Getting Started with Site-to-Site VPN

Setting up Site-to-Site VPN between Security Gateways

Scenario: Two Check Point Security Gateways are managed by the same Security Management ServerClosed Dedicated Check Point server that runs Check Point software to manage the objects and policies in a Check Point environment within a single management Domain. Synonym: Single-Domain Security Management Server.. How do you create a site-to-site VPN between the two Security Gateways so that they can communicate securely?

Overview of the Workflow:

  1. Create the Security GatewayClosed Dedicated Check Point server that runs Check Point software to inspect traffic and enforce Security Policies for connected network resources. objects in SmartConsoleClosed Check Point GUI application used to manage a Check Point environment - configure Security Policies, configure devices, monitor products and events, install updates, and so on. and make sure that IPsec VPNClosed Check Point Software Blade on a Security Gateway that provides a Site to Site VPN and Remote Access VPN access. is enabled on each one.

  2. Generate internal CA certificates for each Security Gateway (done automatically).

  3. Create the VPN CommunityClosed A named collection of VPN domains, each protected by a VPN gateway..

  4. Define the VPN Domain. See Defining the VPN Domain for a Security Gateway.

  5. Make sure that the VPN will work with your configured routing, or change the routing or link selection settings as necessary. See Link Selection Overview.

  6. Create rules for the traffic. See Configuring Site to Site VPN Rules in the Access Control Policy

  7. Install the Access Control Policy.

Enabling IPsec VPN on a Security Gateway

Site to Site VPNClosed An encrypted tunnel between two or more Security Gateways. Synonym: Site-to-Site VPN. Contractions: S2S VPN, S-to-S VPN. requires two or more Security Gateways with the IPsec VPN Software BladeClosed Specific security solution (module): (1) On a Security Gateway, each Software Blade inspects specific characteristics of the traffic (2) On a Management Server, each Software Blade enables different management capabilities. enabled. Other Software Blades can be enabled on the same Security Gateway.

Make sure that Trusted Communication is established between all Security Gateways and the Security Management ServerClosed Check Point Single-Domain Security Management Server or a Multi-Domain Security Management Server..

Creating a VPN Community

You can create a Meshed or Star VPN Community. The procedure below shows an example of a Star Community.

Defining the VPN Domain for a Security Gateway

The VPN Domain defines the networks and IP addresses that are included in the VPN community. It is also called the Encryption Domain. When you create a Check Point Security Gateway object, the VPN Domain is automatically defined as all IP Addresses behind the Security Gateway, based on the topology information.

You can manually define the VPN domain to include one or more networks. You must have a Network object or Network Group object that represents the domain.

Encryption Domain per Community

Important - This feature requires Security Gateways R80.40 and higher.

By default a gateway's Encryption DomainClosed The networks that a Security Gateway protects and for which it encrypts and decrypts VPN traffic. is shared with all the communities it is a part of.

Access to different resources within the Encryption Domain is implemented using the Access Control RuleClosed Set of traffic parameters and other conditions in a Rule Base (Security Policy) that cause specified actions to be taken for a communication session. Base.

In some cases you may need to configure the Encryption Domain in a granular way.

You can configure the VPN domain of a Security Gateway per community, which makes it safer and easier to control the VPN communities that are logically separated.

To configure Encryption Domain Per Community

  1. Open the VPN community.

  2. Double click the center Security Gateway that participates in more than one VPN community (Security Gateway C in this scenario).

    The VPN domain configuration window opens.

  3. Select the User defined option.

    Configure the Encryption Domain. In our example the encryption domain includes the network we allow partner B to access.

  4. Click OK.

  5. Install policy.

Confirming VPN Routing

By default, IPsec VPN uses the main IPv4 Address, defined in the General Properties page of the Security Gateway object, for the VPN tunnel connection.

If you want to use this IP address for the VPN communication, and it is an external interface, you do not need additional routing.

If the main IP address is an internal interface, or if you want VPN communication on a different interface, make sure that:

Configuring Site to Site VPN Rules in the Access Control Policy

You must configure rules to allow traffic to and from VPN Communities. Configure rules in SmartConsole > Security Policies view > Access Control. All layers of the Access Control Policy can contain VPN rules.

To make a rule apply to a VPN Community, the VPN column of the Rule Base must contain one of these:

  • Any - The rules applies to all VPN Communities and to non-VPN related traffic. If you configure a new VPN Community after the rule was created, the rule also applies to the new VPN Community.

  • One or more specified VPN communities - For example, MyIntranet. Right-click in the VPN column of a rule and select Specific VPN Communities. The rule applies to the communities shown in the VPN column.

Examples:

  • This rule allows encrypted traffic between domains of member Security Gateways of "community_X."

    Name

    Source

    Destination

    VPN

    Services & Applications

    Allow traffic within community

    * Any

    *Any

    MyCommunity

    * Any

  • This rule allows traffic from all VPN Communities to the internal network on all services.

    Name

    Source

    Destination

    VPN

    Services & Applications

    Allow all VPN

    * Any

    Internal_Network

    * Any

    * Any

  • This rule allows traffic between two VPN domains with all services.

    Name

    Source

    Destination

    VPN

    Services & Applications

    Site to Site VPN

    Local_VPN_Domain

    Peer_VPN_Domain

    Local_VPN_Domain

    Peer_VPN_Domain

    Site2Site

    * Any

Confirming that a VPN Tunnel Opens Successfully