<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Allow Management over VPN in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Allow-Management-over-VPN/m-p/192930#M35680</link>
    <description>&lt;P&gt;Yeah, I heard the great news&amp;nbsp;&lt;span class="lia-unicode-emoji" title=":party_popper:"&gt;🎉&lt;/span&gt;.&lt;/P&gt;&lt;P&gt;So if I allow management of our on-prem NGFWs from the VPN gateway, if the tunnel is down, we can no longer manage the gateways? Is there any way to allow management of our on-prem resources both via VPN and on-prem even if the tunnel is down?&lt;/P&gt;</description>
    <pubDate>Mon, 18 Sep 2023 14:25:56 GMT</pubDate>
    <dc:creator>PSushko</dc:creator>
    <dc:date>2023-09-18T14:25:56Z</dc:date>
    <item>
      <title>Allow Management over VPN</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Allow-Management-over-VPN/m-p/192915#M35677</link>
      <description>&lt;P&gt;We have an IPSEC tunnel setup between our Perimeter81 gateway and our on-prem R80.40 NGFWs. When I try to connect to the management server, or any gateway, my connection fails.&lt;/P&gt;&lt;P&gt;I have seen the following threads, but they appear to be for R77.30 and R80.10:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;A href="https://community.checkpoint.com/t5/Management/Exclude-CPM-traffic-from-implied-rules/td-p/3934" target="_blank"&gt;https://community.checkpoint.com/t5/Management/Exclude-CPM-traffic-from-implied-rules/td-p/3934&lt;/A&gt;&lt;/LI&gt;&lt;LI&gt;&lt;A href="https://community.checkpoint.com/t5/Management/Exclude-CPM-Traffic-from-Implied-Rules/m-p/9187" target="_blank"&gt;https://community.checkpoint.com/t5/Management/Exclude-CPM-Traffic-from-Implied-Rules/m-p/9187&lt;/A&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Is the process the same for R80.40, and are there any security implications for including management traffic into the VPN tunnel?&lt;/P&gt;</description>
      <pubDate>Mon, 18 Sep 2023 13:46:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Allow-Management-over-VPN/m-p/192915#M35677</guid>
      <dc:creator>PSushko</dc:creator>
      <dc:date>2023-09-18T13:46:39Z</dc:date>
    </item>
    <item>
      <title>Re: Allow Management over VPN</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Allow-Management-over-VPN/m-p/192926#M35678</link>
      <description>&lt;P&gt;Oh, you mean two Check Point gateways? &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; (In case you didn't hear, &lt;A href="https://www.checkpoint.com/press-releases/check-point-software-completes-acquisition-of-perimeter-81/" target="_self"&gt;Check Point acquired Perimeter 81&lt;/A&gt;)&lt;/P&gt;
&lt;P&gt;The process should be more or less the same.&lt;BR /&gt;The main issue with doing this is if the VPN goes down, you will not be able to manage your gateway.&lt;BR /&gt;Recovery from this situation could also be tricky as well.&lt;/P&gt;</description>
      <pubDate>Mon, 18 Sep 2023 14:22:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Allow-Management-over-VPN/m-p/192926#M35678</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2023-09-18T14:22:00Z</dc:date>
    </item>
    <item>
      <title>Re: Allow Management over VPN</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Allow-Management-over-VPN/m-p/192930#M35680</link>
      <description>&lt;P&gt;Yeah, I heard the great news&amp;nbsp;&lt;span class="lia-unicode-emoji" title=":party_popper:"&gt;🎉&lt;/span&gt;.&lt;/P&gt;&lt;P&gt;So if I allow management of our on-prem NGFWs from the VPN gateway, if the tunnel is down, we can no longer manage the gateways? Is there any way to allow management of our on-prem resources both via VPN and on-prem even if the tunnel is down?&lt;/P&gt;</description>
      <pubDate>Mon, 18 Sep 2023 14:25:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Allow-Management-over-VPN/m-p/192930#M35680</guid>
      <dc:creator>PSushko</dc:creator>
      <dc:date>2023-09-18T14:25:56Z</dc:date>
    </item>
    <item>
      <title>Re: Allow Management over VPN</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Allow-Management-over-VPN/m-p/192936#M35681</link>
      <description>&lt;P&gt;You have to be behind the R80.40 Cluster and have internal access to the SMS when VPN is down.&lt;/P&gt;</description>
      <pubDate>Mon, 18 Sep 2023 14:51:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Allow-Management-over-VPN/m-p/192936#M35681</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2023-09-18T14:51:04Z</dc:date>
    </item>
    <item>
      <title>Re: Allow Management over VPN</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Allow-Management-over-VPN/m-p/192965#M35690</link>
      <description>&lt;P&gt;So long as I am still on the network, I can still manage the cluster even if the tunnel is down correct?&lt;/P&gt;</description>
      <pubDate>Mon, 18 Sep 2023 17:34:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Allow-Management-over-VPN/m-p/192965#M35690</guid>
      <dc:creator>PSushko</dc:creator>
      <dc:date>2023-09-18T17:34:45Z</dc:date>
    </item>
    <item>
      <title>Re: Allow Management over VPN</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Allow-Management-over-VPN/m-p/192967#M35691</link>
      <description>&lt;P&gt;Seeing as it's disabling the implied rules that allows management through the VPN in the first place, the only way to allow for that is to re-enable those rules and push policy to the relevant gateway.&lt;BR /&gt;To ensure the gateway can be managed without VPN in this situation, there will need to be explicit rules to permit the necessary traffic WITHOUT VPN (i.e. the VPN column should be "Any").&lt;BR /&gt;If you misconfigure any of this and get locked out of your remote gateway, it will most likely require access to the console to resolve.&lt;/P&gt;</description>
      <pubDate>Mon, 18 Sep 2023 17:51:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Allow-Management-over-VPN/m-p/192967#M35691</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2023-09-18T17:51:14Z</dc:date>
    </item>
    <item>
      <title>Re: Allow Management over VPN</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Allow-Management-over-VPN/m-p/192980#M35694</link>
      <description>&lt;P&gt;From what I understand:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;If I have a rule very high up that explicitly allows access from NET-X to the management server, and gateways on any VPN&lt;/LI&gt;&lt;LI&gt;And I then also include the traffic going to the management server and gateways in the tunnel.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;I would be able to manage the gateway and management both from the VPN tunnel, and from NET-X?&lt;/P&gt;</description>
      <pubDate>Mon, 18 Sep 2023 18:58:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Allow-Management-over-VPN/m-p/192980#M35694</guid>
      <dc:creator>PSushko</dc:creator>
      <dc:date>2023-09-18T18:58:28Z</dc:date>
    </item>
    <item>
      <title>Re: Allow Management over VPN</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Allow-Management-over-VPN/m-p/192983#M35696</link>
      <description>&lt;P&gt;The problem is that when you use "Any" in the VPN field of a rule, it also matches any VPN community configured.&lt;BR /&gt;Which means the local gateway will try to send the management traffic over the VPN...which will fail if the remote end is down.&lt;BR /&gt;The only way to "fix" this is by re-enabling the implied rules, which won't use VPN.&lt;BR /&gt;That requires a policy recompile/push to the local gateway.&lt;BR /&gt;Bottom line: it's not really an "either or" proposition.&lt;/P&gt;</description>
      <pubDate>Mon, 18 Sep 2023 19:13:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Allow-Management-over-VPN/m-p/192983#M35696</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2023-09-18T19:13:50Z</dc:date>
    </item>
    <item>
      <title>Re: Allow Management over VPN</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Allow-Management-over-VPN/m-p/192984#M35697</link>
      <description>&lt;P&gt;So what would be a way that we could manage our on-prem system while away without losing our ability of interacting with it on premise?&lt;/P&gt;</description>
