<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Need Help Setting up New VPN in HA for Verizon M2M in SASE and Remote Access</title>
    <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Need-Help-Setting-up-New-VPN-in-HA-for-Verizon-M2M/m-p/202849#M4204</link>
    <description>&lt;P&gt;I would like some help with this if possible, I inherited this checkpoint setup and don't know how to configure so I was looking for some help. We currently have a Verizon M2M portal that we access using VTI on our firewall 3200's HA setup. I have to update our vpn to a new BGP solution because Verizon is doing away with the setup we have currently, they sent me these requirements but I don't where to start. Per the tech:&lt;/P&gt;&lt;P&gt;Perform this prior this is a sample of what needs to be done:&lt;/P&gt;&lt;P&gt;1. Add VTI interface IP's on Primary&lt;BR /&gt;2. Enable BGP on Primary&lt;BR /&gt;3. Add new backupVPN Circuit&lt;BR /&gt;4. add VTI and BGP on backup Circuit&lt;BR /&gt;5. add Prepend statement on backup circuit&lt;/P&gt;&lt;P&gt;On First Firewall:&lt;/P&gt;&lt;P&gt;Firewall1&lt;BR /&gt;!&lt;BR /&gt;interface Tunnel1&lt;BR /&gt;nameif VTI_interface&lt;BR /&gt;ip address 10.1.1.2 255.255.255.252&lt;BR /&gt;tunnel source interface Outside&lt;BR /&gt;tunnel destination 123.xxx.xxx.38&lt;BR /&gt;tunnel mode ipsec ipv4&lt;BR /&gt;tunnel protection ipsec profile VERIZON&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;router bgp 65535&lt;BR /&gt;bgp log-neighbor-changes&lt;BR /&gt;bgp bestpath compare-routerid&lt;BR /&gt;address-family ipv4 unicast&lt;BR /&gt;neighbor 10.1.1.1 remote-as 6167&lt;BR /&gt;neighbor 10.1.1.1 activate&lt;BR /&gt;network 0.0.0.0&lt;BR /&gt;no auto-summary&lt;BR /&gt;synchronization&lt;BR /&gt;exit-address-family&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;route VTI_interface 10.0.0.0 255.252.0.0 10.1.1.1 1&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;crypto ipsec ikev1 transform-set VTI esp-aes-256 esp-sha-hmac&lt;BR /&gt;crypto ipsec profile VERIZON&lt;BR /&gt;set ikev1 transform-set VTI&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;crypto ikev1 enable Outside&lt;/P&gt;&lt;P&gt;crypto ikev1 policy 40&lt;BR /&gt;authentication pre-share&lt;BR /&gt;encryption aes&lt;BR /&gt;hash sha&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 86400&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;tunnel-group 123.xxx.xxx.38 type ipsec-l2l&lt;BR /&gt;tunnel-group 123.xxx.xxx.38 ipsec-attributes&lt;BR /&gt;ikev1 pre-shared-key *****&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Firewall2&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;interface Tunnel2&lt;BR /&gt;nameif VTI_interface&lt;BR /&gt;ip address 10.1.4.2 255.255.255.252&lt;BR /&gt;tunnel source interface Outside1&lt;BR /&gt;tunnel destination 123.xx.xxx.250&lt;/P&gt;&lt;P&gt;tunnel mode ipsec ipv4&lt;BR /&gt;tunnel protection ipsec profile VERIZON&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;router bgp 65535&lt;BR /&gt;bgp log-neighbor-changes&lt;BR /&gt;bgp bestpath compare-routerid&lt;BR /&gt;address-family ipv4 unicast&lt;BR /&gt;neighbor 10.1.4.1 remote-as 6167&lt;BR /&gt;neighbor 10.1.4.1 activate&lt;BR /&gt;neighbor 10.1.4.1 route-map PREPEND out&lt;BR /&gt;network 0.0.0.0&lt;BR /&gt;no auto-summary&lt;BR /&gt;no synchronization&lt;BR /&gt;exit-address-family&lt;/P&gt;&lt;P&gt;route-map PREPEND permit 10&lt;/P&gt;&lt;P&gt;set as-path prepend 65535 65535&lt;BR /&gt;!