<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cant reach bgp networks from Cluster XL members in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Cant-reach-bgp-networks-from-Cluster-XL-members/m-p/173920#M31610</link>
    <description>&lt;P&gt;What is at the Remote End of the tunnel in this case?&lt;BR /&gt;On Check Point, the gateway itself is automatically included in the Encryption Domain.&lt;BR /&gt;If the remote end is not configured appropriately, then you will see the behavior you’re seeing since the remote end may not be expecting that traffic to be encrypted.&lt;/P&gt;</description>
    <pubDate>Tue, 07 Mar 2023 19:50:50 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2023-03-07T19:50:50Z</dc:date>
    <item>
      <title>Cant reach bgp networks from Cluster XL members</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Cant-reach-bgp-networks-from-Cluster-XL-members/m-p/173745#M31609</link>
      <description>&lt;P&gt;Hi Guys, hope one of you can give an idea about this behavior&lt;/P&gt;&lt;P&gt;We have a cluster XL with BGP with several GW and we connect that BGP via Ipsec routed base tunnel.&lt;/P&gt;&lt;P&gt;Every host behind the firewalls is ABLE to ping the remote networks learning by BGP but i am not able to do it from the active member firewall.&lt;/P&gt;&lt;P&gt;I also tried to ping by source but nothing.&lt;/P&gt;&lt;P class=""&gt;fw ctl zdebug + drop is showing nothing.&lt;/P&gt;&lt;P class=""&gt;Topology is:&lt;/P&gt;&lt;P class=""&gt;Cluster XL interfaces:&lt;/P&gt;&lt;P class=""&gt;bond1.1 with public IP.&lt;/P&gt;&lt;P class=""&gt;bond1.2 transit private IP 10.100.200.247 (physical 248 and 249)&lt;/P&gt;&lt;P class=""&gt;bond1.3 private IP 10.100.1.250&amp;nbsp;(physical 248 and 249)&lt;/P&gt;&lt;P class=""&gt;the Bond is connected to a switch that has 3 Interface Vlan&lt;/P&gt;&lt;P class=""&gt;Int clan 1.1 : External public IP&lt;/P&gt;&lt;P class=""&gt;int vlan 1.2: 10.10.10.1 (default gateway for local host)&lt;/P&gt;&lt;P class=""&gt;int vlan 1.3: local network.&lt;/P&gt;&lt;P class=""&gt;Connecto from the local network and trace to the remote host:&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;traceroute 172.22.241.47&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;traceroute to 172.22.241.47 (172.22.241.47), 64 hops max, 52 byte packets&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;1&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;192.168.10.1 (192.168.10.1)&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;2.481 ms&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;2.106 ms&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;2.197 ms&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;2&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;10.100.200.247 (10.100.200.247)&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;3.183 ms *&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;3.225 ms&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;3&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;10.11.1.65 (10.11.1.65)&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;32.279 ms&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;35.524 ms&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;41.145 ms IPSEC TUNNEL BGP&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;4&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;* * *&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;^C&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;ping 172.22.241.47&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;PING 172.22.241.47 (172.22.241.47): 56 data bytes&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;64 bytes from 172.22.241.47: icmp_seq=0 ttl=123 time=209.151 ms&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;64 bytes from 172.22.241.47: icmp_seq=1 ttl=123 time=40.271 ms&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;64 bytes from 172.22.241.47: icmp_seq=2 ttl=123 time=39.915 ms&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;64 bytes from 172.22.241.47: icmp_seq=3 ttl=123 time=48.013 ms&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;/////////////////&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;From Firewall&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;CP-2&amp;gt; traceroute 172.22.241.47&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;traceroute to 172.22.241.47 (172.22.241.47), 30 hops max, 40 byte packets&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;1&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;10.11.1.65 (10.11.1.65)&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;28.403 ms&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;28.247 ms&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;28.286 ms&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;2&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;* * *&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;3&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;* * *&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;4&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;* * *&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;5&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;* * *&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;6&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;* * *&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;7&lt;SPAN class=""&gt;&amp;nbsp; &lt;/SPAN&gt;*^C&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;CP-2&amp;gt; ping 172.22.241.47&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;PING 172.22.241.47 (172.22.241.47) 56(84) bytes of data.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;^C&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;--- 172.22.241.47 ping statistics ---&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;3 packets transmitted, 0 received, 100% packet loss, time 2001ms&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;CP-2&amp;gt; ping -s 10.100.1.249 172.22.241.47&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;PING 172.22.241.47 (172.22.241.47) 10(38) bytes of data.