<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic S2S with PPPoE in Spark Firewall (SMB)</title>
    <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/S2S-with-PPPoE/m-p/157136#M7388</link>
    <description>&lt;P&gt;I welcome colleagues.&lt;BR /&gt;Please help with a solution. I am building a vpn tunnel with a remote gateway 1530, which is connected by the same management server.&lt;BR /&gt;The WAN external interface works via PPPoE using the provider's login and password, receiving a dynamic address.&lt;BR /&gt;In the settings of the smart console, I set up a dynamic address on the WAN interface, in the Link Selection I configure setting resolve by dns name, but the traffic does not enter the tunnel. I renew the vpn certificate by adding alternative names to it, the situation did not help.&lt;BR /&gt;By setting a static address, I get the error: Main Mode local machine configured not to respond to unknown IP addresses (i.e. not exportable for SR, and/or not included in the RemoteAccess community, and/or no DAIP's defined).&lt;BR /&gt;How should the tunnel be built in this case? What exactly to do in Link Selection?&lt;/P&gt;</description>
    <pubDate>Tue, 13 Sep 2022 11:48:31 GMT</pubDate>
    <dc:creator>GA</dc:creator>
    <dc:date>2022-09-13T11:48:31Z</dc:date>
    <item>
      <title>S2S with PPPoE</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/S2S-with-PPPoE/m-p/157136#M7388</link>
      <description>&lt;P&gt;I welcome colleagues.&lt;BR /&gt;Please help with a solution. I am building a vpn tunnel with a remote gateway 1530, which is connected by the same management server.&lt;BR /&gt;The WAN external interface works via PPPoE using the provider's login and password, receiving a dynamic address.&lt;BR /&gt;In the settings of the smart console, I set up a dynamic address on the WAN interface, in the Link Selection I configure setting resolve by dns name, but the traffic does not enter the tunnel. I renew the vpn certificate by adding alternative names to it, the situation did not help.&lt;BR /&gt;By setting a static address, I get the error: Main Mode local machine configured not to respond to unknown IP addresses (i.e. not exportable for SR, and/or not included in the RemoteAccess community, and/or no DAIP's defined).&lt;BR /&gt;How should the tunnel be built in this case? What exactly to do in Link Selection?&lt;/P&gt;</description>
      <pubDate>Tue, 13 Sep 2022 11:48:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/S2S-with-PPPoE/m-p/157136#M7388</guid>
      <dc:creator>GA</dc:creator>
      <dc:date>2022-09-13T11:48:31Z</dc:date>
    </item>
    <item>
      <title>Re: S2S with PPPoE</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/S2S-with-PPPoE/m-p/157140#M7389</link>
      <description>&lt;P&gt;Please provide more details - we know one peer is a 1530 (firmware version ?) with DAIP managed by a CP SMS (version / jumbo take ?), but you give no details of the peer !&lt;/P&gt;
&lt;P&gt;Please look into&amp;nbsp;&lt;A class="cp_link sc_ellipsis" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk117713&amp;amp;partition=Advanced&amp;amp;product=Quantum" target="_blank" rel="noopener"&gt;sk117713: "Main Mode local machine configured not to respond to unknown IP addresses" error on locally managed &lt;STRONG&gt;SMB&lt;/STRONG&gt; appliance&lt;/A&gt;&amp;nbsp;and&amp;nbsp;&lt;A class="cp_link sc_ellipsis" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk167473&amp;amp;partition=Advanced&amp;amp;product=Quantum" target="_blank"&gt;sk167473: Dynamically Assigned IP Address (&lt;STRONG&gt;DAIP&lt;/STRONG&gt;) Gateway FAQ&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 13 Sep 2022 12:22:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/S2S-with-PPPoE/m-p/157140#M7389</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2022-09-13T12:22:08Z</dc:date>
    </item>
    <item>
      <title>Re: S2S with PPPoE</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/S2S-with-PPPoE/m-p/157142#M7390</link>
      <description>&lt;P&gt;Hi Albrecht.&lt;BR /&gt;Thanks for your reply.&lt;BR /&gt;SMB version 80.20.35, I don't remember the exact build.&lt;BR /&gt;Management server 81.10 latest take. I have seen these articles and none of them helped.&lt;BR /&gt;I've tried using just the domain name, fqdn, as written there, but that doesn't help. Tunnel traffic is sent to the Internet.&lt;/P&gt;</description>
      <pubDate>Tue, 13 Sep 2022 12:25:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/S2S-with-PPPoE/m-p/157142#M7390</guid>
      <dc:creator>GA</dc:creator>
      <dc:date>2022-09-13T12:25:28Z</dc:date>
    </item>
    <item>
      <title>Re: S2S with PPPoE</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/S2S-with-PPPoE/m-p/157143#M7391</link>
      <description>&lt;P&gt;&lt;SPAN&gt;80.20.35 is rather old, current version is R80.20.50.&amp;nbsp;Still you do not mention the peer ! The SMB GW using DAIP has to start the VPN tunnel - sometimes, NAT-T has to be activated manually. see&amp;nbsp;sk162472.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 13 Sep 2022 12:32:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/S2S-with-PPPoE/m-p/157143#M7391</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2022-09-13T12:32:03Z</dc:date>
    </item>
    <item>
      <title>Re: S2S with PPPoE</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/S2S-with-PPPoE/m-p/157146#M7392</link>
      <description>&lt;P&gt;Peer 81.10 last take.&lt;BR /&gt;And where does traversal nat come in if both peers are connected directly to the provider?&lt;/P&gt;</description>
      <pubDate>Tue, 13 Sep 2022 12:39:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/S2S-with-PPPoE/m-p/157146#M7392</guid>
      <dc:creator>GA</dc:creator>
      <dc:date>2022-09-13T12:39:19Z</dc:date>
    </item>
    <item>
      <title>Re: S2S with PPPoE</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/S2S-with-PPPoE/m-p/157153#M7393</link>
      <description>&lt;P&gt;It does only come in if the VPN fails ! Better contact TAC to get this resolved quickly...&lt;/P&gt;</description>
      <pubDate>Tue, 13 Sep 2022 12:56:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/S2S-with-PPPoE/m-p/157153#M7393</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2022-09-13T12:56:01Z</dc:date>
    </item>
  </channel>
</rss>

