<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Secondary connect R77.30 in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Secondary-connect-R77-30/m-p/9634#M91501</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Secondary connect works after I add branch gateway to Remote Access community.&lt;/P&gt;&lt;P&gt;Authorization is performed on the main gateway and when I access to host at the branch site, secondary tunnel established.&lt;BR /&gt;But I cannot connect directly to branch gateway, error "site is not responding"&lt;/P&gt;&lt;P&gt;Maybe the reason is certificate installed on branch gateway?&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Subject Alternate Names&lt;/EM&gt; in main gateway internal certificate is &lt;STRONG&gt;public&lt;/STRONG&gt; IP address of the gateway, while&amp;nbsp;&lt;SPAN&gt;&lt;EM&gt;Subject Alternate Names&lt;/EM&gt; in branch internal certificate is &lt;STRONG&gt;management (private)&lt;/STRONG&gt; IP address of the gateway.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Should I reissue certificate with public IP at&amp;nbsp;&lt;EM&gt;Subject Alternate Names&lt;/EM&gt;?&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 30 Oct 2018 10:21:09 GMT</pubDate>
    <dc:creator>Maxim_Medvedev</dc:creator>
    <dc:date>2018-10-30T10:21:09Z</dc:date>
    <item>
      <title>Secondary connect R77.30</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Secondary-connect-R77-30/m-p/9629#M91496</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We need to provide access to branch resourses to remote users via VPN, now only headquarter gateway participates at remote access community.&lt;BR /&gt;We use CheckPointVPN E80.61 client.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As I understand Secondary Connect is what I need, the solution is: &lt;BR /&gt;&lt;A class="link-titled" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk65312" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk65312"&gt;Enabling Secondary Connect for Remote Access Clients E75.20 and above&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I found administration Guide for Secondary Connect for R80.10, I cannot find any for R77.30&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Does Secondary Connect works with 77.30?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If it does, can it be set up following this steps (from R80.10 Guide):&lt;/P&gt;&lt;P&gt;1. Make sure the gateway has a server certificate that is signed by the internal Certificate Authority.&lt;BR /&gt;2. On each gateway, open the &lt;EM&gt;$FWDIR/conf/trac_client_1.ttm&lt;/EM&gt; configuration file.&lt;BR /&gt;3. Set the :default value of automatic_mep_topology to true.&lt;BR /&gt;4. Find enable_secondary_connect. If you do not see this parameter, add it manually as shown here:&lt;BR /&gt;&lt;EM&gt;:enable_secondary_connect (&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;:gateway (&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;:map (&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;:true (true)&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;:false (false)&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;:client_decide (client_decide)&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;)&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;:default (true)&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;)&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;)&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;1. Make sure the :default value of enable_secondary_connect is true.&lt;BR /&gt;2. Save the file.&lt;/P&gt;&lt;P&gt;3. Install the policy.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Are there any other steps that need to be taken?&lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 24 Oct 2018 14:14:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Secondary-connect-R77-30/m-p/9629#M91496</guid>
      <dc:creator>Maxim_Medvedev</dc:creator>
      <dc:date>2018-10-24T14:14:05Z</dc:date>
    </item>
    <item>
      <title>Re: Secondary connect R77.30</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Secondary-connect-R77-30/m-p/9630#M91497</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I would assume that you need to use MEP - this is covered in VPN Administration Guide R77 Versions p.139ff.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 24 Oct 2018 14:32:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Secondary-connect-R77-30/m-p/9630#M91497</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2018-10-24T14:32:28Z</dc:date>
    </item>
    <item>
      <title>Re: Secondary connect R77.30</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Secondary-connect-R77-30/m-p/9631#M91498</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Forget editing the trac_client file, why? First it is dangerous as it is very picky on the format, second as you don't need to change anything at all. those settings are the default.&lt;/P&gt;&lt;P&gt;To see all the default settings in the trac_client file look at &lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk75221&amp;amp;partition=Advanced&amp;amp;product=Endpoint"&gt;sk75221.&lt;/A&gt;&lt;/P&gt;&lt;P&gt;What you do need to do is make sure you do not have an overlap in the VPN Domain of the the gateways (if needed set this for the remote access separately), now just add the other gateways to the Remote access community and setup Office mode per gateway.&lt;/P&gt;&lt;P&gt;Keep in mind that your client will use the IP it gets from the gateway you sing into.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Lets say you have 3 gateways you want to use for this, you assign the following IP ranges to the 3 gateways:&lt;/P&gt;&lt;P&gt;GW1 with 10.10.1.0/24&lt;/P&gt;&lt;P&gt;GW2 with 10.10.2.0/24&lt;/P&gt;&lt;P&gt;GW3 with 10.10.3.0/24&lt;/P&gt;&lt;P&gt;Now you have in your login screen 3 sites (after you login the first time after you set this up) and you choose GW2 to connect to, you will be assigned a 10.10.2.x address, this address will be used for ALL connections to all 3 gateways. So make sure not to route those networks over MPLS or other back-end connections.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When you use AD to authenticate the users and your sites do not have a local AD server, and those sites are only connected over a VPN, make sure to disable LDAP in the implied rules, as it will not be encrypted by default. see &lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk26059&amp;amp;partition=Advanced&amp;amp;product=IPSec"&gt;SK26059.&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 25 Oct 2018 05:40:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Secondary-connect-R77-30/m-p/9631#M91498</guid>
      <dc:creator>Maarten_Sjouw</dc:creator>
      <dc:date>2018-10-25T05:40:55Z</dc:date>
    </item>
    <item>
      <title>Re: Secondary connect R77.30</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Secondary-connect-R77-30/m-p/9632#M91499</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for reply!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I understand you correctly, Secondary Connect already enabled in R77.30. Is that right?&lt;BR /&gt;There is no (enable_secondary_connect) section in trac_client_1.ttm file.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 25 Oct 2018 10:18:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Secondary-connect-R77-30/m-p/9632#M91499</guid>
      <dc:creator>Maxim_Medvedev</dc:creator>
      <dc:date>2018-10-25T10:18:35Z</dc:date>
    </item>
    <item>
      <title>Re: Secondary connect R77.30</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Secondary-connect-R77-30/m-p/9633#M91500</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;As you can see in SK75221 it shows default enabled. This is why I hate manuals that say to add something that is already enabled.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 25 Oct 2018 10:50:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Secondary-connect-R77-30/m-p/9633#M91500</guid>
      <dc:creator>Maarten_Sjouw</dc:creator>
      <dc:date>2018-10-25T10:50:58Z</dc:date>
    </item>
    <item>
      <title>Re: Secondary connect R77.30</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Secondary-connect-R77-30/m-p/9634#M91501</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Secondary connect works after I add branch gateway to Remote Access community.&lt;/P&gt;&lt;P&gt;Authorization is performed on the main gateway and when I access to host at the branch site, secondary tunnel established.&lt;BR /&gt;But I cannot connect directly to branch gateway, error "site is not responding"&lt;/P&gt;&lt;P&gt;Maybe the reason is certificate installed on branch gateway?&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Subject Alternate Names&lt;/EM&gt; in main gateway internal certificate is &lt;STRONG&gt;public&lt;/STRONG&gt; IP address of the gateway, while&amp;nbsp;&lt;SPAN&gt;&lt;EM&gt;Subject Alternate Names&lt;/EM&gt; in branch internal certificate is &lt;STRONG&gt;management (private)&lt;/STRONG&gt; IP address of the gateway.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Should I reissue certificate with public IP at&amp;nbsp;&lt;EM&gt;Subject Alternate Names&lt;/EM&gt;?&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Oct 2018 10:21:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Secondary-connect-R77-30/m-p/9634#M91501</guid>
      <dc:creator>Maxim_Medvedev</dc:creator>
      <dc:date>2018-10-30T10:21:09Z</dc:date>
    </item>
    <item>
      <title>Re: Secondary connect R77.30</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Secondary-connect-R77-30/m-p/9635#M91502</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Although you authenticate the first connection to the primary gateway, every other tunnel will be authenticated with the same credentials. Do you see the second Auth request? What type of authentication do you use?&lt;/P&gt;&lt;P&gt;The cert should not be a problem, as it does not really look at the IP's.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Oct 2018 13:14:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Secondary-connect-R77-30/m-p/9635#M91502</guid>
      <dc:creator>Maarten_Sjouw</dc:creator>
      <dc:date>2018-10-30T13:14:27Z</dc:date>
    </item>
    <item>
      <title>Re: Secondary connect R77.30</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Secondary-connect-R77-30/m-p/9636#M91503</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This is quite a common demand. In case the branch offices are also connected to the same Check Point gateway via Site-to-Site VPN the easiest way to accomplish this is by defining an alternative remote access encryption domain that include the encryption domains of your branch offices or simply tell the VPN clients to route-all-traffic to your Check Point gateway. This will then re-route the traffic to your branch offices.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Oct 2018 13:29:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Secondary-connect-R77-30/m-p/9636#M91503</guid>
      <dc:creator>Danny</dc:creator>
      <dc:date>2018-10-30T13:29:17Z</dc:date>
    </item>
    <item>
