<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SMB Central Management Best Practices in Spark Firewall (SMB)</title>
    <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SMB-Central-Management-Best-Practices/m-p/197447#M9754</link>
    <description>&lt;P&gt;Hello &lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/1447"&gt;@Wolfgang&lt;/a&gt;&amp;nbsp;, after establishing the SIC on the first connection, could I use a rule like the one below? Using the object that represents the SMB appliance as the source. Would this have any effect or would it make no difference?&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="rule-sms.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23106i03AB18295E13E273/image-size/large?v=v2&amp;amp;px=999" role="button" title="rule-sms.png" alt="rule-sms.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 08 Nov 2023 15:03:14 GMT</pubDate>
    <dc:creator>Bernardes</dc:creator>
    <dc:date>2023-11-08T15:03:14Z</dc:date>
    <item>
      <title>SMB Central Management Best Practices</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SMB-Central-Management-Best-Practices/m-p/197330#M9743</link>
      <description>&lt;P&gt;Dear friends,&lt;/P&gt;
&lt;P&gt;I would like to request assistance with a specific scenario. We have an environment where the customer has a Check Point cluster (26000) and an SMS (VM) in their main office.&lt;/P&gt;
&lt;P&gt;We are starting a project where several 1500 (Spark) appliances will be installed at different points of presence.&lt;/P&gt;
&lt;P&gt;These appliances need to be added to the SMS in the main office, meaning they will be configured as 'Central Management.' These appliances will be connected to the internet with dynamic IP, and the topology will look similar to the image below.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="SPARK-TOPOLOGY.drawio.png" style="width: 593px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23085i64326125A11D056F/image-size/large?v=v2&amp;amp;px=999" role="button" title="SPARK-TOPOLOGY.drawio.png" alt="SPARK-TOPOLOGY.drawio.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;My question is as follows:&lt;/P&gt;
&lt;P&gt;What is the best practice or Check Point's recommendation for this scenario?&lt;/P&gt;
&lt;P&gt;Do I need a public IP for this SMS so that the appliances can connect?&lt;/P&gt;
&lt;P&gt;Is there any Zero Touch Provisioning (ZTP) process?&lt;/P&gt;
&lt;P&gt;I haven't found any clear documentation on this. Thanks for your help in advance.&lt;/P&gt;</description>
      <pubDate>Tue, 07 Nov 2023 14:38:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SMB-Central-Management-Best-Practices/m-p/197330#M9743</guid>
      <dc:creator>Bernardes</dc:creator>
      <dc:date>2023-11-07T14:38:30Z</dc:date>
    </item>
    <item>
      <title>Re: SMB Central Management Best Practices</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SMB-Central-Management-Best-Practices/m-p/197339#M9744</link>
      <description>&lt;P&gt;&lt;A href="https://sc1.checkpoint.com/documents/SMB_R81.10.X/AdminGuides_Centrally_Managed/EN/Content/Topics/Predefining-Centrally-Managed-Deployment.htm" target="_blank"&gt;https://sc1.checkpoint.com/documents/SMB_R81.10.X/AdminGuides_Centrally_Managed/EN/Content/Topics/Predefining-Centrally-Managed-Deployment.htm&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 07 Nov 2023 16:07:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SMB-Central-Management-Best-Practices/m-p/197339#M9744</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2023-11-07T16:07:22Z</dc:date>
    </item>
    <item>
      <title>Re: SMB Central Management Best Practices</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SMB-Central-Management-Best-Practices/m-p/197348#M9746</link>
      <description>&lt;P&gt;You can use&amp;nbsp;&lt;A href="https://zerotouch.checkpoint.com/" target="_blank"&gt;https://zerotouch.checkpoint.com/&lt;/A&gt;&amp;nbsp;for first time deployment. No need to do anything on the SMB gateway. You can prepare a configuration in the zerotouch portal including connection to your on premise SMS.&amp;nbsp;&lt;BR /&gt;Follow instructions in&amp;nbsp;&lt;A title="Zero Touch Cloud Service for Check Point Appliances" href="https://support.checkpoint.com/results/sk/sk116375" target="_blank" rel="noopener"&gt;Zero Touch Cloud Service for Check Point Appliances&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;And yes, you need a public IP for your SMS which is normally NATed on your gateway tho the internal IP of your SMS.&lt;/P&gt;</description>
