<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: S2S VPN &amp;amp; Vlans in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-VPN-amp-Vlans/m-p/210838#M39943</link>
    <description>&lt;P&gt;Just adding in my 2p on this one if I may; apologies if I have misunderstood you but I had a similar question put to me just last week. In that case, the customer had an existing MPLS L2 network and wanted to find a way to keep the L2 build broadly similar after migrating to VPN tunnels.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;Its important to note that the VPN tunnel is a layer 3 entity; its IP to IP. Its not possible to segregate this L3 tunnel into a series of layer 2 VLANs, in the manner of an ethernet trunk.&lt;BR /&gt;&lt;BR /&gt;Instead, what you need to do (as Gunther and Andy mention) is include the respective subnets in the 'encryption domain'.&lt;BR /&gt;&lt;BR /&gt;Again, apologies if thats not what you're asking.&lt;BR /&gt;&lt;BR /&gt;G&lt;/P&gt;</description>
    <pubDate>Tue, 09 Apr 2024 12:56:09 GMT</pubDate>
    <dc:creator>mccabe</dc:creator>
    <dc:date>2024-04-09T12:56:09Z</dc:date>
    <item>
      <title>S2S VPN &amp; Vlans</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-VPN-amp-Vlans/m-p/210796#M39932</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;Is there any guide that shows how to do&amp;nbsp;&lt;SPAN&gt;subnet advertisement over the S2S tunnel (2 checkpoint appliances)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;We have got about 5 different VLANS that needs to be advertised from the main office to the branch office.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Any ideas!&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 09 Apr 2024 09:41:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-VPN-amp-Vlans/m-p/210796#M39932</guid>
      <dc:creator>Moudar</dc:creator>
      <dc:date>2024-04-09T09:41:56Z</dc:date>
    </item>
    <item>
      <title>Re: S2S VPN &amp; Vlans</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-VPN-amp-Vlans/m-p/210811#M39934</link>
      <description>&lt;P&gt;Why do you need that ? Usually you include all subnets in VPN Encryption Domains for each peer.&lt;/P&gt;</description>
      <pubDate>Tue, 09 Apr 2024 11:21:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-VPN-amp-Vlans/m-p/210811#M39934</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2024-04-09T11:21:00Z</dc:date>
    </item>
    <item>
      <title>Re: S2S VPN &amp; Vlans</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-VPN-amp-Vlans/m-p/210824#M39938</link>
      <description>&lt;P&gt;I would agree with&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/21294"&gt;@G_W_Albrecht&lt;/a&gt;&amp;nbsp;. By the way, whatever you need to advertise, just include it in VPN domain and ever since R80, you can have specific group as generic vpn domain in the object itself, but then you can assign different ones as per community (below screenshot)&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot_1.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/25212i24623A71E831C0C2/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Screenshot_1.png" alt="Screenshot_1.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt; &lt;/P&gt;</description>
      <pubDate>Tue, 09 Apr 2024 12:00:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-VPN-amp-Vlans/m-p/210824#M39938</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-04-09T12:00:32Z</dc:date>
    </item>
    <item>
      <title>Re: S2S VPN &amp; Vlans</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-VPN-amp-Vlans/m-p/210826#M39939</link>
      <description>&lt;P&gt;&lt;STRONG&gt;Clarification on VLAN Tagging and Configuration:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;We defined the allowed networks for the VPN tunnel. However, I'm unsure how VLAN tagging would work in this scenario.&lt;/P&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;Ideally, I'd like to find a comprehensive guide that outlines the configuration process for both the Check Point firewall at the main office and the Check Point firewall in the branch office. This guide should specifically address:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;VLAN Tagging Configuration:&lt;/STRONG&gt; How to configure VLAN tagging on both the firewall and switch to ensure proper segregation and routing of VLAN traffic from the main office to the branch office through the VPN tunnel.&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Visibility and Functionality:&lt;/STRONG&gt; How to ensure that VLANs from the main office appear and function seamlessly on the switch connected to the Check Point firewall in the branch office.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;By following a detailed guide that addresses these aspects, I can confidently configure the VPN tunnel and achieve the desired functionality for VLAN traffic across both locations.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Additionally:&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;If there are any best practices or security considerations regarding VLAN tagging in this setup, I would appreciate any insights you can provide.&lt;/LI&gt;&lt;/UL&gt;</description>
