<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Creating multiple VPN site to site connections on CheckPoint in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/Creating-multiple-VPN-site-to-site-connections-on-CheckPoint/m-p/34837#M7317</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;For this solution work on 3-Party devices as well right?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 20 Sep 2018 16:26:20 GMT</pubDate>
    <dc:creator>Worapong_Janloy</dc:creator>
    <dc:date>2018-09-20T16:26:20Z</dc:date>
    <item>
      <title>Creating multiple VPN site to site connections on CheckPoint</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Creating-multiple-VPN-site-to-site-connections-on-CheckPoint/m-p/34834#M7314</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Dear Team,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is it possible to create mutiple VPN site to site connections between one CheckPoint FW and multiple external gateways ?&lt;/P&gt;&lt;P&gt;If yes, Could you please help me on this scenario:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- On HQ, I have a CheckPoint FW with two subnets: 192.168.1.0/24 and 192.168.2.0/24.&lt;/P&gt;&lt;P&gt;- Site A: subnet: 192.168.3.0/24&lt;/P&gt;&lt;P&gt;- Site B: subnet: 192.168.4.0/24.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Site A only can access to the subnet 192.168.1.0/24 and Site B only can access to the subnet 192.168.2.0/24.&lt;/P&gt;&lt;P&gt;I have some troubles in some points:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- On CHKP FW, defining local encryption domain, I need contains all two subnets, right ?&lt;/P&gt;&lt;P&gt;- On Site A GW_A: I define local subnet is 192.168.3.0/24 but remote subnet is contain both subnet 1.0/24 and 2.0/24 or only one subnet 192.168.1.0/24 ?&lt;/P&gt;&lt;P&gt;- Tunnel sharing on CHKP: I need to use one tunnel per a pair of subnet or one tunnel per a pair of GW ?&lt;/P&gt;&lt;P&gt;- Do I need to use VTI on CHKP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks all , &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;P&gt;Best regards,&lt;/P&gt;&lt;P&gt;Kiet NGUYEN.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 11 Mar 2018 10:19:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Creating-multiple-VPN-site-to-site-connections-on-CheckPoint/m-p/34834#M7314</guid>
      <dc:creator>KietN_NGUYEN</dc:creator>
      <dc:date>2018-03-11T10:19:12Z</dc:date>
    </item>
    <item>
      <title>Re: Creating multiple VPN site to site connections on CheckPoint</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Creating-multiple-VPN-site-to-site-connections-on-CheckPoint/m-p/34835#M7315</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Are all the VPN gateways Check Point devices and managed by you and connected to the same management server? If yes to everything, then it is a very easy setup.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL style="list-style-type: square;"&gt;&lt;LI&gt;HQ FW: VPN-Domain =&amp;nbsp;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;192.168.1.0/24, 192.168.2.0/24,&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI style="color: #333333; background-color: #ffffff; border: 0px;"&gt;Site A&amp;nbsp;&lt;SPAN style="color: #3d3d3d;"&gt;FW&lt;/SPAN&gt;: &lt;SPAN style="color: #3d3d3d;"&gt;VPN-Domain =&amp;nbsp;&lt;/SPAN&gt;192.168.3.0/24&lt;/LI&gt;&lt;LI style="color: #333333; background-color: #ffffff; border: 0px;"&gt;Site B&amp;nbsp;&lt;SPAN style="color: #3d3d3d;"&gt;FW&lt;/SPAN&gt;: &lt;SPAN style="color: #3d3d3d;"&gt;VPN-Domain =&amp;nbsp;&lt;/SPAN&gt;192.168.4.0/24&lt;/LI&gt;&lt;/UL&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px;"&gt;Then you add all three FWs to a community - Star or Meshed. If Meshed then all gateways will be of the same level of importance and can communicate to eah other. If Star then you can choose center gateways (HQ) and satellite gateways (Site A, Site B). For Star community you can also choose options of routing traffic trough VPN:&lt;/P&gt;&lt;UL style="list-style-type: square;"&gt;&lt;LI&gt;To center only.&lt;/LI&gt;&lt;LI&gt;To center and to other satellites through center.