<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Encryption Domains that are External IPs in Spark Firewall (SMB)</title>
    <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Encryption-Domains-that-are-External-IPs/m-p/242717#M12198</link>
    <description>&lt;P&gt;If NAT is needed, then dont check disable nat inside vpn community object.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
    <pubDate>Fri, 28 Feb 2025 17:38:31 GMT</pubDate>
    <dc:creator>the_rock</dc:creator>
    <dc:date>2025-02-28T17:38:31Z</dc:date>
    <item>
      <title>Encryption Domains that are External IPs</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Encryption-Domains-that-are-External-IPs/m-p/242628#M12196</link>
      <description>&lt;P&gt;Appliance : Locally Managed QS 1535&lt;/P&gt;&lt;P&gt;Firmware r81.10.10&lt;/P&gt;&lt;P&gt;I need to setup a S2S VPN with a customer. They have a requirement that all encryption domains are WAN IP addresses. I have a range of 5 addresses but only 1 is used which is the WAN interface of my firewall. Do I just tell them my peer and encryption domains are x.x.x.x/32 (same IP)? Also, can I safely assume I should uncheck disable NAT in the site tunnel settings?&lt;/P&gt;</description>
      <pubDate>Fri, 28 Feb 2025 07:31:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Encryption-Domains-that-are-External-IPs/m-p/242628#M12196</guid>
      <dc:creator>sx8n20394</dc:creator>
      <dc:date>2025-02-28T07:31:03Z</dc:date>
    </item>
    <item>
      <title>Re: Encryption Domains that are External IPs</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Encryption-Domains-that-are-External-IPs/m-p/242707#M12197</link>
      <description>&lt;P&gt;Sounds like the right answer on both counts.&lt;BR /&gt;Note that your local Encryption Domain should include the hosts that you want to communicate through the VPN.&lt;/P&gt;</description>
      <pubDate>Fri, 28 Feb 2025 16:48:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Encryption-Domains-that-are-External-IPs/m-p/242707#M12197</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2025-02-28T16:48:00Z</dc:date>
    </item>
    <item>
      <title>Re: Encryption Domains that are External IPs</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Encryption-Domains-that-are-External-IPs/m-p/242717#M12198</link>
      <description>&lt;P&gt;If NAT is needed, then dont check disable nat inside vpn community object.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Fri, 28 Feb 2025 17:38:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Encryption-Domains-that-are-External-IPs/m-p/242717#M12198</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-02-28T17:38:31Z</dc:date>
    </item>
    <item>
      <title>Re: Encryption Domains that are External IPs</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Encryption-Domains-that-are-External-IPs/m-p/242722#M12199</link>
      <description>&lt;P&gt;The network is simple. I have my WAN IP (lets call it 99.1.1.1)&amp;nbsp; and a simple 192.168.1.0/24 local network. I am used to setting up VPNs where the encryption domains are local IP subnets. In this case the vendor will not allow local IPs in my encryption domain, they have to be WAN IPs. In my case, we only utilize 1 WAN IP. I will just go ahead and tell them to use my WAN IP (ex. 99.1.1.1) as the peer and encryption domain and see what happens.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 28 Feb 2025 18:32:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Encryption-Domains-that-are-External-IPs/m-p/242722#M12199</guid>
      <dc:creator>sx8n20394</dc:creator>
      <dc:date>2025-02-28T18:32:07Z</dc:date>
    </item>
    <item>
      <title>Re: Encryption Domains that are External IPs</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Encryption-Domains-that-are-External-IPs/m-p/242737#M12200</link>
      <description>&lt;P&gt;Also, dont check option to exclude external IP from vpn domain, its on vpn domain tab under topology or network (cant remember now exactly) when you edit gw object in smart console.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Sat, 01 Mar 2025 00:13:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Encryption-Domains-that-are-External-IPs/m-p/242737#M12200</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-03-01T00:13:10Z</dc:date>
    </item>
    <item>
      <title>Re: Encryption Domains that are External IPs</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Encryption-Domains-that-are-External-IPs/m-p/243205#M12201</link>
      <description>&lt;P&gt;The local Encryption Domain tells the gateway what traffic to encrypt and must include hosts you wish to traverse the VPN.&lt;BR /&gt;As long as you've enabled&amp;nbsp;NAT is enabled in the VPN configuration (i.e. untick the relevant box), the remote end can use the public IP only as your encryption domain.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 06 Mar 2025 23:32:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Encryption-Domains-that-are-External-IPs/m-p/243205#M12201</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2025-03-06T23:32:48Z</dc:date>
    </item>
    <item>
      <title>Re: Encryption Domains that are External IPs</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Encryption-Domains-that-are-External-IPs/m-p/243225#M12202</link>
      <description>&lt;P&gt;Thanks for the advice but it still doesn't work. The tunnel actually came up at one point but then went down after IPSEC Phase 2 rekeyed after 60 minutes. I then got the same error Traffic Selectors Unacceptable again.&lt;/P&gt;</description>
      <pubDate>Fri, 07 Mar 2025 03:48:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Encryption-Domains-that-are-External-IPs/m-p/243225#M12202</guid>
      <dc:creator>sx8n20394</dc:creator>
      <dc:date>2025-03-07T03:48:39Z</dc:date>
    </item>
    <item>
      <title>Re: Encryption Domains that are External IPs</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Encryption-Domains-that-are-External-IPs/m-p/243226#M12203</link>
      <description>&lt;P&gt;Unfortunately this is just a locally managed device with no smart console.&lt;/P&gt;</description>
      <pubDate>Fri, 07 Mar 2025 03:49:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Encryption-Domains-that-are-External-IPs/m-p/243226#M12203</guid>
      <dc:creator>sx8n20394</dc:creator>
      <dc:date>2025-03-07T03:49:09Z</dc:date>
    </item>
    <item>
      <title>Re: Encryption Domains that are External IPs</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Encryption-Domains-that-are-External-IPs/m-p/243227#M12204</link>
      <description>&lt;P&gt;I suggest involving TAC.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Fri, 07 Mar 2025 03:55:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Encryption-Domains-that-are-External-IPs/m-p/243227#M12204</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-03-07T03:55:07Z</dc:date>
    </item>
    <item>
      <title>Re: Encryption Domains that are External IPs</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Encryption-Domains-that-are-External-IPs/m-p/243228#M12205</link>
      <description>&lt;P&gt;In addition to everyone else's comments, you also need to include the original hosts inside your network (this is needed to trigger the VPN negotiation). &amp;nbsp;Verify the NAT policy also will contain appropriate rules for the inside hosts to have NAT applied (you could also NAT the internal hosts to another external host other than your gateway's own IP, if you wanted). &amp;nbsp;The original 192.168.1.x hosts AND the NAT IP needs to be in your VPN domain for your side. &amp;nbsp;The remote side only needs your NAT IP.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This is what's causing your rekey to fail after 60 minutes.&lt;/P&gt;</description>
      <pubDate>Fri, 07 Mar 2025 04:49:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Encryption-Domains-that-are-External-IPs/m-p/243228#M12205</guid>
      <dc:creator>Duane_Toler</dc:creator>
      <dc:date>2025-03-07T04:49:49Z</dc:date>
    </item>
    <item>
      <title>Re: Encryption Domains that are External IPs</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Encryption-Domains-that-are-External-IPs/m-p/243230#M12206</link>
      <description>&lt;P&gt;I did. I have had 2 different cases opened (including 1 currently open) and haven't gotten any solid answers or solutions. The situation is now critical because this is for a client. I will just hold my breath and hope something good happens.&lt;/P&gt;</description>
      <pubDate>Fri, 07 Mar 2025 05:32:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Encryption-Domains-that-are-External-IPs/m-p/243230#M12206</guid>
      <dc:creator>sx8n20394</dc:creator>
      <dc:date>2025-03-07T05:32:26Z</dc:date>
    </item>
    <item>
      <title>Re: Encryption Domains that are External IPs</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Encryption-Domains-that-are-External-IPs/m-p/243231#M12207</link>
      <description>&lt;P&gt;I just let the Checkpoint select the local domain automatically so I would assume it is doing that. Also, I am afraid of changing the local encryption domain globally (locally managed, no smart-1) and not being able to setup future S2S VPNs. Note, I did change it globally to manually managed and still no luck.&lt;/P&gt;</description>
      <pubDate>Fri, 07 Mar 2025 05:34:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Encryption-Domains-that-are-External-IPs/m-p/243231#M12207</guid>
      <dc:creator>sx8n20394</dc:creator>
      <dc:date>2025-03-07T05:34:50Z</dc:date>
    </item>
  </channel>
</rss>