      <pubDate>Tue, 09 Apr 2024 12:19:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-VPN-amp-Vlans/m-p/210826#M39939</guid>
      <dc:creator>Moudar</dc:creator>
      <dc:date>2024-04-09T12:19:07Z</dc:date>
    </item>
    <item>
      <title>Re: S2S VPN &amp; Vlans</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-VPN-amp-Vlans/m-p/210827#M39940</link>
      <description>&lt;P&gt;On CP side you only need to consider &lt;A href="https://sc1.checkpoint.com/documents/R81.10/WebAdminGuides/EN/CP_R81.10_Gaia_AdminGuide/Topics-GAG/VLAN-Interfaces.htm" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;R81.10 Gaia Administration Guide - &lt;STRONG&gt;VLAN&lt;/STRONG&gt; Interfaces&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt;. Switches are configured according to their specs. It should work transparently over VPN if the Encryption Domains are defined correctly.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 09 Apr 2024 12:34:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-VPN-amp-Vlans/m-p/210827#M39940</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2024-04-09T12:34:45Z</dc:date>
    </item>
    <item>
      <title>Re: S2S VPN &amp; Vlans</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-VPN-amp-Vlans/m-p/210828#M39941</link>
      <description>&lt;P&gt;Just follow link Guenther gave. I am not aware of any specific document/acticle that talks about something like this through the vpn tunnel.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Tue, 09 Apr 2024 12:31:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-VPN-amp-Vlans/m-p/210828#M39941</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-04-09T12:31:51Z</dc:date>
    </item>
    <item>
      <title>Re: S2S VPN &amp; Vlans</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-VPN-amp-Vlans/m-p/210838#M39943</link>
      <description>&lt;P&gt;Just adding in my 2p on this one if I may; apologies if I have misunderstood you but I had a similar question put to me just last week. In that case, the customer had an existing MPLS L2 network and wanted to find a way to keep the L2 build broadly similar after migrating to VPN tunnels.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;Its important to note that the VPN tunnel is a layer 3 entity; its IP to IP. Its not possible to segregate this L3 tunnel into a series of layer 2 VLANs, in the manner of an ethernet trunk.&lt;BR /&gt;&lt;BR /&gt;Instead, what you need to do (as Gunther and Andy mention) is include the respective subnets in the 'encryption domain'.&lt;BR /&gt;&lt;BR /&gt;Again, apologies if thats not what you're asking.&lt;BR /&gt;&lt;BR /&gt;G&lt;/P&gt;</description>
      <pubDate>Tue, 09 Apr 2024 12:56:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-VPN-amp-Vlans/m-p/210838#M39943</guid>
      <dc:creator>mccabe</dc:creator>
      <dc:date>2024-04-09T12:56:09Z</dc:date>
    </item>
    <item>
      <title>Re: S2S VPN &amp; Vlans</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-VPN-amp-Vlans/m-p/210848#M39944</link>
      <description>&lt;P&gt;Thats super valid point, it would be layer 3 "system" if you will, so the statement about segregating it into separate layer 2 entities may not work, agree.&lt;/P&gt;
&lt;P&gt;Not sure if there is written statement anywhere about it, but I could not find one myself.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Tue, 09 Apr 2024 13:11:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-VPN-amp-Vlans/m-p/210848#M39944</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-04-09T13:11:14Z</dc:date>
    </item>
    <item>
      <title>Re: S2S VPN &amp; Vlans</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-VPN-amp-Vlans/m-p/210852#M39945</link>
      <description>&lt;P&gt;You have a very good point about the difference between l2 and l3 in this specific case&lt;/P&gt;</description>
      <pubDate>Tue, 09 Apr 2024 13:25:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-VPN-amp-Vlans/m-p/210852#M39945</guid>
      <dc:creator>Moudar</dc:creator>
      <dc:date>2024-04-09T13:25:13Z</dc:date>
    </item>
    <item>
      <title>Re: S2S VPN &amp; Vlans</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-VPN-amp-Vlans/m-p/210853#M39946</link>
      <description>&lt;P&gt;Maybe this needs to be considered?&lt;/P&gt;&lt;P&gt;f you configure the switch ports as VLAN trunk, the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;Check Point&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Bridge interface should&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;not&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;interfere with the VLANs.&lt;/P&gt;&lt;P&gt;To configure a Bridge interface with VLAN trunk, create the Bridge interface with two physical (non-VLAN) interfaces as its subordinate interfaces (see&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A class="" href="https://sc1.checkpoint.com/documents/R81.10/WebAdminGuides/EN/CP_R81.10_Gaia_AdminGuide/Topics-GAG/Bridge-Interfaces.htm" target="_blank" rel="noopener"&gt;Bridge Interfaces&lt;/A&gt;).&lt;/P&gt;&lt;P&gt;The&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;Security Gateway&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;processes the tagged packet and does not remove VLAN tags from them.&lt;/P&gt;&lt;P&gt;The traffic passes with the original VLAN tag to its destination.&lt;/P&gt;</description>
