- Products
- Learn
- Local User Groups
- Partners
- More
Firewall Uptime, Reimagined
How AIOps Simplifies Operations and Prevents Outages
Introduction to Lakera:
Securing the AI Frontier!
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
SharePoint CVEs and More!
I know that the client calculates topology on connect and stores it in local trac.config file but where is this topology information stored on the gateway ?
Thanks Tom
Ok thanks -I am having troubles with a VPN cluster not pushing down the correct VPN routes to a Remote Access client.
This FW cluster is in the same VPN community as other FWs which work perfectly.
Looking at the unobscured trac.config file at the client I get only the VIP and physical IP addresses in the <IP_RANGE> section whereas I get all correct networks when I connect to another FW cluster in my network.
The last change on the affected FW cluster was adding two unnumbered VTI interface to get redundancy for a cloud proxy used by the local network.
Thanks Tom
As Maarten mentioned, you have to specify another VPN domain for the Remote Access Community.
Look here:
Wolfgang
My VTI routing is based on static routes added to both cluster members via GAiA.
Regarding the steps to solve the problem I am not sure if I fully understood your inputs.
1) currently I have set a domain for Remote Access Community in SDB like "Remote Access" -> "Enc-Dom-Mobile" for the FW cluster object
2) "Enc-Dom-Mobile" contains all relevant networks where encryption should happen (I assume the GW builds the routing topology from this information)
3) "Route all traffic through tunnel" is enabled
4) there are already some exclusions configured for "Enc-Dom-Mobile"
The peers I used for routing through the VTIs are already part of another encryption domain "VPN_cloud". This "VPN_cloud" has the FW cluster as Center Gateway and two satellite gateways which are actually two cloud datacenters. The GAiA VTI configuration includes each of these satellites as peers. The actual static route tells the FW cluster to route the cloud vip through one of the VTIs (so two routes with different metrics exist).
Should I now exclude something from "Enc-Dom-Mobile" ?
It feels like FW cluster publishes encryption topology from the "VPN_cloud" to the client rather than the "Remote Access" VPN community.
Thanks again for your help.
Regards Tom
Sorry for being so dumb - but what do I need to change ?
On the FW cluster GW object I have enabled "Allow VPN clients to route traffic through this gateway"
Thanks Tom
I want to get FW cluster to publish the correct topology from the Remote Access community.
Currently it only publishes the external interface IPs to trac.config.
Regards Tom
But this is not possible regarding our security concept. If I understood correctly and disable the feature the client would be able to directly connect to local resources. There should be a way to get the FW cluster to publish the correct topology, shouldn´t it ?
We partly solved it with support by disabling secondary connect but now we cannot manually choose our primary VPN GW in the VPN client anymore.
Regards Tom
Thanks - I´ll try to re-explain
|----> one tunnel to cloud proxy provider (different VPN community "Cloud1")
---------> FW-Cluster 1 ----|
Remote access clients ---------> FW-Cluster 2 --------- Same remote access community
--------> FW-Cluster 3 ----|
Scenario:
Remote access clients can connect to different VPN gateways (FW-Cluster 1, FW-Cluster 2, FW-Cluster 3).
All VPN gateways are connected to the same Remote Access community.
MEP and Secondary connect are enabled in trac_client_1.ttm
So the user can choose in the VPN client from a dropdown box to which GW to connect (this is mandatory).
With this setup everything was working fine - client could reach all resources to internal network.
Now I changed the following for FW-Cluster 1:
- added a secondary satellite to VPN community "Cloud1"
- to make a redundant VPN tunnel I added 2 VTIs and routes with different metrics with the two satellites as destination gateways
After this change the clients connecting to FW-Cluster1 where not able to reach internal resources anymore.
The VPN tunnel to FW-Cluster1 from a client is established successfully but it looks like the Cluster is publishing a wrong topology which does not include the internal networks anymore. Only the external interfaces of the cluster.
Regards Tom
Yes they need to access the internet via Cloud1 as this is is a "internet proxy service" which they need because they have no split tunnel to directly access the internet from their client.
TAC is already involved since a week via our partner.
But up to now no solution. So I probably have to roll back the config today because of the side effects.
Regards Thomas
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
User | Count |
---|---|
3 | |
3 | |
2 | |
1 | |
1 | |
1 | |
1 | |
1 | |
1 | |
1 |
Thu 09 Oct 2025 @ 10:00 AM (CEST)
CheckMates Live BeLux: Discover How to Stop Data Leaks in GenAI Tools: Live Demo You Can’t Miss!Thu 09 Oct 2025 @ 10:00 AM (CEST)
CheckMates Live BeLux: Discover How to Stop Data Leaks in GenAI Tools: Live Demo You Can’t Miss!Wed 22 Oct 2025 @ 11:00 AM (EDT)
Firewall Uptime, Reimagined: How AIOps Simplifies Operations and Prevents OutagesTue 28 Oct 2025 @ 11:00 AM (EDT)
Under the Hood: CloudGuard Network Security for Google Cloud Network Security Integration - OverviewAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY