<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: VPN with 3rdparty in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-with-3rdparty/m-p/216050#M41209</link>
    <description>&lt;P&gt;Attention, quoting from&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/General-Topics/Important-security-update-stay-protected-against-VPN-Information/m-p/215965#M35811" target="_self"&gt;&lt;SPAN&gt;Important security update - stay protected against VPN Information Disclosure (CVE-2024-24919)&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In R81.10 we added a feature to improve VPN performance - named CCCD&lt;/P&gt;
&lt;P&gt;This feature is&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;disabled by default&lt;/STRONG&gt;, and we know about few advanced customers who are using it.&lt;/P&gt;
&lt;P&gt;Customers who enable CCCD&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;STRONG&gt;are still vulnerable to CVE-2024-24919 even after installing the Hotfix!&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;U&gt;&lt;STRONG&gt;YOU MUST DISABLE CCCD TO BECOME PROTECTED!&lt;/STRONG&gt;&lt;/U&gt;&lt;/P&gt;
&lt;P&gt;Instructions below and also on&amp;nbsp;&lt;A class="fui-Link ___1rxvrpe f2hkw1w f3rmtva f1ewtqcl fyind8e f1k6fduh f1w7gpdv fk6fouc fjoy568 figsok6 f1hu3pq6 f11qmguv f19f4twv f1tyq0we f1g0x7ka fhxju0i f1qch9an f1cnd47f fqv5qza f1vmzxwi f1o700av f13mvf36 f1cmlufx f9n3di6 f1ids18y f1tx3yz7 f1deo86v f1eh06m1 f1iescvh fhgqx19 f1olyrje f1p93eir f1nev41a f1h8hb77 f1lqvz6u f10aw75t fsle3fq f17ae5zn" title="https://support.checkpoint.com/results/sk/sk182336" href="https://support.checkpoint.com/results/sk/sk182336" target="_blank" rel="noreferrer noopener" aria-label="Link SK182336"&gt;SK182336&lt;/A&gt;:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Run the command:&amp;nbsp;&lt;CODE&gt;&lt;STRONG&gt;vpn cccd status&lt;/STRONG&gt;&lt;/CODE&gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;The expected output is:&amp;nbsp;&lt;CODE&gt;&lt;STRONG&gt;vpn: 'cccd' is disabled&lt;/STRONG&gt;&lt;/CODE&gt;.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;If the output differs, stop the&amp;nbsp;&lt;CODE&gt;&lt;STRONG&gt;CCCD&lt;/STRONG&gt;&lt;/CODE&gt;&amp;nbsp;process by running the&amp;nbsp;&lt;CODE&gt;&lt;STRONG&gt;vpn cccd disable&lt;/STRONG&gt;&lt;/CODE&gt;&amp;nbsp;command.&lt;BR /&gt;&lt;BR /&gt;More info by the link above.&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Sat, 01 Jun 2024 13:30:58 GMT</pubDate>
    <dc:creator>_Val_</dc:creator>
    <dc:date>2024-06-01T13:30:58Z</dc:date>
    <item>
      <title>VPN with 3rdparty</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-with-3rdparty/m-p/210037#M39795</link>
      <description>&lt;P&gt;Hello community,&lt;/P&gt;&lt;P&gt;i have an issue on my configuration of vpn ipsec with 3rd party ( juniper), let me explain:&lt;/P&gt;&lt;P&gt;i created a vpn betwenn my cluster ( R80.40) and a remote Juniper Gateway.&lt;/P&gt;&lt;P&gt;traffic from juniper side to network behind my cluster CP is ok.&lt;/P&gt;&lt;P&gt;traffic from my to network to remote network is KO.&lt;/P&gt;&lt;P&gt;the configuration of my VPN domain:&amp;nbsp;&amp;nbsp; local 10.167.52.0/24 and remote 10.167.200.0/24&lt;/P&gt;&lt;P&gt;the same proxy id are configured on the juniper side.&lt;/P&gt;&lt;P&gt;tunnel management: one vpn tunnel per subnet pair&lt;/P&gt;&lt;P&gt;when investigating i find that ikep2 is ko ( CP to juniper)&lt;/P&gt;&lt;P&gt;on the juniper; &lt;SPAN&gt;&lt;SPAN class=""&gt;IPSec negotiation failed with error: Peer proposed traffic-selectors are not in configured range&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;on the cp: Child SA exchange: Received notification from peer: Traffic selectors unacceptable MyTSi: &amp;lt;10.167.0.0 - 10.167.255.255&amp;gt; MyTSr: &amp;lt;10.167.200.0 - 10.167.200.255&amp;gt;&lt;/P&gt;&lt;P&gt;This is due to supernetting, i assume. i made change as described on other discussion:&lt;/P&gt;&lt;P&gt;Guidbedit values to change to FALSE:&lt;/P&gt;&lt;P&gt;ike_enable_supernet&lt;/P&gt;&lt;P&gt;ike_p2_enable_supernet_from_R80.20&lt;/P&gt;&lt;P&gt;ike_use_largest_possible_subnets&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;but my cp gateway still send /16 instead of /24&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;can someone help on this?&lt;/P&gt;</description>
