<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: VPN SITE TO SITE CHECKPOINT VSX ROUTE BASED in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-SITE-TO-SITE-CHECKPOINT-VSX-ROUTE-BASED/m-p/255807#M50078</link>
    <description>&lt;P&gt;No, VSX provisioning tool does all of that onto the VS directly &amp;nbsp;(as if you were doing it in SmartConsole).&lt;/P&gt;
&lt;P&gt;For creating a VTI, disable anti-spoofing on the new VTI interfaces, but for any other interior interfaces where you have downstream BGP peerings, set those interfaces to "Defined by routes".&lt;/P&gt;
&lt;P&gt;When creating a VPN community, you will want to use route-based VPN anyway, so use VPN domains per-community on both VPN peers for the Star VPN, and use empty groups (to trigger the VTI). &amp;nbsp;&lt;/P&gt;
&lt;P&gt;Of course, your VPN Encryption should be using IKEv2, and Tunnel Management "one subnet per gateway pair" [IKEv2 Universal Tunnels).&lt;/P&gt;
&lt;P&gt;In Gaia CLISH, on EACH VSX gateway where the VS is hosted, you'll need to configure the same router ID for all instances of this VS on all gateways, and copy/paste the BGP configuration in CLISH again on EACH gateway hosting this VS and in VS-context:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;ssh vsx-gw1
clish
set virtual-system 5
set router-id 192.0.2.255
set as 65530
set bgp external remote-as 1234 on
set bgp external remote-as 1234 peer 192.0.2.1 on
save config
&lt;/LI-CODE&gt;
&lt;P&gt;Repeat that exactly, on vsx-gw2, and vsx-gw3, etc.&lt;/P&gt;
&lt;P&gt;Install policy, wait for VPN to come up. &amp;nbsp;Then SSH to the VSX gateway where the VS is ACTIVE, run:&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;clish
set virtual-system 5   #or whatever
show bgp peers
&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Only the ACTIVE VS (on whichever gateway) will show the BGP peering; all others will show Idle. &amp;nbsp;Don't be fooled, and don't troubleshoot the wrong thing.&lt;/P&gt;
&lt;P&gt;Hope this helps!&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sat, 23 Aug 2025 20:30:03 GMT</pubDate>
    <dc:creator>Duane_Toler</dc:creator>
    <dc:date>2025-08-23T20:30:03Z</dc:date>
    <item>
      <title>VPN SITE TO SITE CHECKPOINT VSX ROUTE BASED</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-SITE-TO-SITE-CHECKPOINT-VSX-ROUTE-BASED/m-p/215791#M41188</link>
      <description>&lt;P&gt;Hello everyone,&lt;BR /&gt;I will preface that I have been working with checkpoint technology for a short time and your input is valuable to me.&lt;/P&gt;&lt;P&gt;I need to set up a site to site VPN with Cisco secure access.&lt;/P&gt;&lt;P&gt;In the guide that was shared with us, it talks about creating VTI and policy based routing on Gaia portal.&lt;/P&gt;&lt;P&gt;Unfortunately, we do not have access to Gaia portal as our gateways are VSX. So the whole thing is to be done through CLI.&lt;/P&gt;&lt;P&gt;Referring to the guide (screenshots attached), could you kindly refer me what commands need to be run? I would be really happy if you could give me an example of the commands maybe using the IPs in the guide.&lt;/P&gt;&lt;P&gt;Thank you for your support.&lt;/P&gt;</description>
      <pubDate>Thu, 30 May 2024 19:10:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-SITE-TO-SITE-CHECKPOINT-VSX-ROUTE-BASED/m-p/215791#M41188</guid>
      <dc:creator>aMatthew</dc:creator>
      <dc:date>2024-05-30T19:10:33Z</dc:date>
    </item>
    <item>
      <title>Re: VPN SITE TO SITE CHECKPOINT VSX ROUTE BASED</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-SITE-TO-SITE-CHECKPOINT-VSX-ROUTE-BASED/m-p/215826#M41190</link>
      <description>&lt;P&gt;You need vsx_provisioning_tool for VTIs on VSX:&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;vsx_provisioning_tool -L -o add interface vd VS1 vpn_tunnel numbered peer SmartConsole_interoperable_peer local 169.254.68.238 remote 169.254.68.237 tunnel_id 99
&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Replace VS1 with the name of your firewall Virtual System.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Replace "SmartConsole_interoperable_peer" with the name of the Interoperable Device in SmartConsole for this VPN peer.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;This will create vpnt99 &amp;nbsp;for your VS. &amp;nbsp;After this, you should be using Route Based VPN with empty group objects as the VPN domain for the remote peer and your VS. &amp;nbsp;You can override VPN domain for the peers within the VPN Community, rather than modifying the main VPN domain on the VS object.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;You will also need to add static routes across the VTI for whatever remote end host they gave you. &amp;nbsp; You add static routes in SmartConsole for the firewall VS. &amp;nbsp;These are in the VS properties -&amp;gt; select Network Management on the left, and you'll see the where to add static routes. &amp;nbsp;Use the remote peer IP in the VTI as the next-hop gateway for the route (169.254.68.237 in this case).&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;You can replace those 169.254.x.y IPs in the VTI command above, but be sure you ONLY use IPs in the 169.254.x.y range! &amp;nbsp;Don't try to use any 10.x or 192.168.x.x addresses; these are unnecessary. &amp;nbsp;A VTI is a virtual point-to-point interface; the IPs really don't matter, and they don't even have to be remotely similar. &amp;nbsp;For a point-to-point interface, no matter what packet you "write" to that pseudo-wire, it will be sent. &amp;nbsp;So use the APIPA address space; that's what it's for, link-local addressing.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;FYI: If you have Multi-Domain management, then you first need to switch to the Target domain where the VS is created before running the above command:&lt;/P&gt;
&lt;P&gt;mdsenv TARGET_DOMAIN&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 30 May 2024 23:11:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-SITE-TO-SITE-CHECKPOINT-VSX-ROUTE-BASED/m-p/215826#M41190</guid>
      <dc:creator>Duane_Toler</dc:creator>
      <dc:date>2024-05-30T23:11:26Z</dc:date>
    </item>
    <item>
      <title>Re: VPN SITE TO SITE CHECKPOINT VSX ROUTE BASED</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-SITE-TO-SITE-CHECKPOINT-VSX-ROUTE-BASED/m-p/215891#M41196</link>
      <description>&lt;P&gt;Hi Duane,&lt;/P&gt;&lt;P&gt;Thank you first of all for your valuable help.&lt;BR /&gt;I ran the command as you indicated, however I got this as a response:&lt;/P&gt;&lt;P&gt;Version R81_10_jumbo_hf_main, build xxxxxxx&lt;BR /&gt;Session not established&lt;BR /&gt;Failed to connect with server 127.0.0.1&lt;/P&gt;&lt;P&gt;what is the reason for this error?&lt;/P&gt;</description>
      <pubDate>Fri, 31 May 2024 10:29:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-SITE-TO-SITE-CHECKPOINT-VSX-ROUTE-BASED/m-p/215891#M41196</guid>
      <dc:creator>aMatthew</dc:creator>
      <dc:date>2024-05-31T10:29:22Z</dc:date>
    </item>
    <item>
      <title>Re: VPN SITE TO SITE CHECKPOINT VSX ROUTE BASED</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-SITE-TO-SITE-CHECKPOINT-VSX-ROUTE-BASED/m-p/215907#M41198</link>
      <description>&lt;P&gt;Did you run this on the gateway or the management server?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 31 May 2024 12:24:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-SITE-TO-SITE-CHECKPOINT-VSX-ROUTE-BASED/m-p/215907#M41198</guid>
      <dc:creator>Duane_Toler</dc:creator>
      <dc:date>2024-05-31T12:24:14Z</dc:date>
    </item>
    <item>
      <title>Re: VPN SITE TO SITE CHECKPOINT VSX ROUTE BASED</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-SITE-TO-SITE-CHECKPOINT-VSX-ROUTE-BASED/m-p/215911#M41200</link>
      <description>&lt;P&gt;on the security gateway&lt;/P&gt;</description>
      <pubDate>Fri, 31 May 2024 13:18:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-SITE-TO-SITE-CHECKPOINT-VSX-ROUTE-BASED/m-p/215911#M41200</guid>
      <dc:creator>aMatthew</dc:creator>
      <dc:date>2024-05-31T13:18:12Z</dc:date>
    </item>
    <item>
      <title>Re: VPN SITE TO SITE CHECKPOINT VSX ROUTE BASED</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-SITE-TO-SITE-CHECKPOINT-VSX-ROUTE-BASED/m-p/215924#M41203</link>
      <description>&lt;P&gt;The VSX provisioning tool is only run on the Management server. &amp;nbsp;If you have a Multi-Domain management, then you need to run it in the context of the domain where the VS lives.&lt;/P&gt;</description>
      <pubDate>Fri, 31 May 2024 14:26:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-SITE-TO-SITE-CHECKPOINT-VSX-ROUTE-BASED/m-p/215924#M41203</guid>
      <dc:creator>Duane_Toler</dc:creator>
      <dc:date>2024-05-31T14:26:42Z</dc:date>
    </item>
    <item>
      <title>Re: VPN SITE TO SITE CHECKPOINT VSX ROUTE BASED</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-SITE-TO-SITE-CHECKPOINT-VSX-ROUTE-BASED/m-p/255797#M50077</link>
      <description>&lt;P&gt;Hi, &lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/694"&gt;@Duane_Toler&lt;/a&gt;&lt;BR /&gt;This post is very helpful &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;BR /&gt;Just to be more sure, this configuration is almost the same if I am going to work with BGP on my VPN, right?&lt;BR /&gt;One doubt I have is when creating the VTI from my MDS.&lt;BR /&gt;If I have already created the VTI from the MDS, is it necessary to ‘pull’ the topology from the SmartConsole, especially from the VS that is doing the VPN, or is this not done?&lt;BR /&gt;Thanks &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 23 Aug 2025 13:50:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-SITE-TO-SITE-CHECKPOINT-VSX-ROUTE-BASED/m-p/255797#M50077</guid>
      <dc:creator>Matlu</dc:creator>
      <dc:date>2025-08-23T13:50:50Z</dc:date>
    </item>
    <item>
      <title>Re: VPN SITE TO SITE CHECKPOINT VSX ROUTE BASED</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-SITE-TO-SITE-CHECKPOINT-VSX-ROUTE-BASED/m-p/255807#M50078</link>
      <description>&lt;P&gt;No, VSX provisioning tool does all of that onto the VS directly &amp;nbsp;(as if you were doing it in SmartConsole).&lt;/P&gt;
&lt;P&gt;For creating a VTI, disable anti-spoofing on the new VTI interfaces, but for any other interior interfaces where you have downstream BGP peerings, set those interfaces to "Defined by routes".&lt;/P&gt;
&lt;P&gt;When creating a VPN community, you will want to use route-based VPN anyway, so use VPN domains per-community on both VPN peers for the Star VPN, and use empty groups (to trigger the VTI). &amp;nbsp;&lt;/P&gt;
&lt;P&gt;Of course, your VPN Encryption should be using IKEv2, and Tunnel Management "one subnet per gateway pair" [IKEv2 Universal Tunnels).&lt;/P&gt;
&lt;P&gt;In Gaia CLISH, on EACH VSX gateway where the VS is hosted, you'll need to configure the same router ID for all instances of this VS on all gateways, and copy/paste the BGP configuration in CLISH again on EACH gateway hosting this VS and in VS-context:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;ssh vsx-gw1
clish
set virtual-system 5
set router-id 192.0.2.255
set as 65530
set bgp external remote-as 1234 on
set bgp external remote-as 1234 peer 192.0.2.1 on
save config
&lt;/LI-CODE&gt;
&lt;P&gt;Repeat that exactly, on vsx-gw2, and vsx-gw3, etc.&lt;/P&gt;
&lt;P&gt;Install policy, wait for VPN to come up. &amp;nbsp;Then SSH to the VSX gateway where the VS is ACTIVE, run:&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;clish
set virtual-system 5   #or whatever
show bgp peers
&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Only the ACTIVE VS (on whichever gateway) will show the BGP peering; all others will show Idle. &amp;nbsp;Don't be fooled, and don't troubleshoot the wrong thing.&lt;/P&gt;
&lt;P&gt;Hope this helps!&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 23 Aug 2025 20:30:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-SITE-TO-SITE-CHECKPOINT-VSX-ROUTE-BASED/m-p/255807#M50078</guid>
      <dc:creator>Duane_Toler</dc:creator>
      <dc:date>2025-08-23T20:30:03Z</dc:date>
    </item>
    <item>
      <title>Re: VPN SITE TO SITE CHECKPOINT VSX ROUTE BASED</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-SITE-TO-SITE-CHECKPOINT-VSX-ROUTE-BASED/m-p/255815#M50084</link>
      <description>&lt;P&gt;Hi, &lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/694"&gt;@Duane_Toler&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;I understand that once I use the provisioning tool from the MDS, I will automatically see the VTI interface in the VS topology (SmartConsole)?&lt;BR /&gt;The use of the tool is done from the CMA that has 'hosted' the VSX boxes, or I do it from the CMA that has the VS as such?&lt;BR /&gt;Thanks 🫂&lt;/P&gt;</description>
      <pubDate>Sun, 24 Aug 2025 04:22:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-SITE-TO-SITE-CHECKPOINT-VSX-ROUTE-BASED/m-p/255815#M50084</guid>
      <dc:creator>Matlu</dc:creator>
      <dc:date>2025-08-24T04:22:14Z</dc:date>
    </item>
    <item>
      <title>Re: VPN SITE TO SITE CHECKPOINT VSX ROUTE BASED</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-SITE-TO-SITE-CHECKPOINT-VSX-ROUTE-BASED/m-p/255841#M50098</link>
      <description>&lt;P&gt;You run the VSX provisioning tool from the MDS context where the VS lives. &amp;nbsp;Or, you can specify the domain server of the VS with "-s &amp;lt;dms IP&amp;gt;" &amp;nbsp;[DMS is the new name for CMA].&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;vsx_provisioning_tool -s 192.0.2.10 -u adminuser -p adminpass -o show vd name FOO-VS&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Or (preferably), put your VSX commands in a script file with transactions. &amp;nbsp;This is from one of my own scripts, fyi:&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;transaction begin
add interface vd FOO-VS vpn_tunnel numbered peer PEER_GW local 169.254.100.1 remote 169.254.100.2 tunnel_id 1025
add route vd FOO-VS destination 203.0.113.0/24 next_hop 169.254.100.2
transaction end
&lt;/LI-CODE&gt;
&lt;P&gt;Save the transaction script (such as "vsx_script.vsx")&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Run it with:&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;vsx_provisioning_tool -s DMS_IP -u adminuser -p adminpass -f vsx_script.vsx&lt;/LI-CODE&gt;
&lt;P&gt;You'll need a route to your BGP peer across the VTI, because VTI is a point-to-point link type with no broadcast (remember your OSFP link types, right?). &amp;nbsp;Since the peer is 1 hop away, you can use eBGP without multi-hop.&lt;/P&gt;
&lt;P&gt;Good luck!&lt;BR /&gt;&lt;BR /&gt;(be sure to give kudo to helpful posts!)&lt;/P&gt;</description>
      <pubDate>Sun, 24 Aug 2025 21:26:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-SITE-TO-SITE-CHECKPOINT-VSX-ROUTE-BASED/m-p/255841#M50098</guid>
      <dc:creator>Duane_Toler</dc:creator>
      <dc:date>2025-08-24T21:26:14Z</dc:date>
    </item>
  </channel>
</rss>

