<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: VPNs between Palo and Check Point in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/vpns-between-palo-and-check-point/m-p/3391#M2522</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;we have some customers working like this, you need to create a phase1 to remote peer and if you need 20 proxyIDs you must&amp;nbsp; create 2 tunnels with the same phase1 but diferrent phase2 each tunnel with 10 proxyID, remember to add the correct routes to each new tunnel.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But this works perfectly!!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Albert Estevez &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 10 Feb 2011 08:44:28 GMT</pubDate>
    <dc:creator>aestevez</dc:creator>
    <dc:date>2011-02-10T08:44:28Z</dc:date>
    <item>
      <title>VPNs between Palo and Check Point</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpns-between-palo-and-check-point/m-p/3386#M2517</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello all,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm hoping that somebody may be able to answer a few questions I have about the configuration of Palo Alto firewalls please?&lt;/P&gt;&lt;P&gt;Most of my experience in recent years has been with Check Point firewalls.&amp;nbsp; I've found that most things can be done in a very similar way with Palo Altos but I have a few questions - about site to site VPNs in particular.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have set up a simple testbed with a Check Point firewall (traditional mode) and a Palo Alto firewall each with an inside and outside interface.&amp;nbsp; For end to end testing there is a Windows XP machine behind each as below.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;WinXP&lt;SPAN style="font-size: 8pt;"&gt;(192.168.1.2/24)&lt;/SPAN&gt;---&lt;SPAN style="font-size: 8pt;"&gt;(192.168.1.1/24)&lt;/SPAN&gt;PaloAlto&lt;SPAN style="font-size: 8pt;"&gt;(172.16.1.1/30)&lt;/SPAN&gt;====&lt;SPAN style="font-size: 8pt;"&gt;(172.16.1.2/30)&lt;/SPAN&gt;CheckPoint&lt;SPAN style="font-size: 8pt;"&gt;(192.168.5.1/24)&lt;/SPAN&gt;---&lt;SPAN style="font-size: 8pt;"&gt;(192.168.5.2/24)&lt;/SPAN&gt;WinXP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In order to get this working I have:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1) Confired IKE and IPSec Cryptos in PA to match CP&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2) Created tunnel interface and selected virtual router and new zone&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 3) Created IKE gateway specifying local interface, local IP, remote IP, pre-shared key and selected IKE crypto profile&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 4) Created IPSec tunnel specifying tunnel interface, IKE gateway (pulling in some values) and selecting IPSec crypto profile&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 4a) Added a proxy ID with Local of 192.168.1.0/24 and remote of 192.168.5.0/24&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 5) Add a static route to virtual router with destination of 192.168.5.0/24 and tunnel created above as interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've done the equivalent on the CP box and allowed all traffic between both subnets in both policies.&amp;nbsp; All seems to work fine.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;So my questions are:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 1) Is this the best way do do this please?&amp;nbsp; If so, when the CP box is replaced with a PA box will it still be the best way?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2) Most of my sites have at least three networks behind them.&amp;nbsp; Do I need to add proxy IDs for every possible combination please?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For example,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If &lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; site A had subnets 192.168.1.0/24, 192.168.2.0/24 and 192.168.3.0/24 &lt;BR /&gt;and&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; site B had subnets 192.168.5.0/24, 192.168.6.0/24 and 192.168.7.0/24&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;would I need&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Proxy ID name proxy01 Local ID 192.168.1.0/24 Remote ID 192.168.5.0/24 Protocol Any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Proxy ID name proxy02 Local ID 192.168.1.0/24 Remote ID 192.168.6.0/24 Protocol Any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Proxy ID name proxy03 Local ID 192.168.1.0/24 Remote ID 192.168.7.0/24 Protocol Any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Proxy ID name proxy04 Local ID 192.168.2.0/24 Remote ID 192.168.5.0/24 Protocol Any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Proxy ID name proxy05 Local ID 192.168.2.0/24 Remote ID 192.168.6.0/24 Protocol Any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Proxy ID name proxy06 Local ID 192.168.2.0/24 Remote ID 192.168.7.0/24 Protocol Any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Proxy ID name proxy07 Local ID 192.168.3.0/24 Remote ID 192.168.5.0/24 Protocol Any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Proxy ID name proxy08 Local ID 192.168.3.0/24 Remote ID 192.168.6.0/24 Protocol Any&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Proxy ID name proxy09 Local ID 192.168.3.0/24 Remote ID 192.168.7.0/24 Protocol Any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm sorry if these questions seem silly or this has been covered elsewhere.&amp;nbsp; I've had a good look around and not found much info.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any help would really be appreciated!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Many thanks,&lt;BR /&gt;Dave&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 Feb 2011 14:28:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpns-between-palo-and-check-point/m-p/3386#M2517</guid>
