<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: R81.10 Site to Site VPN Config between two Gateways hosted in Azure - full documentation in Cloud Firewall</title>
    <link>https://community.checkpoint.com/t5/Cloud-Firewall/R81-10-Site-to-Site-VPN-Config-between-two-Gateways-hosted-in/m-p/171472#M862</link>
    <description>&lt;P&gt;Great write-up. Thanks for sharing!&amp;nbsp;&lt;span class="lia-unicode-emoji" title=":thumbs_up:"&gt;👍&lt;/span&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 14 Feb 2023 17:52:46 GMT</pubDate>
    <dc:creator>Danny</dc:creator>
    <dc:date>2023-02-14T17:52:46Z</dc:date>
    <item>
      <title>R81.10 Site to Site VPN Config between two Gateways hosted in Azure - full documentation</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/R81-10-Site-to-Site-VPN-Config-between-two-Gateways-hosted-in/m-p/158951#M861</link>
      <description>&lt;P&gt;I have documented here the Site to Site VPN config between two Check Point R81.10 Gateways hosted in Azure Cloud, managed also by Azure Hosted IaaS Security Management Server. Attached also the Word document.&lt;/P&gt;&lt;P&gt;&lt;LI-PRODUCT title="Cloud Network Security" id="Cloud-Network-Security"&gt;&lt;/LI-PRODUCT&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Firewall deployment &amp;amp; VNET level configs, used for this VPN S2S setup are documented here:&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.checkpoint.com/t5/Cloud-Network-Security/R81-10-Single-Gateway-Azure-deployment/m-p/158745#M3359" target="_blank"&gt;https://community.checkpoint.com/t5/Cloud-Network-Security/R81-10-Single-Gateway-Azure-deployment/m-p/158745#M3359&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Configuring Site To Site VPN between 2 Check Point Gateways hosted in Azure&lt;/P&gt;&lt;P&gt;Version 1.0&lt;/P&gt;&lt;P&gt;6 October 2022&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Configuration description:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;U&gt;Firewall Management Servers&lt;/U&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;A single Management server is managing both Gateways&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;U&gt;Gateways&lt;/U&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;westSG protecting VNET1 10.0.0.0/16&lt;/LI&gt;&lt;LI&gt;northSG protecting VNET2 10.2.0.0/16&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;U&gt;Services &amp;amp; VMs that need to communicate via VPN&lt;/U&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;west-webserver hosted in VNET1 à subnet 10.0.2.0/24&lt;/LI&gt;&lt;LI&gt;north-webserver hosted in VNET2 à subnet 10.2.2.0/24&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;U&gt;Existing environment setup&lt;/U&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;On both VNET1 and VNET2, the subnets where the webservers are hosted are configured as “Hide behind the Gateway”.&lt;UL&gt;&lt;LI&gt;This setting is the basic config for the Azure hosted assets to have Internet Access via the Check Point Security gateway à config on network object&lt;UL&gt;&lt;LI&gt;Automatic NAT Rules are enabled&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;U&gt;Existing configuration is documented here:&lt;/U&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://community.checkpoint.com/t5/Cloud-Network-Security/R81-10-Single-Gateway-Azure-deployment/m-p/157618#M3308" target="_blank"&gt;https://community.checkpoint.com/t5/Cloud-Network-Security/R81-10-Single-Gateway-Azure-deployment/m-p/157618#M3308&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Site to Site VPN Configuration Steps&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Enable IPsec VPN software blade on both Gateways --&amp;gt; General Properies --&amp;gt; Network Security TAB --&amp;gt; Check The IPSec VPN tick box --&amp;gt; Click OK to save the configuration.&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="andreibo_0-1665074035098.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/18039iD2144F4E4136B7FC/image-size/medium?v=v2&amp;amp;px=400" role="button" title="andreibo_0-1665074035098.png" alt="andreibo_0-1665074035098.png" /&gt;&lt;/span&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="andreibo_1-1665074035101.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/18041iC8D6A46B64112390/image-size/medium?v=v2&amp;amp;px=400" role="button" title="andreibo_1-1665074035101.png" alt="andreibo_1-1665074035101.png" /&gt;&lt;/span&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;Create a VPN Community object --&amp;gt; Objects --&amp;gt; More Objects --&amp;gt; VPN Community --&amp;gt; New Meshed Community&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="andreibo_2-1665074035107.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/18040iEA1DA99E0076BB80/image-size/medium?v=v2&amp;amp;px=400" role="button" title="andreibo_2-1665074035107.png" alt="andreibo_2-1665074035107.png" /&gt;&lt;/span&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Give a name to the VPN Community and add the two gateways and Click OK.&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="andreibo_3-1665074035108.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/18044i19C635BDCA61B898/image-size/medium?v=v2&amp;amp;px=400" role="button" title="andreibo_3-1665074035108.png" alt="andreibo_3-1665074035108.png" /&gt;&lt;/span&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;The other default settings can remain default for this Check Point to Check Point VPN Configuration.&lt;/LI&gt;&lt;/OL&gt;&lt;/LI&gt;&lt;LI&gt;Configure the VPN Domain for both Security Gateways --&amp;gt; Edit Gateway properies --&amp;gt; Network Management --&amp;gt; VPN Domain --&amp;gt; Select User Defined option --&amp;gt; tick the 3 dots in the right --&amp;gt; Select the subnet you want to use for the VPN. If the object for the subnet is not created, create it.&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="andreibo_4-1665074035110.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/18042i9BDC039EAD35CDA3/image-size/medium?v=v2&amp;amp;px=400" role="button" title="andreibo_4-1665074035110.png" alt="andreibo_4-1665074035110.png" /&gt;&lt;/span&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;If you do not want to use an entire subnet as VPN Domain, you can create and use Address Range objects.&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="andreibo_5-1665074035112.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/18043i44A807D9848E566A/image-size/medium?v=v2&amp;amp;px=400" role="button" title="andreibo_5-1665074035112.png" alt="andreibo_5-1665074035112.png" /&gt;&lt;/span&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;/LI&gt;&lt;LI&gt;Set the Scope of the VPN --&amp;gt; Gateway Properties --&amp;gt; IPSec VPN TAB &amp;amp; add the VPN Community you created earlyer&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="andreibo_6-1665074035114.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/18045i473209D4A87FDB62/image-size/medium?v=v2&amp;amp;px=400" role="button" title="andreibo_6-1665074035114.png" alt="andreibo_6-1665074035114.png" /&gt;&lt;/span&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;Link selection --&amp;gt; Gateway Properies --&amp;gt; IPSec VPN TAB --&amp;gt; Link Selection under-TAB --&amp;gt; assure that Main Address is selected and Operating System Routing Table also.&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="andreibo_7-1665074035116.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/18046iF4C28325F02CBF5A/image-size/medium?v=v2&amp;amp;px=400" role="button" title="andreibo_7-1665074035116.png" alt="andreibo_7-1665074035116.png" /&gt;&lt;/span&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;Link selection --&amp;gt; Gateway Properies --&amp;gt; IPSec VPN TAB --&amp;gt; Link Selection under-TAB --&amp;gt; Go to Source IP address settings --&amp;gt; Select Manual --&amp;gt; Selected addresses from topology table --&amp;gt; select the private IP of the eth0(external) of the Gateway&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="andreibo_8-1665074035118.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/18047i77DAA7777969AA88/image-size/medium?v=v2&amp;amp;px=400" role="button" title="andreibo_8-1665074035118.png" alt="andreibo_8-1665074035118.png" /&gt;&lt;/span&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;Validate that Step 1 was configured on both gateways&lt;/LI&gt;&lt;LI&gt;Validate that Steps 3, 4, 5 &amp;amp; 6 where configured on both gateways&lt;/LI&gt;&lt;LI&gt;Azure level routes --&amp;gt; In Azure Portal --&amp;gt; Go to Route Tables&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="andreibo_9-1665074035119.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/18049iFC56D57B83005996/image-size/medium?v=v2&amp;amp;px=400" role="button" title="andreibo_9-1665074035119.png" alt="andreibo_9-1665074035119.png" /&gt;&lt;/span&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;Edit the Route Tables for the subnets used in VPN Domain for both Gateways, in this case there are only two route tables as we have only a single test subnet in each Azure VNET&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="andreibo_10-1665074035119.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/18048i5EB513F7B09BF1D6/image-size/medium?v=v2&amp;amp;px=400" role="button" title="andreibo_10-1665074035119.png" alt="andreibo_10-1665074035119.png" /&gt;&lt;/span&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;On the Route Table properies, go to Routes TAB and add a new Route to reddirect traffic torward the other VNET’s subnet via the gateway’s eth1 private IP&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="andreibo_11-1665074035121.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/18050i52F391E3A9D5ED96/image-size/medium?v=v2&amp;amp;px=400" role="button" title="andreibo_11-1665074035121.png" alt="andreibo_11-1665074035121.png" /&gt;&lt;/span&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;For the north-asset-routes, all traffic to west-webserver subnet assets will be reddirected via the north-SG eth1 interface IP&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="andreibo_12-1665074035121.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/18051iC5A33F4703BCC436/image-size/medium?v=v2&amp;amp;px=400" role="button" title="andreibo_12-1665074035121.png" alt="andreibo_12-1665074035121.png" /&gt;&lt;/span&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;For the west-asset-routes, all traffic to north-webserver subnet assets will be reddirected via the west-SG eth1 interface IP&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="andreibo_13-1665074035122.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/18052i860FC6FA0C2B1E93/image-size/medium?v=v2&amp;amp;px=400" role="button" title="andreibo_13-1665074035122.png" alt="andreibo_13-1665074035122.png" /&gt;&lt;/span&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;/LI&gt;&lt;LI&gt;Create Access Control Rules&lt;OL&gt;&lt;LI&gt;In SmartConsole --&amp;gt; Security Policy --&amp;gt; Access Control --&amp;gt; Policy --&amp;gt; I have created a single policy to allow traffic both ways(north--&amp;gt;west &amp;amp; west--&amp;gt;north) marking the previously created VPN Community with any service and marked as Allowed&amp;nbsp;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="andreibo_14-1665074035125.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/18053i587CE43C2D7B5662/image-size/medium?v=v2&amp;amp;px=400" role="button" title="andreibo_14-1665074035125.png" alt="andreibo_14-1665074035125.png" /&gt;&lt;/span&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; This policy was installed on both Security Gateways&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="andreibo_15-1665074035126.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/18054i528FF2CF08753882/image-size/medium?v=v2&amp;amp;px=400" role="button" title="andreibo_15-1665074035126.png" alt="andreibo_15-1665074035126.png" /&gt;&lt;/span&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; I used subnet objects both for Source &amp;amp; Destination as this is a test/Demo environment only.&lt;OL&gt;&lt;LI&gt;In real life, we will use host objects, host groups, Dynamic Objects and so on…&lt;/LI&gt;&lt;/OL&gt;&lt;/LI&gt;&lt;LI&gt;Create Access Control Rules&lt;OL&gt;&lt;LI&gt;In SmartConsole --&amp;gt; Security Policy --&amp;gt; Access Control --&amp;gt; NAT --&amp;gt; I have created two manual NAT rules&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="andreibo_16-1665074035129.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/18056i112122CC9084476F/image-size/medium?v=v2&amp;amp;px=400" role="button" title="andreibo_16-1665074035129.png" alt="andreibo_16-1665074035129.png" /&gt;&lt;/span&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; This policies are needed because both assets subnet(north &amp;amp; west) have NAT configured --&amp;gt; Hide behind the gateway. Practically, this rules are an exception for the following Automatic NAT Rules(created automatically when configured NAT on subnet objects)&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="andreibo_17-1665074035130.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/18055i7960C5CC61FF8BBC/image-size/medium?v=v2&amp;amp;px=400" role="button" title="andreibo_17-1665074035130.png" alt="andreibo_17-1665074035130.png" /&gt;&lt;/span&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&amp;nbsp;&lt;OL&gt;&lt;LI&gt;We do not want that traffic from west-subnet-assets to reach the north-subnet-assets with northSG gateway eth0 private IP, but with it’s own subnet allocated IP --&amp;gt; as we need to filter traffic as much as possible.&lt;/LI&gt;&lt;/OL&gt;&lt;/LI&gt;&lt;LI&gt;Do not forget to Publish &amp;amp; Install the policies on both gateways to implement changes &amp;amp; configs.&lt;/LI&gt;&lt;LI&gt;Testing can be done by ping from a server hosted in west-subnet-assets to a server hosted in the north-subnet-assets and than from north to west.&lt;/LI&gt;&lt;/OL&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;/LI&gt;&lt;/OL&gt;</description>
      <pubDate>Thu, 06 Oct 2022 16:46:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/R81-10-Site-to-Site-VPN-Config-between-two-Gateways-hosted-in/m-p/158951#M861</guid>
      <dc:creator>ABosinceanu</dc:creator>
      <dc:date>2022-10-06T16:46:37Z</dc:date>
    </item>
    <item>
      <title>Re: R81.10 Site to Site VPN Config between two Gateways hosted in Azure - full documentation</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/R81-10-Site-to-Site-VPN-Config-between-two-Gateways-hosted-in/m-p/171472#M862</link>
      <description>&lt;P&gt;Great write-up. Thanks for sharing!&amp;nbsp;&lt;span class="lia-unicode-emoji" title=":thumbs_up:"&gt;👍&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 14 Feb 2023 17:52:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/R81-10-Site-to-Site-VPN-Config-between-two-Gateways-hosted-in/m-p/171472#M862</guid>
      <dc:creator>Danny</dc:creator>
      <dc:date>2023-02-14T17:52:46Z</dc:date>
    </item>
  </channel>
</rss>

