<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: VPN Site-2-Site on alias interface in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-Site-2-Site-on-alias-interface/m-p/128164#M18641</link>
    <description>&lt;P&gt;Whether you configure it or not, the gateway IP addresses are always in the encryption domain.&lt;BR /&gt;This requires editing .def files to resolve.&lt;BR /&gt;See scenario 3 here:&amp;nbsp;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk108600#Scenario%203" target="_blank"&gt;https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk108600#Scenario%203&lt;/A&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
    <pubDate>Thu, 26 Aug 2021 19:34:27 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2021-08-26T19:34:27Z</dc:date>
    <item>
      <title>VPN Site-2-Site on alias interface</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-Site-2-Site-on-alias-interface/m-p/127493#M18513</link>
      <description>&lt;P&gt;Hello&lt;BR /&gt;Please help me solve the problem. The situation is as follows. We need to install a VPN between two locations, on our side a checkpoint and on the other side cisco Firepower (FTD), external / public addresses (example)&lt;BR /&gt;PUB 1.1.1.1 255.255.255.0 (eth1) from our side&lt;BR /&gt;PUB 2.2.2.2 255.255.255.255 from cisco Firepower side&lt;BR /&gt;We have an internal server for which we need to provide communication 192.168.10.26 / 24, but as an internal LAN network for VPN we cannot select it, we need to select the address PUB-1.1.1.2 / 32 as the internal network&lt;BR /&gt;From the side of cisco Firepower, the LAN network is also from the category of public addresses, conventionally 3.3.3.3/32&lt;/P&gt;&lt;P&gt;Thus, my settings are as follows:&lt;BR /&gt;1.I set an alias on eth1 interface, it turns out eth1: 1 - 1.1.1.2 / 24&lt;BR /&gt;2. I configure NAT - if 192.168.10.26 goes to 3.3.3.3 then NAT to 1.1.1.2&lt;BR /&gt;3. I create a VPN community, in which I set the encryption, PSK key, set the parameter allowing NAT, for our GW 1.1.1.1 I set up the VPN domain in which there are 192.168.10.26 and 1.1.1.2, I set up the VPN domain for the other side which is 3.3.3.3. Install Tunnel Management in Community in One Tunnel Per Gateway Pair&lt;BR /&gt;4 making rules&lt;BR /&gt;1.1.1.1 to 2.2.2.2 - Allow&lt;BR /&gt;2.2.2.2 to 1.1.1.1 - Allow&lt;BR /&gt;192.168.10.26 to 3.3.3.3 - allow&lt;BR /&gt;3.3.3.3 to 192.168.10.26 - allow&lt;BR /&gt;1.1.1.2 to 3.3.3.3 - allow + community VPN&lt;BR /&gt;3.3.3.3 to 1.1.1.2 - allow + community VPN&lt;BR /&gt;5. Configuring the "user.def" file&lt;BR /&gt;subnet_for_range_and_peer = {&lt;BR /&gt;&amp;lt;2.2.2.2, 1.1.1.2, 1.1.1.2; 255.255.255.255&amp;gt;&lt;BR /&gt;};&lt;/P&gt;&lt;P&gt;I check if the tunnel is established and the first and second phases, from the 3.3.3.3 server to the 192.168.10.26 server, traffic is going, I see it through Wireshark to 192.168.10.26&lt;BR /&gt;But traffic does not go from 192.168.10.26 to 3.3.3.3. In the logs, I see that the traffic reached the GW checkpoint, passed NAT, fell under the rule "From 192.168.10.26 to 3.3.3.3 - allow" and then went to the VPN tunnel.&lt;BR /&gt;Return message: Reject:&lt;BR /&gt;Child SA exchange: Received notification from peer: No proposal chosen MyMethods Phase2: AES-256 + HMAC-SHA2-256, No IPComp, No ESN, Group 14&lt;BR /&gt;We checked the encryption settings, they all match, and if the encryption did not match, would the packets come to my server from a remote server.&lt;BR /&gt;Could you please tell me where I could have gone wrong.?&lt;/P&gt;</description>
      <pubDate>Fri, 20 Aug 2021 11:13:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-Site-2-Site-on-alias-interface/m-p/127493#M18513</guid>
      <dc:creator>nastiakhon</dc:creator>
      <dc:date>2021-08-20T11:13:07Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Site-2-Site on alias interface</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-Site-2-Site-on-alias-interface/m-p/127587#M18521</link>
