<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Site to Site VPN between Checkpoint and Palo Alto Firewalls in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-VPN-between-Checkpoint-and-Palo-Alto-Firewalls/m-p/108946#M14892</link>
    <description>&lt;P&gt;Hi Timothy,&lt;/P&gt;&lt;P&gt;in this scenario: How do you find out, which proxy IDs the Check Point will propagate by default?&lt;BR /&gt;(when I do not want to use a user.def change)&lt;/P&gt;&lt;P&gt;Regards&lt;BR /&gt;Johannes&lt;/P&gt;</description>
    <pubDate>Wed, 27 Jan 2021 08:30:38 GMT</pubDate>
    <dc:creator>Johannes_Schoen</dc:creator>
    <dc:date>2021-01-27T08:30:38Z</dc:date>
    <item>
      <title>Site to Site VPN between Checkpoint and Palo Alto Firewalls</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-VPN-between-Checkpoint-and-Palo-Alto-Firewalls/m-p/15935#M14855</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We have a requirement to setup Site-to-Site vpn between our Checkpoint FW and customer Palo Alto FW. I have created one, but the issue is IKE phase 2 fails. I have confirmed the negotiation parameters with my customer engineer and it looks like everything is in order. What could be the possible issue?&lt;/P&gt;&lt;P&gt;I used VPN tu and SmartView&amp;nbsp; monitor to view but to no success. Any advices will be highly appreciated&lt;/P&gt;&lt;P&gt;Thank you so much&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 03 Aug 2018 08:32:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-VPN-between-Checkpoint-and-Palo-Alto-Firewalls/m-p/15935#M14855</guid>
      <dc:creator>Anu_Cherian</dc:creator>
      <dc:date>2018-08-03T08:32:23Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site VPN between Checkpoint and Palo Alto Firewalls</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-VPN-between-Checkpoint-and-Palo-Alto-Firewalls/m-p/15936#M14856</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;BR /&gt;i would debug the vpn using&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;"vpn debug trunc"&lt;/LI&gt;&lt;LI&gt;delete the SAs using "vpn tu"&lt;/LI&gt;&lt;LI&gt;replicate the issue&lt;/LI&gt;&lt;LI&gt;"vpn debug truncoff"&lt;/LI&gt;&lt;LI&gt;analyze $FWDIR/log/ike.elg using ikeview.exe or iketool on cli&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Or just removing proxy ID config on palo alto side and using "one tunnel per gateway pair" on checkpoint side to use proxy id 0.0.0.0/0.0.0.0&amp;nbsp; 0.0.0.0/0.0.0.0 on both sides.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers&lt;BR /&gt;Vincent&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 03 Aug 2018 08:40:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-VPN-between-Checkpoint-and-Palo-Alto-Firewalls/m-p/15936#M14856</guid>
      <dc:creator>Vincent_Bacher</dc:creator>
      <dc:date>2018-08-03T08:40:17Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site VPN between Checkpoint and Palo Alto Firewalls</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-VPN-between-Checkpoint-and-Palo-Alto-Firewalls/m-p/15937#M14857</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It looks like Palo Alto side they have a proxy ID configured. Do we need to create a proxy at Checkpoint Side?&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 03 Aug 2018 09:02:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-VPN-between-Checkpoint-and-Palo-Alto-Firewalls/m-p/15937#M14857</guid>
      <dc:creator>Anu_Cherian</dc:creator>
      <dc:date>2018-08-03T09:02:36Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site VPN between Checkpoint and Palo Alto Firewalls</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-VPN-between-Checkpoint-and-Palo-Alto-Firewalls/m-p/15938#M14858</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Proxy ID is defined by configuring VPN topology in the gateway object and setting in tunnel management config.&lt;/P&gt;&lt;P&gt;Default is (i think) one tunnel per subnet pair.&lt;BR /&gt;So you have to look at the network objects defined in the VPN topology.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 03 Aug 2018 09:17:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-VPN-between-Checkpoint-and-Palo-Alto-Firewalls/m-p/15938#M14858</guid>
      <dc:creator>Vincent_Bacher</dc:creator>
      <dc:date>2018-08-03T09:17:17Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site VPN between Checkpoint and Palo Alto Firewalls</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-VPN-between-Checkpoint-and-Palo-Alto-Firewalls/m-p/15939#M14859</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;IF Phase 2 fails chances are encryption domains as seen by firewalls differ, if not using VTI interfaces with dynamic routing to announce encryption domains, it is usually a bad idea to set 0.0.0.0 as encryption domain - I'd advise to set encryption domains to specific nets and in a mirror like fashion.&lt;/P&gt;&lt;P&gt;Pay attention that by default Checkpoint has supernetting enabled for encryption domain networks, i.e. if you set 10.1.1.0/24 , 10.1.2.0/24 etc as encryption domain , the Checkpoint will announce these nets as one network of 10.1.0.0/23 .&lt;/P&gt;&lt;P&gt;On the CP cli look for encryption domain via&amp;nbsp;&lt;STRONG&gt;fw tab -f -t vpn_enc_domain&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 03 Aug 2018 09:23:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-VPN-between-Checkpoint-and-Palo-Alto-Firewalls/m-p/15939#M14859</guid>
      <dc:creator>Yuri_Slobodyany</dc:creator>
      <dc:date>2018-08-03T09:23:55Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site VPN between Checkpoint and Palo Alto Firewalls</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-VPN-between-Checkpoint-and-Palo-Alto-Firewalls/m-p/15940#M14860</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok. So I have one tunnel per subnet selected at Checkpoint side. The cusotmer engineer told me that he have a proxy ID PID.23 configured at PaloAlto side.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 03 Aug 2018 10:03:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-VPN-between-Checkpoint-and-Palo-Alto-Firewalls/m-p/15940#M14860</guid>
      <dc:creator>Anu_Cherian</dc:creator>
      <dc:date>2018-08-03T10:03:33Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site VPN between Checkpoint and Palo Alto Firewalls</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-VPN-between-Checkpoint-and-Palo-Alto-Firewalls/m-p/15941#M14861</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you Yuri&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I ran the command&amp;nbsp;&lt;STRONG style="color: #333333; background-color: #ffffff; border: 0px; font-weight: bold;"&gt;fw tab -f -t vpn_enc_domain&amp;nbsp;&lt;/STRONG&gt; and I can see the domain as 10.0.0.0. how can I specify the subnet I need.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 03 Aug 2018 10:06:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-VPN-between-Checkpoint-and-Palo-Alto-Firewalls/m-p/15941#M14861</guid>
      <dc:creator>Anu_Cherian</dc:creator>
      <dc:date>2018-08-03T10:06:16Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site VPN between Checkpoint and Palo Alto Firewalls</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-VPN-between-Checkpoint-and-Palo-Alto-Firewalls/m-p/15942#M14862</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If you'd use "smaller" Network objects and the Gateway performs supernetting, you may disable&amp;nbsp;supernetting &lt;STRONG&gt;only&lt;/STRONG&gt; for 3rd party VPN devices as per sk101219 (New VPN features in R77.20) and have look if that succeeds.&lt;BR /&gt;As you mention, you have 10.0.0.0/8 defined in VPN topology, you may have to modify user.def file, adding a &lt;STRONG&gt;&lt;EM&gt;subnet_for_range_and_peer &lt;/EM&gt;&lt;/STRONG&gt;config&lt;STRONG&gt;&lt;EM&gt;.&lt;/EM&gt;&lt;/STRONG&gt; It's explained in sk108600, Scenario 1. Location of user.def in the sms is described in sk98239.&lt;STRONG&gt;&lt;EM&gt;&lt;BR /&gt;&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;I am sure that (as always) there is a much better solution but i learned that long time ago and it's got just a matter of habit.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 03 Aug 2018 10:57:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-VPN-between-Checkpoint-and-Palo-Alto-Firewalls/m-p/15942#M14862</guid>
      <dc:creator>Vincent_Bacher</dc:creator>
      <dc:date>2018-08-03T10:57:12Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site VPN between Checkpoint and Palo Alto Firewalls</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-VPN-between-Checkpoint-and-Palo-Alto-Firewalls/m-p/15943#M14863</link>
      <description>&lt;P&gt;Palo Alto firewalls employ route-based VPNs, and will propose (and expect) a universal tunnel (0.0.0.0/0) in Phase 2 by default; however the Palo can be configured to mimic a domain-based setup by configuring manual Proxy-IDs.&amp;nbsp;&amp;nbsp; When attempting an interoperable VPN between a Check Point and a Palo Alto you have basically two options:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;1) In your VPN Community settings on the Check Point end under "VPN Tunnel Sharing" set "One tunnel per gateway pair".&amp;nbsp; This will cause the Check Point to propose a universal tunnel in Phase 2, yet still use the VPN Domains for tunnel and peer determination.&amp;nbsp; In this case there should not be any manual Proxy-IDs specified on the Palo side.&amp;nbsp; On the Palo side typically static routes are used to route traffic bound for the Check Point side into the VPN tunnel interface leading to the peer.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;2) Set explicit Proxy-IDs for the tunnel on the Palo side to mimic a domain-based setup, but then the Check Point subnet proposals in Phase 2 must EXACTLY match how the Proxy-IDs are defined on the Palo side.&amp;nbsp; Just like on Juniper (strange coincidence there!), a Phase 2 proposal by the Check Point that is a subset of the manual Proxy-IDs will NOT be accepted by the Palo.&amp;nbsp; So for example if the Palo is manually set for 192.168.1.0/24 as a Proxy-ID and the Check Point proposes a subset of 192.168.1.0/25 it will fail, whereas a Cisco or Check Point would accept that subset proposal.