      <pubDate>Tue, 09 Apr 2024 13:26:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-VPN-amp-Vlans/m-p/210853#M39946</guid>
      <dc:creator>Moudar</dc:creator>
      <dc:date>2024-04-09T13:26:04Z</dc:date>
    </item>
    <item>
      <title>Re: S2S VPN &amp; Vlans</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-VPN-amp-Vlans/m-p/210856#M39948</link>
      <description>&lt;P&gt;If the Interface VLAN that i need to send to the branch office is not defined in the firewall but only in the router (internal traffic)&lt;/P&gt;&lt;P&gt;How would the process of creating a new interface vlan on the firewall go?&lt;/P&gt;&lt;P&gt;Example:&lt;/P&gt;&lt;P&gt;add interface bond0 vlan 530&lt;BR /&gt;set interface bond0 state on&lt;/P&gt;&lt;P&gt;set interface bond0.530 comments "Print"&lt;BR /&gt;set interface bond0.530 state on&lt;BR /&gt;set interface bond0.530 ipv4-address 10.40.10.25 mask-length 24&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;what happens next?&lt;/P&gt;</description>
      <pubDate>Tue, 09 Apr 2024 13:31:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-VPN-amp-Vlans/m-p/210856#M39948</guid>
      <dc:creator>Moudar</dc:creator>
      <dc:date>2024-04-09T13:31:33Z</dc:date>
    </item>
    <item>
      <title>Re: S2S VPN &amp; Vlans</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-VPN-amp-Vlans/m-p/210857#M39949</link>
      <description>&lt;P&gt;That looks right. Well, just make sure its aded as part of enc vpn domain.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Tue, 09 Apr 2024 13:33:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-VPN-amp-Vlans/m-p/210857#M39949</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-04-09T13:33:26Z</dc:date>
    </item>
    <item>
      <title>Re: S2S VPN &amp; Vlans</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-VPN-amp-Vlans/m-p/210858#M39950</link>
      <description>&lt;P&gt;that config will be done on the main office, what about the branch office configuration. Is it the same?&lt;/P&gt;
&lt;P&gt;Do i need to consider this:&lt;/P&gt;
&lt;P&gt;If you configure the switch ports as VLAN trunk, the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;Check Point&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Bridge interface should&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;not&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;interfere with the VLANs.&lt;/P&gt;
&lt;P&gt;To configure a Bridge interface with VLAN trunk, create the Bridge interface with two physical (non-VLAN) interfaces as its subordinate interfaces (see&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A class="" href="https://sc1.checkpoint.com/documents/R81.10/WebAdminGuides/EN/CP_R81.10_Gaia_AdminGuide/Topics-GAG/Bridge-Interfaces.htm" target="_blank" rel="noopener noreferrer"&gt;Bridge Interfaces&lt;/A&gt;).&lt;/P&gt;
&lt;P&gt;The&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class=""&gt;Security Gateway&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;processes the tagged packet and does not remove VLAN tags from them.&lt;/P&gt;
&lt;P&gt;The traffic passes with the original VLAN tag to its destination.&lt;/P&gt;</description>
      <pubDate>Tue, 09 Apr 2024 13:37:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-VPN-amp-Vlans/m-p/210858#M39950</guid>
      <dc:creator>Moudar</dc:creator>
      <dc:date>2024-04-09T13:37:02Z</dc:date>
    </item>
    <item>
      <title>Re: S2S VPN &amp; Vlans</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-VPN-amp-Vlans/m-p/210859#M39951</link>
      <description>&lt;P&gt;Why would you use a bridge interface ? This will make many features unavailable! Both peers have their own Encryption domain - all networks should be included that have to be reached by clients from peer site.&lt;/P&gt;</description>
      <pubDate>Tue, 09 Apr 2024 13:40:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-VPN-amp-Vlans/m-p/210859#M39951</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2024-04-09T13:40:14Z</dc:date>
    </item>
    <item>
      <title>Re: S2S VPN &amp; Vlans</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-VPN-amp-Vlans/m-p/210860#M39952</link>
      <description>&lt;P&gt;I am not an expert here, but i am trying to learn!&lt;/P&gt;
&lt;P&gt;In the branch office a Cisco switch will be connected to the firewall. How would the firewall configuration be ?&lt;/P&gt;
&lt;P&gt;How would the switch understand that this traffic is tagged? I am trying to understand the process!&lt;/P&gt;
&lt;P&gt;The branch office is 1575 small business appliance&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 09 Apr 2024 13:47:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/S2S-VPN-amp-Vlans/m-p/210860#M39952</guid>
      <dc:creator>Moudar</dc:creator>
      <dc:date>2024-04-09T13:47:02Z</dc:date>
    </item>
  </channel>
</rss>

