- Products
- Learn
- Local User Groups
- Partners
- More
MVP 2026: Submissions
Are Now Open!
What's New in R82.10?
10 December @ 5pm CET / 11am ET
Announcing Quantum R82.10!
Learn MoreOverlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
I've set up the branch site firewall (1450 | R77.20.87 | 990173120 | 990173120) to allow access to its public IP ("x.y.z.a:4434") from the HQ network (m.n.o.p/29). So, access to the branch site firewall over the internet from specific public IPs. This setting works without any issue until a VPN tunnel is established between these two firewalls. After the tunnel is established, I lose admin access to the branch firewall's public IP from the HQ network. HQ firewall is 1570 | R81.10.07 | 996001457. Few notes:
Even if your encryption domain does not include the external IP of the gateway, it is always included.
Scenario 3 here: https://support.checkpoint.com/results/sk/sk108600
If your gateway is locally managed, you can make the changes in $FWDIR/lib on the local gateway to exclude the gateway's public IP.
For the changes to take effect after editing the file, either use the CLI command fw_configload or reboot the gateway.
Thank you @PhoneBoy! But there are a crazy amount of .def files inside "/opt/fw1/lib/". Which .def file am I editing? It would also be awesome if you could mention the line/s to edit on the file.
The SK I linked tells you what file to edit (crypt.def) as well as exactly what edits to make.
Line numbers are dependent on release as well as other changes you may have made.
Note these manual changes will have to be re-applied if you upgrade your firmware.
However, before you do that, you may want to see if this setting is available in R77.20.87 (which will do the same thing):
I used the webUI advanced settings as it was available. I changed the value to true on both sides. But it didn't help. Ran fw_configload as well as rebooted the branch site fw.
Curious, do you see the traffic on the WAN interface with a tcpdump?
Generated a tcp dump on the HQ fw.
Command used: tcpdump -i any -nn -vvv -s0 -w /opt/fw1/tmp/email_tmp/tcp_dump.pcap host <HQ public IP> or host <Branch public IP> and port 4434
It's not going through the VPN, which is what I was checking for.
The retransmissions are concerning, definitely recommend getting the TAC involved here: https://help.checkpoint.com
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 4 | |
| 2 | |
| 2 | |
| 2 | |
| 1 | |
| 1 | |
| 1 |
Fri 12 Dec 2025 @ 10:00 AM (CET)
Check Mates Live Netherlands: #41 AI & Multi Context ProtocolTue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Fri 12 Dec 2025 @ 10:00 AM (CET)
Check Mates Live Netherlands: #41 AI & Multi Context ProtocolTue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!About CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY