<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Site-to-site VPN in Spark Firewall (SMB)</title>
    <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Site-to-site-VPN/m-p/252708#M12923</link>
    <description>&lt;P&gt;Sorry I for got to mention. Yes, I had the SMS running GaiA R81.20 to manage both 1595 gateway (embedded R81.10.17) and 3600 gateway cluster (R81.20)&lt;/P&gt;</description>
    <pubDate>Mon, 07 Jul 2025 18:41:31 GMT</pubDate>
    <dc:creator>hle2001</dc:creator>
    <dc:date>2025-07-07T18:41:31Z</dc:date>
    <item>
      <title>Site-to-site VPN</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Site-to-site-VPN/m-p/252379#M12890</link>
      <description>&lt;P&gt;Hi everyone,&lt;/P&gt;
&lt;P&gt;I am a long time Checkpoint users but Site-to-Site VPN is new to me and need your help.&lt;/P&gt;
&lt;P&gt;I have a clusterXL running on model Quantum Spark 1595 manage several networks and one the network is called DMZ network housing AntiVirus server, Windows patch server, and SolarWinds monitoring system.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The DMZ network address is 10.80.192.0/24.&lt;/P&gt;
&lt;P&gt;Security Management Server is in DMZ network (10.80.192.107)&lt;/P&gt;
&lt;P&gt;ClusterXL virtual IP is 10.80.192.1 (FWA=10.80.192.2, FWB=10.80.192.3)&lt;/P&gt;
&lt;P&gt;The Gateway 1595 still have two more interfaces available.&lt;/P&gt;
&lt;P&gt;----------&lt;/P&gt;
&lt;P&gt;I had another private network (10.10.10.0/24) connect to Ethernet1 interface on Checkpoint Gateway&amp;nbsp; model 3600.&lt;/P&gt;
&lt;P&gt;The goal is setting up private network to ClusterXL and provide access rules to use resources in DMZ network such as AntiVirus, Patch Update, and network monitoring.&lt;/P&gt;
&lt;P&gt;Currently, I setup Ethernet2 interface on Gateway 3600 to connect directly to DMZ Cisco switch (10.80.192.0/24), so the Security Management server (10.80.192.107) can manage GW 3600, and by doing this I&amp;nbsp; can create access rule for Private Network (10.10.10.0/24) to use all resources in DMZ network. Here the problem, our management want GW3600 interface to ClusterXL 1595 to allow 10.10.10.0/24 network access to DMZ resources.&lt;/P&gt;
&lt;P&gt;I am new to Site-to-Site VPN, and our GW3600 and ClusterXL gateway pair 1595 mount in the same cabinet and very close together, can it be done? how to physically connect a single GW3600 to ClusterXL dual GW1595? and how to setup VPN for it to communicate?&amp;nbsp; Do I need to use two interfaces on GW3600 for it to work?&lt;/P&gt;
&lt;P&gt;Thank in advance for your help,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 01 Jul 2025 22:37:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Site-to-site-VPN/m-p/252379#M12890</guid>
      <dc:creator>hle2001</dc:creator>
      <dc:date>2025-07-01T22:37:20Z</dc:date>
    </item>
    <item>
      <title>Re: Site-to-site VPN</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Site-to-site-VPN/m-p/252383#M12891</link>
      <description>&lt;P&gt;Please provide a network diagram showing all the relevant components (including proposed configuration).&lt;BR /&gt;Is the 1595 managed by the same SMS as the 3600?&lt;BR /&gt;In any case, it should be possible to set up a VPN between the 3600 Cluster and a single 1595, though the devil is in the details.&lt;/P&gt;</description>
      <pubDate>Tue, 01 Jul 2025 22:41:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Site-to-site-VPN/m-p/252383#M12891</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2025-07-01T22:41:17Z</dc:date>
    </item>
    <item>
      <title>Re: Site-to-site VPN</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Site-to-site-VPN/m-p/252432#M12897</link>
      <description>&lt;P&gt;You would pretty much set it up following info from below link, as say other side was 3rd party, except there would be no interoperable object here.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;
&lt;P&gt;&lt;A href="https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_SitetoSiteVPN_AdminGuide/Topics-VPNSG/Basic-Site-to-Site-VPN-Configuration.htm?tocpath=Basic%20Site%20to%20Site%20VPN%20Configuration%7C_____0#Configuring_a_Star_or_Meshed_Community_Between_Internally_Managed_Security_Ga" target="_blank"&gt;https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_SitetoSiteVPN_AdminGuide/Topics-VPNSG/Basic-Site-to-Site-VPN-Configuration.htm?tocpath=Basic%20Site%20to%20Site%20VPN%20Configuration%7C_____0#Configuring_a_Star_or_Meshed_Community_Between_Internally_Managed_Security_Ga&lt;/A&gt;...&lt;/P&gt;</description>
      <pubDate>Wed, 02 Jul 2025 14:57:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Site-to-site-VPN/m-p/252432#M12897</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-07-02T14:57:19Z</dc:date>
    </item>
    <item>
      <title>Re: Site-to-site VPN</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Site-to-site-VPN/m-p/252708#M12923</link>
      <description>&lt;P&gt;Sorry I for got to mention. Yes, I had the SMS running GaiA R81.20 to manage both 1595 gateway (embedded R81.10.17) and 3600 gateway cluster (R81.20)&lt;/P&gt;</description>
      <pubDate>Mon, 07 Jul 2025 18:41:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Site-to-site-VPN/m-p/252708#M12923</guid>
      <dc:creator>hle2001</dc:creator>
      <dc:date>2025-07-07T18:41:31Z</dc:date>
    </item>
  </channel>
</rss>

