<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: VPN to 730 appliance behind Google Fiber static IP in Spark Firewall (SMB)</title>
    <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/VPN-to-730-appliance-behind-Google-Fiber-static-IP/m-p/8970#M190</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have a similar setup. I used the DMZ option in the ISP router to send all incoming traffic to the WAN interface of the gateway. Both site-to-site and remote access VPN work well.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I had issues with VPN from mobile devices. The solution was to set the client to use SSL instead of IPSec, but if I remember correctly the site responded and connection was successful, but traffic to the encryption domain failed.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 26 Nov 2018 17:43:43 GMT</pubDate>
    <dc:creator>Pedro_Espindola</dc:creator>
    <dc:date>2018-11-26T17:43:43Z</dc:date>
    <item>
      <title>VPN to 730 appliance behind Google Fiber static IP</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/VPN-to-730-appliance-behind-Google-Fiber-static-IP/m-p/8968#M188</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;My client has Google Fiber with one static IP address.&amp;nbsp; The Google Fiber modem public IP NATs to a 10.0.0.0 address, to which the 730 WAN port is connected.&amp;nbsp; I have been unable to get a VPN connection through this configuration to the 730, the VPN client shows the site is not responding.&lt;/P&gt;&lt;P&gt;Any ideas or experience with this setup?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 26 Nov 2018 04:54:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/VPN-to-730-appliance-behind-Google-Fiber-static-IP/m-p/8968#M188</guid>
      <dc:creator>Dick_Summers</dc:creator>
      <dc:date>2018-11-26T04:54:46Z</dc:date>
    </item>
    <item>
      <title>Re: VPN to 730 appliance behind Google Fiber static IP</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/VPN-to-730-appliance-behind-Google-Fiber-static-IP/m-p/8969#M189</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Question is: Who is the VPN peer ? Usually, this is a valid configuration and&amp;nbsp;VPN should work as expected. Some limitations can be found in&amp;nbsp;&lt;A class="" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk121758&amp;amp;partition=General&amp;amp;product=Small"&gt;sk121758: R77.20.75 for Small and Medium Business Appliances&lt;/A&gt;:&lt;/P&gt;&lt;P&gt;The external IP address of the gateway is also part of its local VPN encryption domain by default. This may cause conflicts with IP addresses of peers when the gateway is behind NAT or uses a dynamic Internet Connection IP address.&lt;/P&gt;&lt;UL style="list-style-type: circle;"&gt;&lt;LI&gt;To exclude the external IP of the gateway from the encryption domain, use this Аdvanced setting: "&lt;EM&gt;VPN Site to Site global settings - Do not encrypt connections originating from the local gateway&lt;/EM&gt;".&lt;/LI&gt;&lt;LI&gt;For the Permanent VPN Tunnels feature to work properly in this mode, use the Аdvanced setting: "&lt;EM&gt;VPN Site to Site global settings - Perform Tunnel Tests using an internal IP address&lt;/EM&gt;".&lt;/LI&gt;&lt;/UL&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 26 Nov 2018 12:02:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/VPN-to-730-appliance-behind-Google-Fiber-static-IP/m-p/8969#M189</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2018-11-26T12:02:37Z</dc:date>
    </item>
    <item>
      <title>Re: VPN to 730 appliance behind Google Fiber static IP</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/VPN-to-730-appliance-behind-Google-Fiber-static-IP/m-p/8970#M190</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have a similar setup. I used the DMZ option in the ISP router to send all incoming traffic to the WAN interface of the gateway. Both site-to-site and remote access VPN work well.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I had issues with VPN from mobile devices. The solution was to set the client to use SSL instead of IPSec, but if I remember correctly the site responded and connection was successful, but traffic to the encryption domain failed.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 26 Nov 2018 17:43:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/VPN-to-730-appliance-behind-Google-Fiber-static-IP/m-p/8970#M190</guid>
      <dc:creator>Pedro_Espindola</dc:creator>
      <dc:date>2018-11-26T17:43:43Z</dc:date>
    </item>
  </channel>
</rss>

