We are trying to setup a route based VPN where all current site to site VPN are now domain based. all VPN communities have their local and remote network defined. However for the route based VPN it seems that the gateway properties VPN domain needs to be configured on User Defined with a empty dummy object?
So we should configure this as follows as displayed in the screenshot? What would happen with the existing domain based VPN will they keep on working with their own community based local and remote networks?
https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_Gaia_AdminGuide/Topics-GAG/VPN-Tun...
When Domain Based VPN and Route Based VPN are configured for a Security Gateway, Domain Based VPN is active by default. You must do two short procedures to make sure that Route Based VPN is always active.
The first procedure configures an empty encryption domain group for your VPN peer Security Gateways. You do this step one time for each Security Management Server
The second step is to make Route Based VPN the default option for all Security Gateways.

Without this setting both IPsec tunnels are up but the tunnel interface topology settings cant be configured to "based on routes". When trying to send traffic via the route based VPN (with static route to peer tunnel IP) traffic is also not matched on the security policy forcing it into the VPN community, so it is not being send into the VPN tunnel. Security policy is correctly configured with these settings using the correct VPN community.
When trying to ping the remote tunnel IP it seems that the reply is currently being dropped, again i believe due to the lack of above setting and defining route based on the tunnel interface topology spoofing settings.
MyIntranet > MyIntranet
MyIntranet > Internal_Clear
Internal_Clear > MyIntranet
Would above setting fix all these issues and could this be done witouth impacting currently active domain based VPNs?