<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cross community VPN traffic in Spark Firewall (SMB)</title>
    <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Cross-community-VPN-traffic/m-p/114457#M5046</link>
    <description>&lt;P&gt;Thanks&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/21294"&gt;@G_W_Albrecht&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I was not sure if I route all traffic through Centre then it will not direct the traffic out to internet rather than going through the Cloud Tunnel. as there is no option to have a multi site community in SMB.&amp;nbsp; But I guess if I have the set Enc Domain for the cloud tunnel correctly, it will.&lt;/P&gt;&lt;P&gt;also did not want to route all internet traffic through, but I will try. Thanks for the suggestion.&lt;/P&gt;</description>
    <pubDate>Wed, 24 Mar 2021 12:47:32 GMT</pubDate>
    <dc:creator>Attiq786</dc:creator>
    <dc:date>2021-03-24T12:47:32Z</dc:date>
    <item>
      <title>Cross community VPN traffic</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Cross-community-VPN-traffic/m-p/114439#M5044</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;We have 7 SMB(1570) appliances on different sites worldwide. all have site to site VPNs between them.&lt;/P&gt;&lt;P&gt;There is a requirement to establish Azure Cloud VPN and we can create only 4 tunnels maximum.&lt;/P&gt;&lt;P&gt;remaining three sites will need to go through our HQ SMB gateway for Cloud access.&lt;/P&gt;&lt;P&gt;is it possible to have cross-community communication between remaining sites and the cloud, through HQ on SMB appliances?&lt;/P&gt;&lt;P&gt;rather than using enc domains, if i use routing for this, will it work?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Attiq&lt;/P&gt;</description>
      <pubDate>Wed, 24 Mar 2021 09:47:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Cross-community-VPN-traffic/m-p/114439#M5044</guid>
      <dc:creator>Attiq786</dc:creator>
      <dc:date>2021-03-24T09:47:25Z</dc:date>
    </item>
    <item>
      <title>Re: Cross community VPN traffic</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Cross-community-VPN-traffic/m-p/114441#M5045</link>
      <description>&lt;P&gt;Why not go for a star topology ? See&amp;nbsp;&lt;SPAN style="font-family: inherit; background-color: #ffffff;"&gt;Check Point 1400 Appliances Locally Managed Administration Guide R77.20.87 p.164f:&lt;/SPAN&gt;&lt;/P&gt;
&lt;DIV class="page" title="Page 164"&gt;
&lt;DIV class="layoutArea"&gt;
&lt;DIV class="column"&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;&lt;SPAN&gt;VPN star community &lt;/SPAN&gt;&lt;SPAN&gt;– One gateway is the center and routes all traffic (encrypted and internet traffic of the remote peer) to the internet and back to the remote peer. The peer gateway is a satellite and is configured to route all its traffic through the center.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;For examples of when to use a mesh or star community, see VPN Community Use Cases (on page &lt;/SPAN&gt;&lt;SPAN&gt;165&lt;/SPAN&gt;&lt;SPAN&gt;).&lt;/SPAN&gt;&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;</description>
      <pubDate>Wed, 24 Mar 2021 10:00:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Cross-community-VPN-traffic/m-p/114441#M5045</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2021-03-24T10:00:37Z</dc:date>
    </item>
    <item>
      <title>Re: Cross community VPN traffic</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Cross-community-VPN-traffic/m-p/114457#M5046</link>
      <description>&lt;P&gt;Thanks&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/21294"&gt;@G_W_Albrecht&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I was not sure if I route all traffic through Centre then it will not direct the traffic out to internet rather than going through the Cloud Tunnel. as there is no option to have a multi site community in SMB.&amp;nbsp; But I guess if I have the set Enc Domain for the cloud tunnel correctly, it will.&lt;/P&gt;&lt;P&gt;also did not want to route all internet traffic through, but I will try. Thanks for the suggestion.&lt;/P&gt;</description>
      <pubDate>Wed, 24 Mar 2021 12:47:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Cross-community-VPN-traffic/m-p/114457#M5046</guid>
      <dc:creator>Attiq786</dc:creator>
      <dc:date>2021-03-24T12:47:32Z</dc:date>
    </item>
    <item>
      <title>Re: Cross community VPN traffic</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Cross-community-VPN-traffic/m-p/114488#M5047</link>
      <description>&lt;P&gt;How are the devices managed? If you are managing them with a SmartCenter, there are three options:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Satellites to center only&lt;/LI&gt;
&lt;LI&gt;Satellites to center and through center to other satellites&lt;/LI&gt;
