<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: 1800 SMB devices and site to site VPN in Spark Firewall (SMB)</title>
    <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/1800-SMB-devices-and-site-to-site-VPN/m-p/162365#M7791</link>
    <description>&lt;P&gt;R81.10.00&lt;/P&gt;</description>
    <pubDate>Thu, 17 Nov 2022 13:48:13 GMT</pubDate>
    <dc:creator>Dafna</dc:creator>
    <dc:date>2022-11-17T13:48:13Z</dc:date>
    <item>
      <title>1800 SMB devices and site to site VPN</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/1800-SMB-devices-and-site-to-site-VPN/m-p/162307#M7779</link>
      <description>&lt;P&gt;&lt;SPAN&gt;I have a customer that has 4 1800 SMB appliances&amp;nbsp; which is integrated with their existing Enterprise management software. They have 4 gws with site to site VPN configured.Recently,they have been facing alot of issues with their VPN connection&amp;nbsp; after they migrated to the new appliances. I&amp;nbsp; had raised several cases with checkpoint support and they have not been able to pin point the issue as well. It just works sometimes and then it stops working(Usually after policy installation).&amp;nbsp; Checkpoint TAC support has not been able to solve the issue after countless escalation of the cases aswell. After hours of troubleshooting it just starts to work again and then we dont make changes to the gws anymore. We have done a VPN debug aswell but it has not proved fruitful.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;When the gws first started to show errors with VPN i did the following to solve it:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;1.Followed sk102712 to make the change about firewalls&lt;BR /&gt;2. on the firewall side, changed $FWDIR/conf/masters&lt;BR /&gt;&amp;nbsp; &amp;nbsp;with management IP address&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;The two steps above solved my VPN issue for awhile. After a few months, although the symptoms of the VPN issue was the same, the above steps didnt help me at all. So the only immediate solution for me was to make one of the gws(downtime cannot be tolerated during office hours) in standalone mode.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;The customer has been complaining that he wants the standalone gw to be integrated to the management aswell so last night when i tried to install the policy, it fails midway. Funny thing is that, policy is installed(Access policy only)VPN is up,i can ping the management server's ip address from the gw and all the internal services but in the smart console it shows "connection is lost"for that specific gw, although i can ping,etc to the management server from that gw. I cant make further changes to the gw.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Note that the policy is any any accept.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;So i read an SK on r81.10.x and SMB devices are supposed to work like a enterprise gateway as it inherits the code base from r81.10 GA version from enterprise appliances. So, will upgrading my management software and the gws to R81.10 help me solve this issue? Because all the configuration on the management server was working fine with the 4000 series appliances.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Would highly appreciate it if a SMB specialist could advice me on this.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 17 Nov 2022 06:23:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/1800-SMB-devices-and-site-to-site-VPN/m-p/162307#M7779</guid>
      <dc:creator>Nima_Chogyal</dc:creator>
      <dc:date>2022-11-17T06:23:33Z</dc:date>
    </item>
    <item>
      <title>Re: 1800 SMB devices and site to site VPN</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/1800-SMB-devices-and-site-to-site-VPN/m-p/162314#M7784</link>
      <description>&lt;P&gt;&amp;nbsp;Many things are different with SMB, so it could well be that the same config had worked well with 4000.&lt;/P&gt;</description>
      <pubDate>Thu, 17 Nov 2022 07:57:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/1800-SMB-devices-and-site-to-site-VPN/m-p/162314#M7784</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2022-11-17T07:57:16Z</dc:date>
    </item>
    <item>
      <title>Re: 1800 SMB devices and site to site VPN</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/1800-SMB-devices-and-site-to-site-VPN/m-p/162338#M7786</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;My name is Dafna, I'm a team leader in the SMB area.&lt;/P&gt;
&lt;P&gt;R81.10 is now available for EA. You can join our EA and upgrade your GW to R81.10.&lt;/P&gt;
&lt;P&gt;R81.10 contains many fixes which are relevant for VPN.&lt;/P&gt;
&lt;P&gt;Please contact me via mail to continue the process.&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;&amp;nbsp; Dafna &lt;A href="mailto:dafnam@checkpoint," target="_blank"&gt;dafnam@checkpoint,com&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp;Dafna&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 17 Nov 2022 11:35:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/1800-SMB-devices-and-site-to-site-VPN/m-p/162338#M7786</guid>
      <dc:creator>Dafna</dc:creator>
      <dc:date>2022-11-17T11:35:10Z</dc:date>
    </item>
    <item>
      <title>Re: 1800 SMB devices and site to site VPN</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/1800-SMB-devices-and-site-to-site-VPN/m-p/162347#M7789</link>
      <description>&lt;P&gt;You speak of R81.10.05 for centrally managed appliances ?&lt;/P&gt;</description>
      <pubDate>Thu, 17 Nov 2022 12:02:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/1800-SMB-devices-and-site-to-site-VPN/m-p/162347#M7789</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2022-11-17T12:02:17Z</dc:date>
    </item>
    <item>
      <title>Re: 1800 SMB devices and site to site VPN</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/1800-SMB-devices-and-site-to-site-VPN/m-p/162365#M7791</link>
      <description>&lt;P&gt;R81.10.00&lt;/P&gt;</description>
      <pubDate>Thu, 17 Nov 2022 13:48:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/1800-SMB-devices-and-site-to-site-VPN/m-p/162365#M7791</guid>
      <dc:creator>Dafna</dc:creator>
      <dc:date>2022-11-17T13:48:13Z</dc:date>
    </item>
    <item>
      <title>Re: 1800 SMB devices and site to site VPN</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/1800-SMB-devices-and-site-to-site-VPN/m-p/162369#M7793</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;Without some more details i am not sure what can be wrong exactly, some captures, logs, drops would be needed. Just guessing, try to the fw ctl zdebug drop filtering by the peer public ip address, check if you have drops like these:&lt;/P&gt;
&lt;P&gt;dropped by fw_ipsec_encrypt_on_tunnel_instance Reason: No error - tunnel is not yet established;&lt;/P&gt;
&lt;P&gt;If you see that try excluding IPsec, Ike and NAT-T services from encryption in your vpn community object. In a past case for a 1800 centrally managed (like yours) vpn had outages from time to time, during the problem the firewall tried to encrypt the negotiation traffic, TAC could not explain why but the exclusion solved the problem.&amp;nbsp;HTH.&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;</description>
      <pubDate>Thu, 17 Nov 2022 14:35:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/1800-SMB-devices-and-site-to-site-VPN/m-p/162369#M7793</guid>
      <dc:creator>RS_Daniel</dc:creator>
      <dc:date>2022-11-17T14:35:57Z</dc:date>
    </item>
    <item>
      <title>Re: 1800 SMB devices and site to site VPN</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/1800-SMB-devices-and-site-to-site-VPN/m-p/162370#M7794</link>
      <description>&lt;P&gt;Dear Daniel,&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Once i push the policy to the gws, all the gws lose connection to the management server and i cant make any more changes to it. I have to literally remove ike SA's from the gws and unload the policy to make it reachable. Is there a SK that i could use to exclude NAT-T and ike services from encryption?&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 17 Nov 2022 14:48:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/1800-SMB-devices-and-site-to-site-VPN/m-p/162370#M7794</guid>
      <dc:creator>Nima_Chogyal</dc:creator>
      <dc:date>2022-11-17T14:48:23Z</dc:date>
    </item>
    <item>
      <title>Re: 1800 SMB devices and site to site VPN</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/1800-SMB-devices-and-site-to-site-VPN/m-p/162371#M7795</link>
      <description>&lt;P&gt;Hi Dafna,&lt;/P&gt;&lt;P&gt;I will send you an email to join the EA program. Thank you very much.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;regards,&lt;/P&gt;&lt;P&gt;Nima&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 17 Nov 2022 14:53:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/1800-SMB-devices-and-site-to-site-VPN/m-p/162371#M7795</guid>
      <dc:creator>Nima_Chogyal</dc:creator>
      <dc:date>2022-11-17T14:53:09Z</dc:date>
    </item>
    <item>
      <title>Re: 1800 SMB devices and site to site VPN</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/1800-SMB-devices-and-site-to-site-VPN/m-p/162375#M7796</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;To exclude services from encryption configure the vpn community as per the image below:&lt;/P&gt;
&lt;P&gt;I think you lose connection between the management and the gateways because of the vpn problem. I usually exclude the public IP address of all the gateways from encryption so management does not need the vpn to be up. To do this, edit the&amp;nbsp;&lt;SPAN class="SearchHighlight SearchHighlight1"&gt;crypt.def file&lt;/SPAN&gt; adding all the public ip address from gateways as dst, you can check&amp;nbsp;&lt;SPAN&gt;sk108600 scenario 3 for reference, it would see something like this:&lt;/SPAN&gt;&lt;/P&gt;
&lt;PRE&gt;&lt;EM&gt;#ifndef IPV6_FLAVOR
#define NON_VPN_TRAFFIC_RULES (&lt;BR /&gt;dst=Destination_IPv4_address_1 or \&lt;BR /&gt;dst=Destination_IPv4_address_2 or \&lt;BR /&gt;dst=Destination_IPv4_address_3 or \&lt;BR /&gt;dst=Destination_IPv4_address_4 \&lt;BR /&gt;)
#else
#define NON_VPN_TRAFFIC_RULES 0
#endif&lt;/EM&gt;&lt;/PRE&gt;
&lt;P&gt;The correct crypt.def file depends on the version of management an gateways, for example for a R81.10 management and 1800 gateways, the file is&amp;nbsp;&lt;SPAN&gt;/opt/CPSFWR80CMP-&lt;/SPAN&gt;&lt;SPAN class="mc-variable Book_Variables_Common.tp_cpversion variable"&gt;R81.10&lt;/SPAN&gt;&lt;SPAN&gt;/lib/&lt;/SPAN&gt;&lt;SPAN class="SearchHighlight SearchHighlight1"&gt;crypt.def, you can check the admin guide of management for reference.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="SearchHighlight SearchHighlight1"&gt;&lt;A href="https://sc1.checkpoint.com/documents/R81.10/WebAdminGuides/EN/CP_R81.10_SecurityManagement_AdminGuide/Topics-SECMG/Configuring_Implied_Rules_or_Kernel_Tables_for_Security_Gateways_crypt.def.htm?Highlight=crypt.def" target="_blank" rel="noopener"&gt;https://sc1.checkpoint.com/documents/R81.10/WebAdminGuides/EN/CP_R81.10_SecurityManagement_AdminGuide/Topics-SECMG/Configuring_Implied_Rules_or_Kernel_Tables_for_Security_Gateways_crypt.def.htm?Highlight=crypt.def&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="SearchHighlight SearchHighlight1"&gt;Regards&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 17 Nov 2022 15:16:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/1800-SMB-devices-and-site-to-site-VPN/m-p/162375#M7796</guid>
      <dc:creator>RS_Daniel</dc:creator>
      <dc:date>2022-11-17T15:16:12Z</dc:date>
    </item>
    <item>
      <title>Re: 1800 SMB devices and site to site VPN</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/1800-SMB-devices-and-site-to-site-VPN/m-p/162379#M7797</link>
      <description>&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Exclusion.jpg" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/18452i01CD04EDD0F5904C/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Exclusion.jpg" alt="Exclusion.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 17 Nov 2022 15:18:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/1800-SMB-devices-and-site-to-site-VPN/m-p/162379#M7797</guid>
      <dc:creator>RS_Daniel</dc:creator>
      <dc:date>2022-11-17T15:18:12Z</dc:date>
    </item>
  </channel>
</rss>

