Creating a VPN Community for SmartLSM Security Gateways
This section explains how to create the VPN itself in SmartConsole Check Point GUI application used to manage a Check Point environment - configure Security Policies, configure devices, monitor products and events, install updates, and so on.. Before doing so, you must first configure, in SmartProvisioning
Check Point Software Blade on a Management Server (the actual name is "Provisioning") that manages large-scale deployments of Check Point Security Gateways using configuration profiles. Synonyms: Large-Scale Management, SmartLSM, LSM., the SmartLSM Security Gateways to support VPN participation.

-
Open SmartConsole.
-
Define a VPN Star Community: Security Policies > Access Control > Policy > Access Tools > VPN Communities > New > Star Community.
-
In Gateways > Center Gateways, click Add, and select the applicable Security Gateway
Dedicated Check Point server that runs Check Point software to inspect traffic and enforce Security Policies for connected network resources. / Cluster
Two or more Security Gateways that work together in a redundant configuration - High Availability, or Load Sharing. objects.
Important - This field does not support:
-
Maestro Security Groups.
-
Quantum Spark appliances that run Gaia
Check Point security operating system that combines the strengths of both SecurePlatform and IPSO operating systems. Embedded OS.
Select Mesh center gateways if it is necessary for the central Security Gateways to communicate.
-
-
In Gateways > Satellite Gateways, click Add, select the SmartLSM Security Profile from the displayed list.
When you select the profile, all SmartLSM Security Gateways assigned to this SmartLSM Security Profile are added to the VPN community. The gateways must be configured with the ability to participate in a VPN community (see Configuring VPNs on SmartLSM Security Gateways).
-
In the Advanced tab, specify the IKE (Phase 1) properties.
-
In the Shared Secret tab, clear Use only Shared secret for all External Members.
-
Click OK.
-
In Access Control > Policy, create a Rule Base
All rules configured in a given Security Policy. Synonym: Rulebase. which defines the services allowed for the VPN community. See Sample VPN Rules for a SmartLSM Security Gateways.
-
Install the Security Policy
Collection of rules that control network traffic and enforce organization guidelines for data protection and access to resources with packet inspection. with this rule
Set of traffic parameters and other conditions in a Rule Base (Security Policy) that cause specified actions to be taken for a communication session. on the CO gateway.
A topology file and a certificate are downloaded to the SmartLSM Security Gateway, listing the members of the VPN community and specifying encryption information.

-
Update the CO gateway. See Updating Corporate Office Security Gateways.
-
Establish the VPN tunnel. Send a test connection with an allowed service (according to the rules created in the Security Policy Rule Base) and use SmartView Monitor to make sure that the test was successfully encrypted, sent, and received. To access SmartView Monitor, go to the Logs & Monitor view > External Apps > Tunnel & User Monitoring.