Hello to everyone,
I am trying to understand the logic behind access rules and VPN communities.
I have an example ruleset what regulates traffic between internet / ipsec tunnel / Local VLAN-s
Name | Source | Destination | VPN | Services | Action |
users_to_inet | user_address | Internet* | Any * | Any * | Accept |
users_to_ipsec | user_address | ipsec_address | ipsec_com | Any * | Accept |
users_to_local | user_address ssl_vpn_address | local_services | Any* | Any* | Accept |
Cleanup | any* | any* | any* | any* | Drop |
I am experiencing an behaviour when traffic destinated to the IPSEC tunnel is going through the "users_to_inet" rule but not through "users_to_ipsec" rule. It seems that the first match is because of the VPN=>Any* but I have no knowledge yet to disable it if it is even possible.
I am experiencing an behaviour when traffic hits "users_to_local" rule the checkpoint tries to create a IPsec tunnel to the remote host , because that the rule has ssl_vpn_address" in the source. Even though the traffic is destinated to a neighbour VLAN and no tunnel should be used.
When moving the priority of the rules, then traffic in some cases are matched the correct rule but some other rules tend to try move through the higher priority ones.
I have read the administration manual, but I find the answers I was looking for.
Can someone please explain to me:
- What is the correct way to describe LAN => Internet rule that the VPN communities don't try to go through it.?
- What is the correct way to describe VLAN => VLAN rules that the VPN communities don't try to go through it.?
- How to disable the use of VPN Communities when creating VLAN => VLAN rules in the firewall.?
- What is the correct way to prioritize rules when you have on-prem VLANS and remote IPSEC tunnels where you try to allow and forward traffic.
- What is the logic behind the explanation and behaviour of the Checkpoint SGW?
I hope this explanation is enough but feel free to ask me for additional questions if it is too hard to understand. I was working with a fortigate unit for some time and there the logic was a bit different.
Best Regards,
Gryzz