<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Question in Site 2 Site VPN with Fortigate in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Question-in-Site-2-Site-VPN-with-Fortigate/m-p/83620#M6460</link>
    <description>Thanks!&lt;BR /&gt;&lt;BR /&gt;Might I know If can I keep Fortigate using 0.0.0.0/0.0.0.0 for Phrase 2 but use Static Route on CP to let traffic pass through my expected route to a VPN tunnel?</description>
    <pubDate>Wed, 29 Apr 2020 13:32:05 GMT</pubDate>
    <dc:creator>BlueGrass</dc:creator>
    <dc:date>2020-04-29T13:32:05Z</dc:date>
    <item>
      <title>Question in Site 2 Site VPN with Fortigate</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Question-in-Site-2-Site-VPN-with-Fortigate/m-p/83611#M6458</link>
      <description>&lt;P&gt;Hello ~&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;I just build up a VPN between Fortigate and CheckPoint.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I can ping from the Fortigate client side.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But When ping from Checkpoint client side, I find below error log:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="WhatsApp Image 2020-04-29 at 6.17.25 PM.jpeg" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/5862i96446B82B00CD79A/image-size/large?v=v2&amp;amp;px=999" role="button" title="WhatsApp Image 2020-04-29 at 6.17.25 PM.jpeg" alt="WhatsApp Image 2020-04-29 at 6.17.25 PM.jpeg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Might I have some tips on it?&lt;/P&gt;</description>
      <pubDate>Wed, 29 Apr 2020 12:00:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Question-in-Site-2-Site-VPN-with-Fortigate/m-p/83611#M6458</guid>
      <dc:creator>BlueGrass</dc:creator>
      <dc:date>2020-04-29T12:00:32Z</dc:date>
    </item>
    <item>
      <title>Re: Question in Site 2 Site VPN with Fortigate</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Question-in-Site-2-Site-VPN-with-Fortigate/m-p/83619#M6459</link>
      <description>&lt;P&gt;The Fortigate will silently drop your Phase 2 proposal if the Proxy-IDs (subnets) proposed by the Check Point do not exactly match the configuration on the Fortigate.&amp;nbsp; When the Fortigate initiates, its Phase 2 proposal will be accepted by the Check Point even if it doesn't match the VPN domain subnets exactly.&amp;nbsp; See scenario 1 of this SK for the solution:&amp;nbsp;&lt;A class="cp_link sc_ellipsis" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk108600&amp;amp;partition=Advanced&amp;amp;product=IPSec" target="_blank" rel="noopener"&gt;sk108600: VPN Site-to-Site with 3rd party&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;In R80.40+ you can customize the VPN domains per VPN Community in the SmartConsole to send the exact Phase 2 Proxy-IDs the Fortigate is expecting, without having to hack the user.def file as described above.&lt;/P&gt;</description>
      <pubDate>Wed, 29 Apr 2020 13:27:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Question-in-Site-2-Site-VPN-with-Fortigate/m-p/83619#M6459</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2020-04-29T13:27:38Z</dc:date>
    </item>
    <item>
      <title>Re: Question in Site 2 Site VPN with Fortigate</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Question-in-Site-2-Site-VPN-with-Fortigate/m-p/83620#M6460</link>
      <description>Thanks!&lt;BR /&gt;&lt;BR /&gt;Might I know If can I keep Fortigate using 0.0.0.0/0.0.0.0 for Phrase 2 but use Static Route on CP to let traffic pass through my expected route to a VPN tunnel?</description>
      <pubDate>Wed, 29 Apr 2020 13:32:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Question-in-Site-2-Site-VPN-with-Fortigate/m-p/83620#M6460</guid>
      <dc:creator>BlueGrass</dc:creator>
      <dc:date>2020-04-29T13:32:05Z</dc:date>
    </item>
    <item>
      <title>Re: Question in Site 2 Site VPN with Fortigate</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Question-in-Site-2-Site-VPN-with-Fortigate/m-p/83638#M6461</link>
      <description>&lt;P&gt;If the Fortigate is proposing a universal tunnel (0.0.0.0/0's) it may be using a route-based VPN.&amp;nbsp; Setting VPN Tunnel Sharing to "one tunnel per gateway pair" on the Check Point should get things working as far as the Phase 2 negotiation.&amp;nbsp; Are you using VPN domains or routes on the Check Point side to determine which traffic needs to enter the VPN tunnel? (i.e. "interesting" traffic)&lt;/P&gt;</description>
      <pubDate>Wed, 29 Apr 2020 16:17:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Question-in-Site-2-Site-VPN-with-Fortigate/m-p/83638#M6461</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2020-04-29T16:17:41Z</dc:date>
    </item>
  </channel>
</rss>

