<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: IPSec tunnel Setup [HUB and SPOKE Scenario] with Both spokes being non-checkpoint VPN Gateway in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/IPSec-tunnel-Setup-HUB-and-SPOKE-Scenario-with-Both-spokes-being/m-p/251756#M42125</link>
    <description>&lt;P&gt;Which Admin Guide / SK did make you configure two VPN communities ? A Star community works as found here:&amp;nbsp;&lt;A href="https://sc1.checkpoint.com/documents/R81.20/WebAdminGuides/EN/CP_R81.20_SitetoSiteVPN_AdminGuide/Content/Topics-VPNSG/Check-Point-VPN.htm?TocPath=Check%20Point%20VPN%7CIPsec%20VPN%7C_____0#IPsec_VPN" target="_blank"&gt;https://sc1.checkpoint.com/documents/R81.20/WebAdminGuides/EN/CP_R81.20_SitetoSiteVPN_AdminGuide/Content/Topics-VPNSG/Check-Point-VPN.htm?TocPath=Check%20Point%20VPN%7CIPsec%20VPN%7C_____0#IPsec_VPN&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 23 Jun 2025 09:49:37 GMT</pubDate>
    <dc:creator>G_W_Albrecht</dc:creator>
    <dc:date>2025-06-23T09:49:37Z</dc:date>
    <item>
      <title>IPSec tunnel Setup [HUB and SPOKE Scenario] with Both spokes being non-checkpoint VPN Gateway</title>
      <link>https://community.checkpoint.com/t5/General-Topics/IPSec-tunnel-Setup-HUB-and-SPOKE-Scenario-with-Both-spokes-being/m-p/251747#M42123</link>
      <description>&lt;P&gt;Hello Everyone,&lt;/P&gt;&lt;P&gt;I am attempting to establish a VPN tunnel between two satellite devices (SPOKEs—non-Check Point products) and a central Check Point Security Gateway (HUB).&lt;/P&gt;&lt;P&gt;Sample Encryption Domain for:&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;FONT face="arial black,avant garde"&gt;SPOKE A:&lt;/FONT&gt; 172.20.18.69&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;FONT face="arial black,avant garde"&gt;SPOKE B:&lt;/FONT&gt; 10.40.90.5&lt;/P&gt;&lt;P&gt;&lt;FONT face="arial black,avant garde"&gt;Current Configuration:&lt;/FONT&gt;&lt;BR /&gt;&amp;nbsp; &amp;nbsp; 1. Created separate VPN communities for each SPOKE, with the HUB as the central gateway in both.&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; 2. Used identical encryption parameters for both VPN communities.&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; 3. The goal is to allow traffic from&amp;nbsp;SPOKE A&amp;nbsp;to pass through the HUB to&amp;nbsp;SPOKE B.&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; 4. Created a static route on the HUB for routing traffic to SPOKE B encryption domain [10.40.90.5] from SPOKE A encryption domain [172.20.18.69].&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;FONT face="arial black,avant garde"&gt;Access Control Rule:&lt;/FONT&gt;&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;1. A single rule was created with each gateway’s encryption domain as both the&amp;nbsp;source&amp;nbsp;and&amp;nbsp;destination.&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;2. The&amp;nbsp;VPN Community&amp;nbsp;field in the rule references both VPN community objects (one for each SPOKE).&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;3. (See attached image for the rule configuration.)&lt;/P&gt;&lt;P&gt;&lt;FONT face="arial black,avant garde"&gt;Encountered Issue:&lt;/FONT&gt;&lt;BR /&gt;Traffic from&amp;nbsp;SPOKE B&amp;nbsp;reaches the HUB, and logs confirm it is being&amp;nbsp;VPN-routed. However, the traffic&amp;nbsp;does not reach SPOKE B’s encryption domain. Both Phase 1 and Phase 2 tunnels between the HUB and each SPOKE are&amp;nbsp;up. (See attached VPN-routed traffic log for details.)&lt;/P&gt;&lt;P&gt;&lt;FONT face="arial black,avant garde"&gt;Request for Assistance:&lt;/FONT&gt;&lt;BR /&gt;Could you help identify what might be wrong with this VPN routing configuration? Alternatively, do you have any recommended resources for troubleshooting similar VPN routing scenarios? In general, what is the guideline for configuring such a HUB and SPOKE VPN routing scenario?&lt;/P&gt;&lt;P&gt;Thank&amp;nbsp;you!&lt;/P&gt;</description>
      <pubDate>Mon, 23 Jun 2025 08:48:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/IPSec-tunnel-Setup-HUB-and-SPOKE-Scenario-with-Both-spokes-being/m-p/251747#M42123</guid>
      <dc:creator>SintayehuCSE</dc:creator>
      <dc:date>2025-06-23T08:48:19Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec tunnel Setup [HUB and SPOKE Scenario] with Both spokes being non-checkpoint VPN Gateway</title>
      <link>https://community.checkpoint.com/t5/General-Topics/IPSec-tunnel-Setup-HUB-and-SPOKE-Scenario-with-Both-spokes-being/m-p/251756#M42125</link>
      <description>&lt;P&gt;Which Admin Guide / SK did make you configure two VPN communities ? A Star community works as found here:&amp;nbsp;&lt;A href="https://sc1.checkpoint.com/documents/R81.20/WebAdminGuides/EN/CP_R81.20_SitetoSiteVPN_AdminGuide/Content/Topics-VPNSG/Check-Point-VPN.htm?TocPath=Check%20Point%20VPN%7CIPsec%20VPN%7C_____0#IPsec_VPN" target="_blank"&gt;https://sc1.checkpoint.com/documents/R81.20/WebAdminGuides/EN/CP_R81.20_SitetoSiteVPN_AdminGuide/Content/Topics-VPNSG/Check-Point-VPN.htm?TocPath=Check%20Point%20VPN%7CIPsec%20VPN%7C_____0#IPsec_VPN&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 23 Jun 2025 09:49:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/IPSec-tunnel-Setup-HUB-and-SPOKE-Scenario-with-Both-spokes-being/m-p/251756#M42125</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2025-06-23T09:49:37Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec tunnel Setup [HUB and SPOKE Scenario] with Both spokes being non-checkpoint VPN Gateway</title>
      <link>https://community.checkpoint.com/t5/General-Topics/IPSec-tunnel-Setup-HUB-and-SPOKE-Scenario-with-Both-spokes-being/m-p/251804#M42128</link>
      <description>&lt;P&gt;First of all, I thank you for your response! It is much appreciated.&lt;/P&gt;&lt;P&gt;Before attempting to configure it via the use of two separate star community objects, I have gone through the notes of the following URLs about VPN Routing:&amp;nbsp; &amp;nbsp; &amp;nbsp; 1.&amp;nbsp;&lt;A href="https://sc1.checkpoint.com/documents/R80.30/WebAdminGuides/EN/CP_R80.30_SitetoSiteVPN_AdminGuide/html_frameset.htm?topic=documents/R80.30/WebAdminGuides/EN/CP_R80.30_SitetoSiteVPN_AdminGuide/13928" target="_blank"&gt;https://sc1.checkpoint.com/documents/R80.30/WebAdminGuides/EN/CP_R80.30_SitetoSiteVPN_AdminGuide/html_frameset.htm?topic=documents/R80.30/WebAdminGuides/EN/CP_R80.30_SitetoSiteVPN_AdminGuide/13928&lt;/A&gt;.&amp;nbsp;&lt;/P&gt;&lt;P&gt;2.&amp;nbsp;&lt;A href="https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_RemoteAccessVPN_AdminGuide/Topics-VPNRG/VPN-Routing-Remote-Access.htm#:~:text=Allow%20VPN%20clients%20to%20route,then%20between%20the%20Security%20Gateways:" target="_blank"&gt;https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_RemoteAccessVPN_AdminGuide/Topics-VPNRG/VPN-Routing-Remote-Access.htm#:~:text=Allow%20VPN%20clients%20to%20route,then%20between%20the%20Security%20Gateways:&lt;/A&gt;&lt;/P&gt;&lt;P&gt;3.&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Remote-Access-VPN/VPN-Routing-Action/td-p/97007" target="_blank"&gt;https://community.checkpoint.com/t5/Remote-Access-VPN/VPN-Routing-Action/td-p/97007&lt;/A&gt;.&lt;/P&gt;&lt;P&gt;4.&amp;nbsp;&lt;A href="https://sc1.checkpoint.com/documents/R80.20/SmartConsole_OLH/EN/html_frameset.htm?topic=documents/R80.20/SmartConsole_OLH/EN/xPIK8IRZF4anBq5LqvwFRQ2" target="_blank"&gt;https://sc1.checkpoint.com/documents/R80.20/SmartConsole_OLH/EN/html_frameset.htm?topic=documents/R80.20/SmartConsole_OLH/EN/xPIK8IRZF4anBq5LqvwFRQ2&lt;/A&gt;.&lt;/P&gt;&lt;P&gt;5.