      <pubDate>Tue, 07 Nov 2023 19:43:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SMB-Central-Management-Best-Practices/m-p/197348#M9746</guid>
      <dc:creator>Wolfgang</dc:creator>
      <dc:date>2023-11-07T19:43:27Z</dc:date>
    </item>
    <item>
      <title>Re: SMB Central Management Best Practices</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SMB-Central-Management-Best-Practices/m-p/197369#M9748</link>
      <description>&lt;P&gt;Hello, my friend &lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/21294"&gt;@G_W_Albrecht&lt;/a&gt;&amp;nbsp;, thank you for getting back to me. I had already come across this guide, but it's not clear regarding my specific needs.&lt;/P&gt;</description>
      <pubDate>Tue, 07 Nov 2023 23:12:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SMB-Central-Management-Best-Practices/m-p/197369#M9748</guid>
      <dc:creator>Bernardes</dc:creator>
      <dc:date>2023-11-07T23:12:47Z</dc:date>
    </item>
    <item>
      <title>Re: SMB Central Management Best Practices</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SMB-Central-Management-Best-Practices/m-p/197370#M9749</link>
      <description>&lt;P&gt;Hello, my friend &lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/1447"&gt;@Wolfgang&lt;/a&gt;&amp;nbsp;, thank you for your help. So I will indeed need a public IP for the SMS, whether it's dedicated or NATed by the gateway, that was a doubt.&lt;/P&gt;
&lt;P&gt;But regardless of the option I choose, how can I ensure that only the SMB appliances are allowed to connect to the SMS, given that it now has a public IP, and the appliances have dynamic IPs, making source-based control difficult? The guide doesn't clarify this, and I couldn't find any other useful documents.&lt;/P&gt;</description>
      <pubDate>Tue, 07 Nov 2023 23:13:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SMB-Central-Management-Best-Practices/m-p/197370#M9749</guid>
      <dc:creator>Bernardes</dc:creator>
      <dc:date>2023-11-07T23:13:27Z</dc:date>
    </item>
    <item>
      <title>Re: SMB Central Management Best Practices</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SMB-Central-Management-Best-Practices/m-p/197375#M9751</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/82249"&gt;@Bernardes&lt;/a&gt;&amp;nbsp;these check is done by SIC. Connection of an unknown gateway to SMS has to be allowed to reach the SMS, but the gateway must "authenticate" to SMS via SIC. You configure a first time SIC- password on your remote gateway if you deploy this. After first connection SIC will be established and your SMS trusts your gateway, this is the same way how it works with your existing gateways. For you're gateways with dynamic IPs you can't filter based on IP addresses because they are unknown, you need some more "authentication". That's what's down via SIC.&lt;/P&gt;
&lt;P&gt;&lt;A title="Secure Internal Communication (SIC)" href="https://sc1.checkpoint.com/documents/R81.20/WebAdminGuides/EN/CP_R81.20_SecurityManagement_AdminGuide/Content/Topics-SECMG/Secure-Internal-Communication.htm" target="_blank" rel="noopener"&gt;Secure Internal Communication (SIC)&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 08 Nov 2023 06:23:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SMB-Central-Management-Best-Practices/m-p/197375#M9751</guid>
      <dc:creator>Wolfgang</dc:creator>
      <dc:date>2023-11-08T06:23:21Z</dc:date>
    </item>
    <item>
      <title>Re: SMB Central Management Best Practices</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SMB-Central-Management-Best-Practices/m-p/197377#M9752</link>
      <description>&lt;P&gt;Geo based enforcement could be a potential option to explore if you must restrict this somewhat.&lt;/P&gt;
&lt;P&gt;There are examples shared previously here as relevant to VPN and implied rule enforcement that bare some similarities.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 08 Nov 2023 06:32:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SMB-Central-Management-Best-Practices/m-p/197377#M9752</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2023-11-08T06:32:05Z</dc:date>
