- Products
- Learn
- Local User Groups
- Partners
- More
Quantum Spark Management Unleashed!
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
SharePoint CVEs and More!
Hello to all.
This is my first post here. I hope you can help me to address the investigation rightly.
SCENARIO
Main Site - Check Point R77.30
Subnets
Remote Site A - Cisco Meraki MX65. Subnet: 192.168.80.0/24
Remote Site B - 3rd Party Device Router/Firewall. Subnet: 192.168.85.0/24
OBJECTIVES
The objective is to have two site-to-site:
CONFIGURATION
Main Site Face
I created a group in Check Point including first 5 subnets. This group was specified as VPN Domain (Encryption Domain).
I created a policy rule allowing traffic from first 4 subnets to Remote Site A subnet and viceversa.
I created a policy rule allowing traffic from first 5 subnets to Remote Site B subnet and viceversa.
Remote Site A
I specified first 4 as remote subnets.
Remote Site B
I specified first 5 as remote subnets.
PROBLEM
VPNs tunnel go up, however I can reach Remote Sites A and B (and viceversa) from 1st subnet only (172.16.0.0/16).
Can you help me to address the investigation ?
Thank you,
Luca
Hi Luca,
First of all, did you defined the remote objects as Interoperable Devices? The community is defined as One VPN Tunnel per Subnet pair?
The first I can think this is a supperneting issue, where check point is trying to send the entire 172.29.X.X network instead individual ones and the IPSec association does not match for those networks.
You can check the following SK's:
VPN Site-to-Site with 3rd party on Scenario 1 - Wrong IPsec IDs are negotiated during IKE Quick Mode.
New VPN features in R77.20 on Third party connectivity improvements.
Network 5. 192.168.11.0/24 should work also right now for you.
Regards.
Hi Luca,
First of all, did you defined the remote objects as Interoperable Devices? The community is defined as One VPN Tunnel per Subnet pair?
The first I can think this is a supperneting issue, where check point is trying to send the entire 172.29.X.X network instead individual ones and the IPSec association does not match for those networks.
You can check the following SK's:
VPN Site-to-Site with 3rd party on Scenario 1 - Wrong IPsec IDs are negotiated during IKE Quick Mode.
New VPN features in R77.20 on Third party connectivity improvements.
Network 5. 192.168.11.0/24 should work also right now for you.
Regards.
Hello Kenny,
yes, they are defined as Interoperable Devices.
I know Check Point "supernetting" behaviour, but I thought it happened when, multiple subnets were on remote site (source: One VPN Domain per Gateway, multiple encryption domains required). Here the remote site has only one subnet. Isn't it ?
I also made the change, on remote site A, for example, I specified the entire class 172.29.0.0/16 together with 172.16.0.0/16, on but the behavior is the same.
According to SK101219:
The supernetting depends of the local configuration for some parameters on Check Point side, because of this the gateway choice (or not) to adjoin the subnets to a bigger one.
What error messages are you receiving on your VPN logs for "Key Install"? Also, when you execute "vpn tu", how many associations for IKE and IPSEC do you see?
Regards.
You can take a look at this (sk34467: Debugging Site-to-Site VPN | ) to debug your VPN.
"For exact commands, refer to sk63560 - How to run complete VPN debug on Security Gateway to troubleshoot VPN issues?."
Other good SK that can help:
Do you have the "disable NAT in VPN Community" checkbox set in the VPN Community properties (it is not set by default). Is it possible that all the non-172.16.0.0/16 subnets are getting NATted to an address the Cisco is not expecting?
--
My Book "Max Power: Check Point Firewall Performance Optimization"
Second Edition Coming Soon
Hello,
yes "disable NAT in VPN Community" is checkbox selected. Consider we have lot of site-to-site VPNs configured between Check Point and 3rd party devices (Cisco Meraki, FortiGate, Cisco 871, SonicWALL). The described issue appears with some of them (not all). I'm pretty sure it is related to bad/wrong subnet advertisement over the tunnel, like Cisco Meraki support underlined by analyzing logs.
I'll try to enable VPN debug to know what is happening during tunnel connection.
I'll give feedback here.
Thank you guys.
Have you considered that the issue may be over at the peers side and they may have got their policy configuration wrong ?
Hello ALL,
thank you to all of your suggestion, I found "the issue": as you wrote it was supernet related issue.
Check Point supernets two 172.29.0.0/20 and 172.29.16.0/20 into only one network 172.29.0.0/19. I found it by analyzing Check Point SmartLogs for another working VPN. I noticed it supernets the two networks above:
So after fixed it into 3rd party device for not-working VPNs, all start working fine.
Probably if I didn't have working VPN, the only way to know how Check Point supernet two adiacent networks, was to enabled debug, is it right ?
Thank you,
Luca
Correct, the appropriate debugs should have turned this up.
Honestly i would do either 2 ways.
due to the lack of logs without ike view.
- Update to R80.40 and have the possibility within GUI to specify the subnets directly on the community.
If you dont run R80.40 then.
- Configure in user.def so that you have full controll over what is sent over the tunnel.
https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solut...
How to find the user.def
https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solut...
The "subnet_for_range_and_peer" table is designed to force Check Point Security Gateway to negotiate IPsec SAs using a specific subnet mask for a given IP address range:
subnet_for_range_and_peer = { <peerGW_IP, first_IP_in_range1, last_IP_in_the_range1; subnet_mask>, <peerGW_IP, first_IP_in_range2, last_IP_in_the_range2; subnet_mask>, ... ... ... <peerGW_IP, first_IP_in_rangeN, last_IP_in_the_rangeN; subnet_mask> };
"
Example 1:
#ifndef __user_def__ #define __user_def__ // // User defined INSPECT code // subnet_for_range_and_peer = { <192.168.10.20, 10.10.0.1, 10.10.0.254; 255.255.255.0>, <192.168.20.20, 10.10.0.1, 10.10.255.254; 255.255.0.0> }; #endif /* __user_def__ */
In this example, the configuration would work in the following way:
"
Keep inmind in R80.20 you can disable supernetting per community.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
User | Count |
---|---|
18 | |
11 | |
7 | |
7 | |
6 | |
6 | |
6 | |
4 | |
4 | |
3 |
Tue 16 Sep 2025 @ 02:00 PM (EDT)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - AmericasWed 17 Sep 2025 @ 04:00 PM (AEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - APACWed 17 Sep 2025 @ 03:00 PM (CEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - EMEAThu 18 Sep 2025 @ 03:00 PM (CEST)
Bridge the Unmanaged Device Gap with Enterprise Browser - EMEAThu 18 Sep 2025 @ 02:00 PM (EDT)
Bridge the Unmanaged Device Gap with Enterprise Browser - AmericasTue 16 Sep 2025 @ 02:00 PM (EDT)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - AmericasWed 17 Sep 2025 @ 04:00 PM (AEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - APACWed 17 Sep 2025 @ 03:00 PM (CEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - EMEAThu 18 Sep 2025 @ 03:00 PM (CEST)
Bridge the Unmanaged Device Gap with Enterprise Browser - EMEAThu 18 Sep 2025 @ 02:00 PM (EDT)
Bridge the Unmanaged Device Gap with Enterprise Browser - AmericasAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY