<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Palo alto to Checkpoint VPN in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-to-checkpoint-vpn/m-p/29877#M21839</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;1. Yes the PAN device will happily form IPSEC VPNs with Checkpoint.&lt;/P&gt;&lt;P&gt;2. In order to do this you will need to create Proxy IDs on the PAN device's IPSEC VPN. Limit 10 proxies per tunnel interface. ProxyIDs must match the policies on the Checkpoint end of the tunnel or phase 2 will not complete successfully.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;e.g. if CheckPoint has a policy to allow&amp;nbsp; local source IP 10.10.10.10/32 to remote destination IP 172.16.10.10/32 then you need a corresponding ProxyID on the PAN device for local 172.16.10.10/32 remote 10.10.10.10/32. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 17 May 2011 14:35:43 GMT</pubDate>
    <dc:creator>bpappas</dc:creator>
    <dc:date>2011-05-17T14:35:43Z</dc:date>
    <item>
      <title>Palo alto to Checkpoint VPN</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-to-checkpoint-vpn/m-p/29875#M21837</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Is there any body tested the vpn functionality between palo alto to a policy based vpn such checkpoint? Can you guide me the steps on what to do with regards to what policy to allow and how to configure the vpn parameters? also i noticed that there is no option for ipsec sa for group2 with nopfs in palo alto, do you know if this is a limitation in palo alto or is there any reason for this.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 16 May 2011 22:48:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-to-checkpoint-vpn/m-p/29875#M21837</guid>
      <dc:creator>u6960</dc:creator>
      <dc:date>2011-05-16T22:48:13Z</dc:date>
    </item>
    <item>
      <title>Re: Palo alto to Checkpoint VPN</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-to-checkpoint-vpn/m-p/29876#M21838</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I don't have all of the details for connecting with a Checkpoint VPN.&amp;nbsp; Hopefully others can weigh in with that info.&amp;nbsp; The primary thing to keep in mind is that you must configure Proxy IDs in the Advanced section of the IPSec Tunnel configuration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regarding the IPSec SA options, Group 2 means that we'll use Diffie Hellman (DH) group 2 to negotiate a shared secret between the two VPN peers. Group 2 basically dictates a particular public and private key size (DH uses a key pair much like RSA). The shared secret obtained through the DH key negotiation will be used to derive the keys used for the IPSec SA.&amp;nbsp; If you select nopfs (no perfect forward secrecy), this negotiation will not take place and the keying information will be based instead on the secret material exchanged in the phase 1 or IKE SA. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Nick&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 May 2011 00:23:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-to-checkpoint-vpn/m-p/29876#M21838</guid>
      <dc:creator>ncampagna</dc:creator>
      <dc:date>2011-05-17T00:23:41Z</dc:date>
    </item>
    <item>
      <title>Re: Palo alto to Checkpoint VPN</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-to-checkpoint-vpn/m-p/29877#M21839</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;1. Yes the PAN device will happily form IPSEC VPNs with Checkpoint.&lt;/P&gt;&lt;P&gt;2. In order to do this you will need to create Proxy IDs on the PAN device's IPSEC VPN. Limit 10 proxies per tunnel interface. ProxyIDs must match the policies on the Checkpoint end of the tunnel or phase 2 will not complete successfully.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;e.g. if CheckPoint has a policy to allow&amp;nbsp; local source IP 10.10.10.10/32 to remote destination IP 172.16.10.10/32 then you need a corresponding ProxyID on the PAN device for local 172.16.10.10/32 remote 10.10.10.10/32. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 17 May 2011 14:35:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-to-checkpoint-vpn/m-p/29877#M21839</guid>
      <dc:creator>bpappas</dc:creator>
      <dc:date>2011-05-17T14:35:43Z</dc:date>
    </item>
    <item>
      <title>Re: Palo alto to Checkpoint VPN</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-to-checkpoint-vpn/m-p/29878#M21840</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;bpappas ha scritto:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2. In order to do this you will need to create Proxy IDs on the PAN device's IPSEC VPN. Limit 10 proxies per tunnel interface. ProxyIDs must match the policies on the Checkpoint end of the tunnel or phase 2 will not complete successfully.&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt; Does that mean that I need to create 10 tunnel interface (tab Network -&amp;gt; Interfaces) if I have 100 Proxy ID in total (10 Proxy ID per tunnel interface) ?&lt;/P&gt;&lt;P&gt;I supposed I had to create 10 different phases 2 but with the same tunnel interface (and so the same phase1), that would be unique and the same for all 100 Proxy ID...&lt;/P&gt;&lt;P&gt;It's very important.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Many thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 24 May 2011 10:52:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-to-checkpoint-vpn/m-p/29878#M21840</guid>
      <dc:creator>migration</dc:creator>
      <dc:date>2011-05-24T10:52:35Z</dc:date>
    </item>
    <item>
      <title>Re: Palo alto to Checkpoint VPN</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-to-checkpoint-vpn/m-p/29879#M21841</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;one tunnel interface will support 10 proxyIDs&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;so if you have 100 proxy IDs that will require 10 tunnel interfaces and 10 IPSEC VPNs (1 VPN per tunnel interface, 10 proxyIDs per tunnel/IPSEC VPN)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 24 May 2011 15:15:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/palo-alto-to-checkpoint-vpn/m-p/29879#M21841</guid>
      <dc:creator>bpappas</dc:creator>
      <dc:date>2011-05-24T15:15:44Z</dc:date>
    </item>
  </channel>
</rss>

