<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Conditional Match Condition on SMB gateway (Embedded GAIA) in Spark Firewall (SMB)</title>
    <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Conditional-Match-Condition-on-SMB-gateway-Embedded-GAIA/m-p/134694#M6088</link>
    <description>&lt;P&gt;Hi!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm trying to set up a site-to-site VPN between a centrally managed SMB gateway an AWS.&lt;/P&gt;&lt;P&gt;I followed the instructions provided by AWS ( create vpn interfaces, routing, create interoperable object, create vpn community, create firewall rules) succesfully, until the last step where is asked to create a firewall rule to allow the desired traffic using&amp;nbsp; Directional Match Conditions (internal_clear-&amp;gt;community; community-&amp;gt;community; community-&amp;gt;internal_clear).&lt;/P&gt;&lt;P&gt;The output of the "install policy" task is&lt;/P&gt;&lt;P&gt;"Gateway: rpp27.ddns.net&lt;BR /&gt;Policy: Standard&lt;BR /&gt;Status: Failed&lt;BR /&gt;- Layer 'Network': Rule 18: "rpp27.ddns.net" Operating System is "Gaia Embedded"&lt;BR /&gt;External_clear and Internal_clear are only supported as a conditional destination on SecurePlatform, IPSO, Linux and Gaia.&lt;BR /&gt;- Policy verification failed."&lt;/P&gt;&lt;P&gt;The VPN tunnel is up, checked via the cli command "vpn tu", and I tried to set only the vpn community in the firewall rule, but the traffic don't match in that rule.&lt;/P&gt;&lt;P&gt;I want to know if there is some equivalent to directional match condition for embedded gaia appliances, or if somebody have succesfull experiencie with setting up VPN between a SMB appliance centrally managed and AWS.&lt;/P&gt;</description>
    <pubDate>Tue, 23 Nov 2021 00:06:23 GMT</pubDate>
    <dc:creator>burticio</dc:creator>
    <dc:date>2021-11-23T00:06:23Z</dc:date>
    <item>
      <title>Conditional Match Condition on SMB gateway (Embedded GAIA)</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Conditional-Match-Condition-on-SMB-gateway-Embedded-GAIA/m-p/134694#M6088</link>
      <description>&lt;P&gt;Hi!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm trying to set up a site-to-site VPN between a centrally managed SMB gateway an AWS.&lt;/P&gt;&lt;P&gt;I followed the instructions provided by AWS ( create vpn interfaces, routing, create interoperable object, create vpn community, create firewall rules) succesfully, until the last step where is asked to create a firewall rule to allow the desired traffic using&amp;nbsp; Directional Match Conditions (internal_clear-&amp;gt;community; community-&amp;gt;community; community-&amp;gt;internal_clear).&lt;/P&gt;&lt;P&gt;The output of the "install policy" task is&lt;/P&gt;&lt;P&gt;"Gateway: rpp27.ddns.net&lt;BR /&gt;Policy: Standard&lt;BR /&gt;Status: Failed&lt;BR /&gt;- Layer 'Network': Rule 18: "rpp27.ddns.net" Operating System is "Gaia Embedded"&lt;BR /&gt;External_clear and Internal_clear are only supported as a conditional destination on SecurePlatform, IPSO, Linux and Gaia.&lt;BR /&gt;- Policy verification failed."&lt;/P&gt;&lt;P&gt;The VPN tunnel is up, checked via the cli command "vpn tu", and I tried to set only the vpn community in the firewall rule, but the traffic don't match in that rule.&lt;/P&gt;&lt;P&gt;I want to know if there is some equivalent to directional match condition for embedded gaia appliances, or if somebody have succesfull experiencie with setting up VPN between a SMB appliance centrally managed and AWS.&lt;/P&gt;</description>
      <pubDate>Tue, 23 Nov 2021 00:06:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Conditional-Match-Condition-on-SMB-gateway-Embedded-GAIA/m-p/134694#M6088</guid>
      <dc:creator>burticio</dc:creator>
      <dc:date>2021-11-23T00:06:23Z</dc:date>
    </item>
    <item>
      <title>Re: Conditional Match Condition on SMB gateway (Embedded GAIA)</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Conditional-Match-Condition-on-SMB-gateway-Embedded-GAIA/m-p/134752#M6089</link>
      <description>&lt;P&gt;UPDATE:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I managed to solve it, just by not using Directional Match Conditions in the firewall rule.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 23 Nov 2021 17:00:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/Conditional-Match-Condition-on-SMB-gateway-Embedded-GAIA/m-p/134752#M6089</guid>
      <dc:creator>burticio</dc:creator>
      <dc:date>2021-11-23T17:00:55Z</dc:date>
    </item>
  </channel>
</rss>