      <title>Re: Secondary connect R77.30</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Secondary-connect-R77-30/m-p/9637#M91504</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi!&lt;/P&gt;&lt;P&gt;I tried two methods of authentication&lt;/P&gt;&lt;P&gt;local account&lt;/P&gt;&lt;P&gt;AD account&lt;/P&gt;&lt;P&gt;Both times I recieved second authentication request, it was successful and the second tunnel was&amp;nbsp;established.&lt;/P&gt;&lt;P&gt;Originally office mode network at branch gateway (10.1.180.0/24) was inside VPN domain (10.1.0.0/16) and I changed it to anoter network. But error was the same:&amp;nbsp;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;"site is not responding"&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;At the main office gateway two certificates are installed: from internal CA and from Active Directory (with CN equal to public VPN interface of gateway CN=vpn.mycompanyname.com)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;At the branch gateway only internal CA certificate is installed.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="background-color: #ffffff; color: #333333;"&gt;Is that certificate nececcary for Secondary Connect VPN scheme, or it is user only for SSL VPN?&lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Nov 2018 12:52:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Secondary-connect-R77-30/m-p/9637#M91504</guid>
      <dc:creator>Maxim_Medvedev</dc:creator>
      <dc:date>2018-11-01T12:52:34Z</dc:date>
    </item>
    <item>
      <title>Re: Secondary connect R77.30</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Secondary-connect-R77-30/m-p/9638#M91505</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Make sure that you do not have any overlap in the VPN domains of the gateways, there is a separate field in the VPN Topology area where you can add a VPN domain explicitly for Remote access.&amp;nbsp;&lt;/P&gt;&lt;P&gt;At what point do you get the Site not responding?&lt;/P&gt;&lt;P&gt;Secondary connect will make the connecting without any assistance from you, just try to connect (ping) to any device in the second location.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On the second location, make sure that routing for the Office Mode IP range of the primary GW is routed to that secondary gateway.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the second login is normal, and will only happen once, the next time you login (if you set the login credential caching to a time that is around 1 hour) it will know you and the site and will use the cached credentials.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The certificates are irrelevant for secondary connect, the gateways cert is sufficient.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 01 Nov 2018 22:43:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Secondary-connect-R77-30/m-p/9638#M91505</guid>
      <dc:creator>Maarten_Sjouw</dc:creator>
      <dc:date>2018-11-01T22:43:26Z</dc:date>
    </item>
    <item>
      <title>Re: Secondary connect R77.30</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Secondary-connect-R77-30/m-p/9639#M91506</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you, this question is quite clear&lt;/P&gt;&lt;P&gt;I have another one:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I use custers (two gateways in Cluster XL high availability)&lt;/P&gt;&lt;P&gt;There is certificate for cluster from internal CA and there are certificates for both gateways too, but they are expired.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Does this gateways certificates have any matter for Secondary connect?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;I can establish tunnel to branch gateway, and have access to branch resources via this tunnel, but I cannot connect to it directly. Is that normal?&lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 09 Nov 2018 10:07:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Secondary-connect-R77-30/m-p/9639#M91506</guid>
      <dc:creator>Maxim_Medvedev</dc:creator>
      <dc:date>2018-11-09T10:07:02Z</dc:date>
    </item>
    <item>
      <title>Re: Secondary connect R77.30</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Secondary-connect-R77-30/m-p/9640#M91507</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;when you go into the gateway object to the IP/Sec tab and see that the certificate there is expired you should just click renew. Yes this is needed for all VPN´s that use the certificate.&lt;/P&gt;&lt;P&gt;Always make sure they are valid.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I don´t understand your second question.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 09 Nov 2018 12:36:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Secondary-connect-R77-30/m-p/9640#M91507</guid>
      <dc:creator>Maarten_Sjouw</dc:creator>
      <dc:date>2018-11-09T12:36:12Z</dc:date>
    </item>
    <item>
      <title>Re: Secondary connect R77.30</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Secondary-connect-R77-30/m-p/9641#M91508</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello, I ask you:&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;STRONG style="color: #333333; background-color: #ffffff; border: 0px; font-weight: bold;"&gt;"I can establish tunnel to branch gateway, and have access to branch resources via this tunnel, but I cannot connect to it directly. Is that normal?"&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I mean that I can only connect to HQ gateway, when I change gateway to branch gateway in "Gateway" field of Endpoint Security Client, I recieve&amp;nbsp;&lt;SPAN style="color: #333333; background-color: #ffffff; border: 0px;"&gt;"site is not responding" error.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-1 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/74759_pastedImage_2.png" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I use local Checkpoint user or AD user, error is the same.&lt;/P&gt;&lt;P&gt;When connecting to HQ gateway, I can get access to branch hosts via Secondary Connect tunnel.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As I understand with Secondary Connect I should be able to&amp;nbsp;connect to any gateway in Remote Access community.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 21 Nov 2018 12:33:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Secondary-connect-R77-30/m-p/9641#M91508</guid>