      <description>&lt;P&gt;I’m not clear why you’re creating an interface alias here.&lt;BR /&gt;If you’re trying to resolve an IP address conflict between the two sites, you will need to use NAT to resolve it.&lt;BR /&gt;If you want to originate your VPN from a specific IP, use the Link Selection setting.&lt;BR /&gt;See also:&amp;nbsp;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk34467&amp;amp;partition=Advanced&amp;amp;product=IPSec" target="_blank"&gt;https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk34467&amp;amp;partition=Advanced&amp;amp;product=IPSec&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 20 Aug 2021 23:05:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-Site-2-Site-on-alias-interface/m-p/127587#M18521</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-08-20T23:05:28Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Site-2-Site on alias interface</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-Site-2-Site-on-alias-interface/m-p/127668#M18539</link>
      <description>&lt;P&gt;Hello, I created an alias so that the tunnel was built on this LAN network (which has a public address 1.1.1.2), I need to do something so that traffic from my internal server (192.168.10.26) is transformed into the address 1.1.1.2 and falls under the rule "From 1.1 .1.2 to 3.3.3.3 - allow + community VPN ”, but it does not fall under this rule. I can't figure out why.&lt;/P&gt;</description>
      <pubDate>Mon, 23 Aug 2021 07:11:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-Site-2-Site-on-alias-interface/m-p/127668#M18539</guid>
      <dc:creator>nastiakhon</dc:creator>
      <dc:date>2021-08-23T07:11:13Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Site-2-Site on alias interface</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-Site-2-Site-on-alias-interface/m-p/127688#M18542</link>
      <description>&lt;P&gt;And I also noticed such a moment that as soon as I add the VPN to the community, the ping between 1.1.1.1 and 2.2.2.2 stops working. If there is no community then the ping works.&lt;BR /&gt;Message:&lt;BR /&gt;Auth exchange: Received notification from peer: Traffic selectors unacceptable MyTSi: &amp;lt;IPv4 Universal Range&amp;gt; MyTSr: &amp;lt;IPv4 Universal Range&amp;gt;&lt;/P&gt;&lt;P&gt;Maybe this is where the reason begins that does not work?&lt;/P&gt;</description>
      <pubDate>Mon, 23 Aug 2021 10:55:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-Site-2-Site-on-alias-interface/m-p/127688#M18542</guid>
      <dc:creator>nastiakhon</dc:creator>
      <dc:date>2021-08-23T10:55:28Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Site-2-Site on alias interface</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-Site-2-Site-on-alias-interface/m-p/127735#M18554</link>
      <description>&lt;P&gt;Like I said, you don't use an Alias interface for this.&lt;BR /&gt;You create the relevant NAT rules and/or use Link Selection&amp;gt;&lt;BR /&gt;Unless the "alias" is really a VTI, which your error message suggests.&lt;BR /&gt;See:&amp;nbsp;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk173714" target="_blank"&gt;https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk173714&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 23 Aug 2021 20:50:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-Site-2-Site-on-alias-interface/m-p/127735#M18554</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-08-23T20:50:46Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Site-2-Site on alias interface</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-Site-2-Site-on-alias-interface/m-p/127751#M18560</link>
      <description>&lt;P&gt;phoneboy gave you what I believe is 100% logical answer...Im not sure either why you would use alias interface for something like this. Just use NAT and make sure link selection is configure to reflect this.&lt;/P&gt;</description>
      <pubDate>Tue, 24 Aug 2021 00:11:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-Site-2-Site-on-alias-interface/m-p/127751#M18560</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2021-08-24T00:11:45Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Site-2-Site on alias interface</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-Site-2-Site-on-alias-interface/m-p/127763#M18564</link>
      <description>&lt;P&gt;Hello, the fact is that I deleted the alias, but no changes happened, everything is exactly the same, I don't need a link selection , because I am building a tunnel on the address of my gateway, I checked all the settings again, but anyway when I start a ping from my server 192.168.10.26 to server 3.3.3.3 i get failure&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Time: 2021-08-24T05: 14: 33Z&lt;BR /&gt;Interface Direction: inbound&lt;BR /&gt;Interface Name: daemon&lt;BR /&gt;Source: 1.1.1.1&lt;BR /&gt;Destination: 2.2.2.2&lt;BR /&gt;VPN Peer Gateway: 2.2.2.2&lt;BR /&gt;Scheme: IKEv2 [UDP (IPv4)]&lt;BR /&gt;Ike: Child SA exchange: Received notification from peer: No proposal chosen MyMethods Phase2: AES-256 + HMAC-SHA2-256, No IPComp, No ESN, Group 14&lt;BR /&gt;IKE Initiator Cookie: 15d14335ba002a1f&lt;BR /&gt;IKE Responder Cookie: e5ff887cd29f5794&lt;BR /&gt;IKE Phase2 Message ID: 00000003&lt;BR /&gt;Community: S2S-NIT-VPN&lt;BR /&gt;Reject Category: IKE failure&lt;BR /&gt;VPN Feature: IKE&lt;BR /&gt;Action: Reject&lt;BR /&gt;Type: Log&lt;BR /&gt;Blade: VPN&lt;BR /&gt;Origin: GW-A&lt;BR /&gt;Interface: daemon&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;When I check from my public address 1.1.1.1 to the other party's public address 2.2.2.2 I get a message&lt;BR /&gt;Time: 2021-08-24T05: 08: 01Z&lt;BR /&gt;Interface Direction: inbound&lt;BR /&gt;Interface Name: daemon&lt;BR /&gt;Source: 1.1.1.1&lt;BR /&gt;Destination: 2.2.2.2&lt;BR /&gt;VPN Peer Gateway: 2.2.2.2&lt;BR /&gt;Scheme: IKEv2 [UDP (IPv4)]&lt;BR /&gt;Ike: Child SA exchange: Received notification from peer: Traffic selectors unacceptable MyTSi: &amp;lt;IPv4 Universal Range&amp;gt; MyTSr: &amp;lt;IPv4 Universal Range&amp;gt;&lt;BR /&gt;IKE Initiator Cookie: 9168f24c72253a26&lt;BR /&gt;IKE Responder Cookie: e3c37a3a7679795a&lt;BR /&gt;IKE Phase2 Message ID: 0000001c&lt;BR /&gt;Community: S2S-NIT-VPN&lt;BR /&gt;Reject Category: IKE failure&lt;BR /&gt;VPN Feature: IKE&lt;BR /&gt;Action: Key Install&lt;BR /&gt;Type: Log&lt;BR /&gt;Blade: VPN&lt;BR /&gt;Origin: GW-A&lt;BR /&gt;Interface: daemon&lt;/P&gt;&lt;P&gt;But the ping still doesn't work ...&lt;/P&gt;</description>
      <pubDate>Tue, 24 Aug 2021 05:30:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-Site-2-Site-on-alias-interface/m-p/127763#M18564</guid>
      <dc:creator>nastiakhon</dc:creator>
      <dc:date>2021-08-24T05:30:35Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Site-2-Site on alias interface</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-Site-2-Site-on-alias-interface/m-p/127768#M18565</link>
      <description>&lt;P&gt;If you want the VPN to originate from a specific IP address, you must set Link Selection correctly, regardless of whether the IP exists on your gateway or not.&lt;BR /&gt;What is the precise setting?&lt;/P&gt;
&lt;P&gt;Also, please go through the debugging steps in the SK I linked previously as "no proposal chosen" suggests a misconfiguration on one or both sides.&lt;/P&gt;</description>
      <pubDate>Tue, 24 Aug 2021 05:40:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-Site-2-Site-on-alias-interface/m-p/127768#M18565</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-08-24T05:40:08Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Site-2-Site on alias interface</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-Site-2-Site-on-alias-interface/m-p/127801#M18571</link>
      <description>&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot_1.jpg" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/13492i6FB37D38B4C4155A/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot_1.jpg" alt="Screenshot_1.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;This is my scheme, unfortunately I cannot see the troubleshooting, because I do not have access to the CLI, Can you please tell me if I have to configure the "user.def" file? now I have it empty&lt;/P&gt;</description>
      <pubDate>Tue, 24 Aug 2021 08:49:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-Site-2-Site-on-alias-interface/m-p/127801#M18571</guid>
      <dc:creator>nastiakhon</dc:creator>
      <dc:date>2021-08-24T08:49:26Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Site-2-Site on alias interface</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-Site-2-Site-on-alias-interface/m-p/127884#M18578</link>
      <description>&lt;P&gt;To adequately troubleshoot this, you will need access to the CLI.&lt;BR /&gt;Otherwise, you are merely guessing where the issue is.&lt;BR /&gt;It's possible you may need to adjust user.def, but again, without knowing exactly what the issue is, one cannot say.&amp;nbsp;&lt;BR /&gt;I would also strongly suggest engaging the TAC here.&lt;/P&gt;</description>
