Hi spottex,
Thank you for helping out.
By ANY I meant not selecting any criteria (email, IP, DN).
Part 1 - Checkpoint gets connection from Aviatrix
Yeap the first phase was clear to me. I was not sure how Checkpoint behaves if I select no criteria -> if it just accepts the certificate (without any prerequisites) if signed by the selected/mentioned/trusted/imported from Aviatrix CA.
One confusing thing to me is what CA I should select (I assume OPSEC as it's not coming from an External Checkpoint).
Will download the IKEView utility (seems cool, makes it easy to follow what is going on).
Putting here also the helpful link I found while googling for it:
https://support.checkpoint.com/results/sk/sk30994
Part 2 - Aviatrix gets connection from Checkpoint
I already imported the Checkpoint Internal CA inside Aviatrix and there I have a remote identifier field which has to match on Subject or on IP Address (both are present in the internal cert signed by the Checkpoint Internal CA).
Part 3 - other points
I only have 1 x CA on each side so I'm safe on this point. I tried to keep it as simple as possible before increasing complexity so that I can troubleshoot it.
Ah similar stuff you said about Sonicwall applies to Aviatrix (just that I can match on Subject in the Cert or on IP Address).
I added the internal IP given I have a Cloudguard and the IPSEC packets have private IPs before Azure "SNATs" them to the Public IP.
I have R81.10 with the latest update/patch level.
Thank you very much for the tip with those 2 x legacy_ike files and IKEView.
I have now something more to go on. I was feeling like hitting a dead-end.
I also noticed that my "vpnd" process (after playing around with the Certificates and matching criteria) started restarting in a loop.
Basically each time after IKEv1 auth and agreeing on the proposal, when passing to the certificate part -> bam process restart.
That I still investigate now if it's due to me having ECDSA certs (gonna replace with an RSA on Aviatrix side).