<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Enterprise to VPN User without site to site VPN in Spark Firewall (SMB)</title>
    <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Enterprise-to-VPN-User-without-site-to-site-VPN/m-p/82610#M3450</link>
    <description>Upgrading the firmware and adding outgoing solved the issue. Thank you.</description>
    <pubDate>Tue, 21 Apr 2020 11:48:01 GMT</pubDate>
    <dc:creator>Yousef</dc:creator>
    <dc:date>2020-04-21T11:48:01Z</dc:date>
    <item>
      <title>Enterprise to VPN User without site to site VPN</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Enterprise-to-VPN-User-without-site-to-site-VPN/m-p/81698#M3418</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I'm using CheckPoint 750 Appliance at work.&lt;/P&gt;&lt;P&gt;We installed VPN EndPoint at each remote User, the VPN is having a pool of 172.16.10.*&lt;/P&gt;&lt;P&gt;The local Network where the gateway is installed, it is using 10.4.0.*&lt;/P&gt;&lt;P&gt;The developers are developing a service at port 9000 in their computers, and when they were in the company, they simply called an API from the local network (For ex. 10.4.0.10) to their computer (10.4.0.*:9000 and it worked.&lt;/P&gt;&lt;P&gt;Now when they moved their PCs to work from home, they connect using the VPN, they are able to access all the local network, so that all Servers and services that are using 10.4.0.* are reachable, however, the opposite is not true.&lt;/P&gt;&lt;P&gt;None of the Server / Computers at the office (10.4.0.*) are able to connect back to the VPN remote users.&lt;/P&gt;&lt;P&gt;The users are trying to call API requests from Servers at the office (say 10.4.0.10) to their own computers, say 172.16.10.5:9000 , it fails.&lt;/P&gt;&lt;P&gt;10.4.0.* can't even ping any host in the VPN IPs.&lt;/P&gt;&lt;P&gt;My Appliance is manage by an ISP, but they are still not able to solve the issue, it has been a week already. Is it something that is feasible or not? I know that Site to Site is supposed to work (although we haven't tested it), but what about Point to Site?&lt;/P&gt;&lt;P&gt;VPN Users (172.16.10.*) need to be reached "reversely" from the work network (10.4.0.*).&lt;/P&gt;&lt;P&gt;I thought when I connect to the VPN, the VPN object and the local object are both connected and can communicate to each other without a problem.&lt;/P&gt;&lt;P&gt;I'm looking for advice since my ISP is not able to solve the problem yet. Am I asking for something that can't be done by Point to Site?&lt;/P&gt;&lt;P&gt;Let me know of any feasible solution so that I can consult my ISP to do it when they get back to me again.&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 13 Apr 2020 15:23:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Enterprise-to-VPN-User-without-site-to-site-VPN/m-p/81698#M3418</guid>
      <dc:creator>Yousef</dc:creator>
      <dc:date>2020-04-13T15:23:18Z</dc:date>
    </item>
    <item>
      <title>Re: Enterprise to VPN User without site to site VPN</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Enterprise-to-VPN-User-without-site-to-site-VPN/m-p/81857#M3419</link>
      <description>Have you created an explicit rule to allow this sort of communication?</description>
      <pubDate>Tue, 14 Apr 2020 21:06:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Enterprise-to-VPN-User-without-site-to-site-VPN/m-p/81857#M3419</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-04-14T21:06:35Z</dc:date>
    </item>
    <item>
      <title>Re: Enterprise to VPN User without site to site VPN</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Enterprise-to-VPN-User-without-site-to-site-VPN/m-p/81893#M3422</link>
      <description>&lt;P&gt;My ISP added the following rules:&lt;/P&gt;&lt;P&gt;Incoming, Internal and VPN traffic:&lt;/P&gt;&lt;P&gt;LAN Network (10.4.0.*) -&amp;gt; VPN Remote Access -&amp;gt; Any Service, Accept&lt;/P&gt;&lt;P&gt;LAN Network (10.4.0.*) -&amp;gt; Office_mode&amp;nbsp; (same range 172.16.10.0) -&amp;gt; Any Service, Accept&lt;/P&gt;&lt;P&gt;VPN Remote Access -&amp;gt; VPN Remote Access -&amp;gt; Any Service, Accept&lt;/P&gt;&lt;P&gt;This Gateway (external IP) -&amp;gt; Office_mode (same range 172.16.10.0) -&amp;gt; Any Service, Accept&lt;/P&gt;&lt;P&gt;Outgoing:&lt;/P&gt;&lt;P&gt;Nothing specific that handles this&lt;/P&gt;&lt;P&gt;NAT rules:&lt;/P&gt;&lt;P&gt;Hide internal networks behind the Gateway's external IP address [ON]&lt;/P&gt;&lt;P&gt;Manual NAT rules:&lt;/P&gt;&lt;P&gt;Original Source (Any), Original Destination (Office_mode), Original Service (Any), Translated Source (Original), Translated Destination (Original), Translated Service (Any)&lt;/P&gt;&lt;P&gt;==&lt;/P&gt;&lt;P&gt;This configuration is not working. Backlinks to the Office_mode are not working without Office_mode initiating the session. So we can't access any open port in the Office_mode/VPN Users computers.&lt;/P&gt;&lt;P&gt;I'm not sure if that matters, but the system's firmware&amp;nbsp;version is R77.20.31 (990170960)&lt;/P&gt;&lt;P&gt;Yousef.&lt;/P&gt;</description>
      <pubDate>Wed, 15 Apr 2020 04:58:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Enterprise-to-VPN-User-without-site-to-site-VPN/m-p/81893#M3422</guid>
      <dc:creator>Yousef</dc:creator>
      <dc:date>2020-04-15T04:58:37Z</dc:date>
    </item>
    <item>
      <title>Re: Enterprise to VPN User without site to site VPN</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Enterprise-to-VPN-User-without-site-to-site-VPN/m-p/81894#M3423</link>
      <description>That firmware revision is quite old and you should upgrade for...many reasons.&lt;BR /&gt;I presume you'd need a rule that permits your internal network to talk to the Office Mode addresses in the Outgoing section.</description>
      <pubDate>Wed, 15 Apr 2020 05:05:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Enterprise-to-VPN-User-without-site-to-site-VPN/m-p/81894#M3423</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-04-15T05:05:47Z</dc:date>
    </item>
    <item>
      <title>Re: Enterprise to VPN User without site to site VPN</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Enterprise-to-VPN-User-without-site-to-site-VPN/m-p/81895#M3424</link>
      <description>&lt;P&gt;Thank you. I will let my ISP do the change, and hopefully convince them to upgrade the firmware.&lt;/P&gt;&lt;P&gt;After that, I will post a reply and accept the solution in case that solved the problem.&lt;/P&gt;</description>
      <pubDate>Wed, 15 Apr 2020 05:08:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Enterprise-to-VPN-User-without-site-to-site-VPN/m-p/81895#M3424</guid>
      <dc:creator>Yousef</dc:creator>
      <dc:date>2020-04-15T05:08:33Z</dc:date>
    </item>
    <item>
      <title>Re: Enterprise to VPN User without site to site VPN</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Enterprise-to-VPN-User-without-site-to-site-VPN/m-p/82610#M3450</link>
      <description>Upgrading the firmware and adding outgoing solved the issue. Thank you.</description>
      <pubDate>Tue, 21 Apr 2020 11:48:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Enterprise-to-VPN-User-without-site-to-site-VPN/m-p/82610#M3450</guid>
      <dc:creator>Yousef</dc:creator>
      <dc:date>2020-04-21T11:48:01Z</dc:date>
    </item>
  </channel>
</rss>