&amp;nbsp; The only way to reliably ensure that the Check Point will always propose an exact match for the Palo are the user.def modifications specified in Scenario 1 here: &lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk108600&amp;amp;partition=Advanced&amp;amp;product=IPSec" target="_blank"&gt;sk108600: VPN Site-to-Site with 3rd party&lt;/A&gt;.&amp;nbsp; Per-community VPN domains are on the product roadmap for Check Point and will really come in handy for scenarios like these...&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Either way, make sure that a new VPN tunnel can be successfully initiated in both directions by either peer.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;--&lt;BR /&gt;Second Edition of my "Max Power" Firewall Book&lt;BR /&gt;Now Available at &lt;A href="http://www.maxpowerfirewalls.com" target="_blank" rel="noopener"&gt;http://www.maxpowerfirewalls.com&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 06 Mar 2023 13:34:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-VPN-between-Checkpoint-and-Palo-Alto-Firewalls/m-p/15943#M14863</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2023-03-06T13:34:28Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site VPN between Checkpoint and Palo Alto Firewalls</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-VPN-between-Checkpoint-and-Palo-Alto-Firewalls/m-p/15944#M14864</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;And for completeness sake (and what I usually do) - starting with R77.20 we have the option of Disabling supernetting of encryption domain networks altogether - (as always before editing database save Database Revision, just in case) - then in GuiDBedit set&amp;nbsp;&lt;STRONG style="background-color: #ffffff; color: #000000; font-size: 14px;"&gt;ike_enable_supernet&amp;nbsp;&lt;/STRONG&gt;&lt;SPAN style="color: #000000; background-color: #ffffff; font-size: 14px;"&gt;&amp;nbsp;property in the&amp;nbsp;&lt;STRONG&gt;firewall_properties&lt;/STRONG&gt; of the Global properties table to False (default is True). No need to reboot or anything, just install policy.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 04 Aug 2018 06:36:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-VPN-between-Checkpoint-and-Palo-Alto-Firewalls/m-p/15944#M14864</guid>
      <dc:creator>Yuri_Slobodyany</dc:creator>
      <dc:date>2018-08-04T06:36:02Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site VPN between Checkpoint and Palo Alto Firewalls</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-VPN-between-Checkpoint-and-Palo-Alto-Firewalls/m-p/15945#M14865</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Timothy,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you. During&amp;nbsp;troubleshooting we found the below error at Palo Alto side,&lt;/P&gt;&lt;P&gt;IKE phase-2 negotiation failed when processing proxy ID. cannot find matching phase-2 tunnel for received proxy ID. received local id : 0.0.0.0/0 type IPv4_subnet protocol 0 port 0, received remote id: 0.0.0.0 type IPv4_subnet protocol 0 port 0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I did follow&amp;nbsp;&lt;SPAN style="color: #000000; background-color: #ffffff; font-size: 14px;"&gt;sk108600 and Scenario 1.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; background-color: #ffffff; font-size: 14px;"&gt;Still the issue has not resolved. Do I have to follow any specific steps?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; background-color: #ffffff; font-size: 14px;"&gt;Thank you&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 06 Aug 2018 10:06:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-VPN-between-Checkpoint-and-Palo-Alto-Firewalls/m-p/15945#M14865</guid>
      <dc:creator>Anu_Cherian</dc:creator>
      <dc:date>2018-08-06T10:06:17Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site VPN between Checkpoint and Palo Alto Firewalls</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-VPN-between-Checkpoint-and-Palo-Alto-Firewalls/m-p/15946#M14866</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Are you sure there are no manual Proxy-IDs configured on the Network &amp;gt; IPSec Tunnels &amp;gt; Proxy IDs tab for the corresponding IPSec tunnel on the Palo side? &amp;nbsp; The list should be blank.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If that still doesn't work, try defining a manual IPSec Proxy-ID on the Palo like this: Local IP: 0.0.0.0/0, Remote: 0.0.0.0/0, Protocol: Number 0.&amp;nbsp; I seem to have a vague memory that the Palo doesn't like the Check Point asking for Protocol 0 with no manual Proxy-IDs set.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What happens when the Palo tries to initiate the tunnel?&amp;nbsp; Your error message indicates the Check Point is trying to start the tunnel.