<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: E84.20.6108 Remote Access VPN-Blade wrong DNS (no traffic split) in Endpoint</title>
    <link>https://community.checkpoint.com/t5/Endpoint/E84-20-6108-Remote-Access-VPN-Blade-wrong-DNS-no-traffic-split/m-p/107289#M3845</link>
    <description>&lt;P&gt;We noticed this issue to be related to when the wifi and check point adaptor have the same interface metric.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Paul_Starr_0-1610106340746.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/10116iA0D775742BB00D4A/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Paul_Starr_0-1610106340746.png" alt="Paul_Starr_0-1610106340746.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;*ethernet 2 being Check Point VPN&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have been able to work around this issue by changing the priority of the Check Point Interface either by changing the Check Point adaptor to a lower number, making it priority when connected via PS command or GUI change:&amp;nbsp;&lt;/P&gt;&lt;P&gt;Set-NetIPInterface -InterfaceIndex 19 -InterfaceMetric 10&amp;nbsp;&lt;/P&gt;&lt;P&gt;--- Where Index is the Index number seen in Get-NetIPInterface.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Or via the GUI by&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Change Adapter Settings&lt;/LI&gt;&lt;LI&gt;Ethernet2 (Or whichever interface is configured as the Check Point VPN interface)&lt;/LI&gt;&lt;LI&gt;IPv4 &amp;gt; Properties&lt;/LI&gt;&lt;LI&gt;Advanced &amp;gt; Interface Metric&lt;/LI&gt;&lt;/UL&gt;</description>
    <pubDate>Fri, 08 Jan 2021 11:54:50 GMT</pubDate>
    <dc:creator>Paul_Starr</dc:creator>
    <dc:date>2021-01-08T11:54:50Z</dc:date>
    <item>
      <title>E84.20.6108 Remote Access VPN-Blade wrong DNS (no traffic split)</title>
      <link>https://community.checkpoint.com/t5/Endpoint/E84-20-6108-Remote-Access-VPN-Blade-wrong-DNS-no-traffic-split/m-p/104513#M2816</link>
      <description>&lt;P&gt;Hello all,&lt;/P&gt;&lt;P&gt;I have the following problem:&lt;/P&gt;&lt;P&gt;When a user connects his laptop via his private WiFi AP to the corporate network, everything is fine. If he uses his private wird LAN, he can access resources in our network via IP, but not DNS based. If he connects a additional network adapter via USB it works over this adapter.&amp;nbsp;&lt;/P&gt;&lt;P&gt;When I have a look into the DNS cache I can see that the DNS resolution is done against our public DNS server (which does not cover most of our internal resources). As we do not use the traffic split feature, all traffic should be routed through the tunnel.&lt;/P&gt;&lt;P&gt;This behavior is reproducible and can be found by several of my test users with&amp;nbsp;E84.20.6108.&lt;/P&gt;&lt;P&gt;E83.30 has no problem with that.&lt;/P&gt;&lt;P&gt;Thanks a lot&lt;/P&gt;&lt;P&gt;Karl-Hermann&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 07 Dec 2020 14:49:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/E84-20-6108-Remote-Access-VPN-Blade-wrong-DNS-no-traffic-split/m-p/104513#M2816</guid>
      <dc:creator>Karl-Hermann</dc:creator>
      <dc:date>2020-12-07T14:49:04Z</dc:date>
    </item>
    <item>
      <title>Re: E84.20.6108 Remote Access VPN-Blade wrong DNS (no traffic split)</title>
      <link>https://community.checkpoint.com/t5/Endpoint/E84-20-6108-Remote-Access-VPN-Blade-wrong-DNS-no-traffic-split/m-p/104699#M2827</link>
      <description>&lt;P&gt;Have you opened a TAC case here?&lt;/P&gt;</description>
      <pubDate>Tue, 08 Dec 2020 19:26:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/E84-20-6108-Remote-Access-VPN-Blade-wrong-DNS-no-traffic-split/m-p/104699#M2827</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-12-08T19:26:21Z</dc:date>
    </item>
    <item>
      <title>Re: E84.20.6108 Remote Access VPN-Blade wrong DNS (no traffic split)</title>
      <link>https://community.checkpoint.com/t5/Endpoint/E84-20-6108-Remote-Access-VPN-Blade-wrong-DNS-no-traffic-split/m-p/104757#M2830</link>
      <description>&lt;P&gt;I am sorry, but no. We have no direct support&amp;nbsp;@ CP. It will be done via our managed service and their wholesaler.&lt;/P&gt;</description>
      <pubDate>Wed, 09 Dec 2020 10:50:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/E84-20-6108-Remote-Access-VPN-Blade-wrong-DNS-no-traffic-split/m-p/104757#M2830</guid>
      <dc:creator>Karl-Hermann</dc:creator>
      <dc:date>2020-12-09T10:50:14Z</dc:date>
    </item>
    <item>
      <title>Re: E84.20.6108 Remote Access VPN-Blade wrong DNS (no traffic split)</title>
      <link>https://community.checkpoint.com/t5/Endpoint/E84-20-6108-Remote-Access-VPN-Blade-wrong-DNS-no-traffic-split/m-p/104802#M2831</link>
      <description>&lt;P&gt;Recommend having them do so.&lt;BR /&gt;I know there was at least an issue with the client disconnecting in this release that is fixed in the upcoming E84.30 which is due out shortly.&lt;/P&gt;</description>
      <pubDate>Wed, 09 Dec 2020 16:09:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/E84-20-6108-Remote-Access-VPN-Blade-wrong-DNS-no-traffic-split/m-p/104802#M2831</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-12-09T16:09:52Z</dc:date>
    </item>
    <item>
      <title>Re: E84.20.6108 Remote Access VPN-Blade wrong DNS (no traffic split)</title>
