<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic 1500/1600 Locally Managed - IPSEC Local encryption domain in Spark Firewall (SMB)</title>
    <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/1500-1600-Locally-Managed-IPSEC-Local-encryption-domain/m-p/157562#M7433</link>
    <description>&lt;OL&gt;&lt;LI&gt;Hi,&lt;BR /&gt;I'm trying to test the following scenario in a LAB with locally managed 1500 and 1600 appliances - running R81.10.&lt;BR /&gt;&lt;BR /&gt;&lt;U&gt;&lt;STRONG&gt;POC&lt;/STRONG&gt;&lt;STRONG&gt; Requirement:&lt;/STRONG&gt;&lt;/U&gt;&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;A local encryption domain for each IPSEC (S2S) tunnel.&lt;BR /&gt;&lt;U&gt;&lt;STRONG&gt;Example:&lt;/STRONG&gt;&lt;/U&gt;&lt;BR /&gt;HQ's LAN = 192.168.88.0/24&lt;BR /&gt;&lt;U&gt;&lt;STRONG&gt;Interesting traffic:&lt;/STRONG&gt;&lt;/U&gt;&lt;BR /&gt;1. Warehouse_WMS_Server_192.168.88.22 Port: tcp/9443&lt;BR /&gt;2. Biometrics_Access_Server_192.168.88.24 Ports: rdp_33899&lt;BR /&gt;3.&amp;nbsp;HQ's LAN = 192.168.88.0/24&lt;BR /&gt;&lt;U&gt;&lt;STRONG&gt;Required rules:&lt;/STRONG&gt;&lt;/U&gt;&lt;BR /&gt;1. Delivery company must access&amp;nbsp;Warehouse_WMS_Server_192.168.88.22 Port: tcp/9443 &lt;STRONG&gt;ONLY&lt;BR /&gt;&lt;/STRONG&gt;2. Access/physical security company must access&amp;nbsp;Biometrics_Access_Server_192.168.88.24 Ports: rdp_3389 &lt;STRONG&gt;ONLY&lt;BR /&gt;&lt;/STRONG&gt;3. Remote/Branch office to have access to entire 192.168.88.0/24 network for AD, MFA, SIP/VOIP, HR, etc&lt;BR /&gt;&lt;BR /&gt;When appliance (HQ) has &lt;STRONG&gt;STANDARD&lt;/STRONG&gt; mode enabled on the firewall blade control, it auto generates:&lt;BR /&gt;&lt;STRONG&gt;Source: VPN Sites&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;Destination:Any&amp;nbsp; &amp;nbsp; &amp;nbsp;Service:Any&amp;nbsp; &amp;nbsp; &amp;nbsp;Action:Accept&amp;nbsp; &amp;nbsp; &amp;nbsp; Log:log&lt;BR /&gt;(cannot be changed)&lt;BR /&gt;&lt;/STRONG&gt;In the section "Site To Site" --&amp;gt; "Advanced" there is an option to define local encryption separately.&lt;BR /&gt;With only 192.168.88.22 and 192.168.88.24 defined therein, it means that the delivery company is able to "ping" / access the Biometrics server at 192.168.88.24 and vice versa.&lt;BR /&gt;If the entire 192.168.88.0/24 is in local encryption then it's basically "open" to all. (and so is "automatically determine local network topology")&lt;BR /&gt;&lt;BR /&gt;If, the blade control is switched to &lt;STRONG&gt;STRICT&lt;/STRONG&gt;, the "VPN Sites" object is no longer available and thus manual rules cannot be created.&lt;BR /&gt;&lt;BR /&gt;Any suggestions on how to achieve the above would be greatly appreciated.&lt;BR /&gt;I also had a look at the "NextGen" rules in SMP/Infinity - does not appear to be 'doable' there either.&lt;BR /&gt;(I hope it something simple that I'm overlooking)&amp;nbsp;&lt;span class="lia-unicode-emoji" title=":grinning_face_with_smiling_eyes:"&gt;😄&lt;/span&gt;&amp;nbsp;&lt;span class="lia-unicode-emoji" title=":grinning_face:"&gt;😀&lt;/span&gt;&lt;BR /&gt;&lt;BR /&gt;Many thanks.&lt;BR /&gt;&lt;span class="lia-unicode-emoji" title=":thumbs_up:"&gt;👍&lt;/span&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;&lt;/OL&gt;</description>
    <pubDate>Mon, 19 Sep 2022 19:52:20 GMT</pubDate>
    <dc:creator>SaxMan</dc:creator>
    <dc:date>2022-09-19T19:52:20Z</dc:date>
    <item>
      <title>1500/1600 Locally Managed - IPSEC Local encryption domain</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/1500-1600-Locally-Managed-IPSEC-Local-encryption-domain/m-p/157562#M7433</link>
