<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Site2Site-VPN not working with VLANS/additional IP-nets? in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site2Site-VPN-not-working-with-VLANS-additional-IP-nets/m-p/186731#M34353</link>
    <description>&lt;P&gt;Helloes.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Unsure what the problem is here, and I'm not that good at checkpoint VPN:s.&lt;/P&gt;&lt;P&gt;We have a 7000 gateway at our main site and some time ago we bought a smaller spark 1570 gateway for a remote location. We set up a S2S-VPN between these with 1 network on the remote site, and that seems to work fine. The network is added to LAN1 directly (and the tunnel runs over WAN)&lt;/P&gt;&lt;P&gt;Now i wanted to add 2 more networks to the remote site. We installed a switch, added a trunk between the 1570 and the switch, made VLAN interfaces on LAN2 (LAN2.1365 etc) with 2 VLAN:s. One VLAN has an SVI in the switch that I can ping from the 1570, the other doesn't but it has a camera attached that I can ping. So that part seems to be working as it should. But I cannot get traffic to use the S2S-VPN for these 2 VLAN-networks.&lt;/P&gt;&lt;P&gt;If I do traceroute from my office-PC to the 1st network, i can see that it uses the tunnel and i can also see in the CP logs that it is encrypting traffic etc.&lt;/P&gt;&lt;P&gt;If I do traceroute to network 2 or 3, I can see that the traffic goes out on the default GW and is not tunneled. There's no encryption in the checkpoint logs.&lt;/P&gt;&lt;P&gt;Looking at the remote GW-object in SmartConsole, the 3 networks show up as they should and are configured the same, just different IP:s.&lt;/P&gt;&lt;P&gt;the VPN object has the setting that VPN domain is all IP:s behind GW based on topology.&lt;/P&gt;&lt;P&gt;How do I troubleshoot this? Is it not possible to use VLAN:s?&lt;/P&gt;</description>
    <pubDate>Tue, 18 Jul 2023 16:35:02 GMT</pubDate>
    <dc:creator>Albin_Petersson</dc:creator>
    <dc:date>2023-07-18T16:35:02Z</dc:date>
    <item>
      <title>Site2Site-VPN not working with VLANS/additional IP-nets?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site2Site-VPN-not-working-with-VLANS-additional-IP-nets/m-p/186731#M34353</link>
      <description>&lt;P&gt;Helloes.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Unsure what the problem is here, and I'm not that good at checkpoint VPN:s.&lt;/P&gt;&lt;P&gt;We have a 7000 gateway at our main site and some time ago we bought a smaller spark 1570 gateway for a remote location. We set up a S2S-VPN between these with 1 network on the remote site, and that seems to work fine. The network is added to LAN1 directly (and the tunnel runs over WAN)&lt;/P&gt;&lt;P&gt;Now i wanted to add 2 more networks to the remote site. We installed a switch, added a trunk between the 1570 and the switch, made VLAN interfaces on LAN2 (LAN2.1365 etc) with 2 VLAN:s. One VLAN has an SVI in the switch that I can ping from the 1570, the other doesn't but it has a camera attached that I can ping. So that part seems to be working as it should. But I cannot get traffic to use the S2S-VPN for these 2 VLAN-networks.&lt;/P&gt;&lt;P&gt;If I do traceroute from my office-PC to the 1st network, i can see that it uses the tunnel and i can also see in the CP logs that it is encrypting traffic etc.&lt;/P&gt;&lt;P&gt;If I do traceroute to network 2 or 3, I can see that the traffic goes out on the default GW and is not tunneled. There's no encryption in the checkpoint logs.&lt;/P&gt;&lt;P&gt;Looking at the remote GW-object in SmartConsole, the 3 networks show up as they should and are configured the same, just different IP:s.&lt;/P&gt;&lt;P&gt;the VPN object has the setting that VPN domain is all IP:s behind GW based on topology.&lt;/P&gt;&lt;P&gt;How do I troubleshoot this? Is it not possible to use VLAN:s?&lt;/P&gt;</description>
      <pubDate>Tue, 18 Jul 2023 16:35:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site2Site-VPN-not-working-with-VLANS-additional-IP-nets/m-p/186731#M34353</guid>
      <dc:creator>Albin_Petersson</dc:creator>
      <dc:date>2023-07-18T16:35:02Z</dc:date>
    </item>
    <item>
      <title>Re: Site2Site-VPN not working with VLANS/additional IP-nets?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site2Site-VPN-not-working-with-VLANS-additional-IP-nets/m-p/186770#M34362</link>
      <description>&lt;P&gt;Did you change the Encryption Domain associated with the SMB device to include the new VLANs AND push policy to all relevant gateways?&lt;/P&gt;</description>
      <pubDate>Tue, 18 Jul 2023 20:56:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site2Site-VPN-not-working-with-VLANS-additional-IP-nets/m-p/186770#M34362</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2023-07-18T20:56:57Z</dc:date>
    </item>
    <item>
      <title>Re: Site2Site-VPN not working with VLANS/additional IP-nets?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site2Site-VPN-not-working-with-VLANS-additional-IP-nets/m-p/186787#M34363</link>
      <description>&lt;P&gt;well, the VPN domain is the same thing as encryption domain right? If it is set to use all IP:s behind the SMB device then shouldn't they update automatically?&lt;/P&gt;&lt;P&gt;I've pushed the policy to both gateways.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I tried to make a network group object now with the networks included and use that as VPN domain instead, but there's no difference.&lt;/P&gt;</description>
      <pubDate>Wed, 19 Jul 2023 04:37:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site2Site-VPN-not-working-with-VLANS-additional-IP-nets/m-p/186787#M34363</guid>
      <dc:creator>Albin_Petersson</dc:creator>
      <dc:date>2023-07-19T04:37:44Z</dc:date>
    </item>
    <item>
      <title>Re: Site2Site-VPN not working with VLANS/additional IP-nets?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site2Site-VPN-not-working-with-VLANS-additional-IP-nets/m-p/186788#M34364</link>
      <description>&lt;P&gt;hmm, I think I figured it out now. The ideas I had on how to add these new networks to the policies was wrong. It was never a problem with the VPN tunnel per se. I used the "remote" networks in the local GW:s policies, but that doesn't work apparently.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It's a bit confusing that it didn't work, but at least now the access works so that's all that matters.&lt;/P&gt;</description>
      <pubDate>Wed, 19 Jul 2023 04:51:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site2Site-VPN-not-working-with-VLANS-additional-IP-nets/m-p/186788#M34364</guid>
      <dc:creator>Albin_Petersson</dc:creator>
      <dc:date>2023-07-19T04:51:17Z</dc:date>
    </item>
  </channel>
</rss>