      <link>https://community.checkpoint.com/t5/Endpoint/E84-20-6108-Remote-Access-VPN-Blade-wrong-DNS-no-traffic-split/m-p/106754#M3813</link>
      <description>&lt;P&gt;We are actually experiencing this issue on E84.30 in our environment.&amp;nbsp; It is not everyone and seems to be isolated to a specific ISP (which doesn't make much sense), but older versions were working, and if we manually roll back versions to say E83.00 for example, it works without issue.&amp;nbsp; It is just not in the cards to roll back 600+ users manually.&lt;/P&gt;&lt;P&gt;We have opened a TAC case for this, so we will see what they say.&lt;/P&gt;&lt;P&gt;We were in the process of upgrading folks from older about to be un-supported versions, and now we are having this issue.&lt;/P&gt;&lt;P&gt;If anyone has any insight while we wait for a resolution from them, please let me know.&lt;/P&gt;</description>
      <pubDate>Thu, 31 Dec 2020 19:17:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/E84-20-6108-Remote-Access-VPN-Blade-wrong-DNS-no-traffic-split/m-p/106754#M3813</guid>
      <dc:creator>gkaufman</dc:creator>
      <dc:date>2020-12-31T19:17:37Z</dc:date>
    </item>
    <item>
      <title>Re: E84.20.6108 Remote Access VPN-Blade wrong DNS (no traffic split)</title>
      <link>https://community.checkpoint.com/t5/Endpoint/E84-20-6108-Remote-Access-VPN-Blade-wrong-DNS-no-traffic-split/m-p/107077#M3829</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;
&lt;P&gt;We are familiar with the DNS issue over LAN and have a fixed version for E84.20.&lt;/P&gt;
&lt;P&gt;We are also currently working on a fix for E84.30.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please create a Service Request and we'll provide the package.&lt;/P&gt;</description>
      <pubDate>Tue, 05 Jan 2021 17:55:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/E84-20-6108-Remote-Access-VPN-Blade-wrong-DNS-no-traffic-split/m-p/107077#M3829</guid>
      <dc:creator>Amir-Yacoby</dc:creator>
      <dc:date>2021-01-05T17:55:01Z</dc:date>
    </item>
    <item>
      <title>Re: E84.20.6108 Remote Access VPN-Blade wrong DNS (no traffic split)</title>
      <link>https://community.checkpoint.com/t5/Endpoint/E84-20-6108-Remote-Access-VPN-Blade-wrong-DNS-no-traffic-split/m-p/107289#M3845</link>
      <description>&lt;P&gt;We noticed this issue to be related to when the wifi and check point adaptor have the same interface metric.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Paul_Starr_0-1610106340746.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/10116iA0D775742BB00D4A/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Paul_Starr_0-1610106340746.png" alt="Paul_Starr_0-1610106340746.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;*ethernet 2 being Check Point VPN&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have been able to work around this issue by changing the priority of the Check Point Interface either by changing the Check Point adaptor to a lower number, making it priority when connected via PS command or GUI change:&amp;nbsp;&lt;/P&gt;&lt;P&gt;Set-NetIPInterface -InterfaceIndex 19 -InterfaceMetric 10&amp;nbsp;&lt;/P&gt;&lt;P&gt;--- Where Index is the Index number seen in Get-NetIPInterface.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Or via the GUI by&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Change Adapter Settings&lt;/LI&gt;&lt;LI&gt;Ethernet2 (Or whichever interface is configured as the Check Point VPN interface)&lt;/LI&gt;&lt;LI&gt;IPv4 &amp;gt; Properties&lt;/LI&gt;&lt;LI&gt;Advanced &amp;gt; Interface Metric&lt;/LI&gt;&lt;/UL&gt;</description>
      <pubDate>Fri, 08 Jan 2021 11:54:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/E84-20-6108-Remote-Access-VPN-Blade-wrong-DNS-no-traffic-split/m-p/107289#M3845</guid>
      <dc:creator>Paul_Starr</dc:creator>
      <dc:date>2021-01-08T11:54:50Z</dc:date>
    </item>
    <item>
      <title>Re: E84.20.6108 Remote Access VPN-Blade wrong DNS (no traffic split)</title>
      <link>https://community.checkpoint.com/t5/Endpoint/E84-20-6108-Remote-Access-VPN-Blade-wrong-DNS-no-traffic-split/m-p/107293#M3846</link>
      <description>&lt;P&gt;As stated before, Check Point support has a fix for this issue.&lt;/P&gt;
&lt;P&gt;It was identified only after E84.30 was released, so the issue was fixed in E84.40 (will be released soon) and we build a fix for earlier versions.&lt;/P&gt;
&lt;P&gt;the issue is present on E84.20, E84.30 (and possible also on E84.10, need to check).&lt;/P&gt;
&lt;P&gt;to resolve:&lt;/P&gt;
&lt;P&gt;- you can contact support to get a fix for any of the effected version.&lt;/P&gt;
&lt;P&gt;- you can use the latest recommended version - E84.00&lt;/P&gt;
&lt;P&gt;- you can move to E84.40 that will go out soon and already have this fix integrated.&lt;/P&gt;
&lt;P&gt;if you are already on E84.20/30 and need an immediate solution, you can contact our support and they will give you the relevant fix.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 08 Jan 2021 13:04:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Endpoint/E84-20-6108-Remote-Access-VPN-Blade-wrong-DNS-no-traffic-split/m-p/107293#M3846</guid>
      <dc:creator>Lior_Arzi</dc:creator>
      <dc:date>2021-01-08T13:04:01Z</dc:date>
    </item>
  </channel>
</rss>

