<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Locally managed SMBs .def files for VPN fine-tuning in Spark Firewall (SMB)</title>
    <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Locally-managed-SMBs-def-files-for-VPN-fine-tuning/m-p/246217#M12452</link>
    <description>&lt;P&gt;I'm looking for a solution, trying to solve the mystery of why even if i put is on SMS crypt.def it's not work. Now i know, SMB is everything different and there`s no documentation about it. We do these steps on Quantum Spark 1900 and solve the problem.&lt;/P&gt;&lt;P&gt;Do this on SMS, not on GW. Depends on version SMS you have to choose correct file.&amp;nbsp;&lt;/P&gt;&lt;P&gt;vi /opt/CPSFWR81CMP-R82/lib/crypt.def&lt;/P&gt;&lt;P&gt;Insert these lines on the file and save it.&lt;/P&gt;&lt;P&gt;define USERC_CHECK(rule) {&lt;/P&gt;&lt;P&gt;(&amp;lt;src&amp;gt; in userc_rules)&lt;/P&gt;&lt;P&gt;};&lt;BR /&gt;&lt;BR /&gt;#ifndef NON_VPN_TRAFFIC_RULES&lt;/P&gt;&lt;P&gt;#ifndef IPV6_FLAVOR&lt;/P&gt;&lt;P&gt;#define NON_VPN_TRAFFIC_RULES (dst=192.168.5.1 or dst=192.168.5.2)&lt;/P&gt;&lt;P&gt;#else&lt;/P&gt;&lt;P&gt;#define NON_VPN_TRAFFIC_RULES 0&lt;/P&gt;&lt;P&gt;#endif&lt;/P&gt;&lt;P&gt;#endif&lt;/P&gt;&lt;P&gt;#endif /* __crypt_def__ */&lt;/P&gt;&lt;P&gt;Then install policy on gateways and see the logs. The traffic will pass directly do p2p and not encrypted anymore.&lt;/P&gt;</description>
    <pubDate>Fri, 11 Apr 2025 11:19:01 GMT</pubDate>
    <dc:creator>ereche</dc:creator>
    <dc:date>2025-04-11T11:19:01Z</dc:date>
    <item>
      <title>Locally managed SMBs .def files for VPN fine-tuning</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Locally-managed-SMBs-def-files-for-VPN-fine-tuning/m-p/39640#M1618</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This is a follow-up to &lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2746-smb-units-sms-files-for-vpn-fine-tuning"&gt;&lt;EM&gt;SMB units SMS files for VPN fine-tuning&lt;/EM&gt; &lt;/A&gt;after reading &lt;A _jive_internal="true" data-containerid="-1" data-containertype="-1" data-objectid="43803" data-objecttype="3" href="https://community.checkpoint.com/people/nvyur286c2b4b-2416-37b0-91f3-c73611b3277a"&gt;Yuri Slobodyanyuk&lt;/A&gt;'s blog on IT Security and Networking. He speaks of changes to &lt;EM&gt;.def&lt;/EM&gt; files like &lt;EM&gt;crypt.def&lt;/EM&gt; for VPN Fine-Tuning that are usually made on the SMS and installed on a GW by a policy install. SMB units also have these files - &lt;EM&gt;crypt.def&lt;/EM&gt; can be found in&amp;nbsp;&lt;EM&gt;/pfrm2.0/config1/fw1/lib/&lt;/EM&gt; or&lt;EM&gt; /pfrm2.0/config2/fw1/lib/&lt;/EM&gt; and in &lt;EM&gt;/opt/fw1/lib/crypt.def&lt;/EM&gt;.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The VPN configuration from&lt;EM&gt; &lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk108600&amp;amp;partition=Advanced&amp;amp;product=IPSec"&gt;sk108600 &lt;/A&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk108600&amp;amp;partition=Advanced&amp;amp;product=IPSec" style="max-width: 840px;"&gt;VPN Site-to-Site with 3rd party &lt;/A&gt;&lt;/EM&gt;and&lt;EM&gt;&amp;nbsp;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk86582&amp;amp;partition=Advanced&amp;amp;product=IPSec"&gt;sk86582&amp;nbsp;Excluding subnets in encryption domain from accessing a specific VPN community&lt;/A&gt;&lt;/EM&gt; can also be found on locally managed SMBs &lt;EM&gt;crypt.def&lt;/EM&gt; and edited there. As locally managed SMB units have no manual policy install command to recompile and apply these changes, Yuri points out that reboot would activate the new settings, but also, a much easier way is available ("not listed in any Checkpoint documentation", but you can find it in &lt;EM&gt;sk97949&lt;/EM&gt;, &lt;EM&gt;sk100278&lt;/EM&gt; and &lt;EM&gt;sk108274&lt;/EM&gt;), changes can be applied by issuing:&lt;BR /&gt;&lt;EM&gt;[Expert]# fw_configload&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The &lt;EM&gt;sk100278&lt;/EM&gt; gives two commands to apply changes from an edited &lt;EM&gt;$FWDIR/conf/trac_client_1.ttm&lt;/EM&gt; file:&lt;BR /&gt;&lt;EM&gt;[Expert]# fw_configload&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;[Expert]# sfwd_restart&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So i have asked R&amp;amp;D for more information and i have received the following as the officially supported procedures: In locally managed SMB appliances it’s possible to edit &lt;EM&gt;/opt/fw1/lib/crypt.def&lt;/EM&gt;, but &lt;EM&gt;user.def&lt;/EM&gt; is not officially supported. Also note that &lt;EM&gt;sk30919&lt;/EM&gt; does not list SMB as relevant Product. Only &lt;EM&gt;crypt.def&lt;/EM&gt; can be modified, and afterwards ‘&lt;EM&gt;vpn_configload&lt;/EM&gt;’ is good enough for the change to take effect.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Supported for locally managed SMB appliances are changes to &lt;EM&gt;crypt.def&lt;/EM&gt;&lt;EM&gt; &lt;/EM&gt;to enable VPN features not available in WebGUI or CLI. We learn that the files from&lt;EM&gt; /pfrm2.0/config1/ &lt;/EM&gt;or&lt;EM&gt; /pfrm2.0/config2/ &lt;/EM&gt;are linked to&lt;EM&gt; /opt/fw1/lib/. &lt;/EM&gt;And we learn the command&lt;EM&gt; vpn_configload !&lt;BR /&gt;&lt;/EM&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 23 Mar 2018 08:05:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Locally-managed-SMBs-def-files-for-VPN-fine-tuning/m-p/39640#M1618</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2018-03-23T08:05:08Z</dc:date>
    </item>
    <item>
      <title>Re: Locally managed SMBs .def files for VPN fine-tuning</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Locally-managed-SMBs-def-files-for-VPN-fine-tuning/m-p/71239#M2765</link>
      <description>&lt;P&gt;Gunther, do you know how to make the procedure from "&lt;SPAN&gt;&lt;A title="sk114882 -&amp;nbsp;Remote Access clients configuration based on group membership" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk114882" target="_blank" rel="noopener"&gt;sk114882 -&amp;nbsp;Remote Access clients configuration based on group membership&lt;/A&gt;" work on SMB gateways?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 26 Dec 2019 23:37:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Locally-managed-SMBs-def-files-for-VPN-fine-tuning/m-p/71239#M2765</guid>
      <dc:creator>Pedro_Espindola</dc:creator>
      <dc:date>2019-12-26T23:37:26Z</dc:date>
    </item>
    <item>
      <title>Re: Locally managed SMBs .def files for VPN fine-tuning</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Locally-managed-SMBs-def-files-for-VPN-fine-tuning/m-p/71241#M2766</link>
      <description>Actually there seems to be a shell script on SMB that appears to do the vpn_configload thingy the right way:&lt;BR /&gt;&lt;BR /&gt; /opt/fw1/bin/vpn_configload.sh</description>
      <pubDate>Fri, 27 Dec 2019 04:30:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Locally-managed-SMBs-def-files-for-VPN-fine-tuning/m-p/71241#M2766</guid>
      <dc:creator>HristoGrigorov</dc:creator>
      <dc:date>2019-12-27T04:30:11Z</dc:date>
    </item>
    <item>
      <title>Re: Locally managed SMBs .def files for VPN fine-tuning</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Locally-managed-SMBs-def-files-for-VPN-fine-tuning/m-p/71912#M2812</link>
      <description>&lt;P&gt;You could try with a User group defined in Users &amp;amp; Objects &amp;gt; Users Management &amp;gt; Users&amp;nbsp;&lt;/P&gt;
&lt;P&gt;and&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;/pfrm2.0/opt/fw1/conf/trac_client_1.ttm&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;/pfrm2.0/config2/fw1/conf/trac_client_1.ttm&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 09 Jan 2020 09:15:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Locally-managed-SMBs-def-files-for-VPN-fine-tuning/m-p/71912#M2812</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2020-01-09T09:15:19Z</dc:date>
    </item>
    <item>
      <title>Re: Locally managed SMBs .def files for VPN fine-tuning</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Locally-managed-SMBs-def-files-for-VPN-fine-tuning/m-p/71913#M2813</link>
      <description>&lt;P&gt;That is just the command i have mentioned far above&amp;nbsp;8)&lt;/img&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 09 Jan 2020 09:16:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Locally-managed-SMBs-def-files-for-VPN-fine-tuning/m-p/71913#M2813</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2020-01-09T09:16:54Z</dc:date>
    </item>
    <item>
      <title>Re: Locally managed SMBs .def files for VPN fine-tuning</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Locally-managed-SMBs-def-files-for-VPN-fine-tuning/m-p/72091#M2820</link>
      <description>&lt;P&gt;vpn_configload is binary and vpn_configload.sh is shell script.... so actually there are two commands.&lt;/P&gt;</description>
      <pubDate>Sat, 11 Jan 2020 05:03:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Locally-managed-SMBs-def-files-for-VPN-fine-tuning/m-p/72091#M2820</guid>
      <dc:creator>HristoGrigorov</dc:creator>
      <dc:date>2020-01-11T05:03:41Z</dc:date>
    </item>
    <item>
      <title>Re: Locally managed SMBs .def files for VPN fine-tuning</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Locally-managed-SMBs-def-files-for-VPN-fine-tuning/m-p/93109#M3948</link>
      <description>&lt;P&gt;Hello&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am trying to configure universal tunnel on Check Point SMB firewall with 3rd party. Branch router has&amp;nbsp; 0.0.0.0 0.0.0.0 subnet for the tunnel destination side. Check Point SMB firewall is enabled Allow remote gateway all traffic pass through this gateway option.&amp;nbsp;&lt;BR /&gt;Problem is: Branch hosts access to internet through their own router instead of check point SMB.&lt;/P&gt;</description>
      <pubDate>Mon, 03 Aug 2020 00:59:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Locally-managed-SMBs-def-files-for-VPN-fine-tuning/m-p/93109#M3948</guid>
      <dc:creator>Baasanjargal_Ts</dc:creator>
      <dc:date>2020-08-03T00:59:13Z</dc:date>
    </item>
    <item>
      <title>Re: Locally managed SMBs .def files for VPN fine-tuning</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Locally-managed-SMBs-def-files-for-VPN-fine-tuning/m-p/94573#M4058</link>
      <description>&lt;P&gt;The SMB Route all traffic thru GW option is for RA clients only, not for IPSEc VPN tunnels. So the branch router is having an issue when not routing everything into the VPN...&lt;/P&gt;</description>
      <pubDate>Wed, 19 Aug 2020 08:47:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Locally-managed-SMBs-def-files-for-VPN-fine-tuning/m-p/94573#M4058</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2020-08-19T08:47:14Z</dc:date>
    </item>
    <item>
      <title>Re: Locally managed SMBs .def files for VPN fine-tuning</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Locally-managed-SMBs-def-files-for-VPN-fine-tuning/m-p/246217#M12452</link>
      <description>&lt;P&gt;I'm looking for a solution, trying to solve the mystery of why even if i put is on SMS crypt.def it's not work. Now i know, SMB is everything different and there`s no documentation about it. We do these steps on Quantum Spark 1900 and solve the problem.&lt;/P&gt;&lt;P&gt;Do this on SMS, not on GW. Depends on version SMS you have to choose correct file.&amp;nbsp;&lt;/P&gt;&lt;P&gt;vi /opt/CPSFWR81CMP-R82/lib/crypt.def&lt;/P&gt;&lt;P&gt;Insert these lines on the file and save it.&lt;/P&gt;&lt;P&gt;define USERC_CHECK(rule) {&lt;/P&gt;&lt;P&gt;(&amp;lt;src&amp;gt; in userc_rules)&lt;/P&gt;&lt;P&gt;};&lt;BR /&gt;&lt;BR /&gt;#ifndef NON_VPN_TRAFFIC_RULES&lt;/P&gt;&lt;P&gt;#ifndef IPV6_FLAVOR&lt;/P&gt;&lt;P&gt;#define NON_VPN_TRAFFIC_RULES (dst=192.168.5.1 or dst=192.168.5.2)&lt;/P&gt;&lt;P&gt;#else&lt;/P&gt;&lt;P&gt;#define NON_VPN_TRAFFIC_RULES 0&lt;/P&gt;&lt;P&gt;#endif&lt;/P&gt;&lt;P&gt;#endif&lt;/P&gt;&lt;P&gt;#endif /* __crypt_def__ */&lt;/P&gt;&lt;P&gt;Then install policy on gateways and see the logs. The traffic will pass directly do p2p and not encrypted anymore.&lt;/P&gt;</description>
      <pubDate>Fri, 11 Apr 2025 11:19:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Locally-managed-SMBs-def-files-for-VPN-fine-tuning/m-p/246217#M12452</guid>
      <dc:creator>ereche</dc:creator>
      <dc:date>2025-04-11T11:19:01Z</dc:date>
    </item>
  </channel>
</rss>

