<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: What is wrong with Mobile Access in R80.10? in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/What-is-wrong-with-Mobile-Access-in-R80-10/m-p/29724#M97895</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Nope,I am getting no love from Mobile Access blade at all.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;SNX does not come up, no custom apps or even sample apps are displayed in the portal.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The Check Point Capsule VPN, SecuRemote and EndPoint Security VPN are working if installed locally on client machines.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 13 Feb 2018 22:43:10 GMT</pubDate>
    <dc:creator>Vladimir</dc:creator>
    <dc:date>2018-02-13T22:43:10Z</dc:date>
    <item>
      <title>What is wrong with Mobile Access in R80.10?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/What-is-wrong-with-Mobile-Access-in-R80-10/m-p/29721#M97892</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Well, third day deep diving into Mobile Access blade on R80.10 and here are the findings so far:&lt;/P&gt;&lt;P&gt;1. Mobile Portal does not work as intended. From Windows 10:&lt;/P&gt;&lt;P&gt;a. no native applications could be launched as SNX does not work using either Active-X or Java (at least on Windows 10 Pro).&lt;/P&gt;&lt;P&gt;b. no custom web applications appear in the portal as well, regardless of where they were defined in.&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="63040" class="image-1 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/63040_pastedImage_1.png" style="width: 620px; height: 445px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="63041" class="image-2 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/63041_pastedImage_2.png" style="width: 620px; height: 258px;" /&gt;&lt;/P&gt;&lt;P&gt;2. Multiple notification errors during policy installation or failure to install policy:&lt;/P&gt;&lt;P&gt;a. When GW rules are removed from the Mobile tab in SmartDashboard, still seeing:&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="63042" class="image-3 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/63042_pastedImage_3.png" style="width: auto; height: auto;" /&gt;&lt;/P&gt;&lt;P&gt;b. When mobile blade is removed from the gateway and the rule referring to it adjusted by replacing the gateway with "Installation Targets", still seeing this:&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="63043" class="jive-image image-4" src="https://community.checkpoint.com/legacyfs/online/checkpoint/63043_pastedImage_4.png" style="width: 620px; height: 279px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3. Mobile blade FTW, displays "Check Point Mobile for Windows" as one of the options for Desktop Clients, while Capsule VPN is only associated with "Mobile Devices":&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="63044" class="image-5 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/63044_pastedImage_5.png" style="width: 620px; height: 428px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Endless re-naming of and re-purposing the names for different types of clients is mind boggling.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any suggestions on how to make SSL VPN accessible, manageable and the portal to work as intended, regardless the version of the OS, browser etc.., preferably notifying users about any incompatibility issues and describing workarounds interactively?&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Feb 2018 17:54:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/What-is-wrong-with-Mobile-Access-in-R80-10/m-p/29721#M97892</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2018-02-13T17:54:48Z</dc:date>
    </item>
    <item>
      <title>Re: What is wrong with Mobile Access in R80.10?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/What-is-wrong-with-Mobile-Access-in-R80-10/m-p/29722#M97893</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Continuation of the previous post.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In a spirit of patience and perseverance, I've decided to take a look at the Jumbo HFA_Take70, that seem to contain the update for the Mobile Access blade:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;IMG class="image-1 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/63046_pastedImage_1.png" style="width: auto; height: auto;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With it deployed and caches of the browsers cleared, we are no further than we were: same missing mobile apps in the portal, same failure to install the SNX on the Windows 10, same missing compatibility notifications.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Following the breadcrumbs of SKs, links and redirects, arriving at this hotfix:&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-2 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/63047_pastedImage_2.png" style="width: 757px; height: 248px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It being four months older than the Take 70, I would hope to see it included, but alas, it was not.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So with the hotfix installed, hope rekindled anew, going through the process again:&lt;/P&gt;&lt;P&gt;Now, when attempting to execute downloaded Mobile Access Deployment Agent:&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-3 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/63048_pastedImage_3.png" style="width: auto; height: auto;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-6 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/63051_pastedImage_6.png" style="width: auto; height: auto;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-5 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/63050_pastedImage_5.png" style="width: auto; height: auto;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And... that's it. We are greeted with all too familiar:&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-7 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/63052_pastedImage_7.png" style="width: 620px; height: 272px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The hotfix has mentioned Chrome, so let's give it a try:&lt;/P&gt;&lt;P&gt;Upon clicking "Connect", we are prompted with:&lt;/P&gt;&lt;P&gt;&lt;IMG class="jive-image image-8" src="https://community.checkpoint.com/legacyfs/online/checkpoint/63053_pastedImage_8.png" style="width: auto; height: auto;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After we are agreeing to "Trust server":&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-9 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/63054_pastedImage_9.png" style="width: auto; height: auto;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With "Continue Anyway" clicked:&lt;/P&gt;&lt;P&gt;&lt;IMG class="jive-image image-10" src="https://community.checkpoint.com/legacyfs/online/checkpoint/63055_pastedImage_10.png" style="width: auto; height: auto;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And "Yes" and...:&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-11 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/63056_pastedImage_11.png" style="width: 620px; height: 311px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;No &lt;img id="smileysad" class="emoticon emoticon-smileysad" src="https://community.checkpoint.com/i/smilies/16x16_smiley-sad.png" alt="Smiley Sad" title="Smiley Sad" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Needless to say, I've parked the planned demo for the client until some light could be shed on this uncooperative feature.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Your input is, as always, welcome.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Feb 2018 22:16:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/What-is-wrong-with-Mobile-Access-in-R80-10/m-p/29722#M97893</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2018-02-13T22:16:31Z</dc:date>
    </item>
    <item>
      <title>Re: What is wrong with Mobile Access in R80.10?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/What-is-wrong-with-Mobile-Access-in-R80-10/m-p/29723#M97894</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So does the SNX client even come up at all?&lt;/P&gt;&lt;P&gt;I can gather the portal isn't showing anything from your screenshots...&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Feb 2018 22:37:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/What-is-wrong-with-Mobile-Access-in-R80-10/m-p/29723#M97894</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-02-13T22:37:14Z</dc:date>
    </item>
    <item>
      <title>Re: What is wrong with Mobile Access in R80.10?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/What-is-wrong-with-Mobile-Access-in-R80-10/m-p/29724#M97895</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Nope,I am getting no love from Mobile Access blade at all.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;SNX does not come up, no custom apps or even sample apps are displayed in the portal.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The Check Point Capsule VPN, SecuRemote and EndPoint Security VPN are working if installed locally on client machines.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Feb 2018 22:43:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/What-is-wrong-with-Mobile-Access-in-R80-10/m-p/29724#M97895</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2018-02-13T22:43:10Z</dc:date>
    </item>
    <item>
      <title>Re: What is wrong with Mobile Access in R80.10?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/What-is-wrong-with-Mobile-Access-in-R80-10/m-p/29725#M97896</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Vladimir,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I agree that so much customization is required on client machine for Mobile access SSL VPN. I have recently installed for one of customer. I had also issue with Windows 10 Laptop but here we have R77.30. Please install deployment version 7.01.0000, may be it will resolve the issue.&lt;/P&gt;&lt;P&gt;&lt;IMG alt="" class="image-1 jive-image j-img-original" src="https://community.checkpoint.com/legacyfs/online/checkpoint/63061_Capture1.JPG" style="height: auto;" /&gt;&lt;/P&gt;&lt;P&gt;For more information refer below.&lt;/P&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://community.checkpoint.com/docs/DOC-2613-ssl-vpn-network-extender-issue"&gt;https://community.checkpoint.com/docs/DOC-2613-ssl-vpn-network-extender-issue&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 14 Feb 2018 14:08:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/What-is-wrong-with-Mobile-Access-in-R80-10/m-p/29725#M97896</guid>
      <dc:creator>Gaurav_Pandya</dc:creator>
      <dc:date>2018-02-14T14:08:45Z</dc:date>
    </item>
    <item>
      <title>Re: What is wrong with Mobile Access in R80.10?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/What-is-wrong-with-Mobile-Access-in-R80-10/m-p/29726#M97897</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you Gaurav, I'll give it a shot.&lt;/P&gt;&lt;P&gt;My problem, besides the ability launch&amp;nbsp;client, is the fact that the portal does not display any of the apps configured either in Unified Policy or the SmartDashboard's Mobile tab.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've even re-build the gateway on the odd chance that something was wrong with it, but it made no difference.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 14 Feb 2018 21:57:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/What-is-wrong-with-Mobile-Access-in-R80-10/m-p/29726#M97897</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2018-02-14T21:57:19Z</dc:date>
    </item>
    <item>
      <title>Re: What is wrong with Mobile Access in R80.10?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/What-is-wrong-with-Mobile-Access-in-R80-10/m-p/29727#M97898</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok Vladimir,&lt;/P&gt;&lt;P&gt;Just try with this deployment agent and let me know result.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 15 Feb 2018 09:47:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/What-is-wrong-with-Mobile-Access-in-R80-10/m-p/29727#M97898</guid>
      <dc:creator>Gaurav_Pandya</dc:creator>
      <dc:date>2018-02-15T09:47:39Z</dc:date>
    </item>
    <item>
      <title>Re: What is wrong with Mobile Access in R80.10?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/What-is-wrong-with-Mobile-Access-in-R80-10/m-p/29728#M97899</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No dice:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is the version that is installed on Windows 10. From Control Panel/Apps and Features:&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-1 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/63088_pastedImage_1.png" style="width: auto; height: auto;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When attempting to run the slimsvc.exe executable on Windows from "C:\Program Files (x86)\CheckPoint\SSL Network Extender", it is failing with redirect to:&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-2 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/63090_pastedImage_3.png" style="width: 786px; height: 501px;" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 15 Feb 2018 12:54:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/What-is-wrong-with-Mobile-Access-in-R80-10/m-p/29728#M97899</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2018-02-15T12:54:25Z</dc:date>
    </item>
    <item>
      <title>Re: What is wrong with Mobile Access in R80.10?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/What-is-wrong-with-Mobile-Access-in-R80-10/m-p/29729#M97900</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Oh This is strange..&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 15 Feb 2018 18:01:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/What-is-wrong-with-Mobile-Access-in-R80-10/m-p/29729#M97900</guid>
      <dc:creator>Gaurav_Pandya</dc:creator>
      <dc:date>2018-02-15T18:01:42Z</dc:date>
    </item>
    <item>
      <title>Re: What is wrong with Mobile Access in R80.10?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/What-is-wrong-with-Mobile-Access-in-R80-10/m-p/29730#M97901</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have spent much of today on the same mission as you: converting an R77.30 Mobile Blade policy to an R80.10&amp;nbsp;unified policy.&amp;nbsp;Overall it went well, all VPN rules are migrated and this site now has the blissful situation of a list of rules, in one policy, using access roles, mixing radius, AD and local Check Point user groups and controlling which clients (SSL extender, Endpoint, mobile etc. as part of the role in the rule. We were particularly pleased to be able to define destinations and applications all in the access rule-base and to be able to use network objects rather than the 'IP ranges' that one was forced to define in the now very legacy mobile blade. Introducing all of this to a new end user administrator now make so much more sense, it really was a ridiculous situation we have been in for the last 5 or 6 years!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My next bit of fun will be to look at the mix of Identity Awareness, generic*, 3rd party radius, local groups and LDAP groups to see if the exciting new &lt;EM&gt;Multiple Authentication Clients Setting&lt;/EM&gt;s (there may be a need for an apostrophe or one fewer&amp;nbsp;plural in that window title) can enable me to provide a more coherent authentication offering to the users.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now, for &lt;EM&gt;their&lt;/EM&gt; next trick, Check Point MUST MUST MUST deal with the ridiculous client-sprawl, crazy nomenclature and licencing hell to which you allude in your original post!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;At this point there are two issues that we share:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;1. All legacy mobile rules have been removed,&lt;/STRONG&gt; yet I still get this on policy install just like yours:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-1 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/63107_pastedImage_1.png" style="width: auto; height: auto;" /&gt;&lt;/P&gt;&lt;P&gt;I've been scouting about for anything in KB articles, documentation and here but I have found nothing about this. I am thinking that I'd like to remove the 'shared policy' entirely but a few docs have hinted that there are still Mobile Policy elements configured in the 'legacy' policy - that said, I cannot find out which or what!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;2. Where do all the published applications go?&lt;/STRONG&gt; Silicon Heaven perhaps?&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-3 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/63109_pastedImage_3.png" style="width: 440px; height: 186px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In this case the screenshot is taken on a Windows 7 client using Internet Explorer.&lt;/P&gt;&lt;P&gt;So, any Chrome, Firefox, Windows 10 or Java concerns are moot at this point (IMHO).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just in case anyone who is about to do this job is reading this and having a go without reading the documentation in detail the key to making the switch-over is this setting in the gateway (cluster) object:&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-2 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/63108_pastedImage_2.png" style="width: auto; height: auto;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For the record, this is my favorite new element of this, and worth all the pain...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG class="jive-image image-4" src="https://community.checkpoint.com/legacyfs/online/checkpoint/63110_pastedImage_11.png" style="width: auto; height: auto;" /&gt;&lt;/P&gt;&lt;P&gt;All of the client types are available in here and we can simply pick nd choose which any given role (thus rule) will use - brilliant and not before time!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 15 Feb 2018 21:52:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/What-is-wrong-with-Mobile-Access-in-R80-10/m-p/29730#M97901</guid>
      <dc:creator>John_Fenoughty</dc:creator>
      <dc:date>2018-02-15T21:52:07Z</dc:date>
    </item>
    <item>
      <title>Re: What is wrong with Mobile Access in R80.10?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/What-is-wrong-with-Mobile-Access-in-R80-10/m-p/29731#M97902</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;BLOCKQUOTE class="jive_macro_quote jive-quote jive_text_macro"&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;1. All legacy mobile rules have been removed,&lt;/STRONG&gt; yet I still get this on policy install just like yours:&lt;/P&gt;&lt;P style="min-height: 8pt; padding: 0px;"&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-1 jive-image" height="110" src="https://community.checkpoint.com/legacyfs/online/checkpoint/63116_pastedImage_1.png" style="width: auto; height: auto;" width="587" /&gt;&lt;/P&gt;&lt;P&gt;I've been scouting about for anything in KB articles, documentation and here but I have found nothing about this. I am thinking that I'd like to remove the 'shared policy' entirely but a few docs have hinted that there are still Mobile Policy elements configured in the 'legacy' policy - that said, I cannot find out which or what!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;This is a UX bug, as was noted previously in this thread.&lt;/P&gt;&lt;BLOCKQUOTE class="jive_macro_quote jive-quote jive_text_macro"&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px; font-size: 14px;"&gt;For the record, this is my favorite new element of this, and worth all the pain...&lt;/P&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px; font-size: 14px;"&gt;&lt;IMG class="jive-image image-4" height="277" src="https://community.checkpoint.com/legacyfs/online/checkpoint/63117_pastedImage_11.png" style="border: 0px; font-weight: inherit; font-size: 14px; margin: 10px 10px 10px 0px;" width="602" /&gt;&lt;/P&gt;&lt;P style="color: #333333; background-color: #ffffff; border: 0px; font-size: 14px;"&gt;All of the client types are available in here and we can simply pick nd choose which any given role (thus rule) will use - brilliant and not before time!&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Got to say, I was not aware of this one.&lt;/P&gt;&lt;P&gt;That said, it's been the SecuRemote days (pre Connectra/Mobile Access Blade) since I spent any serious time with the Remote Access features.&lt;/P&gt;&lt;P&gt;And agree: nice feature &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 15 Feb 2018 22:44:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/What-is-wrong-with-Mobile-Access-in-R80-10/m-p/29731#M97902</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-02-15T22:44:49Z</dc:date>
    </item>
    <item>
      <title>Re: What is wrong with Mobile Access in R80.10?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/What-is-wrong-with-Mobile-Access-in-R80-10/m-p/29732#M97903</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yep, this feature is certainly nice. It would've been nicer if the Mobile Portal would've actually listed published applications &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;P&gt;Can you, maybe, give a swift hmm.. poke to the R&amp;amp;D team responsible for it?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 15 Feb 2018 22:59:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/What-is-wrong-with-Mobile-Access-in-R80-10/m-p/29732#M97903</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2018-02-15T22:59:19Z</dc:date>
    </item>
    <item>
      <title>Re: What is wrong with Mobile Access in R80.10?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/What-is-wrong-with-Mobile-Access-in-R80-10/m-p/29733#M97904</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If it's any consolation, I'm now digging into this, trying to set it up.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm kind of at the same point: I can't get apps to show up in the Web Portal either.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One question: do you have explicit rules in your policy allowing access to these&amp;nbsp;web apps?&lt;/P&gt;&lt;P&gt;i.e. something like:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-1 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/63119_pastedImage_2.png" style="width: 620px; height: 44px;" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Feb 2018 00:17:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/What-is-wrong-with-Mobile-Access-in-R80-10/m-p/29733#M97904</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-02-16T00:17:14Z</dc:date>
    </item>
    <item>
      <title>Re: What is wrong with Mobile Access in R80.10?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/What-is-wrong-with-Mobile-Access-in-R80-10/m-p/29734#M97905</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have a combo rule for the web and native apps:&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-1 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/63120_pastedImage_1.png" style="width: 1134px; height: 128px;" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Feb 2018 00:31:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/What-is-wrong-with-Mobile-Access-in-R80-10/m-p/29734#M97905</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2018-02-16T00:31:04Z</dc:date>
    </item>
    <item>
      <title>Re: What is wrong with Mobile Access in R80.10?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/What-is-wrong-with-Mobile-Access-in-R80-10/m-p/29735#M97906</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi &lt;A href="https://community.checkpoint.com/migrated-users/47844"&gt;Vladimir Yakovlev&lt;/A&gt;&amp;nbsp;and&amp;nbsp;&lt;A href="https://community.checkpoint.com/migrated-users/2075"&gt;Dameon Welch Abernathy&lt;/A&gt;‌,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please check section &lt;A href="https://sc1.checkpoint.com/documents/R80.10/WebAdminGuides/EN/CP_R80.10_MobileAccess_AdminGuide/158353.htm#o160068"&gt;"Best Practices for Rule Order"&lt;/A&gt;&amp;nbsp;in Mobile Access Admin Guide:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"In the Unified Access Control Policy, put Mobile Access rules that authorize applications above rules that contain a related service. For example, put a rule to allow a web application above a rule that allows or blocks HTTP/HTTPS. If the HTTP/HTTPS rule is first, the user will not see the Mobile Access Web application in the portal or in Capsule Workspace and will not be able to access it.&lt;/P&gt;&lt;P class="" style="color: #333333; background-color: inherit; text-decoration: none; margin: 6pt 0pt; padding: 0pt;"&gt;For example, this Rule Base allows Outlook Web Access (OWA), a web-based Mobile Access application. It also allows HTTPS traffic.&lt;/P&gt;&lt;P class="" style="color: #333333; background-color: inherit; text-decoration: none; margin: 6pt 0pt; padding: 0pt;"&gt;Correct way to allow the HTTPS service and also Mobile Access HTTPS applications:&lt;/P&gt;&lt;P class="" style="color: #333333; background-color: inherit; text-decoration: none; margin: 6pt 0pt; padding: 0pt;"&gt;&lt;IMG class="image-1 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/63125_pastedImage_1.png" /&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;Rule 2.1, that allows access to Mobile Access applications, including Outlook Web Access (OWA) on HTTPS, is above rule 3, which allows all HTTPS traffic.&lt;BR /&gt;&lt;STRONG&gt;If you put rule 3 to allow HTTPS above the Mobile Access rules, the user will not see the OWA Web application in the portal or in Capsule Workspace and will not be able to access it.&lt;/STRONG&gt; To authorize a Mobile Access application, you must use a Mobile Access application in the Services &amp;amp; Applications column.&lt;BR /&gt;You can use HTTPS in the parent rule of the Mobile Access Inline Layer, but specify the Mobile Access application inside the Inline Layer. That way, the HTTPS traffic for OWA, for example, will match on the HTTPS rule, and will also match on the OWA App inside the Inline Layer. "&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also from the&amp;nbsp;&amp;nbsp;&lt;A href="https://sc1.checkpoint.com/documents/R80.10/WebAdminGuides/EN/CP_R80.10_MobileAccess_AdminGuide/158353.htm#o158355"&gt;"Limitations for Mobile Access in the Unified Policy"&lt;/A&gt;&amp;nbsp;section:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"If users do not meet the defined Protection Level requirements for an application, the application does not show for them. This is true in the Mobile Access portal and Capsule Workspace. (In the Legacy Mobile Access policy, the applications show but are disabled)."&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope this may help you&amp;nbsp;&lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Alexander Sazonov&lt;/P&gt;&lt;P&gt;EA&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Feb 2018 05:45:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/What-is-wrong-with-Mobile-Access-in-R80-10/m-p/29735#M97906</guid>
      <dc:creator>Alex_Sazonov</dc:creator>
      <dc:date>2018-02-16T05:45:35Z</dc:date>
    </item>
    <item>
      <title>Re: What is wrong with Mobile Access in R80.10?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/What-is-wrong-with-Mobile-Access-in-R80-10/m-p/29736#M97907</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;So this raises a question. &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;P&gt;In my application, I have set the Security Requirements to be "This application relies on the security requirements of the gateway."&lt;/P&gt;&lt;P&gt;Which I assume means "if I can access the Web Portal, I can access this application."&lt;/P&gt;&lt;P&gt;I've also moved my rules up to the very top of the rulebase and there are rules below that would permit the traffic from the gateway to the destination server:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-1 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/63124_pastedImage_2.png" style="width: 620px; height: 82px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Funny enough, the SMB entry shows on the portal, but doesn't work because my Samba server isn't configured to allow NTLMv1 logins &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;P&gt;Only the "Jekyll" web application doesn't show.&lt;/P&gt;&lt;P&gt;How can I debug this?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Feb 2018 06:48:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/What-is-wrong-with-Mobile-Access-in-R80-10/m-p/29736#M97907</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-02-16T06:48:09Z</dc:date>
    </item>
    <item>
      <title>Re: What is wrong with Mobile Access in R80.10?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/What-is-wrong-with-Mobile-Access-in-R80-10/m-p/29737#M97908</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Alexander,&lt;/P&gt;&lt;P&gt;Thank you for bringing the sequencing to my attention.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've tried following the steps described in the "Best Practice for Rule Order" document and, as Dameon did, build the policy from scratch placing pertinent rules on top:&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-1 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/63166_pastedImage_1.png" style="width: 739px; height: 441px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Two apps that did show-up in the portal are the webapps configured with pointers to DNS names of the targets:&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-2 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/63167_pastedImage_2.png" style="width: 373px; height: 345px;" /&gt;&amp;nbsp;&lt;IMG class="image-3 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/63168_pastedImage_3.png" style="width: 326px; height: 294px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The one that is missing, was pointed to a dummy host object:&lt;/P&gt;&lt;P&gt;&lt;IMG class="jive-image image-4" src="https://community.checkpoint.com/legacyfs/online/checkpoint/63169_pastedImage_4.png" style="width: 377px; height: 349px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So, for now, the situation as I see it:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. We cannot verify validity of the applications when creating them&lt;/P&gt;&lt;P&gt;2. We cannot verify validity of the MAB rules&lt;/P&gt;&lt;P&gt;3. There is a difference in treatment of DNS-based targets and Object-based targets&lt;/P&gt;&lt;P&gt;4. We cannot see "Native" applications in the portal, because we cannot launch SNX from Windows 10 (at least)&lt;/P&gt;&lt;P&gt;5. There is no mechanism in the portal that allow distribution of other (may be pre-configured) endpoint VPN clients&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Dameon, can you tell me if you got any further with your tests?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 17 Feb 2018 17:05:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/What-is-wrong-with-Mobile-Access-in-R80-10/m-p/29737#M97908</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2018-02-17T17:05:08Z</dc:date>
    </item>
    <item>
      <title>Re: What is wrong with Mobile Access in R80.10?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/What-is-wrong-with-Mobile-Access-in-R80-10/m-p/29738#M97909</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I haven't gotten any farther, but you're doing a few things I haven't tried yet--something to play with later.&lt;/P&gt;&lt;P&gt;The MAB portal will only distribute SNX client, not others.&lt;/P&gt;&lt;P&gt;I suppose you could put them on an internal webserver and server THAT up through the MAB web portal.&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 17 Feb 2018 18:36:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/What-is-wrong-with-Mobile-Access-in-R80-10/m-p/29738#M97909</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-02-17T18:36:24Z</dc:date>
    </item>
    <item>
      <title>Re: What is wrong with Mobile Access in R80.10?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/What-is-wrong-with-Mobile-Access-in-R80-10/m-p/29739#M97910</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Well, that's an idea. We could call the web app "Windows 10 users click here" to get them to the source files.&lt;/P&gt;&lt;P&gt;Still small probability that they'll do that because well, users.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Would be nice to have:&lt;/P&gt;&lt;P&gt;1. OS detection and redirect to a different view of a portal&lt;/P&gt;&lt;P&gt;2. Built-in Guacamole with SSO (may have to work-out my own integration for it).&lt;/P&gt;&lt;P&gt;3. Portal customization to remove current "Native Application" option&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 17 Feb 2018 18:51:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/What-is-wrong-with-Mobile-Access-in-R80-10/m-p/29739#M97910</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2018-02-17T18:51:28Z</dc:date>
    </item>
    <item>
      <title>Re: What is wrong with Mobile Access in R80.10?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/What-is-wrong-with-Mobile-Access-in-R80-10/m-p/29740#M97911</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Vladimir,&lt;/P&gt;&lt;P&gt;You can achieve first point with Endpoint security on demand --&amp;gt; Compliance check. You can put condition with Windows 10 OS and redirect to particular URL.&lt;/P&gt;&lt;P&gt;Also you can do Portal customization on Portal Settings.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 18 Feb 2018 09:59:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/What-is-wrong-with-Mobile-Access-in-R80-10/m-p/29740#M97911</guid>
      <dc:creator>Gaurav_Pandya</dc:creator>
      <dc:date>2018-02-18T09:59:09Z</dc:date>
    </item>
  </channel>
</rss>

