- Products
- Learn
- Local User Groups
- Partners
- More
Policy Insights and Policy Auditor in Action
19 November @ 5pm CET / 11am ET
Access Control and Threat Prevention Best Practices
Watch HereOverlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
Hi
I need to exclude some traffic from VPN, I went through sk98241 also read some posts on checkmates but to make sure (will be configuring for the first time). The scenario is , I have 3 remote VPN sites :
site1=192.168.1.0/24
site2=192.168.2.0/24
site3=192.168.3.0/24
and SMS in the cloud
I have SCCM GW in the cloud with IP 1.2.3.4, that's the traffic that I want to exclude from VPN and send it dierctly from hosts in VPN domain to SCCM GW 1.2.3.4, the changes in crypt.def On SMS in the cloud should be looking in this way ?:
#ifndef IPV6_FLAVOR
#define NON_VPN_TRAFFIC_RULES (dst=1.2.3.4)
#else
#ifndef NON_VPN_TRAFFIC_RULES 0
#endif
#endif
OR only for specified VPN 2 subnets
all@site1 vpn_exclude={192.168.1.1,192.168.1.255};
all@site2 vpn_exclude={192.168.2.1,192.168.2.255};
#define NON_VPN_TRAFFIC_RULES ((src vpn_exclude) and (dst=1.2.3.4))
Pushing Policy on SMS
I this Ok ? Also is there anything else that has to be done ?
thank you
This is from sk108600. Let me see if I can find a file that customer modified ages ago and it worked fine, maybe I can send you the example.
Andy
Find this line:
#define NON_VPN_TRAFFIC_RULESYou should see the following lines:
#ifndef NON_VPN_TRAFFIC_RULES #define NON_VPN_TRAFFIC_RULES 0 #endif
Modify the middle line:
from this single line:
#define NON_VPN_TRAFFIC_RULES 0
to these lines:
#ifndef IPV6_FLAVOR #define NON_VPN_TRAFFIC_RULES (dst=Destination_IPv4_address,dport=Destination_Port)The Destination_IPv4_address is the IPv4 address of the remote peer, which should be excluded from the Gateway's remote encryption domain.
#else
#define NON_VPN_TRAFFIC_RULES 0
#endif
#ifndef IPV6_FLAVOR #define NON_VPN_TRAFFIC_RULES (dst=Destination_IPv4_address_1 or dst=Destination_IPv4_address_2) #else #define NON_VPN_TRAFFIC_RULES 0 #endifThe Destination_IPv4_address is the IPv4 address of the remote peer, which should be excluded from the Gateway's remote encryption domain.
#ifndef IPV6_FLAVOR #define NON_VPN_TRAFFIC_RULES 0 #else #define NON_VPN_TRAFFIC_RULES (dst=Destination_IPv6_address,dport=Destination_Port) #endifThe Destination_IPv6_address is the IPv6 address of the remote peer, which should be excluded from the Gateway's remote encryption domain.
#ifndef IPV6_FLAVOR #define NON_VPN_TRAFFIC_RULES (dst=Destination_IPv4_address,dport=Destination_Port) #else #define NON_VPN_TRAFFIC_RULES (dst=Destination_IPv6_address,dport=Destination_Port) #endifThe Destination_IPv4_address is the IPv4 address of the remote peer, which should be excluded from the Gateway's remote encryption domain.
The Destination_IPv6_address is the IPv6 address of the remote peer, which should be excluded from the Gateway's remote encryption domain.
On surface, that looks right to me. By the way, IF syntax is wrong, you would see it for sure when pushing the policy, as it would error out 100% and tell you exactly what its complaining about.
thanks for reply , I suppose you mean this line
#ifndef NON_VPN_TRAFFIC_RULES 0
instead of #define NON_VPN_TRAFFIC_RULES 0
also this one should be fixed
#ifndef IPV6_FLAVOR
to #ifdef IPV6_FLAVOR
This is from sk108600. Let me see if I can find a file that customer modified ages ago and it worked fine, maybe I can send you the example.
Andy
Find this line:
#define NON_VPN_TRAFFIC_RULESYou should see the following lines:
#ifndef NON_VPN_TRAFFIC_RULES #define NON_VPN_TRAFFIC_RULES 0 #endif
Modify the middle line:
from this single line:
#define NON_VPN_TRAFFIC_RULES 0
to these lines:
#ifndef IPV6_FLAVOR #define NON_VPN_TRAFFIC_RULES (dst=Destination_IPv4_address,dport=Destination_Port)The Destination_IPv4_address is the IPv4 address of the remote peer, which should be excluded from the Gateway's remote encryption domain.
