<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Site to Site Route Based VPN in Checkpoint in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-Route-Based-VPN-in-Checkpoint/m-p/183854#M33733</link>
    <description>&lt;P&gt;do i need to add routing for vti ipsec tunnel?&lt;/P&gt;</description>
    <pubDate>Tue, 13 Jun 2023 05:30:38 GMT</pubDate>
    <dc:creator>PankajTiwari1</dc:creator>
    <dc:date>2023-06-13T05:30:38Z</dc:date>
    <item>
      <title>Site to Site Route Based VPN in Checkpoint</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-Route-Based-VPN-in-Checkpoint/m-p/121022#M23222</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I understand in Checkpoint we can configure the Site to Site VPN using policy based and its recommended as well for Checkpoint. But many of other vendors works with Site to Site Route based VPN.... Is there any (simple) way, we can configure the Route based Site to Site VPN with Checkpoint. Please share the steps/ relevant docs.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;CSR&lt;/P&gt;</description>
      <pubDate>Sat, 12 Jun 2021 08:50:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-Route-Based-VPN-in-Checkpoint/m-p/121022#M23222</guid>
      <dc:creator>CSR</dc:creator>
      <dc:date>2021-06-12T08:50:20Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site Route Based VPN in Checkpoint</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-Route-Based-VPN-in-Checkpoint/m-p/121024#M23223</link>
      <description>&lt;P&gt;The official Check Point documentation does a pretty good job of guiding you through route-based VPN planning and setup using VPN Tunnel Interfaces (VTIs):&lt;/P&gt;
&lt;P&gt;&lt;A href="https://sc1.checkpoint.com/documents/R80.40/WebAdminGuides/EN/CP_R80.40_SitetoSiteVPN_AdminGuide/Topics-VPNSG/Route-Based-VPN.htm?tocpath=Route%20Based%20VPN%7C_____0#Route_Based_VPN" target="_blank"&gt;https://sc1.checkpoint.com/documents/R80.40/WebAdminGuides/EN/CP_R80.40_SitetoSiteVPN_AdminGuide/Topics-VPNSG/Route-Based-VPN.htm?tocpath=Route%20Based%20VPN%7C_____0#Route_Based_VPN&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 14 Apr 2022 23:13:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-Route-Based-VPN-in-Checkpoint/m-p/121024#M23223</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2022-04-14T23:13:25Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site Route Based VPN in Checkpoint</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-Route-Based-VPN-in-Checkpoint/m-p/121025#M23224</link>
      <description>&lt;P&gt;Yes, i already went through this doc but its so complex configuration. I tried it but didn't work... I was looking for some simple steps which can be used to configure it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Sat, 12 Jun 2021 13:06:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-Route-Based-VPN-in-Checkpoint/m-p/121025#M23224</guid>
      <dc:creator>CSR</dc:creator>
      <dc:date>2021-06-12T13:06:20Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site Route Based VPN in Checkpoint</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-Route-Based-VPN-in-Checkpoint/m-p/121027#M23225</link>
      <description>&lt;P&gt;Saying you tried the documentation and it didn’t work doesn’t help us help you.&lt;BR /&gt;What precise steps did you take?&lt;BR /&gt;What is the precise setup in question?&lt;BR /&gt;What version/JHF of the gateways and management?&lt;BR /&gt;Screenshots will probably help also.&lt;/P&gt;</description>
      <pubDate>Sat, 12 Jun 2021 15:46:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-Route-Based-VPN-in-Checkpoint/m-p/121027#M23225</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-06-12T15:46:26Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site Route Based VPN in Checkpoint</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-Route-Based-VPN-in-Checkpoint/m-p/121028#M23226</link>
      <description>&lt;P&gt;You want to configure route based VPN just because other vendors are usually configured using that?&amp;nbsp;&lt;/P&gt;&lt;P&gt;From my perspective that makes no sense.&lt;/P&gt;&lt;P&gt;Yes, there are use cases vor route based but i never had the need.&lt;/P&gt;</description>
      <pubDate>Sat, 12 Jun 2021 15:56:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-Route-Based-VPN-in-Checkpoint/m-p/121028#M23226</guid>
