<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Remote access users access resources behind site to site tunnel in SASE and Remote Access</title>
    <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-access-users-access-resources-behind-site-to-site-tunnel/m-p/213921#M4453</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I tested in my lab by creating a group with the the local and remote subnets of the VPN tunnel; and adding the group to the VPN domain of the "RemoteAccess "community. It was OK but it wasn't enough.&lt;/P&gt;&lt;P&gt;In order to make it work, I had to add the Office Mode subnet (CP_default_Office ...) to the local VPN domain because I was getting the following log :&lt;/P&gt;&lt;P&gt;'Encryption Failure: according to the policy the packet should not have been decrypted'&lt;/P&gt;&lt;P&gt;So I created a group with the local subnet and the Office Mode subnet :&lt;/P&gt;&lt;P&gt;Then, I had to authorize the Office Mode subnet, on the remote gateway because the packets finished in the cleanup rule of the remote gateway.&lt;/P&gt;&lt;P&gt;This way from the remote client (on remote access), I was able to access to a PC on the remote site through the VPN tunnel&lt;/P&gt;&lt;P&gt;I hope this will help&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sat, 11 May 2024 17:55:30 GMT</pubDate>
    <dc:creator>patones1</dc:creator>
    <dc:date>2024-05-11T17:55:30Z</dc:date>
    <item>
      <title>Remote access users access resources behind site to site tunnel</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-access-users-access-resources-behind-site-to-site-tunnel/m-p/196329#M4448</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am trying to solve an issue where i need remote access users to be able to connect to resources behind a site to site tunnel.&lt;/P&gt;&lt;P&gt;Remote users connect to on premises Check Point cluster (R81.20 Take26) using Check Point Mobile client and can access resources in on premises datacenter.&lt;/P&gt;&lt;P&gt;But they also need to access resources that is located on the other end of an site to site tunnel.&lt;/P&gt;&lt;P&gt;I saw the Remote Access community, but i cannot add this interopable device there. I suspect it must be an Check Point host for that.&lt;/P&gt;&lt;P&gt;What can be done to enable routing between these two vpn domains ?&lt;/P&gt;</description>
      <pubDate>Thu, 26 Oct 2023 18:22:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-access-users-access-resources-behind-site-to-site-tunnel/m-p/196329#M4448</guid>
      <dc:creator>nooni</dc:creator>
      <dc:date>2023-10-26T18:22:15Z</dc:date>
    </item>
    <item>
      <title>Re: Remote access users access resources behind site to site tunnel</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-access-users-access-resources-behind-site-to-site-tunnel/m-p/196345#M4449</link>
      <description>&lt;P&gt;You don't add the Interoperable Device, but you add the networks behind that device to the Remote Access Community.&lt;/P&gt;</description>
      <pubDate>Thu, 26 Oct 2023 20:55:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-access-users-access-resources-behind-site-to-site-tunnel/m-p/196345#M4449</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2023-10-26T20:55:23Z</dc:date>
    </item>
    <item>
      <title>Re: Remote access users access resources behind site to site tunnel</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-access-users-access-resources-behind-site-to-site-tunnel/m-p/196374#M4450</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;The RemoteAccess community only has two options:&lt;/P&gt;&lt;P&gt;Add participating gateway and Participating User Groups&lt;/P&gt;&lt;P&gt;So i do not know where i should add these networks ?&lt;/P&gt;</description>
      <pubDate>Fri, 27 Oct 2023 07:00:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-access-users-access-resources-behind-site-to-site-tunnel/m-p/196374#M4450</guid>
      <dc:creator>nooni</dc:creator>
      <dc:date>2023-10-27T07:00:23Z</dc:date>
    </item>
    <item>
      <title>Re: Remote access users access resources behind site to site tunnel</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-access-users-access-resources-behind-site-to-site-tunnel/m-p/196432#M4451</link>
      <description>&lt;P&gt;These are gateways that directly terminate Remote Access connections.&lt;BR /&gt;What you need to modify is the Remote Access Encryption Domain, which is modified in the Gateway object:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 786px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/22968i22D7B363DB5B0E92/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;The object referred to here should be a group object that includes both your local IP addresses (i.e. your local encryption domain) and the remote IP addresses you wish to be accessible (i.e. the remote encryption domain).&lt;/P&gt;</description>
      <pubDate>Fri, 27 Oct 2023 16:44:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-access-users-access-resources-behind-site-to-site-tunnel/m-p/196432#M4451</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2023-10-27T16:44:18Z</dc:date>
    </item>
    <item>
      <title>Re: Remote access users access resources behind site to site tunnel</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-access-users-access-resources-behind-site-to-site-tunnel/m-p/196520#M4452</link>
      <description>&lt;P&gt;Thank you Phoneboy &lt;span class="lia-unicode-emoji" title=":folded_hands:"&gt;🙏&lt;/span&gt; appreciate your help &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 30 Oct 2023 08:14:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-access-users-access-resources-behind-site-to-site-tunnel/m-p/196520#M4452</guid>
      <dc:creator>nooni</dc:creator>
      <dc:date>2023-10-30T08:14:31Z</dc:date>
    </item>
    <item>
      <title>Re: Remote access users access resources behind site to site tunnel</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-access-users-access-resources-behind-site-to-site-tunnel/m-p/213921#M4453</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I tested in my lab by creating a group with the the local and remote subnets of the VPN tunnel; and adding the group to the VPN domain of the "RemoteAccess "community. It was OK but it wasn't enough.&lt;/P&gt;&lt;P&gt;In order to make it work, I had to add the Office Mode subnet (CP_default_Office ...) to the local VPN domain because I was getting the following log :&lt;/P&gt;&lt;P&gt;'Encryption Failure: according to the policy the packet should not have been decrypted'&lt;/P&gt;&lt;P&gt;So I created a group with the local subnet and the Office Mode subnet :&lt;/P&gt;&lt;P&gt;Then, I had to authorize the Office Mode subnet, on the remote gateway because the packets finished in the cleanup rule of the remote gateway.&lt;/P&gt;&lt;P&gt;This way from the remote client (on remote access), I was able to access to a PC on the remote site through the VPN tunnel&lt;/P&gt;&lt;P&gt;I hope this will help&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 11 May 2024 17:55:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-access-users-access-resources-behind-site-to-site-tunnel/m-p/213921#M4453</guid>
      <dc:creator>patones1</dc:creator>
      <dc:date>2024-05-11T17:55:30Z</dc:date>
    </item>
    <item>
      <title>Re: Remote access users access resources behind site to site tunnel</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-access-users-access-resources-behind-site-to-site-tunnel/m-p/214025#M4454</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;SK 36510&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Remote-Access to S2S Vpn&lt;/STRONG&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Define both the Checkpoint side domain and the Peer Gateway Domains with Group objects&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;2.On the Checkpoint side gateway, Put the Office mode IP range into the Gateway's Encryption domain. (NOTE: If the office mode IP range is going to be sent over the tunnel, make sure the Peer expects to see this network range(policy rule, etc). If using a Hide nat, add both Office mode and NAT IPs to the Checkpoint side gateway's domain)&lt;/P&gt;
&lt;OL start="3"&gt;
&lt;LI&gt;Create a New Group Object with BOTH the checkpoint and the Peer's Encryption Domain into the New Group.&lt;/LI&gt;
&lt;LI&gt;Manually define the Remote Access with the New Group&lt;/LI&gt;
&lt;LI&gt;Global Properties &amp;gt;&amp;gt; Remote Access Main page &amp;gt;&amp;gt;&amp;gt; check the box for "Enable Back connections (from Gateway to client)"&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;6.Install policy&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;===============&lt;/P&gt;
&lt;P&gt;Double check,&lt;BR /&gt;&amp;gt;the S2S VPN community page: Un-check box for Disable NAT inside the community (Only if NAT is needed)&lt;BR /&gt;&amp;gt;May need to add a NO-NAT rule for the two way traffic,&amp;nbsp; Office Mode IP to Peer's network and Peer's network to Office Mode.&lt;BR /&gt;**unless OM is hide NATing**&lt;/P&gt;</description>
      <pubDate>Mon, 13 May 2024 13:05:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-access-users-access-resources-behind-site-to-site-tunnel/m-p/214025#M4454</guid>
      <dc:creator>SenpaiNoticed_U</dc:creator>
      <dc:date>2024-05-13T13:05:19Z</dc:date>
    </item>
  </channel>
</rss>

