- Products
- Learn
- Local User Groups
- Partners
- More
Firewall Uptime, Reimagined
How AIOps Simplifies Operations and Prevents Outages
Introduction to Lakera:
Securing the AI Frontier!
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
SharePoint CVEs and More!
Hi
I need to exclude some traffic from VPN, I went through sk98241 also read some posts on checkmates but to make sure (will be configuring for the first time). The scenario is , I have 3 remote VPN sites :
site1=192.168.1.0/24
site2=192.168.2.0/24
site3=192.168.3.0/24
and SMS in the cloud
I have SCCM GW in the cloud with IP 1.2.3.4, that's the traffic that I want to exclude from VPN and send it dierctly from hosts in VPN domain to SCCM GW 1.2.3.4, the changes in crypt.def On SMS in the cloud should be looking in this way ?:
#ifndef IPV6_FLAVOR
#define NON_VPN_TRAFFIC_RULES (dst=1.2.3.4)
#else
#ifndef NON_VPN_TRAFFIC_RULES 0
#endif
#endif
OR only for specified VPN 2 subnets
all@site1 vpn_exclude={192.168.1.1,192.168.1.255};
all@site2 vpn_exclude={192.168.2.1,192.168.2.255};
#define NON_VPN_TRAFFIC_RULES ((src vpn_exclude) and (dst=1.2.3.4))
Pushing Policy on SMS
I this Ok ? Also is there anything else that has to be done ?
thank you
This is from sk108600. Let me see if I can find a file that customer modified ages ago and it worked fine, maybe I can send you the example.
Andy
Find this line:
#define NON_VPN_TRAFFIC_RULESYou should see the following lines:
#ifndef NON_VPN_TRAFFIC_RULES #define NON_VPN_TRAFFIC_RULES 0 #endif
Modify the middle line:
from this single line:
#define NON_VPN_TRAFFIC_RULES 0
to these lines:
#ifndef IPV6_FLAVOR #define NON_VPN_TRAFFIC_RULES (dst=Destination_IPv4_address,dport=Destination_Port)The Destination_IPv4_address is the IPv4 address of the remote peer, which should be excluded from the Gateway's remote encryption domain.
#else
#define NON_VPN_TRAFFIC_RULES 0
#endif
#ifndef IPV6_FLAVOR #define NON_VPN_TRAFFIC_RULES (dst=Destination_IPv4_address_1 or dst=Destination_IPv4_address_2) #else #define NON_VPN_TRAFFIC_RULES 0 #endifThe Destination_IPv4_address is the IPv4 address of the remote peer, which should be excluded from the Gateway's remote encryption domain.
#ifndef IPV6_FLAVOR #define NON_VPN_TRAFFIC_RULES 0 #else #define NON_VPN_TRAFFIC_RULES (dst=Destination_IPv6_address,dport=Destination_Port) #endifThe Destination_IPv6_address is the IPv6 address of the remote peer, which should be excluded from the Gateway's remote encryption domain.
#ifndef IPV6_FLAVOR #define NON_VPN_TRAFFIC_RULES (dst=Destination_IPv4_address,dport=Destination_Port) #else #define NON_VPN_TRAFFIC_RULES (dst=Destination_IPv6_address,dport=Destination_Port) #endifThe Destination_IPv4_address is the IPv4 address of the remote peer, which should be excluded from the Gateway's remote encryption domain.
The Destination_IPv6_address is the IPv6 address of the remote peer, which should be excluded from the Gateway's remote encryption domain.
On surface, that looks right to me. By the way, IF syntax is wrong, you would see it for sure when pushing the policy, as it would error out 100% and tell you exactly what its complaining about.
thanks for reply , I suppose you mean this line
#ifndef NON_VPN_TRAFFIC_RULES 0
instead of #define NON_VPN_TRAFFIC_RULES 0
also this one should be fixed
#ifndef IPV6_FLAVOR
to #ifdef IPV6_FLAVOR
This is from sk108600. Let me see if I can find a file that customer modified ages ago and it worked fine, maybe I can send you the example.
Andy
Find this line:
#define NON_VPN_TRAFFIC_RULESYou should see the following lines:
#ifndef NON_VPN_TRAFFIC_RULES #define NON_VPN_TRAFFIC_RULES 0 #endif
Modify the middle line:
from this single line:
#define NON_VPN_TRAFFIC_RULES 0
to these lines:
#ifndef IPV6_FLAVOR #define NON_VPN_TRAFFIC_RULES (dst=Destination_IPv4_address,dport=Destination_Port)The Destination_IPv4_address is the IPv4 address of the remote peer, which should be excluded from the Gateway's remote encryption domain.
#else
#define NON_VPN_TRAFFIC_RULES 0
#endif
#ifndef IPV6_FLAVOR #define NON_VPN_TRAFFIC_RULES (dst=Destination_IPv4_address_1 or dst=Destination_IPv4_address_2) #else #define NON_VPN_TRAFFIC_RULES 0 #endifThe Destination_IPv4_address is the IPv4 address of the remote peer, which should be excluded from the Gateway's remote encryption domain.
#ifndef IPV6_FLAVOR #define NON_VPN_TRAFFIC_RULES 0 #else #define NON_VPN_TRAFFIC_RULES (dst=Destination_IPv6_address,dport=Destination_Port) #endifThe Destination_IPv6_address is the IPv6 address of the remote peer, which should be excluded from the Gateway's remote encryption domain.
#ifndef IPV6_FLAVOR #define NON_VPN_TRAFFIC_RULES (dst=Destination_IPv4_address,dport=Destination_Port) #else #define NON_VPN_TRAFFIC_RULES (dst=Destination_IPv6_address,dport=Destination_Port) #endifThe Destination_IPv4_address is the IPv4 address of the remote peer, which should be excluded from the Gateway's remote encryption domain.
The Destination_IPv6_address is the IPv6 address of the remote peer, which should be excluded from the Gateway's remote encryption domain.
thank you very much sir I won't find better explanation 🙂 cheers
Its not an issue, as that company switched to another vendor 5 years ago or so, so if I can find that file, no harm in sending it, all good.
I dont sadly have the file itself, but, I found an email from ages ago where TAC told them to follow this example on that line:
#define NON_VPN_TRAFFIC_RULES ((src=x.x.x.x or dst=y.y.y.y) and (src=x.x.x.x and dst=y.y.y.y) or ))
Just MAKE SURE whatever you do, save the original copy by doing cd $FWDIR/lib and then cp crypt.def crypt.def.ORIGINAL
That way, if anything gets f-ed up, you can revert back easily.
of course backup will be done, however I am going to configure this in the lab first to check and minimize losses 😉
Yes sir Marcin, 100% always an excellent idea.
Also, below link may help as well.
Anyone know what the @ symbol does? Does all mean "all interfaces"? Can you write it like eth1@east-fw ? Not seeing documentation on it like in sk113112.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
User | Count |
---|---|
12 | |
12 | |
10 | |
7 | |
6 | |
6 | |
5 | |
5 | |
5 | |
5 |
Tue 07 Oct 2025 @ 10:00 AM (CEST)
Cloud Architect Series: AI-Powered API Security with CloudGuard WAFThu 09 Oct 2025 @ 10:00 AM (CEST)
CheckMates Live BeLux: Discover How to Stop Data Leaks in GenAI Tools: Live Demo You Can’t Miss!Thu 09 Oct 2025 @ 10:00 AM (CEST)
CheckMates Live BeLux: Discover How to Stop Data Leaks in GenAI Tools: Live Demo You Can’t Miss!Wed 22 Oct 2025 @ 11:00 AM (EDT)
Firewall Uptime, Reimagined: How AIOps Simplifies Operations and Prevents OutagesAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY