<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Check Point - AWS VPN tunnels question in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-Point-AWS-VPN-tunnels-question/m-p/93545#M7255</link>
    <description>&lt;P&gt;Does the mtu 1436 important? can it be the cause for vpn resets if the mtu is 1500?&lt;/P&gt;</description>
    <pubDate>Thu, 06 Aug 2020 08:18:39 GMT</pubDate>
    <dc:creator>kobi_rudy</dc:creator>
    <dc:date>2020-08-06T08:18:39Z</dc:date>
    <item>
      <title>Check Point - AWS VPN tunnels question</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-Point-AWS-VPN-tunnels-question/m-p/90343#M6911</link>
      <description>&lt;P&gt;Hi guys,&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm trying to configure a few tunnels from a Check Point cluster to Amazon AWS and I'm not able to understand the part of the VTI interfaces IPs and cluster topology IP's. I have read the following two guides:&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.aws.amazon.com/es_es/vpn/latest/s2svpn/cgw-static-routing-examples.html" target="_blank"&gt;https://docs.aws.amazon.com/es_es/vpn/latest/s2svpn/cgw-static-routing-examples.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk100726" target="_blank"&gt;https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk100726&lt;/A&gt;&lt;/P&gt;&lt;P&gt;The Check Point one seems to be contradictory to me, it says:&lt;/P&gt;&lt;LI-SPOILER&gt;&lt;SPAN&gt;Under "VPN Tunnel Type" select "Numbered"&lt;/SPAN&gt;&lt;BR /&gt;&lt;UL&gt;&lt;LI&gt;Under "Local Address": provide the "Inside IP Address" of the "Customer Gateway"&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;as specified in the configuration file&lt;/STRONG&gt;. (&lt;STRONG&gt;This relates to a single gateway configuration&lt;/STRONG&gt;.)&lt;/LI&gt;&lt;LI&gt;Under "Remote Address": provide the "Inside IP Address" of the "Virtual Private Gateway" as specified in the configuration file.&lt;/LI&gt;&lt;/UL&gt;&lt;/LI-SPOILER&gt;&lt;P&gt;But afterwards, it says:&lt;/P&gt;&lt;LI-SPOILER&gt;&lt;P&gt;*&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Note: VTI Local Address (per cluster member) must be different than the addresses provided in the configuration file.&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;These addresses are only locally significant, and are used to establish the point-to-point connection between the logical Check Point and AWS interfaces, on which VPN nexthop routes will be configured for use.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Note:&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;For a cluster with two members, four unique addresses are required - one for each VTI, as outlined above. All other settings can stay the same. In total, six VTI IP addresses would be required - the additional two will be the shared addresses, which will be defined in SmartDashboard later.&lt;/P&gt;&lt;/LI-SPOILER&gt;&lt;P&gt;In the AWS config file, there are 2 IP's for each tunnel, as follows:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;f. IP Address: 169.254.92.222
g. Remote IP: 169.254.92.221&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The CP guide also states:&lt;/P&gt;&lt;LI-SPOILER&gt;&lt;P&gt;Fetching the VPN Tunnel interfaces:&lt;/P&gt;&lt;P&gt;(&lt;STRONG&gt;Note:&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;If you have not done so already, enable the IPsec VPN blade on your gateway)&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;Open your gateway or cluster object, and navigate to the Topology tab.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Re-fetch the interface configuration.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Note:&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;For clusters, define the newly added interfaces as Cluster interfaces, using the IP addresses specified in the configuration file for the "Customer Gateway":&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI-SPOILER&gt;&lt;P&gt;I don't see any "Customer gateway IP" information in the AWS config file.&amp;nbsp;So I'm totally lost, don't know what IP to set in the Local and Remote VTI, which one to put in the static routing, and which one to set the cluster interfaces...&lt;/P&gt;&lt;P&gt;May you help to shed some light?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance&lt;/P&gt;</description>
