<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Site-To-Site VPN with Multiple Subnets in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-To-Site-VPN-with-Multiple-Subnets/m-p/90523#M23022</link>
    <description>hi can you tell me how op was able to find the ike ids (referring to his reply just above you with the supernetted id) , how can i find that as well? can that be found out using the ike view utility? or is there some other way? i just want to know what value the checkpoint supernets a bunch of subnetworks to so that it will be easier to troubleshoot in case something goes wrong when establishing a vpn.</description>
    <pubDate>Sat, 04 Jul 2020 05:13:20 GMT</pubDate>
    <dc:creator>kb1</dc:creator>
    <dc:date>2020-07-04T05:13:20Z</dc:date>
    <item>
      <title>Site-To-Site VPN with Multiple Subnets</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-To-Site-VPN-with-Multiple-Subnets/m-p/21509#M23012</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;Hello to all.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;This is my first post here. I hope you can help me to address the investigation rightly.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="background-color: #ffffff; color: #333333;"&gt;SCENARIO&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="background-color: #ffffff; color: #333333;"&gt;Main Site - Check Point R77.30&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;EM style="background-color: #ffffff; color: #333333;"&gt;Subnets&lt;/EM&gt;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;172.16.0.0/16&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;172.29.0.0/20&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;172.29.16.0/20&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;172.29.32.0/22&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;192.168.11.0/24&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;192.168.18.0/24&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;...etc...&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;Remote Site A - Cisco Meraki MX65&lt;/SPAN&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;. &lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;Subnet:&amp;nbsp;&lt;/SPAN&gt;192.168.80.0/24&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;&lt;STRONG style="color: #3d3d3d;"&gt;Remote Site B -&amp;nbsp;&lt;STRONG&gt;3rd Party Device Router/Firewall&lt;/STRONG&gt;.&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;Subnet:&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN style="color: #3d3d3d;"&gt;192.168.85.0/24&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="background-color: #ffffff; color: #333333;"&gt;OBJECTIVES&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The objective is to have two site-to-site:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Main Site &amp;lt;=&amp;gt; Remote Site A;&amp;nbsp;first 4 subnets of main site should be enabled/allowed to VPN traffic&lt;/LI&gt;&lt;LI&gt;Main Site &amp;lt;=&amp;gt; Remote Site B; first 5 subnets of main site should be enabled/allowed to VPN traffic&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;CONFIGURATION&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Main Site Face&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;I created a group in Check Point including first 5 subnets. This group was specified as&amp;nbsp;VPN Domain (Encryption Domain).&lt;/P&gt;&lt;P&gt;I created a&amp;nbsp;policy rule allowing traffic from first 4 subnets to Remote Site A subnet and viceversa.&lt;/P&gt;&lt;P&gt;I created a&amp;nbsp;policy&amp;nbsp;&lt;SPAN&gt;rule allowing traffic from first 5 subnets&lt;SPAN&gt;&amp;nbsp;to Remote Site B subnet and viceversa.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Remote Site A&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;SPAN&gt;I&amp;nbsp;specified first 4 as remote subnets.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Remote Site B&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;SPAN&gt;I&amp;nbsp;specified first 5 as remote subnets.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;PROBLEM&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;SPAN&gt;VPNs tunnel go up, however I can reach Remote Sites A and B (and viceversa) from 1st subnet only (172.16.0.0/16).&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;SPAN&gt;Can you help me to address the investigation ?&lt;BR /&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;SPAN&gt;Thank you,&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;SPAN&gt;Luca&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 05 Jan 2018 14:44:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-To-Site-VPN-with-Multiple-Subnets/m-p/21509#M23012</guid>
      <dc:creator>lucafabbri365</dc:creator>
      <dc:date>2018-01-05T14:44:28Z</dc:date>
    </item>
    <item>
      <title>Re: Site-To-Site VPN with Multiple Subnets</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-To-Site-VPN-with-Multiple-Subnets/m-p/21510#M23013</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Luca,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;First of all, did you defined the remote objects as Interoperable Devices? The community is defined as One VPN Tunnel per Subnet pair?&lt;/P&gt;&lt;P&gt;The first I can think this is a supperneting issue, where check point is trying to send the entire 172.29.X.X network instead individual ones and the IPSec association does not match for those networks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can check the following SK's:&lt;/P&gt;&lt;P&gt;&lt;A class="link-titled" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk108600" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk108600#Scenario%201"&gt;VPN Site-to-Site with 3rd party&lt;/A&gt; on Scenario 1 - Wrong IPsec IDs are negotiated during IKE Quick Mode.&lt;/P&gt;&lt;P&gt;&lt;A class="link-titled" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk101219" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk101219"&gt;New VPN features in R77.20&lt;/A&gt;&amp;nbsp; on Third party connectivity improvements.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Network 5. &lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;192.168.11.0/24 should work also right now for you.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 05 Jan 2018 15:52:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-To-Site-VPN-with-Multiple-Subnets/m-p/21510#M23013</guid>
      <dc:creator>KennyManrique</dc:creator>
      <dc:date>2018-01-05T15:52:56Z</dc:date>
    </item>
    <item>
      <title>Re: Site-To-Site VPN with Multiple Subnets</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-To-Site-VPN-with-Multiple-Subnets/m-p/21511#M23014</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Kenny,&lt;/P&gt;&lt;P&gt;yes, they are defined as Interoperable Devices.&lt;/P&gt;&lt;P&gt;I know Check Point "supernetting" behaviour, but I thought it happened when, multiple subnets&amp;nbsp;were on remote site (source:&amp;nbsp;&lt;A href="https://www.cpug.org/forums/showthread.php/18543-One-VPN-Domain-per-Gateway-multiple-encryption-domains-required" title="https://www.cpug.org/forums/showthread.php/18543-One-VPN-Domain-per-Gateway-multiple-encryption-domains-required"&gt;One VPN Domain per Gateway, multiple encryption domains required&lt;/A&gt;). Here the remote site has only one subnet. Isn't it ?&lt;/P&gt;&lt;P&gt;I also made the change, on remote site A, for example, I specified the entire class 172.29.0.0/16 together with 172.16.0.0/16, on but the behavior is the same.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 05 Jan 2018 16:08:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-To-Site-VPN-with-Multiple-Subnets/m-p/21511#M23014</guid>
      <dc:creator>lucafabbri365</dc:creator>
      <dc:date>2018-01-05T16:08:22Z</dc:date>
    </item>
    <item>
      <title>Re: Site-To-Site VPN with Multiple Subnets</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-To-Site-VPN-with-Multiple-Subnets/m-p/21512#M23015</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You can take a look at this (&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk34467&amp;amp;partition=Advanced&amp;amp;product=IPSec" style="color: #ba2454; background-color: #ffffff; text-decoration: none; font-size: 14px; padding-left: 3px;"&gt;sk34467: Debugging Site-to-Site&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;VPN&lt;/STRONG&gt;&lt;/A&gt;&lt;SPAN style="color: #222222; background-color: #ffffff; font-size: 16px;"&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN class="" style="color: #e65785; background-color: #ffffff; font-size: 14px;"&gt;|&lt;/SPAN&gt;&lt;SPAN style="color: #222222; background-color: #ffffff; font-size: 16px;"&gt;&lt;SPAN&gt;&amp;nbsp;) to debug your VPN.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; background-color: #ffffff; font-size: 14px;"&gt;"&lt;/SPAN&gt;&lt;SPAN style="color: #000000; background-color: #ffffff; font-size: 14px;"&gt;For exact commands, refer to&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk63560" style="color: #905690; background-color: #ffffff; text-decoration: none; font-size: 14px;" target="_blank"&gt;sk63560 - How to run complete VPN debug on Security Gateway to troubleshoot VPN issues?&lt;/A&gt;&lt;SPAN style="color: #000000; background-color: #ffffff; font-size: 14px;"&gt;."&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; background-color: #ffffff; font-size: 14px;"&gt;Other good SK that can help:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://supportcontent.checkpoint.com/documentation_download?id=11841" style="color: #905690; background-color: #ffffff; text-decoration: none; font-size: 14px;" target="_blank"&gt;How To Troubleshoot VPN Issues in Site to Site&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 05 Jan 2018 16:24:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-To-Site-VPN-with-Multiple-Subnets/m-p/21512#M23015</guid>
      <dc:creator>EdesLC</dc:creator>
      <dc:date>2018-01-05T16:24:28Z</dc:date>
    </item>
    <item>
      <title>Re: Site-To-Site VPN with Multiple Subnets</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-To-Site-VPN-with-Multiple-Subnets/m-p/21513#M23016</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Do you have the "disable NAT in VPN Community" checkbox set in the VPN Community properties (it is not set by default).&amp;nbsp; Is it possible that all the non-172.16.0.0/16 subnets are getting NATted to an address the Cisco is not expecting?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&lt;BR /&gt; My Book "Max Power: Check Point Firewall Performance Optimization" &lt;BR /&gt; Second Edition Coming Soon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 05 Jan 2018 18:51:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-To-Site-VPN-with-Multiple-Subnets/m-p/21513#M23016</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2018-01-05T18:51:35Z</dc:date>
