<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: VPN - Limit specific vendors to specific IPs on Checkpoint Vpn in SASE and Remote Access</title>
    <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/VPN-Limit-specific-vendors-to-specific-IPs-on-Checkpoint-Vpn/m-p/91254#M10189</link>
    <description>&lt;P&gt;Thanks for the response. I'm going to spell this out a bit as I don't see any step by steps for the new folks to checkpoint. If you have a specific vendor that VPNs into your network and has to connect to a specific IP or host on your network, this is what you do...or the way I did it.&lt;/P&gt;&lt;P&gt;1. To keep my AD clean, I created a single OU for vendors in AD. Then later referenced that single OU and the applicable vendor IDs in my CP object creation in the following steps.&lt;/P&gt;&lt;P&gt;2. Create the Vendor account in the OU that you created in step 1&lt;/P&gt;&lt;P&gt;3. Create the objects for the vendor, the network or hosts that the vendor needs to connect to in Checkpoint. **When creating the object for the vendor in CP, you will need the full Distinguished name.**&lt;/P&gt;&lt;P&gt;4. Our VPN subnet for CP is housed in the firewalls, so I added the vendor account to the group authorized to access the VPN subnet.&lt;/P&gt;&lt;P&gt;5. Created a rule that allowed our vendor, which has was added to the VPN subnet, as the source.&lt;/P&gt;&lt;P&gt;6. I added the IP address / host name that the vendor was trying to access as the destination. When adding the Host name of the destination, I had to add the primary/secondary DC (dns) to the destination or it would not allow access by host name.&lt;/P&gt;&lt;P&gt;7. Specify any specific protocols required for the connection,&lt;/P&gt;&lt;P&gt;8. Set CP to accept and log.&lt;/P&gt;&lt;P&gt;9. Install &amp;amp; Publish&lt;/P&gt;&lt;P&gt;10. Test&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sun, 12 Jul 2020 13:30:01 GMT</pubDate>
    <dc:creator>seanmc12</dc:creator>
    <dc:date>2020-07-12T13:30:01Z</dc:date>
    <item>
      <title>VPN - Limit specific vendors to specific IPs on Checkpoint Vpn</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/VPN-Limit-specific-vendors-to-specific-IPs-on-Checkpoint-Vpn/m-p/90697#M10185</link>
      <description>&lt;P&gt;We just implemented Checkpoint VPN. We have several vendors that have access to specific systems. When they use CP VPN, is there a way to limit their access to specific IP addresses based on their user group?&lt;/P&gt;</description>
      <pubDate>Mon, 06 Jul 2020 16:06:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/VPN-Limit-specific-vendors-to-specific-IPs-on-Checkpoint-Vpn/m-p/90697#M10185</guid>
      <dc:creator>seanmc12</dc:creator>
      <dc:date>2020-07-06T16:06:46Z</dc:date>
    </item>
    <item>
      <title>Re: VPN - Limit specific vendors to specific IPs on Checkpoint Vpn</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/VPN-Limit-specific-vendors-to-specific-IPs-on-Checkpoint-Vpn/m-p/90849#M10186</link>
      <description>&lt;P&gt;Do you use site-to-site or client-to-site VPN?&lt;/P&gt;&lt;P&gt;If client-to-site, do you use local users or AD/LDAP?&lt;/P&gt;</description>
      <pubDate>Wed, 08 Jul 2020 07:15:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/VPN-Limit-specific-vendors-to-specific-IPs-on-Checkpoint-Vpn/m-p/90849#M10186</guid>
      <dc:creator>MarioB_1</dc:creator>
      <dc:date>2020-07-08T07:15:25Z</dc:date>
    </item>
    <item>
      <title>Re: VPN - Limit specific vendors to specific IPs on Checkpoint Vpn</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/VPN-Limit-specific-vendors-to-specific-IPs-on-Checkpoint-Vpn/m-p/90886#M10187</link>
      <description>&lt;P&gt;We have client to site via CP Mobile and have LDAP groups setup currently for the main office users who need to connect remotely.&lt;/P&gt;</description>
      <pubDate>Wed, 08 Jul 2020 12:16:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/VPN-Limit-specific-vendors-to-specific-IPs-on-Checkpoint-Vpn/m-p/90886#M10187</guid>
      <dc:creator>seanmc12</dc:creator>
      <dc:date>2020-07-08T12:16:41Z</dc:date>
    </item>
    <item>
      <title>Re: VPN - Limit specific vendors to specific IPs on Checkpoint Vpn</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/VPN-Limit-specific-vendors-to-specific-IPs-on-Checkpoint-Vpn/m-p/91220#M10188</link>
