<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Private (RFC 1918) networks encrypted en routed via VPN in SASE and Remote Access</title>
    <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Private-RFC-1918-networks-encrypted-en-routed-via-VPN/m-p/96716#M9942</link>
    <description>&lt;P&gt;It has been solved.&lt;/P&gt;&lt;P&gt;After much trial-and-error from TAC, they asked me to download and test an earlier version of the client.&lt;BR /&gt;And behold, it actually started working &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;E81.40 worked but NOT the newer E83.20.&lt;/P&gt;&lt;P&gt;Regarding the encrypt domain (VPN Domain): When using E83.20 it didn't matter. With E81.40 it does.&lt;/P&gt;</description>
    <pubDate>Mon, 14 Sep 2020 11:38:08 GMT</pubDate>
    <dc:creator>Johan_Klasson</dc:creator>
    <dc:date>2020-09-14T11:38:08Z</dc:date>
    <item>
      <title>Private (RFC 1918) networks encrypted en routed via VPN</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Private-RFC-1918-networks-encrypted-en-routed-via-VPN/m-p/96218#M9936</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I have a problem with a Remote Access setup via IPsec where I can't manage to get the VPN Domain setup sane (I think).&lt;/P&gt;&lt;P&gt;Server:&lt;BR /&gt;R80.20 VS Instance running on 23900 cluster.&lt;BR /&gt;VPN blades: IPsec VPN&lt;BR /&gt;Office Mode: Enabled&lt;/P&gt;&lt;P&gt;Client:&lt;BR /&gt;E83.20 on Windows 10 behind NAT&lt;/P&gt;&lt;P&gt;Problem:&lt;BR /&gt;Client connects just fine and get an IP via DHCP according to config.&lt;BR /&gt;But, no traffic get routed and encrypted via the tunnel.&lt;BR /&gt;If I disable Split Tunneling, and enable&amp;nbsp; "Encrypt all traffic and route to gateway" on client,&lt;BR /&gt;all non-RFC 1918 networks get routed via the tunnel.&lt;BR /&gt;I can also see broadcast traffic and tunnel_test from the VPN network in the FW logs.&lt;BR /&gt;Also, when I do "route print" on the client, a huge amount of routes have been added.&lt;BR /&gt;&lt;BR /&gt;Question:&lt;BR /&gt;Any pointers how to resolve this?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best Regards,&lt;BR /&gt;Johan Klasson&lt;/P&gt;</description>
      <pubDate>Mon, 07 Sep 2020 14:19:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Private-RFC-1918-networks-encrypted-en-routed-via-VPN/m-p/96218#M9936</guid>
      <dc:creator>Johan_Klasson</dc:creator>
      <dc:date>2020-09-07T14:19:55Z</dc:date>
    </item>
    <item>
      <title>Re: Private (RFC 1918) networks encrypted en routed via VPN</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Private-RFC-1918-networks-encrypted-en-routed-via-VPN/m-p/96229#M9937</link>
      <description>&lt;P&gt;What is your precise Encryption Domain set to?&lt;BR /&gt;You can set a different one for Remote Access than for site-to-site VPN.&lt;/P&gt;
&lt;P&gt;”Route all traffic” literally routes all traffic from the VPN client through the encryption domain which means you’ll see routes for all RFC1918 addresses on the client as well.&lt;/P&gt;</description>
      <pubDate>Mon, 07 Sep 2020 16:17:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Private-RFC-1918-networks-encrypted-en-routed-via-VPN/m-p/96229#M9937</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-09-07T16:17:02Z</dc:date>
    </item>
    <item>
      <title>Re: Private (RFC 1918) networks encrypted en routed via VPN</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Private-RFC-1918-networks-encrypted-en-routed-via-VPN/m-p/96247#M9938</link>
      <description>&lt;P&gt;Thanks PhoneBoy for taking the time.&lt;/P&gt;&lt;P&gt;The Encryption Domain is set to the VPN network.&lt;BR /&gt;I tried setting it specifically for Remote Access, but with the same result -&amp;gt; fail.&lt;BR /&gt;Also, I really want no Split Routing so it's strange that only external "public" IP ranges get through the tunnel but not private?&lt;BR /&gt;For example the 10/8 network is not visible in the routing table on the client, hence it should utilize the "default" routes 0/1 and 128/1 but it seems traffic to these network hitting a blackhole.&lt;BR /&gt;The log indicates outbound traffic from the firewall does in fact reach the FW and get encrypted, the problem seems to be on the client side?&lt;/P&gt;</description>
      <pubDate>Tue, 08 Sep 2020 06:34:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Private-RFC-1918-networks-encrypted-en-routed-via-VPN/m-p/96247#M9938</guid>
      <dc:creator>Johan_Klasson</dc:creator>
      <dc:date>2020-09-08T06:34:12Z</dc:date>
    </item>
    <item>
      <title>Re: Private (RFC 1918) networks encrypted en routed via VPN</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Private-RFC-1918-networks-encrypted-en-routed-via-VPN/m-p/96248#M9939</link>
      <description>&lt;P&gt;By VPN networks, what do you mean? The internal networks behind VPN GW? Or something else?&lt;/P&gt;</description>
      <pubDate>Tue, 08 Sep 2020 06:43:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Private-RFC-1918-networks-encrypted-en-routed-via-VPN/m-p/96248#M9939</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2020-09-08T06:43:17Z</dc:date>
    </item>
    <item>
      <title>Re: Private (RFC 1918) networks encrypted en routed via VPN</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Private-RFC-1918-networks-encrypted-en-routed-via-VPN/m-p/96249#M9940</link>
      <description>&lt;P&gt;Sorry, should have been more clear.&lt;BR /&gt;VPN network in this context is the network given to the client side and used to connect to LAN/WAN via the tunnel.&lt;BR /&gt;Maybe Office Mode Network is a better term?&lt;/P&gt;&lt;P&gt;It may also be worth mention the Remote Access community i also used by another GW running R77.30.&lt;BR /&gt;I just noticed the "Credentials are needed for a secondary tunnel connection" where the GW is this other GW:&lt;BR /&gt;Can the problem be it using this GW instead of the intended one?&lt;/P&gt;</description>
      <pubDate>Tue, 08 Sep 2020 07:00:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Private-RFC-1918-networks-encrypted-en-routed-via-VPN/m-p/96249#M9940</guid>
      <dc:creator>Johan_Klasson</dc:creator>
      <dc:date>2020-09-08T07:00:16Z</dc:date>
    </item>
    <item>
      <title>Re: Private (RFC 1918) networks encrypted en routed via VPN</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Private-RFC-1918-networks-encrypted-en-routed-via-VPN/m-p/96679#M9941</link>
      <description>&lt;P&gt;I'm having trouble understanding what your actual configuration is.&lt;BR /&gt;Let's focus on the Remote Access encryption domain should be.&lt;BR /&gt;This should include all the networks behind your gateway that you wish for your client to be able to access.&lt;BR /&gt;There will also have to be relevant Access Policy rules to allow this in addition.&lt;BR /&gt;If there are networks available that you wish for your clients to access that are available from a Site-to-Site VPN peer, those networks must also be included in the Remote Access encryption domain.&lt;BR /&gt;Further, the remote end will need to include your Office Mode IP address range as part of the encryption domain on their end.&lt;BR /&gt;Your network should also know to route the Office Mode address range to the relevant gateway.&lt;/P&gt;
&lt;P&gt;It's going to be difficult to troubleshoot this without posting private information on the community.&lt;BR /&gt;Therefore, your best bet is to engage with the TAC.&lt;/P&gt;</description>
      <pubDate>Mon, 14 Sep 2020 03:20:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Private-RFC-1918-networks-encrypted-en-routed-via-VPN/m-p/96679#M9941</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-09-14T03:20:32Z</dc:date>
    </item>
    <item>
      <title>Re: Private (RFC 1918) networks encrypted en routed via VPN</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Private-RFC-1918-networks-encrypted-en-routed-via-VPN/m-p/96716#M9942</link>
      <description>&lt;P&gt;It has been solved.&lt;/P&gt;&lt;P&gt;After much trial-and-error from TAC, they asked me to download and test an earlier version of the client.&lt;BR /&gt;And behold, it actually started working &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;E81.40 worked but NOT the newer E83.20.&lt;/P&gt;&lt;P&gt;Regarding the encrypt domain (VPN Domain): When using E83.20 it didn't matter. With E81.40 it does.&lt;/P&gt;</description>
      <pubDate>Mon, 14 Sep 2020 11:38:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Private-RFC-1918-networks-encrypted-en-routed-via-VPN/m-p/96716#M9942</guid>
      <dc:creator>Johan_Klasson</dc:creator>
      <dc:date>2020-09-14T11:38:08Z</dc:date>
    </item>
  </channel>
</rss>

