<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Tunnel mode VPN and Transport mode VPN in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/Tunnel-mode-VPN-and-Transport-mode-VPN/m-p/58485#M11784</link>
    <description>&lt;P&gt;I don't think this is the case, the part of the SK you are quoting is describing the theoretical elements of IPSec, not what can actually be configured.&amp;nbsp; There is no way to set an IPSec tunnel to use Transport mode that I can find, and Tunnel mode is the default.&amp;nbsp; I'd love to be proven wrong...&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 18 Jul 2019 13:19:00 GMT</pubDate>
    <dc:creator>Timothy_Hall</dc:creator>
    <dc:date>2019-07-18T13:19:00Z</dc:date>
    <item>
      <title>Tunnel mode VPN and Transport mode VPN</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Tunnel-mode-VPN-and-Transport-mode-VPN/m-p/7101#M815</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Does Checkpoint support only Tunnel mode VPN only or we can use Transport mode as well for IPSEC...?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;can we switch between them?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any documentation can we&amp;nbsp; get it on this to get the clarity with example...?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 04 Oct 2017 11:19:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Tunnel-mode-VPN-and-Transport-mode-VPN/m-p/7101#M815</guid>
      <dc:creator>Sharma_Prashant</dc:creator>
      <dc:date>2017-10-04T11:19:38Z</dc:date>
    </item>
    <item>
      <title>Re: Tunnel mode VPN and Transport mode VPN</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Tunnel-mode-VPN-and-Transport-mode-VPN/m-p/7102#M816</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Pretty sure Check Point does not support Transport Mode (which is essentially AH only) and never has.&amp;nbsp; Transport Mode only provides the Integrity (SHA1/MD5/SHA256) and Authenticity (digital signatures) elements of the CIA model, while ESP adds in the Confidentiality piece (3DES/AES-XXX) along with the tunneling/encapsulation functionality.&amp;nbsp; All modern VPNs use ESP, but VPNs with Verizon corporate still call for the use of Transport Mode for some reason.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the old days on other vendors it was possible to use just AH in &lt;SPAN class=""&gt;transport&lt;/SPAN&gt; &lt;SPAN class=""&gt;mode&lt;/SPAN&gt; without ESP.&amp;nbsp; This provided Integrity &amp;amp; Authenticity for the payload/data portion of an IP packet only with no encryption; the packet headers would be left intact and the entire packet would not be tunneled. This would save on encryption overhead when CPUs were much slower than they are today however good ol' &lt;A href="http://en.wikipedia.org/wiki/Moore%27s_law" target="_blank"&gt;Moore's Law&lt;/A&gt; has rendered this concern mostly moot.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Inevitably I would be asked for an example during a Check Point class about why in the heck you wouldn't want to encrypt the packet with ESP and achieve confidentiality; the best example I could come up with were real-time stock quotes. You sure as heck don't want someone to spoof them or tamper with them and as a result have your computer-based trading go awry, but you don't especially care if a man in the middle can see the quotes since they are more or less public information.&amp;nbsp; Read the Wikipedia article about &lt;A href="https://en.wikipedia.org/wiki/Knight_Capital_Group"&gt;Knight Capital&lt;/A&gt; for a graphic description of how a prominent high frequency trading firm was essentially bankrupted in the space of 45 minutes by automated trading errors. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&lt;BR /&gt; My book "Max Power: Check Point Firewall Performance Optimization" &lt;BR /&gt; now available via &lt;A href="http://maxpowerfirewalls.com" target="_blank"&gt;http://maxpowerfirewalls.com&lt;/A&gt;.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 05 Oct 2017 13:57:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Tunnel-mode-VPN-and-Transport-mode-VPN/m-p/7102#M816</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2017-10-05T13:57:26Z</dc:date>
    </item>
    <item>
      <title>Re: Tunnel mode VPN and Transport mode VPN</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Tunnel-mode-VPN-and-Transport-mode-VPN/m-p/7103#M817</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Are You sure about it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How would You explain situation when IPSec SA is set to NULL for IKE Phase 2?&lt;/P&gt;&lt;P&gt;Sincerely&lt;/P&gt;&lt;P&gt;PT&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 19 Oct 2017 15:13:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Tunnel-mode-VPN-and-Transport-mode-VPN/m-p/7103#M817</guid>
      <dc:creator>Pawel_Topczewsk</dc:creator>
      <dc:date>2017-10-19T15:13:04Z</dc:date>
    </item>
    <item>
      <title>Re: Tunnel mode VPN and Transport mode VPN</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Tunnel-mode-VPN-and-Transport-mode-VPN/m-p/7104#M818</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Setting the Phase 2 Encryption to NULL does not cause Transport Mode to be used, it simply disables encryption of traffic traversing the VPN tunnel.&amp;nbsp; The entire original packet is still tunneled by ESP and digitally signed.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Transport mode encrypts just the payload of the original packet and leaves the original packet header intact with no tunneling.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There are references to "Transport Mode" scattered throughout the Check Point VPN documentation, but they refer to supporting Transport Mode for Remote Access via L2TP and also GRE.&amp;nbsp; Transport Mode is not supported for site-to-site VPN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&lt;BR /&gt; My book "Max Power: Check Point Firewall Performance Optimization" &lt;BR /&gt; now available via &lt;A href="http://maxpowerfirewalls.com" target="_blank"&gt;http://maxpowerfirewalls.com&lt;/A&gt;.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 19 Oct 2017 21:31:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Tunnel-mode-VPN-and-Transport-mode-VPN/m-p/7104#M818</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2017-10-19T21:31:10Z</dc:date>
    </item>
    <item>
      <title>Re: Tunnel mode VPN and Transport mode VPN</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Tunnel-mode-VPN-and-Transport-mode-VPN/m-p/7105#M819</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sorry Tim, I was thinking about enforcing AH only mode in Tunnel Mode. I was thinking this would disable ESP and leave only AH part of IPSec.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 20 Oct 2017 07:46:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Tunnel-mode-VPN-and-Transport-mode-VPN/m-p/7105#M819</guid>
      <dc:creator>Pawel_Topczewsk</dc:creator>
      <dc:date>2017-10-20T07:46:32Z</dc:date>
    </item>
    <item>
      <title>Re: Tunnel mode VPN and Transport mode VPN</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Tunnel-mode-VPN-and-Transport-mode-VPN/m-p/7106#M820</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;@Tim Hall&lt;/P&gt;&lt;P&gt;I have a issue on transport Mode via GRE.&amp;nbsp; Toplogy is:&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-family: Arial, Verdana, Helvetica, sans-serif; font-size: 12px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: #ffffff; text-decoration-style: initial; text-decoration-color: initial; display: inline !important; float: none;"&gt;peer 1 ------- checkpoint ---- VPN ---- cisco ASA ----- peer2&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-family: Arial, Verdana, Helvetica, sans-serif; font-size: 12px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: #ffffff; text-decoration-style: initial; text-decoration-color: initial; display: inline !important; float: none;"&gt;Peer 1 and Peer 2 has GRE VPN connection. Checkpoint with ASA firewall connected NAT-T Site2Site vpn.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-family: Arial, Verdana, Helvetica, sans-serif; font-size: 12px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: #ffffff; text-decoration-style: initial; text-decoration-color: initial; display: inline !important; float: none;"&gt;Both peer routers are connecting. But GRE tunnel doesn't work. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-family: Arial, Verdana, Helvetica, sans-serif; font-size: 12px; font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: #ffffff; text-decoration-style: initial; text-decoration-color: initial; display: inline !important; float: none;"&gt;Is it possible to connect gre tunnel?&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 22 Jan 2018 09:19:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Tunnel-mode-VPN-and-Transport-mode-VPN/m-p/7106#M820</guid>
      <dc:creator>Gomboragchaa</dc:creator>
      <dc:date>2018-01-22T09:19:58Z</dc:date>
    </item>
    <item>
      <title>Re: Tunnel mode VPN and Transport mode VPN</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Tunnel-mode-VPN-and-Transport-mode-VPN/m-p/7107#M821</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Pretty sure GRE inside an IPSec tunnel is supported, although I can't recall ever setting one up.&amp;nbsp; Is the Check Point side a cluster?&amp;nbsp; If so could this be your issue: &lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk90060&amp;amp;partition=Advanced&amp;amp;product=ClusterXL," style="max-width: 840px;"&gt;sk90060: &lt;STRONG&gt;GRE&lt;/STRONG&gt; tunnel stops working inside a Site-to-Site &lt;STRONG&gt;VPN&lt;/STRONG&gt; tunnel established with Check Point cluster&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&lt;BR /&gt; Second Edition of my "Max Power" Firewall Book&lt;BR /&gt; Now Available at &lt;A href="http://www.maxpowerfirewalls.com" target="_blank"&gt;http://www.maxpowerfirewalls.com&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 22 Jan 2018 21:12:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Tunnel-mode-VPN-and-Transport-mode-VPN/m-p/7107#M821</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2018-01-22T21:12:29Z</dc:date>
    </item>
    <item>
      <title>Re: Tunnel mode VPN and Transport mode VPN</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Tunnel-mode-VPN-and-Transport-mode-VPN/m-p/7108#M822</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you,&lt;/P&gt;&lt;P&gt;Checkpoint Side is cluster.&amp;nbsp;Packets were coming in clear text and checkpoint dropping it.&lt;/P&gt;&lt;P&gt;We&amp;nbsp;tried without VPN. Checkpoint has direct connected ASA and we created static route. Certainly, both peers are can connect each other.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; background-color: #ffffff; font-size: 12px;"&gt;peer 1 ------- checkpoint ----&amp;nbsp;Direct Optic Link(without VPN)&amp;nbsp;---- cisco ASA ----- peer2&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3d3d3d;"&gt;It hasn't dropp log, but still&amp;nbsp;&lt;SPAN&gt;couldn't establish.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 23 Jan 2018 01:45:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Tunnel-mode-VPN-and-Transport-mode-VPN/m-p/7108#M822</guid>
      <dc:creator>Gomboragchaa</dc:creator>
      <dc:date>2018-01-23T01:45:35Z</dc:date>
    </item>
    <item>
      <title>Re: Tunnel mode VPN and Transport mode VPN</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Tunnel-mode-VPN-and-Transport-mode-VPN/m-p/58433#M11777</link>
      <description>From sk104760 , i can see both are supported . IPsec can be implemented in a host-to-host transport mode, as well as in a network tunneling mode:</description>
      <pubDate>Thu, 18 Jul 2019 04:47:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Tunnel-mode-VPN-and-Transport-mode-VPN/m-p/58433#M11777</guid>
      <dc:creator>Harshpal_Bhati</dc:creator>
      <dc:date>2019-07-18T04:47:12Z</dc:date>
    </item>
    <item>
      <title>Re: Tunnel mode VPN and Transport mode VPN</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Tunnel-mode-VPN-and-Transport-mode-VPN/m-p/58485#M11784</link>
      <description>&lt;P&gt;I don't think this is the case, the part of the SK you are quoting is describing the theoretical elements of IPSec, not what can actually be configured.&amp;nbsp; There is no way to set an IPSec tunnel to use Transport mode that I can find, and Tunnel mode is the default.&amp;nbsp; I'd love to be proven wrong...&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 18 Jul 2019 13:19:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Tunnel-mode-VPN-and-Transport-mode-VPN/m-p/58485#M11784</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2019-07-18T13:19:00Z</dc:date>
    </item>
  </channel>
</rss>

