<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Checkpoint Sandblast Agent need to connect when in Roaming in Endpoint</title>
    <link>https://community.checkpoint.com/t5/Endpoint/Checkpoint-Sandblast-Agent-need-to-connect-when-in-Roaming/m-p/68796#M3198</link>
    <description>&lt;P&gt;If memory serves the process used to involve the creation of a psuedo dummy object for the public IP and manipulation of the following list (see below) but has been a while since I last used this method... would defer to the SK / TAC for confirming the current process.&lt;/P&gt;
&lt;P&gt;SmartEndpoint &amp;gt; Manage &amp;gt; Endpoint Servers &amp;gt; New&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 28 Nov 2019 11:13:05 GMT</pubDate>
    <dc:creator>Chris_Atkinson</dc:creator>
    <dc:date>2019-11-28T11:13:05Z</dc:date>
    <item>
      <title>Checkpoint Sandblast Agent need to connect when in Roaming</title>
      <link>https://community.checkpoint.com/t5/Endpoint/Checkpoint-Sandblast-Agent-need-to-connect-when-in-Roaming/m-p/68619#M3194</link>
      <description>&lt;P&gt;Hi Team,&lt;/P&gt;&lt;P&gt;Our requirement is to connect the Endpoint Security Management Server when the machine is outside of the organization. Like the machine should communicate to the Endpoint Management Server using public internet. So the Administrator able to see the live logs from the Management console.&lt;/P&gt;&lt;P&gt;Some Few &lt;STRONG&gt;Solution:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;1. We can deploy&amp;nbsp;Endpoint Security Management Server on Cloud. (Cloud Management for SandBlast Agent)(sk117536).&lt;/P&gt;&lt;P&gt;2. We can use Remote Access VPN to able to communicate with the Endpoint Management Server which required additional Checkpoint Security Gateway to establish a tunnel or we also use the third party remote VPN solution if the customer is not using CP security Gateway.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;The reason that not feasible the above solution for Some customer:-&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Reason 1:&amp;nbsp;&lt;/STRONG&gt;Customer is not ready to deploy on the cloud Because they already have enough resources to deploy&amp;nbsp;Endpoint Security Management Server On-premises.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Reason 2:&lt;/STRONG&gt; Most of the user are staying outside of the organization and also they don't have much idea that every time connects to the Endpoint Server using VPN.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;NOTE: Some of the other vendors such as Symantec is using one feature that&amp;nbsp;gives you an option to define the public IP on the Management Server console with any PORT as per our choice. Also, that same PORT needs to define allow on the Internet-facing Firewall with Static NAT configuration so if the customer is outside of the organization able to communicate with Server without the need of any VPN solution.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So My query is that, Is there any alternate solution that we able to communicate with the&amp;nbsp;Endpoint Management Server when on outside of the organization.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/25509"&gt;@Chinmaya_Naik&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 27 Nov 2019 10:26:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/Checkpoint-Sandblast-Agent-need-to-connect-when-in-Roaming/m-p/68619#M3194</guid>
      <dc:creator>Chinmaya_Naik</dc:creator>
      <dc:date>2019-11-27T10:26:31Z</dc:date>
    </item>
    <item>
      <title>Re: Checkpoint Sandblast Agent need to connect when in Roaming</title>
      <link>https://community.checkpoint.com/t5/Endpoint/Checkpoint-Sandblast-Agent-need-to-connect-when-in-Roaming/m-p/68621#M3195</link>
      <description>&lt;P&gt;I can only refer to the&amp;nbsp;Endpoint Security Administration Guide R80.30&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;/SPAN&gt;which states:&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Client to Server Communication&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;These services are used by the client to communicate with the Endpoint Policy Server or the Endpoint Security Management Server.&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;TABLE cellspacing="0" cellpadding="0"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD valign="top"&gt;
&lt;P&gt;The client is always the initiator of the connections. Service (Protocol/Port)&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD valign="top"&gt;
&lt;P&gt;Communication&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD valign="top"&gt;
&lt;P&gt;Notes&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD valign="top"&gt;
&lt;P&gt;HTTPS (TCP/443)&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD valign="top"&gt;
&lt;P&gt;Most communication is over HTTPS TLSv1.2 encryption.&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD valign="top"&gt;
&lt;P&gt;These are two examples:&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;• Endpoint registration&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;• New file encryption key retrieval&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD valign="top"&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;• Policy downloads&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD valign="top"&gt;
&lt;P&gt;The policy files themselves are encrypted with AES.&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD valign="top"&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;• Heartbeat&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD valign="top"&gt;
&lt;P&gt;A periodic client connection to the server. The client uses this connection to inform the server about changes in the policy status and compliance. You can configure the Heartbeat Interval (on page 21).&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD valign="top"&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;• Application Control queries&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD valign="top"&gt;
&lt;P&gt;These are queries for the reputation of unknown applications.&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD valign="top"&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;• Log uploads&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD valign="top"&gt;
&lt;P&gt;These connections send logs to the server.&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD valign="top"&gt;
&lt;P&gt;For more sensitive services, the payload is encrypted using a proprietary Check Point protocol.&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD valign="top"&gt;
&lt;P&gt;These are the encrypted sensitive services:&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;• Full Disk Encryption Recovery Data Upload&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;• Media Encryption &amp;amp; Port Protection Key Exchange&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;• Full Disk Encryption User Acquisition &amp;amp; User credentials.&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD&gt;&amp;nbsp;&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;TABLE cellspacing="0" cellpadding="0"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD valign="top"&gt;
&lt;P&gt;HTTP (TCP/80)&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD valign="top"&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;• Anti-Malware signature updates&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD valign="top"&gt;
&lt;P&gt;Verification is done by the engine before loading the signatures, and during the update process.&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD valign="top"&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;• Client package downloads&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD valign="top"&gt;
&lt;P&gt;The packages are signed and verified on the client before being installed.&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD valign="top"&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;• Synchronization&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD valign="top"&gt;
&lt;P&gt;These connections send client policy updates and send status, and module updates to the server.&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;These HTTP messages are encrypted using a proprietary Check Point encryption protocol.&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;</description>
      <pubDate>Wed, 27 Nov 2019 10:46:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/Checkpoint-Sandblast-Agent-need-to-connect-when-in-Roaming/m-p/68621#M3195</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2019-11-27T10:46:27Z</dc:date>
    </item>
    <item>
      <title>Re: Checkpoint Sandblast Agent need to connect when in Roaming</title>
      <link>https://community.checkpoint.com/t5/Endpoint/Checkpoint-Sandblast-Agent-need-to-connect-when-in-Roaming/m-p/68625#M3196</link>
      <description>&lt;P&gt;Have you considered deploying a separate Endpoint policy server in your DMZ?&lt;/P&gt;
&lt;P&gt;Refer also&amp;nbsp;&lt;SPAN&gt;sk112099 that talks to accessibility of the EPM via NAT.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 27 Nov 2019 11:21:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/Checkpoint-Sandblast-Agent-need-to-connect-when-in-Roaming/m-p/68625#M3196</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2019-11-27T11:21:27Z</dc:date>
    </item>
    <item>
      <title>Re: Checkpoint Sandblast Agent need to connect when in Roaming</title>
      <link>https://community.checkpoint.com/t5/Endpoint/Checkpoint-Sandblast-Agent-need-to-connect-when-in-Roaming/m-p/68791#M3197</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/3630"&gt;@Chris_Atkinson&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for the suggestion.&lt;/P&gt;&lt;P&gt;As far I know that, If I build a Management Server with Private IP address and then enable the Endpoint security blade and export the client package (Not Initial client) then when I installed the client on any&amp;nbsp;machine then&amp;nbsp; after installation Client try to communicate with IP address (Management Server Private IP address) So basically if I follow&amp;nbsp;&amp;nbsp;&lt;SPAN&gt;sk112099&amp;nbsp; did the same also then &lt;STRONG&gt;How the Client will try to communicate with the Public IP ?&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Endpoint Server is hosted behind the Firewall.&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;STRONG&gt;Workaround&lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Not Sure the below suggestion is recommended or not but work for me.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Step1: Create a static NAT for&amp;nbsp;Endpoint Management Server (Give a Static public IP) on the Internet-facing firewall.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Step2: Configure external NAT on Endpoint Management Server (sk112099).&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Step3: Change the Management Server&amp;nbsp; IP using Smartconsole and publish and don't install the database because its not possible because we change the IP address from private to public IP.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Step4: Close the SmartConsole and reopen the Smartconsole by using the Private IP address and you able to see the public IP address on the Smartconsole.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Step5: Open the Endpoint Management Console and create a new package and export the msi package.&lt;/P&gt;&lt;P&gt;Step6: Now installed that package on windows Machine and connect using public internet and able to communicate with the Endpoint Management Server.&lt;/P&gt;&lt;P&gt;Step7: Change the IP address of MGMT Server on Smart Console and able to install the Database.&lt;/P&gt;&lt;P&gt;Its work for me&amp;nbsp;&lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/25509"&gt;@Chinmaya_Naik&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 28 Nov 2019 11:04:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/Checkpoint-Sandblast-Agent-need-to-connect-when-in-Roaming/m-p/68791#M3197</guid>
      <dc:creator>Chinmaya_Naik</dc:creator>
      <dc:date>2019-11-28T11:04:45Z</dc:date>
    </item>
    <item>
      <title>Re: Checkpoint Sandblast Agent need to connect when in Roaming</title>
      <link>https://community.checkpoint.com/t5/Endpoint/Checkpoint-Sandblast-Agent-need-to-connect-when-in-Roaming/m-p/68796#M3198</link>
      <description>&lt;P&gt;If memory serves the process used to involve the creation of a psuedo dummy object for the public IP and manipulation of the following list (see below) but has been a while since I last used this method... would defer to the SK / TAC for confirming the current process.&lt;/P&gt;
&lt;P&gt;SmartEndpoint &amp;gt; Manage &amp;gt; Endpoint Servers &amp;gt; New&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 28 Nov 2019 11:13:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/Checkpoint-Sandblast-Agent-need-to-connect-when-in-Roaming/m-p/68796#M3198</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2019-11-28T11:13:05Z</dc:date>
    </item>
  </channel>
</rss>

