Go Premium for a chance to win a PS4. Enter to Win

x
  • Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 886
  • Last Modified:

Setup VPN with Checkpoint Firewall

I need to setup a VPN connection in a checkpoint firewall.  
The VPN will allow RDP (TCP 3389) to a list of servers.

I created the "community"
set rule for IPSEC traffic to accept to and from the firewall to the firewall there
set the rule in the rule base to allow RDP from their network to the listed IP's of the servers.

Do i need to create a rule that allows RDP traffic from the servers to the site?

Any input is welcome, thanks.
0
younginbusiness
Asked:
younginbusiness
1 Solution
 
grimkinCommented:
Hi,

No, the traffic is allowed back as there will be a matching entry in the connections table. Give it a whirl and let us know if you need any more help,

Cheers
G
0
 
johnpaulantonyCommented:
Hi,
Assuming that you have created below.

1) Created a Star community under VPN section.
2) Added your own FW as a Central Gateway.
3) Added the remote  FW object as  a Satellite Gateway.
4) Worked with the remote vendor to configure the Phase1 & Phase2 configurations.
5) Obtained a shared secret and configured them in your FW.
6) Discussed the encryption domain with your remote FW admin and configured them in your rules. This is the important piece since encryption domain will help the FW what are the IPs to be encrypted or what should not.
Ex: If your source IP is 10.10.10.x and the destination (Terminal servers) IP ranges are 20.20.20.x
a) Define 20.20.20.x under Interoperable Devices-"RemoteFW Object"-Topology then select "Manually defined".
b) Goto your FW object and select edit-Topology-Manually defined-then select 10.10.10.x
This will provide you the encrption domain consists of 10.10.10.x and 20.20.20.x and both FWs are ready to encrypt/decrypt traffic.
7) Now configure the VPN rules in your "Security" tab. Ex: Source=10.10.10.1 destination=20.20.20.1 VPN (newly created STAR community)service TCP-3389.

Unlike traditional devices, Checkpoint will always maintain session table. It will automatically allow the return traffic. So, you dont need to worry about the reverse route. As long as you configure one way, the return traffic will be allowed automatically (assuming that you have proper reverse routes for 20.20.20.x on your FW and reverse routes for 10.10.10.x on the remote FW).

Note:
If you are intend to use multiple VPN tunnels, it is better to create a group(ex: MY-VPN-Tunnel-Source-Group) and add all your VPN sources inside that. This will help you to dynamically manage your encryption domain.
0

Featured Post

Ask an Anonymous Question!

Don't feel intimidated by what you don't know. Ask your question anonymously. It's easy! Learn more and upgrade.

Tackle projects and never again get stuck behind a technical roadblock.
Join Now