    </item>
    <item>
      <title>Re: SMB Central Management Best Practices</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SMB-Central-Management-Best-Practices/m-p/197447#M9754</link>
      <description>&lt;P&gt;Hello &lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/1447"&gt;@Wolfgang&lt;/a&gt;&amp;nbsp;, after establishing the SIC on the first connection, could I use a rule like the one below? Using the object that represents the SMB appliance as the source. Would this have any effect or would it make no difference?&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="rule-sms.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23106i03AB18295E13E273/image-size/large?v=v2&amp;amp;px=999" role="button" title="rule-sms.png" alt="rule-sms.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 08 Nov 2023 15:03:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SMB-Central-Management-Best-Practices/m-p/197447#M9754</guid>
      <dc:creator>Bernardes</dc:creator>
      <dc:date>2023-11-08T15:03:14Z</dc:date>
    </item>
    <item>
      <title>Re: SMB Central Management Best Practices</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SMB-Central-Management-Best-Practices/m-p/197451#M9755</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/82249"&gt;@Bernardes&lt;/a&gt;&amp;nbsp;if you use the defaults ther's no need for such a rule. Control connections are allowed via global properties.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-left" image-alt="2023-11-08 16_06_43-Global Properties.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23107i9D65C0F6695A884B/image-size/medium?v=v2&amp;amp;px=400" role="button" title="2023-11-08 16_06_43-Global Properties.png" alt="2023-11-08 16_06_43-Global Properties.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 08 Nov 2023 15:23:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SMB-Central-Management-Best-Practices/m-p/197451#M9755</guid>
      <dc:creator>Wolfgang</dc:creator>
      <dc:date>2023-11-08T15:23:52Z</dc:date>
    </item>
    <item>
      <title>Re: SMB Central Management Best Practices</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SMB-Central-Management-Best-Practices/m-p/197505#M9758</link>
      <description>&lt;P&gt;Hello &lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/1447"&gt;@Wolfgang&lt;/a&gt;&amp;nbsp;, I understand. Is there any other document besides the guide that provides more information about the deployment or that contains information regarding the public IP and control connections for SMB with Central Management?&lt;/P&gt;</description>
      <pubDate>Wed, 08 Nov 2023 21:17:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SMB-Central-Management-Best-Practices/m-p/197505#M9758</guid>
      <dc:creator>Bernardes</dc:creator>
      <dc:date>2023-11-08T21:17:24Z</dc:date>
    </item>
    <item>
      <title>Re: SMB Central Management Best Practices</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SMB-Central-Management-Best-Practices/m-p/197538#M9760</link>
      <description>&lt;P&gt;I think&amp;nbsp;&lt;A title="Dynamically Assigned IP Address (DAIP) Gateway FAQ" href="https://support.checkpoint.com/results/sk/sk167473" target="_blank" rel="noopener"&gt;Dynamically Assigned IP Address (DAIP) Gateway FAQ&lt;/A&gt;&amp;nbsp;answer your questions.&lt;/P&gt;</description>
      <pubDate>Thu, 09 Nov 2023 05:35:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SMB-Central-Management-Best-Practices/m-p/197538#M9760</guid>
      <dc:creator>Wolfgang</dc:creator>
      <dc:date>2023-11-09T05:35:02Z</dc:date>
    </item>
    <item>
      <title>Re: SMB Central Management Best Practices</title>
      <link>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SMB-Central-Management-Best-Practices/m-p/197585#M9762</link>
      <description>&lt;P&gt;Hello, thank you very much for your help! I believe I now have the necessary information to start the deployment.&lt;/P&gt;</description>
      <pubDate>Thu, 09 Nov 2023 12:43:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Spark-Firewall-SMB/SMB-Central-Management-Best-Practices/m-p/197585#M9762</guid>
      <dc:creator>Bernardes</dc:creator>
      <dc:date>2023-11-09T12:43:51Z</dc:date>
    </item>
  </channel>
</rss>