&lt;LI&gt;Satellites to center and through center to other satellites and the Internet&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;Just set up your Azure tunnel as another satellite in the community, pick the second option, and your Internet traffic won't go through the center.&lt;/P&gt;</description>
      <pubDate>Wed, 24 Mar 2021 16:47:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Cross-community-VPN-traffic/m-p/114488#M5047</guid>
      <dc:creator>Bob_Zimmerman</dc:creator>
      <dc:date>2021-03-24T16:47:49Z</dc:date>
    </item>
    <item>
      <title>Re: Cross community VPN traffic</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Cross-community-VPN-traffic/m-p/114489#M5048</link>
      <description>&lt;P&gt;Having a central GAiA GW with SMS in the star topology would be preferable - but here we only have&amp;nbsp;&lt;SPAN&gt;7 SMB (1570) appliances locally managed. Only 3. is supported in this case!&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 24 Mar 2021 17:03:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Cross-community-VPN-traffic/m-p/114489#M5048</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2021-03-24T17:03:56Z</dc:date>
    </item>
    <item>
      <title>Re: Cross community VPN traffic</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Cross-community-VPN-traffic/m-p/114637#M5050</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/21294"&gt;@G_W_Albrecht&lt;/a&gt;&amp;nbsp; yes that's correct. all locally managed. I would have loved the Central Management solution, but it was already decided/configured before I took over the project. Nevertheless we might distribute the traffic through 3 different gateways rather than having all the load on only one.&lt;/P&gt;</description>
      <pubDate>Thu, 25 Mar 2021 15:35:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Cross-community-VPN-traffic/m-p/114637#M5050</guid>
      <dc:creator>Attiq786</dc:creator>
      <dc:date>2021-03-25T15:35:16Z</dc:date>
    </item>
    <item>
      <title>Re: Cross community VPN traffic</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Cross-community-VPN-traffic/m-p/114643#M5051</link>
      <description>&lt;P&gt;Another possible configuration without SmartDashboard&amp;nbsp;would be using vpn_route.conf to configure&amp;nbsp;VPN Routing in Domain Based VPN like we read in&amp;nbsp;&lt;A class="cp_link sc_ellipsis" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk69726&amp;amp;partition=Basic&amp;amp;product=SmartProvisioning," data-hasqtip="39" aria-describedby="qtip-39" target="_blank"&gt;sk69726: VPN Routing does not work and traffic to other satellites leaves in "clear" when setting up SmartLSM profile in Star Community and c&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;This sk is for central management, but using local &lt;EM&gt;/opt/fw1/lib/vpn_route.conf &lt;/EM&gt;has the same effect - this is linked in&amp;nbsp;&lt;EM&gt;/pfrm2.0/config1/ &lt;/EM&gt;&lt;SPAN&gt;or&lt;/SPAN&gt;&lt;EM&gt; /pfrm2.0/config2/vpn_route.conf&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;All details can be found in &lt;A href="https://sc1.checkpoint.com/documents/R80.40/WebAdminGuides/EN/CP_R80.40_SitetoSiteVPN_AdminGuide/Content/Topics-VPNSG/Domain-Based-VPN.htm?TocPath=Domain%20Based%20VPN|Configuring%20VPN%20Routing%20in%20Domain%20Based%20VPN|_____0#Configuring_VPN_Routing_in_Domain_Based_VPN" target="_blank"&gt;https://sc1.checkpoint.com/documents/R80.40/WebAdminGuides/EN/CP_R80.40_SitetoSiteVPN_AdminGuide/Content/Topics-VPNSG/Domain-Based-VPN.htm?TocPath=Domain%20Based%20VPN|Configuring%20VPN%20Routing%20in%20Domain%20Based%20VPN|_____0#Configuring_VPN_Routing_in_Domain_Based_VPN&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;After the changes, new vpn setting can be applied locally without reboot using&lt;/P&gt;
&lt;P&gt;#&amp;nbsp;&lt;EM&gt;vpn_configload&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;If this does not do the trick, maybe we need:&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;# fw_configload&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;# sfwd_restart&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 25 Mar 2021 17:10:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Cross-community-VPN-traffic/m-p/114643#M5051</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2021-03-25T17:10:22Z</dc:date>
    </item>
    <item>
      <title>Re: Cross community VPN traffic</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Cross-community-VPN-traffic/m-p/114659#M5052</link>
      <description>&lt;P&gt;But to be on the safe side, i would evaluate this information and open a TAC case to get the confirmation that this is a supported configuration.&lt;/P&gt;</description>
      <pubDate>Thu, 25 Mar 2021 20:57:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Cross-community-VPN-traffic/m-p/114659#M5052</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2021-03-25T20:57:52Z</dc:date>
    </item>
  </channel>
</rss>

