Hi @dhueber,
Use a star community.
For more granular control over VPN routing, edit the vpn_route.conf file in the $FWDIR/conf/ directory of the Data Center SMS:
[Office A - Gaia 80.30] <-- S2S Star VPN Community ---> [Data Center - Gaia 77.30] <--S2S Star VPN Community---> [AWS Cloud]
Consider a simple VPN routing scenario consisting of Hub and two Spokes. All machines are controlled from the same Security Management Server, and all the Security Gateways are members of the same VPN community. Only Telnet and FTP services are to be encrypted between the Spokes and routed through the Hub:
Alhough this could be done easily by configuring a VPN star community, the same goal can be achieved by editing vpn_route.conf:
Destination Next Hop router interface Install on
Spoke [Office A - Gaia 80.30] Hub [Data Center - Gaia 77.30] Spoke [AWS Cloud]
Spoke [AWS Cloud] Hub [Data Center - Gaia 77.30] Spoke [Office A - Gaia 80.30]
And enable VPN routiong to center and to other satellites through center (same on R77.30):
PS:
R77.30 is since approximately one year out of support:-)
➜ CCSM Elite, CCME, CCTE ➜ www.checkpoint.tips