<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Check Point-to-Check Point IPSEC VPN tunnel - eclipsed and narrow in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/Check-Point-to-Check-Point-IPSEC-VPN-tunnel-eclipsed-and-narrow/m-p/202918#M33769</link>
    <description>&lt;P&gt;• &lt;STRONG&gt;One VPN Tunnel per subnet pair&lt;/STRONG&gt;- Once a VPN tunnel has been opened between two subnets, subsequent sessions between the same subnets will share the same VPN tunnel. This is the default setting and is compliant with the IPsec industry standard&lt;/P&gt;
&lt;P&gt;So i would ask CP TAC to resolve the issue instead of moving to Gateway pair.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 12 Jan 2024 12:19:35 GMT</pubDate>
    <dc:creator>G_W_Albrecht</dc:creator>
    <dc:date>2024-01-12T12:19:35Z</dc:date>
    <item>
      <title>Check Point-to-Check Point IPSEC VPN tunnel - eclipsed and narrow</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Check-Point-to-Check-Point-IPSEC-VPN-tunnel-eclipsed-and-narrow/m-p/202917#M33768</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;I recently setup a new S2S CP-to-CP IPSEC VPN.&lt;/P&gt;&lt;P&gt;Site 1 - 6200 GW cluster (active/standby) - R81.20 JHF 41 (VPN domain 10.10.0.0/16)&lt;/P&gt;&lt;P&gt;Site 2&amp;nbsp; - SMB 1800 single appliance - R81.10.08 (VPN domain 10.20.0.0/16)&lt;/P&gt;&lt;P&gt;Mgmt - Smart-1 Cloud - R81.20&lt;/P&gt;&lt;P&gt;The VPN has overall been stable except for communication between certain /24 subnets within the VPN domains.&amp;nbsp; For example, overnight I lost communication from 10.20.80.90 to the 10.10.5.0/24 subnet at site 1.&amp;nbsp; All other inter-site traffic was communicating just fine.&amp;nbsp; I checked 'vpn tu tlist' and saw several "narrow" and "eclipsed" entries with "No outbound SA" on a couple of entries.&lt;/P&gt;&lt;P&gt;This is a simple S2S with no overlapping networks and no NAT between the two sites.&amp;nbsp; I've seen some SKs regarding narrowed and eclipsed tunnel related to third-party VPNs, but nothing really for CP-to-CP.&amp;nbsp;&lt;/P&gt;&lt;P&gt;In the community settings, for VPN tunnel sharing, I'm using "one VPN tunnel per subnet pair".&amp;nbsp; Should I just change this "to one tunnel per Gateway pair"?&lt;/P&gt;</description>
      <pubDate>Fri, 12 Jan 2024 12:15:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Check-Point-to-Check-Point-IPSEC-VPN-tunnel-eclipsed-and-narrow/m-p/202917#M33768</guid>
      <dc:creator>Dr_Steve_Brule</dc:creator>
      <dc:date>2024-01-12T12:15:04Z</dc:date>
    </item>
    <item>
      <title>Re: Check Point-to-Check Point IPSEC VPN tunnel - eclipsed and narrow</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Check-Point-to-Check-Point-IPSEC-VPN-tunnel-eclipsed-and-narrow/m-p/202918#M33769</link>
      <description>&lt;P&gt;• &lt;STRONG&gt;One VPN Tunnel per subnet pair&lt;/STRONG&gt;- Once a VPN tunnel has been opened between two subnets, subsequent sessions between the same subnets will share the same VPN tunnel. This is the default setting and is compliant with the IPsec industry standard&lt;/P&gt;
&lt;P&gt;So i would ask CP TAC to resolve the issue instead of moving to Gateway pair.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 12 Jan 2024 12:19:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Check-Point-to-Check-Point-IPSEC-VPN-tunnel-eclipsed-and-narrow/m-p/202918#M33769</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2024-01-12T12:19:35Z</dc:date>
    </item>
    <item>
      <title>Re: Check Point-to-Check Point IPSEC VPN tunnel - eclipsed and narrow</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Check-Point-to-Check-Point-IPSEC-VPN-tunnel-eclipsed-and-narrow/m-p/202920#M33770</link>
      <description>&lt;P&gt;I will tell you my experience with that setting (I meant setting per gateway pair) when it comes to CP to CP tunnels...I always found its best to have that enabled when you have mix of subnets/hosts in the tunnel, otherwise, you just leave it default. Sounds like you may need to do basic VPN debug to see whats going on and then check ike files, as well as vpnd.elg from $FWDIR/log&lt;/P&gt;
&lt;P&gt;Just do this on 6200 side:&lt;/P&gt;
&lt;P&gt;vpn debug trunc&lt;/P&gt;
&lt;P&gt;vpn debug ikeon&lt;/P&gt;
&lt;P&gt;-generate some traffic, wait minute or so&lt;/P&gt;
&lt;P&gt;vpn debug ikeoff&lt;/P&gt;
&lt;P&gt;Then look and examine those files and search for the IPs affected.&lt;/P&gt;
&lt;P&gt;Hope that helps.&lt;/P&gt;
&lt;P&gt;Best,&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Fri, 12 Jan 2024 12:38:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Check-Point-to-Check-Point-IPSEC-VPN-tunnel-eclipsed-and-narrow/m-p/202920#M33770</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-01-12T12:38:26Z</dc:date>
    </item>
  </channel>
</rss>