      <pubDate>Sat, 30 Mar 2024 01:07:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-with-3rdparty/m-p/210037#M39795</guid>
      <dc:creator>SkipperNavy</dc:creator>
      <dc:date>2024-03-30T01:07:31Z</dc:date>
    </item>
    <item>
      <title>Re: VPN with 3rdparty</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-with-3rdparty/m-p/210038#M39796</link>
      <description>&lt;P&gt;Did you install policy after making those guidbedit changes?&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Sat, 30 Mar 2024 01:24:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-with-3rdparty/m-p/210038#M39796</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-03-30T01:24:49Z</dc:date>
    </item>
    <item>
      <title>Re: VPN with 3rdparty</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-with-3rdparty/m-p/210039#M39797</link>
      <description>&lt;P&gt;Yes, i saved, the installed the policy.&lt;/P&gt;&lt;P&gt;i also tried to force the /24 via user.def.fw1 but still ko.&lt;/P&gt;&lt;P&gt;so i roll back the user.def.fw1&lt;/P&gt;</description>
      <pubDate>Sat, 30 Mar 2024 01:44:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-with-3rdparty/m-p/210039#M39797</guid>
      <dc:creator>SkipperNavy</dc:creator>
      <dc:date>2024-03-30T01:44:19Z</dc:date>
    </item>
    <item>
      <title>Re: VPN with 3rdparty</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-with-3rdparty/m-p/210040#M39798</link>
      <description>&lt;P&gt;Is there any natting inside the community?&lt;/P&gt;</description>
      <pubDate>Sat, 30 Mar 2024 01:51:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-with-3rdparty/m-p/210040#M39798</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-03-30T01:51:05Z</dc:date>
    </item>
    <item>
      <title>Re: VPN with 3rdparty</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-with-3rdparty/m-p/210042#M39799</link>
      <description>&lt;P&gt;I would do quick debug on CP side to see what it shows. Get iked and vpnd files from $FWDIR/log dir and run vpn iked calculate peer_ip_address to see which iked files are relevant&lt;/P&gt;
&lt;P&gt;vpn debug trunc&lt;/P&gt;
&lt;P&gt;vpn debug ikeon&lt;/P&gt;
&lt;P&gt;-try generate some traffic&lt;/P&gt;
&lt;P&gt;vpndebug ikeoff&lt;/P&gt;
&lt;P&gt;Best,&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Sat, 30 Mar 2024 02:54:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-with-3rdparty/m-p/210042#M39799</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-03-30T02:54:00Z</dc:date>
    </item>
    <item>
      <title>Re: VPN with 3rdparty</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-with-3rdparty/m-p/210044#M39800</link>
      <description>&lt;P&gt;Nat-t is enabled. This is necessary on juniper side.&lt;/P&gt;</description>
      <pubDate>Sat, 30 Mar 2024 07:57:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-with-3rdparty/m-p/210044#M39800</guid>
      <dc:creator>SkipperNavy</dc:creator>
      <dc:date>2024-03-30T07:57:57Z</dc:date>
    </item>
    <item>
      <title>Re: VPN with 3rdparty</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-with-3rdparty/m-p/210045#M39801</link>
      <description>&lt;P&gt;How are you clearing your VPN between attempts/changes?&lt;/P&gt;
&lt;P&gt;Which Jumbo take is present on these systems?&lt;/P&gt;
&lt;P&gt;Note R80.40 will be EOL next month.&lt;/P&gt;</description>
      <pubDate>Sat, 30 Mar 2024 23:27:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-with-3rdparty/m-p/210045#M39801</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2024-03-30T23:27:34Z</dc:date>
    </item>
    <item>
      <title>Re: VPN with 3rdparty</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-with-3rdparty/m-p/210048#M39802</link>
      <description>&lt;P&gt;Makes sense, I heard that about Juniper before. Hey, is this enabled or not on CP side inside vpn community settings?&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot_1.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/25085i9AEAB578CA6CE22F/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Screenshot_1.png" alt="Screenshot_1.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt; &lt;/P&gt;</description>
      <pubDate>Sat, 30 Mar 2024 12:08:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-with-3rdparty/m-p/210048#M39802</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-03-30T12:08:23Z</dc:date>
    </item>
    <item>
      <title>Re: VPN with 3rdparty</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-with-3rdparty/m-p/210049#M39803</link>
      <description>&lt;P&gt;Please what do you mean by run vpn iked calculate?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 30 Mar 2024 12:32:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-with-3rdparty/m-p/210049#M39803</guid>
      <dc:creator>SkipperNavy</dc:creator>
      <dc:date>2024-03-30T12:32:55Z</dc:date>
    </item>
    <item>
      <title>Re: VPN with 3rdparty</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-with-3rdparty/m-p/210050#M39804</link>
      <description>&lt;P&gt;What I mean is this.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;[Expert@cpazurecluster1:0]# vpn iked calculate 20.151.89.116&lt;/P&gt;
&lt;P&gt;vpn: Address 20.151.89.116 is handled by IKED 0&lt;/P&gt;
&lt;P&gt;[Expert@cpazurecluster1:0]#&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;And what above means is that when you run debug, you ONLY care about iked0 files.&lt;/P&gt;</description>
      <pubDate>Sat, 30 Mar 2024 12:44:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-with-3rdparty/m-p/210050#M39804</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-03-30T12:44:04Z</dc:date>
    </item>
    <item>
      <title>Re: VPN with 3rdparty</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-with-3rdparty/m-p/210052#M39805</link>
      <description>&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.jpg" style="width: 4032px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/25086iB8D96AF683ECB027/image-size/medium?v=v2&amp;amp;px=400" role="button" title="image.jpg" alt="image.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;</description>
      <pubDate>Sat, 30 Mar 2024 13:00:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-with-3rdparty/m-p/210052#M39805</guid>
      <dc:creator>SkipperNavy</dc:creator>
      <dc:date>2024-03-30T13:00:00Z</dc:date>
    </item>
    <item>
      <title>Re: VPN with 3rdparty</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-with-3rdparty/m-p/210053#M39806</link>
      <description>&lt;P&gt;I tried &amp;nbsp;running the command in expert mode but it return:&lt;/P&gt;&lt;P&gt;Unknown command « iked »&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 30 Mar 2024 13:03:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-with-3rdparty/m-p/210053#M39806</guid>
      <dc:creator>SkipperNavy</dc:creator>
      <dc:date>2024-03-30T13:03:23Z</dc:date>
    </item>
    <item>
      <title>Re: VPN with 3rdparty</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-with-3rdparty/m-p/210054#M39807</link>
      <description>&lt;P&gt;Just type vpn from expert mode and see if iked shows up in the menu, as below&lt;/P&gt;
&lt;P&gt;[Expert@cpazurecluster1:0]# vpn&lt;BR /&gt;Usage:&lt;BR /&gt;vpn debug ... # print debug msgs to VPN log files&lt;BR /&gt;vpn iked # various 'iked' related commands&lt;BR /&gt;vpn cccd # various 'cccd' related commands&lt;BR /&gt;vpn crl_zap # erase all CRLs from cache&lt;BR /&gt;vpn drv ... # attach vpn driver to fw driver and more&lt;BR /&gt;vpn ver [-k] # display VPN version&lt;BR /&gt;vpn crlview ... # debugging tool for CRLs&lt;BR /&gt;vpn compstat # display compression/decompression statistics&lt;BR /&gt;vpn compreset # reset compression/decompression statistics&lt;BR /&gt;vpn macutil [user_name] # display generated MAC address by username or&lt;BR /&gt;# DN from arg or stdin (also: vpn mu)&lt;BR /&gt;vpn tunnelutil # launch TunnelUtil tool to control&lt;BR /&gt;# VPN Tunnels (also: vpn tu)&lt;BR /&gt;vpn nssm_topology ... # generate topology in NSSM format for&lt;BR /&gt;# Nokia clients&lt;BR /&gt;vpn rll dump fileName/sync # Route Lookup Layer: Dump DB&lt;BR /&gt;# Sync DB&lt;BR /&gt;vpn overlap_encdom ... # Display overlapping encryption domains&lt;BR /&gt;vpn dll dump fileName # DNS Lookup Layer: Dump DB&lt;BR /&gt;vpn dll resolve [hostname] # Request Resolve&lt;BR /&gt;vpn 3rd_party_mep #&lt;BR /&gt;vpn ipafile_check filename [level] # Verify candidate for ipassignment.conf&lt;BR /&gt;vpn set_slim_server ... # Starting/stopping the slim web server&lt;BR /&gt;vpn set_snx_encdom_groups ... # enabling/disabling the encryption domain&lt;BR /&gt;# per usergroup feature for snx&lt;BR /&gt;vpn mep_refresh # Initiate MEP re-decision in case of&lt;BR /&gt;# backup stickiness configuration&lt;BR /&gt;vpn rim_cleanup # Clean RIM routes&lt;BR /&gt;vpn shell ... # Command Line Interface&lt;BR /&gt;vpn set_trac disable/enable # Starting/Stopping trac server&lt;BR /&gt;vpn neo_proto [on/off] # switching neo client protocol&lt;BR /&gt;vpn show_tcpt # show visitor mode users&lt;BR /&gt;vpn check_ttm # Check if a ttm file is valid&lt;BR /&gt;vpn dump_psk # dump hash (SHA256) of peers pre-shared-keys&lt;BR /&gt;vpn snx_unban # Reset the failed login attempt history of a client IP address&lt;BR /&gt;[Expert@cpazurecluster1:0]#&lt;/P&gt;</description>
      <pubDate>Sat, 30 Mar 2024 13:04:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-with-3rdparty/m-p/210054#M39807</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-03-30T13:04:49Z</dc:date>
    </item>
    <item>
      <title>Re: VPN with 3rdparty</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-with-3rdparty/m-p/210056#M39808</link>
      <description>&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.jpg" style="width: 4032px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/25087i8D8F42D85027C7AF/image-size/medium?v=v2&amp;amp;px=400" role="button" title="image.jpg" alt="image.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;There is no iked option with vpn colmand&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thank you &lt;/P&gt;</description>
      <pubDate>Sat, 30 Mar 2024 13:07:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-with-3rdparty/m-p/210056#M39808</guid>
      <dc:creator>SkipperNavy</dc:creator>
      <dc:date>2024-03-30T13:07:30Z</dc:date>
    </item>
    <item>
      <title>Re: VPN with 3rdparty</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-with-3rdparty/m-p/210057#M39809</link>
      <description>&lt;P&gt;Ok, no worries. Lets do remote if you are allowed, I think we can figure this out.&lt;/P&gt;
&lt;P&gt;If yes, just DM me and I can send you zoom.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Sat, 30 Mar 2024 13:09:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-with-3rdparty/m-p/210057#M39809</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-03-30T13:09:25Z</dc:date>
    </item>
    <item>
      <title>Re: VPN with 3rdparty</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-with-3rdparty/m-p/210059#M39810</link>