&amp;nbsp;&lt;A href="https://sc1.checkpoint.com/documents/R80.20_GA/WebAdminGuides/EN/CP_R80.20_RemoteAccessVPN_AdminGuide/html_frameset.htm?topic=documents/R80.20_GA/WebAdminGuides/EN/CP_R80.20_RemoteAccessVPN_AdminGuide/14605" target="_blank"&gt;https://sc1.checkpoint.com/documents/R80.20_GA/WebAdminGuides/EN/CP_R80.20_RemoteAccessVPN_AdminGuide/html_frameset.htm?topic=documents/R80.20_GA/WebAdminGuides/EN/CP_R80.20_RemoteAccessVPN_AdminGuide/14605&lt;/A&gt;.&lt;/P&gt;&lt;P&gt;6.&amp;nbsp;&lt;A href="https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_SitetoSiteVPN_AdminGuide/Topics-VPNSG/Route-Injection-Mechanism.htm" target="_blank"&gt;https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_SitetoSiteVPN_AdminGuide/Topics-VPNSG/Route-Injection-Mechanism.htm&lt;/A&gt;.&lt;/P&gt;&lt;P&gt;7.&amp;nbsp;&lt;A href="https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_SitetoSiteVPN_AdminGuide/CP_R81_SitetoSiteVPN_AdminGuide.pdf" target="_blank"&gt;https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_SitetoSiteVPN_AdminGuide/CP_R81_SitetoSiteVPN_AdminGuide.pdf&lt;/A&gt;&lt;/P&gt;&lt;P&gt;According to these Notes, I used only one star community object. In this community object, the central gateway [The HUB] is a checkpoint Security Gateway [Maestro Security Group instance], whereas the satellite Gateways are non-checkpoint products/VPN Gateways, and I have no information about which vendor's product they are. This is a Site-to-Site VPN tunnel to be established between two of our partner companies, where traffic from the host of one company must pass through our gateway to the host of the second partner.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Nevertheless, the traffic from SPOKE A host was not able to reach the host behind SPOKE B, even if it were received by the HUB and vpn-route attempted by the checkpoint Gateway HUB, as indicated in the previously shared log data.&lt;/P&gt;&lt;P&gt;After some search through Gen AI, I decided to use a two-star community object, with the same encryption parameters, between each spoke and the hub. With this config, both phases of the tunnel have turned up; traffic from hosts behind Spoke A can reach the HUB and get VPN routed to SPOKE B; Still, this traffic is not being seen by the SPOKE B VPN Gateway.&lt;/P&gt;&lt;P&gt;The Gen AI strictly informs that the VPN Routing scenario, where different vendors' SPOKE VPN gateway and checkpoint HUB gateway are to be used, should be configured that way.&lt;/P&gt;&lt;P&gt;Even if I configured the IPSec tunnel, both ways, I get the same result. No traffic from the host residing behind either of the spokes is reaching the other. Furthermore, there is no issue with traffic from encryption domains residing behind the HUB to the VPN domains behind either of the SPOKEs. I can access a service residing on an encryption domain of SPOKE B from the VPN domain that belongs to the HUB [Checkpoint IPSec VPN Gateway].&lt;/P&gt;</description>
      <pubDate>Mon, 23 Jun 2025 19:29:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/IPSec-tunnel-Setup-HUB-and-SPOKE-Scenario-with-Both-spokes-being/m-p/251804#M42128</guid>
      <dc:creator>SintayehuCSE</dc:creator>
      <dc:date>2025-06-23T19:29:49Z</dc:date>
    </item>
    <item>
      <title>Re: IPSec tunnel Setup [HUB and SPOKE Scenario] with Both spokes being non-checkpoint VPN Gateway</title>
      <link>https://community.checkpoint.com/t5/General-Topics/IPSec-tunnel-Setup-HUB-and-SPOKE-Scenario-with-Both-spokes-being/m-p/252128#M42206</link>
      <description>&lt;P&gt;The problem has been solved. There was a URL filtering rule on the SPOKE A partner. The configuration works that way!&lt;/P&gt;</description>
      <pubDate>Fri, 27 Jun 2025 08:45:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/IPSec-tunnel-Setup-HUB-and-SPOKE-Scenario-with-Both-spokes-being/m-p/252128#M42206</guid>
      <dc:creator>SintayehuCSE</dc:creator>
      <dc:date>2025-06-27T08:45:11Z</dc:date>
    </item>
  </channel>
</rss>