      <dc:creator>Vincent_Bacher</dc:creator>
      <dc:date>2021-06-12T15:56:27Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site Route Based VPN in Checkpoint</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-Route-Based-VPN-in-Checkpoint/m-p/121030#M23227</link>
      <description>&lt;P&gt;I tried these steps on R81 with latest hotfixes and Smart Cloud management R81 version.&lt;/P&gt;&lt;P&gt;Sure will try again and share the screenshots...&lt;/P&gt;&lt;P&gt;I was wondering if it can be configured simple way like we confgure policy based VPNs.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Sat, 12 Jun 2021 16:00:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-Route-Based-VPN-in-Checkpoint/m-p/121030#M23227</guid>
      <dc:creator>CSR</dc:creator>
      <dc:date>2021-06-12T16:00:43Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site Route Based VPN in Checkpoint</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-Route-Based-VPN-in-Checkpoint/m-p/121031#M23228</link>
      <description>&lt;P&gt;What you are saying is absolutely right... I never required this configuration as Policy based VPN works absolutely fine on Checkpoint regardless of other side configuration method...&lt;/P&gt;&lt;P&gt;Actually I'm doing a POC for a customer and they want to evaluate Policy based VPN as well... That's why I reached out to this portal....&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Sat, 12 Jun 2021 16:03:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-Route-Based-VPN-in-Checkpoint/m-p/121031#M23228</guid>
      <dc:creator>CSR</dc:creator>
      <dc:date>2021-06-12T16:03:36Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site Route Based VPN in Checkpoint</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-Route-Based-VPN-in-Checkpoint/m-p/121049#M23229</link>
      <description>&lt;P&gt;Perhaps someone could proof read the documentation, the very first two commands are both out dated and make references to the wrong IPs in the diagram.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Diagram:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="vti_diagram.jpg" style="width: 510px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/12139i1CAF17868D3209C1/image-size/large?v=v2&amp;amp;px=999" role="button" title="vti_diagram.jpg" alt="vti_diagram.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="vti_error_in_documentation.jpg" style="width: 623px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/12138i9EC6BCDA0F1F9CF5/image-size/large?v=v2&amp;amp;px=999" role="button" title="vti_error_in_documentation.jpg" alt="vti_error_in_documentation.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Herewith some speed notes on creating route based IPSec tunnels between two ClusterXL gateways. What we also see often is that the management server will be internal to one ClusterXL whilst then being external to another. Remember to set a NAT address for the management server, so that implied rules are created to get the CRL requests through to the management server from the remote gateway. You may also need to temporarily create a local host entry for 'management-server' to map to the public IP, so that it can retrieve the CRL list as part of the first connection. Once the VPN tunnels are up you can change the remote gateway to use your AD DNS servers for resolution.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;IPSec VTI between gateways:&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;Create mesh community 'Routed VPN' and add clustered gateways, set one tunnel per gateway pair and permanent. Gateways may need&amp;nbsp;to resolve public NAT IP of management server to retrieve the certificate revocation list (CRL) and may otherwise log 'invalid certificate' erros.