      <description>&lt;P&gt;Traffic selectors proposed to a Juniper must match precisely, it will not accept a subset.&amp;nbsp; However the Check Point will accept a subset if the Juniper proposes it, which is why the Juniper can bring the tunnel up, but if the Check Point is the initiator it cannot.&lt;/P&gt;
&lt;P&gt;Make sure "disable NAT in VPN Community" is set as the_rock mentioned.&lt;/P&gt;
&lt;P&gt;The GUIdbedit largest_possible_subnet and user.def hacks are no longer needed as you can now set precise VPN domains per VPN Community.&amp;nbsp; I'm pretty sure this capability was added in R80.40 which is the release you are using.&amp;nbsp; On the VPN Community screen shown below, override the VPN Domain "IP addresses based on object topology" setting for both community members like this:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="vpn_domain_override.png" style="width: 845px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/25088iE26CC6394B9CECEB/image-size/large?v=v2&amp;amp;px=999" role="button" title="vpn_domain_override.png" alt="vpn_domain_override.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 30 Mar 2024 13:12:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-with-3rdparty/m-p/210059#M39810</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2024-03-30T13:12:24Z</dc:date>
    </item>
    <item>
      <title>Re: VPN with 3rdparty</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-with-3rdparty/m-p/210065#M39811</link>
      <description>&lt;P&gt;Thank you&amp;nbsp;the-rock but i can use remote, company restriction.&lt;/P&gt;&lt;P&gt;if i disable nat on cp, is it necessary to do the same on juniper?&lt;/P&gt;</description>
      <pubDate>Sat, 30 Mar 2024 13:53:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-with-3rdparty/m-p/210065#M39811</guid>
      <dc:creator>SkipperNavy</dc:creator>
      <dc:date>2024-03-30T13:53:39Z</dc:date>
    </item>
    <item>
      <title>Re: VPN with 3rdparty</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-with-3rdparty/m-p/210066#M39812</link>
      <description>&lt;P&gt;Correct.&lt;/P&gt;</description>
      <pubDate>Sat, 30 Mar 2024 13:56:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-with-3rdparty/m-p/210066#M39812</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-03-30T13:56:53Z</dc:date>
    </item>
    <item>
      <title>Re: VPN with 3rdparty</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-with-3rdparty/m-p/210067#M39813</link>
      <description>&lt;P&gt;Hello, i made all this change but my cp gateway still send /16 as MyTSI&lt;/P&gt;&lt;P&gt;can someone explain me to understand how the gateway obtain /16? &amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;thank you in advance&lt;/P&gt;</description>
      <pubDate>Sat, 30 Mar 2024 14:08:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-with-3rdparty/m-p/210067#M39813</guid>
      <dc:creator>SkipperNavy</dc:creator>
      <dc:date>2024-03-30T14:08:59Z</dc:date>
    </item>
    <item>
      <title>Re: VPN with 3rdparty</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-with-3rdparty/m-p/210068#M39814</link>
      <description>&lt;P&gt;Can you please send screenshots of changes you made in guidbedit, as well as community settings? Please blue out any sensitive info. Also, do the debug I mentioned last nite.&lt;/P&gt;
&lt;P&gt;vpn debug trunc&lt;/P&gt;
&lt;P&gt;vpn debug ikeon&lt;/P&gt;
&lt;P&gt;-try generate some traffic&lt;/P&gt;
&lt;P&gt;vpn debug ikeoff&lt;/P&gt;
&lt;P&gt;Look for iked and vpnd files in $FWDIR/log dir&lt;/P&gt;
&lt;P&gt;Best,&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 30 Mar 2024 14:20:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-with-3rdparty/m-p/210068#M39814</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-03-30T14:20:06Z</dc:date>
    </item>
  </channel>
</rss>

