<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Issue Establishing VPN Tunnel Between Test Firewall and Azure Cluster (Route-Based &amp;amp; Domain- in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issue-Establishing-VPN-Tunnel-Between-Test-Firewall-and-Azure/m-p/243613#M47341</link>
    <description>&lt;P&gt;Excellent! I'm glad it was successful for you!&lt;/P&gt;</description>
    <pubDate>Wed, 12 Mar 2025 02:34:29 GMT</pubDate>
    <dc:creator>Duane_Toler</dc:creator>
    <dc:date>2025-03-12T02:34:29Z</dc:date>
    <item>
      <title>Issue Establishing VPN Tunnel Between Test Firewall and Azure Cluster (Route-Based &amp; Domain-Based)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issue-Establishing-VPN-Tunnel-Between-Test-Firewall-and-Azure/m-p/243203#M47237</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;We have a &lt;STRONG&gt;cluster in Azure&lt;/STRONG&gt; that uses a &lt;STRONG&gt;route-based VPN&lt;/STRONG&gt; with the &lt;STRONG&gt;BGP protocol&lt;/STRONG&gt;. This VPN connects to an &lt;STRONG&gt;Azure VPN Gateway (VPN GW)&lt;/STRONG&gt;, which in turn connects to &lt;STRONG&gt;Cisco SD-WAN routers&lt;/STRONG&gt;.&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;The VPN community used is &lt;STRONG&gt;route-based&lt;/STRONG&gt;.&lt;/LI&gt;&lt;LI&gt;The &lt;STRONG&gt;central gateway&lt;/STRONG&gt; is the &lt;STRONG&gt;Azure cluster&lt;/STRONG&gt;, with an &lt;STRONG&gt;empty encryption domain&lt;/STRONG&gt;.&lt;/LI&gt;&lt;LI&gt;The &lt;STRONG&gt;satellite gateway&lt;/STRONG&gt; is the &lt;STRONG&gt;Azure VPN GW&lt;/STRONG&gt;, also with an &lt;STRONG&gt;empty encryption domain&lt;/STRONG&gt;.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;In the&lt;STRONG&gt; on-prem environment&lt;/STRONG&gt;, we have several firewalls that we want to migrate to this Azure cluster. However, these firewalls require a &lt;STRONG&gt;domain-based VPN&lt;/STRONG&gt; instead of a &lt;STRONG&gt;route-based VPN&lt;/STRONG&gt;.&lt;/P&gt;&lt;P&gt;To validate the configuration, we have added a &lt;STRONG&gt;test firewall&lt;/STRONG&gt; to a &lt;STRONG&gt;new domain-based VPN community&lt;/STRONG&gt; with the following setup:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;Central gateway&lt;/STRONG&gt;: &lt;STRONG&gt;Azure cluster&lt;/STRONG&gt; with an &lt;STRONG&gt;empty encryption domain&lt;/STRONG&gt;.&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Satellite gateway&lt;/STRONG&gt;: &lt;STRONG&gt;Test firewall&lt;/STRONG&gt; with a &lt;STRONG&gt;defined encryption domain&lt;/STRONG&gt; (contains some networks, not empty).&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Before integrating more firewalls, we are performing tests with this single firewall.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="imagen.png" style="width: 666px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/29845iE7D57F5A2591B2AC/image-dimensions/666x273?v=v2" width="666" height="273" role="button" title="imagen.png" alt="imagen.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Problem:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;The &lt;STRONG&gt;VPN tunnel between the test firewall and the Azure cluster is not establishing successfully&lt;/STRONG&gt;.&lt;/P&gt;&lt;P&gt;We have done some research and found the following posts stating that, in a &lt;STRONG&gt;domain-based VPN&lt;/STRONG&gt;, networks must be defined in each domain for the tunnel to establish correctly:&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.checkpoint.com/t5/General-Topics/Route-Based-VPN-on-one-side-and-Domain-Based-VPN-on-other/td-p/28881" target="_new" rel="noopener"&gt;Route-Based VPN on one side and Domain-Based VPN on the other&lt;/A&gt;&lt;BR /&gt;&lt;A href="https://community.checkpoint.com/t5/Security-Gateways/Route-Based-VPN-with-Domain-Based-VPN/td-p/107996" target="_new" rel="noopener"&gt;Route-Based VPN with Domain-Based VPN&lt;/A&gt;&lt;BR /&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk109340" target="_new" rel="noopener"&gt;Checkpoint Support: Route-Based and Domain-Based VPN&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-unicode-emoji" title=":keycap_1:"&gt;1️⃣&lt;/span&gt; In our case, for the VPN between the test firewall and the Azure cluste&lt;STRONG&gt;r&lt;/STRONG&gt;, is it mandatory to define networks in each encryption domain for the tunnel to establish correctly?&lt;BR /&gt;&lt;span class="lia-unicode-emoji" title=":keycap_2:"&gt;2️⃣&lt;/span&gt; If not, are there any other factors we should consider to ensure the VPN tunnel is established correctly?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 06 Mar 2025 23:17:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issue-Establishing-VPN-Tunnel-Between-Test-Firewall-and-Azure/m-p/243203#M47237</guid>
      <dc:creator>jennyado</dc:creator>
      <dc:date>2025-03-06T23:17:43Z</dc:date>
    </item>
    <item>
      <title>Re: Issue Establishing VPN Tunnel Between Test Firewall and Azure Cluster (Route-Based &amp; Domain-</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issue-Establishing-VPN-Tunnel-Between-Test-Firewall-and-Azure/m-p/243232#M47253</link>
      <description>&lt;P&gt;You can't do it this way.&lt;/P&gt;
&lt;P&gt;* Domain based VPNs take precedence over route-based VPNs. &amp;nbsp;If you have multiple communities, (some route-based, some domain-based), *AND* there's a chance of a pair of networks overlapping across the communities, then a domain-based VPN will be attempted.&lt;/P&gt;
&lt;P&gt;* You can't have a VPN community with GwA having a VPN domain [with objects] defined, and GwB an empty VPN domain. &amp;nbsp;This won't trigger the route-based VPN domain code.&lt;/P&gt;
&lt;P&gt;* Route-based VPNs need to be IKEv2 with Universal Tunnels (One subnet per gateway pair), for best effects (yes you can do it with IKEv1 but it's not as compatible; just avoid it).&lt;/P&gt;
&lt;P&gt;* You mention cluster, with BGP, so you'll want to consider:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;unnumbered VTIs&lt;/LI&gt;
&lt;LI&gt;create a loopback on the cluster members (because VTIs are unnumbered)&lt;/LI&gt;
&lt;LI&gt;attach the VTI to the loop00 interface on each member (VTI has to proxy off of something)&lt;/LI&gt;
&lt;LI&gt;create a cluster VIP for the loop00 interface in the gateway topology (VIP is the BGP peering point)&lt;/LI&gt;
&lt;LI&gt;configure eBGP with multi-hop and TTL 2 or 3 (2 should be enough) (because loop00 is 2 hops across the VTI)&lt;/LI&gt;
&lt;LI&gt;configure the remote gateway's BGP peer to use the loop00 VIP (the purpose of this mission)&lt;/LI&gt;
&lt;LI&gt;add a static route to the loop00 VIP onto the local vpnt interface (nexthop gateway logical vpnt#)&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;The static route establishes reachability to the BGP peer loop00 (because the eBGP peer is now 2 hops away).&lt;/P&gt;
&lt;P&gt;Using loop00 VIP for eBGP on route-based VPNs is the best way to go. &amp;nbsp;You can then build your routemap policies as needed.&lt;/P&gt;
&lt;P&gt;You can even enable BFD (ip-reachability-detection) for the BGP peers; be sure to use "ip-reachability-detection multihop local-address &amp;lt;ip of loop00&amp;gt;" on the BGP configuration. &amp;nbsp;This is because BFD must originate from the BGP peer IP.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Tread carefully with mixing route-based and domain-based VPNs. &amp;nbsp;You'll almost certainly want to use Encryption Domains per Community instead:&lt;/P&gt;
&lt;P&gt;* Edit community&lt;/P&gt;
&lt;P&gt;* Click on a gateway in the list&lt;/P&gt;
&lt;P&gt;* Click the pencil icon (or double-click) to open a new VPN domain window for the gateway&lt;/P&gt;