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Carve up a /29 subnet for the VTIs (route based IPSec): 10.150.166.24/29&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;&lt;FONT face="courier new,courier" size="2"&gt;jb1-cluster 10.150.166.25&amp;nbsp; &amp;nbsp; &amp;nbsp; 10.150.166.30 db1-cluster&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;jb1-fw01&amp;nbsp; &amp;nbsp; 10.150.166.26&amp;nbsp; &amp;nbsp; &amp;nbsp; 10.150.166.29 db1-fw01&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;jb1-fw02&amp;nbsp; &amp;nbsp; 10.150.166.27&amp;nbsp; &amp;nbsp; &amp;nbsp; 10.150.166.28 db1-fw02&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;jb1-fw01:&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;clish&lt;BR /&gt;add vpn tunnel 1 type numbered local 10.150.166.26 remote 10.150.166.30 peer db1-cluster&lt;BR /&gt;set interface vpnt1 state on&lt;BR /&gt;set interface vpnt1 mtu 1500&lt;/P&gt;&lt;P&gt;jb1-fw02:&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;clish&lt;BR /&gt;add vpn tunnel 1 type numbered local 10.150.166.27 remote 10.150.166.30 peer db1-cluster&lt;BR /&gt;set interface vpnt1 state on&lt;BR /&gt;set interface vpnt1 mtu 1500&lt;/P&gt;&lt;P&gt;db1-fw01:&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;clish&lt;BR /&gt;add vpn tunnel 1 type numbered local 10.150.166.29 remote 10.150.166.25 peer jb1-cluster&lt;BR /&gt;set interface vpnt1 state on&lt;BR /&gt;set interface vpnt1 mtu 1500&lt;/P&gt;&lt;P&gt;db1-fw02:&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;clish&lt;BR /&gt;add vpn tunnel 1 type numbered local 10.150.166.28 remote 10.150.166.25 peer jb1-cluster&lt;BR /&gt;set interface vpnt1 state on&lt;BR /&gt;set interface vpnt1 mtu 1500&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Update security policy:&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;Update network interfaces on the ClusterXL objects, so that you can set the VIP floating IP on the vpnt1 interfaces, this would be set as 10.150.166.25 for 'jb1-cluster'&amp;nbsp;and 10.150.166.30 for 'db1-cluster'. Remember to install policy...&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;You should now be able to ping the remote cluster IP on each of the gateways, for example in expert mode:&lt;/P&gt;&lt;P class="lia-indent-padding-left-60px"&gt;&lt;FONT face="courier new,courier" size="2"&gt;&lt;FONT color="#999999"&gt;[Expert@jb1-fw01:0]#&lt;/FONT&gt; ifconfig vpnt1&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;vpnt1 Link encap:IPIP Tunnel HWaddr&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;inet addr:10.150.166.26 P-t-P:&lt;FONT color="#339966"&gt;10.150.166.30&lt;/FONT&gt; Mask:255.255.255.255&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;UP POINTOPOINT RUNNING NOARP MULTICAST MTU:1500 Metric:1&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;RX packets:0 errors:0 dropped:0 overruns:0 frame:0&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;TX packets:0 errors:0 dropped:0 overruns:0 carrier:0&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;collisions:0 txqueuelen:1000&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;RX bytes:0 (0.0 b) TX bytes:0 (0.0 b)&lt;/FONT&gt;&lt;/P&gt;&lt;P class="lia-indent-padding-left-60px"&gt;&lt;FONT face="courier new,courier" size="2"&gt;&lt;FONT color="#999999"&gt;[Expert@jb1-fw01:0]#&lt;/FONT&gt; ping &lt;FONT color="#339966"&gt;10.150.166.30&lt;/FONT&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;PING 10.150.166.30 (10.150.166.30) 56(84) bytes of data.&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;64 bytes from 10.150.166.30: icmp_seq=1 ttl=64 time=12.7 ms&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;64 bytes from 10.150.166.30: icmp_seq=2 ttl=64 time=11.0 ms&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2" color="#999999"&gt;^C&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;--- 10.150.166.30 ping statistics ---&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;2 packets transmitted, 2 received, 0% packet loss, time 1001ms&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;rtt min/avg/max/mdev = 11.073/11.917/12.761/0.844 ms&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now enable dynamic routing over the VTIs:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;jb1-fw01 &amp;amp; jb1-fw02:&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;set router-id 196.1.1.6&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;FONT color="#999999"&gt;#&amp;nbsp;external VIP&lt;/FONT&gt;&lt;BR /&gt;set ospf interface vpnt1 area backbone on&lt;BR /&gt;set ospf interface vpnt1 hello-interval 1&lt;BR /&gt;set ospf interface vpnt1 dead-interval 10&lt;BR /&gt;set ospf interface vpnt1 cost 10&lt;BR /&gt;set ospf interface vpnt1 priority 1&lt;BR /&gt;set ospf interface vpnt1 authtype cryptographic key 1 algorithm md5 key 1 secret xxxxxxxxxxxxxxxx&lt;BR /&gt;set ospf instance default area backbone range 10.150.166.25/32 restrict on&lt;BR /&gt;set inbound-route-filter ospf2 instance default restrict-all-ipv4&lt;BR /&gt;set inbound-route-filter ospf2 instance default route 10.0.0.0/8 between 8 and 31 on&lt;BR /&gt;set inbound-route-filter ospf2 instance default route 172.16.0.0/12 between 12 and 31 on&lt;BR /&gt;set inbound-route-filter ospf2 instance default route 192.168.0.0/16 between 16 and 31 on&lt;BR /&gt;set route-redistribution to ospf2 instance default from interface all on&lt;BR /&gt;set route-redistribution to ospf2 instance default from static-route all-ipv4-routes on&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;db1-fw01 &amp;amp; db1-fw02:&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;set router-id 41.1.1.26&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;FONT color="#999999"&gt;#&amp;nbsp;external VIP&lt;/FONT&gt;&lt;BR /&gt;set ospf interface vpnt1 area backbone on&lt;BR /&gt;set ospf interface vpnt1 hello-interval 1&lt;BR /&gt;set ospf interface vpnt1 dead-interval 10&lt;BR /&gt;set ospf interface vpnt1 cost 10&lt;BR /&gt;set ospf interface vpnt1 priority 1&lt;BR /&gt;set ospf interface vpnt1 authtype cryptographic key 1 algorithm md5 key 1 secret xxxxxxxxxxxxxxxx&lt;BR /&gt;set ospf instance default area backbone range 10.150.166.30/32 restrict on&lt;BR /&gt;set inbound-route-filter ospf2 instance default restrict-all-ipv4&lt;BR /&gt;set inbound-route-filter ospf2 instance default route 10.0.0.0/8 between 8 and 31 on&lt;BR /&gt;set inbound-route-filter ospf2 instance default route 172.16.0.0/12 between 12 and 31 on&lt;BR /&gt;set inbound-route-filter ospf2 instance default route 192.168.0.0/16 between 16 and 31 on&lt;BR /&gt;set route-redistribution to ospf2 instance default from interface all on&lt;BR /&gt;set route-redistribution to ospf2 instance default from static-route all-ipv4-routes on&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;CRL retrieval:&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;Enable NAT on management server to construct implied rules and switch all gateways to use external IPs&lt;BR /&gt;May be needed temporarily to cache the CRL:&lt;BR /&gt;add host name checkpoint-management ipv4-address 196.1.1.4&amp;nbsp; &lt;FONT color="#999999"&gt;(or whatever IP is natted to the management-server)&lt;/FONT&gt;&lt;BR /&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk164881" target="_blank" rel="noopener"&gt;https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk164881&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Debug IPSec:&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;1st session:&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;vpn debug trunc&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;vpn debug on TDERROR_ALL_ALL=5&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;fwaccel off&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;fw monitor -e "accept;" -o /var/log/fw_mon_traffic.cap&lt;/FONT&gt;&lt;BR /&gt;&lt;BR /&gt;end:&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;&amp;lt;ctrl&amp;gt;-c&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;fwaccel on&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;vpn debug off&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;vpn debug ikeoff&lt;/FONT&gt;&lt;BR /&gt;&lt;BR /&gt;2nd session:&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;fw ctl debug 0&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;fw ctl debug -buf 32000&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;fw ctl debug -m fw + conn drop vm crypt&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;fw ctl debug -m VPN all&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;fw ctl kdebug -T -f &amp;gt; /var/log/kernel_debug.txt&lt;/FONT&gt;&lt;BR /&gt;&lt;BR /&gt;end:&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;&amp;lt;ctrl&amp;gt;-c&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;fw ctl debug 0&lt;/FONT&gt;&lt;BR /&gt;&lt;BR /&gt;archive:&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;cd /;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;tar -czf /root/sk63560.tgz /var/log/fw_mon_traffic.cap /var/log/kernel_debug.txt $FWDIR/log/ike.elg* $FWDIR/log/ikev2.xml* $FWDIR/log/vpnd.elg*;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier" size="2"&gt;rm -f /var/log/fw_mon_traffic.cap /var/log/kernel_debug.txt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;View $FWDIR/log/ike.elg* (IKEv1) or $FWDIR/log/ikev2.xml* (IKEv2) using IKEView utility to debug in seconds what's going on, then find the actual&amp;nbsp;reason in the logs. IKEView may complain about an invalid certificate, although we're using the built-in SIC certs, due to a new remotely managed&amp;nbsp;gateway perhaps not having the ability to resolve the management server name to the required IP, hence not being able to retrieve the CRL and&amp;nbsp;cache it. Bit of a chicken and egg story...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 13 Jun 2021 07:16:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-Route-Based-VPN-in-Checkpoint/m-p/121049#M23229</guid>
