- Products
- Learn
- Local User Groups
- Partners
- More
Quantum Spark Management Unleashed!
Introducing Check Point Quantum Spark 2500:
Smarter Security, Faster Connectivity, and Simpler MSP Management!
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
SharePoint CVEs and More!
Hi
Is there any guide that shows how to do subnet advertisement over the S2S tunnel (2 checkpoint appliances)
We have got about 5 different VLANS that needs to be advertised from the main office to the branch office.
Any ideas!
Why do you need that ? Usually you include all subnets in VPN Encryption Domains for each peer.
Clarification on VLAN Tagging and Configuration:
We defined the allowed networks for the VPN tunnel. However, I'm unsure how VLAN tagging would work in this scenario.
Ideally, I'd like to find a comprehensive guide that outlines the configuration process for both the Check Point firewall at the main office and the Check Point firewall in the branch office. This guide should specifically address:
By following a detailed guide that addresses these aspects, I can confidently configure the VPN tunnel and achieve the desired functionality for VLAN traffic across both locations.
Additionally:
On CP side you only need to consider R81.10 Gaia Administration Guide - VLAN Interfaces. Switches are configured according to their specs. It should work transparently over VPN if the Encryption Domains are defined correctly.
Maybe this needs to be considered?
f you configure the switch ports as VLAN trunk, the Check Point Bridge interface should not interfere with the VLANs.
To configure a Bridge interface with VLAN trunk, create the Bridge interface with two physical (non-VLAN) interfaces as its subordinate interfaces (see Bridge Interfaces).
The Security Gateway processes the tagged packet and does not remove VLAN tags from them.
The traffic passes with the original VLAN tag to its destination.
Just follow link Guenther gave. I am not aware of any specific document/acticle that talks about something like this through the vpn tunnel.
Andy
Just adding in my 2p on this one if I may; apologies if I have misunderstood you but I had a similar question put to me just last week. In that case, the customer had an existing MPLS L2 network and wanted to find a way to keep the L2 build broadly similar after migrating to VPN tunnels.
Its important to note that the VPN tunnel is a layer 3 entity; its IP to IP. Its not possible to segregate this L3 tunnel into a series of layer 2 VLANs, in the manner of an ethernet trunk.
Instead, what you need to do (as Gunther and Andy mention) is include the respective subnets in the 'encryption domain'.
Again, apologies if thats not what you're asking.
G
Thats super valid point, it would be layer 3 "system" if you will, so the statement about segregating it into separate layer 2 entities may not work, agree.
Not sure if there is written statement anywhere about it, but I could not find one myself.
Andy
You have a very good point about the difference between l2 and l3 in this specific case
I would agree with @G_W_Albrecht . By the way, whatever you need to advertise, just include it in VPN domain and ever since R80, you can have specific group as generic vpn domain in the object itself, but then you can assign different ones as per community (below screenshot)
Andy
If the Interface VLAN that i need to send to the branch office is not defined in the firewall but only in the router (internal traffic)
How would the process of creating a new interface vlan on the firewall go?
Example:
add interface bond0 vlan 530
set interface bond0 state on
set interface bond0.530 comments "Print"
set interface bond0.530 state on
set interface bond0.530 ipv4-address 10.40.10.25 mask-length 24
what happens next?
That looks right. Well, just make sure its aded as part of enc vpn domain.
Andy
that config will be done on the main office, what about the branch office configuration. Is it the same?
Do i need to consider this:
If you configure the switch ports as VLAN trunk, the Check Point Bridge interface should not interfere with the VLANs.
To configure a Bridge interface with VLAN trunk, create the Bridge interface with two physical (non-VLAN) interfaces as its subordinate interfaces (see Bridge Interfaces).
The Security Gateway processes the tagged packet and does not remove VLAN tags from them.
The traffic passes with the original VLAN tag to its destination.
Why would you use a bridge interface ? This will make many features unavailable! Both peers have their own Encryption domain - all networks should be included that have to be reached by clients from peer site.
I am not an expert here, but i am trying to learn!
In the branch office a Cisco switch will be connected to the firewall. How would the firewall configuration be ?
How would the switch understand that this traffic is tagged? I am trying to understand the process!
The branch office is 1575 small business appliance
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
User | Count |
---|---|
17 | |
12 | |
7 | |
6 | |
5 | |
5 | |
4 | |
4 | |
3 | |
3 |
Wed 10 Sep 2025 @ 11:00 AM (CEST)
Effortless Web Application & API Security with AI-Powered WAF, an intro to CloudGuard WAFWed 10 Sep 2025 @ 11:00 AM (EDT)
Quantum Spark Management Unleashed: Hands-On TechTalk for MSPs Managing SMB NetworksFri 12 Sep 2025 @ 10:00 AM (CEST)
CheckMates Live Netherlands - Sessie 38: Harmony Email & CollaborationWed 10 Sep 2025 @ 11:00 AM (EDT)
Quantum Spark Management Unleashed: Hands-On TechTalk for MSPs Managing SMB NetworksFri 12 Sep 2025 @ 10:00 AM (CEST)
CheckMates Live Netherlands - Sessie 38: Harmony Email & CollaborationAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY