<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Intervlan in Spark Firewall (SMB)</title>
    <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Intervlan/m-p/73684#M2897</link>
    <description>&lt;P&gt;Hi Albrecht,&lt;/P&gt;&lt;P&gt;This is exactly the point.&lt;/P&gt;&lt;P&gt;I am unfamiliar with this firewall (I approach for a short time to Check Point) and&amp;nbsp;I ask for help to understand where and how to create this rule.&lt;/P&gt;&lt;P&gt;Otherwise where I can find a tutorial that will help me.&lt;/P&gt;&lt;P&gt;Gaetano&lt;/P&gt;</description>
    <pubDate>Wed, 29 Jan 2020 15:19:08 GMT</pubDate>
    <dc:creator>Gaetano_Nicosia</dc:creator>
    <dc:date>2020-01-29T15:19:08Z</dc:date>
    <item>
      <title>Intervlan</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Intervlan/m-p/73560#M2892</link>
      <description>&lt;P&gt;Hi to all,&lt;/P&gt;&lt;P&gt;On my cp730 firewall I created some vlan, for example 201, 202,203 etc.&lt;/P&gt;&lt;P&gt;I need to configure vlan 202 so that it &lt;STRONG&gt;only sees itself&lt;/STRONG&gt; and &lt;STRONG&gt;cannot see the others vLan&lt;/STRONG&gt;.&lt;/P&gt;&lt;P&gt;Can you suggest me a way?&lt;/P&gt;&lt;P&gt;Thank You and Best Regards&lt;/P&gt;&lt;P&gt;Gaetano&lt;/P&gt;</description>
      <pubDate>Tue, 28 Jan 2020 14:28:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Intervlan/m-p/73560#M2892</guid>
      <dc:creator>Gaetano_Nicosia</dc:creator>
      <dc:date>2020-01-28T14:28:08Z</dc:date>
    </item>
    <item>
      <title>Re: Intervlan</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Intervlan/m-p/73564#M2893</link>
      <description>just setup a block rule for the network connected on VLAN 202 to drop/reject all traffic to the other networks configured on VLAN 201 and 203</description>
      <pubDate>Tue, 28 Jan 2020 14:47:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Intervlan/m-p/73564#M2893</guid>
      <dc:creator>Maarten_Sjouw</dc:creator>
      <dc:date>2020-01-28T14:47:35Z</dc:date>
    </item>
    <item>
      <title>Re: Intervlan</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Intervlan/m-p/73565#M2894</link>
      <description>&lt;P&gt;How could that be ? VLAN is used to separate Ethernet packets coming from the same IP/IF by tagging. Switches see the VLAN tags, but a VLAN can really see nothing...&lt;/P&gt;</description>
      <pubDate>Tue, 28 Jan 2020 14:50:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Intervlan/m-p/73565#M2894</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2020-01-28T14:50:55Z</dc:date>
    </item>
    <item>
      <title>Re: Intervlan</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Intervlan/m-p/73670#M2895</link>
      <description>&lt;P&gt;Hi to All and thank You for feedback.&lt;/P&gt;&lt;P&gt;I will try to explain the problem better.&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;I configured LAN3 on the Firewall as network, assigning it IP 192.168.201.254 and enabling the DHCP;&lt;/LI&gt;&lt;LI&gt;On LAN3 I created two VLANs, the first 202 (192.168.202.254 and DHCP enabled) and the second 203 (192.168.203.254 and DHCP enabled).&lt;/LI&gt;&lt;LI&gt;A POE switch is connected to this LAN and correctly takes an IP from the firewall; for example 192.168.201.1. Obviously on the switch was Tagged the port that connects to the Firewall.&lt;/LI&gt;&lt;LI&gt;I connected two Access Points to ports 1 and 2 (tagged) of the switch; the two access points also take an IP from the firewall, for example 192.168.201.2 and 192.168.201.3.&lt;/LI&gt;&lt;LI&gt;On each Access Point, I configured two SSIDs. I assigned the VLAN 202 to the first (WiFi-Mag) and the VLAN 203 to the second (WiFi-Guest).&lt;/LI&gt;&lt;LI&gt;I connect successfully from a notebook or a mobile to each Wifi network. The IP assigned to the mobile device are&amp;nbsp;respectively 192.168.202.xxx or 192.168.203.xxx&lt;/LI&gt;&lt;LI&gt;The same vlan are configured on the switch.&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;And this is&amp;nbsp;where the problematic part comes.&lt;/P&gt;&lt;P&gt;It's all right for the lan 202, but I need that the WiFi-guest 203 have only access to Internet and no browsing on the corporate network formed by 202 and other VLAN's configured on ports 1 and 2 of the firewall.&lt;/P&gt;&lt;P&gt;I hope I have been clearer and that someone can give me some indications.&lt;/P&gt;&lt;P&gt;Thank You and Best Regards&lt;/P&gt;&lt;P&gt;Gaetano&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 29 Jan 2020 14:11:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Intervlan/m-p/73670#M2895</guid>
      <dc:creator>Gaetano_Nicosia</dc:creator>
      <dc:date>2020-01-29T14:11:18Z</dc:date>
    </item>
    <item>
      <title>Re: Intervlan</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Intervlan/m-p/73673#M2896</link>
      <description>&lt;P&gt;I do not understand the question - if&amp;nbsp;&lt;SPAN&gt;192.168.203.xxx is not allowed to connect to&amp;nbsp;the internal networks, why not make a rule to drop that traffic ? This is a firewall, after all&amp;nbsp;8)&lt;/img&gt;...&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 29 Jan 2020 14:27:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Intervlan/m-p/73673#M2896</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2020-01-29T14:27:49Z</dc:date>
    </item>
    <item>
      <title>Re: Intervlan</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Intervlan/m-p/73684#M2897</link>
      <description>&lt;P&gt;Hi Albrecht,&lt;/P&gt;&lt;P&gt;This is exactly the point.&lt;/P&gt;&lt;P&gt;I am unfamiliar with this firewall (I approach for a short time to Check Point) and&amp;nbsp;I ask for help to understand where and how to create this rule.&lt;/P&gt;&lt;P&gt;Otherwise where I can find a tutorial that will help me.&lt;/P&gt;&lt;P&gt;Gaetano&lt;/P&gt;</description>
      <pubDate>Wed, 29 Jan 2020 15:19:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Intervlan/m-p/73684#M2897</guid>
      <dc:creator>Gaetano_Nicosia</dc:creator>
      <dc:date>2020-01-29T15:19:08Z</dc:date>
    </item>
    <item>
      <title>Re: Intervlan</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Intervlan/m-p/73699#M2898</link>
      <description>Have a look at the howto video's&lt;BR /&gt;&lt;A href="https://community.checkpoint.com/t5/How-To-Videos/bd-p/howto" target="_blank"&gt;https://community.checkpoint.com/t5/How-To-Videos/bd-p/howto&lt;/A&gt;&lt;BR /&gt;Just make one thing very clear, a firewall will only allow traffic that you tell it to allow.</description>
      <pubDate>Wed, 29 Jan 2020 18:07:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Intervlan/m-p/73699#M2898</guid>
      <dc:creator>Maarten_Sjouw</dc:creator>
      <dc:date>2020-01-29T18:07:17Z</dc:date>
    </item>
    <item>
      <title>Re: Intervlan</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Intervlan/m-p/73734#M2903</link>
      <description>&lt;P&gt;Thanks for the feedback,&amp;nbsp;I will see the videos that will surely help me.&lt;/P&gt;&lt;P&gt;As this is a community, I provide the solution sent to me by Check Points technical assistance.&lt;/P&gt;&lt;P&gt;Could help other friends.&lt;/P&gt;&lt;P&gt;From Policy rule,&amp;nbsp;"Incoming, internal and VPN" section create a rule with&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Source: the vLAN that has only access to Internet&lt;/LI&gt;&lt;LI&gt;Destination: LAN network&lt;/LI&gt;&lt;LI&gt;Action: Block&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;That's all, very very simple.&lt;span class="lia-unicode-emoji" title=":grinning_face:"&gt;😀&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 30 Jan 2020 06:57:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Intervlan/m-p/73734#M2903</guid>
      <dc:creator>Gaetano_Nicosia</dc:creator>
      <dc:date>2020-01-30T06:57:25Z</dc:date>
    </item>
    <item>
      <title>Re: Intervlan</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Intervlan/m-p/73748#M2905</link>
      <description>&lt;P&gt;Why not just read the documentation that explains this and much, much more &amp;nbsp;?&amp;nbsp;CP_R77.20.80_1100_1200R_1400_Appliance_LocalAdminGuide&lt;/P&gt;</description>
      <pubDate>Thu, 30 Jan 2020 08:44:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Intervlan/m-p/73748#M2905</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2020-01-30T08:44:18Z</dc:date>
    </item>
  </channel>
</rss>

