<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Tunnel Sharing in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/Tunnel-Sharing/m-p/192435#M32239</link>
    <description>&lt;P&gt;Hola, Hermano&amp;nbsp;8)&lt;/img&gt;&lt;/P&gt;
&lt;P&gt;Reading this post thread, I ask you ... in your experience, if you use the "... per Gateway pair" in a traditional VPN (other than against AWS, GCP, Azure) I understand, that Checkpoint here presents phase 2 as a 0.0.0.0.0/0.&lt;/P&gt;
&lt;P&gt;So, the remote peer, in its phase 2, would also have in any case to "configure" its phase 2, with the same value?&lt;/P&gt;
&lt;P&gt;That is with a 0.0.0.0.0/0?&lt;/P&gt;</description>
    <pubDate>Tue, 12 Sep 2023 15:29:01 GMT</pubDate>
    <dc:creator>Matlu</dc:creator>
    <dc:date>2023-09-12T15:29:01Z</dc:date>
    <item>
      <title>Tunnel Sharing</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Tunnel-Sharing/m-p/191074#M32034</link>
      <description>&lt;P&gt;I have IPsec VPN with third party having FortiGate VPN Firewall. There are 5 Encryption Domains (ED's) on the same peer with different VLAN's but defined as a host.&lt;BR /&gt;&lt;BR /&gt;The tunnel management option I have selected is "One VPN Tunnel per Gateway pair". What problem does it cause? Or Which tunnel management option I have to select? In order for all ED's to be up on phase 2?&lt;/P&gt;</description>
      <pubDate>Wed, 30 Aug 2023 12:06:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Tunnel-Sharing/m-p/191074#M32034</guid>
      <dc:creator>gemechisd</dc:creator>
      <dc:date>2023-08-30T12:06:15Z</dc:date>
    </item>
    <item>
      <title>Re: Tunnel Sharing</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Tunnel-Sharing/m-p/191076#M32036</link>
      <description>&lt;P&gt;What does not work with the current settings ? And what do you mean by: there are 5 Encryption Domains (ED's) on the same peer with different VLAN's but defined as a host ? Maybe a rough topology sketch will help to understand it.&lt;/P&gt;</description>
      <pubDate>Wed, 30 Aug 2023 12:36:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Tunnel-Sharing/m-p/191076#M32036</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2023-08-30T12:36:46Z</dc:date>
    </item>
    <item>
      <title>Re: Tunnel Sharing</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Tunnel-Sharing/m-p/191087#M32043</link>
      <description>&lt;P&gt;Here is what I will tell you. From all my experience with CP vpn tunnels, I learned some important things that I believe should be taken into considerations.&lt;/P&gt;
&lt;P&gt;First off, not sure how long you been around CP, but in the old days of Check Point, and Im talking probably R60 and before, CP would ALWAYS try to present largest possible subnet to the peer, no matter if it was explicitly configured to say send /29, it would always try to send /24 or larger subnet. Thats not so much issue these days, but just to be on the safe side, I would verify below settings in Gudbedit are set to FALSE&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt; color: black;"&gt;ike_enable_supernet&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt; color: black;"&gt;ike_p2_enable_supernet_from_R80.20&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt; color: black;"&gt;ike_use_largest_possible_subnets&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt; color: black;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt; color: black;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Now, onto main thing I wanted to discuss. That setting, one vpn tunnel per gateway pair, personally, I would ONLY use that if its permanent route based tunnel with Say Azure or AWS, but if its regular domain based, do not use that setting, unless its combination of subnets/hosts in your CP enc. domain.&lt;/P&gt;
&lt;P&gt;Keep in mind as well, with Fortigate or PAN, makes no difference if you select 0.0.0.0/0 phase 2 selectors, it really comes down to what you have defined in the policy itself for VPN traffic.&lt;/P&gt;
&lt;P&gt;Hope that helps, but if you need more explanation, we can do the call/remote session. Let me know.&lt;/P&gt;
&lt;P&gt;Cheers,&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Wed, 30 Aug 2023 13:49:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Tunnel-Sharing/m-p/191087#M32043</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-08-30T13:49:04Z</dc:date>
    </item>
    <item>
      <title>Re: Tunnel Sharing</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Tunnel-Sharing/m-p/192435#M32239</link>
      <description>&lt;P&gt;Hola, Hermano&amp;nbsp;8)&lt;/img&gt;&lt;/P&gt;
&lt;P&gt;Reading this post thread, I ask you ... in your experience, if you use the "... per Gateway pair" in a traditional VPN (other than against AWS, GCP, Azure) I understand, that Checkpoint here presents phase 2 as a 0.0.0.0.0/0.&lt;/P&gt;
&lt;P&gt;So, the remote peer, in its phase 2, would also have in any case to "configure" its phase 2, with the same value?&lt;/P&gt;
&lt;P&gt;That is with a 0.0.0.0.0/0?&lt;/P&gt;</description>
      <pubDate>Tue, 12 Sep 2023 15:29:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Tunnel-Sharing/m-p/192435#M32239</guid>
      <dc:creator>Matlu</dc:creator>
      <dc:date>2023-09-12T15:29:01Z</dc:date>
    </item>
    <item>
      <title>Re: Tunnel Sharing</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Tunnel-Sharing/m-p/192439#M32240</link>
      <description>&lt;P&gt;Not necessarily. It all depends what you assign for the VPN domain. See, CP works a bit different when it comes to these things compared to say Fortigate or Cisco or even PAN. But, from my experience, when it comes to Azure or AWS vpn, we always tell customers to ensure empty group is assigned for vpn domain and per gateway option is selected.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Tue, 12 Sep 2023 15:48:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Tunnel-Sharing/m-p/192439#M32240</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-09-12T15:48:28Z</dc:date>
    </item>
  </channel>
</rss>