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&lt;BR /&gt; Second Edition of my "Max Power" Firewall Book&lt;BR /&gt; Now Available at &lt;A href="http://www.maxpowerfirewalls.com" target="_blank"&gt;http://www.maxpowerfirewalls.com&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 06 Aug 2018 12:13:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-VPN-between-Checkpoint-and-Palo-Alto-Firewalls/m-p/15946#M14866</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2018-08-06T12:13:00Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site VPN between Checkpoint and Palo Alto Firewalls</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-VPN-between-Checkpoint-and-Palo-Alto-Firewalls/m-p/15947#M14867</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;They do have an IP set in proxy id .. for eg. 10.0.0.0/8 as local and 192.168.1.0/24 as remote.&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 06 Aug 2018 14:30:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-VPN-between-Checkpoint-and-Palo-Alto-Firewalls/m-p/15947#M14867</guid>
      <dc:creator>Anu_Cherian</dc:creator>
      <dc:date>2018-08-06T14:30:16Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site VPN between Checkpoint and Palo Alto Firewalls</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-VPN-between-Checkpoint-and-Palo-Alto-Firewalls/m-p/15948#M14868</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Please read my August 3rd response again, if they have manual Proxy-IDs set on the Palo side you need to do scenario 2 on the Check Point.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&lt;BR /&gt; Second Edition of my "Max Power" Firewall Book&lt;BR /&gt; Now Available at &lt;A class="" href="http://www.maxpowerfirewalls.com" rel="nofollow"&gt;http://www.maxpowerfirewalls.com&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 06 Aug 2018 20:38:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-VPN-between-Checkpoint-and-Palo-Alto-Firewalls/m-p/15948#M14868</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2018-08-06T20:38:07Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site VPN between Checkpoint and Palo Alto Firewalls</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-VPN-between-Checkpoint-and-Palo-Alto-Firewalls/m-p/15949#M14869</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Yuri,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I check the&amp;nbsp;&lt;STRONG&gt;ike_enable_supernet property&lt;/STRONG&gt; using &lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;GuiDBedit tool &lt;/SPAN&gt;&lt;STRONG style="color: #000000; background-color: #ffffff; border: 0px; font-weight: bold; font-size: 14px;"&gt;&amp;nbsp;&lt;/STRONG&gt;and it was already set to false. I also followed Tim's advice&amp;nbsp;but&amp;nbsp; I am still not able to successfully initiate the tunnel. The negotiation fails in phase -2.&amp;nbsp;&lt;/P&gt;&lt;P&gt;As per the scenario, we have two VPN(primary and backup) sites which need to be in VPN community.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Checkpoint side have a subnet of &lt;STRONG&gt;/24&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Other side have a subnet&amp;nbsp; of &lt;STRONG&gt;/8&lt;/STRONG&gt; for both gateways&lt;/P&gt;&lt;P&gt;They want us to NAT &lt;STRONG&gt;/32&lt;/STRONG&gt; subnet (each peer GW have a /32 NAT IP), to establish the Site to Site VPN.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have already followed Scenario 1 in&amp;nbsp;&lt;A class="link-titled" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk108600#Scenario%201" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk108600#Scenario%201"&gt;VPN Site-to-Site with 3rd party&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;subnet_for_range_and_peer = { &amp;lt;peerGW_IP, first_IP_in_range1, last_IP_in_the_range1; subnet_mask&amp;gt;, &amp;lt;peerGW_IP, first_IP_in_range2, last_IP_in_the_range2; subnet_mask&amp;gt;, ... ... ... &amp;lt;peerGW_IP, first_IP_in_range&lt;EM&gt;N&lt;/EM&gt;, last_IP_in_the_range&lt;EM&gt;N&lt;/EM&gt;; subnet_mask&amp;gt; };&lt;/PRE&gt;&lt;P&gt;As per the Palo Alto side they have declared the proxy id as&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Local : 10.0.0.0/8&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;peer : 10.10.10.10/32&lt;/STRONG&gt; (replaced for security and compliance reasons)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;but during IKE phase 2 Checkpoint negotiates using my public_ip/32 subnet.It should negotiate with 10.10.10.10/32.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What could be the issue? I have worked through all the solutions posted in the checkmates community and still not able to resolve.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;FYI, I am using a Checkpoint 3200 with R80.10&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 14 Aug 2018 10:19:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-VPN-between-Checkpoint-and-Palo-Alto-Firewalls/m-p/15949#M14869</guid>
      <dc:creator>Anu_Cherian</dc:creator>
