<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to hide internal IP networks attached to Security Gateways from the Mobile Access users in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-hide-internal-IP-networks-attached-to-Security-Gateways/m-p/248194#M48492</link>
    <description>&lt;P&gt;Hey Ramon,&lt;/P&gt;
&lt;P&gt;Just to make sure and please forgive me if Im way off here when I say this, but sounds like you want to do something along the lines where say different users can be assigned to different realms?&lt;/P&gt;
&lt;P&gt;This was the answer I got from TAC on January 6th 2022, but does not appear this is still possible.&lt;/P&gt;
&lt;P&gt;******************************&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Hello Andy,&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;After consulting with escalations,&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;assigning specific users to desired authentication method&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;in Check Point Multiple Login Options is not a supported feature yet, and there is already an existing RFE submitted for that.&amp;nbsp;However, you can configure only RADIUS authentication, and have the RADIUS server determine who gets MFA or who does not, meaning&amp;nbsp;configure the MFA on the RADIUS server/Using DUO or some other MFA services on the account itself instead of having the gateway to do the MFA.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 06 May 2025 13:09:03 GMT</pubDate>
    <dc:creator>the_rock</dc:creator>
    <dc:date>2025-05-06T13:09:03Z</dc:date>
    <item>
      <title>How to hide internal IP networks attached to Security Gateways from the Mobile Access users</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-hide-internal-IP-networks-attached-to-Security-Gateways/m-p/248011#M48447</link>
      <description>&lt;P&gt;Hi Check Point colleagues,&lt;/P&gt;&lt;P&gt;We have configured remote access in a Security Gateway with 81.10. We followed the common steps creating users, groups, access rules, etc, and also configured a VPN Community with topology "Remote Access" and VPN Domain all internal networks that can be accessible from MA users. It is important to note that MA users can only access to networks allowed in the Access control policies that applied to each of them.&lt;/P&gt;&lt;P&gt;The problem is that any MA user connected to the SSL VPN can list all these VPN Domain networks just running "route print".&lt;/P&gt;&lt;P&gt;How can I hide VPN Domain networks from MA users and show only networks allowed in the policies?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advantage.&lt;/P&gt;</description>
      <pubDate>Fri, 02 May 2025 14:42:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-hide-internal-IP-networks-attached-to-Security-Gateways/m-p/248011#M48447</guid>
      <dc:creator>ramon_efca</dc:creator>
      <dc:date>2025-05-02T14:42:34Z</dc:date>
    </item>
    <item>
      <title>Re: How to hide internal IP networks attached to Security Gateways from the Mobile Access users</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-hide-internal-IP-networks-attached-to-Security-Gateways/m-p/248064#M48456</link>
      <description>&lt;P&gt;Change your VPN domain object and list only networks allowed by the policy and not all internal networks. Reinstall policy, then it should be okay.&lt;/P&gt;</description>
      <pubDate>Sun, 04 May 2025 15:28:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-hide-internal-IP-networks-attached-to-Security-Gateways/m-p/248064#M48456</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2025-05-04T15:28:35Z</dc:date>
    </item>
    <item>
      <title>Re: How to hide internal IP networks attached to Security Gateways from the Mobile Access users</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-hide-internal-IP-networks-attached-to-Security-Gateways/m-p/248068#M48457</link>
      <description>&lt;P&gt;What&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/181"&gt;@_Val_&lt;/a&gt;&amp;nbsp;said 100% makes perfect sense, thats what you need to do.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Sun, 04 May 2025 21:51:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-hide-internal-IP-networks-attached-to-Security-Gateways/m-p/248068#M48457</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-05-04T21:51:06Z</dc:date>
    </item>
    <item>
      <title>Re: How to hide internal IP networks attached to Security Gateways from the Mobile Access users</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-hide-internal-IP-networks-attached-to-Security-Gateways/m-p/248082#M48459</link>
      <description>&lt;P&gt;Thanks for your answers, but it is a little bit complex. We have 6 different user groups, with 6 different access roles. Each of these access roles has an specific policy to allow access to 6 different internal network ranges.&lt;/P&gt;&lt;P&gt;The problem I found is that I can only have one "Remote Access" VPN community, and only one VPN Domain associated to the participating Gateway. So I have to add the 6 different internal network ranges to this VPN Domain.&lt;/P&gt;</description>
      <pubDate>Mon, 05 May 2025 07:57:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-hide-internal-IP-networks-attached-to-Security-Gateways/m-p/248082#M48459</guid>
      <dc:creator>ramon_efca</dc:creator>
      <dc:date>2025-05-05T07:57:28Z</dc:date>
    </item>
    <item>
      <title>Re: How to hide internal IP networks attached to Security Gateways from the Mobile Access users</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-hide-internal-IP-networks-attached-to-Security-Gateways/m-p/248089#M48462</link>
      <description>&lt;P&gt;There was never a way to add more than one RA community, not possible.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Mon, 05 May 2025 10:35:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-hide-internal-IP-networks-attached-to-Security-Gateways/m-p/248089#M48462</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-05-05T10:35:40Z</dc:date>
    </item>
    <item>
      <title>Re: How to hide internal IP networks attached to Security Gateways from the Mobile Access users</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-hide-internal-IP-networks-attached-to-Security-Gateways/m-p/248141#M48483</link>
      <description>&lt;P&gt;All users who connect to your gateway will receive routes for all configured networks in your RemoteAccess encryption domain.&lt;BR /&gt;This is expected behavior at current.&lt;/P&gt;</description>
      <pubDate>Mon, 05 May 2025 21:34:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-hide-internal-IP-networks-attached-to-Security-Gateways/m-p/248141#M48483</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2025-05-05T21:34:03Z</dc:date>
