- Products
- Learn
- Local User Groups
- Partners
- More
Policy Insights and Policy Auditor in Action
19 November @ 5pm CET / 11am ET
Access Control and Threat Prevention Best Practices
Watch HereOverlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
Hi Guys,
I have 2 locations Site A and Site B, both are having Checkpoint gateway which is managed by CMS located at SiteA.
Site A has 2 ISP links: ISP-1 and ISP-2, we are using ISP-2 for S2S vpn.
we want to create a s2s vpn between site A and site B.
Issue is when we push this VPN config on Site-B firewall then the policy install is stuck at 50% and we loose access of Site-B firewall.
So we perform unloadlocal, remove this VPN config for these two sites and push the policy and is successful.
Due to this issue we are not able to create a s2s vpn between these two sites.
Can anyone help me with a solution to overcome this?
Quantum Force (Security Gateways)
I suspect this is related to the other issue you posted about: https://community.checkpoint.com/t5/General-Topics/Checkpoint-Gateway-not-sending-logs-to-sms-over-w...
Fix that and you’ll probably fix this issue.
Also, if you’re using multiple ISPs and using a specific one for the VPN, you may need to configure Link Selection to ensure the correct IP on the correct link is used to establish the VPN.
Logging issue is resolved after reworking on NAT rules. But this issue is still not resolved.
Attaching reference architecture diagram. All firewall is Checkpoint managed from Central Location-A with Central CMS.
S2S VPN is established via ISP-2 on Central Location. Each spoke location has single ISP Link.
@PhoneBoy is correct...when using ISP redundancy, you would most likely need to change link selection in this case to reflect correct external IP address presented.
Link selection is already configured with ISP-2 at site A.
Both the issues are different.
If I want to exclude Control connections from VPN then what all services do I need to exclude including FW1, CPMi?
I think this might help in preventing the spoke to get isolated.
Control Connections are already excluded from VPN.
Can anyone suggest me a solution as to how can I achieve this Hub and spoke architecture where spoke gateways are managed from public and sms is central.
I am stuck with this since last 15days.
You're using ISP-2 for the VPN, yet using ISP-1 for the management traffic, correct?
That is probably what is causing your issue here since this is likely creating an asymmetric routing condition.
You should use the same ISP for both VPN and management traffic and your management NAT address should reflect this.
If you need to use a different ISP to manage different gateways, then you may need to put in some manual rules in place.
In any case, I recommend a TAC case to further assist you with this issue.
Phoneboy is right, its already excluded by default.
First and foremost if you are building a tunnel managed by same SMS then it will be a certificate based tunnel and certificates will be catered by mangement server. Now since peer IP happens to be (if) policy push or SIC IP then it would never happen. The Policy push will never happen through S2S tunnel due to implied rules and implied rules does not have VPN setting. In this case either you can disable Remote Control connections and and try building a manual rules for SIC/Policy push or NAT the Management server behind other IP which is not a VPN IP.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 27 | |
| 15 | |
| 14 | |
| 13 | |
| 12 | |
| 7 | |
| 6 | |
| 5 | |
| 5 | |
| 5 |
Wed 26 Nov 2025 @ 12:00 PM (COT)
Panama City: Risk Management a la Parrilla: ERM, TEM & Meat LunchWed 03 Dec 2025 @ 10:00 AM (COT)
Última Sesión del Año – CheckMates LATAM: ERM & TEM con ExpertosThu 04 Dec 2025 @ 12:30 PM (SGT)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - APACThu 04 Dec 2025 @ 03:00 PM (CET)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - EMEAThu 04 Dec 2025 @ 02:00 PM (EST)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - AmericasWed 03 Dec 2025 @ 10:00 AM (COT)
Última Sesión del Año – CheckMates LATAM: ERM & TEM con ExpertosThu 04 Dec 2025 @ 12:30 PM (SGT)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - APACThu 04 Dec 2025 @ 03:00 PM (CET)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - EMEAThu 04 Dec 2025 @ 02:00 PM (EST)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - AmericasWed 26 Nov 2025 @ 12:00 PM (COT)
Panama City: Risk Management a la Parrilla: ERM, TEM & Meat LunchAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY