<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: PC behind SMB in Spark Firewall (SMB)</title>
    <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/PC-behind-SMB/m-p/218677#M10877</link>
    <description>&lt;P&gt;Sounds like this might apply:&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/sk/sk182072" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk182072&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 25 Jun 2024 17:08:42 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2024-06-25T17:08:42Z</dc:date>
    <item>
      <title>PC behind SMB</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/PC-behind-SMB/m-p/218665#M10876</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;All traffic from our office site (SMB) is routed over VPN to our central site. This setup includes routing all internet-bound traffic, including DNS lookups, through the DC site.&lt;/P&gt;
&lt;P&gt;It is route-based VPN configuration, where the encryption domain is empty, the DC gateway expects all traffic originating from our specific remote gateway (SMB) to be encrypted.&lt;/P&gt;
&lt;P&gt;However, I'm encountering the error message "&lt;STRONG&gt;Clear text packet should be encrypted&lt;/STRONG&gt;" specifically for traffic originating from a PC behind the SMB firewall.&lt;/P&gt;
&lt;P&gt;Here are the details:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Pinging from&amp;nbsp; the SMB device works without issues.&lt;/LI&gt;
&lt;LI&gt;The PC behind the SMB firewall has IP address 192.168.3.10 and its default gateway is set to 192.168.3.1, which is the SMB firewall itself.&lt;/LI&gt;
&lt;LI&gt;There is a static route configured to send traffic from the 192.168.3.0 network (SMB network) to the central site. At the central site, there is a corresponding static route to send the traffic back to the SMB network.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;Despite these configurations, the PC behind the SMB firewall is unable to access the internet. All logs indicate that packets from this PC are being dropped with the message "Clear text packet should be encrypted."&lt;/P&gt;
&lt;P&gt;This issue suggests that there might be a misconfiguration in how encryption is handled for traffic originating from the PC behind the SMB firewall, possibly related to VPN encryption settings, security policies, or routing. I'm seeking guidance on how to resolve this issue and ensure that all traffic, including internet-bound traffic, is correctly encrypted and routed through the VPN to the central site.&lt;/P&gt;</description>
      <pubDate>Tue, 25 Jun 2024 16:13:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/PC-behind-SMB/m-p/218665#M10876</guid>
      <dc:creator>Moudar</dc:creator>
      <dc:date>2024-06-25T16:13:53Z</dc:date>
    </item>
    <item>
      <title>Re: PC behind SMB</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/PC-behind-SMB/m-p/218677#M10877</link>
      <description>&lt;P&gt;Sounds like this might apply:&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/sk/sk182072" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk182072&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 25 Jun 2024 17:08:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/PC-behind-SMB/m-p/218677#M10877</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-06-25T17:08:42Z</dc:date>
    </item>
    <item>
      <title>Re: PC behind SMB</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/PC-behind-SMB/m-p/218680#M10878</link>
      <description>&lt;P&gt;Which gateway is generating those logs, and what does your static route on the SMB gateway look like?&lt;/P&gt;</description>
      <pubDate>Tue, 25 Jun 2024 17:24:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/PC-behind-SMB/m-p/218680#M10878</guid>
      <dc:creator>emmap</dc:creator>
      <dc:date>2024-06-25T17:24:25Z</dc:date>
    </item>
    <item>
      <title>Re: PC behind SMB</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/PC-behind-SMB/m-p/218682#M10879</link>
      <description>&lt;P&gt;Hey bro,&lt;/P&gt;
&lt;P&gt;That message in layman's terms, would indicate that it "sees" that packet as its supposed to be encrypted, rather than be sent in clear. I would double check encryption domain, because if its regular domain based tunnel, it all boils down to how vpn domains are configured, as opposed to route based tunnel, which is slightly different.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Tue, 25 Jun 2024 17:33:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/PC-behind-SMB/m-p/218682#M10879</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-06-25T17:33:50Z</dc:date>
    </item>
    <item>
      <title>Re: PC behind SMB</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/PC-behind-SMB/m-p/218713#M10884</link>
      <description>&lt;P&gt;I can see those logs on both gateways:&lt;/P&gt;
&lt;P&gt;on SMS&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="central-log.JPG" style="width: 799px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/26447iD36F0BCB4E0F4C4D/image-size/large?v=v2&amp;amp;px=999" role="button" title="central-log.JPG" alt="central-log.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;on SMB&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="smb-log.JPG" style="width: 833px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/26448i0884E9C1EC6CEF51/image-size/large?v=v2&amp;amp;px=999" role="button" title="smb-log.JPG" alt="smb-log.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The static route on SMB&lt;/P&gt;
&lt;P&gt;add static-route destination 0.0.0.0/1 nexthop gateway ipv4-address 192.168.4.10&lt;BR /&gt;add static-route destination 128.0.0.0/1 nexthop gateway ipv4-address 192.168.4.10&lt;/P&gt;
&lt;P&gt;and one 0.0.0.0/0 to ISP&lt;/P&gt;
&lt;P&gt;192.168.4.10 is the VTI address on central office&lt;/P&gt;
&lt;P&gt;On central office there is no static route but 192.168.3.0 is known through OSPF.&lt;/P&gt;
&lt;P&gt;OSPF on SMB has it and sends it to the other side&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 25 Jun 2024 21:58:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/PC-behind-SMB/m-p/218713#M10884</guid>
      <dc:creator>Moudar</dc:creator>
      <dc:date>2024-06-25T21:58:32Z</dc:date>
    </item>
    <item>
      <title>Re: PC behind SMB</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/PC-behind-SMB/m-p/218715#M10885</link>
      <description>&lt;P&gt;Do ip r g command to that IP to see path its taking, simply to verify its 100% right.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;
&lt;P&gt;ie&amp;nbsp; - &amp;gt; ip r g 8.8.8.8&lt;/P&gt;</description>
      <pubDate>Tue, 25 Jun 2024 22:52:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/PC-behind-SMB/m-p/218715#M10885</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-06-25T22:52:07Z</dc:date>
    </item>
    <item>
      <title>Re: PC behind SMB</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/PC-behind-SMB/m-p/218787#M10890</link>
      <description>&lt;P&gt;Does that apply on route based VPN ? My encryption domain is an empty group on both gateways!&lt;/P&gt;</description>
      <pubDate>Wed, 26 Jun 2024 11:46:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/PC-behind-SMB/m-p/218787#M10890</guid>
      <dc:creator>Moudar</dc:creator>
      <dc:date>2024-06-26T11:46:28Z</dc:date>
    </item>
    <item>
      <title>Re: PC behind SMB</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/PC-behind-SMB/m-p/218797#M10891</link>
      <description>&lt;P&gt;That does work (I had done it many times), though technically only remote side needs to have one.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Wed, 26 Jun 2024 12:16:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/PC-behind-SMB/m-p/218797#M10891</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-06-26T12:16:43Z</dc:date>
    </item>
    <item>
      <title>Re: PC behind SMB</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/PC-behind-SMB/m-p/218802#M10892</link>
      <description>&lt;P&gt;can you&amp;nbsp; please elaborate more on that&lt;/P&gt;</description>
      <pubDate>Wed, 26 Jun 2024 12:23:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/PC-behind-SMB/m-p/218802#M10892</guid>
      <dc:creator>Moudar</dc:creator>
      <dc:date>2024-06-26T12:23:18Z</dc:date>
    </item>
    <item>
      <title>Re: PC behind SMB</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/PC-behind-SMB/m-p/218803#M10893</link>
      <description>&lt;P&gt;Yes...so, local enc domain, you can just put a corresponding group containing subnets/hosts (whatever needed to be there) and then remote enc domain can be an empty group.&lt;/P&gt;
&lt;P&gt;Setting in community if its subnet/hosts combo, or regardless what it is, make sure it says "per gateway"&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Wed, 26 Jun 2024 12:25:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/PC-behind-SMB/m-p/218803#M10893</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-06-26T12:25:49Z</dc:date>
    </item>
    <item>
      <title>Re: PC behind SMB</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/PC-behind-SMB/m-p/218808#M10894</link>
      <description>&lt;P&gt;We are still discussing a star community setup, not a mesh configuration as mentioned in SK182072?&lt;/P&gt;
&lt;P&gt;However, the admin guide states that both the central and branch sites should have empty groups to avoid any issues arising from these configurations.&lt;/P&gt;</description>
      <pubDate>Wed, 26 Jun 2024 12:55:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/PC-behind-SMB/m-p/218808#M10894</guid>
      <dc:creator>Moudar</dc:creator>
      <dc:date>2024-06-26T12:55:01Z</dc:date>
    </item>
    <item>
      <title>Re: PC behind SMB</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/PC-behind-SMB/m-p/218810#M10895</link>
      <description>&lt;P&gt;Thats right...just to make sure, error you get is still the same? Is it ONLY for one server?&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Wed, 26 Jun 2024 13:09:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/PC-behind-SMB/m-p/218810#M10895</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-06-26T13:09:50Z</dc:date>
    </item>
    <item>
      <title>Re: PC behind SMB</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/PC-behind-SMB/m-p/218812#M10896</link>
      <description>&lt;P&gt;My PC behind the SMB, all its traffic is getting "drop" with that message. I did not test more, I will do it tonight&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 26 Jun 2024 13:23:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/PC-behind-SMB/m-p/218812#M10896</guid>
      <dc:creator>Moudar</dc:creator>
      <dc:date>2024-06-26T13:23:13Z</dc:date>
    </item>
    <item>
      <title>Re: PC behind SMB</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/PC-behind-SMB/m-p/218814#M10897</link>
      <description>&lt;P&gt;If enc domains are empty groups, then no reason why it should not work. Do ip r g command for that IP to see what it shows.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Wed, 26 Jun 2024 13:35:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/PC-behind-SMB/m-p/218814#M10897</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-06-26T13:35:32Z</dc:date>
    </item>
    <item>
      <title>Re: PC behind SMB</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/PC-behind-SMB/m-p/218897#M10905</link>
      <description>&lt;P&gt;Best bet would be to consult with TAC here: &lt;A href="https://help.checkpoint.com" target="_blank"&gt;https://help.checkpoint.com&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 26 Jun 2024 23:01:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/PC-behind-SMB/m-p/218897#M10905</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-06-26T23:01:17Z</dc:date>
    </item>
    <item>
      <title>Re: PC behind SMB</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/PC-behind-SMB/m-p/218912#M10909</link>
      <description>&lt;P&gt;Last time I tried this, the next hop of the routes had to be the VPN tunnel (in my case vpnt10) not the IP address of the tunnel peer.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 27 Jun 2024 03:14:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/PC-behind-SMB/m-p/218912#M10909</guid>
      <dc:creator>emmap</dc:creator>
      <dc:date>2024-06-27T03:14:50Z</dc:date>
    </item>
    <item>
      <title>Re: PC behind SMB</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/PC-behind-SMB/m-p/218913#M10910</link>
      <description>&lt;P&gt;In my experience, that makes sense IF you are talking about unnumbered VTIs, if its numbered, then DG ip would be something not used on the other side, but certainly NOT the peer IP&lt;/P&gt;
&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/65882"&gt;@Moudar&lt;/a&gt;&amp;nbsp;Keep in mind this, as its IMPORTANT...if we are talking numbered VTIs, say your side has, I dont know, just as an example, 169.254.0.50 and other side is .51, thats ip you would use as default gateway to their network. However, its its UNNUMBERED vtis, then it goes based off the interface, so say eth0, for example and it would have exact SAME ip address.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;
&lt;P&gt;If you need help, let me know. You can also check my post about it below, hope it helps.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.checkpoint.com/t5/Security-Gateways/Route-based-VPN-tunnel-to-Azure/m-p/206179/emcs_t/S2h8ZW1haWx8dG9waWNfc3Vic2NyaXB0aW9ufExTTjlYV1FXMUlGQVNMfDIwNjE3OXxTVUJTQ1JJUFRJT05TfGhL#M38950" target="_blank"&gt;https://community.checkpoint.com/t5/Security-Gateways/Route-based-VPN-tunnel-to-Azure/m-p/206179/emcs_t/S2h8ZW1haWx8dG9waWNfc3Vic2NyaXB0aW9ufExTTjlYV1FXMUlGQVNMfDIwNjE3OXxTVUJTQ1JJUFRJT05TfGhL#M38950&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 27 Jun 2024 03:21:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/PC-behind-SMB/m-p/218913#M10910</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-06-27T03:21:02Z</dc:date>
    </item>
    <item>
      <title>Re: PC behind SMB</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/PC-behind-SMB/m-p/218917#M10911</link>
      <description>&lt;P&gt;In my test case it was a numbered VTI and the VTI IPs weren't an option when adding the route. SMB boxes seem to handle this differently to main train.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 27 Jun 2024 03:29:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/PC-behind-SMB/m-p/218917#M10911</guid>
      <dc:creator>emmap</dc:creator>
      <dc:date>2024-06-27T03:29:16Z</dc:date>
    </item>
    <item>
      <title>Re: PC behind SMB</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/PC-behind-SMB/m-p/218979#M10917</link>
      <description>&lt;P&gt;Not sure when it comes to SMB, but you are right, on regular Gaia, its most likely different.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Thu, 27 Jun 2024 11:45:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/PC-behind-SMB/m-p/218979#M10917</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-06-27T11:45:16Z</dc:date>
    </item>
  </channel>
</rss>

