gt;( gw: R81.10 jhf 78 )&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks again.&lt;/P&gt;</description>
      <pubDate>Thu, 01 Jun 2023 09:05:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/what-information-do-we-need-from-the-remote-site-customer-when/m-p/182872#M33545</guid>
      <dc:creator>kritik</dc:creator>
      <dc:date>2023-06-01T09:05:20Z</dc:date>
    </item>
    <item>
      <title>Re: what information do we need from the remote site customer when creating site to site VPN?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/what-information-do-we-need-from-the-remote-site-customer-when/m-p/182960#M33556</link>
      <description>&lt;P&gt;AES-GCM-256 should be supported from R80.30 "out of the box" and will work with R80.10/.20 with the relevant JHF level per:&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/sk/sk152832" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk152832&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 01 Jun 2023 18:01:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/what-information-do-we-need-from-the-remote-site-customer-when/m-p/182960#M33556</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2023-06-01T18:01:50Z</dc:date>
    </item>
  </channel>
</rss>

