Hi Yuri,
I check the ike_enable_supernet property using GuiDBedit tool and it was already set to false. I also followed Tim's advice but I am still not able to successfully initiate the tunnel. The negotiation fails in phase -2.
As per the scenario, we have two VPN(primary and backup) sites which need to be in VPN community.
Checkpoint side have a subnet of /24
Other side have a subnet of /8 for both gateways
They want us to NAT /32 subnet (each peer GW have a /32 NAT IP), to establish the Site to Site VPN.
I have already followed Scenario 1 in VPN Site-to-Site with 3rd party
subnet_for_range_and_peer = { <peerGW_IP, first_IP_in_range1, last_IP_in_the_range1; subnet_mask>, <peerGW_IP, first_IP_in_range2, last_IP_in_the_range2; subnet_mask>, ... ... ... <peerGW_IP, first_IP_in_rangeN, last_IP_in_the_rangeN; subnet_mask> };
As per the Palo Alto side they have declared the proxy id as
Local : 10.0.0.0/8
peer : 10.10.10.10/32 (replaced for security and compliance reasons)
but during IKE phase 2 Checkpoint negotiates using my public_ip/32 subnet.It should negotiate with 10.10.10.10/32.
What could be the issue? I have worked through all the solutions posted in the checkmates community and still not able to resolve.
FYI, I am using a Checkpoint 3200 with R80.10