<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Remote Access and Site-to-Site VPN access restriction in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/Remote-Access-and-Site-to-Site-VPN-access-restriction/m-p/17636#M3007</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi&amp;nbsp;&lt;A _jive_internal="true" data-avatarid="1031" data-externalid="" data-online="false" data-presence="null" data-userid="42431" data-username="e93ff35c-8346-483f-93fe-3ba21bfe3c94" href="https://community.checkpoint.com/people/e93ff35c-8346-483f-93fe-3ba21bfe3c94" style="color: inherit; background-color: #ffffff; border: 0px; font-weight: bold; text-decoration: underline; font-size: 14px;"&gt;Jozko Mrkvicka&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You were right.&lt;/P&gt;&lt;P&gt;I enabled Web services on the 10.10.0.10,&amp;nbsp;and I tried to access it using http from a remote client and access was not granted. I tried to ping it, it worked.&lt;/P&gt;&lt;P&gt;I guess this issue is only related to Ping.&lt;/P&gt;&lt;P&gt;Why is that ping is accepted by the implied rule even if the destination is not specified in the firewall policy?&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sun, 18 Nov 2018 09:56:14 GMT</pubDate>
    <dc:creator>Di_Junior</dc:creator>
    <dc:date>2018-11-18T09:56:14Z</dc:date>
    <item>
      <title>Remote Access and Site-to-Site VPN access restriction</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Remote-Access-and-Site-to-Site-VPN-access-restriction/m-p/17628#M2999</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Dear Mates&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have currently migrated our VPN solution to Check Point. However, I have been experiencing some issues when it comes to restricting access to specific machines.&lt;/P&gt;&lt;P&gt;For example, if I set the VPN domain on the Gateway to &lt;STRONG&gt;10.10.0.0/24&lt;/STRONG&gt; which is a network behind the gateway. And then create a firewall policy for remote users to access only &lt;STRONG&gt;10.10.0.20/32&lt;/STRONG&gt;, the remote users are also being able to access other hosts in &lt;STRONG&gt;10.10.0.0/24&lt;/STRONG&gt; network&amp;nbsp; like &lt;STRONG&gt;10.10.0.22/32&lt;/STRONG&gt; , even if I only use a single host as a destination.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-1 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/74626_pastedImage_2.png" /&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In the figure above, the RemoteAcess-users, are also being able to access other machines on the defined VPN domain apart from GUI-A.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does this mean that remote users can access any machine in the VPN domain?&lt;/P&gt;&lt;P&gt;Any ideas on how this issue could be resolved, in such a way remote users only access the machines defined in the Destination field of the Firewall Policy?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Site-to-Site VPN&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The same behavior is happening in site-to-site VPN, I only specified on host in the source, but other host can also access the remote machines even if they are not specified as source.&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-2 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/74627_pastedImage_6.png" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 17 Nov 2018 21:27:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Remote-Access-and-Site-to-Site-VPN-access-restriction/m-p/17628#M2999</guid>
      <dc:creator>Di_Junior</dc:creator>
      <dc:date>2018-11-17T21:27:43Z</dc:date>
    </item>
    <item>
      <title>Re: Remote Access and Site-to-Site VPN access restriction</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Remote-Access-and-Site-to-Site-VPN-access-restriction/m-p/17629#M3000</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;1. Please check logs and find out which firewall rule is allowing such traffic (if all rules have enabled logging).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2. Send us screenshot of "GUI-A" and "GUI-B" hosts.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3. Check NAT rules if there are any.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 18 Nov 2018 06:54:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Remote-Access-and-Site-to-Site-VPN-access-restriction/m-p/17629#M3000</guid>
      <dc:creator>JozkoMrkvicka</dc:creator>
      <dc:date>2018-11-18T06:54:50Z</dc:date>
    </item>
    <item>
