Create a Post
cancel
Showing results for 
Search instead for 
Did you mean: 
OSMOZ_Enedis
Participant

multiple VPN IPsec : select one tunnel in function of the source subnet

Hello everybody,

I have a simple question on a Checkpoint VPN functionality. If you have more than one tunnel, is it possible to select one tunnel in function of the source subnet ?

Here is the context of my request :

On my network, I have an IPsec tunnel between a Security Gateway Virtual Edition and a cluster of two Checkpoint 2200 T-110. Each member of the cluster build his own tunnel with the Security Gateway VE.

I would like to set up a new Security Gateway Virtual Edition and buid new tunnels with this VM. The need is to split trafics from different network and have them arrive on two separate platforms.

My whish is that hosts belonging to the subnet 192.168.30.0/24 use IPsec_tunnel_A and hosts from subnets 192.168.40.0/24, 10.20.0.0/16 use the new IPsec_tunnel_B.

I didn't succeed in setting up this idea. Do you know if this is possible ? All my devises works on Gaia OS 77.30.

Thank you for your help.

8 Replies
PhoneBoy
Admin
Admin

If I’m understanding what you’re asking, you’re trying to create two VPN tunnels to same encryption domain.

In which case, I would review the Multiple Entry Point configuration options here: VPN R77 Versions Administration Guide 

If this isn’t what you are asking, please clarify by providing more details about what you’re trying to achieve and why.

A diagram showing the gateways, subnets, and desired traffic flows would also be very helpful.

0 Kudos
Maarten_Sjouw
Champion
Champion

Main question here is where do the subnets live? Is subnet 192.168.30.0/24 (Indirectly) connected to the first VE and subnets 192.168.40.0/24, 10.20.0.0/16 (indirectly) connected to the second VE?

If so then there is no issue at all and you can just make sure the routing is set accordingly on the VE side and on the VPN domains you set the correct networks for the 2 VE's, (which network can I reach via which VE).

Hope this helps getting you in the right direction.

Regards, Maarten
0 Kudos
OSMOZ_Enedis
Participant

Hello,

Thank you for your first answers. I attach a complete diagram of my situation (sorry for the blue stencils...). 

For now I only have IPsec tunnels in green. I need to split trafic from users of SiteA. 

I would like that User1 only use green tunnels  whereas User2 and User3 should only use pink tunnels.

The demande comes from security department : they ask that admin users (from subnet 192.168.30.0/24) use a different VPN gateway from non-admin users (from subnets 192.168.40.0/24 and 10.20.0.0/24).

So do you think that it is possible for the cluster XXX to choose green or pink tunnel in function of the source subnet which is sending a request/reply (and in function of the destination of course) ?
For example User1 and User2 need to reach the server 172.16.0.9, can we force User1 to take green tunnel and User2 to take pink tunnel ?

explicative diagram

0 Kudos
PhoneBoy
Admin
Admin

You have partially overlapping encryption domains, which is not supported.

Specifically:

  • VPN_siteB_Pink and VPN_siteB_Green share 172.16.0.0/13
  • VPN_siteC_Pink and VPN_siteC_Green share 172.24.0.0/13 

The encryption domains either have to fully overlap or not overlap at all.

If they don't overlap at all, you can set it up so the relevant group can use only the relevant VPN--problem solved.

If they fully overlap, then there isn't a way to force specific subnets to use a specific VPN tunnel (through MEP or any other method).

A better approach in this case would be to have admins use a Remote Access VPN client to access the desired gateway (e.g. through Mobile Access Blade or similar).

Then you can leave the encryption domains as "partially overlapping."

OSMOZ_Enedis
Participant

Thank you again for your useful explanations and for your substitution proposal.

I understand that it is not possible to partially overlap encryption domains. And it is not possible de choose specific VPN tunnel neither.

I have notice that I could use Remote Access VPN client to access the desired gateway. In my situation, it is not an easy job considering the large amount of users involved for the heavy client installation.


I think to another possibility : is that possible to define two Virtual System on the Checkpoint 2200 to workaround ?  

I would have four virtual firewalls on my site A (siteA_2200_a_vsxAdmin + siteA_2200_a_vsxNonAdmin  + siteA_2200_b_vsxAdmin  + siteA_2200_b_vsxNonAdmin) used to buid four IPsec tunnels to site B and four IPsec tunnels to site C. In this case I would have no limitation of encryption domains overlapping because all tunnels in destination to site B or all tunnels in destination to site C will be on different equipments. Is that correct ? If yes, do you know the license to activate VSX on 2200 models ?

Regards

0 Kudos
OSMOZ_Enedis
Participant

I found the licences informations (they are noticed in the correponding model datasheet).
Check Point 2200 appliance : virtual system package
  3 Virtual Systems package : CPSB-VS-3
  3 Virtual Systems package for HA/VSLS : CPSB-VS-3-VSLS
0 Kudos
PhoneBoy
Admin
Admin

Or you could use VSX Smiley Happy

I would make sure you add additional RAM to your 2200 as that will obviously require a bit more RAM.  

OSMOZ_Enedis
Participant

OK great. I have all the information to choose a solution that meets my needs.

Thank you Dameon and Maarten for your help.

Leaderboard

Epsum factorial non deposit quid pro quo hic escorol.

Upcoming Events

    CheckMates Events