      <pubDate>Wed, 01 Jul 2020 20:20:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-Point-AWS-VPN-tunnels-question/m-p/90343#M6911</guid>
      <dc:creator>arcotangente</dc:creator>
      <dc:date>2020-07-01T20:20:11Z</dc:date>
    </item>
    <item>
      <title>Re: Check Point - AWS VPN tunnels question</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-Point-AWS-VPN-tunnels-question/m-p/90469#M6921</link>
      <description>No one? &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;</description>
      <pubDate>Fri, 03 Jul 2020 09:22:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-Point-AWS-VPN-tunnels-question/m-p/90469#M6921</guid>
      <dc:creator>arcotangente</dc:creator>
      <dc:date>2020-07-03T09:22:39Z</dc:date>
    </item>
    <item>
      <title>Re: Check Point - AWS VPN tunnels question</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-Point-AWS-VPN-tunnels-question/m-p/90522#M6928</link>
      <description>&lt;P&gt;Hello arcotangente,&lt;/P&gt;&lt;P&gt;Here are the steps I usually follow when create new VPN with AWS.&lt;/P&gt;&lt;P&gt;1. Create Interoperable objects with public IPs of AWS VPN peers with SmartConsole. For instance if your AWS VPN peer IP is 52.30.155.2, create object called AWS_GW1 with that IP, and add empty network group for encryption domain in its topology. Do the same for the second AWS VPN peer GW (AWS_GW2).&lt;/P&gt;&lt;P&gt;2. Add the following commands on each cluster member:&lt;BR /&gt;HA Member 1&lt;BR /&gt;add vpn tunnel 1 type numbered local 169.254.92.1 remote 169.254.92.221 peer AWS_GW1&lt;BR /&gt;set interface vpnt1 state on&lt;BR /&gt;set interface vpnt1 mtu 1436&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;HA Member 2&lt;BR /&gt;add vpn tunnel 1 type numbered local 169.254.92.2 remote 169.254.92.221 peer AWS_GW1&lt;BR /&gt;set interface vpnt1 state on&lt;BR /&gt;set interface vpnt1 mtu 1436&lt;/P&gt;&lt;P&gt;After it's a point-to-point interface you can add any IP address from that subnet. Then you will configure 169.254.92.222 on the VIP.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="top1.png" style="width: 650px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/7103i40820BF3C5A21D52/image-size/large?v=v2&amp;amp;px=999" role="button" title="top1.png" alt="top1.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;As you can see I have .158 for VIP, and .157 is the IP address of AWS's side of the tunnel. You have to follow the same for the second tunnel to the other AWS VPN GW.&lt;/P&gt;&lt;P&gt;The rest of the instructions for routing and policies are described in the configuration file which you download from AWS Console.&lt;/P&gt;</description>
      <pubDate>Sat, 04 Jul 2020 05:12:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-Point-AWS-VPN-tunnels-question/m-p/90522#M6928</guid>
      <dc:creator>mk1</dc:creator>
      <dc:date>2020-07-04T05:12:20Z</dc:date>
    </item>
    <item>
      <title>Re: Check Point - AWS VPN tunnels question</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-Point-AWS-VPN-tunnels-question/m-p/90649#M6940</link>
      <description>&lt;P&gt;Hi MK1.&lt;/P&gt;&lt;P&gt;Thank you for the response! So, let me see if I got this right, we should have the following (example) configuration for a tunnel to AWS:&lt;/P&gt;&lt;P&gt;HA Member 1 (tunnel 1)&lt;BR /&gt;add vpn tunnel 1 type numbered local 169.254.92.1 remote 169.254.92.221 peer AWS_GW1&lt;BR /&gt;set interface vpnt1 state on&lt;BR /&gt;set interface vpnt1 mtu 1436&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;HA Member 1 (tunnel 2)&lt;BR /&gt;add vpn tunnel 2 type numbered local 169.254.92.3 remote 169.254.92.223 peer AWS_GW1&lt;BR /&gt;set interface vpnt2 state on&lt;BR /&gt;set interface vpnt2 mtu 1436&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;HA Member 2 (tunnel 1)&lt;BR /&gt;add vpn tunnel 1 type numbered local 169.254.92.2 remote 169.254.92.221 peer AWS_GW1&lt;BR /&gt;set interface vpnt1 state on&lt;BR /&gt;set interface vpnt1 mtu 1436&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;HA Member 2 (tunnel 2)&lt;BR /&gt;add vpn tunnel 2 type numbered local 169.254.92.4 remote 169.254.92.223 peer AWS_GW1&lt;BR /&gt;set interface vpnt2 state on&lt;BR /&gt;set interface vpnt2 mtu 1436&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;And then for cluster ip addresses - 169.254.92.222 for vpnt1 and 169.254.92.224 for vpnt2.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Should the cluster ip address be a specific ip address, or just &lt;STRONG&gt;&lt;EM&gt;any&lt;/EM&gt;&lt;/STRONG&gt; ip address in the 169.254.92.x subnet?&lt;/P&gt;&lt;P&gt;Also, does it matter what local and remote ip address we use for the tunnel configuration or just &lt;STRONG&gt;&lt;EM&gt;any&lt;/EM&gt;&lt;/STRONG&gt; from the 169.254.x.x range ? Should we stick to the config file from AWS in terms of ip addresses for local and remote on the VTI or we can come up with our own?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Mon, 06 Jul 2020 09:37:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-Point-AWS-VPN-tunnels-question/m-p/90649#M6940</guid>
      <dc:creator>arcotangente</dc:creator>
      <dc:date>2020-07-06T09:37:40Z</dc:date>
    </item>
    <item>
      <title>Re: Check Point - AWS VPN tunnels question</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-Point-AWS-VPN-tunnels-question/m-p/90650#M6941</link>
      <description>&lt;P&gt;No, your configuration is wrong. AWS give you two separate IPsec peer IPs which are public. Let's say they are 1.1.1.1 and 2.2.2.2.&lt;BR /&gt;The first thing you have to create with SmartConsole are the Interoperable Devices of remote VPN peers, in our case AWS_GW1 which is 1.1.1.1 and AWS_GW2 which is 2.2.2.2.&lt;/P&gt;&lt;P&gt;AWS give you also two separate IPs part of 169.254.x.x range. Let's say IPs for the first tunnel are 169.254.1.99 (AWS) and 169.254.1.100 (you) and the IPs for the second tunnel are 169.254.2.99 (AWS) and 169.254.2.100 (you).&lt;/P&gt;&lt;P&gt;Then you have the following config in the CLI:&lt;/P&gt;&lt;P&gt;GW1&lt;BR /&gt;add vpn tunnel 1 type numbered local 169.254.1.1 remote 169.254.1.99 peer AWS_GW1&lt;BR /&gt;set interface vpnt1 state on&lt;BR /&gt;set interface vpnt1 mtu 1436&lt;/P&gt;&lt;P&gt;add vpn tunnel 2 type numbered local 169.254.2.1 remote 169.254.2.99 peer AWS_GW2&lt;BR /&gt;set interface vpnt2 state on&lt;BR /&gt;set interface vpnt2 mtu 1436&lt;/P&gt;&lt;P&gt;GW2&lt;BR /&gt;add vpn tunnel 1 type numbered local 169.254.1.2 remote 169.254.1.99 peer AWS_GW1&lt;BR /&gt;set interface vpnt1 state on&lt;BR /&gt;set interface vpnt1 mtu 1436&lt;/P&gt;&lt;P&gt;add vpn tunnel 2 type numbered local 169.254.2.2 remote 169.254.2.99 peer AWS_GW2&lt;BR /&gt;set interface vpnt2 state on&lt;BR /&gt;set interface vpnt2 mtu 1436&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;The main purpose here is to have different IPs on each VPN tunnel interface, and then you will configure the VIP via GUI with the proper IP provided by AWS, in our case 169.254.1.100 will be VIP for vpnt1 and 169.254.2.100 for vpnt2. Then you have to add your static routes pointing to 169.254.1.99 and 169.254.2.99 (if you don't use BGP). One of them should be with priority.