      <title>Re: Remote Access and Site-to-Site VPN access restriction</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Remote-Access-and-Site-to-Site-VPN-access-restriction/m-p/17630#M3001</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi there&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There is only one rule. And when such communication happen, I don't see the logs in SmartView tracker. I'm starting to wondering if it's not an implicit rule.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 18 Nov 2018 07:09:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Remote-Access-and-Site-to-Site-VPN-access-restriction/m-p/17630#M3001</guid>
      <dc:creator>Di_Junior</dc:creator>
      <dc:date>2018-11-18T07:09:37Z</dc:date>
    </item>
    <item>
      <title>Re: Remote Access and Site-to-Site VPN access restriction</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Remote-Access-and-Site-to-Site-VPN-access-restriction/m-p/17631#M3002</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;In this case try to enable logging of Implied rules from Global Settings and install the database (of course firewall itself).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Stupid question, but it happened to me few times - are you checking the correct gateway ? Try to do tcpdump to confirm that you see some traffic during test, and issue "fw stat" to find which policy package is used for this cluster.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 18 Nov 2018 07:16:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Remote-Access-and-Site-to-Site-VPN-access-restriction/m-p/17631#M3002</guid>
      <dc:creator>JozkoMrkvicka</dc:creator>
      <dc:date>2018-11-18T07:16:39Z</dc:date>
    </item>
    <item>
      <title>Re: Remote Access and Site-to-Site VPN access restriction</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Remote-Access-and-Site-to-Site-VPN-access-restriction/m-p/17632#M3003</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi&amp;nbsp;&lt;A _jive_internal="true" data-avatarid="1031" data-externalid="" data-online="false" data-presence="null" data-userid="42431" data-username="e93ff35c-8346-483f-93fe-3ba21bfe3c94" href="https://community.checkpoint.com/people/e93ff35c-8346-483f-93fe-3ba21bfe3c94" style="color: inherit; background-color: #ffffff; border: 0px; font-weight: bold; text-decoration: underline; font-size: 14px;"&gt;Jozko Mrkvicka&lt;/A&gt;&lt;SPAN style="color: #e45785; background-color: #ffffff;"&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The traffic seems to be accepted by an implied rule (see the figure below). The question is, where can i find the implied rule number 0? is it the first one in the implicit rules (File-&amp;gt;View-&amp;gt;implied rules)?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-1 jive-image" height="600" src="https://community.checkpoint.com/legacyfs/online/checkpoint/74632_pastedImage_1.png" width="731" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 18 Nov 2018 08:09:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Remote-Access-and-Site-to-Site-VPN-access-restriction/m-p/17632#M3003</guid>
      <dc:creator>Di_Junior</dc:creator>
      <dc:date>2018-11-18T08:09:38Z</dc:date>
    </item>
    <item>
      <title>Re: Remote Access and Site-to-Site VPN access restriction</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Remote-Access-and-Site-to-Site-VPN-access-restriction/m-p/17633#M3004</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Isnt IP 10.10.1.3 one of cluster members? Is this IP part of Topology ?&lt;/P&gt;&lt;P&gt;usually traffic going from cluster members is going via Implied Rules.&lt;/P&gt;&lt;P&gt;Also, try some real traffic, like ssh or https, not ping.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 18 Nov 2018 09:05:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Remote-Access-and-Site-to-Site-VPN-access-restriction/m-p/17633#M3004</guid>
      <dc:creator>JozkoMrkvicka</dc:creator>
      <dc:date>2018-11-18T09:05:01Z</dc:date>
    </item>
    <item>
      <title>Re: Remote Access and Site-to-Site VPN access restriction</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Remote-Access-and-Site-to-Site-VPN-access-restriction/m-p/17634#M3005</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;its not a cluster. I am using two separated gateways.&lt;/P&gt;&lt;P&gt;10.10.1.3 is a host which is part of the topology of the remote peer.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 18 Nov 2018 09:34:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Remote-Access-and-Site-to-Site-VPN-access-restriction/m-p/17634#M3005</guid>
      <dc:creator>Di_Junior</dc:creator>
      <dc:date>2018-11-18T09:34:35Z</dc:date>
    </item>
    <item>
