<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic R81.20 JHF65 | Firewall Initiated Traffic Now Considered In VPN Domain in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/R81-20-JHF65-Firewall-Initiated-Traffic-Now-Considered-In-VPN/m-p/218875#M36472</link>
    <description>&lt;P&gt;We have an internal site-to-site VPN that we've been running for years now where our firewalls send traffic through another firewall just fine. However, after the JHF, the remote firewall is now stating this traffic should be encrypted when the firewall is sending from an IP not in the VPN Domain. See diagram below:&lt;/P&gt;
&lt;P&gt;[VPNDomainNetA] --- [FWA]TX --- [LANA] --- [PrivateWAN] --- [LANB] --- [FWB] --- [VPNDomainNetB] --- RX[ServerB]&lt;/P&gt;
&lt;P&gt;So FWA is sending (TX) from its LANA interface to ServerB (RX).&lt;/P&gt;
&lt;P&gt;Why is FWB now considering this something that should be encrypted post hotfix? Obviously we can't add FWA LANA's IP to the VPN Domain as that would break all kinds of other stuff. Having to follow sk86582 (as TAC suggested) seems a bit ridiculous. Firewall interfaces not in the VPN Domain networks shouldn't be considered in the VPN Domain network.&lt;/P&gt;</description>
    <pubDate>Wed, 26 Jun 2024 20:30:01 GMT</pubDate>
    <dc:creator>B_P</dc:creator>
    <dc:date>2024-06-26T20:30:01Z</dc:date>
    <item>
      <title>R81.20 JHF65 | Firewall Initiated Traffic Now Considered In VPN Domain</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R81-20-JHF65-Firewall-Initiated-Traffic-Now-Considered-In-VPN/m-p/218875#M36472</link>
      <description>&lt;P&gt;We have an internal site-to-site VPN that we've been running for years now where our firewalls send traffic through another firewall just fine. However, after the JHF, the remote firewall is now stating this traffic should be encrypted when the firewall is sending from an IP not in the VPN Domain. See diagram below:&lt;/P&gt;
&lt;P&gt;[VPNDomainNetA] --- [FWA]TX --- [LANA] --- [PrivateWAN] --- [LANB] --- [FWB] --- [VPNDomainNetB] --- RX[ServerB]&lt;/P&gt;
&lt;P&gt;So FWA is sending (TX) from its LANA interface to ServerB (RX).&lt;/P&gt;
&lt;P&gt;Why is FWB now considering this something that should be encrypted post hotfix? Obviously we can't add FWA LANA's IP to the VPN Domain as that would break all kinds of other stuff. Having to follow sk86582 (as TAC suggested) seems a bit ridiculous. Firewall interfaces not in the VPN Domain networks shouldn't be considered in the VPN Domain network.&lt;/P&gt;</description>
      <pubDate>Wed, 26 Jun 2024 20:30:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R81-20-JHF65-Firewall-Initiated-Traffic-Now-Considered-In-VPN/m-p/218875#M36472</guid>
      <dc:creator>B_P</dc:creator>
      <dc:date>2024-06-26T20:30:01Z</dc:date>
    </item>
    <item>
      <title>Re: R81.20 JHF65 | Firewall Initiated Traffic Now Considered In VPN Domain</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R81-20-JHF65-Firewall-Initiated-Traffic-Now-Considered-In-VPN/m-p/219281#M36538</link>
      <description>&lt;P&gt;Are both gateways managed by the same manager?&lt;/P&gt;
&lt;P&gt;The gateway with all of its IP addresses are automatically included in the encryption domain.&lt;BR /&gt;This has been the case for as long as I can remember unless you modify the relevant .def files.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 01 Jul 2024 15:20:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R81-20-JHF65-Firewall-Initiated-Traffic-Now-Considered-In-VPN/m-p/219281#M36538</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-07-01T15:20:21Z</dc:date>
    </item>
    <item>
      <title>Re: R81.20 JHF65 | Firewall Initiated Traffic Now Considered In VPN Domain</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R81-20-JHF65-Firewall-Initiated-Traffic-Now-Considered-In-VPN/m-p/219305#M36541</link>
      <description>&lt;P&gt;That's really bad practice. The crypt.def file is dumb practice to begin with because it gets overwritten on upgrades. It's even more dumb that a firewall considers IPs that don't belong to a network as belonging to a network.&lt;/P&gt;
&lt;P&gt;When it comes to security, quirks like this are dangerous and frankly have no place in an enterprise security system.&lt;/P&gt;</description>
      <pubDate>Mon, 01 Jul 2024 17:29:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R81-20-JHF65-Firewall-Initiated-Traffic-Now-Considered-In-VPN/m-p/219305#M36541</guid>
      <dc:creator>B_P</dc:creator>
      <dc:date>2024-07-01T17:29:12Z</dc:date>
    </item>
    <item>
      <title>Re: R81.20 JHF65 | Firewall Initiated Traffic Now Considered In VPN Domain</title>
      <link>https://community.checkpoint.com/t5/General-Topics/R81-20-JHF65-Firewall-Initiated-Traffic-Now-Considered-In-VPN/m-p/219309#M36543</link>
      <description>&lt;P&gt;So you want to exclude the external IP of the FW from the encryption domain if I get it right?&lt;/P&gt;
&lt;P&gt;There is an option in R81.20 in the gateway/cluster properties under VPN Domain to do so without editing .def files.&lt;/P&gt;</description>
      <pubDate>Mon, 01 Jul 2024 18:55:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/R81-20-JHF65-Firewall-Initiated-Traffic-Now-Considered-In-VPN/m-p/219309#M36543</guid>
      <dc:creator>Alex-</dc:creator>
      <dc:date>2024-07-01T18:55:52Z</dc:date>
    </item>
  </channel>
</rss>

