<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: VPN tunnel in local LAN for Internet connectivity in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-tunnel-in-local-LAN-for-Internet-connectivity/m-p/209650#M39745</link>
    <description>&lt;P&gt;I don't know if this is possible as a VPN is to join internal lans???&lt;BR /&gt;I'm curious how you get on with this.&lt;/P&gt;&lt;P&gt;How about a rule on the gateways the traffic traverses:&lt;/P&gt;&lt;P&gt;SRC:Guest-networks, Dst: 'Negated' Internal-networks, port: http/s etc&lt;BR /&gt;or dst: all_internet.&lt;BR /&gt;Basically all networks except internal. Routing and Anti-spoofing considered.&lt;/P&gt;&lt;P&gt;If you still want to go the VPN route then I would test with one tunnel per GW pair in tunnel settings.&lt;BR /&gt;So the GW will consider the Encryption domain during authentication to be IPv4 Universal Range, i.e. as long as both sides are configured the same the auth will be happy with any IP in the Traffic Selector - Initiator and Traffic Selector - Responder but the traffic will only hit the community if there is traffic that consists of the&amp;nbsp;Guest-networks and 'other'.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;On the External GW the Encryption domains would be Guest-NW object for the peer, but for the local&amp;nbsp;I see as the problem.&lt;BR /&gt;I don't see the objects you can specify like all_internet or all networks regarding Enr Doms.&lt;BR /&gt;You could create an NW object with 0.0.0.0/0.0.0.0 and see if you can use that specifying a specific VPN domain for the GW community in GW Properties. Or leave as is and test because the initiating traffic will be coming from the internal FW so auth may make it through.&lt;/P&gt;&lt;P&gt;There is the radical option to change and test traditional mode where you have to specify the VPN community in the VPN column of the rule. - Guessing that is not recommended by CP now though.&lt;BR /&gt;There is a warning that config will applied to new policies only so this would be a headache.&lt;/P&gt;</description>
    <pubDate>Tue, 26 Mar 2024 02:10:11 GMT</pubDate>
    <dc:creator>spottex</dc:creator>
    <dc:date>2024-03-26T02:10:11Z</dc:date>
    <item>
      <title>VPN tunnel in local LAN for Internet connectivity</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-tunnel-in-local-LAN-for-Internet-connectivity/m-p/209607#M39730</link>
      <description>&lt;P&gt;Hi folks,&lt;/P&gt;&lt;P&gt;the big internal 26.000 VSX cluster is running some virtual systems on R81.20 + JHF-53.&lt;BR /&gt;One of these virt. system is for guests. The guests can connect here their own equipment. Which is very unsecure....&lt;/P&gt;&lt;P&gt;The guest are allowed to connection to the internet and ONLY to the internet.&lt;BR /&gt;For this reason, a VPNtunnel should be used, when the data pass the internal network / backbone.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;The VPN endpoint (the cluster of 1570er appliance) does not have any networks, which should be reached by the guests. There is only the connection to the Internet.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="gastnetz_VPN.jpg" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/25005i5EBFE774E85D8DA6/image-size/medium?v=v2&amp;amp;px=400" role="button" title="gastnetz_VPN.jpg" alt="gastnetz_VPN.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;How do i configure this, especially as there is no real enc-domain on the 1570er appliances?&lt;/P&gt;&lt;P&gt;Best regards,&lt;BR /&gt;Christian&lt;/P&gt;</description>
      <pubDate>Mon, 25 Mar 2024 13:48:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-tunnel-in-local-LAN-for-Internet-connectivity/m-p/209607#M39730</guid>
      <dc:creator>Christian_Koehl</dc:creator>
      <dc:date>2024-03-25T13:48:47Z</dc:date>
    </item>
    <item>
      <title>Re: VPN tunnel in local LAN for Internet connectivity</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-tunnel-in-local-LAN-for-Internet-connectivity/m-p/209650#M39745</link>
      <description>&lt;P&gt;I don't know if this is possible as a VPN is to join internal lans???&lt;BR /&gt;I'm curious how you get on with this.&lt;/P&gt;&lt;P&gt;How about a rule on the gateways the traffic traverses:&lt;/P&gt;&lt;P&gt;SRC:Guest-networks, Dst: 'Negated' Internal-networks, port: http/s etc&lt;BR /&gt;or dst: all_internet.&lt;BR /&gt;Basically all networks except internal. Routing and Anti-spoofing considered.&lt;/P&gt;&lt;P&gt;If you still want to go the VPN route then I would test with one tunnel per GW pair in tunnel settings.&lt;BR /&gt;So the GW will consider the Encryption domain during authentication to be IPv4 Universal Range, i.e. as long as both sides are configured the same the auth will be happy with any IP in the Traffic Selector - Initiator and Traffic Selector - Responder but the traffic will only hit the community if there is traffic that consists of the&amp;nbsp;Guest-networks and 'other'.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;On the External GW the Encryption domains would be Guest-NW object for the peer, but for the local&amp;nbsp;I see as the problem.&lt;BR /&gt;I don't see the objects you can specify like all_internet or all networks regarding Enr Doms.&lt;BR /&gt;You could create an NW object with 0.0.0.0/0.0.0.0 and see if you can use that specifying a specific VPN domain for the GW community in GW Properties. Or leave as is and test because the initiating traffic will be coming from the internal FW so auth may make it through.&lt;/P&gt;&lt;P&gt;There is the radical option to change and test traditional mode where you have to specify the VPN community in the VPN column of the rule. - Guessing that is not recommended by CP now though.&lt;BR /&gt;There is a warning that config will applied to new policies only so this would be a headache.&lt;/P&gt;</description>
      <pubDate>Tue, 26 Mar 2024 02:10:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-tunnel-in-local-LAN-for-Internet-connectivity/m-p/209650#M39745</guid>
      <dc:creator>spottex</dc:creator>
      <dc:date>2024-03-26T02:10:11Z</dc:date>
    </item>
    <item>
      <title>Re: VPN tunnel in local LAN for Internet connectivity</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-tunnel-in-local-LAN-for-Internet-connectivity/m-p/209743#M39758</link>
      <description>&lt;P&gt;if you are asking how to route all traffic towards the Spark VPN peer.&lt;/P&gt;
&lt;P&gt;with domain based: in the vpn community, VPN routing, you select the 3rd option. (BE CAREFUL - it will cause all your traffic not known by other VPN peers, and which not included in the local VPN domain of the guests VS GW, to be routed to this tunnel, including traffic from the VS itself, and the VS will also expect traffic it to arrive encrypted (such as ssh etc) (if needed you can apply excluded services/crypt.def/exclude external ip from vpn domain)&lt;/P&gt;
&lt;P&gt;with route based: just set the main default route to the VTI of the spark. (AGAIN - it will route everything which doesn't have any more specific route towards the tunnel, including traffic from the GW itself (unless you use PBR)&lt;/P&gt;</description>
      <pubDate>Tue, 26 Mar 2024 18:26:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/VPN-tunnel-in-local-LAN-for-Internet-connectivity/m-p/209743#M39758</guid>
      <dc:creator>AmirArama</dc:creator>
      <dc:date>2024-03-26T18:26:44Z</dc:date>
    </item>
  </channel>
</rss>

