<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Traffic from Gateway to Internet dropped (clear text packet should be encrypted) in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Traffic-from-Gateway-to-Internet-dropped-clear-text-packet/m-p/182240#M33407</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I applied&amp;nbsp;&lt;SPAN&gt;sk25675 (NON_VPN_Traffic rules), added the peer IP and it resolved the issue.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Clear-text connections from the peer to the Internet were allowed.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 26 May 2023 10:44:19 GMT</pubDate>
    <dc:creator>Mark_Edwards</dc:creator>
    <dc:date>2023-05-26T10:44:19Z</dc:date>
    <item>
      <title>Traffic from Gateway to Internet dropped (clear text packet should be encrypted)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Traffic-from-Gateway-to-Internet-dropped-clear-text-packet/m-p/176740#M32363</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Customer has a VTI VPN between office Check Point and Data Centre Check Point and there is connectivity between the 2 sites.&lt;/P&gt;&lt;P&gt;Internet access is via DC Check Point.&lt;/P&gt;&lt;P&gt;Traffic from office Check Point (e.g. DNS to 8.8.8.8) is dropped on DC Check Point due to "clear text packet should be encrypted".&lt;/P&gt;&lt;P&gt;I can't see why the DC gateway expects this to be encrypted - no overlapping encryption domains, etc.&amp;nbsp;&lt;/P&gt;&lt;P&gt;As expected the tunnel test traffic is encrypted/decrypted between the 2.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any ideas?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 30 Mar 2023 13:07:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Traffic-from-Gateway-to-Internet-dropped-clear-text-packet/m-p/176740#M32363</guid>
      <dc:creator>Mark_Edwards</dc:creator>
      <dc:date>2023-03-30T13:07:53Z</dc:date>
    </item>
    <item>
      <title>Re: Traffic from Gateway to Internet dropped (clear text packet should be encrypted)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Traffic-from-Gateway-to-Internet-dropped-clear-text-packet/m-p/176828#M32389</link>
      <description>&lt;P&gt;We need some more information including:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Version/JHF of gateways&lt;/LI&gt;
&lt;LI&gt;Encryption Domain configuration on both sites&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;The Office gateway didn't think it needed to encrypt the traffic to the remote gateway.&lt;/P&gt;</description>
      <pubDate>Fri, 31 Mar 2023 03:32:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Traffic-from-Gateway-to-Internet-dropped-clear-text-packet/m-p/176828#M32389</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2023-03-31T03:32:14Z</dc:date>
    </item>
    <item>
      <title>Re: Traffic from Gateway to Internet dropped (clear text packet should be encrypted)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Traffic-from-Gateway-to-Internet-dropped-clear-text-packet/m-p/176874#M32405</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;Office: SMB 1600 R81.10&lt;/P&gt;&lt;P&gt;Main DC: R81.10 JHF take 55&lt;/P&gt;&lt;P&gt;Both gateways have an empty group as the encryption domain as the VPN is route based.&lt;/P&gt;&lt;P&gt;Its correct that the office SMB doesn't encrypt as this traffic is not routed down the VPN.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 31 Mar 2023 10:24:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Traffic-from-Gateway-to-Internet-dropped-clear-text-packet/m-p/176874#M32405</guid>
      <dc:creator>Mark_Edwards</dc:creator>
      <dc:date>2023-03-31T10:24:19Z</dc:date>
    </item>
    <item>
      <title>Re: Traffic from Gateway to Internet dropped (clear text packet should be encrypted)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Traffic-from-Gateway-to-Internet-dropped-clear-text-packet/m-p/176947#M32427</link>
      <description>&lt;P&gt;You said in your original post that all traffic from the office site is routed over VPN to the DC site.&lt;BR /&gt;That would imply all traffic to the Internet would be routed to the DC site, including DNS lookups.&lt;/P&gt;
&lt;P&gt;Because of the empty encryption domain, it seems reasonable for the DC gateway to assume everything that comes from the specific remote gateway SHOULD be encrypted.&lt;BR /&gt;Thus, the error message.&lt;/P&gt;
&lt;P&gt;A simple network diagram might be helpful to understand where traffic is supposed to be going.&lt;/P&gt;</description>
      <pubDate>Fri, 31 Mar 2023 22:21:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Traffic-from-Gateway-to-Internet-dropped-clear-text-packet/m-p/176947#M32427</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2023-03-31T22:21:03Z</dc:date>
    </item>
    <item>
      <title>Re: Traffic from Gateway to Internet dropped (clear text packet should be encrypted)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Traffic-from-Gateway-to-Internet-dropped-clear-text-packet/m-p/178075#M32636</link>
      <description>&lt;P&gt;Hi, apologies.&lt;/P&gt;&lt;P&gt;I have attached a simple diagram.&lt;/P&gt;&lt;P&gt;Only traffic between office 192.168.3.0/24 and DC 10.1.1.0/24 is routed over the VTI.&lt;/P&gt;&lt;P&gt;Traffic from office 10.0.0.9 to Internet is dropped by DC 10.0.0.12.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 14 Apr 2023 10:05:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Traffic-from-Gateway-to-Internet-dropped-clear-text-packet/m-p/178075#M32636</guid>
      <dc:creator>Mark_Edwards</dc:creator>
      <dc:date>2023-04-14T10:05:33Z</dc:date>
    </item>
    <item>
      <title>Re: Traffic from Gateway to Internet dropped (clear text packet should be encrypted)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Traffic-from-Gateway-to-Internet-dropped-clear-text-packet/m-p/178089#M32638</link>
      <description>&lt;P&gt;Hey&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/14865"&gt;@Mark_Edwards&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;I think maybe fw monitor capture would help us here, so we can see if traffic even takes the right path. So lets assume src is 1.1.1.1 and dst is 2.2.2.2 and dst port is 3389, as we dont care about src port, you could do something like below (-o to output to a file)&lt;/P&gt;
&lt;P&gt;fw monitor -F "srcip,srcport,dstip,dstport,protocol" -F "srcip,srcport,dstip,dstport,protocol"&lt;/P&gt;
&lt;P&gt;fw monitor -F "1.1.1.1,0,2.2.2.2,3389,0" -F "2.2.2.2,0,1.1.1.1,3389,0" -o /var/log/vpncapture.pcap&lt;/P&gt;
&lt;P&gt;Once you dump the file in wireshark, you can filter for fw direction -&amp;gt; fw1.direction eq "i"&lt;/P&gt;
&lt;P&gt;or whatever inspection point you want to see&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Fri, 14 Apr 2023 12:25:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Traffic-from-Gateway-to-Internet-dropped-clear-text-packet/m-p/178089#M32638</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-04-14T12:25:24Z</dc:date>
    </item>
    <item>
      <title>Re: Traffic from Gateway to Internet dropped (clear text packet should be encrypted)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Traffic-from-Gateway-to-Internet-dropped-clear-text-packet/m-p/182240#M33407</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I applied&amp;nbsp;&lt;SPAN&gt;sk25675 (NON_VPN_Traffic rules), added the peer IP and it resolved the issue.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Clear-text connections from the peer to the Internet were allowed.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 26 May 2023 10:44:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Traffic-from-Gateway-to-Internet-dropped-clear-text-packet/m-p/182240#M33407</guid>
      <dc:creator>Mark_Edwards</dc:creator>
      <dc:date>2023-05-26T10:44:19Z</dc:date>
    </item>
  </channel>
</rss>