      <title>Re: Remote Access and Site-to-Site VPN access restriction</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Remote-Access-and-Site-to-Site-VPN-access-restriction/m-p/17635#M3006</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;10.10.1.3 must be included only in local VPN encryption domain of SGW-B (also part of Topology).&lt;/P&gt;&lt;P&gt;10.10.0.10 must be included only in remote VPN encryption domain of VPN-PEER.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 18 Nov 2018 09:45:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Remote-Access-and-Site-to-Site-VPN-access-restriction/m-p/17635#M3006</guid>
      <dc:creator>JozkoMrkvicka</dc:creator>
      <dc:date>2018-11-18T09:45:07Z</dc:date>
    </item>
    <item>
      <title>Re: Remote Access and Site-to-Site VPN access restriction</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Remote-Access-and-Site-to-Site-VPN-access-restriction/m-p/17636#M3007</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi&amp;nbsp;&lt;A _jive_internal="true" data-avatarid="1031" data-externalid="" data-online="false" data-presence="null" data-userid="42431" data-username="e93ff35c-8346-483f-93fe-3ba21bfe3c94" href="https://community.checkpoint.com/people/e93ff35c-8346-483f-93fe-3ba21bfe3c94" style="color: inherit; background-color: #ffffff; border: 0px; font-weight: bold; text-decoration: underline; font-size: 14px;"&gt;Jozko Mrkvicka&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You were right.&lt;/P&gt;&lt;P&gt;I enabled Web services on the 10.10.0.10,&amp;nbsp;and I tried to access it using http from a remote client and access was not granted. I tried to ping it, it worked.&lt;/P&gt;&lt;P&gt;I guess this issue is only related to Ping.&lt;/P&gt;&lt;P&gt;Why is that ping is accepted by the implied rule even if the destination is not specified in the firewall policy?&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 18 Nov 2018 09:56:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Remote-Access-and-Site-to-Site-VPN-access-restriction/m-p/17636#M3007</guid>
      <dc:creator>Di_Junior</dc:creator>
      <dc:date>2018-11-18T09:56:14Z</dc:date>
    </item>
    <item>
      <title>Re: Remote Access and Site-to-Site VPN access restriction</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Remote-Access-and-Site-to-Site-VPN-access-restriction/m-p/17637#M3008</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi &lt;A href="https://community.checkpoint.com/migrated-users/50798"&gt;Di Junior&lt;/A&gt;‌,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please check if you have &lt;STRONG&gt;Accept ICMP requests&lt;/STRONG&gt; enabled, or not. These are the default settings for all implied rules:&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-1 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/74633_pastedImage_1.png" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 18 Nov 2018 13:09:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Remote-Access-and-Site-to-Site-VPN-access-restriction/m-p/17637#M3008</guid>
      <dc:creator>JozkoMrkvicka</dc:creator>
      <dc:date>2018-11-18T13:09:02Z</dc:date>
    </item>
    <item>
      <title>Re: Remote Access and Site-to-Site VPN access restriction</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Remote-Access-and-Site-to-Site-VPN-access-restriction/m-p/17638#M3009</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;STRONG&gt;0 - Implied rules&lt;/STRONG&gt; - it represents all of&amp;nbsp;implied rules, you would need to check Global properties or Implied rules themselves to understand which setting exactly allows this traffic. But usually it's not difficult to determine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would like to point to another possibility, which is not your case obviously, but just worth mentioning.&lt;/P&gt;&lt;P&gt;Accept all encrypted traffic option might be enabled in comunity properties.&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-1 jive-image" height="543" src="https://community.checkpoint.com/legacyfs/online/checkpoint/74635_pastedImage_1.png" width="575" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Which will result in the following rule, which is visible in policy by default (not like implied rules).&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-2 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/74640_pastedImage_6.png" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 18 Nov 2018 17:26:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Remote-Access-and-Site-to-Site-VPN-access-restriction/m-p/17638#M3009</guid>
      <dc:creator>AlekseiShelepov</dc:creator>
      <dc:date>2018-11-18T17:26:59Z</dc:date>
    </item>
  </channel>
</rss>