&lt;BR /&gt;route-map PREPEND permit 20&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;route VTI_interface 10.0.0.0 255.252.0.0 10.4.1.1 1&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;crypto ipsec ikev1 transform-set VTI esp-aes-256 esp-sha-hmac&lt;BR /&gt;crypto ipsec profile VERIZON&lt;BR /&gt;set ikev1 transform-set VTI&lt;/P&gt;&lt;P&gt;crypto ikev1 enable Outside1&lt;/P&gt;&lt;P&gt;crypto ikev1 policy 40&lt;BR /&gt;authentication pre-share&lt;BR /&gt;encryption aes&lt;BR /&gt;hash sha&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 86400&lt;/P&gt;&lt;P&gt;tunnel-group 123.xxx.xxx.250 type ipsec-l2l&lt;BR /&gt;tunnel-group 123.xxx.xxx.250 ipsec-attributes&lt;BR /&gt;ikev1 pre-shared-key *****&lt;BR /&gt;!&lt;/P&gt;</description>
    <pubDate>Thu, 11 Jan 2024 16:51:08 GMT</pubDate>
    <dc:creator>chueymtz</dc:creator>
    <dc:date>2024-01-11T16:51:08Z</dc:date>
    <item>
      <title>Need Help Setting up New VPN in HA for Verizon M2M</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Need-Help-Setting-up-New-VPN-in-HA-for-Verizon-M2M/m-p/202849#M4204</link>
      <description>&lt;P&gt;I would like some help with this if possible, I inherited this checkpoint setup and don't know how to configure so I was looking for some help. We currently have a Verizon M2M portal that we access using VTI on our firewall 3200's HA setup. I have to update our vpn to a new BGP solution because Verizon is doing away with the setup we have currently, they sent me these requirements but I don't where to start. Per the tech:&lt;/P&gt;&lt;P&gt;Perform this prior this is a sample of what needs to be done:&lt;/P&gt;&lt;P&gt;1. Add VTI interface IP's on Primary&lt;BR /&gt;2. Enable BGP on Primary&lt;BR /&gt;3. Add new backupVPN Circuit&lt;BR /&gt;4. add VTI and BGP on backup Circuit&lt;BR /&gt;5. add Prepend statement on backup circuit&lt;/P&gt;&lt;P&gt;On First Firewall:&lt;/P&gt;&lt;P&gt;Firewall1&lt;BR /&gt;!&lt;BR /&gt;interface Tunnel1&lt;BR /&gt;nameif VTI_interface&lt;BR /&gt;ip address 10.1.1.2 255.255.255.252&lt;BR /&gt;tunnel source interface Outside&lt;BR /&gt;tunnel destination 123.xxx.xxx.38&lt;BR /&gt;tunnel mode ipsec ipv4&lt;BR /&gt;tunnel protection ipsec profile VERIZON&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;router bgp 65535&lt;BR /&gt;bgp log-neighbor-changes&lt;BR /&gt;bgp bestpath compare-routerid&lt;BR /&gt;address-family ipv4 unicast&lt;BR /&gt;neighbor 10.1.1.1 remote-as 6167&lt;BR /&gt;neighbor 10.1.1.1 activate&lt;BR /&gt;network 0.0.0.0&lt;BR /&gt;no auto-summary&lt;BR /&gt;synchronization&lt;BR /&gt;exit-address-family&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;route VTI_interface 10.0.0.0 255.252.0.0 10.1.1.1 1&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;crypto ipsec ikev1 transform-set VTI esp-aes-256 esp-sha-hmac&lt;BR /&gt;crypto ipsec profile VERIZON&lt;BR /&gt;set ikev1 transform-set VTI&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;crypto ikev1 enable Outside&lt;/P&gt;&lt;P&gt;crypto ikev1 policy 40&lt;BR /&gt;authentication pre-share&lt;BR /&gt;encryption aes&lt;BR /&gt;hash sha&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 86400&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;tunnel-group 123.xxx.xxx.38 type ipsec-l2l&lt;BR /&gt;tunnel-group 123.xxx.xxx.38 ipsec-attributes&lt;BR /&gt;ikev1 pre-shared-key *****&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Firewall2&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;interface Tunnel2&lt;BR /&gt;nameif VTI_interface&lt;BR /&gt;ip address 10.1.4.2 255.255.255.252&lt;BR /&gt;tunnel source interface Outside1&lt;BR /&gt;tunnel destination 123.xx.xxx.250&lt;/P&gt;&lt;P&gt;tunnel mode ipsec ipv4&lt;BR /&gt;tunnel protection ipsec profile VERIZON&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;router bgp 65535&lt;BR /&gt;bgp log-neighbor-changes&lt;BR /&gt;bgp bestpath compare-routerid&lt;BR /&gt;address-family ipv4 unicast&lt;BR /&gt;neighbor 10.1.4.1 remote-as 6167&lt;BR /&gt;neighbor 10.1.4.1 activate&lt;BR /&gt;neighbor 10.1.4.1 route-map PREPEND out&lt;BR /&gt;network 0.0.0.0&lt;BR /&gt;no auto-summary&lt;BR /&gt;no synchronization&lt;BR /&gt;exit-address-family&lt;/P&gt;&lt;P&gt;route-map PREPEND permit 10&lt;/P&gt;&lt;P&gt;set as-path prepend 65535 65535&lt;BR /&gt;!&lt;BR /&gt;route-map PREPEND permit 20&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;route VTI_interface 10.0.0.0 255.252.0.0 10.4.1.1 1&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;crypto ipsec ikev1 transform-set VTI esp-aes-256 esp-sha-hmac&lt;BR /&gt;crypto ipsec profile VERIZON&lt;BR /&gt;set ikev1 transform-set VTI&lt;/P&gt;&lt;P&gt;crypto ikev1 enable Outside1&lt;/P&gt;&lt;P&gt;crypto ikev1 policy 40&lt;BR /&gt;authentication pre-share&lt;BR /&gt;encryption aes&lt;BR /&gt;hash sha&lt;BR /&gt;group 2&lt;BR /&gt;lifetime 86400&lt;/P&gt;&lt;P&gt;tunnel-group 123.xxx.xxx.250 type ipsec-l2l&lt;BR /&gt;tunnel-group 123.xxx.xxx.250 ipsec-attributes&lt;BR /&gt;ikev1 pre-shared-key *****&lt;BR /&gt;!&lt;/P&gt;</description>
      <pubDate>Thu, 11 Jan 2024 16:51:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Need-Help-Setting-up-New-VPN-in-HA-for-Verizon-M2M/m-p/202849#M4204</guid>
      <dc:creator>chueymtz</dc:creator>
      <dc:date>2024-01-11T16:51:08Z</dc:date>
    </item>
    <item>
      <title>Re: Need Help Setting up New VPN in HA for Verizon M2M</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Need-Help-Setting-up-New-VPN-in-HA-for-Verizon-M2M/m-p/202954#M4205</link>
      <description>&lt;P&gt;You would need to configure a route-based VPN on the Check Point side.&lt;BR /&gt;See:&amp;nbsp;&lt;A href="https://sc1.checkpoint.com/documents/R81.20/WebAdminGuides/EN/CP_R81.20_SitetoSiteVPN_AdminGuide/Content/Topics-VPNSG/Route-Based-VPN.htm" target="_blank"&gt;https://sc1.checkpoint.com/documents/R81.20/WebAdminGuides/EN/CP_R81.20_SitetoSiteVPN_AdminGuide/Content/Topics-VPNSG/Route-Based-VPN.htm&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 12 Jan 2024 20:05:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Need-Help-Setting-up-New-VPN-in-HA-for-Verizon-M2M/m-p/202954#M4205</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-01-12T20:05:37Z</dc:date>
    </item>
  </channel>
</rss>