      <dc:date>2018-08-14T10:19:10Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site VPN between Checkpoint and Palo Alto Firewalls</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-VPN-between-Checkpoint-and-Palo-Alto-Firewalls/m-p/15950#M14870</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Check Point VPN GW is using int Main address by default to negotiate IPsec VPN tunnel, unless something else is configured in Link Selection.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you are trying to use one of the internal IP addresses, VPN is likely to fail. Why are you using 10.10.10.10? This is not the IP address used to reach your GW from outside, is it?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 14 Aug 2018 10:29:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-VPN-between-Checkpoint-and-Palo-Alto-Firewalls/m-p/15950#M14870</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2018-08-14T10:29:10Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site VPN between Checkpoint and Palo Alto Firewalls</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-VPN-between-Checkpoint-and-Palo-Alto-Firewalls/m-p/15951#M14871</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We are not using 10.10.10.10 internally nor it is used externally. Our extenal IP ,for example : 192.168.1.2.&lt;/P&gt;&lt;P&gt;The 10.10.10.10/32 is the IP configured at customer site and they need us to use that IP, as it is set as an encryption domain( at Palo Alto side they have configured the remote IP in Proxy ID side as 10.10.10.10/32). So during IKE phase 2 the subnet will fail if I use my subnet ie, 172.31.1.0/24.&lt;/P&gt;&lt;P&gt;The error is ,&lt;/P&gt;&lt;P style="margin-bottom: .0001pt;"&gt;"&lt;STRONG&gt;: IKE phase-2 negotiation failed when processing proxy ID. cannot find matching phase-2 tunnel for received proxy ID. received local id: 11.0.0.0/8 type IPv4_subnet protocol 0 port 0, received remote id: 192.168.1.2/32 type IPv4_address protocol 0 port 0. &lt;/STRONG&gt;"&lt;/P&gt;&lt;P style="margin-bottom: .0001pt;"&gt;&lt;/P&gt;&lt;P&gt;Let us say for the Primary GW(customer side) : the remote IP is 10.10.10.10/32&amp;nbsp;and for the secondary GW(cust side) : the remote IP is 10.10.11.10/32&lt;/P&gt;&lt;P&gt;May be they choose these IPs to segregrate the network as for both the Gateways, the domain is 11.0.0.0/8&lt;/P&gt;&lt;P&gt;What will be the best way to accomodate the requirement.&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 14 Aug 2018 11:01:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-VPN-between-Checkpoint-and-Palo-Alto-Firewalls/m-p/15951#M14871</guid>
      <dc:creator>Anu_Cherian</dc:creator>
      <dc:date>2018-08-14T11:01:23Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site VPN between Checkpoint and Palo Alto Firewalls</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-VPN-between-Checkpoint-and-Palo-Alto-Firewalls/m-p/15952#M14872</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Pardon me, still not clear enough. Proxy ID is the IP address of the remote GW. PAN has to use your main IP address for the tunnel to work. Now, that 10.10.10.10, does it belong to one of your GW interfaces?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 14 Aug 2018 11:25:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-VPN-between-Checkpoint-and-Palo-Alto-Firewalls/m-p/15952#M14872</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2018-08-14T11:25:04Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site VPN between Checkpoint and Palo Alto Firewalls</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-VPN-between-Checkpoint-and-Palo-Alto-Firewalls/m-p/15953#M14873</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No. I have no interface with that IP. Customer have their Palo Alto like that.&lt;/P&gt;&lt;P&gt;as per their proxy ID settings,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Proxy ID&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;Local&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;Remote&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;Protocol&lt;/P&gt;&lt;P&gt;PID.10&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;11.0.0.0/8&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;10.10.10.10/32&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;any&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 14 Aug 2018 11:33:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-VPN-between-Checkpoint-and-Palo-Alto-Firewalls/m-p/15953#M14873</guid>
      <dc:creator>Anu_Cherian</dc:creator>
      <dc:date>2018-08-14T11:33:20Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site VPN between Checkpoint and Palo Alto Firewalls</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-VPN-between-Checkpoint-and-Palo-Alto-Firewalls/m-p/15954#M14874</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;They have Cisco and Fortinet firewall setup with this configuration but they don't have any Checkpoint where we can refer the setup.&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 14 Aug 2018 11:38:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-VPN-between-Checkpoint-and-Palo-Alto-Firewalls/m-p/15954#M14874</guid>
      <dc:creator>Anu_Cherian</dc:creator>
      <dc:date>2018-08-14T11:38:09Z</dc:date>
    </item>
  </channel>
</rss>