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;^C&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;--- 172.22.241.47 ping statistics ---&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;34 packets transmitted, 0 received, 100% packet loss, time 32998ms&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;show route destination 172.22.241.47&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Codes: C - Connected, S - Static, R - RIP, B - BGP (D - Default),&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;O - OSPF IntraArea (IA - InterArea, E - External, N - NSSA),&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;A - Aggregate, K - Kernel Remnant, H - Hidden, P - Suppressed,&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;NP - NAT Pool, U - Unreachable, i - Inactive&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;B &lt;SPAN class=""&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;172.22.240.0/20 &lt;SPAN class=""&gt;&amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;via 10.11.1.65, vpnt40, cost None, age 8432&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;/////////&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;From remote host&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;ping 10.100.1.250&lt;/P&gt;&lt;P&gt;Pinging 10.100.1.250 with 32 bytes of data:&lt;BR /&gt;Reply from 10.100.1.250: bytes=32 time=36ms TTL=61&lt;BR /&gt;Reply from 10.100.1.250: bytes=32 time=32ms TTL=61&lt;/P&gt;&lt;P&gt;Ping statistics for 10.100.1.250:&lt;BR /&gt;Packets: Sent = 2, Received = 2, Lost = 0 (0% loss),&lt;BR /&gt;Approximate round trip times in milli-seconds:&lt;BR /&gt;Minimum = 32ms, Maximum = 36ms, Average = 34ms&lt;/P&gt;&lt;P&gt;Also when I tcpdump the outgoing ping from the firewall I don't see anything, but could be a common behavior right?&lt;/P&gt;&lt;P&gt;Any help will be appreciated!&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thx!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 06 Mar 2023 17:15:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Cant-reach-bgp-networks-from-Cluster-XL-members/m-p/173745#M31609</guid>
      <dc:creator>Roh_oh</dc:creator>
      <dc:date>2023-03-06T17:15:24Z</dc:date>
    </item>
    <item>
      <title>Re: Cant reach bgp networks from Cluster XL members</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Cant-reach-bgp-networks-from-Cluster-XL-members/m-p/173920#M31610</link>
      <description>&lt;P&gt;What is at the Remote End of the tunnel in this case?&lt;BR /&gt;On Check Point, the gateway itself is automatically included in the Encryption Domain.&lt;BR /&gt;If the remote end is not configured appropriately, then you will see the behavior you’re seeing since the remote end may not be expecting that traffic to be encrypted.&lt;/P&gt;</description>
      <pubDate>Tue, 07 Mar 2023 19:50:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Cant-reach-bgp-networks-from-Cluster-XL-members/m-p/173920#M31610</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2023-03-07T19:50:50Z</dc:date>
    </item>
    <item>
      <title>Re: Cant reach bgp networks from Cluster XL members</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Cant-reach-bgp-networks-from-Cluster-XL-members/m-p/173929#M31622</link>
      <description>&lt;P&gt;I agree with&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/7"&gt;@PhoneBoy&lt;/a&gt;&amp;nbsp;. Also, try below commands. Just as an example, lets say src ip is 1.1.1.1 and dst is 2.2.2.2 and port is 444&lt;/P&gt;
&lt;P&gt;ip r g 2.2.2.2&lt;/P&gt;
&lt;P&gt;fw monitor -F "1.1.1.1,0,2.2.2.2,444,0" -F "2.2.2.2,0,1,1,1,1,444,0"&lt;/P&gt;
&lt;P&gt;Idea is this with -F flag "src ip, src port, dst ip, dst port, protocol"&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Tue, 07 Mar 2023 20:24:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Cant-reach-bgp-networks-from-Cluster-XL-members/m-p/173929#M31622</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-03-07T20:24:44Z</dc:date>
    </item>
    <item>
      <title>Re: Cant reach bgp networks from Cluster XL members</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Cant-reach-bgp-networks-from-Cluster-XL-members/m-p/173935#M31623</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/7"&gt;@PhoneBoy&lt;/a&gt;&amp;nbsp;&lt;SPAN&gt;What is at the Remote End of the tunnel in this case? is a remote Cisco Router and yes could be the reason for this behavior, but sadly is not on my mgmt, and that is why I'm looking for extra help.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Regarding "On Check Point, the gateway itself is automatically included in the Encryption Domain." That is something good to know, but I have an extra question about that.&lt;/P&gt;&lt;P&gt;Is possible that the "VPN sharing" option was config as "One VPN tunnel per Security Gateway pair".Could this be the reason for this behavior?&amp;nbsp; because the documentation says "&lt;SPAN&gt;One VPN tunnel is created between peer Security Gateways and shared by all &lt;STRONG&gt;hosts behind&lt;/STRONG&gt; each peer Security Gateway."&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 07 Mar 2023 21:01:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Cant-reach-bgp-networks-from-Cluster-XL-members/m-p/173935#M31623</guid>
      <dc:creator>Roh_oh</dc:creator>
      <dc:date>2023-03-07T21:01:01Z</dc:date>
    </item>
    <item>
      <title>Re: Cant reach bgp networks from Cluster XL members</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Cant-reach-bgp-networks-from-Cluster-XL-members/m-p/173936#M31624</link>
      <description>&lt;P class=""&gt;&lt;SPAN class=""&gt;ip r g 172.22.241.47&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;172.22.241.47 via 10.11.1.65 dev vpnt40 src 10.11.1.66&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;SPAN class=""&gt;&amp;nbsp; &amp;nbsp; &lt;/SPAN&gt;cache&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;66: local tunnel ip&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;65: remote&lt;BR /&gt;&lt;BR /&gt;With Fw monitor&amp;nbsp;I was not lucky, I didn't be able to capture any packet, pinging the remote host in another session.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Thx Guys!&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 07 Mar 2023 21:07:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Cant-reach-bgp-networks-from-Cluster-XL-members/m-p/173936#M31624</guid>
      <dc:creator>Roh_oh</dc:creator>
      <dc:date>2023-03-07T21:07:10Z</dc:date>
    </item>
    <item>
      <title>Re: Cant reach bgp networks from Cluster XL members</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Cant-reach-bgp-networks-from-Cluster-XL-members/m-p/173945#M31631</link>
      <description>&lt;P&gt;I don't believe "one VPN tunnel per Security Gateway pair" is relevant in this case, especially since the issue is with traffic originating from the gateway itself.&lt;BR /&gt;Your options are:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Have the remote end change the configuration so that the gateway's external IP is included in the encryption configuration (not just the subnets behind the gateway).&lt;/LI&gt;
&lt;LI&gt;Exclude the gateway IP from the Encryption Domain on your end.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;In R81.20 (and possibly other versions) there's a simple checkbox to exclude it:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/19976iEAA72AF44C6D4D51/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;If this option is not available on your version, you will need to apply the steps in Scenario 3 here: &lt;A href="https://support.checkpoint.com/results/sk/sk108600" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk108600&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 07 Mar 2023 23:35:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Cant-reach-bgp-networks-from-Cluster-XL-members/m-p/173945#M31631</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2023-03-07T23:35:15Z</dc:date>
    </item>
    <item>
      <title>Re: Cant reach bgp networks from Cluster XL members</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Cant-reach-bgp-networks-from-Cluster-XL-members/m-p/174217#M31707</link>
      <description>&lt;P&gt;Let me ask some questions about the exclusion&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2023-03-09 at 11.18.01.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/20007i9D9B27058DFAE25D/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Screenshot 2023-03-09 at 11.18.01.png" alt="Screenshot 2023-03-09 at 11.18.01.png" /&gt;&lt;/span&gt;this is my current config.&lt;/P&gt;&lt;P&gt;we are running a route-based IP sec tunnel and that is why we do it in this way. Maybe this is the reason?&lt;/P&gt;&lt;P&gt;every VPN community has an empty group like:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2023-03-09 at 12.31.33.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/20006iE48D1F43697D7CC3/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Screenshot 2023-03-09 at 12.31.33.png" alt="Screenshot 2023-03-09 at 12.31.33.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;what is the main difference between these 2 ways of configs?&amp;nbsp;&lt;/P&gt;&lt;P&gt;TY!&lt;/P&gt;</description>
      <pubDate>Thu, 09 Mar 2023 11:38:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Cant-reach-bgp-networks-from-Cluster-XL-members/m-p/174217#M31707</guid>
      <dc:creator>Roh_oh</dc:creator>
      <dc:date>2023-03-09T11:38:59Z</dc:date>
    </item>
    <item>
      <title>Re: Cant reach bgp networks from Cluster XL members</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Cant-reach-bgp-networks-from-Cluster-XL-members/m-p/174243#M31711</link>
      <description>&lt;P&gt;You can have empty group as enc domain, BUT, what really matters for VPN context is whats configured as enc domain per community, which is controlled by set option in your first screenshot.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Thu, 09 Mar 2023 13:41:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Cant-reach-bgp-networks-from-Cluster-XL-members/m-p/174243#M31711</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-03-09T13:41:57Z</dc:date>
    </item>
    <item>
      <title>Re: Cant reach bgp networks from Cluster XL members</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Cant-reach-bgp-networks-from-Cluster-XL-members/m-p/174299#M31725</link>
      <description>&lt;P&gt;It's not relevant to the issue at hand.&lt;/P&gt;
&lt;P&gt;The original description you provided suggests&amp;nbsp;traffic originating from your gateway to the remote gateway is getting encapsulated in IPsec but the remote end isn't expecting it.&lt;BR /&gt;This is why your pings/traceroutes to the external IP of the remote site fail.&lt;BR /&gt;You can fix it using one of the two methods I describe above.&lt;/P&gt;</description>
      <pubDate>Fri, 10 Mar 2023 03:04:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Cant-reach-bgp-networks-from-Cluster-XL-members/m-p/174299#M31725</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2023-03-10T03:04:44Z</dc:date>
    </item>
    <item>
      <title>Re: Cant reach bgp networks from Cluster XL members</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Cant-reach-bgp-networks-from-Cluster-XL-members/m-p/174716#M31810</link>
      <description>&lt;P&gt;Ty for your help, was very useful.&lt;/P&gt;&lt;P&gt;after the change, i will be back!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 14 Mar 2023 09:30:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Cant-reach-bgp-networks-from-Cluster-XL-members/m-p/174716#M31810</guid>
      <dc:creator>Roh_oh</dc:creator>
      <dc:date>2023-03-14T09:30:46Z</dc:date>
    </item>
  </channel>
</rss>

