<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: exclude checkpoint public/external ip from encryption domain? in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/exclude-checkpoint-public-external-ip-from-encryption-domain/m-p/184297#M30701</link>
    <description>&lt;BLOCKQUOTE&gt;
&lt;P&gt;Indeed, to exclude the public IP address form the encryption domain , you will need to modify the crypt.def file. I'm still hoping for a check box to enable/disable this in the future !&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;&amp;nbsp;It's there in R81.20:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="IMG_0215.jpeg" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/21474iBD9560B0D41A8C81/image-size/large?v=v2&amp;amp;px=999" role="button" title="IMG_0215.jpeg" alt="IMG_0215.jpeg" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 19 Jun 2023 17:43:26 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2023-06-19T17:43:26Z</dc:date>
    <item>
      <title>exclude checkpoint public/external ip from encryption domain?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/exclude-checkpoint-public-external-ip-from-encryption-domain/m-p/184271#M30692</link>
      <description>&lt;P&gt;Hello.&lt;BR /&gt;&lt;BR /&gt;Yes another one of these regarding crypt.def file that needs to be modified but slightly different.&lt;/P&gt;&lt;P&gt;there are currently 2 sites with a checkpoint cluster.&lt;BR /&gt;both are managed by the same SMS located in site 1 ( site1 cluster managed via internal ip, site2 cluster via public ip)&lt;BR /&gt;the 2 clusters also make a s2s vpn.&lt;BR /&gt;(this is running now with no modifications to crypt.def file)&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;the company wants a multi vendor approach and has decided to change the roll of the checkpoint to internal/dmz firewall and bought palo alto firewalls to be the internet facing firewall.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;the main site will be migrated first which means there will be an intermediate setup where the internet facing firewall on site 1 will be palo alto and the remote site will still be checkpoint.&lt;BR /&gt;(also requiring a s2s tunnel from palo alto to remote checkpoint)&lt;BR /&gt;&lt;BR /&gt;I already want to prepare the crypt.def file right now (when it's still checkpoint to checkpoint) but am a bit confused which entries I then have to configure to make sure both checkpoint clusters don't send the remote public ips inside the tunnel.&lt;BR /&gt;&lt;BR /&gt;so far I got:&lt;/P&gt;&lt;P&gt;vpn_exclude_1={&amp;lt;"site1 1st public ip","site1 3rd public ip"&amp;gt;};&lt;BR /&gt;vpn_exclude_2={&amp;lt;"site2 1stpublic ip","site2 3rd public ip"&amp;gt;};&lt;/P&gt;&lt;P&gt;#define NON_VPN_TRAFFIC_RULES ((src=vpn_exclude_1) or (src=vpn_exclude_2) or (dst=vpn_exclude_1) or (dst=vpn_exclude_2))&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;but I'm not sure if this is not too much.&lt;BR /&gt;open questions:&lt;/P&gt;&lt;P&gt;1: they are both clusters so the checkpoints have a vip ( 1st ip), gw1(2nd ip), gw2(3rd ip) hence the vpn_exclude objects contain a range of 3 ip's.&lt;BR /&gt;I'm not entirely sure if this is necessary? do I need to exclude each ip defined on a checkpoint ( vip and physical interface ip) or would i only need to exclude the vip?&lt;BR /&gt;or should I just exclude the entire public ip subnet of each site (eg /28) ?&lt;BR /&gt;&lt;BR /&gt;2: both checkpoints clusters will have to use this crypt.def file to exclude the other's public ip from the tunnel&lt;BR /&gt;my logic:&lt;BR /&gt;I need to include "src=vpn_exclude_1" and "dst=vpn_exclude_2" for the cluster on site 1 to make sure it does not send its own public ip in the tunnel and so that it knows it can accept the public ip of site2 outside the tunnel&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;I need to include "src=vpn_exclude_2" and "dst_vpn_exclude_1" for the cluster on site 2 to make sure it does the exact same.&lt;/P&gt;&lt;P&gt;so 4 statements required to get this to work between 2 checkpoint peers&lt;BR /&gt;Am I correct here or do I not need to include those 4 statements in the non_vpn_traffic_rules&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;During migration (intermediat setup with 1 side palo alto) as long as the peer ip used by the palo to setup the vpn tunnel is one of the 3 addresses that is already excluded it should require no further modification on the remote checkpoint once the local gateway becomes a palo alto.&lt;BR /&gt;&lt;BR /&gt;goals of doing this:&lt;BR /&gt;I do not want to lose my mgmt connection to the remote gateway when installing this policy (with the new crypt.def file)&lt;BR /&gt;I do not want to lose my mgmt connection to the remote gateway over public ip when we install the palo alto in front of the checkpoint on site 1. (at this point the public ip is moved away from the site1 checkpoint and natting behind public ip will be done by the palo alto)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 19 Jun 2023 12:16:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/exclude-checkpoint-public-external-ip-from-encryption-domain/m-p/184271#M30692</guid>
      <dc:creator>Tommie_Van_Hove</dc:creator>
      <dc:date>2023-06-19T12:16:56Z</dc:date>
    </item>
    <item>
      <title>Re: exclude checkpoint public/external ip from encryption domain?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/exclude-checkpoint-public-external-ip-from-encryption-domain/m-p/184279#M30696</link>
      <description>&lt;P&gt;Hey Tommie,&lt;/P&gt;&lt;P&gt;Indeed, to exclude the public IP address form the encryption domain , you will need to modify the crypt.def file. I'm still hoping for a check box to enable/disable this in the future !&lt;BR /&gt;There is no real need for this exclusion just to setup a VPN tunnel to a 3th party, only if you need communication over the IP addresses outside the tunnel (icmp, webserver running on the same Public IP and outside of the tunnel, ..)&lt;/P&gt;&lt;P&gt;I think your syntax is correct, but a bit too much with only OR's, I would create it like this :&lt;/P&gt;&lt;P&gt;vpn_exclude_1={&amp;lt;"site1 1st public ip","site1 3rd public ip"&amp;gt;};&lt;BR /&gt;vpn_exclude_2={&amp;lt;"site2 1st public ip","site2 3rd public ip"&amp;gt;};&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;#ifndef NON_VPN_TRAFFIC_RULES&lt;BR /&gt;#ifndef IPV6_FLAVOR&lt;BR /&gt;#define NON_VPN_TRAFFIC_RULES ((src in vpn_exclude_1 and dst in vpn_exclude_2) or \&lt;BR /&gt;(src in vpn_exclude_2 and dst in vpn_exclude_1))&lt;BR /&gt;#else&lt;BR /&gt;#define NON_VPN_TRAFFIC_RULES 0&lt;BR /&gt;#endif&lt;BR /&gt;#endif&lt;/P&gt;&lt;P&gt;question 1 :&lt;BR /&gt;I think only the VIP is needed and not the physical IP addresses, but no harm to add them.&lt;/P&gt;&lt;P&gt;question 2 : indeed, should be like this :&lt;/P&gt;&lt;P&gt;(src in vpn_exclude_1 and dst in vpn_exclude_2) or&lt;BR /&gt;(src in vpn_exclude_2 and dst in vpn_exclude_1)&lt;/P&gt;</description>
      <pubDate>Mon, 19 Jun 2023 14:35:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/exclude-checkpoint-public-external-ip-from-encryption-domain/m-p/184279#M30696</guid>
      <dc:creator>K_R_V</dc:creator>
      <dc:date>2023-06-19T14:35:37Z</dc:date>
    </item>
    <item>
      <title>Re: exclude checkpoint public/external ip from encryption domain?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/exclude-checkpoint-public-external-ip-from-encryption-domain/m-p/184297#M30701</link>
      <description>&lt;BLOCKQUOTE&gt;
&lt;P&gt;Indeed, to exclude the public IP address form the encryption domain , you will need to modify the crypt.def file. I'm still hoping for a check box to enable/disable this in the future !&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;
&lt;P&gt;&amp;nbsp;It's there in R81.20:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="IMG_0215.jpeg" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/21474iBD9560B0D41A8C81/image-size/large?v=v2&amp;amp;px=999" role="button" title="IMG_0215.jpeg" alt="IMG_0215.jpeg" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 19 Jun 2023 17:43:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/exclude-checkpoint-public-external-ip-from-encryption-domain/m-p/184297#M30701</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2023-06-19T17:43:26Z</dc:date>
    </item>
    <item>
      <title>Re: exclude checkpoint public/external ip from encryption domain?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/exclude-checkpoint-public-external-ip-from-encryption-domain/m-p/246129#M41127</link>
      <description>&lt;P&gt;Will this option "Exclude gateway's external IP addresses from VPN Domain" be available for SMB Devices as well?&lt;/P&gt;</description>
      <pubDate>Thu, 10 Apr 2025 10:24:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/exclude-checkpoint-public-external-ip-from-encryption-domain/m-p/246129#M41127</guid>
      <dc:creator>D_W</dc:creator>
      <dc:date>2025-04-10T10:24:27Z</dc:date>
    </item>
    <item>
      <title>Re: exclude checkpoint public/external ip from encryption domain?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/exclude-checkpoint-public-external-ip-from-encryption-domain/m-p/246171#M41134</link>
      <description>&lt;P&gt;I see no reason why we wouldn't, but it doesn't seem to be supported at present.&lt;/P&gt;</description>
      <pubDate>Thu, 10 Apr 2025 15:11:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/exclude-checkpoint-public-external-ip-from-encryption-domain/m-p/246171#M41134</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2025-04-10T15:11:03Z</dc:date>
    </item>
    <item>
      <title>Re: exclude checkpoint public/external ip from encryption domain?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/exclude-checkpoint-public-external-ip-from-encryption-domain/m-p/251684#M42115</link>
      <description>&lt;P&gt;I've noted that "vpn-domain-exclude-external-ip-addresses" is not available in the API (2.0) which is set when you enable "&lt;SPAN&gt;Exclude gateway's external IP addresses from VPN Domain" from the GUI.&amp;nbsp; Do we know when this will be available?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 20 Jun 2025 15:47:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/exclude-checkpoint-public-external-ip-from-encryption-domain/m-p/251684#M42115</guid>
      <dc:creator>genisis__</dc:creator>
      <dc:date>2025-06-20T15:47:13Z</dc:date>
    </item>
    <item>
      <title>Re: exclude checkpoint public/external ip from encryption domain?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/exclude-checkpoint-public-external-ip-from-encryption-domain/m-p/251803#M42127</link>
      <description>&lt;P&gt;Offhand, I do not.&lt;BR /&gt;However, there are many things relative to the gateway object that still need API support.&lt;/P&gt;</description>
      <pubDate>Mon, 23 Jun 2025 19:28:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/exclude-checkpoint-public-external-ip-from-encryption-domain/m-p/251803#M42127</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2025-06-23T19:28:16Z</dc:date>
    </item>
    <item>
      <title>Re: exclude checkpoint public/external ip from encryption domain?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/exclude-checkpoint-public-external-ip-from-encryption-domain/m-p/273942#M45862</link>
      <description>&lt;P&gt;Hey PhoneBoy,&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;You know that this option excludes not only external IPs but also the main IP from the VPN domain. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;We have encountered this, and it’s not a bug, but a feature. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;At the same time, UserCheck, Identity Sharing, and I believe Captive Portal themselves select the main IP as their access IP. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;This creates a catch-22 situation for branches if they route through the center, assuming that the white (public) IPs of both nodes must be accessible outside of IPsec.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 22 Mar 2026 14:57:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/exclude-checkpoint-public-external-ip-from-encryption-domain/m-p/273942#M45862</guid>
      <dc:creator>MiniNinja</dc:creator>
      <dc:date>2026-03-22T14:57:23Z</dc:date>
    </item>
    <item>
      <title>Re: exclude checkpoint public/external ip from encryption domain?</title>
      <link>https://community.checkpoint.com/t5/General-Topics/exclude-checkpoint-public-external-ip-from-encryption-domain/m-p/274011#M45873</link>
      <description>&lt;P&gt;Had no idea it excluded the Main IP, though it does make sense.&lt;BR /&gt;Pretty sure you can change the IPs used for UserCheck/Captive Portal, though I'm not sure about Identity Sharing.&lt;BR /&gt;Identity Broker is always an option.&lt;/P&gt;</description>
      <pubDate>Mon, 23 Mar 2026 21:25:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/exclude-checkpoint-public-external-ip-from-encryption-domain/m-p/274011#M45873</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2026-03-23T21:25:37Z</dc:date>
    </item>
  </channel>
</rss>

