<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Correct way to use VPN communities in Access policy in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Correct-way-to-use-VPN-communities-in-Access-policy/m-p/160523#M28314</link>
    <description>&lt;P&gt;Hello to everyone,&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am trying to understand the logic behind access rules and VPN communities.&lt;/P&gt;&lt;P&gt;I have an &lt;STRONG&gt;example ruleset&lt;/STRONG&gt; what regulates traffic between internet / ipsec tunnel / Local VLAN-s&lt;/P&gt;&lt;TABLE border="1" width="63.99951078030998%"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD width="20%" height="24px"&gt;&lt;STRONG&gt;Name&lt;/STRONG&gt;&lt;/TD&gt;&lt;TD width="20%" height="24px"&gt;&lt;STRONG&gt;Source&lt;/STRONG&gt;&lt;/TD&gt;&lt;TD width="20%" height="24px"&gt;&lt;STRONG&gt;Destination&lt;/STRONG&gt;&lt;/TD&gt;&lt;TD width="10%" height="24px"&gt;&lt;STRONG&gt;VPN&lt;/STRONG&gt;&lt;/TD&gt;&lt;TD width="5%" height="24px"&gt;&lt;STRONG&gt;Services&lt;/STRONG&gt;&lt;/TD&gt;&lt;TD width="5%" height="24px"&gt;&lt;STRONG&gt;Action&lt;/STRONG&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD width="20%" height="24px"&gt;users_to_inet&lt;/TD&gt;&lt;TD width="20%" height="24px"&gt;user_address&lt;/TD&gt;&lt;TD width="20%" height="24px"&gt;Internet*&lt;/TD&gt;&lt;TD width="10%" height="24px"&gt;Any *&lt;/TD&gt;&lt;TD width="5%" height="24px"&gt;Any *&lt;/TD&gt;&lt;TD width="5%" height="24px"&gt;Accept&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD width="20%" height="24px"&gt;users_to_ipsec&lt;/TD&gt;&lt;TD width="20%" height="24px"&gt;user_address&lt;/TD&gt;&lt;TD width="20%" height="24px"&gt;ipsec_address&lt;/TD&gt;&lt;TD width="10%" height="24px"&gt;ipsec_com&lt;/TD&gt;&lt;TD width="5%" height="24px"&gt;Any *&amp;nbsp;&lt;/TD&gt;&lt;TD width="5%" height="24px"&gt;Accept&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;users_to_local&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;user_address&lt;/P&gt;&lt;P&gt;ssl_vpn_address&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;local_services&lt;/TD&gt;&lt;TD&gt;Any*&lt;/TD&gt;&lt;TD&gt;Any*&lt;/TD&gt;&lt;TD&gt;Accept&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD width="20%"&gt;Cleanup&lt;/TD&gt;&lt;TD width="20%"&gt;any*&lt;/TD&gt;&lt;TD width="20%"&gt;any*&lt;/TD&gt;&lt;TD width="10%"&gt;any*&lt;/TD&gt;&lt;TD width="5%"&gt;any*&lt;/TD&gt;&lt;TD width="5%"&gt;Drop&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am experiencing an behaviour when traffic destinated to the IPSEC tunnel is going through the "users_to_inet" rule but not through "users_to_ipsec" rule. It seems that the first match is because of the VPN=&amp;gt;Any* but I have no knowledge yet to disable it if it is even possible.&lt;/P&gt;&lt;P&gt;I am experiencing an behaviour when traffic hits "users_to_local" rule the checkpoint tries to create a IPsec tunnel to the remote host , because that the rule has ssl_vpn_address" in the source. Even though the traffic is destinated to a neighbour VLAN and no tunnel should be used.&lt;/P&gt;&lt;P&gt;When moving the priority of the rules, then traffic in some cases are matched the correct rule but some other rules tend to try move through the higher priority ones.&lt;/P&gt;&lt;P&gt;I have read the administration manual, but I find the answers I was looking for.&lt;/P&gt;&lt;P&gt;Can someone please explain to me:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;What is the correct way to describe LAN =&amp;gt; Internet rule that the VPN communities don't try to go through it.?&lt;/LI&gt;&lt;LI&gt;What is the correct way to describe VLAN =&amp;gt; VLAN rules that the&amp;nbsp;VPN communities don't try to go through it.?&lt;/LI&gt;&lt;LI&gt;How to disable the use of VPN Communities when creating VLAN =&amp;gt; VLAN rules in the firewall.?&lt;/LI&gt;&lt;LI&gt;What is the correct way to prioritize rules when you have on-prem VLANS and remote IPSEC tunnels where you try to allow and forward traffic.&lt;/LI&gt;&lt;LI&gt;What is the logic behind the explanation and behaviour of the Checkpoint SGW?&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;I hope this explanation is enough but feel free to ask me for additional questions if it is too hard to understand. I was working with a fortigate unit for some time and there the logic was a bit different.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best Regards,&lt;/P&gt;&lt;P&gt;Gryzz&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 27 Oct 2022 05:53:19 GMT</pubDate>
    <dc:creator>gryzz</dc:creator>
    <dc:date>2022-10-27T05:53:19Z</dc:date>
    <item>
      <title>Correct way to use VPN communities in Access policy</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Correct-way-to-use-VPN-communities-in-Access-policy/m-p/160523#M28314</link>
      <description>&lt;P&gt;Hello to everyone,&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am trying to understand the logic behind access rules and VPN communities.&lt;/P&gt;&lt;P&gt;I have an &lt;STRONG&gt;example ruleset&lt;/STRONG&gt; what regulates traffic between internet / ipsec tunnel / Local VLAN-s&lt;/P&gt;&lt;TABLE border="1" width="63.99951078030998%"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD width="20%" height="24px"&gt;&lt;STRONG&gt;Name&lt;/STRONG&gt;&lt;/TD&gt;&lt;TD width="20%" height="24px"&gt;&lt;STRONG&gt;Source&lt;/STRONG&gt;&lt;/TD&gt;&lt;TD width="20%" height="24px"&gt;&lt;STRONG&gt;Destination&lt;/STRONG&gt;&lt;/TD&gt;&lt;TD width="10%" height="24px"&gt;&lt;STRONG&gt;VPN&lt;/STRONG&gt;&lt;/TD&gt;&lt;TD width="5%" height="24px"&gt;&lt;STRONG&gt;Services&lt;/STRONG&gt;&lt;/TD&gt;&lt;TD width="5%" height="24px"&gt;&lt;STRONG&gt;Action&lt;/STRONG&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD width="20%" height="24px"&gt;users_to_inet&lt;/TD&gt;&lt;TD width="20%" height="24px"&gt;user_address&lt;/TD&gt;&lt;TD width="20%" height="24px"&gt;Internet*&lt;/TD&gt;&lt;TD width="10%" height="24px"&gt;Any *&lt;/TD&gt;&lt;TD width="5%" height="24px"&gt;Any *&lt;/TD&gt;&lt;TD width="5%" height="24px"&gt;Accept&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD width="20%" height="24px"&gt;users_to_ipsec&lt;/TD&gt;&lt;TD width="20%" height="24px"&gt;user_address&lt;/TD&gt;&lt;TD width="20%" height="24px"&gt;ipsec_address&lt;/TD&gt;&lt;TD width="10%" height="24px"&gt;ipsec_com&lt;/TD&gt;&lt;TD width="5%" height="24px"&gt;Any *&amp;nbsp;&lt;/TD&gt;&lt;TD width="5%" height="24px"&gt;Accept&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;users_to_local&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;user_address&lt;/P&gt;&lt;P&gt;ssl_vpn_address&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;local_services&lt;/TD&gt;&lt;TD&gt;Any*&lt;/TD&gt;&lt;TD&gt;Any*&lt;/TD&gt;&lt;TD&gt;Accept&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD width="20%"&gt;Cleanup&lt;/TD&gt;&lt;TD width="20%"&gt;any*&lt;/TD&gt;&lt;TD width="20%"&gt;any*&lt;/TD&gt;&lt;TD width="10%"&gt;any*&lt;/TD&gt;&lt;TD width="5%"&gt;any*&lt;/TD&gt;&lt;TD width="5%"&gt;Drop&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am experiencing an behaviour when traffic destinated to the IPSEC tunnel is going through the "users_to_inet" rule but not through "users_to_ipsec" rule. It seems that the first match is because of the VPN=&amp;gt;Any* but I have no knowledge yet to disable it if it is even possible.&lt;/P&gt;&lt;P&gt;I am experiencing an behaviour when traffic hits "users_to_local" rule the checkpoint tries to create a IPsec tunnel to the remote host , because that the rule has ssl_vpn_address" in the source. Even though the traffic is destinated to a neighbour VLAN and no tunnel should be used.&lt;/P&gt;&lt;P&gt;When moving the priority of the rules, then traffic in some cases are matched the correct rule but some other rules tend to try move through the higher priority ones.&lt;/P&gt;&lt;P&gt;I have read the administration manual, but I find the answers I was looking for.&lt;/P&gt;&lt;P&gt;Can someone please explain to me:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;What is the correct way to describe LAN =&amp;gt; Internet rule that the VPN communities don't try to go through it.?&lt;/LI&gt;&lt;LI&gt;What is the correct way to describe VLAN =&amp;gt; VLAN rules that the&amp;nbsp;VPN communities don't try to go through it.?&lt;/LI&gt;&lt;LI&gt;How to disable the use of VPN Communities when creating VLAN =&amp;gt; VLAN rules in the firewall.?&lt;/LI&gt;&lt;LI&gt;What is the correct way to prioritize rules when you have on-prem VLANS and remote IPSEC tunnels where you try to allow and forward traffic.&lt;/LI&gt;&lt;LI&gt;What is the logic behind the explanation and behaviour of the Checkpoint SGW?&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;I hope this explanation is enough but feel free to ask me for additional questions if it is too hard to understand. I was working with a fortigate unit for some time and there the logic was a bit different.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best Regards,&lt;/P&gt;&lt;P&gt;Gryzz&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 27 Oct 2022 05:53:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Correct-way-to-use-VPN-communities-in-Access-policy/m-p/160523#M28314</guid>
      <dc:creator>gryzz</dc:creator>
      <dc:date>2022-10-27T05:53:19Z</dc:date>
    </item>
    <item>
      <title>Re: Correct way to use VPN communities in Access policy</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Correct-way-to-use-VPN-communities-in-Access-policy/m-p/160626#M28347</link>
      <description>&lt;P&gt;The VPN column is meant as an additional matching criteria in the rulebase.&lt;BR /&gt;It is possible to put a specific VPN Community there, but it is NOT possible to create a rule that only applies to non-VPN traffic.&lt;BR /&gt;That means any rule that applies exclusively to VPN traffic should be before rules that could apply to either VPN or non-VPN traffic.&lt;/P&gt;
&lt;P&gt;While there are probably some exceptions, generally your rules should be ordered "more specific" to "least specific."&lt;BR /&gt;Which means your "users_to_inet" should be listed right before your Cleanup rule in the example rulebase.&lt;/P&gt;</description>
      <pubDate>Thu, 27 Oct 2022 19:45:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Correct-way-to-use-VPN-communities-in-Access-policy/m-p/160626#M28347</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2022-10-27T19:45:12Z</dc:date>
    </item>
    <item>
      <title>Re: Correct way to use VPN communities in Access policy</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Correct-way-to-use-VPN-communities-in-Access-policy/m-p/160651#M28351</link>
      <description>&lt;P&gt;Hello&lt;/P&gt;&lt;P&gt;Thank you. I had a hunch that "VPN=Any" Will also apply to all the defined communities.&amp;nbsp;&lt;/P&gt;&lt;P&gt;But for example when I'll move the "&lt;SPAN&gt;users_to_inet" rule before the cleanup rule and all the "specific" VPN rules have the higher priority. Will the&amp;nbsp;users_to_inet rule will be still hit when higher priority rules won't match, making it the fallback rule.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;By that I mean that the higher priority rules should have ip1:1ip and port1:port1: principle on both GW1 and RGW1.&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;So that it means that I cannot allow in the whole network range inbound on the remote VPN GW because when all the specific conditions don't match then the fallback "users_to_inet" rule would be still matched for inbound traffic in the remote gateway when it's not configured 1:1.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Am I correct?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;It might be confusedly explained but I hope that you get my idea.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 28 Oct 2022 07:42:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Correct-way-to-use-VPN-communities-in-Access-policy/m-p/160651#M28351</guid>
      <dc:creator>gryzz</dc:creator>
      <dc:date>2022-10-28T07:42:26Z</dc:date>
    </item>
    <item>
      <title>Re: Correct way to use VPN communities in Access policy</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Correct-way-to-use-VPN-communities-in-Access-policy/m-p/160694#M28372</link>
      <description>&lt;P&gt;To understand how the rulebase works, please refer to the following:&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Management/Unified-Policy-Column-based-Rule-Matching/m-p/9888#M1693" target="_blank"&gt;https://community.checkpoint.com/t5/Management/Unified-Policy-Column-based-Rule-Matching/m-p/9888#M1693&lt;/A&gt;&lt;BR /&gt;In general, the rule nearest to the top of the rulebase will apply if multiple rules match (e.g. if rules 2, 4, and 33 potentially match a given connection, rule 2 is applied).&lt;/P&gt;</description>
      <pubDate>Fri, 28 Oct 2022 17:41:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Correct-way-to-use-VPN-communities-in-Access-policy/m-p/160694#M28372</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2022-10-28T17:41:24Z</dc:date>
    </item>
  </channel>
</rss>