      <description>It comes down to how you are determining what groups these users belong to.&lt;BR /&gt;Assuming it's AD as you suggest below, then yes, you can create an Access Role for the relevant user groups and set up the appropriate access policy rules.</description>
      <pubDate>Sun, 12 Jul 2020 05:42:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/VPN-Limit-specific-vendors-to-specific-IPs-on-Checkpoint-Vpn/m-p/91220#M10188</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-07-12T05:42:05Z</dc:date>
    </item>
    <item>
      <title>Re: VPN - Limit specific vendors to specific IPs on Checkpoint Vpn</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/VPN-Limit-specific-vendors-to-specific-IPs-on-Checkpoint-Vpn/m-p/91254#M10189</link>
      <description>&lt;P&gt;Thanks for the response. I'm going to spell this out a bit as I don't see any step by steps for the new folks to checkpoint. If you have a specific vendor that VPNs into your network and has to connect to a specific IP or host on your network, this is what you do...or the way I did it.&lt;/P&gt;&lt;P&gt;1. To keep my AD clean, I created a single OU for vendors in AD. Then later referenced that single OU and the applicable vendor IDs in my CP object creation in the following steps.&lt;/P&gt;&lt;P&gt;2. Create the Vendor account in the OU that you created in step 1&lt;/P&gt;&lt;P&gt;3. Create the objects for the vendor, the network or hosts that the vendor needs to connect to in Checkpoint. **When creating the object for the vendor in CP, you will need the full Distinguished name.**&lt;/P&gt;&lt;P&gt;4. Our VPN subnet for CP is housed in the firewalls, so I added the vendor account to the group authorized to access the VPN subnet.&lt;/P&gt;&lt;P&gt;5. Created a rule that allowed our vendor, which has was added to the VPN subnet, as the source.&lt;/P&gt;&lt;P&gt;6. I added the IP address / host name that the vendor was trying to access as the destination. When adding the Host name of the destination, I had to add the primary/secondary DC (dns) to the destination or it would not allow access by host name.&lt;/P&gt;&lt;P&gt;7. Specify any specific protocols required for the connection,&lt;/P&gt;&lt;P&gt;8. Set CP to accept and log.&lt;/P&gt;&lt;P&gt;9. Install &amp;amp; Publish&lt;/P&gt;&lt;P&gt;10. Test&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 12 Jul 2020 13:30:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/VPN-Limit-specific-vendors-to-specific-IPs-on-Checkpoint-Vpn/m-p/91254#M10189</guid>
      <dc:creator>seanmc12</dc:creator>
      <dc:date>2020-07-12T13:30:01Z</dc:date>
    </item>
    <item>
      <title>Re: VPN - Limit specific vendors to specific IPs on Checkpoint Vpn</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/VPN-Limit-specific-vendors-to-specific-IPs-on-Checkpoint-Vpn/m-p/178146#M10190</link>
      <description>&lt;P&gt;I am in the same boat. I was just fixing to post this question. I have about 40 different vendors that have access to different proprietary systems. From what I found, you have to setup a rule for each different vendor with the information you provided above. I was hoping their would be an easier way to do it. Is there any issue with have a ton of rules? How much does that affect the processing of data?&lt;/P&gt;</description>
      <pubDate>Sat, 15 Apr 2023 13:05:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/VPN-Limit-specific-vendors-to-specific-IPs-on-Checkpoint-Vpn/m-p/178146#M10190</guid>
      <dc:creator>seanmc12</dc:creator>
      <dc:date>2023-04-15T13:05:19Z</dc:date>
    </item>
    <item>
      <title>Re: VPN - Limit specific vendors to specific IPs on Checkpoint Vpn</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/VPN-Limit-specific-vendors-to-specific-IPs-on-Checkpoint-Vpn/m-p/178270#M10191</link>
      <description>&lt;P&gt;This sort of configuration is required to ensure only the relevant vendor(s) can access the relevant systems.&lt;/P&gt;
&lt;P&gt;While the number of rules may have been an issue in R77.x and earlier releases, it s less relevant in R8x due to how the rulebase matching works (column-based).&lt;BR /&gt;The fact you can put all "vendor" rules in their own inline layer also helps substantially in terms of the processing and manageability of these rules.&lt;/P&gt;</description>
      <pubDate>Mon, 17 Apr 2023 16:44:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/VPN-Limit-specific-vendors-to-specific-IPs-on-Checkpoint-Vpn/m-p/178270#M10191</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2023-04-17T16:44:06Z</dc:date>
    </item>
  </channel>
</rss>