      <pubDate>Tue, 24 Aug 2021 16:21:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-Site-2-Site-on-alias-interface/m-p/127884#M18578</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-08-24T16:21:36Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Site-2-Site on alias interface</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-Site-2-Site-on-alias-interface/m-p/127891#M18579</link>
      <description>&lt;P&gt;I would 100% take advice phoneboy is giving you. And as far as user.def file, personally, I dont like modifying files like that on mgmt server, as it can cause bunch of issues, but obviously, back it up first and then make modifications, so if something was to happen, you can always revert the changes with cp command.&lt;/P&gt;</description>
      <pubDate>Tue, 24 Aug 2021 17:12:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-Site-2-Site-on-alias-interface/m-p/127891#M18579</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2021-08-24T17:12:43Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Site-2-Site on alias interface</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-Site-2-Site-on-alias-interface/m-p/128158#M18638</link>
      <description>&lt;P&gt;Good afternoon, I'm slowly starting to figure it out ... I figured out the reason why I don't have a ping between 1,1,1,1 and 2,2,2,2.&lt;BR /&gt;The reason is that the checkpoint sends already encrypted traffic to 2,2,2,2, that is, even traffic that does not come from the LAN network, but only from a public address to a public checkpoint, encrypts it anyway, and in cisco, when pinging from a public address to a public one traffic does not go into the tunnel.&lt;/P&gt;&lt;P&gt;Now there is a problem, how can I make sure that traffic from the public address checkpoint 1,1,1,1 to 2,2,2,2 is not encrypted?&lt;/P&gt;</description>
      <pubDate>Thu, 26 Aug 2021 16:56:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-Site-2-Site-on-alias-interface/m-p/128158#M18638</guid>
      <dc:creator>nastiakhon</dc:creator>
      <dc:date>2021-08-26T16:56:34Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Site-2-Site on alias interface</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-Site-2-Site-on-alias-interface/m-p/128164#M18641</link>
      <description>&lt;P&gt;Whether you configure it or not, the gateway IP addresses are always in the encryption domain.&lt;BR /&gt;This requires editing .def files to resolve.&lt;BR /&gt;See scenario 3 here:&amp;nbsp;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk108600#Scenario%203" target="_blank"&gt;https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk108600#Scenario%203&lt;/A&gt;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 26 Aug 2021 19:34:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-Site-2-Site-on-alias-interface/m-p/128164#M18641</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-08-26T19:34:27Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Site-2-Site on alias interface</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-Site-2-Site-on-alias-interface/m-p/128200#M18654</link>
      <description>&lt;P&gt;Hello, I tried this article, but my checkpoint does not want to apply these changes, I think that there are solutions for other checkpoint models. My version is R80.30, I tried all the options presented in scenario 3 but the checkpoint does not want to accept these changes&lt;/P&gt;</description>
      <pubDate>Fri, 27 Aug 2021 06:48:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-Site-2-Site-on-alias-interface/m-p/128200#M18654</guid>
      <dc:creator>nastiakhon</dc:creator>
      <dc:date>2021-08-27T06:48:39Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Site-2-Site on alias interface</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-Site-2-Site-on-alias-interface/m-p/128261#M18670</link>
      <description>&lt;P&gt;&lt;SPAN style="font-family: inherit; background-color: #f8f8fa;"&gt;When you say "does not want to apply these changes" what precisely happens?&lt;BR /&gt;&lt;/SPAN&gt;Also, what precise version is used to manage these gateways, as that will likely impact where you need to make the necessary changes?&lt;BR /&gt;I highly recommend engaging with the TAC to assist you with this issue.&lt;/P&gt;</description>
      <pubDate>Fri, 27 Aug 2021 19:09:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-Site-2-Site-on-alias-interface/m-p/128261#M18670</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-08-27T19:09:18Z</dc:date>
    </item>
  </channel>
</rss>