    </item>
    <item>
      <title>Re: Site-To-Site VPN with Multiple Subnets</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-To-Site-VPN-with-Multiple-Subnets/m-p/21514#M23017</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;BR /&gt;yes "disable NAT in VPN Community" is checkbox selected. Consider we have lot of site-to-site VPNs configured between Check Point and 3rd party devices (Cisco Meraki, FortiGate, Cisco 871, SonicWALL). The described issue appears with some of them (not all). I'm pretty sure it is related to bad/wrong subnet advertisement over the tunnel, like Cisco Meraki support underlined by analyzing logs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'll try to enable VPN debug to know what is happening during tunnel connection.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'll give feedback here.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you guys.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 05 Jan 2018 21:25:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-To-Site-VPN-with-Multiple-Subnets/m-p/21514#M23017</guid>
      <dc:creator>lucafabbri365</dc:creator>
      <dc:date>2018-01-05T21:25:32Z</dc:date>
    </item>
    <item>
      <title>Re: Site-To-Site VPN with Multiple Subnets</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-To-Site-VPN-with-Multiple-Subnets/m-p/21515#M23018</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Have you considered that the issue may be over at the peers side and they may have got their policy configuration wrong ?&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 06 Jan 2018 01:52:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-To-Site-VPN-with-Multiple-Subnets/m-p/21515#M23018</guid>
      <dc:creator>John_Tammaro1</dc:creator>
      <dc:date>2018-01-06T01:52:46Z</dc:date>
    </item>
    <item>
      <title>Re: Site-To-Site VPN with Multiple Subnets</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-To-Site-VPN-with-Multiple-Subnets/m-p/21516#M23019</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;According to &lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk101219"&gt;SK101219&lt;/A&gt;:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;EM&gt;The "supernetting" feature enables to adjoin smaller sub-nets to a bigger one ("supernets"). This feature makes it possible to decrease the number of IPsec SAs that are created per sub-net. This feature has a problem of connectivity with third party devices. Those devices don't support "supernetting", and as a result a "no valid SA" error can occur. An optional solution for this problem can be found in &lt;A href="http://supportcontent.checkpoint.com/solutions?id=sk108600#Scenario 1" target="_blank"&gt;sk108600&lt;/A&gt; (Scenario 1), but in this solution the supernetting is disabled for all devices.&lt;/EM&gt;&lt;/LI&gt;&lt;LI&gt;&lt;EM&gt;The improvement comes to make possible disabling "supernetting" &lt;STRONG&gt;only&lt;/STRONG&gt; for 3rd party VPN devices, but keep "supernetting" enabled with Check Point Security Gateways. In addition, in the current behavior with externally managed Check Point devices with "supernetting" disabled, IPsec SA is created per host, but not per sub-net. This improvement fixes this&lt;/EM&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The supernetting depends of the local configuration for some parameters on Check Point side, because of this the gateway choice (or not) to adjoin the subnets to a bigger one.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What error messages are you receiving on your VPN logs for "Key Install"? Also, when you execute "vpn tu", how many associations for IKE and IPSEC do you see?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 06 Jan 2018 13:20:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-To-Site-VPN-with-Multiple-Subnets/m-p/21516#M23019</guid>
      <dc:creator>KennyManrique</dc:creator>
      <dc:date>2018-01-06T13:20:13Z</dc:date>
    </item>
    <item>
      <title>Re: Site-To-Site VPN with Multiple Subnets</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-To-Site-VPN-with-Multiple-Subnets/m-p/21517#M23020</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello ALL,&lt;/P&gt;&lt;P&gt;thank you to all of your suggestion, I found "the issue": as you wrote it was supernet related issue.&lt;/P&gt;&lt;P&gt;Check Point supernets two&amp;nbsp;172.29.0.0/20 and 172.29.16.0/20 into only one network 172.29.0.0/19. I found it by analyzing Check Point SmartLogs for another working VPN. I noticed it&amp;nbsp;supernets the two networks above:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-1 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/61989_pastedImage_1.png" style="width: auto; height: auto;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So after fixed it into 3rd party device for not-working VPNs, all start working fine.&lt;/P&gt;&lt;P&gt;Probably if I didn't have working VPN, the only way to know how Check Point supernet two adiacent networks, was to enabled debug, is it right ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you,&lt;BR /&gt;Luca&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 08 Jan 2018 11:12:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-To-Site-VPN-with-Multiple-Subnets/m-p/21517#M23020</guid>
      <dc:creator>lucafabbri365</dc:creator>
      <dc:date>2018-01-08T11:12:36Z</dc:date>
    </item>
    <item>
      <title>Re: Site-To-Site VPN with Multiple Subnets</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-To-Site-VPN-with-Multiple-Subnets/m-p/21518#M23021</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Correct, the appropriate debugs should have turned this up.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 09 Jan 2018 17:14:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-To-Site-VPN-with-Multiple-Subnets/m-p/21518#M23021</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-01-09T17:14:57Z</dc:date>
    </item>
    <item>
      <title>Re: Site-To-Site VPN with Multiple Subnets</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-To-Site-VPN-with-Multiple-Subnets/m-p/90523#M23022</link>
      <description>hi can you tell me how op was able to find the ike ids (referring to his reply just above you with the supernetted id) , how can i find that as well? can that be found out using the ike view utility? or is there some other way? i just want to know what value the checkpoint supernets a bunch of subnetworks to so that it will be easier to troubleshoot in case something goes wrong when establishing a vpn.</description>
      <pubDate>Sat, 04 Jul 2020 05:13:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-To-Site-VPN-with-Multiple-Subnets/m-p/90523#M23022</guid>
      <dc:creator>kb1</dc:creator>
      <dc:date>2020-07-04T05:13:20Z</dc:date>
    </item>
    <item>
      <title>Re: Site-To-Site VPN with Multiple Subnets</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-To-Site-VPN-with-Multiple-Subnets/m-p/90531#M23023</link>
      <description>&lt;P&gt;Honestly i would do either 2 ways.&lt;BR /&gt;due to the lack of logs without ike view.&lt;BR /&gt;&lt;BR /&gt;- Update to R80.40 and have the possibility within GUI to specify the subnets directly on the community.&lt;BR /&gt;&lt;BR /&gt;If you dont run R80.40 then.&lt;BR /&gt;- Configure in user.def so that you have full controll over what is sent over the tunnel.&lt;BR /&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk108600&amp;amp;partition=Advanced&amp;amp;product=IPSec" target="_blank" rel="noopener"&gt;https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk108600&amp;amp;partition=Advanced&amp;amp;product=IPSec&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;How to find the user.def&lt;BR /&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk98239" target="_blank"&gt;https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk98239&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;The "&lt;EM&gt;&lt;STRONG&gt;subnet_for_range_and_peer&lt;/STRONG&gt;&lt;/EM&gt;" table is designed to force Check Point Security Gateway to negotiate IPsec SAs using a specific subnet mask for a given IP address range:&lt;/P&gt;&lt;BLOCKQUOTE&gt;&lt;PRE&gt;subnet_for_range_and_peer = {
&amp;lt;peerGW_IP, first_IP_in_range1, last_IP_in_the_range1; subnet_mask&amp;gt;,
&amp;lt;peerGW_IP, first_IP_in_range2, last_IP_in_the_range2; subnet_mask&amp;gt;,
... ... ...
&amp;lt;peerGW_IP, first_IP_in_range&lt;EM&gt;N&lt;/EM&gt;, last_IP_in_the_range&lt;EM&gt;N&lt;/EM&gt;; subnet_mask&amp;gt;
};&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&lt;BR /&gt;"&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;Example 1&lt;/EM&gt;:&lt;/STRONG&gt;&lt;/P&gt;&lt;PRE&gt;#ifndef __user_def__ 
#define __user_def__ 
// 
// User defined INSPECT code
//
subnet_for_range_and_peer = {
&amp;lt;192.168.10.20, 10.10.0.1, 10.10.0.254; 255.255.255.0&amp;gt;,
&amp;lt;192.168.20.20, 10.10.0.1, 10.10.255.254; 255.255.0.0&amp;gt;
};
#endif /* __user_def__ */&lt;/PRE&gt;&lt;P&gt;In this example, the configuration would work in the following way:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;For the VPN peer 192.168.10.20, the network IP used in the IPsec SA would be 10.10.0.0/24&lt;/LI&gt;&lt;LI&gt;For the VPN peer 192.168.20.20, the network IP used in the IPsec SA would be 10.10.0.0/16&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;"&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;EM&gt;Keep inmind in R80.20 you can disable supernetting per community.&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 04 Jul 2020 08:24:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-To-Site-VPN-with-Multiple-Subnets/m-p/90531#M23023</guid>
      <dc:creator>Magnus-Holmberg</dc:creator>
      <dc:date>2020-07-04T08:24:40Z</dc:date>
    </item>
    <item>
      <title>Re: Site-To-Site VPN with Multiple Subnets</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-To-Site-VPN-with-Multiple-Subnets/m-p/90547#M23024</link>
      <description>thank you sir</description>
      <pubDate>Sat, 04 Jul 2020 23:36:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-To-Site-VPN-with-Multiple-Subnets/m-p/90547#M23024</guid>
      <dc:creator>kb1</dc:creator>
      <dc:date>2020-07-04T23:36:55Z</dc:date>
    </item>
  </channel>
</rss>