      <dc:creator>David_Herselman</dc:creator>
      <dc:date>2021-06-13T07:16:43Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site Route Based VPN in Checkpoint</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-Route-Based-VPN-in-Checkpoint/m-p/121085#M23230</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/1527"&gt;@Uri_Lewitus&lt;/a&gt;&amp;nbsp;for the documentation update &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 14 Jun 2021 03:44:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-Route-Based-VPN-in-Checkpoint/m-p/121085#M23230</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-06-14T03:44:52Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site Route Based VPN in Checkpoint</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-Route-Based-VPN-in-Checkpoint/m-p/121301#M23231</link>
      <description>&lt;P&gt;The instructions in the Site to Site VPN Admin Guide were updated - the modified books will be uploaded soon&lt;/P&gt;
&lt;P&gt;Meanwhile, see the attached file with the "Route Based VPN" chapter&lt;/P&gt;
&lt;P&gt;Note that configuration of VTI interfaces must be done only in the Gaia Portal or Gaia Clish.&lt;/P&gt;</description>
      <pubDate>Tue, 15 Jun 2021 21:48:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-Route-Based-VPN-in-Checkpoint/m-p/121301#M23231</guid>
      <dc:creator>Sergei_Shir</dc:creator>
      <dc:date>2021-06-15T21:48:05Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site Route Based VPN in Checkpoint</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-Route-Based-VPN-in-Checkpoint/m-p/121786#M23232</link>
      <description>&lt;P&gt;Can I create and use VTIs more than 99?&amp;nbsp;How many VTIs I can use?&amp;nbsp;I created 255 VTIs and imported them into the topology in SmartConsole for the purpose of testing. Will VTI work with numbers over 99?&lt;/P&gt;</description>
      <pubDate>Tue, 22 Jun 2021 05:16:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-Route-Based-VPN-in-Checkpoint/m-p/121786#M23232</guid>
      <dc:creator>Eugen_Karyakin</dc:creator>
      <dc:date>2021-06-22T05:16:31Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site Route Based VPN in Checkpoint</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-Route-Based-VPN-in-Checkpoint/m-p/121878#M23233</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;Can we create route based VPN tunnels in a VS (virtual system) in VSLS set up?&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm trying to build a route-based IPSec L2L tunnel for a VS (in VSLS set up running R80.40) to Azure VPN gateway and use BGP route advertisements. Is this achievable? I've seen in documentation that VTI is not supported in VSX environment. Is it still not supported?&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is there any other way to build a route based VPN with BGP advertisements?&lt;/P&gt;&lt;P&gt;Appreciate your comments and findings.&lt;/P&gt;</description>
      <pubDate>Wed, 23 Jun 2021 03:48:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-Route-Based-VPN-in-Checkpoint/m-p/121878#M23233</guid>
      <dc:creator>Udara_Wijetunge</dc:creator>
      <dc:date>2021-06-23T03:48:02Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site Route Based VPN in Checkpoint</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-Route-Based-VPN-in-Checkpoint/m-p/121935#M23234</link>