&lt;/LI&gt;&lt;LI&gt;To center, or through the center to other satellites, to internet and other VPN targets.&lt;/LI&gt;&lt;/UL&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px;"&gt;&lt;/P&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px;"&gt;As for the settings "One VPN tunnel per&amp;nbsp;...", the best option would be to go with &lt;STRONG style="font-size: 12px;"&gt;One VPN tunnel per subnet pair&lt;/STRONG&gt;. It will provide more security that &lt;STRONG style="font-size: 12px;"&gt;One VPN tunnel per Gateway pair&lt;/STRONG&gt;, and not overflow gateway tables in case you have many-many networks and hosts behind gateways as in&amp;nbsp;&lt;STRONG style="font-size: 12px;"&gt;One VPN tunnel per each pair of hosts&lt;/STRONG&gt;.&lt;/P&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px;"&gt;There is no need in VTI in simple cases like this.&lt;/P&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px;"&gt;&lt;/P&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px;"&gt;And then you just need to create proper firewall/access rules to provide this part:&lt;/P&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px;"&gt;&lt;SPAN&gt;"&lt;EM&gt;Site A only can access to the subnet 192.168.1.0/24 and Site B only can access to the subnet 192.168.2.0/24.&lt;/EM&gt;"&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px;"&gt;&lt;/P&gt;&lt;TABLE class="j-table jiveBorder" style="border: 1px solid #c6c6c6;" width="100%"&gt;&lt;THEAD&gt;&lt;TR style="background-color: #efefef; height: 24px;"&gt;&lt;TH style="height: 24px; width: 20%;"&gt;Source&lt;/TH&gt;&lt;TH style="height: 24px; width: 20%;"&gt;Destination&lt;/TH&gt;&lt;TH style="height: 24px; width: 20.7459%;"&gt;VPN&lt;/TH&gt;&lt;TH style="height: 24px; width: 15.2541%;"&gt;Service&lt;/TH&gt;&lt;TH style="height: 24px; width: 14%;"&gt;Action&lt;/TH&gt;&lt;/TR&gt;&lt;/THEAD&gt;&lt;TBODY&gt;&lt;TR style="height: 24px;"&gt;&lt;TD style="height: 24px; width: 20%;"&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;192.168.3.0/24&lt;/SPAN&gt;&lt;/TD&gt;&lt;TD style="height: 24px; width: 20%;"&gt;&lt;EM style="color: #333333; background-color: #ffffff;"&gt;192.168.1.0/24&lt;/EM&gt;&lt;/TD&gt;&lt;TD style="height: 24px; width: 20.7459%;"&gt;VPN_Community&lt;/TD&gt;&lt;TD style="height: 24px; width: 15.2541%;"&gt;Any&lt;/TD&gt;&lt;TD style="height: 24px; width: 14%;"&gt;Allow&lt;/TD&gt;&lt;/TR&gt;&lt;TR style="height: 24px;"&gt;&lt;TD style="height: 24px; width: 20%;"&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;192.168.4.0/24&lt;/SPAN&gt;&lt;/TD&gt;&lt;TD style="height: 24px; width: 20%;"&gt;&lt;EM style="color: #333333; background-color: #ffffff;"&gt;192.168.2.0/24&lt;/EM&gt;&lt;/TD&gt;&lt;TD style="height: 24px; width: 20.7459%;"&gt;&lt;SPAN&gt;VPN_Community&lt;/SPAN&gt;&lt;/TD&gt;&lt;TD style="height: 24px; width: 15.2541%;"&gt;&lt;SPAN&gt;Any&lt;/SPAN&gt;&lt;/TD&gt;&lt;TD style="height: 24px; width: 14%;"&gt;&lt;SPAN&gt;Allow&lt;/SPAN&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&lt;A class="link-titled" href="https://sc1.checkpoint.com/documents/R80.10/SmartConsole_OLH/EN/NFHf4E9NLQBJlVkHRpc16w2.htm#o162301" title="https://sc1.checkpoint.com/documents/R80.10/SmartConsole_OLH/EN/NFHf4E9NLQBJlVkHRpc16w2.htm#o162301"&gt;Configuring Site to Site VPN Rules in the Access Policy&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 11 Mar 2018 11:57:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Creating-multiple-VPN-site-to-site-connections-on-CheckPoint/m-p/34835#M7315</guid>
      <dc:creator>AlekseiShelepov</dc:creator>
      <dc:date>2018-03-11T11:57:14Z</dc:date>
    </item>
    <item>
      <title>Re: Creating multiple VPN site to site connections on CheckPoint</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Creating-multiple-VPN-site-to-site-connections-on-CheckPoint/m-p/34836#M7316</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi&amp;nbsp;Aleksei Shelepov,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I appreciate your help. But unfortunately, two devices in two sites is other devices ( not CheckPoint). Can I define two separate VPN Community domain for it ? Or I really need define only one community domain ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I can define only one encryption domain, how can I setup it ?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks so much for your help,&lt;/P&gt;&lt;P&gt;Kiet.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 21 Mar 2018 15:35:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Creating-multiple-VPN-site-to-site-connections-on-CheckPoint/m-p/34836#M7316</guid>
      <dc:creator>KietN_NGUYEN</dc:creator>
      <dc:date>2018-03-21T15:35:58Z</dc:date>
    </item>
    <item>
      <title>Re: Creating multiple VPN site to site connections on CheckPoint</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Creating-multiple-VPN-site-to-site-connections-on-CheckPoint/m-p/34837#M7317</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;For this solution work on 3-Party devices as well right?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 20 Sep 2018 16:26:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Creating-multiple-VPN-site-to-site-connections-on-CheckPoint/m-p/34837#M7317</guid>
      <dc:creator>Worapong_Janloy</dc:creator>
      <dc:date>2018-09-20T16:26:20Z</dc:date>
    </item>
    <item>
      <title>Re: Creating multiple VPN site to site connections on CheckPoint</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Creating-multiple-VPN-site-to-site-connections-on-CheckPoint/m-p/34838#M7318</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This is a&amp;nbsp;too broad question. And the general answer is yes, this is how VPN configured on Check Point. The main difference will be to add 3rd party devices as Interoperable devices. And of course settings on both sides of VPN must be the same - encryption, hash, networks for VPN. Here I described without getting in some details how to configure VPN on Check Point devices.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It would be better to read VPN Admin Guide first:&lt;/P&gt;&lt;P&gt;&lt;A class="link-titled" href="https://sc1.checkpoint.com/documents/R77/CP_R77_VPN_AdminGuide/html_frameset.htm" title="https://sc1.checkpoint.com/documents/R77/CP_R77_VPN_AdminGuide/html_frameset.htm"&gt;VPN Administration Guide R77&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://sc1.checkpoint.com/documents/R80.10/WebAdminGuides/EN/CP_R80.10_SitetoSiteVPN_AdminGuide/html_frameset.htm"&gt;VPN Administration Guide R80.10&lt;/A&gt;&lt;/P&gt;&lt;P&gt;And check SK database:&lt;/P&gt;&lt;P&gt;&lt;A class="link-titled" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk108600" title="https://supportcenter.checkpoint.com/supportcenter/portal"&gt;VPN Site-to-Site with 3rd party&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A class="link-titled" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk34467" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk34467"&gt;Debugging Site-to-Site VPN&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 20 Sep 2018 21:30:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Creating-multiple-VPN-site-to-site-connections-on-CheckPoint/m-p/34838#M7318</guid>
      <dc:creator>AlekseiShelepov</dc:creator>
      <dc:date>2018-09-20T21:30:40Z</dc:date>
    </item>
    <item>
      <title>Re: Creating multiple VPN site to site connections on CheckPoint</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Creating-multiple-VPN-site-to-site-connections-on-CheckPoint/m-p/34839#M7319</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;While a given gateway can peer with many VPN endpoints, only one encryption domain can be defined per gateway.&lt;/P&gt;&lt;P&gt;The encryption domain would include all subnets behind a given gateway (or a subset thereof).&lt;/P&gt;&lt;P&gt;In&amp;nbsp;your situation, it would include 192.168.3.0/24 and 192.168.4.0/24.&lt;/P&gt;&lt;P&gt;The rules would be configured as &lt;A href="https://community.checkpoint.com/migrated-users/45132"&gt;Aleksei Shelepov&lt;/A&gt;‌ described in his initial post.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 21 Sep 2018 16:28:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Creating-multiple-VPN-site-to-site-connections-on-CheckPoint/m-p/34839#M7319</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-09-21T16:28:25Z</dc:date>
    </item>
  </channel>
</rss>