      <dc:creator>DavePalo</dc:creator>
      <dc:date>2011-02-08T14:28:16Z</dc:date>
    </item>
    <item>
      <title>Re: VPNs between Palo and Check Point</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpns-between-palo-and-check-point/m-p/3387#M2518</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You have configured it appropriately. PA implements route based VPNs so the default network IDs or Proxy IDs will be 0.0.0.0/0. The default limit on the number of supported Proxy ID's is 10 so the IDs listed falls under that limit. Otherwise, you look good.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Renato&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 Feb 2011 16:27:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpns-between-palo-and-check-point/m-p/3387#M2518</guid>
      <dc:creator>gswcowboy</dc:creator>
      <dc:date>2011-02-08T16:27:38Z</dc:date>
    </item>
    <item>
      <title>Re: VPNs between Palo and Check Point</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpns-between-palo-and-check-point/m-p/3388#M2519</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for your reply Renato!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm glad that I'm going the right way although slightly concerned about the limit of 10 Proxy IDs.&amp;nbsp; I'm not sure that this will be enough in some cases.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Do you know if the limit can be increased please?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Dave&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 Feb 2011 16:54:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpns-between-palo-and-check-point/m-p/3388#M2519</guid>
      <dc:creator>DavePalo</dc:creator>
      <dc:date>2011-02-08T16:54:42Z</dc:date>
    </item>
    <item>
      <title>Re: VPNs between Palo and Check Point</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpns-between-palo-and-check-point/m-p/3389#M2520</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Dave,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Unfortunately, increasing the limit would be considered a feature request and those go through your SE. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Renato&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 Feb 2011 17:16:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpns-between-palo-and-check-point/m-p/3389#M2520</guid>
      <dc:creator>gswcowboy</dc:creator>
      <dc:date>2011-02-08T17:16:43Z</dc:date>
    </item>
    <item>
      <title>Re: VPNs between Palo and Check Point</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpns-between-palo-and-check-point/m-p/3390#M2521</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;@dyoung: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The limit is per unique tunnel. Each tunnel can have up to 10 proxy IDs. If you need more proxy IDs to the remote location you can configure a second tunnel to the VPN peer for the other proxy IDs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-benjamin&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 Feb 2011 17:17:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpns-between-palo-and-check-point/m-p/3390#M2521</guid>
      <dc:creator>bpappas</dc:creator>
      <dc:date>2011-02-08T17:17:45Z</dc:date>
    </item>
    <item>
      <title>Re: VPNs between Palo and Check Point</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpns-between-palo-and-check-point/m-p/3391#M2522</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;we have some customers working like this, you need to create a phase1 to remote peer and if you need 20 proxyIDs you must&amp;nbsp; create 2 tunnels with the same phase1 but diferrent phase2 each tunnel with 10 proxyID, remember to add the correct routes to each new tunnel.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But this works perfectly!!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Albert Estevez &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 10 Feb 2011 08:44:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpns-between-palo-and-check-point/m-p/3391#M2522</guid>
      <dc:creator>aestevez</dc:creator>
      <dc:date>2011-02-10T08:44:28Z</dc:date>
    </item>
    <item>
      <title>Re: VPNs between Palo and Check Point</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpns-between-palo-and-check-point/m-p/3392#M2523</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That's great - many thanks for your help everybody!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 10 Feb 2011 10:10:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpns-between-palo-and-check-point/m-p/3392#M2523</guid>
      <dc:creator>DavePalo</dc:creator>
      <dc:date>2011-02-10T10:10:09Z</dc:date>
    </item>
    <item>
      <title>Re: VPNs between Palo and Check Point</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpns-between-palo-and-check-point/m-p/3393#M2524</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;P&gt;aestevez ha scritto:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;we have some customers working like this, you need to create a phase1 to remote peer and if you need 20 proxyIDs you must&amp;nbsp; create 2 tunnels with the same phase1 but diferrent phase2 each tunnel with 10 proxyID, remember to add the correct routes to each new tunnel.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But this works perfectly!!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Albert Estevez&lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;Hi!&lt;/P&gt;&lt;P&gt;Do I need to create 2 different tunnel interfaces (tab Network -&amp;gt; Interfaces)&amp;nbsp; or only 2 differents phase2 with the same tunnel interface?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 24 May 2011 10:57:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpns-between-palo-and-check-point/m-p/3393#M2524</guid>
      <dc:creator>migration</dc:creator>
      <dc:date>2011-05-24T10:57:51Z</dc:date>
    </item>
    <item>
      <title>Re: VPNs between Palo and Check Point</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpns-between-palo-and-check-point/m-p/3394#M2525</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Iceman,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;you will need to define 2 different tunnels and define the correct static routes to return the traffic for each tunnel interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope this help to you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Remember that at the end you will have 2 ipsec tunnels sharing the same ike gateway and the same phase1 and phase2 but each ipsec tunnel will be attached to a different tunnel interface and routes how maximum 10 () proxy-id by tunnel.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rergards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Albert&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 24 May 2011 14:16:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpns-between-palo-and-check-point/m-p/3394#M2525</guid>
      <dc:creator>alestevez</dc:creator>
      <dc:date>2011-05-24T14:16:46Z</dc:date>
    </item>
    <item>
      <title>Re: VPNs between Palo and Check Point</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpns-between-palo-and-check-point/m-p/3395#M2526</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Checkpoint allows setting upp only one tunnel between ike gateways. That means there is no need to specify each and every proxy-id or worrying about having multiple tunnel interfaces with their respective routes. Simply use the default proxy-id in the PAN (0.0.0.0/0)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I remember correctly this is a setting on the "interop device" in CP.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 07 Jul 2011 08:42:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpns-between-palo-and-check-point/m-p/3395#M2526</guid>
      <dc:creator>rapoint_person</dc:creator>
      <dc:date>2011-07-07T08:42:07Z</dc:date>
    </item>
    <item>
      <title>Re: VPNs between Palo and Check Point</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpns-between-palo-and-check-point/m-p/3396#M2527</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Oskar,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I remember trying that (using 3.1.7) and I found that tunnels from Palo to CP established OK but tunnels from CP to Palo failed because the Palo complained about not having a matching proxy id.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the end I had to create a proxyid to match each network I had defined in the Check Point firewall object topology.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;All worked OK then.&amp;nbsp; Maybe this behaviour has changed in later versions.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Dave&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 07 Jul 2011 09:03:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpns-between-palo-and-check-point/m-p/3396#M2527</guid>
      <dc:creator>DavePalo</dc:creator>
      <dc:date>2011-07-07T09:03:58Z</dc:date>
    </item>
    <item>
      <title>Re: VPNs between Palo and Check Point</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpns-between-palo-and-check-point/m-p/3397#M2528</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No issues what so ever. Have used it a couple of times. In fact, I have been forced to get it working when having a CP firewall in a large VPN-mesh. The CP had loads of small networks that would require a ridiculous amount of routes and tunnel interfaces on all the PAN devices. I'd say it wasn’t an option in that particular case.&amp;nbsp; R65 versions and later (Checkpoint) work as far as I know.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 07 Jul 2011 09:14:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpns-between-palo-and-check-point/m-p/3397#M2528</guid>
      <dc:creator>rapoint_person</dc:creator>
      <dc:date>2011-07-07T09:14:22Z</dc:date>
    </item>
    <item>
      <title>Re: VPNs between Palo and Check Point</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpns-between-palo-and-check-point/m-p/3398#M2529</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Interesting.&amp;nbsp; Was your CP in "Traditional" or "Simple" mode as this may affect how the tunnels are negotiated?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I had quite a few little networks on CP too!&amp;nbsp; Would have preferred to get it working as you suggested,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Dave &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 07 Jul 2011 09:34:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpns-between-palo-and-check-point/m-p/3398#M2529</guid>
      <dc:creator>DavePalo</dc:creator>
      <dc:date>2011-07-07T09:34:32Z</dc:date>
    </item>
    <item>
      <title>Re: VPNs between Palo and Check Point</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/vpns-between-palo-and-check-point/m-p/3399#M2530</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Always used simple mode when setting it up this way.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope you get it working!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers,&lt;/P&gt;&lt;P&gt;/Oskar&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 07 Jul 2011 09:50:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/vpns-between-palo-and-check-point/m-p/3399#M2530</guid>
      <dc:creator>rapoint_person</dc:creator>
      <dc:date>2011-07-07T09:50:52Z</dc:date>
    </item>
  </channel>
</rss>