      <description>&lt;P&gt;VTIs are not supported with VSX in R80.40, but support for this was introduced in R81.&amp;nbsp; See this very informative SK:&amp;nbsp;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk79700&amp;amp;partition=Basic&amp;amp;product=VSX," target="_blank"&gt;sk79700: VSX supported features&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 23 Jun 2021 13:35:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-Route-Based-VPN-in-Checkpoint/m-p/121935#M23234</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2021-06-23T13:35:03Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site Route Based VPN in Checkpoint</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-Route-Based-VPN-in-Checkpoint/m-p/146207#M23235</link>
      <description>&lt;P&gt;Hi ,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I could not open the link , could you please share the correct one&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 13 Apr 2022 14:07:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-Route-Based-VPN-in-Checkpoint/m-p/146207#M23235</guid>
      <dc:creator>sreekanthvijay</dc:creator>
      <dc:date>2022-04-13T14:07:47Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site Route Based VPN in Checkpoint</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-Route-Based-VPN-in-Checkpoint/m-p/146328#M23236</link>
      <description>&lt;P&gt;I fixed the link in Tim's post.&lt;/P&gt;</description>
      <pubDate>Thu, 14 Apr 2022 23:13:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-Route-Based-VPN-in-Checkpoint/m-p/146328#M23236</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2022-04-14T23:13:39Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site Route Based VPN in Checkpoint</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-Route-Based-VPN-in-Checkpoint/m-p/183854#M33733</link>
      <description>&lt;P&gt;do i need to add routing for vti ipsec tunnel?&lt;/P&gt;</description>
      <pubDate>Tue, 13 Jun 2023 05:30:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-Route-Based-VPN-in-Checkpoint/m-p/183854#M33733</guid>
      <dc:creator>PankajTiwari1</dc:creator>
      <dc:date>2023-06-13T05:30:38Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site Route Based VPN in Checkpoint</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-Route-Based-VPN-in-Checkpoint/m-p/183904#M33742</link>
      <description>&lt;P&gt;When using a route-asked VPN, traffic that goes through the VPN must have a route through the VTI interface (either statically defined or through dynamic routing protocols).&lt;/P&gt;</description>
      <pubDate>Tue, 13 Jun 2023 17:30:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-Route-Based-VPN-in-Checkpoint/m-p/183904#M33742</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2023-06-13T17:30:43Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site Route Based VPN in Checkpoint</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-Route-Based-VPN-in-Checkpoint/m-p/184032#M33768</link>
      <description>&lt;P&gt;thanks. it worked.&lt;/P&gt;&lt;P&gt;But why I can't see logs on vti tunnel interface. the policy have been created without the vpn community added. vpn column set to any. tunnel is working fine.&lt;/P&gt;</description>
      <pubDate>Thu, 15 Jun 2023 06:48:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-Route-Based-VPN-in-Checkpoint/m-p/184032#M33768</guid>
      <dc:creator>PankajTiwari1</dc:creator>
      <dc:date>2023-06-15T06:48:21Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site Route Based VPN in Checkpoint</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-Route-Based-VPN-in-Checkpoint/m-p/184092#M33785</link>
      <description>&lt;P&gt;Not clear what the question is.&lt;BR /&gt;What precisely do you expect to see?&lt;BR /&gt;What do you see instead?&lt;BR /&gt;Screenshots (with sensitive details redacted) would be helpful.&lt;/P&gt;</description>
      <pubDate>Thu, 15 Jun 2023 13:31:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-Route-Based-VPN-in-Checkpoint/m-p/184092#M33785</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2023-06-15T13:31:06Z</dc:date>
    </item>
    <item>
      <title>Re: Site to Site Route Based VPN in Checkpoint</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-Route-Based-VPN-in-Checkpoint/m-p/184509#M33908</link>
      <description>&lt;P&gt;Can I create multiple tunnel with one VTI interface?&lt;/P&gt;</description>
      <pubDate>Thu, 22 Jun 2023 09:32:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-Route-Based-VPN-in-Checkpoint/m-p/184509#M33908</guid>
      <dc:creator>PankajTiwari1</dc:creator>
      <dc:date>2023-06-22T09:32:56Z</dc:date>
    </item>
  </channel>
</rss>

