<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Services on remote VPN server public IP inaccessible (blocked by VPN daemon) in Spark Firewall (SMB)</title>
    <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Services-on-remote-VPN-server-public-IP-inaccessible-blocked-by/m-p/49677#M1950</link>
    <description>&lt;P&gt;VPN defined on SMB usually send every paket sent to the Encryption domain (all networks behind peer GW) thru the VPN tunnel. An additional routable IP address will get paket by the internet, not VPN.&lt;/P&gt;</description>
    <pubDate>Wed, 03 Apr 2019 08:08:55 GMT</pubDate>
    <dc:creator>G_W_Albrecht</dc:creator>
    <dc:date>2019-04-03T08:08:55Z</dc:date>
    <item>
      <title>Services on remote VPN server public IP inaccessible (blocked by VPN daemon)</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Services-on-remote-VPN-server-public-IP-inaccessible-blocked-by/m-p/49274#M1931</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;I have a small 1100 appliance that is locally managed. There is &amp;nbsp;site-to-site VPN configured with remote Fortinet device. Site to site connectivity works OK, tunnel is brought up, packets are routed and services are accessible.&lt;/P&gt;&lt;P&gt;But, on our side we have exchange server behind CP device that is statically NATed with non CP IP address (there is additional IP assigned only for NAT servers). This setup works ok as mail flow is working.&lt;/P&gt;&lt;P&gt;Caveat is that behind this Fortinet there is exchange server published for remote domain. When VPN tunnel is down mail from our server to this remote server flows OK, when VPN tunnel is up (and this should be always up) then SMTP server on remote side is not accessible on the remote locations from our LAN.&lt;/P&gt;&lt;P&gt;In the log I am getting Block notification:&lt;/P&gt;&lt;TABLE cellspacing="0" cellpadding="0"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;DIV class="x-grid-cell-inner "&gt;Today 12:07:37&lt;/DIV&gt;&lt;/TD&gt;&lt;TD&gt;&lt;DIV class="x-grid-cell-inner "&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/TD&gt;&lt;TD&gt;&lt;DIV class="x-grid-cell-inner "&gt;&lt;DIV class="cp cp-glyph-site_to_site_vpn cp-icon-default-color cp-image"&gt;&amp;nbsp;&lt;/DIV&gt;VPN&lt;/DIV&gt;&lt;/TD&gt;&lt;TD&gt;&lt;DIV class="x-grid-cell-inner "&gt;daemon&lt;/DIV&gt;&lt;/TD&gt;&lt;TD&gt;&lt;DIV class="x-grid-cell-inner "&gt;&lt;DIV class="cp cp-glyph-reject cp-icon-alert-color cp-image"&gt;&amp;nbsp;&lt;/DIV&gt;Block&lt;/DIV&gt;&lt;/TD&gt;&lt;TD&gt;&lt;DIV class="x-grid-cell-inner "&gt;&amp;lt;server ip&amp;gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;TD&gt;&lt;DIV class="x-grid-cell-inner "&gt;&amp;lt;remote ip&amp;gt;&lt;/DIV&gt;&lt;/TD&gt;&lt;TD&gt;&lt;DIV class="x-grid-cell-inner "&gt;SMTP&lt;/DIV&gt;&lt;/TD&gt;&lt;TD&gt;&lt;DIV class="x-grid-cell-inner "&gt;0&lt;/DIV&gt;&lt;/TD&gt;&lt;TD&gt;&lt;DIV class="x-grid-cell-inner "&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As there is specification for rule 0 it looks like some implied rule is doing this.&lt;/P&gt;&lt;P&gt;What is the scenario to avoid this (as it looks like CP is trying to route packets to this server over VPN) so that not only SNMP but any service on remote VPN gateway public IP are accessible?&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;DiNo&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 30 Mar 2019 11:13:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Services-on-remote-VPN-server-public-IP-inaccessible-blocked-by/m-p/49274#M1931</guid>
      <dc:creator>DinoN</dc:creator>
      <dc:date>2019-03-30T11:13:56Z</dc:date>
    </item>
    <item>
      <title>Re: Services on remote VPN server public IP inaccessible (blocked by VPN daemon)</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Services-on-remote-VPN-server-public-IP-inaccessible-blocked-by/m-p/49677#M1950</link>
      <description>&lt;P&gt;VPN defined on SMB usually send every paket sent to the Encryption domain (all networks behind peer GW) thru the VPN tunnel. An additional routable IP address will get paket by the internet, not VPN.&lt;/P&gt;</description>
      <pubDate>Wed, 03 Apr 2019 08:08:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Services-on-remote-VPN-server-public-IP-inaccessible-blocked-by/m-p/49677#M1950</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2019-04-03T08:08:55Z</dc:date>
    </item>
  </channel>
</rss>