&lt;P&gt;You can choose a new VPN domain group to be active per community. &amp;nbsp;This has some other limitations, but overall it works well.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 07 Mar 2025 05:50:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issue-Establishing-VPN-Tunnel-Between-Test-Firewall-and-Azure/m-p/243232#M47253</guid>
      <dc:creator>Duane_Toler</dc:creator>
      <dc:date>2025-03-07T05:50:00Z</dc:date>
    </item>
    <item>
      <title>Re: Issue Establishing VPN Tunnel Between Test Firewall and Azure Cluster (Route-Based &amp; Domain-</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issue-Establishing-VPN-Tunnel-Between-Test-Firewall-and-Azure/m-p/243271#M47255</link>
      <description>&lt;P class=""&gt;Thank you for your very detailed and insightful response.&lt;/P&gt;&lt;P class=""&gt;I understand that, to integrate the new firewalls into the Azure cluster, I need to create a community where both gateways (the Azure cluster and the new firewalls) have defined encryption domains with networks specified, so that the domain-based VPN tunnel can establish successfully.&lt;/P&gt;&lt;P class=""&gt;I have one concern regarding the impact on our existing production VPN (the route-based one, shown on the right side of the diagram). This VPN operates in a separate community with the Azure cluster as the central gateway and the Azure VPN Gateway as the satellite gateway, both with empty encryption domains. I’m worried that adding a domain-based VPN community with defined networks might cause issues or even bring down the route-based VPN. Would this only be a concern if there’s an overlap between the networks defined in the two communities, where the domain-based VPN would take precedence? Or could it affect the production route-based VPN even if they are in different communities?&lt;/P&gt;&lt;P class=""&gt;If the solution is to create a separate VPN community for the domain-based VPN and assign encryption domains with defined networks to both gateways in that community, I assume those domains would be used exclusively by the domain-based VPN and should not impact the community used for the route-based VPN. Could you confirm if this understanding is correct?&lt;/P&gt;&lt;P class=""&gt;Additionally, you mentioned that using encryption domains per community has "some other limitations." Could you please share more details about these limitations you referred to?&lt;/P&gt;&lt;P class=""&gt;Thanks again for your help!&lt;/P&gt;</description>
      <pubDate>Fri, 07 Mar 2025 15:36:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issue-Establishing-VPN-Tunnel-Between-Test-Firewall-and-Azure/m-p/243271#M47255</guid>
      <dc:creator>jennyado</dc:creator>
      <dc:date>2025-03-07T15:36:47Z</dc:date>
    </item>
    <item>
      <title>Re: Issue Establishing VPN Tunnel Between Test Firewall and Azure Cluster (Route-Based &amp; Domain-</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issue-Establishing-VPN-Tunnel-Between-Test-Firewall-and-Azure/m-p/243273#M47256</link>
      <description>&lt;P&gt;You'll need to use Encryption Domain per Community for the on-premises gateway communities with the Azure cluster (where you create a domain-based VPN per-community with the on-premises gateways), and use the empty domain/route-based VPN between Azure cluster and the AzVPNGW gateway. &amp;nbsp;This will work. &amp;nbsp;I presume you aren't using BGP across the domain-based VPN here (no need, really).&lt;/P&gt;
&lt;P&gt;So long as a network from the left side diagram doesn't have an overlap on the Cisco vEdge and AzVPNGW VPNs, then you're ok.&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;For limitations, you still need to be mindful of the default gateway VPN domain, if you have this on any gateway in your management domain: &amp;nbsp;&lt;A href="https://support.checkpoint.com/results/sk/sk182946" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk182946&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;There was also an older issue with the traffic selectors, but looks like R&amp;amp;D fixed this:&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/sk/sk170857" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk170857&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;If you need the walk-through, here's where to configure EDPC: &amp;nbsp;&lt;A href="https://sc1.checkpoint.com/documents/R81.20/WebAdminGuides/EN/CP_R81.20_SitetoSiteVPN_AdminGuide/Content/Topics-VPNSG/Getting-Started.htm?tocpath=_____3#Getting_Started_with_Site-to-Site_VPN" target="_blank"&gt;https://sc1.checkpoint.com/documents/R81.20/WebAdminGuides/EN/CP_R81.20_SitetoSiteVPN_AdminGuide/Content/Topics-VPNSG/Getting-Started.htm?tocpath=_____3#Getting_Started_with_Site-to-Site_VPN&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;You can also handle VPN-routing traffic, at the Azure cluster, with VPN Directional matching: &amp;nbsp;&lt;A href="https://sc1.checkpoint.com/documents/R81.20/WebAdminGuides/EN/CP_R81.20_SitetoSiteVPN_AdminGuide/Content/Topics-VPNSG/Directional-VPN-Enforcement.htm?TocPath=Directional%20VPN%20Enforcement%7C_____0#Directional_VPN_Enforcement" target="_blank"&gt;https://sc1.checkpoint.com/documents/R81.20/WebAdminGuides/EN/CP_R81.20_SitetoSiteVPN_AdminGuide/Content/Topics-VPNSG/Directional-VPN-Enforcement.htm?TocPath=Directional%20VPN%20Enforcement%7C_____0#Directional_VPN_Enforcement&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Without directional matching, you could end up with traffic flowing, or matching, in odd places you didn't expect. &amp;nbsp;This would be most applicable on the Azure cluster. &amp;nbsp;On the Star communities, you can enable VPN Routing, then use Directional matching rules to enforce that policy.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 07 Mar 2025 16:04:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issue-Establishing-VPN-Tunnel-Between-Test-Firewall-and-Azure/m-p/243273#M47256</guid>
      <dc:creator>Duane_Toler</dc:creator>
      <dc:date>2025-03-07T16:04:13Z</dc:date>
    </item>
    <item>
      <title>Re: Issue Establishing VPN Tunnel Between Test Firewall and Azure Cluster (Route-Based &amp; Domain-</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issue-Establishing-VPN-Tunnel-Between-Test-Firewall-and-Azure/m-p/243611#M47340</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/694"&gt;@Duane_Toler&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Just to conclude this post_&lt;BR /&gt;We follow your recommendations and we proceed to create a new VPN community where:&lt;BR /&gt;Azure Cluster =&amp;gt; We define an Encryption Domain with networks from the cluster for testing.&lt;BR /&gt;FW Quantum Spark for testing =&amp;gt; We define an Encryption Domain with networks from that firewall&lt;/P&gt;&lt;P&gt;This new VPN community was treated as a traditional Domain Based VPN and our tests were successful.&lt;BR /&gt;&lt;BR /&gt;Thank you very much for your help.&lt;BR /&gt;Greetings!&lt;/P&gt;</description>
      <pubDate>Wed, 12 Mar 2025 01:29:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issue-Establishing-VPN-Tunnel-Between-Test-Firewall-and-Azure/m-p/243611#M47340</guid>
      <dc:creator>israelsc</dc:creator>
      <dc:date>2025-03-12T01:29:13Z</dc:date>
    </item>
    <item>
      <title>Re: Issue Establishing VPN Tunnel Between Test Firewall and Azure Cluster (Route-Based &amp; Domain-</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issue-Establishing-VPN-Tunnel-Between-Test-Firewall-and-Azure/m-p/243613#M47341</link>
      <description>&lt;P&gt;Excellent! I'm glad it was successful for you!&lt;/P&gt;</description>
      <pubDate>Wed, 12 Mar 2025 02:34:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Issue-Establishing-VPN-Tunnel-Between-Test-Firewall-and-Azure/m-p/243613#M47341</guid>
      <dc:creator>Duane_Toler</dc:creator>
      <dc:date>2025-03-12T02:34:29Z</dc:date>
    </item>
  </channel>
</rss>

