<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: 3rd Party Peer VPN Settings in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/3rd-Party-Peer-VPN-Settings/m-p/149620#M24014</link>
    <description>&lt;P&gt;Appreciate the reply!&amp;nbsp; We're not really in control of the other side but they are sending all traffic to us.&amp;nbsp;&lt;/P&gt;&lt;P&gt;If we leave our side defined as our LAN and use the VPN routing setting to allow routing to the Internet, you think that is sufficient in this case?&lt;/P&gt;</description>
    <pubDate>Fri, 27 May 2022 12:31:11 GMT</pubDate>
    <dc:creator>BC_AMD</dc:creator>
    <dc:date>2022-05-27T12:31:11Z</dc:date>
    <item>
      <title>3rd Party Peer VPN Settings</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/3rd-Party-Peer-VPN-Settings/m-p/149541#M23987</link>
      <description>&lt;P&gt;Hello Checkmates community!&amp;nbsp; I am having some trouble getting a site-to-site VPN working and I hope that someone can confirm our approach and/or some settings for me.&amp;nbsp;We have a case open with TAC but unfortunately it is difficult to get downtime to work this out so I hope someone here has some experience with a similar scenario.&lt;/P&gt;&lt;P&gt;We have a 3rd party peer VPN where we would like to tunnel all traffic back through our CheckPoint GW so that the devices behind the peer can reach internal destinations on our LAN as well as the Internet. Essentially they will be acting like a satellite office which should be simple enough.&lt;/P&gt;&lt;P&gt;The third party has set their remote encryption domain to be 0.0.0.0/0. On our side, however, attempting to use 0.0.0.0/0 as our local encryption domain has been problematic with another of our existing tunnels, and so we have reverted to 10.0.0.0/8 on our side, and at the moment our proposals won't match exactly.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="checkmates.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/16726iF4B18B5F31E9881A/image-size/large?v=v2&amp;amp;px=999" role="button" title="checkmates.png" alt="checkmates.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The questions I hope people here have the experience to answer are:&lt;/P&gt;&lt;P&gt;1) Is this scenario handled simply by changing the VPN routing to "to center or through the center to other satellites, to Internet and other VPN targets" (and controlling traffic via access policy) or do we need to accommodate the 0.0.0.0/0 vpn domain on our local side somehow?&lt;/P&gt;&lt;P&gt;2) do we need a group with exclusions locally when their side is part of the 10.0.0.0/8 space or is this handled smartly by the gateway since the remote encryption domain is defined?&lt;/P&gt;&lt;P&gt;3) TAC recommended going to one tunnel per gateway pair - along with the VPN routing setting this seems to make sense to keep the number of tunnels down - are their any other implications of doing this?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Thu, 26 May 2022 17:28:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/3rd-Party-Peer-VPN-Settings/m-p/149541#M23987</guid>
      <dc:creator>BC_AMD</dc:creator>
      <dc:date>2022-05-26T17:28:12Z</dc:date>
    </item>
    <item>
      <title>Re: 3rd Party Peer VPN Settings</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/3rd-Party-Peer-VPN-Settings/m-p/149544#M23990</link>
      <description>&lt;P&gt;hmm on the remote site. i dont think you need to do a 0.0.0.0/0 in the "vpn domain"&lt;BR /&gt;&lt;BR /&gt;you just need to make the tunnel work with "normal" subnets. and then just set a static route on the peer side with 0.0.0.0 and set next hop/step correctly? would be my bet..&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;dont think you need to "Put" the 0.0.0.0/0 subnet in the vpn domain/community..&lt;/P&gt;</description>
      <pubDate>Thu, 26 May 2022 21:15:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/3rd-Party-Peer-VPN-Settings/m-p/149544#M23990</guid>
      <dc:creator>skandshus</dc:creator>
      <dc:date>2022-05-26T21:15:40Z</dc:date>
    </item>
    <item>
      <title>Re: 3rd Party Peer VPN Settings</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/3rd-Party-Peer-VPN-Settings/m-p/149547#M23993</link>
      <description>&lt;P&gt;I agree 100% with&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/61227"&gt;@skandshus&lt;/a&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 26 May 2022 20:08:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/3rd-Party-Peer-VPN-Settings/m-p/149547#M23993</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2022-05-26T20:08:35Z</dc:date>
    </item>
    <item>
      <title>Re: 3rd Party Peer VPN Settings</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/3rd-Party-Peer-VPN-Settings/m-p/149620#M24014</link>
      <description>&lt;P&gt;Appreciate the reply!&amp;nbsp; We're not really in control of the other side but they are sending all traffic to us.&amp;nbsp;&lt;/P&gt;&lt;P&gt;If we leave our side defined as our LAN and use the VPN routing setting to allow routing to the Internet, you think that is sufficient in this case?&lt;/P&gt;</description>
      <pubDate>Fri, 27 May 2022 12:31:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/3rd-Party-Peer-VPN-Settings/m-p/149620#M24014</guid>
      <dc:creator>BC_AMD</dc:creator>
      <dc:date>2022-05-27T12:31:11Z</dc:date>
    </item>
    <item>
      <title>Re: 3rd Party Peer VPN Settings</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/3rd-Party-Peer-VPN-Settings/m-p/149628#M24019</link>
      <description>&lt;P&gt;I never really tried this, but you could try set empty enc domain for interoperable object. Well, thats not true, I did it few times, but ONLY for route based VPNs. never domain based, so cant say if it would work, but worth a try.&lt;/P&gt;</description>
      <pubDate>Fri, 27 May 2022 13:53:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/3rd-Party-Peer-VPN-Settings/m-p/149628#M24019</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2022-05-27T13:53:54Z</dc:date>
    </item>
  </channel>
</rss>