      <description>&lt;OL&gt;&lt;LI&gt;Hi,&lt;BR /&gt;I'm trying to test the following scenario in a LAB with locally managed 1500 and 1600 appliances - running R81.10.&lt;BR /&gt;&lt;BR /&gt;&lt;U&gt;&lt;STRONG&gt;POC&lt;/STRONG&gt;&lt;STRONG&gt; Requirement:&lt;/STRONG&gt;&lt;/U&gt;&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;A local encryption domain for each IPSEC (S2S) tunnel.&lt;BR /&gt;&lt;U&gt;&lt;STRONG&gt;Example:&lt;/STRONG&gt;&lt;/U&gt;&lt;BR /&gt;HQ's LAN = 192.168.88.0/24&lt;BR /&gt;&lt;U&gt;&lt;STRONG&gt;Interesting traffic:&lt;/STRONG&gt;&lt;/U&gt;&lt;BR /&gt;1. Warehouse_WMS_Server_192.168.88.22 Port: tcp/9443&lt;BR /&gt;2. Biometrics_Access_Server_192.168.88.24 Ports: rdp_33899&lt;BR /&gt;3.&amp;nbsp;HQ's LAN = 192.168.88.0/24&lt;BR /&gt;&lt;U&gt;&lt;STRONG&gt;Required rules:&lt;/STRONG&gt;&lt;/U&gt;&lt;BR /&gt;1. Delivery company must access&amp;nbsp;Warehouse_WMS_Server_192.168.88.22 Port: tcp/9443 &lt;STRONG&gt;ONLY&lt;BR /&gt;&lt;/STRONG&gt;2. Access/physical security company must access&amp;nbsp;Biometrics_Access_Server_192.168.88.24 Ports: rdp_3389 &lt;STRONG&gt;ONLY&lt;BR /&gt;&lt;/STRONG&gt;3. Remote/Branch office to have access to entire 192.168.88.0/24 network for AD, MFA, SIP/VOIP, HR, etc&lt;BR /&gt;&lt;BR /&gt;When appliance (HQ) has &lt;STRONG&gt;STANDARD&lt;/STRONG&gt; mode enabled on the firewall blade control, it auto generates:&lt;BR /&gt;&lt;STRONG&gt;Source: VPN Sites&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;Destination:Any&amp;nbsp; &amp;nbsp; &amp;nbsp;Service:Any&amp;nbsp; &amp;nbsp; &amp;nbsp;Action:Accept&amp;nbsp; &amp;nbsp; &amp;nbsp; Log:log&lt;BR /&gt;(cannot be changed)&lt;BR /&gt;&lt;/STRONG&gt;In the section "Site To Site" --&amp;gt; "Advanced" there is an option to define local encryption separately.&lt;BR /&gt;With only 192.168.88.22 and 192.168.88.24 defined therein, it means that the delivery company is able to "ping" / access the Biometrics server at 192.168.88.24 and vice versa.&lt;BR /&gt;If the entire 192.168.88.0/24 is in local encryption then it's basically "open" to all. (and so is "automatically determine local network topology")&lt;BR /&gt;&lt;BR /&gt;If, the blade control is switched to &lt;STRONG&gt;STRICT&lt;/STRONG&gt;, the "VPN Sites" object is no longer available and thus manual rules cannot be created.&lt;BR /&gt;&lt;BR /&gt;Any suggestions on how to achieve the above would be greatly appreciated.&lt;BR /&gt;I also had a look at the "NextGen" rules in SMP/Infinity - does not appear to be 'doable' there either.&lt;BR /&gt;(I hope it something simple that I'm overlooking)&amp;nbsp;&lt;span class="lia-unicode-emoji" title=":grinning_face_with_smiling_eyes:"&gt;😄&lt;/span&gt;&amp;nbsp;&lt;span class="lia-unicode-emoji" title=":grinning_face:"&gt;😀&lt;/span&gt;&lt;BR /&gt;&lt;BR /&gt;Many thanks.&lt;BR /&gt;&lt;span class="lia-unicode-emoji" title=":thumbs_up:"&gt;👍&lt;/span&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/LI&gt;&lt;/OL&gt;</description>
      <pubDate>Mon, 19 Sep 2022 19:52:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/1500-1600-Locally-Managed-IPSEC-Local-encryption-domain/m-p/157562#M7433</guid>
      <dc:creator>SaxMan</dc:creator>
      <dc:date>2022-09-19T19:52:20Z</dc:date>
    </item>
    <item>
      <title>Re: 1500/1600 Locally Managed - IPSEC Local encryption domain</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/1500-1600-Locally-Managed-IPSEC-Local-encryption-domain/m-p/157629#M7437</link>
      <description>&lt;P&gt;This is beyond the scope of the SMB appliances ! You can open a SR# with CP TAC to get that confirmed.&lt;/P&gt;</description>
      <pubDate>Tue, 20 Sep 2022 11:52:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/1500-1600-Locally-Managed-IPSEC-Local-encryption-domain/m-p/157629#M7437</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2022-09-20T11:52:35Z</dc:date>
    </item>
    <item>
      <title>Re: 1500/1600 Locally Managed - IPSEC Local encryption domain</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/1500-1600-Locally-Managed-IPSEC-Local-encryption-domain/m-p/157632#M7439</link>
      <description>&lt;P&gt;Thanks a million for the feedback.&lt;BR /&gt;Let me engage my local CP Account Manager and explore the chances/possibility of applying for a RFE.&lt;BR /&gt;&lt;span class="lia-unicode-emoji" title=":thumbs_up:"&gt;👍&lt;/span&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 20 Sep 2022 12:10:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/1500-1600-Locally-Managed-IPSEC-Local-encryption-domain/m-p/157632#M7439</guid>
      <dc:creator>SaxMan</dc:creator>
      <dc:date>2022-09-20T12:10:40Z</dc:date>
    </item>
    <item>
      <title>Re: 1500/1600 Locally Managed - IPSEC Local encryption domain</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/1500-1600-Locally-Managed-IPSEC-Local-encryption-domain/m-p/157635#M7440</link>
      <description>&lt;P&gt;RFE for GAiA features on GAiA Embedded is a nice try ! I would not think that there are any hopes for fullfillment...&lt;/P&gt;</description>
      <pubDate>Tue, 20 Sep 2022 12:48:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/1500-1600-Locally-Managed-IPSEC-Local-encryption-domain/m-p/157635#M7440</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2022-09-20T12:48:41Z</dc:date>
    </item>
    <item>
      <title>Re: 1500/1600 Locally Managed - IPSEC Local encryption domain</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/1500-1600-Locally-Managed-IPSEC-Local-encryption-domain/m-p/157638#M7441</link>
      <description>&lt;P&gt;I think it'll be worth a shot?&lt;BR /&gt;'Cos if we build IPSEC tunnels (as outlined above) on the current (I get the embedded aspect) topology, could it not be seen as a risk by potential clients that we demo IPSEC to?&lt;BR /&gt;In other words: 2 different business partners connecting to their network, but cannot be separated by individual local encryption domains?&lt;BR /&gt;&lt;BR /&gt;The other option would be to build ("Non-VPN") rules:&lt;BR /&gt;Each business partner connects from their public/static IP address to the HQ's NATted IPs for the appropriate/relevant server(s).&lt;BR /&gt;(Or...servers are put in the DMZ?)&lt;BR /&gt;But, the brief/requirement (in this case) is IPSEC.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 20 Sep 2022 13:12:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/1500-1600-Locally-Managed-IPSEC-Local-encryption-domain/m-p/157638#M7441</guid>
      <dc:creator>SaxMan</dc:creator>
      <dc:date>2022-09-20T13:12:10Z</dc:date>
    </item>
    <item>
      <title>Re: 1500/1600 Locally Managed - IPSEC Local encryption domain</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/1500-1600-Locally-Managed-IPSEC-Local-encryption-domain/m-p/157641#M7442</link>
      <description>&lt;P&gt;It took very, very long until we did receive more than one VPN community in GAiA - so i think this is not very realistic...&lt;/P&gt;</description>
      <pubDate>Tue, 20 Sep 2022 13:22:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/1500-1600-Locally-Managed-IPSEC-Local-encryption-domain/m-p/157641#M7442</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2022-09-20T13:22:29Z</dc:date>
    </item>
    <item>
      <title>Re: 1500/1600 Locally Managed - IPSEC Local encryption domain</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/1500-1600-Locally-Managed-IPSEC-Local-encryption-domain/m-p/157647#M7444</link>
      <description>&lt;P&gt;For real??&amp;nbsp;&lt;span class="lia-unicode-emoji" title=":grinning_face_with_big_eyes:"&gt;😃&lt;/span&gt;&lt;BR /&gt;OK...I also asked a while back for on-prem/3rd party MFA for AD/VPN users. (SMB appliances)&lt;BR /&gt;I saw a few mentions regarding this on the "SMB Masters" webinar a few weeks back - so, I'm crossing fingers.&amp;nbsp;&lt;BR /&gt;&lt;span class="lia-unicode-emoji" title=":grinning_face:"&gt;😀&lt;/span&gt;&lt;BR /&gt;Thanks a million for your insight.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 20 Sep 2022 13:47:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/1500-1600-Locally-Managed-IPSEC-Local-encryption-domain/m-p/157647#M7444</guid>
      <dc:creator>SaxMan</dc:creator>
      <dc:date>2022-09-20T13:47:47Z</dc:date>
    </item>
  </channel>
</rss>

