<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: IPsec VPN [NATting intresting traffic] config help in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IPsec-VPN-NATting-intresting-traffic-config-help/m-p/128932#M18852</link>
    <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/43147"&gt;@796570686578&lt;/a&gt;&amp;nbsp;i currently have this. Is it possible to add multiple subnet in encryption domain? i will try adding original and natted subnet and see if it works. PFA for encryption domain&lt;/P&gt;</description>
    <pubDate>Wed, 08 Sep 2021 12:20:45 GMT</pubDate>
    <dc:creator>Nick_Shah</dc:creator>
    <dc:date>2021-09-08T12:20:45Z</dc:date>
    <item>
      <title>IPsec VPN [NATting intresting traffic] config help</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IPsec-VPN-NATting-intresting-traffic-config-help/m-p/128811#M18844</link>
      <description>&lt;P&gt;I hope you all are doing well. After googling stuffs and reading blogs this is the first time i am configuring IPSec VPN on CP. But couldn't succeed. I want to establish IPSec VPN between CP and Palo Alto. I have all configs in place on PA and have same P1 &amp;amp; P2 algorithms setting on both FW. But my tunnel is not coming up.&lt;/P&gt;
&lt;P&gt;On CP side: Original IP is 192.168.1.10 --&amp;gt; static NAT to 10.168.1.1 when it goes over tunnel to PA side.&lt;/P&gt;
&lt;P&gt;CP eth1 IP is&amp;nbsp; &amp;nbsp; : 10.11.1.1&lt;/P&gt;
&lt;P&gt;PA eth1/2 IP is :10.12.1.1&lt;/P&gt;
&lt;P&gt;My underlay routing has no issues. Though i cannot ping from PA eth1/2 interface but i can ping from R12 e6/2 interface to CP eth1 interface. I have disabled address spoofing and allowed ping.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;While pinging from PA, CP logs shows as "Clear text packet should be encrypted"&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="PING LOG" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/13622i04E29F630F4DBE17/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Ping logs.PNG" alt="PING LOG" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;PING LOG&lt;/span&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Could some one please help me with config i am missing here ?&lt;/P&gt;
&lt;DIV class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;P&gt;BELOW URL HAS TOPOLOGY DIAGRAM:&lt;/P&gt;
&lt;P&gt;&lt;IMG src="https://imgurupload.org/files/DFB83F1F-9386-43C0-9D6E-4FCB45D7F95F.jpeg" border="0" /&gt;&lt;IMG src="https://imgurupload.org/files/DFB83F1F-9386-43C0-9D6E-4FCB45D7F95F.jpeg" border="0" /&gt;&lt;A title="Topology" href="https://imgurupload.org/files/DFB83F1F-9386-43C0-9D6E-4FCB45D7F95F.jpeg" target="_self"&gt;https://imgurupload.org/files/DFB83F1F-9386-43C0-9D6E-4FCB45D7F95F.jpeg&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;CONFIG SNAP:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Gateway" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/13616i5E874E5068CF1980/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Gateway.PNG" alt="Gateway" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;Gateway&lt;/span&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Intresting Traffic" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/13617i303E527D4797332C/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Intresting Traffic.PNG" alt="Intresting Traffic" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;Intresting Traffic&lt;/span&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Link Selection" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/13618i8AD7702691060F0D/image-size/large?v=v2&amp;amp;px=999" role="button" title="Link Selection.PNG" alt="Link Selection" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;Link Selection&lt;/span&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="NAT" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/13619i71DEEBF371147910/image-size/large?v=v2&amp;amp;px=999" role="button" title="NAT.PNG" alt="NAT" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;NAT&lt;/span&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="P1_P2settings(rest all option left as it is and also both FW has same secret key)" style="width: 393px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/13621iF9FB6A22DF2F34F1/image-size/medium?v=v2&amp;amp;px=400" role="button" title="P1_P2settings.PNG" alt="P1_P2settings(rest all option left as it is and also both FW has same secret key)" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;P1_P2settings(rest all option left as it is and also both FW has same secret key)&lt;/span&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Remote NAT :10.172.0.0/24" style="width: 964px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/13623iD871E3F229B2F8C8/image-size/large?v=v2&amp;amp;px=999" role="button" title="securitypolicy.PNG" alt="Remote NAT :10.172.0.0/24" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;Remote NAT :10.172.0.0/24&lt;/span&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks in advance&lt;/P&gt;</description>
      <pubDate>Wed, 08 Sep 2021 23:20:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IPsec-VPN-NATting-intresting-traffic-config-help/m-p/128811#M18844</guid>
      <dc:creator>Nick_Shah</dc:creator>
      <dc:date>2021-09-08T23:20:59Z</dc:date>
    </item>
    <item>
      <title>Re: IPsec VPN [NATting intresting traffic] config help</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IPsec-VPN-NATting-intresting-traffic-config-help/m-p/128813#M18845</link>
      <description>&lt;P&gt;The reason you’re getting the clear text packet should be encrypted is Scenario 3 here:&amp;nbsp;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk108600&amp;amp;partition=Advanced&amp;amp;product=IPSec#Scenario%203" target="_blank"&gt;https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk108600&amp;amp;partition=Advanced&amp;amp;product=IPSec#Scenario%203&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;When you say the tunnel is not coming up, what precisely do you see or don’t see?&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 06 Sep 2021 20:58:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IPsec-VPN-NATting-intresting-traffic-config-help/m-p/128813#M18845</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-09-06T20:58:06Z</dc:date>
    </item>
    <item>
      <title>Re: IPsec VPN [NATting intresting traffic] config help</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IPsec-VPN-NATting-intresting-traffic-config-help/m-p/128817#M18846</link>
      <description>&lt;P&gt;The sk phoneboy mentioned honestly, is by far, your article number 1 when troubleshooting any sort of VPN issue with Check Point. Scenario 3 definitely matches your description.&lt;/P&gt;</description>
      <pubDate>Mon, 06 Sep 2021 22:43:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IPsec-VPN-NATting-intresting-traffic-config-help/m-p/128817#M18846</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2021-09-06T22:43:51Z</dc:date>
    </item>
    <item>
      <title>Re: IPsec VPN [NATting intresting traffic] config help</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IPsec-VPN-NATting-intresting-traffic-config-help/m-p/128885#M18847</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/7"&gt;@PhoneBoy&lt;/a&gt;&amp;nbsp;Thankyou for taking out your precious time and replying. I have made a .docx file. Please find it attached here. It contain all screenshot . I have been troubleshooting this since 2 days now, but couldn't figure figure out the missing/incorrect thing.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 07 Sep 2021 17:49:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IPsec-VPN-NATting-intresting-traffic-config-help/m-p/128885#M18847</guid>
      <dc:creator>Nick_Shah</dc:creator>
      <dc:date>2021-09-07T17:49:28Z</dc:date>
    </item>
    <item>
      <title>Re: IPsec VPN [NATting intresting traffic] config help</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IPsec-VPN-NATting-intresting-traffic-config-help/m-p/128887#M18848</link>
      <description>&lt;P&gt;Remove the blackhole routes you've configured.&lt;/P&gt;</description>
      <pubDate>Tue, 07 Sep 2021 21:28:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IPsec-VPN-NATting-intresting-traffic-config-help/m-p/128887#M18848</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-09-07T21:28:29Z</dc:date>
    </item>
    <item>
      <title>Re: IPsec VPN [NATting intresting traffic] config help</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IPsec-VPN-NATting-intresting-traffic-config-help/m-p/128904#M18849</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/7"&gt;@PhoneBoy&lt;/a&gt;&amp;nbsp;Blackhole route removed&lt;/P&gt;&lt;P&gt;From PA i initiated tunnel , below are the logs&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="TUNNEL INITIATED FROM PA FROM CLI" style="width: 793px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/13632iD8055F9013DD3477/image-dimensions/793x111?v=v2" width="793" height="111" role="button" title="tunnel initiation from PA.png" alt="TUNNEL INITIATED FROM PA FROM CLI" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;TUNNEL INITIATED FROM PA FROM CLI&lt;/span&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="tunnel.png" style="width: 800px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/13633i4B7B7008F9C4D89E/image-dimensions/800x116?v=v2" width="800" height="116" role="button" title="tunnel.png" alt="tunnel.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;.&amp;nbsp;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="phase2.png" style="width: 655px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/13631i59CD0372858FF070/image-dimensions/655x154?v=v2" width="655" height="154" role="button" title="phase2.png" alt="phase2.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="phase1.png" style="width: 760px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/13630i8E5BCD804C23DE98/image-dimensions/760x114?v=v2" width="760" height="114" role="button" title="phase1.png" alt="phase1.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;ON CP (below output is when i initiated tunnel from PA)&lt;/P&gt;&lt;P&gt;SITEA-GW&amp;gt; vpn tu&lt;/P&gt;&lt;P&gt;********** Select Option **********&lt;/P&gt;&lt;P&gt;(1) List all IKE SAs&lt;BR /&gt;(2) * List all IPsec SAs&lt;BR /&gt;(3) List all IKE SAs for a given peer (GW) or user (Client)&lt;BR /&gt;(4) * List all IPsec SAs for a given peer (GW) or user (Client)&lt;BR /&gt;(5) Delete all IPsec SAs for a given peer (GW)&lt;BR /&gt;(6) Delete all IPsec SAs for a given User (Client)&lt;BR /&gt;(7) Delete all IPsec+IKE SAs for a given peer (GW)&lt;BR /&gt;(8) Delete all IPsec+IKE SAs for a given User (Client)&lt;BR /&gt;(9) Delete all IPsec SAs for ALL peers and users&lt;BR /&gt;(0) Delete all IPsec+IKE SAs for ALL peers and users&lt;/P&gt;&lt;P&gt;* To list data for a specific CoreXL instance, append "-i &amp;lt;instance number&amp;gt;" to your selection.&lt;/P&gt;&lt;P&gt;(Q) Quit&lt;/P&gt;&lt;P&gt;*******************************************&lt;/P&gt;&lt;P&gt;1&lt;/P&gt;&lt;P&gt;Peer 10.12.1.1 , SITEB-PA-GATEWAY SAs:&lt;/P&gt;&lt;P&gt;IKE SA &amp;lt;3b9a97149bc884dd,edfb6f9b1501ee78&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2&lt;/P&gt;&lt;P&gt;SAs of all instances:&lt;/P&gt;&lt;P&gt;Peer 10.12.1.1 , SITEB-PA-GATEWAY SAs:&lt;/P&gt;&lt;P&gt;IKE SA &amp;lt;1586026f8eeeba33,bdafb0a3bbc94399&amp;gt;&lt;BR /&gt;(No IPSec SAs)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;But ping didn't work from either end.&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 08 Sep 2021 06:32:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IPsec-VPN-NATting-intresting-traffic-config-help/m-p/128904#M18849</guid>
      <dc:creator>Nick_Shah</dc:creator>
      <dc:date>2021-09-08T06:32:17Z</dc:date>
    </item>
    <item>
      <title>Re: IPsec VPN [NATting intresting traffic] config help</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IPsec-VPN-NATting-intresting-traffic-config-help/m-p/128927#M18850</link>
      <description>&lt;P&gt;I am almost close to achieve this task.&lt;/P&gt;&lt;P&gt;Now i am getting below log&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="cplog.PNG" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/13639iF7FE763FFB41B3BD/image-size/large?v=v2&amp;amp;px=999" role="button" title="cplog.PNG" alt="cplog.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;I found below code on CP community and i ran it, below is the output.&lt;/P&gt;&lt;P&gt;[Expert@SITEA-GW:0]# if [[ `$CPDIR/bin/cpprod_util FwIsFirewallModule 2&amp;gt;/dev/nul l` != *'1'* ]]; then echo; tput bold; tput setab 1; echo ' Not a firewall gatewa y! '; tput sgr0; echo; else if [[ `grep R80.40 /etc/cp-release | wc -l` != 0 ]]; then echo; tput bold; tput setab 1; echo -n ' Info: VPN Domain for Gateway Comm unities are currently not displayed correctly by this tool! '; tput sgr0; echo; fi; fw tab -t vpn_routing -u | awk 'NR&amp;gt;3 {$0=substr($0,2,28); gsub(", ", ""); gs ub("; ", ""); gsub("..", "0x&amp;amp; "); print}' | xargs printf "%d.%d.%d.%d %d.%d.%d.% d %d.%d.%d.%d\n" | awk '{print $3"."$1" - "$2}' | sort -t . -k 1,1n -k 2,2n -k 3,3n -k 4,4n -k 5,5n -k 6,6n -k 7,7n -k 8,8n | sed 's/^/x/' | sed 's/\./\n\t/4' | awk '!x[$0]++' | sed '/x/s/$/\n\tEncryption domain/' | sed 's/x/\nVPN Gateway &amp;gt; /' | if [[ $(cat /etc/cp-release) != *"Embedded"* ]]; then egrep -C 9999 --col or=auto $'VPN Gateway|Encryption domain'; else cat $1 | sed 's/^\t//'; fi; echo; fi; if [[ `grep R80.40 /etc/cp-release | wc -l` != 0 ]]; then tput bold; tput s etab 1; echo -n ' Info: VPN Domain for Gateway Communities are currently not dis played correctly by this tool! '; tput sgr0; echo; echo; fi&lt;/P&gt;&lt;P&gt;Info: VPN Domain for Gateway Communities are currently not displayed correctly by this tool!