<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: IPSEC compression in Spark Firewall (SMB)</title>
    <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/IPSEC-compression/m-p/17271#M577</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Okay, thanks a lot for your answers. Not a big issue for me, I just wanted to make sure that I don‘t overlook the place of configuration.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 16 Nov 2018 18:45:19 GMT</pubDate>
    <dc:creator>Stephan_Kremer</dc:creator>
    <dc:date>2018-11-16T18:45:19Z</dc:date>
    <item>
      <title>IPSEC compression</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/IPSEC-compression/m-p/17267#M573</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I established a site-to-site VPN between a 600 appliance and an old UTM-1 edge. Both devices support IPSEC compression related to their datasheets, but the tunnel is established without.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I find no options at all to check this. Any help is welcome.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Stephan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Nov 2018 15:22:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/IPSEC-compression/m-p/17267#M573</guid>
      <dc:creator>Stephan_Kremer</dc:creator>
      <dc:date>2018-11-16T15:22:22Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC compression</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/IPSEC-compression/m-p/17268#M574</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here's where you set it on the 600 Series:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-1 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/74599_pastedImage_2.png" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I don't believe there is a specific setting on the UTM-1 EDGE appliance to enable it, but the way I understand it, if the other side is configured to support it, the UTM-1 EDGE will use it.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Nov 2018 17:18:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/IPSEC-compression/m-p/17268#M574</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-11-16T17:18:38Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC compression</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/IPSEC-compression/m-p/17269#M575</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I found that advanced setting, but it does not change the behaviour. Still no compression with the tunnel...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Nov 2018 18:03:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/IPSEC-compression/m-p/17269#M575</guid>
      <dc:creator>Stephan_Kremer</dc:creator>
      <dc:date>2018-11-16T18:03:06Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC compression</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/IPSEC-compression/m-p/17270#M576</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It looks like it's a setting for&amp;nbsp;VPN clients (i.e. what Remote Access means), not site-to-site VPN.&lt;/P&gt;&lt;P&gt;I know with &lt;EM&gt;&lt;STRONG&gt;centrally managed&lt;/STRONG&gt;&lt;/EM&gt; SMB appliances, you can configure IP Compression in the VPN Community.&lt;/P&gt;&lt;P&gt;There does not appear to be a way to enable this option for local management.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Nov 2018 18:34:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/IPSEC-compression/m-p/17270#M576</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-11-16T18:34:32Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC compression</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/IPSEC-compression/m-p/17271#M577</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Okay, thanks a lot for your answers. Not a big issue for me, I just wanted to make sure that I don‘t overlook the place of configuration.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Nov 2018 18:45:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/IPSEC-compression/m-p/17271#M577</guid>
      <dc:creator>Stephan_Kremer</dc:creator>
      <dc:date>2018-11-16T18:45:19Z</dc:date>
    </item>
    <item>
      <title>Re: IPSEC compression</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/IPSEC-compression/m-p/17272#M578</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Compression should really only be enabled for slow connections (e.g. Remote Access). On high speed site-to-site VPNs it will more likely cause performance issues, especially on SMB.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Nov 2018 19:07:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/IPSEC-compression/m-p/17272#M578</guid>
      <dc:creator>HristoGrigorov</dc:creator>
      <dc:date>2018-11-16T19:07:42Z</dc:date>
    </item>
  </channel>
</rss>