      <dc:creator>Maxim_Medvedev</dc:creator>
      <dc:date>2018-11-21T12:33:18Z</dc:date>
    </item>
    <item>
      <title>Re: Secondary connect R77.30</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Secondary-connect-R77-30/m-p/9642#M91509</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I continue to install Secondary Connect feature and faced with different issues, here is another one:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've added third gateway Branch#2 to Remote Access community with R77,&amp;nbsp;but it doesn't work&amp;nbsp;&lt;SPAN&gt;(Secondary Connect works with the second gateway Branch#1)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;made all settings identical to the secong gateway&lt;/P&gt;&lt;P&gt;-&amp;nbsp;check VPN domains to prevent overlap&lt;/P&gt;&lt;P&gt;- renew certificates on cluster and on both appliances&lt;/P&gt;&lt;P&gt;- add Firewall rule to access to Branch#2 hosts&lt;/P&gt;&lt;P&gt;-&amp;nbsp;chose the right interface for VPN connections (External ip address of the cluster)&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="74760" class="image-1 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/74760_pastedImage_1.png" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can see following errors in trac.log file of Endpoint Connect&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;[ 3496 3516][21 Nov 15:01:43][IKE] message: (msg_obj&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt; :format (1.0)&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt; :id (CPSC_INTERNAL_ACCESS_DENIED)&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt; :def_msg ("Access denied - wrong user name or password ")&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt; :arguments ()&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;)&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;.........&lt;BR /&gt;&lt;EM&gt;[ 3496 3516][21 Nov 15:01:43][rais] [DEBUG] [RaisMessages::CreateMessageSet(s)] message: (msg_obj&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt; :format (1.0)&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt; :id (ClipsMessagesGwNegFailed)&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt; :def_msg ("Negotiation with site failed")&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt; :arguments ()&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;)&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;..........&lt;BR /&gt;&lt;EM&gt;[ 3496 3516][21 Nov 15:01:43][FLOW] TrConnEngineConnectStep::operation_failed: user message set: (msg_obj&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt; :format (1.0)&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt; :id (ClipsMessagesGwNegFailed)&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt; :def_msg ("Negotiation with site failed")&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt; :arguments (&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;The only differences between Branch gateways is:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;1. version (branch#1 gateway with&amp;nbsp;R77.30 works,&amp;nbsp;branch#2 gateway with R70 doesn't)&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;2. management interfaces of branch#1 gateway connected directly (branch#1 gateway&amp;nbsp;interface and management server located in the same /24 network via IPVPN) and management interfaces of branch#2 gateway connected via corporate network (located in different networks and connected via two routers)&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Couls you help me with these questions:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Does Secondary Connect work with R77 version?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;What mean error&lt;EM&gt; "Access denied - wrong user name or password"&lt;/EM&gt;? What settings may mismatch in that case?&lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 21 Nov 2018 13:04:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Secondary-connect-R77-30/m-p/9642#M91509</guid>
      <dc:creator>Maxim_Medvedev</dc:creator>
      <dc:date>2018-11-21T13:04:53Z</dc:date>
    </item>
    <item>
      <title>Re: Secondary connect R77.30</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Secondary-connect-R77-30/m-p/9643#M91510</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Did you add the second gateway to the Remote Access community and did you install policy to that gateway?&lt;/P&gt;&lt;P&gt;You should be able to connect to that gateway directly, if that does not work, check the Remote Access settings in that gateway object and adjust where needed, ie you need to turn on Support Visitor Mode.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 21 Nov 2018 13:45:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Secondary-connect-R77-30/m-p/9643#M91510</guid>
      <dc:creator>Maarten_Sjouw</dc:creator>
      <dc:date>2018-11-21T13:45:50Z</dc:date>
    </item>
    <item>
