This is default behavior according to the design of the Check Point infrastructure used for the EDPC feature. The current design breaks the subnets into different ranges.
For example, the above subnet (10.10.10.0/24) is divided into 3 subnets:
- from 10.10.10.0 to 10.10.10.7
- from 10.10.10.8 to 10.10.10.11 (10.10.10.8/30)
- from 10.10.10.12 to 10.10.10.255
The only tunnels that work are those that require the /30 subnet. However, the current design breaks the connectivity with tunnels that require the /24 subnet.
Check Point validates the source against each range and only negotiates that particular range with the peers.
Eventually, the peers reject it, as they are expecting the /24 subnet in Phase-II negotiations.