
The VPN traffic is routed according to the VPN domains that are defined in SmartDashboard. Routing VPN TrafficĬonfigure the Security Gateway to route VPN traffic based on VPN domains or based on the routing settings of the operating system. The Star VPN communities let the company partners access the internal networks. The Security Gateways for external networks of company partners do not have access to the London and New York internal networks. This deployment is composed of a Mesh community for London and New York Security Gateways that share internal networks. New York company partner (external network) London company partner (external network) For Star topology, the central Security Gateway.įor Star topology, satellite Security Gateways. In a Star community, satellites have a VPN connection with the center Security Gateway, but not to each other. In a Mesh community, there are VPN connections between each Security Gateway. VPN communities are based on Star and Mesh topologies. Network resources of the different Security Gateways can securely communicate with each other through VPN tunnels. Then join the Security Gateways into a VPN community. Define the resources that are included in the VPN Domain for each Security Gateway. They use the IPsec protocol to encrypt and decrypt data that is sent between Host 1 and Host 6.Įncrypted data is sent through VPN tunnelĪ VPN Domain is the internal networks that use Security Gateways to send and receive VPN traffic. The Firewalls do IKE negotiation and create a VPN tunnel. In this sample VPN deployment, Host 1 and Host 6 securely send data to each other. One Security Gateway can maintain more than one VPN tunnel at the same time. Two Security Gateways negotiate a link and create a VPN tunnel and each tunnel can contain more than one VPN connection. The basis of Site to Site VPN is the encrypted VPN tunnel. IPsec is protocol that supports secure IP communications that are authenticated and encrypted on private or public networks.įor more about using IPsec VPN, see the R76 VPN Administration Guide. IKE (Internet Key Exchange) is a standard key management protocol that is used to create the VPN tunnels. The Check Point VPN solution uses these secure VPN protocols to manage encryption keys, and send encrypted packets. Integrity - Uses industry-standard integrity assurance methods.Authenticity - Uses standard authentication methods.You can configure Star and Mesh topologies for large-scale VPN networks that include third-party gateways.

Use SmartDashboard to easily configure VPN connections between Security Gateways and remote devices. The IPsec VPN Software Blade lets the Firewall encrypt and decrypt traffic to and from external networks and clients.
