This answer is provided by Infinity AI Copilot and should be confirmed by reviewing official documentation in Support Center.
The "One Tunnel per Gateway pair" option is indeed a valid and supported configuration for Policy-based IPsec VPNs in Check Point environments. This setting creates a single VPN tunnel between peer Security Gateways, which is shared by all hosts behind each peer gateway. This can be beneficial in scenarios where you have many small subnets or hosts, as it simplifies the tunnel management by reducing the number of tunnels required.
In your case, switching to "One Tunnel per Gateway pair" resolved the VPN issues you were experiencing with the "One tunnel per subnet pair" option. This is because the former option aggregates all traffic between the gateways into a single tunnel, which can help in environments with complex or numerous subnets.
Regarding the encryption domain, even when using the "One Tunnel per Gateway pair" option, the traffic is still processed according to the defined encryption domains. This means that the traffic selectors are still respected, and only the traffic that matches the encryption domain will be allowed through the tunnel.
While this configuration is generally more associated with route-based VPNs, it can be used effectively with policy-based VPNs, especially in complex network environments. Your tests confirming that it works as expected align with Check Point's capabilities.
For more detailed information, you can refer to the R82 Site to Site VPN Administration Guide.