<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Site to site - Encryption Domain Question in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-site-Encryption-Domain-Question/m-p/171981#M31243</link>
    <description>&lt;P&gt;I would suggest to contact TAC to get it resolved !&lt;/P&gt;</description>
    <pubDate>Sun, 19 Feb 2023 09:21:40 GMT</pubDate>
    <dc:creator>G_W_Albrecht</dc:creator>
    <dc:date>2023-02-19T09:21:40Z</dc:date>
    <item>
      <title>Site to site - Encryption Domain Question</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-site-Encryption-Domain-Question/m-p/171958#M31239</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;I'm having a problem setting up a site to site with a remote peer. This is the last one of 6 we have moved over from our ASA to the firewalls. I've typed this from my phone, sorry for the basic formatting.&lt;/P&gt;&lt;P&gt;The specs of the site to site are:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Remote gateway: 142.152.123.66&lt;/LI&gt;&lt;LI&gt;Remote service over HTTPS: 142.152.123.67&lt;/LI&gt;&lt;LI&gt;Local encryption domain: 192.168.199.48/28&lt;/LI&gt;&lt;LI&gt;Access is required from our 10/8 internal network.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;NAT Rule, SRC:10/8 DST:142.152.123.67 HIDE: 192.168.199.49&lt;/P&gt;&lt;P&gt;IKEv2 is negotiating ok.&amp;nbsp;&lt;/P&gt;&lt;P&gt;The gateway is setup with per community domains. Tried per subnet and per gateway tunnel sharing.&lt;/P&gt;&lt;P&gt;Community:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Local: Group 10/8 &amp;amp; 192.168.199.48/28&lt;/LI&gt;&lt;LI&gt;Remote: 142.152.123.67&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;I have lab'd it up at home with the same IPs, apart from the remote peer, and it just works.&lt;/P&gt;&lt;P&gt;When I fw monitor the connection, I can see the packets go to the remote peer via my external interface, OE, over udp50 after the NAT.&lt;/P&gt;&lt;P&gt;The work fw sends the packet after NAT to the remote gateway over UDP500 through the external interface (O).&lt;/P&gt;&lt;P&gt;P.s. I have read every article on 3rd p&lt;SPAN&gt;arty vpns. Unless I'm not understanding the fault / resolution, I can't find the answer in there.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Could it have anything to do with the remote peer and remote endpoint both being on the internet and the IPs next to eachother (supernetting)?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Thanks in advanced&lt;/P&gt;&lt;P&gt;Rich&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 18 Feb 2023 09:45:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-site-Encryption-Domain-Question/m-p/171958#M31239</guid>
      <dc:creator>RichGrant</dc:creator>
      <dc:date>2023-02-18T09:45:16Z</dc:date>
    </item>
    <item>
      <title>Re: Site to site - Encryption Domain Question</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-site-Encryption-Domain-Question/m-p/171959#M31240</link>
      <description>&lt;P&gt;sk108600 - scenario 3 might be relevant based on the NAT you've shown&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 18 Feb 2023 09:38:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-site-Encryption-Domain-Question/m-p/171959#M31240</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2023-02-18T09:38:34Z</dc:date>
    </item>
    <item>
      <title>Re: Site to site - Encryption Domain Question</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-site-Encryption-Domain-Question/m-p/171960#M31241</link>
      <description>&lt;P&gt;Hi Chris,&lt;/P&gt;&lt;P&gt;Thanks for the quick response.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have read that article many times, but never picked up on:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;3rd party devices may not include their external IP addresses in their VPN domain as opposed to Check Point Security Gateway.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Is there anyway to provide this? I don't see any errors in the logs. The remote peer has been quite rigid and only blamed our setup.&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;Thanks&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 18 Feb 2023 10:13:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-site-Encryption-Domain-Question/m-p/171960#M31241</guid>
      <dc:creator>RichGrant</dc:creator>
      <dc:date>2023-02-18T10:13:15Z</dc:date>
    </item>
    <item>
      <title>Re: Site to site - Encryption Domain Question</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-site-Encryption-Domain-Question/m-p/171981#M31243</link>
      <description>&lt;P&gt;I would suggest to contact TAC to get it resolved !&lt;/P&gt;</description>
      <pubDate>Sun, 19 Feb 2023 09:21:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-site-Encryption-Domain-Question/m-p/171981#M31243</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2023-02-19T09:21:40Z</dc:date>
    </item>
    <item>
      <title>Re: Site to site - Encryption Domain Question</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-site-Encryption-Domain-Question/m-p/173578#M31567</link>
      <description>&lt;P&gt;I've got it working now, but I'll be truthful and admit I hadn't configured it correctly and fully understood how it works. This is what I observed.&lt;/P&gt;&lt;P&gt;Firstly, I didn't know their end was configured as the initiator only. This was different to my lab.&amp;nbsp;&lt;SPAN&gt;When they initiated the connection, the traffic selectors weren't matching with what I had configured in the local encryption domain.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;They are using policy based routing only. I had to set the community to use One VPN per subnet pair. Setting One VPN per gateway pair only offered the universal TS's for IKE Auth.&lt;/P&gt;&lt;P&gt;I didn't know about the Peer ID. The other s2s's didn't use it. I only found this out when using Strongswan in my lab. I sent them the peer id of the internal cluster IP and it seems to be working now.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thankfully this was the last one of 6 s2s's moved from our ASA to CP.&lt;/P&gt;&lt;P&gt;Thanks&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 04 Mar 2023 08:16:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-site-Encryption-Domain-Question/m-p/173578#M31567</guid>
      <dc:creator>RichGrant</dc:creator>
      <dc:date>2023-03-04T08:16:55Z</dc:date>
    </item>
    <item>
      <title>Re: Site to site - Encryption Domain Question</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-site-Encryption-Domain-Question/m-p/173591#M31570</link>
      <description>&lt;P&gt;Ry configuring VPN Community | Tunnel Management | Per each pair of hosts.&lt;/P&gt;</description>
      <pubDate>Sun, 05 Mar 2023 00:20:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-site-Encryption-Domain-Question/m-p/173591#M31570</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2023-03-05T00:20:30Z</dc:date>
    </item>
  </channel>
</rss>

