<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Site-to-Site VPN Deployment: 6500 Appliance to 1575 SMB Firewall in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-VPN-Deployment-6500-Appliance-to-1575-SMB-Firewall/m-p/212295#M40287</link>
    <description>&lt;P&gt;That should be taken care of by ensuring enc. domains include subnets for thise vlans...makes sense?&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
    <pubDate>Thu, 25 Apr 2024 14:28:30 GMT</pubDate>
    <dc:creator>the_rock</dc:creator>
    <dc:date>2024-04-25T14:28:30Z</dc:date>
    <item>
      <title>Site-to-Site VPN Deployment: 6500 Appliance to 1575 SMB Firewall</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-VPN-Deployment-6500-Appliance-to-1575-SMB-Firewall/m-p/211991#M40250</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;I am planning to deploy a Site-to-Site VPN connection between a 6500 appliance in our central office and a 1575 SMB firewall at a branch office. The primary function of the branch office firewall is to establish the VPN tunnel.&lt;/P&gt;
&lt;P&gt;Are there any specific considerations I need to be aware of when configuring a Site-to-Site VPN between these two firewall models?&lt;/P&gt;
&lt;P&gt;I would appreciate any relevant guides or best practices documents that can assist us with this deployment.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 22 Apr 2024 19:58:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-VPN-Deployment-6500-Appliance-to-1575-SMB-Firewall/m-p/211991#M40250</guid>
      <dc:creator>Moudar</dc:creator>
      <dc:date>2024-04-22T19:58:42Z</dc:date>
    </item>
    <item>
      <title>Re: Site-to-Site VPN Deployment: 6500 Appliance to 1575 SMB Firewall</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-VPN-Deployment-6500-Appliance-to-1575-SMB-Firewall/m-p/211992#M40251</link>
      <description>&lt;P&gt;Hey bro,&lt;/P&gt;
&lt;P&gt;Nothing special really. I had even seen people do it as permanent tunnel (per gateway option) and works fine.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Mon, 22 Apr 2024 22:14:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-VPN-Deployment-6500-Appliance-to-1575-SMB-Firewall/m-p/211992#M40251</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-04-22T22:14:12Z</dc:date>
    </item>
    <item>
      <title>Re: Site-to-Site VPN Deployment: 6500 Appliance to 1575 SMB Firewall</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-VPN-Deployment-6500-Appliance-to-1575-SMB-Firewall/m-p/212096#M40252</link>
      <description>&lt;P&gt;If we are making the following assumptions:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Both firewalls are directly connected to the Internet.&lt;/LI&gt;&lt;LI&gt;Both firewalls are using static addresses.&lt;/LI&gt;&lt;LI&gt;No overlapping subnets.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Then as&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/38213"&gt;@the_rock&lt;/a&gt;&amp;nbsp; said, there shouldn't be anything special for you to do in this case. I would create a Star VPN Community with the 1575 SMB being the satellite, gateway to gateway VPN tunnel sharing, set permanent tunnels, and then choose the VPN routing option that makes sense. We like to route all Internet traffic back to HQ, but that is not everyone's preference.&lt;/P&gt;&lt;P&gt;If you are using the recommended method of certificates for this VPN connection, make note of when your certificates are set to expire as you want to avoid any outages that may occur with that.&lt;/P&gt;</description>
      <pubDate>Tue, 23 Apr 2024 14:46:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-VPN-Deployment-6500-Appliance-to-1575-SMB-Firewall/m-p/212096#M40252</guid>
      <dc:creator>CaseyB</dc:creator>
      <dc:date>2024-04-23T14:46:05Z</dc:date>
    </item>
    <item>
      <title>Re: Site-to-Site VPN Deployment: 6500 Appliance to 1575 SMB Firewall</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-VPN-Deployment-6500-Appliance-to-1575-SMB-Firewall/m-p/212129#M40257</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;I think shared secret is the way we go for this installation.&lt;/P&gt;
&lt;P&gt;The idea is to have same VLANs behind the HQ at the branch office (not all of them only 3-4), so that the users do not feel any change!&lt;/P&gt;
&lt;P&gt;How can that be done? I mean having the same VLANs on both sides? Should we have a switch on the branch to get the VLANs?&lt;/P&gt;</description>
      <pubDate>Wed, 24 Apr 2024 06:41:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-VPN-Deployment-6500-Appliance-to-1575-SMB-Firewall/m-p/212129#M40257</guid>
      <dc:creator>Moudar</dc:creator>
      <dc:date>2024-04-24T06:41:15Z</dc:date>
    </item>
    <item>
      <title>Re: Site-to-Site VPN Deployment: 6500 Appliance to 1575 SMB Firewall</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-VPN-Deployment-6500-Appliance-to-1575-SMB-Firewall/m-p/212136#M40258</link>
      <description>&lt;P&gt;You can only use a shared secret if the branch GW is managed locally or by another SMS. If both the main office cluster and the branch office are managed by the same management server, you don't really need it in the first place.&lt;/P&gt;</description>
      <pubDate>Wed, 24 Apr 2024 07:28:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-VPN-Deployment-6500-Appliance-to-1575-SMB-Firewall/m-p/212136#M40258</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2024-04-24T07:28:05Z</dc:date>
    </item>
    <item>
      <title>Re: Site-to-Site VPN Deployment: 6500 Appliance to 1575 SMB Firewall</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-VPN-Deployment-6500-Appliance-to-1575-SMB-Firewall/m-p/212150#M40261</link>
      <description>&lt;P&gt;You have a point there, the branch office should be added to SMS first (SIC), then a S2S should be created.&lt;/P&gt;
&lt;P&gt;What about my question about VLANs, how to go with it?&lt;/P&gt;</description>
      <pubDate>Wed, 24 Apr 2024 09:39:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-VPN-Deployment-6500-Appliance-to-1575-SMB-Firewall/m-p/212150#M40261</guid>
      <dc:creator>Moudar</dc:creator>
      <dc:date>2024-04-24T09:39:08Z</dc:date>
    </item>
    <item>
      <title>Re: Site-to-Site VPN Deployment: 6500 Appliance to 1575 SMB Firewall</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-VPN-Deployment-6500-Appliance-to-1575-SMB-Firewall/m-p/212161#M40262</link>
      <description>&lt;P&gt;As Val said, if both are managed by same mgmt server, then just use certificates. Otherwise, PSK is fine.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Wed, 24 Apr 2024 11:18:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-VPN-Deployment-6500-Appliance-to-1575-SMB-Firewall/m-p/212161#M40262</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-04-24T11:18:09Z</dc:date>
    </item>
    <item>
      <title>Re: Site-to-Site VPN Deployment: 6500 Appliance to 1575 SMB Firewall</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-VPN-Deployment-6500-Appliance-to-1575-SMB-Firewall/m-p/212176#M40264</link>
      <description>&lt;P&gt;Extending L2 to remote sites is not really a networking best practice. The VPN component is L3, I do not have a good answer for you.&lt;/P&gt;</description>
      <pubDate>Wed, 24 Apr 2024 12:46:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-VPN-Deployment-6500-Appliance-to-1575-SMB-Firewall/m-p/212176#M40264</guid>
      <dc:creator>CaseyB</dc:creator>
      <dc:date>2024-04-24T12:46:11Z</dc:date>
    </item>
    <item>
      <title>Re: Site-to-Site VPN Deployment: 6500 Appliance to 1575 SMB Firewall</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-VPN-Deployment-6500-Appliance-to-1575-SMB-Firewall/m-p/212181#M40265</link>
      <description>&lt;P&gt;so what is the best practice to&amp;nbsp;solve that problem?&lt;/P&gt;</description>
      <pubDate>Wed, 24 Apr 2024 13:14:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-VPN-Deployment-6500-Appliance-to-1575-SMB-Firewall/m-p/212181#M40265</guid>
      <dc:creator>Moudar</dc:creator>
      <dc:date>2024-04-24T13:14:33Z</dc:date>
    </item>
    <item>
      <title>Re: Site-to-Site VPN Deployment: 6500 Appliance to 1575 SMB Firewall</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-VPN-Deployment-6500-Appliance-to-1575-SMB-Firewall/m-p/212182#M40266</link>
      <description>&lt;P&gt;If you have overlapping IP spaces between the sites, you will need to NAT one of the locations to different IPs.&lt;/P&gt;</description>
      <pubDate>Wed, 24 Apr 2024 13:20:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-VPN-Deployment-6500-Appliance-to-1575-SMB-Firewall/m-p/212182#M40266</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2024-04-24T13:20:34Z</dc:date>
    </item>
    <item>
      <title>Re: Site-to-Site VPN Deployment: 6500 Appliance to 1575 SMB Firewall</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-VPN-Deployment-6500-Appliance-to-1575-SMB-Firewall/m-p/212185#M40267</link>
      <description>&lt;P&gt;As Val said, you have to do NAT here, there is really no other viable option.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Wed, 24 Apr 2024 13:35:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-VPN-Deployment-6500-Appliance-to-1575-SMB-Firewall/m-p/212185#M40267</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-04-24T13:35:57Z</dc:date>
    </item>
    <item>
      <title>Re: Site-to-Site VPN Deployment: 6500 Appliance to 1575 SMB Firewall</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-VPN-Deployment-6500-Appliance-to-1575-SMB-Firewall/m-p/212287#M40282</link>
      <description>&lt;P&gt;Generally speaking, you would want all remote sites to be L3 with their own separate networks and VLANs. You said you want the VLAN to be the same so users do not feel any change, I'm not sure how your network would be setup in a way that providing them a different IP address would change their overall experience. I know our end-users have no idea what IP they are getting and could not careless, nor do they notice a difference roaming between sites.&lt;/P&gt;</description>
      <pubDate>Thu, 25 Apr 2024 14:15:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-VPN-Deployment-6500-Appliance-to-1575-SMB-Firewall/m-p/212287#M40282</guid>
      <dc:creator>CaseyB</dc:creator>
      <dc:date>2024-04-25T14:15:40Z</dc:date>
    </item>
    <item>
      <title>Re: Site-to-Site VPN Deployment: 6500 Appliance to 1575 SMB Firewall</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-VPN-Deployment-6500-Appliance-to-1575-SMB-Firewall/m-p/212293#M40285</link>
      <description>&lt;P&gt;Maybe i was not clear above. it is absolutely not important to have same VLANs on both sites. What is important is to have connectivity.&lt;/P&gt;
&lt;P&gt;If VLAN 419 is on central site, no problem to create VLAN 420 on branch site (different subnet). What i need is a guide on how to do it? after the creation of a site to site VPN. So how to proceed?&lt;/P&gt;</description>
      <pubDate>Thu, 25 Apr 2024 14:27:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-VPN-Deployment-6500-Appliance-to-1575-SMB-Firewall/m-p/212293#M40285</guid>
      <dc:creator>Moudar</dc:creator>
      <dc:date>2024-04-25T14:27:02Z</dc:date>
    </item>
    <item>
      <title>Re: Site-to-Site VPN Deployment: 6500 Appliance to 1575 SMB Firewall</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-VPN-Deployment-6500-Appliance-to-1575-SMB-Firewall/m-p/212295#M40287</link>
      <description>&lt;P&gt;That should be taken care of by ensuring enc. domains include subnets for thise vlans...makes sense?&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Thu, 25 Apr 2024 14:28:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-VPN-Deployment-6500-Appliance-to-1575-SMB-Firewall/m-p/212295#M40287</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-04-25T14:28:30Z</dc:date>
    </item>
    <item>
      <title>Re: Site-to-Site VPN Deployment: 6500 Appliance to 1575 SMB Firewall</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-VPN-Deployment-6500-Appliance-to-1575-SMB-Firewall/m-p/213252#M40592</link>
      <description>&lt;P&gt;Is using VTIs is a possible solution ?&lt;/P&gt;</description>
      <pubDate>Mon, 06 May 2024 09:35:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Site-to-Site-VPN-Deployment-6500-Appliance-to-1575-SMB-Firewall/m-p/213252#M40592</guid>
      <dc:creator>Moudar</dc:creator>
      <dc:date>2024-05-06T09:35:22Z</dc:date>
    </item>
  </channel>
</rss>

