<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Block &amp;quot;IP Changed&amp;quot; Remote Access VPN in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Block-quot-IP-Changed-quot-Remote-Access-VPN/m-p/250608#M49004</link>
    <description>&lt;P&gt;Hello everyone, how are you?&lt;/P&gt;&lt;P&gt;We are trying to restrict access to the VPN to only a few countries. We have done a procedure to remove the Accept from the Implied Rule for port 80/443 (sk105740), allowing access only to a specific country, as follows:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="1.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/30693iEC6839965ECC2974/image-size/large?v=v2&amp;amp;px=999" role="button" title="1.png" alt="1.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;After that, a kernel parameter is required (fw ctl set int fw_ignore_before_drop_rules 1). The change is working, port 443 is used to create the connection on the Endpoint, if it is blocked in a country, the connection is not successful, great.&lt;/P&gt;&lt;P&gt;However, we came across an employee who uses a commercial VPN (ProtonVPN; UrbanVPN etc.) to go out with an IP from an allowed country, and so she connects to the Check Point VPN, and then she disconnects from the commercial VPN and Check Point maintains the connection via NAT-T (IPSec) and shows information in the logs of "IP Changed". We did this test in the lab:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/30694i8C97C9A559D1BF09/image-size/large?v=v2&amp;amp;px=999" role="button" title="2.png" alt="2.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;My question is, do you know of any way to block reconnection when an IP is changed? For example, make Check Point FW not maintain the connection as soon as the client's IP is changed.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 04 Jun 2025 14:17:37 GMT</pubDate>
    <dc:creator>fabionfsc</dc:creator>
    <dc:date>2025-06-04T14:17:37Z</dc:date>
    <item>
      <title>Block "IP Changed" Remote Access VPN</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Block-quot-IP-Changed-quot-Remote-Access-VPN/m-p/250608#M49004</link>
      <description>&lt;P&gt;Hello everyone, how are you?&lt;/P&gt;&lt;P&gt;We are trying to restrict access to the VPN to only a few countries. We have done a procedure to remove the Accept from the Implied Rule for port 80/443 (sk105740), allowing access only to a specific country, as follows:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="1.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/30693iEC6839965ECC2974/image-size/large?v=v2&amp;amp;px=999" role="button" title="1.png" alt="1.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;After that, a kernel parameter is required (fw ctl set int fw_ignore_before_drop_rules 1). The change is working, port 443 is used to create the connection on the Endpoint, if it is blocked in a country, the connection is not successful, great.&lt;/P&gt;&lt;P&gt;However, we came across an employee who uses a commercial VPN (ProtonVPN; UrbanVPN etc.) to go out with an IP from an allowed country, and so she connects to the Check Point VPN, and then she disconnects from the commercial VPN and Check Point maintains the connection via NAT-T (IPSec) and shows information in the logs of "IP Changed". We did this test in the lab:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/30694i8C97C9A559D1BF09/image-size/large?v=v2&amp;amp;px=999" role="button" title="2.png" alt="2.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;My question is, do you know of any way to block reconnection when an IP is changed? For example, make Check Point FW not maintain the connection as soon as the client's IP is changed.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 04 Jun 2025 14:17:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Block-quot-IP-Changed-quot-Remote-Access-VPN/m-p/250608#M49004</guid>
      <dc:creator>fabionfsc</dc:creator>
      <dc:date>2025-06-04T14:17:37Z</dc:date>
    </item>
    <item>
      <title>Re: Block "IP Changed" Remote Access VPN</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Block-quot-IP-Changed-quot-Remote-Access-VPN/m-p/250610#M49005</link>
      <description>&lt;P&gt;I really think there should be an option within SmartConsole (for example in Global Properties) to control this behavior, if there is no way to control it. I opened a ticket with TAC about it.&lt;/P&gt;</description>
      <pubDate>Wed, 04 Jun 2025 14:24:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Block-quot-IP-Changed-quot-Remote-Access-VPN/m-p/250610#M49005</guid>
      <dc:creator>fabionfsc</dc:creator>
      <dc:date>2025-06-04T14:24:40Z</dc:date>
    </item>
    <item>
      <title>Re: Block "IP Changed" Remote Access VPN</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Block-quot-IP-Changed-quot-Remote-Access-VPN/m-p/250611#M49006</link>
      <description>&lt;P&gt;Hey bro,&lt;/P&gt;
&lt;P&gt;Long time no talk, how are you?&lt;/P&gt;
&lt;P&gt;I thought about this and to me, logically, sounds like the only reasonable way to do it would be to block whatever app that perosn is using, because once they connect and get an IP that belongs to country thats allowed, not sure how would fw be able to block it, if that country is allowed by the rule.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Wed, 04 Jun 2025 14:32:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Block-quot-IP-Changed-quot-Remote-Access-VPN/m-p/250611#M49006</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-06-04T14:32:26Z</dc:date>
    </item>
    <item>
      <title>Re: Block "IP Changed" Remote Access VPN</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Block-quot-IP-Changed-quot-Remote-Access-VPN/m-p/250613#M49007</link>
      <description>&lt;P&gt;Hey bro, how long, are you okay?&lt;BR /&gt;&lt;BR /&gt;The Firewall even identifies this IP exchange, the issue is that it allows it, by some parameter that I don't know (maybe something in trac_client_1.ttm or in Control Connections Remote Access).&lt;/P&gt;&lt;P&gt;We also thought about this alternative that you suggested, a SCV (Secure Configuration Validation), which identifies VPN programs, the problem is that there are several VPNs of this kind, there are many software available to verify...)&lt;/P&gt;</description>
      <pubDate>Wed, 04 Jun 2025 14:41:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Block-quot-IP-Changed-quot-Remote-Access-VPN/m-p/250613#M49007</guid>
      <dc:creator>fabionfsc</dc:creator>
      <dc:date>2025-06-04T14:41:26Z</dc:date>
    </item>
    <item>
      <title>Re: Block "IP Changed" Remote Access VPN</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Block-quot-IP-Changed-quot-Remote-Access-VPN/m-p/250615#M49008</link>
      <description>&lt;P&gt;See if the post I made about it last year helps?&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.checkpoint.com/t5/Remote-Access-VPN/Geo-VPN-blocking/m-p/214040#M10593" target="_blank"&gt;https://community.checkpoint.com/t5/Remote-Access-VPN/Geo-VPN-blocking/m-p/214040#M10593&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 04 Jun 2025 14:44:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Block-quot-IP-Changed-quot-Remote-Access-VPN/m-p/250615#M49008</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-06-04T14:44:59Z</dc:date>
    </item>
    <item>
      <title>Re: Block "IP Changed" Remote Access VPN</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Block-quot-IP-Changed-quot-Remote-Access-VPN/m-p/250641#M49014</link>
      <description>&lt;P&gt;I'm trying to understand the flow here, so please confirm:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;End user connects with commercial VPN to get an IP in allowed country&lt;/LI&gt;
&lt;LI&gt;End user connects with Check Point VPN and connection is allowed (because it appears they are in an allowed country)&lt;/LI&gt;
&lt;LI&gt;End user disconnects from commercial VPN and connection is still permitted (from a different country IP)&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;I can see how that would be problematic.&lt;BR /&gt;I would engage with TAC on this.&lt;/P&gt;
&lt;P&gt;Meanwhile, as a workaround, you might try using:&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Security-Gateways/Block-VPN-Traffic-by-Country/m-p/172695#M31396" target="_blank"&gt;https://community.checkpoint.com/t5/Security-Gateways/Block-VPN-Traffic-by-Country/m-p/172695#M31396&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 04 Jun 2025 20:43:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Block-quot-IP-Changed-quot-Remote-Access-VPN/m-p/250641#M49014</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2025-06-04T20:43:37Z</dc:date>
    </item>
    <item>
      <title>Re: Block "IP Changed" Remote Access VPN</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Block-quot-IP-Changed-quot-Remote-Access-VPN/m-p/250645#M49016</link>
      <description>&lt;P&gt;Exactly! The VPN user connects to a commercial VPN to exit with an allowed IP in the 80/443 rules, then she connects to Check Point VPN; a tunnel in Visitor Mode (443) is created. The VPN user then disconnects from the commercial VPN, as there is a blocking rule on port 443, Check Point passes the connection to NAT-T and maintains the connection, with a "Reconnect" and an "IP Changed" information in the Logs &amp;amp; Monitor.&lt;/P&gt;&lt;P&gt;Thank you very much for sharing this information, indeed with fwaccel dos rate it can be a viable solution, I will test it right now, I hope it blocks the NAT-T port also for the countries I specify.&lt;/P&gt;</description>
      <pubDate>Wed, 04 Jun 2025 21:28:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Block-quot-IP-Changed-quot-Remote-Access-VPN/m-p/250645#M49016</guid>
      <dc:creator>fabionfsc</dc:creator>
      <dc:date>2025-06-04T21:28:42Z</dc:date>
    </item>
    <item>
      <title>Re: Block "IP Changed" Remote Access VPN</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Block-quot-IP-Changed-quot-Remote-Access-VPN/m-p/250648#M49018</link>
      <description>&lt;P&gt;Rules with country code are no longer supported... I tried to create a rule with Bypass for US and BR (Brazil), traffic is still blocked, the rule is no longer effective when it is made by country code. I can't see any other alternatives...&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="1.png" style="width: 865px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/30696i09B4A171EDC90B9D/image-size/large?v=v2&amp;amp;px=999" role="button" title="1.png" alt="1.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 04 Jun 2025 21:41:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Block-quot-IP-Changed-quot-Remote-Access-VPN/m-p/250648#M49018</guid>
      <dc:creator>fabionfsc</dc:creator>
      <dc:date>2025-06-04T21:41:12Z</dc:date>
    </item>
    <item>
      <title>Re: Block "IP Changed" Remote Access VPN</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Block-quot-IP-Changed-quot-Remote-Access-VPN/m-p/250649#M49019</link>
      <description>&lt;P&gt;I believe buddy that using updatable objects is the way to go...&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Wed, 04 Jun 2025 21:45:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Block-quot-IP-Changed-quot-Remote-Access-VPN/m-p/250649#M49019</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-06-04T21:45:32Z</dc:date>
    </item>
  </channel>
</rss>