#else
#define NON_VPN_TRAFFIC_RULES 0
#endif
#ifndef IPV6_FLAVOR #define NON_VPN_TRAFFIC_RULES (dst=Destination_IPv4_address_1 or dst=Destination_IPv4_address_2) #else #define NON_VPN_TRAFFIC_RULES 0 #endifThe Destination_IPv4_address is the IPv4 address of the remote peer, which should be excluded from the Gateway's remote encryption domain.
#ifndef IPV6_FLAVOR #define NON_VPN_TRAFFIC_RULES 0 #else #define NON_VPN_TRAFFIC_RULES (dst=Destination_IPv6_address,dport=Destination_Port) #endifThe Destination_IPv6_address is the IPv6 address of the remote peer, which should be excluded from the Gateway's remote encryption domain.
#ifndef IPV6_FLAVOR #define NON_VPN_TRAFFIC_RULES (dst=Destination_IPv4_address,dport=Destination_Port) #else #define NON_VPN_TRAFFIC_RULES (dst=Destination_IPv6_address,dport=Destination_Port) #endifThe Destination_IPv4_address is the IPv4 address of the remote peer, which should be excluded from the Gateway's remote encryption domain.
The Destination_IPv6_address is the IPv6 address of the remote peer, which should be excluded from the Gateway's remote encryption domain.
thank you very much sir I won't find better explanation 🙂 cheers
Its not an issue, as that company switched to another vendor 5 years ago or so, so if I can find that file, no harm in sending it, all good.
I dont sadly have the file itself, but, I found an email from ages ago where TAC told them to follow this example on that line:
#define NON_VPN_TRAFFIC_RULES ((src=x.x.x.x or dst=y.y.y.y) and (src=x.x.x.x and dst=y.y.y.y) or ))
Just MAKE SURE whatever you do, save the original copy by doing cd $FWDIR/lib and then cp crypt.def crypt.def.ORIGINAL
That way, if anything gets f-ed up, you can revert back easily.
of course backup will be done, however I am going to configure this in the lab first to check and minimize losses 😉
Yes sir Marcin, 100% always an excellent idea.
Also, below link may help as well.
Anyone know what the @ symbol does? Does all mean "all interfaces"? Can you write it like eth1@east-fw ? Not seeing documentation on it like in sk113112.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 31 | |
| 18 | |
| 16 | |
| 14 | |
| 7 | |
| 7 | |
| 5 | |
| 5 | |
| 5 | |
| 3 |
Tue 11 Nov 2025 @ 10:00 AM (CET)
Your First Response: Immediate Actions for Cyber Incident Containment- EMEAThu 20 Nov 2025 @ 05:00 PM (CET)
Hacking LLM Applications: latest research and insights from our LLM pen testing projects - AMERTue 11 Nov 2025 @ 06:00 PM (COT)
San Pedro Sula: Risk Management al Horno: ERM, TEM & Pizza NightTue 11 Nov 2025 @ 06:00 PM (COT)
San Pedro Sula: Risk Management al Horno: ERM, TEM & Pizza NightTue 11 Nov 2025 @ 10:00 AM (CET)
Your First Response: Immediate Actions for Cyber Incident Containment- EMEAThu 20 Nov 2025 @ 05:00 PM (CET)
Hacking LLM Applications: latest research and insights from our LLM pen testing projects - AMERThu 13 Nov 2025 @ 10:00 AM (CET)
Cloud Architect Series - Guarding Generative AI: Next-Gen Application Security with CloudGuard WAFFri 14 Nov 2025 @ 10:00 AM (CET)
CheckMates Live Netherlands - Veriti, Threat Exposure ManagementWed 19 Nov 2025 @ 11:00 AM (EST)
TechTalk: Improve Your Security Posture with Threat Prevention and Policy InsightsTue 11 Nov 2025 @ 06:00 PM (COT)
San Pedro Sula: Risk Management al Horno: ERM, TEM & Pizza NightTue 11 Nov 2025 @ 06:00 PM (COT)
San Pedro Sula: Risk Management al Horno: ERM, TEM & Pizza NightAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY