<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Mixing Universal Tunnel and specific topologies in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Mixing-Universal-Tunnel-and-specific-topologies/m-p/223548#M42876</link>
    <description>&lt;P&gt;Hi Dameon,&lt;/P&gt;&lt;P&gt;I set one per subnet pair, which caused it to send two traffic selector pairs, host-to-host with protocol ICMP, and universal. Exactly the behaviour I saw with per-Gateway pair.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 13 Aug 2024 22:55:28 GMT</pubDate>
    <dc:creator>stallwoodj</dc:creator>
    <dc:date>2024-08-13T22:55:28Z</dc:date>
    <item>
      <title>Mixing Universal Tunnel and specific topologies</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Mixing-Universal-Tunnel-and-specific-topologies/m-p/223516#M42865</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;We have an inherited Juniper firewall which we are planning to migrate to Check Point.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Some of the tunnels that are established have a local traffic selector of 192.168.x.0/24 and a remote selector 0.0.0.0/0. And one has them the other way round with a local domain 0/0 and a remote domain 172.x.x.0/24&lt;/P&gt;&lt;P&gt;I've tried the standard route-based VPN method (in R81.10 lab back-to-back with an SRX), having set the default VPN topology as an empty group, creating VTIs and static routes, and overriding the local or remote topology to specific subnet on a per-VPN basis.&lt;/P&gt;&lt;P&gt;The SRX happily comes up and negotiates its IKEv2 with an initial traffic selector &amp;lt;0.0.0.0/0&amp;gt;-&amp;lt;192.168.x.0/24&amp;gt;, great. However, as soon as I attempt to push traffic, the Check Point tries negotiate a new child SA with &amp;lt;0.0.0.0/0&amp;gt;-&amp;lt;0.0.0.0/0&amp;gt; which the SRX rejects "Traffic selectors unacceptable". The attempt was seen in iked.elg and the traffic captured in legacy_ikev2.xmll.&lt;/P&gt;&lt;P&gt;I tried to override this with subnet_for_range_and_peer but it had no affect on the issue.&lt;/P&gt;&lt;P&gt;So, is it / will it ever be possible to use route-based VPN without being forced to use Universal Tunnel at both ends? Currently I'm forced to get the 3rd party peers to change their traffic selectors which is annoying &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Jamie&lt;/P&gt;</description>
      <pubDate>Tue, 13 Aug 2024 14:56:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Mixing-Universal-Tunnel-and-specific-topologies/m-p/223516#M42865</guid>
      <dc:creator>stallwoodj</dc:creator>
      <dc:date>2024-08-13T14:56:25Z</dc:date>
    </item>
    <item>
      <title>Re: Mixing Universal Tunnel and specific topologies</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Mixing-Universal-Tunnel-and-specific-topologies/m-p/223539#M42870</link>
      <description>&lt;P&gt;What's the setting in the VPN Community?&lt;BR /&gt;One Tunnel per Community would result in the 0.0.0.0/0 selector.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/27229i28391FDAFF49DF8F/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 13 Aug 2024 17:54:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Mixing-Universal-Tunnel-and-specific-topologies/m-p/223539#M42870</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-08-13T17:54:30Z</dc:date>
    </item>
    <item>
      <title>Re: Mixing Universal Tunnel and specific topologies</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Mixing-Universal-Tunnel-and-specific-topologies/m-p/223548#M42876</link>
      <description>&lt;P&gt;Hi Dameon,&lt;/P&gt;&lt;P&gt;I set one per subnet pair, which caused it to send two traffic selector pairs, host-to-host with protocol ICMP, and universal. Exactly the behaviour I saw with per-Gateway pair.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 13 Aug 2024 22:55:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Mixing-Universal-Tunnel-and-specific-topologies/m-p/223548#M42876</guid>
      <dc:creator>stallwoodj</dc:creator>
      <dc:date>2024-08-13T22:55:28Z</dc:date>
    </item>
    <item>
      <title>Re: Mixing Universal Tunnel and specific topologies</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Mixing-Universal-Tunnel-and-specific-topologies/m-p/223551#M42879</link>
      <description>&lt;P&gt;I'm trying to find something other than this community thread that confirms this is expected behavior:&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/General-Topics/Route-based-VPN-Proxy-ID-0-0-0-0-0/m-p/55192#M11025" target="_blank"&gt;https://community.checkpoint.com/t5/General-Topics/Route-based-VPN-Proxy-ID-0-0-0-0-0/m-p/55192#M11025&lt;/A&gt;&amp;nbsp;&lt;BR /&gt;Maybe you can change this with the "Before R77.20" version of Option 1 here:&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/sk/sk108600" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk108600&lt;/A&gt;&lt;BR /&gt;Otherwise, I suspect this is an RFE.&lt;/P&gt;</description>
      <pubDate>Wed, 14 Aug 2024 01:05:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Mixing-Universal-Tunnel-and-specific-topologies/m-p/223551#M42879</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-08-14T01:05:38Z</dc:date>
    </item>
    <item>
      <title>Re: Mixing Universal Tunnel and specific topologies</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Mixing-Universal-Tunnel-and-specific-topologies/m-p/223592#M42887</link>
      <description>&lt;P&gt;Thanks, I've raised the RFE!&lt;/P&gt;</description>
      <pubDate>Wed, 14 Aug 2024 08:00:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Mixing-Universal-Tunnel-and-specific-topologies/m-p/223592#M42887</guid>
      <dc:creator>stallwoodj</dc:creator>
      <dc:date>2024-08-14T08:00:47Z</dc:date>
    </item>
  </channel>
</rss>