    </item>
    <item>
      <title>Re: How to hide internal IP networks attached to Security Gateways from the Mobile Access users</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-hide-internal-IP-networks-attached-to-Security-Gateways/m-p/248143#M48484</link>
      <description>&lt;P&gt;I think its been that way since long time ago. Not sure what&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/129156"&gt;@ramon_efca&lt;/a&gt;&amp;nbsp;wants to do is even possible...&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Mon, 05 May 2025 21:45:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-hide-internal-IP-networks-attached-to-Security-Gateways/m-p/248143#M48484</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-05-05T21:45:49Z</dc:date>
    </item>
    <item>
      <title>Re: How to hide internal IP networks attached to Security Gateways from the Mobile Access users</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-hide-internal-IP-networks-attached-to-Security-Gateways/m-p/248167#M48488</link>
      <description>&lt;P&gt;OK, probably. This is my first time with Mobile Access. I have experience with other VPN SSL providers that you can define different "realms", with completely isolated accesses.&amp;nbsp;I thought the Check Point equivalent would be Remote Access VPN Communities, but if you can only have one, I see no alternatives.&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Tue, 06 May 2025 07:22:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-hide-internal-IP-networks-attached-to-Security-Gateways/m-p/248167#M48488</guid>
      <dc:creator>ramon_efca</dc:creator>
      <dc:date>2025-05-06T07:22:30Z</dc:date>
    </item>
    <item>
      <title>Re: How to hide internal IP networks attached to Security Gateways from the Mobile Access users</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-hide-internal-IP-networks-attached-to-Security-Gateways/m-p/248172#M48489</link>
      <description>&lt;P&gt;Yea, sorry, it was never possible to have more than one.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Tue, 06 May 2025 10:42:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-hide-internal-IP-networks-attached-to-Security-Gateways/m-p/248172#M48489</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-05-06T10:42:02Z</dc:date>
    </item>
    <item>
      <title>Re: How to hide internal IP networks attached to Security Gateways from the Mobile Access users</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-hide-internal-IP-networks-attached-to-Security-Gateways/m-p/248194#M48492</link>
      <description>&lt;P&gt;Hey Ramon,&lt;/P&gt;
&lt;P&gt;Just to make sure and please forgive me if Im way off here when I say this, but sounds like you want to do something along the lines where say different users can be assigned to different realms?&lt;/P&gt;
&lt;P&gt;This was the answer I got from TAC on January 6th 2022, but does not appear this is still possible.&lt;/P&gt;
&lt;P&gt;******************************&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Hello Andy,&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;After consulting with escalations,&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;assigning specific users to desired authentication method&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;in Check Point Multiple Login Options is not a supported feature yet, and there is already an existing RFE submitted for that.&amp;nbsp;However, you can configure only RADIUS authentication, and have the RADIUS server determine who gets MFA or who does not, meaning&amp;nbsp;configure the MFA on the RADIUS server/Using DUO or some other MFA services on the account itself instead of having the gateway to do the MFA.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 06 May 2025 13:09:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-hide-internal-IP-networks-attached-to-Security-Gateways/m-p/248194#M48492</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-05-06T13:09:03Z</dc:date>
    </item>
    <item>
      <title>Re: How to hide internal IP networks attached to Security Gateways from the Mobile Access users</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-hide-internal-IP-networks-attached-to-Security-Gateways/m-p/248201#M48495</link>
      <description>&lt;P&gt;Yes, I would like to create different isolated realms with different groups of users, and different internal network access. For example, if I want to have group1 with access to internal network1, and group2 with access to internal network2, I do not want that user1 from group1 could see network2 on his device (with SSL Network Extender client)&amp;nbsp; just executing "route print", and vice versa. But if I need to add network1 and network2 to the only VPN Domain that I can associate to the Gateway in the RA VPN Community, it seems that it could not be possible.&lt;/P&gt;&lt;P&gt;The answer you got is related to authentication method, but for me, in this case it is not a problem.&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Tue, 06 May 2025 14:03:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-hide-internal-IP-networks-attached-to-Security-Gateways/m-p/248201#M48495</guid>
      <dc:creator>ramon_efca</dc:creator>
      <dc:date>2025-05-06T14:03:07Z</dc:date>
    </item>
    <item>
      <title>Re: How to hide internal IP networks attached to Security Gateways from the Mobile Access users</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-hide-internal-IP-networks-attached-to-Security-Gateways/m-p/248208#M48497</link>
      <description>&lt;P&gt;K, got it.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Tue, 06 May 2025 15:22:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-hide-internal-IP-networks-attached-to-Security-Gateways/m-p/248208#M48497</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-05-06T15:22:37Z</dc:date>
    </item>
    <item>
      <title>Re: How to hide internal IP networks attached to Security Gateways from the Mobile Access users</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-hide-internal-IP-networks-attached-to-Security-Gateways/m-p/248227#M48501</link>
      <description>&lt;P&gt;With Traditional Mode VPN (deprecated in R60), I believe it actually was possible to do something like this.&lt;/P&gt;
&lt;P&gt;Note that you can still restrict access to the various subnets today, just not prevent the inaccessible subnets from showing up in the client's routing table.&lt;/P&gt;</description>
      <pubDate>Tue, 06 May 2025 17:03:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/How-to-hide-internal-IP-networks-attached-to-Security-Gateways/m-p/248227#M48501</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2025-05-06T17:03:03Z</dc:date>
    </item>
  </channel>
</rss>