      <pubDate>Mon, 18 Sep 2023 19:18:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Allow-Management-over-VPN/m-p/192984#M35697</guid>
      <dc:creator>PSushko</dc:creator>
      <dc:date>2023-09-18T19:18:29Z</dc:date>
    </item>
    <item>
      <title>Re: Allow Management over VPN</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Allow-Management-over-VPN/m-p/192986#M35699</link>
      <description>&lt;P&gt;The SIC over VPN discussion relates to the traffic between the gateway and management only.&lt;/P&gt;
&lt;P&gt;It's not clear we're talking about the same thing, so let's take a step back to the beginning.&lt;BR /&gt;You said: "When I try to connect to the management server, or any gateway, my connection fails."&lt;BR /&gt;How are you connecting?&lt;BR /&gt;From where, exactly?&lt;BR /&gt;A simple diagram showing all the relevant components will go a long way in helping to understand exactly what the issue is and where it might need to be addressed.&lt;/P&gt;</description>
      <pubDate>Mon, 18 Sep 2023 19:38:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Allow-Management-over-VPN/m-p/192986#M35699</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2023-09-18T19:38:58Z</dc:date>
    </item>
    <item>
      <title>Re: Allow Management over VPN</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Allow-Management-over-VPN/m-p/193068#M35849</link>
      <description>&lt;P&gt;Accessing the management fails when I am off-premises connected to our P81 gateway.&lt;/P&gt;&lt;P&gt;If I am on premises, inside the NAT, I can connect to management just fine.&lt;/P&gt;&lt;P&gt;I'm not very good at creating network maps &lt;span class="lia-unicode-emoji" title=":grinning_face_with_sweat:"&gt;😅&lt;/span&gt;, but hope this (very rudimentary illustration) helps to understand our issue.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Bad Map.png" style="width: 557px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/22506i8C6296FCB03864CD/image-dimensions/557x591?v=v2" width="557" height="591" role="button" title="Bad Map.png" alt="Bad Map.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;The rectangle is our internal network... forgot to label that.&lt;/P&gt;&lt;P&gt;What we want to do is to remove that big red&amp;nbsp;&lt;span class="lia-unicode-emoji" title=":heavy_multiplication_x:"&gt;✖️&lt;/span&gt;.&lt;/P&gt;</description>
      <pubDate>Tue, 19 Sep 2023 13:34:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Allow-Management-over-VPN/m-p/193068#M35849</guid>
      <dc:creator>PSushko</dc:creator>
      <dc:date>2023-09-19T13:34:18Z</dc:date>
    </item>
    <item>
      <title>Re: Allow Management over VPN</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Allow-Management-over-VPN/m-p/193070#M35850</link>
      <description>&lt;P&gt;Use a RA VPN client to gain access to the SMS is the S2S VPN is down.&lt;/P&gt;</description>
      <pubDate>Tue, 19 Sep 2023 13:37:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Allow-Management-over-VPN/m-p/193070#M35850</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2023-09-19T13:37:43Z</dc:date>
    </item>
    <item>
      <title>Re: Allow Management over VPN</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Allow-Management-over-VPN/m-p/193072#M35851</link>
      <description>&lt;P&gt;This is definitely outside the realm of SIC over VPN.&lt;BR /&gt;Do you see the relevant traffic reaching the P81 gateway?&lt;BR /&gt;And what methods are you using for access? (SSH, SmartConsole, ?)&lt;/P&gt;</description>
      <pubDate>Tue, 19 Sep 2023 14:00:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Allow-Management-over-VPN/m-p/193072#M35851</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2023-09-19T14:00:29Z</dc:date>
    </item>
    <item>
      <title>Re: Allow Management over VPN</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Allow-Management-over-VPN/m-p/193076#M35852</link>
      <description>&lt;P&gt;I can see the traffic getting to our on-prem gateway.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2023-09-19 10_07_55-SmartConsole.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/22508i3AEB5E1BEE3331D4/image-size/large?v=v2&amp;amp;px=999" role="button" title="2023-09-19 10_07_55-SmartConsole.png" alt="2023-09-19 10_07_55-SmartConsole.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;So far only SmartConsole, I'll try SSH.&lt;/P&gt;</description>
      <pubDate>Tue, 19 Sep 2023 14:16:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Allow-Management-over-VPN/m-p/193076#M35852</guid>
      <dc:creator>PSushko</dc:creator>
      <dc:date>2023-09-19T14:16:49Z</dc:date>
    </item>
    <item>
      <title>Re: Allow Management over VPN</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Allow-Management-over-VPN/m-p/193109#M35864</link>
      <description>&lt;P&gt;SmartConsole uses TCP 18190, 19009, and 443.&lt;BR /&gt;All of that should work fine through Perimeter 81.&lt;BR /&gt;In any case, have you checked what happens beyond your gateway?&lt;BR /&gt;tcpdump or fw monitor would be exceptionally useful to see where things are going wrong.&lt;/P&gt;</description>
      <pubDate>Tue, 19 Sep 2023 20:19:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Allow-Management-over-VPN/m-p/193109#M35864</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2023-09-19T20:19:43Z</dc:date>
    </item>
    <item>
      <title>Re: Allow Management over VPN</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Allow-Management-over-VPN/m-p/193291#M35909</link>
      <description>&lt;P&gt;Not the best versed in the usage of tcpdump and fw monitor. What would the commands I need to run look like (roughly)?&lt;/P&gt;</description>
      <pubDate>Thu, 21 Sep 2023 20:28:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Allow-Management-over-VPN/m-p/193291#M35909</guid>
      <dc:creator>PSushko</dc:creator>
      <dc:date>2023-09-21T20:28:33Z</dc:date>
    </item>
    <item>
      <title>Re: Allow Management over VPN</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Allow-Management-over-VPN/m-p/193292#M35910</link>
      <description>&lt;P&gt;If you're not familiar with these tools, the following website will help with syntax (courtesy of&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/1106"&gt;@Grave_Rose&lt;/a&gt;&amp;nbsp;) &lt;A href="https://tcpdump101.com" target="_blank" rel="noopener"&gt;https://tcpdump101.com&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 21 Sep 2023 20:36:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Allow-Management-over-VPN/m-p/193292#M35910</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2023-09-21T20:36:07Z</dc:date>
    </item>
    <item>
      <title>Re: Allow Management over VPN</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Allow-Management-over-VPN/m-p/193358#M35920</link>
      <description>&lt;P&gt;[edit: I think I misunderstood the original question but have cleared it up in my next post. Leaving this here 'cause everyone likes to learn PCaps.]&lt;/P&gt;&lt;P&gt;Wall of text incoming. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Since this is going across a VPN, you'll likely want to use 'fw monitor' and, if you're using &lt;A href="https://tcpdump101.com" target="_blank" rel="noopener"&gt;https://tcpdump101.com&lt;/A&gt; you'll want to select the "New -F" version since you're on R80.40. Also, we're going to pretend that your Management/SMS IP address is 10.20.30.40, the Internal IP of your P81 is 192.168.192.168 and that we don't care about what Layer-3 protocol or Layer-4 ports we're capturing - We want them all. Take a look at the following screenshot which will show you what the command will look like. I've highlighted three items to pay attention to:&lt;/P&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Untitled.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/22539i30B80FC02C8398A5/image-size/large?v=v2&amp;amp;px=999" role="button" title="Untitled.png" alt="Untitled.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;You will need to change the Source IP Address and Destination IP Address to match with your actual infrastructure. Also, take note that this version of 'fw monitor' captures both Pre- and Post-Encryption so you'll be able to see the packets as they pass through the VPN - There's no need to change anything here, I just wanted to highlight that for you.