&lt;/P&gt;&lt;P&gt;VPN Gateway &amp;gt; 10.12.1.1&lt;BR /&gt;Encryption domain&lt;BR /&gt;10.12.1.1 - 10.12.1.1&lt;BR /&gt;10.172.0.0 - 10.172.0.255&lt;/P&gt;&lt;P&gt;VPN Gateway &amp;gt; 192.168.1.1&lt;BR /&gt;Encryption domain&lt;BR /&gt;10.11.1.0 - 10.11.1.0&lt;BR /&gt;10.11.1.1 - 10.11.1.1&lt;BR /&gt;10.11.1.2 - 10.11.1.63&lt;BR /&gt;192.168.0.253 - 192.168.0.253&lt;BR /&gt;192.168.1.0 - 192.168.1.0&lt;BR /&gt;192.168.1.1 - 192.168.1.1&lt;BR /&gt;192.168.1.2 - 192.168.1.255&lt;/P&gt;&lt;P&gt;Info: VPN Domain for Gateway Communities are currently not displayed correctly by this tool!&lt;/P&gt;&lt;P&gt;[Expert@SITEA-GW:0]#&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 08 Sep 2021 10:42:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IPsec-VPN-NATting-intresting-traffic-config-help/m-p/128927#M18850</guid>
      <dc:creator>Nick_Shah</dc:creator>
      <dc:date>2021-09-08T10:42:40Z</dc:date>
    </item>
    <item>
      <title>Re: IPsec VPN [NATting intresting traffic] config help</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IPsec-VPN-NATting-intresting-traffic-config-help/m-p/128929#M18851</link>
      <description>&lt;P&gt;You usually get this error with mismatches in encryption domains(interesting traffic). In your VPN Community I can see that you have defined the EncDom for Palo Alto as "All IP Adresses behind this gateway according to topology". What does the topology look like? If the 10.172.0.10 is not within the topology of the Palo Alto GW on CheckPoint side, your CP will not see it as part of the encryption domain/interesting traffic.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What I would do: Create a Network Group, put the Subnets from PA that you want to be part of the tunnel into the network group and set the Network group as your encryption domain for the PA gateway.&lt;/P&gt;&lt;P&gt;I am also not sure if you are missing the CP NAT Subnet in the encryption domain on the CP side. As I can see, you have 192.168.1.0/24 defined as your encryption domain - but since you NAT it, the interesting traffic will actually be the NATed Subnet. Not sure if the NAT Subnet suffices in the encryption domain or if you need the&amp;nbsp; 192.168.1.0/24 aswell.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope this helps!&lt;/P&gt;</description>
      <pubDate>Wed, 08 Sep 2021 11:33:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IPsec-VPN-NATting-intresting-traffic-config-help/m-p/128929#M18851</guid>
      <dc:creator>796570686578</dc:creator>
      <dc:date>2021-09-08T11:33:02Z</dc:date>
    </item>
    <item>
      <title>Re: IPsec VPN [NATting intresting traffic] config help</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IPsec-VPN-NATting-intresting-traffic-config-help/m-p/128932#M18852</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/43147"&gt;@796570686578&lt;/a&gt;&amp;nbsp;i currently have this. Is it possible to add multiple subnet in encryption domain? i will try adding original and natted subnet and see if it works. PFA for encryption domain&lt;/P&gt;</description>
      <pubDate>Wed, 08 Sep 2021 12:20:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IPsec-VPN-NATting-intresting-traffic-config-help/m-p/128932#M18852</guid>
      <dc:creator>Nick_Shah</dc:creator>
      <dc:date>2021-09-08T12:20:45Z</dc:date>
    </item>
    <item>
      <title>Re: IPsec VPN [NATting intresting traffic] config help</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IPsec-VPN-NATting-intresting-traffic-config-help/m-p/128934#M18853</link>
      <description>&lt;P&gt;Hi, yes exactly you can add multiple subnet in the Encryption domain by creating a Network Group object, adding subnets to that network group and then setting the network group object as the encryption domain!&lt;/P&gt;</description>
      <pubDate>Wed, 08 Sep 2021 12:26:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IPsec-VPN-NATting-intresting-traffic-config-help/m-p/128934#M18853</guid>
      <dc:creator>796570686578</dc:creator>
      <dc:date>2021-09-08T12:26:40Z</dc:date>
    </item>
    <item>
      <title>Re: IPsec VPN [NATting intresting traffic] config help</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IPsec-VPN-NATting-intresting-traffic-config-help/m-p/128935#M18854</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/44525"&gt;@Nick_Shah&lt;/a&gt;&amp;nbsp;is 100% right and also, I will throw in what I find to be config that usually works. As Nick said, add a group with all the networks you want participating in VPN and also, as far as NAT, if its supposed to take place within VPN, make sure option is checked within VPN community and also, ensure that if there are networks where nat is not supposed to take place among them, create manual nat rule to reflect that.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hope that helps.&lt;/P&gt;</description>
      <pubDate>Wed, 08 Sep 2021 12:31:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IPsec-VPN-NATting-intresting-traffic-config-help/m-p/128935#M18854</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2021-09-08T12:31:34Z</dc:date>
    </item>
    <item>
      <title>Re: IPsec VPN [NATting intresting traffic] config help</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IPsec-VPN-NATting-intresting-traffic-config-help/m-p/128966#M18855</link>
      <description>&lt;P&gt;Indeed !! that worked, i added original and natted subnet (192.168.1.0 &amp;amp; 10.168.1.0/24 under object group and added that group in encryption domain. Checkpoint is bit tricky to understand/troubleshoot.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/38213"&gt;@the_rock&lt;/a&gt;&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/43147"&gt;@796570686578&lt;/a&gt;&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/7"&gt;@PhoneBoy&lt;/a&gt;&amp;nbsp;Thankyou everyone for your contribution, it really helped me to understand the ipsec with nat on CP.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 08 Sep 2021 16:21:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IPsec-VPN-NATting-intresting-traffic-config-help/m-p/128966#M18855</guid>
      <dc:creator>Nick_Shah</dc:creator>
      <dc:date>2021-09-08T16:21:25Z</dc:date>
    </item>
    <item>
      <title>Re: IPsec VPN [NATting intresting traffic] config help</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IPsec-VPN-NATting-intresting-traffic-config-help/m-p/128968#M18856</link>
      <description>&lt;P&gt;Thats what so great about websites like this. No matter the issue, there is always going to be someone that can help you and give suggestions. Glad it worked! But yes, CP can be a bit tricky, specially for someone new, as many things can involve modifications you might not be accustomed to when working with other vendors. Personally, I would say thats mostly due to the fact that everything is mostly controlled by management server, where with other vendors, thats not necessarily the case.&lt;/P&gt;</description>
      <pubDate>Wed, 08 Sep 2021 16:47:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IPsec-VPN-NATting-intresting-traffic-config-help/m-p/128968#M18856</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2021-09-08T16:47:33Z</dc:date>
    </item>
    <item>
      <title>Re: IPsec VPN [NATting intresting traffic] config help</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IPsec-VPN-NATting-intresting-traffic-config-help/m-p/128974#M18857</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/38213"&gt;@the_rock&lt;/a&gt;&amp;nbsp;I am very sorry to bother you again. Though ping from PA to CP is working fine, but CP to PA is failing. NAT and Security policies are correctly configured. I tried deleting phase 1 and 2 and reinitiated tunnel from CP.&amp;nbsp; Phase 1 came up but phase 2 shows below&lt;/P&gt;&lt;P&gt;2&lt;/P&gt;&lt;P&gt;SAs of all instances:&lt;/P&gt;&lt;P&gt;Peer 10.12.1.1 , SITEB-PA-GATEWAY SAs:&lt;/P&gt;&lt;P&gt;IKE SA &amp;lt;fef1591def15bc75,e45b67b52d88ed60&amp;gt;&lt;BR /&gt;&lt;STRONG&gt;(No IPSec SAs)&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;other troubleshooting snaps attached&lt;/P&gt;</description>
      <pubDate>Wed, 08 Sep 2021 18:32:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IPsec-VPN-NATting-intresting-traffic-config-help/m-p/128974#M18857</guid>
      <dc:creator>Nick_Shah</dc:creator>
      <dc:date>2021-09-08T18:32:41Z</dc:date>
    </item>
    <item>
      <title>Re: IPsec VPN [NATting intresting traffic] config help</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IPsec-VPN-NATting-intresting-traffic-config-help/m-p/128975#M18858</link>
      <description>&lt;P&gt;K, message me privately, we can do remote in the morning if that works? Im in EST time zone&lt;/P&gt;</description>
      <pubDate>Wed, 08 Sep 2021 18:30:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/IPsec-VPN-NATting-intresting-traffic-config-help/m-p/128975#M18858</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2021-09-08T18:30:26Z</dc:date>
    </item>
  </channel>
</rss>

