<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: VPN Question in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/VPN-Question/m-p/108677#M20682</link>
    <description>&lt;P&gt;Having the same address space going to two different VPN domains is no bueno, regardless of the issues with subnetting that may also occur.&lt;BR /&gt;NAT, renumbering, VSX, or some combination thereof will be required.&lt;/P&gt;</description>
    <pubDate>Sun, 24 Jan 2021 18:13:28 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2021-01-24T18:13:28Z</dc:date>
    <item>
      <title>VPN Question</title>
      <link>https://community.checkpoint.com/t5/General-Topics/VPN-Question/m-p/108660#M20675</link>
      <description>&lt;P&gt;Hi everyone.&lt;/P&gt;&lt;P&gt;I have a VPN "Tunnel 1" with an enc domain of 172.30.0.0/16&lt;/P&gt;&lt;P&gt;I have a VPN "Tunnel 2" to a different peer, and now I need to add 172.30.50.0/24 to it.&lt;/P&gt;&lt;P&gt;I've added 172.30.50.0/24 to the tunnel 2 enc domain, but traffic to 172.30.50.x still goes down Tunnel 1 and obviously fails.&lt;/P&gt;&lt;P&gt;I assumed the /24 subnet would take priority over the /16 subnet and therefore go down the correct tunnel, but this isn't happening.&lt;/P&gt;&lt;P&gt;Should this work?&lt;/P&gt;&lt;P&gt;Or is my only option here to use a different subnet and get the other side to NAT?&lt;/P&gt;</description>
      <pubDate>Sun, 24 Jan 2021 14:24:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/VPN-Question/m-p/108660#M20675</guid>
      <dc:creator>biskit</dc:creator>
      <dc:date>2021-01-24T14:24:53Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Question</title>
      <link>https://community.checkpoint.com/t5/General-Topics/VPN-Question/m-p/108666#M20676</link>
      <description>&lt;P&gt;&lt;FONT size="4"&gt;There are three basic types of overlapping VPN Domains:&lt;/FONT&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;H3&gt;&lt;STRONG&gt;&lt;FONT size="4"&gt;Full Overlap (Supported)&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;&lt;FONT size="4"&gt;Check Point Security Gateway supports fully overlapping VPN Domains. In a full overlap, the VPN Domains are identical.&amp;nbsp;&lt;/FONT&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;H3&gt;&lt;STRONG&gt;&lt;FONT size="4"&gt;Partial Overlap&amp;nbsp;(Not Supported)&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;&lt;FONT size="4"&gt;In certain instances, there may be a partial overlap between the VPN Domains of Security Gateways. In a partial overlap, there is at least one host in both VPN Domains, but there are other hosts that are not in both VPN Domains. Check Point Security Gateway does not support partially overlapping VPN Domains.&lt;/FONT&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;H3&gt;&lt;STRONG&gt;&lt;FONT size="4"&gt;Proper Subset (Supported for Remote Access)&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/H3&gt;
&lt;P&gt;&lt;FONT size="4"&gt;If one Security Gateway’s VPN Domain is fully contained in another Security Gateway’s VPN Domain, the contained VPN Domain is a proper subset.&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT size="4"&gt;For example, when:&lt;/FONT&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;FONT size="4"&gt;The encryption domain of Gateway B is fully contained in the encryption domain of Gateway A,&lt;/FONT&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;FONT size="4"&gt;But Gateway A also has additional hosts that are not in Gateway B,&lt;/FONT&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;BR /&gt;&lt;FONT size="4"&gt;Then Gateway B is a proper subset of Gateway A&lt;/FONT&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="4"&gt;More read here:&lt;BR /&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk106837&amp;amp;partition=Basic&amp;amp;product=IPSec" target="_self"&gt;sk106837&lt;/A&gt;&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 24 Jan 2021 15:29:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/VPN-Question/m-p/108666#M20676</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2021-01-24T15:29:18Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Question</title>
      <link>https://community.checkpoint.com/t5/General-Topics/VPN-Question/m-p/108668#M20677</link>
      <description>&lt;P&gt;Hey Matt,&lt;/P&gt;&lt;P&gt;Sounds like you may need to disable supernetting from guidbedit, as CP has always been known (ever since even before R55) to ALWAYS try and present largest possible subnet. Another option is to modify crypt.def file to exclude certain subnets from the community...not sure 100% right way to do that, but there is an sk about it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk25675&amp;amp;partition=Advanced&amp;amp;product=IPSec" target="_blank"&gt;https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk25675&amp;amp;partition=Advanced&amp;amp;product=IPSec&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Sun, 24 Jan 2021 16:09:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/VPN-Question/m-p/108668#M20677</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2021-01-24T16:09:48Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Question</title>
      <link>https://community.checkpoint.com/t5/General-Topics/VPN-Question/m-p/108671#M20679</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/26803"&gt;@biskit&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;I think this it is&amp;nbsp; &lt;STRONG&gt;not&lt;/STRONG&gt; a suppernetting issue. Suppernetting is almost merging two adjacent networks into one network. For example 192.168.0.0/25 and 192.168.0.128/25 to 192.168.0.0/24. It has to do with the operlapped encdom's! You may need to define the routing of the overlapped encdom's in user.def.&lt;BR /&gt;&lt;BR /&gt;172.30.50.0/24 (Tunnel 2) is part of the domain 172.30.0.0/16 (Tunnel 1) -&amp;gt; Therefore an overlapped encryption domain.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Overlapped encdom's are displayed with the following command:&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;vpn overlap_encdom&lt;/STRONG&gt; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Add the following to user.def and it should work:&lt;/P&gt;
&lt;P&gt;$FWDIR/lib/user.def&lt;/P&gt;
&lt;P&gt;#ifndef __user_def__&lt;BR /&gt;#define __user_def__&lt;/P&gt;
&lt;P&gt;//&lt;BR /&gt;// User defined INSPECT code&lt;BR /&gt;//&lt;BR /&gt;subnet_for_range_and_peer = {&lt;BR /&gt;&amp;lt;&amp;lt;vpn gateway ip&amp;gt;, 172.30.50.1, 172.30.50.254; 255.255.255.0&amp;gt;&lt;BR /&gt;};&lt;BR /&gt;&lt;BR /&gt;#endif /* __user_def__ */&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 24 Jan 2021 16:47:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/VPN-Question/m-p/108671#M20679</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2021-01-24T16:47:59Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Question</title>
      <link>https://community.checkpoint.com/t5/General-Topics/VPN-Question/m-p/108673#M20680</link>
      <description>&lt;P&gt;Not always, yes and no...supernetting with cp usually means presenting largest subnet, regardless whats configured in reality. But, you do have a good suggestion, Im pretty sure it might solve the issue!&lt;/P&gt;</description>
      <pubDate>Sun, 24 Jan 2021 17:22:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/VPN-Question/m-p/108673#M20680</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2021-01-24T17:22:41Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Question</title>
      <link>https://community.checkpoint.com/t5/General-Topics/VPN-Question/m-p/108674#M20681</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/38213"&gt;@the_rock&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;I had described supernetting above.&lt;BR /&gt;&lt;BR /&gt;CUT&amp;gt;&amp;gt;&amp;gt;&lt;/P&gt;
&lt;P&gt;Supernetting is almost merging two adjacent networks into one network. For example 192.168.0.0/&lt;FONT color="#FF0000"&gt;25&lt;/FONT&gt; and 192.168.0.128/&lt;FONT color="#FF0000"&gt;25&lt;/FONT&gt; to 192.168.0.0/&lt;FONT color="#FF0000"&gt;24&lt;/FONT&gt;.&lt;/P&gt;
&lt;P&gt;&amp;lt;&amp;lt;&amp;lt;CUT&lt;/P&gt;
&lt;P&gt;But as said, the entry&amp;nbsp; "subnet_for_range_and_peer" in the user.def should help.&lt;/P&gt;</description>
      <pubDate>Sun, 24 Jan 2021 18:00:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/VPN-Question/m-p/108674#M20681</guid>
      <dc:creator>HeikoAnkenbrand</dc:creator>
      <dc:date>2021-01-24T18:00:21Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Question</title>
      <link>https://community.checkpoint.com/t5/General-Topics/VPN-Question/m-p/108677#M20682</link>
      <description>&lt;P&gt;Having the same address space going to two different VPN domains is no bueno, regardless of the issues with subnetting that may also occur.&lt;BR /&gt;NAT, renumbering, VSX, or some combination thereof will be required.&lt;/P&gt;</description>
      <pubDate>Sun, 24 Jan 2021 18:13:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/VPN-Question/m-p/108677#M20682</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-01-24T18:13:28Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Question</title>
      <link>https://community.checkpoint.com/t5/General-Topics/VPN-Question/m-p/108740#M20691</link>
      <description>&lt;P&gt;Thanks&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/21670"&gt;@HeikoAnkenbrand&lt;/a&gt;, I'm curious to test this method, but need approval from the customer first as it's a production system.&amp;nbsp; In the meantime, I'm also trying to arrange NAT with the other side as this is a safer bet.&lt;/P&gt;</description>
      <pubDate>Mon, 25 Jan 2021 09:40:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/VPN-Question/m-p/108740#M20691</guid>
      <dc:creator>biskit</dc:creator>
      <dc:date>2021-01-25T09:40:23Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Question</title>
      <link>https://community.checkpoint.com/t5/General-Topics/VPN-Question/m-p/108748#M20692</link>
      <description>&lt;P&gt;Just an idea, would it work if for 1st tunnel you create group with exclusion (net1 with&amp;nbsp;exclusion for net2), and for 2nd tunnel use only net2 object in encryption domain?&lt;/P&gt;</description>
      <pubDate>Mon, 25 Jan 2021 12:29:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/VPN-Question/m-p/108748#M20692</guid>
      <dc:creator>abihsot__</dc:creator>
      <dc:date>2021-01-25T12:29:29Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Question</title>
      <link>https://community.checkpoint.com/t5/General-Topics/VPN-Question/m-p/108752#M20693</link>
      <description>&lt;P&gt;I did think of that but it was too risky to test it out in production.&amp;nbsp; However, TAC thinks it will work&amp;nbsp;&lt;STRONG&gt;providing&lt;/STRONG&gt; the Tunnel Management is set to "One VPN tunnel per each pair of &lt;STRONG&gt;hosts&lt;/STRONG&gt;", which could add unwelcomed overhead to the tunnel.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 25 Jan 2021 13:05:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/VPN-Question/m-p/108752#M20693</guid>
      <dc:creator>biskit</dc:creator>
      <dc:date>2021-01-25T13:05:57Z</dc:date>
    </item>
    <item>
      <title>Re: VPN Question</title>
      <link>https://community.checkpoint.com/t5/General-Topics/VPN-Question/m-p/108759#M20694</link>
      <description>&lt;P&gt;The "pair of hosts" setting will cause new IPSec/P2 tunnels to be formed for every combination of hosts that try to use the VPN; if you are going to move forward with this be sure your rulebase is as locked down as possible to limit the number of tunneling combinations; you may also want to disable PFS to avoid a computationally expensive Diffie-Hellman calculation every time a new IPSec/P2 tunnel starts.&lt;/P&gt;</description>
      <pubDate>Mon, 25 Jan 2021 14:02:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/VPN-Question/m-p/108759#M20694</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2021-01-25T14:02:35Z</dc:date>
    </item>
  </channel>
</rss>