      <title>Re: Secondary connect R77.30</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Secondary-connect-R77-30/m-p/9644#M91511</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You point me to the right direction, I've enabled&amp;nbsp;SSL Network Extender:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-1 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/74831_pastedImage_2.png" /&gt;&lt;/P&gt;&lt;P&gt;I also add Firewall rule to permit ssl traffic to external interface of gateway.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Gateway started to accept SSL connections.&lt;/P&gt;&lt;P&gt;But there is still no connections directly to gateway.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In wireshark I can see SSL communications and ISAKMP communications&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;ISAKMP communications ends with icmp Destination unreachable (Port unreacheable) messages from client side, although it started successfuly, but after three packets client responced with&amp;nbsp;icmp Destination unreachable (Port unreacheable) messages.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-2 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/74839_pastedImage_3.png" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I cannot understand what is missing this time&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 22 Nov 2018 10:24:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Secondary-connect-R77-30/m-p/9644#M91511</guid>
      <dc:creator>Maxim_Medvedev</dc:creator>
      <dc:date>2018-11-22T10:24:43Z</dc:date>
    </item>
    <item>
      <title>Re: Secondary connect R77.30</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Secondary-connect-R77-30/m-p/9645#M91512</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You need to click the Plus sign in front of VPN Clients then in that list select Remote access:&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-1 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/74840_pastedImage_1.png" /&gt;&lt;/P&gt;&lt;P&gt;Here you need to enable Support Visitor Mode.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 22 Nov 2018 11:41:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Secondary-connect-R77-30/m-p/9645#M91512</guid>
      <dc:creator>Maarten_Sjouw</dc:creator>
      <dc:date>2018-11-22T11:41:32Z</dc:date>
    </item>
    <item>
      <title>Re: Secondary connect R77.30</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Secondary-connect-R77-30/m-p/9646#M91513</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;EM&gt;Support Visitor Mode&lt;/EM&gt; enabled and it was already enabled.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I also check &lt;EM&gt;IKE Properties&lt;/EM&gt; in &lt;EM&gt;Traditional mode configuration&lt;/EM&gt;...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-1 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/74841_pastedImage_2.png" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;...and change it to match&amp;nbsp;settings in &lt;EM&gt;Global&amp;nbsp;&lt;/EM&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;EM&gt;Properties&lt;/EM&gt;:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;IMG class="image-2 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/74842_pastedImage_3.png" /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;And of course I save and install policy after every change of settings&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 22 Nov 2018 13:38:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Secondary-connect-R77-30/m-p/9646#M91513</guid>
      <dc:creator>Maxim_Medvedev</dc:creator>
      <dc:date>2018-11-22T13:38:11Z</dc:date>
    </item>
    <item>
      <title>Re: Secondary connect R77.30</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Secondary-connect-R77-30/m-p/9647#M91514</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What does tracker show when you filter on the second gateway as destination?&lt;/P&gt;&lt;P&gt;Specially when you know the IP of the client this should help filtering.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PS do make sure you are NOT on the LAN of any of the Check Point FW's in your envirnoment.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 22 Nov 2018 14:54:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Secondary-connect-R77-30/m-p/9647#M91514</guid>
      <dc:creator>Maarten_Sjouw</dc:creator>
      <dc:date>2018-11-22T14:54:10Z</dc:date>
    </item>
    <item>
      <title>Re: Secondary connect R77.30</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Secondary-connect-R77-30/m-p/9648#M91515</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, there is something:&lt;/P&gt;&lt;P&gt;traffic to establish VPN to HQ gateway followed implied rule (number zero), although traffic to establish VPN to branch gateway followed other rule.&lt;/P&gt;&lt;P&gt;There was no access to TCP 443 from Internet to branch gateway therefore I had to add specific Firewall rule.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I suppose there should be implied rule for branch gateway too.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-1 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/74987_pastedImage_1.png" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;P.S.&lt;/P&gt;&lt;P&gt;answering your comment: I use pure Internet for my tests (3G smartphone acting like&amp;nbsp;access point for my laptop)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 23 Nov 2018 08:45:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Secondary-connect-R77-30/m-p/9648#M91515</guid>
      <dc:creator>Maxim_Medvedev</dc:creator>
      <dc:date>2018-11-23T08:45:17Z</dc:date>
    </item>
  </channel>
</rss>