&lt;/P&gt;&lt;P&gt;On your questions:&lt;BR /&gt;Should the cluster ip address be a specific ip address, or just any ip address in the 169.254.92.x subnet? - Cluster IP address must be the one given by AWS. Member IP addresses could be any IP address.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Also, does it matter what local and remote ip address we use for the tunnel configuration or just any from the 169.254.x.x range? - Yes, it does. You have to use the IPs given by AWS for both sides of the tunnels, and you can use another IPs for each member interfaces different from VIP.&lt;/P&gt;</description>
      <pubDate>Mon, 06 Jul 2020 10:07:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-Point-AWS-VPN-tunnels-question/m-p/90650#M6941</guid>
      <dc:creator>mk1</dc:creator>
      <dc:date>2020-07-06T10:07:47Z</dc:date>
    </item>
    <item>
      <title>Re: Check Point - AWS VPN tunnels question</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-Point-AWS-VPN-tunnels-question/m-p/90902#M6951</link>
      <description>&lt;P&gt;It worked!&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you very much!&lt;/P&gt;</description>
      <pubDate>Wed, 08 Jul 2020 14:01:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-Point-AWS-VPN-tunnels-question/m-p/90902#M6951</guid>
      <dc:creator>arcotangente</dc:creator>
      <dc:date>2020-07-08T14:01:53Z</dc:date>
    </item>
    <item>
      <title>Re: Check Point - AWS VPN tunnels question</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-Point-AWS-VPN-tunnels-question/m-p/93545#M7255</link>
      <description>&lt;P&gt;Does the mtu 1436 important? can it be the cause for vpn resets if the mtu is 1500?&lt;/P&gt;</description>
      <pubDate>Thu, 06 Aug 2020 08:18:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-Point-AWS-VPN-tunnels-question/m-p/93545#M7255</guid>
      <dc:creator>kobi_rudy</dc:creator>
      <dc:date>2020-08-06T08:18:39Z</dc:date>
    </item>
    <item>
      <title>Re: Check Point - AWS VPN tunnels question</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-Point-AWS-VPN-tunnels-question/m-p/146544#M23278</link>
      <description>&lt;P&gt;Hi ,&lt;/P&gt;&lt;P&gt;I need to create ipsec tunnel with cluster checkpoint fw to AWS gateway but AWS shared the&amp;nbsp;&lt;SPAN&gt;169.254.1.1/30 pool only for vti, but as per my understanding we need at least three ip's for both cluster member, I am stuck please suggest.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 20 Apr 2022 05:51:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-Point-AWS-VPN-tunnels-question/m-p/146544#M23278</guid>
      <dc:creator>Faimuddin_N_A</dc:creator>
      <dc:date>2022-04-20T05:51:10Z</dc:date>
    </item>
    <item>
      <title>Re: Check Point - AWS VPN tunnels question</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-Point-AWS-VPN-tunnels-question/m-p/146687#M23321</link>
      <description>&lt;P&gt;Short answer: Use the AWS provided address as cluster address in topology and for the node addresses, just continue counting up. This looks strange, because it brings you out of that /30 mask, but it works. It works, because the VTI is set up using the cluster address anyway, the local node addresses are in fact ignored. But you have to enter something there.&lt;/P&gt;
&lt;P&gt;Long answer: Just follow sk100726 (static routing) or sk108958 (dynamic routing). Your question is also answered there.&lt;/P&gt;</description>
      <pubDate>Thu, 21 Apr 2022 10:21:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-Point-AWS-VPN-tunnels-question/m-p/146687#M23321</guid>
      <dc:creator>Tobias_Moritz</dc:creator>
      <dc:date>2022-04-21T10:21:03Z</dc:date>
    </item>
  </channel>
</rss>