&lt;/P&gt;&lt;P&gt;Take the command (fw monitor -F "10.20.30.40,0,192.168.192.168,0,0") and run it on your R80.40 gateway - Do &lt;STRONG&gt;not&lt;/STRONG&gt; do this from the management station or you'll end up with a recursive packet capture which may fill up your SSH buffer and that's not good. Once the command has loaded, send TCP traffic (SSH, SmartConsole, whatever) &lt;STRONG&gt;from&lt;/STRONG&gt; the management station &lt;STRONG&gt;to&lt;/STRONG&gt; the internal IP address of the P81 gateway. You &lt;EM&gt;should&lt;/EM&gt; see something like the following:&lt;/P&gt;&lt;P&gt;[i] 10.20.30.40.12345 -&amp;gt; 192.169.192.168.22&lt;BR /&gt;[I] 10.20.30.40.12345 -&amp;gt; 192.169.192.168.22&lt;BR /&gt;[e] 10.20.30.40.12345 -&amp;gt; 192.169.192.168.22&lt;/P&gt;&lt;P&gt;This indicates that the packet has passed the wire and into the Check Point kernel (i), passed the first chain of inspection (I) and entered into a VPN tunnel (e). (There's a lot more happening but this is the basic version of what's happening). I'm 99.9% certain that this is already happening based on the screenshot of the logs you posted (In IT, never say 100% &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;) which is a good sign.&lt;/P&gt;&lt;P&gt;Next is to verify that the P81 is receiving the packets properly. Unfortunately, I'm not familiar with these devices but if they have either a packet capture tool (like tcpdump) or, even better, a kernel-level network flow diagnosis tool (like 'fw monitor') then we can use that to see what's happening to the packet. If it doesn't, here's something goofy you can try which will help narrow down whether this is an issue with traffic or the actual application (SSH, CPMI, whatever) connection:&lt;/P&gt;&lt;P&gt;On the remote (P81) side, instantiate a Linux box/VM. On that box, install the 'socat' utility. Run the command 'socat TCP-LISTEN:23,fork TCP:192.168.192.168:22' &amp;lt;-- This will create a LISTEN socket on TCP/23 of the Linux host and redirect any traffic it receives to 192.168.192.168 on TCP/22. Once configured, use an SSH client (like PuTTY) and connect to 'Linux_host_IP_address:23' and you should be prompted to log into the P81 box over SSH. If it works, then the service (SSH in this case) is working and it's a network issue. If not, then run a PCap on the Linux box (use tcpdump in this case) and see what's happening to the packets. Keep in mind that you can redirect any Layer-4 port with socat so, in theory, you could do this with CPMI but that will make things much (MUCH) harder to manage and I would only do this in a lab, not production.&lt;/P&gt;&lt;P&gt;Let me know if you need more info and I'll do my best to help out but free time isn't a commodity I have a lot of right now, sorry. Real-life, my job and all that jazz... Always gets in the way. &lt;span class="lia-unicode-emoji" title=":upside_down_face:"&gt;🙃&lt;/span&gt;&lt;/P&gt;&lt;P&gt;With all that being said, are you able to just peer CPMI over the WAN? It's all encrypted anyway.&lt;/P&gt;&lt;P&gt;Gr@ve_Rose&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 22 Sep 2023 16:14:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Allow-Management-over-VPN/m-p/193358#M35920</guid>
      <dc:creator>Grave_Rose</dc:creator>
      <dc:date>2023-09-22T16:14:51Z</dc:date>
    </item>
    <item>
      <title>Re: Allow Management over VPN</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Allow-Management-over-VPN/m-p/193373#M35922</link>
      <description>&lt;P&gt;Wow. What a detailed response. Thank you very much for all of this. I'm going to try it out.&lt;/P&gt;&lt;P&gt;Regarding access over CPM/CPMI, it does not appear to work. I can see the traffic reaching our on-prem management through TCP/19009, however, I get the following message from my SmartConsole:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="SmartConsole.png" style="width: 840px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/22545iC5FB474715A9722B/image-size/large?v=v2&amp;amp;px=999" role="button" title="SmartConsole.png" alt="SmartConsole.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here is the traffic going through:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="CPM_Traffic_Allow.png" style="width: 889px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/22546i854354DBEBC033C2/image-size/large?v=v2&amp;amp;px=999" role="button" title="CPM_Traffic_Allow.png" alt="CPM_Traffic_Allow.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm going to run a fw monitor soon. I'll let you know my findings.&lt;/P&gt;&lt;P&gt;Thank you for everything so far!&lt;/P&gt;</description>
      <pubDate>Fri, 22 Sep 2023 15:54:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Allow-Management-over-VPN/m-p/193373#M35922</guid>
      <dc:creator>PSushko</dc:creator>
      <dc:date>2023-09-22T15:54:00Z</dc:date>
    </item>
    <item>
      <title>Re: Allow Management over VPN</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Allow-Management-over-VPN/m-p/193376#M35924</link>
      <description>&lt;P&gt;[Apparently this was deleted or I missed posting it so here I go again.]&lt;/P&gt;&lt;P&gt;I think I misunderstood your initial request. I thought you wanted to manage the P81 device across the VPN and were having issues with that but it seems that you just want to connect a GUI client to your management station from the P81 encryption domain. Is that correct? If so, here's what you need to do from a packet flow situation.&lt;/P&gt;&lt;P&gt;First, for the 'fw monitor' set the source as your client IP address (192.168.192.100) and the destination as your management station (10.20.30.40) and run that on your R80.40 gateway. When that's running, attempt to connect your GUI client. You should see something like this:&lt;/P&gt;&lt;P&gt;(E) 192.168.192.100.12345 -&amp;gt; 10.20.30.40.18191&lt;BR /&gt;(o) 192.168.192.100.12345 -&amp;gt; 10.20.30.40.18191&lt;BR /&gt;(O) 192.168.192.100.12345 -&amp;gt; 10.20.30.40.18191&lt;/P&gt;&lt;P&gt;The big "O" indicates that the packet has left the Check Point kernel and is now destined for the wire. You can verify this with tcpdump but you likely don't need to.&lt;/P&gt;&lt;P&gt;Next, run a PCap on your management station. If it's Windows, use Wireshark. &lt;EM&gt;Fun fact: Wireshark uses BPF when capturing packets so you can use tcpdump syntax to filter.&lt;/EM&gt; If it's GAiA or another *nix, use tcpdump. We're going to assume that you're running GAiA and that the physical interface on your management station is &lt;EM&gt;eth0&lt;/EM&gt;. Run the following command without the quotes: "tcpdump -nn -vvv -e -s 0 -X -c 100 -i eth0 host 192.168.192.100 and host 10.20.30.40" which will capture packets whose source &lt;STRONG&gt;or&lt;/STRONG&gt; destination is either of those IP addresses. Here's what you're looking for:&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;A SYN packet from the client. It will show up as [S] in the packet header. If you see this, that means the client is reaching the management station. If you &lt;EM&gt;don't&lt;/EM&gt; see this, then there is something blocking the traffic between the firewall and the management station - It could be the firewall itself.&lt;/LI&gt;&lt;LI&gt;A SYN/ACK packet from the management station to the client. It will show up as [S.] in the packet header. If you see this, it means that the management station is accepting the connection. If you &lt;EM&gt;don't&lt;/EM&gt; see this but you &lt;EM&gt;do&lt;/EM&gt; see the SYN packet -&lt;STRONG&gt;or&lt;/STRONG&gt;- you see the SYN packet but also see a RST [R] packet, then it means that the management station is &lt;EM&gt;not&lt;/EM&gt; accepting the connection. Run 'cpconfig' and make sure you've added your client IP address as a GUI client.&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;Hope that helps and sorry for the confusion in my previous post.&lt;/P&gt;&lt;P&gt;Cheers,&lt;/P&gt;&lt;P&gt;Gr@ve_Rose&lt;/P&gt;</description>
      <pubDate>Fri, 22 Sep 2023 17:00:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Allow-Management-over-VPN/m-p/193376#M35924</guid>
      <dc:creator>Grave_Rose</dc:creator>
      <dc:date>2023-09-22T17:00:11Z</dc:date>
    </item>
  </channel>
</rss>

