<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: MacOS EPS Standalone Client (VPN client) Block All Incoming Traffic in SASE and Remote Access</title>
    <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/MacOS-EPS-Standalone-Client-VPN-client-Block-All-Incoming/m-p/96084#M10721</link>
    <description>&lt;P&gt;Only the EPS flavor exists for the Mac.&lt;BR /&gt;Check Point Mobile and SecuRemote are not supported on the Mac.&lt;/P&gt;</description>
    <pubDate>Fri, 04 Sep 2020 21:55:44 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2020-09-04T21:55:44Z</dc:date>
    <item>
      <title>MacOS EPS Standalone Client (VPN client) Block All Incoming Traffic</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/MacOS-EPS-Standalone-Client-VPN-client-Block-All-Incoming/m-p/81480#M10715</link>
      <description>&lt;P&gt;Hi everyone in Checkmates&lt;/P&gt;&lt;P&gt;As an engineer of CheckPoint's Partner, I am always interested in latest CheckPoint Software release, and I always use &amp;nbsp;Endpoint Connect VPN (or known as Endpoint Security Standalone VPN Client) to keep connecting with Lab environment in company's network. I am a MacOS user (current OS Catalina, version 10.15.4), after upgrading the client to E82.50, I find that although no firewall policy loaded, after OS loads cpfw.kext (kernel extension), my Mac starts to block all incoming traffic. In fact, after installing new VPN client, my Mac can receive incoming traffic but never sends out any kind of reply ( for example, ping my Mac will get Overtime error ).&lt;/P&gt;&lt;P&gt;Although this issue can be fixed by unload this kernel extension manually, at the same time the VPN client will stop working. And it is Standalone EPS vpn client, so maybe it is hard to manage the default policy brought by cpfw.kext .&lt;/P&gt;&lt;P&gt;As this kind of client meets the requirements of customers who wants VPN function only, I think this behavior is not appropriate.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="截屏2020-04-10 02.24.01.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/5489iE43ED57773BD9B8B/image-size/large?v=v2&amp;amp;px=999" role="button" title="截屏2020-04-10 02.24.01.png" alt="截屏2020-04-10 02.24.01.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="截屏2020-04-10 02.24.25.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/5490iE4CB1E38FECB2A39/image-size/large?v=v2&amp;amp;px=999" role="button" title="截屏2020-04-10 02.24.25.png" alt="截屏2020-04-10 02.24.25.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 09 Apr 2020 18:38:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/MacOS-EPS-Standalone-Client-VPN-client-Block-All-Incoming/m-p/81480#M10715</guid>
      <dc:creator>QixingCao_MTech</dc:creator>
      <dc:date>2020-04-09T18:38:24Z</dc:date>
    </item>
    <item>
      <title>Re: MacOS EPS Standalone Client (VPN client) Block All Incoming Traffic</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/MacOS-EPS-Standalone-Client-VPN-client-Block-All-Incoming/m-p/81506#M10716</link>
      <description>The Mac VPN client is intended—and licensed—as a full Endpoint client.&lt;BR /&gt;This Desktop Firewall is a mandatory component of this that cannot be removed.&lt;BR /&gt;You can configure this firewall either in SmartEndpoint or in SmartConsole.</description>
      <pubDate>Fri, 10 Apr 2020 04:36:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/MacOS-EPS-Standalone-Client-VPN-client-Block-All-Incoming/m-p/81506#M10716</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-04-10T04:36:14Z</dc:date>
    </item>
    <item>
      <title>Re: MacOS EPS Standalone Client (VPN client) Block All Incoming Traffic</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/MacOS-EPS-Standalone-Client-VPN-client-Block-All-Incoming/m-p/90620#M10717</link>
      <description>&lt;P&gt;Just to add to this answer, you can configure the state of the Endpoint firewall for all users in Global Properties.&lt;BR /&gt;Once the user connects to your gateway, the configuration of this firewall will be updated.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screen Shot 2020-07-05 at 6.40.31 PM.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/7121iABB6263046F8B724/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Screen Shot 2020-07-05 at 6.40.31 PM.png" alt="Screen Shot 2020-07-05 at 6.40.31 PM.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt; &lt;/P&gt;
&lt;P&gt;If you want something more granular than what's listed here, you will need to configure a Desktop Firewall policy.&lt;BR /&gt;This can be enabled by ticking the "Policy Server" option in your gateway object, then a Desktop Firewall policy can be added to an existing policy package and created as desired.&lt;/P&gt;</description>
      <pubDate>Mon, 06 Jul 2020 01:49:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/MacOS-EPS-Standalone-Client-VPN-client-Block-All-Incoming/m-p/90620#M10717</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-07-06T01:49:44Z</dc:date>
    </item>
    <item>
      <title>Re: MacOS EPS Standalone Client (VPN client) Block All Incoming Traffic</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/MacOS-EPS-Standalone-Client-VPN-client-Block-All-Incoming/m-p/95995#M10718</link>
      <description>&lt;P&gt;This is not a "solution" - it is a work around that ignores a more general problem. As a consultant, I work with numerous clients. One of my clients needed me to install Checkpoint VPN to work on their network. Unfortunately, after installing the VPN client, my MacBook Pro no longer allows incoming connections... no matter if the VPN is connected. This is problematic for me in needing to work with other clients, and even on my home network. I can understand the VPN client having control over how my computer connects to local networks when connected to the VPN. However, once the VPN client is shut down locally, it should no longer have any control over my local machine's network connectivity. The VPN client is not being used purely by road warriors... and those of us who have machines not owned by the companies that run the VPN servers should not be impacted by the VPN client when we are not connected. Now my only options are to, apparently, ask my client to create a separate security policy in their VPN just for me, or for me to unload a kernel extension when I want to have control of my computer? The UX here is pretty weak.&lt;/P&gt;</description>
      <pubDate>Thu, 03 Sep 2020 15:17:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/MacOS-EPS-Standalone-Client-VPN-client-Block-All-Incoming/m-p/95995#M10718</guid>
      <dc:creator>NFlourish</dc:creator>
      <dc:date>2020-09-03T15:17:07Z</dc:date>
    </item>
    <item>
      <title>Re: MacOS EPS Standalone Client (VPN client) Block All Incoming Traffic</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/MacOS-EPS-Standalone-Client-VPN-client-Block-All-Incoming/m-p/96011#M10719</link>
      <description>&lt;P&gt;The other option is to use the SNX client which does not have a desktop firewall component.&lt;BR /&gt;You can try to download a version of the client from here and use it against the relevant gateway:&amp;nbsp;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk90240" target="_blank"&gt;https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk90240&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 04 Sep 2020 04:11:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/MacOS-EPS-Standalone-Client-VPN-client-Block-All-Incoming/m-p/96011#M10719</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-09-04T04:11:02Z</dc:date>
    </item>
    <item>
      <title>Re: MacOS EPS Standalone Client (VPN client) Block All Incoming Traffic</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/MacOS-EPS-Standalone-Client-VPN-client-Block-All-Incoming/m-p/96031#M10720</link>
      <description>&lt;P&gt;Checkpoint VPN client can be installed from the same installer package in 3 different &lt;A href="https://community.checkpoint.com/t5/Remote-Access-VPN/Changing-the-Standalone-Remote-Access-Client-flavor/m-p/39494?search-action-id=17347135502&amp;amp;search-result-uid=39494" target="_self"&gt;flavours&lt;/A&gt;:&lt;/P&gt;
&lt;P&gt;EPS VPN including Desktop Firewall (the version used in the posts above)&lt;/P&gt;
&lt;P&gt;Mobile VPN (no Desktop Firewall)&lt;/P&gt;
&lt;P&gt;SecuRemote (no Desktop Firewall, no Office mode)&lt;/P&gt;</description>
      <pubDate>Fri, 04 Sep 2020 07:35:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/MacOS-EPS-Standalone-Client-VPN-client-Block-All-Incoming/m-p/96031#M10720</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2020-09-04T07:35:33Z</dc:date>
    </item>
    <item>
      <title>Re: MacOS EPS Standalone Client (VPN client) Block All Incoming Traffic</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/MacOS-EPS-Standalone-Client-VPN-client-Block-All-Incoming/m-p/96084#M10721</link>
      <description>&lt;P&gt;Only the EPS flavor exists for the Mac.&lt;BR /&gt;Check Point Mobile and SecuRemote are not supported on the Mac.&lt;/P&gt;</description>
      <pubDate>Fri, 04 Sep 2020 21:55:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/MacOS-EPS-Standalone-Client-VPN-client-Block-All-Incoming/m-p/96084#M10721</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-09-04T21:55:44Z</dc:date>
    </item>
    <item>
      <title>Re: MacOS EPS Standalone Client (VPN client) Block All Incoming Traffic</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/MacOS-EPS-Standalone-Client-VPN-client-Block-All-Incoming/m-p/108079#M10722</link>
      <description>&lt;P&gt;We encountered the same problem. The solution in the picture is not working, as it only applies to the mobile client and will not work with the (MacOS) Enpoint Security client&lt;/P&gt;&lt;P&gt;We also tried using the conf/trac_client_1.ttm to change this behavior with no success. While we could set the client to a "firewall off" state and other things, incoming connections were still being dropped.&lt;/P&gt;&lt;P&gt;The only solution that was working was the Desktop Firewall route, which is kind of unsatisfying as we only need it to replicate the behavior of mobile VPN for MacOS clients.&lt;/P&gt;</description>
      <pubDate>Mon, 18 Jan 2021 10:41:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/MacOS-EPS-Standalone-Client-VPN-client-Block-All-Incoming/m-p/108079#M10722</guid>
      <dc:creator>Christoph</dc:creator>
      <dc:date>2021-01-18T10:41:28Z</dc:date>
    </item>
    <item>
      <title>Re: MacOS EPS Standalone Client (VPN client) Block All Incoming Traffic</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/MacOS-EPS-Standalone-Client-VPN-client-Block-All-Incoming/m-p/122414#M10723</link>
      <description>&lt;P&gt;As a workaround for this, I built an Automator action that runs a short shell script to toggle the processes that are blocking the connections. The script was lifted from SuperUser.com, but at least building it into an Automator workflow was my idea. The content of the script (which needs to be directed to &lt;STRONG&gt;stdin&lt;/STRONG&gt;) in Automator is:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-SPOILER&gt;&lt;P class="lia-indent-padding-left-30px"&gt;&lt;FONT face="courier new,courier"&gt;#!/bin/bash&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;#&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;# The reason of creating this script is that Endpoint Security VPN installs it's own application firewall kext cpfw.kext&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;# which prevents for example PPTP connections from this computer, which is not appropriate if you need subj connection just&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;# from time to time&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;#&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;# Usage: ./checkpoint.sh&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;#&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;# The script checks if Enpoint Security VPN is running. If it is, then it shuts it down, if it is not, it fires it up.&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;# Or, make an Automator action and paste the script.&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;# You will need sudo power, of course&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;#&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;# To prevent Endpoint Security VPN from starting automatically whenever you restart your Mac, edit this file:&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;# `/Library/LaunchAgents/com.checkpoint.eps.gui.plist`&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;# And change the values of `RunAtLoad` and `KeepAlive` to `false`&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;# [Source](&lt;A href="https://superuser.com/questions/885273" target="_blank"&gt;https://superuser.com/questions/885273&lt;/A&gt;)&lt;/FONT&gt;&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;&lt;FONT face="courier new,courier"&gt;# SERVICE='Endpoint_Security_VPN'&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;SERVICE='Endpoint_Security_VPN'&lt;/FONT&gt;&lt;/P&gt;&lt;P class="lia-indent-padding-left-30px"&gt;&lt;FONT face="courier new,courier"&gt;if pgrep $SERVICE &amp;gt; /dev/null&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;then&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;# $SERVICE is running. Shut it down&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;sudo launchctl unload /Library/LaunchDaemons/com.checkpoint.epc.service.plist&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;sudo kextunload /Library/Extensions/cpfw.kext&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;killall $SERVICE&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;else&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;# $SERVICE is not running. Fire it up&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;sudo launchctl load /Library/LaunchDaemons/com.checkpoint.epc.service.plist&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;sudo kextload /Library/Extensions/cpfw.kext&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;open '/Applications/Endpoint Security VPN.app'&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;fi&lt;/FONT&gt;&amp;nbsp;&lt;/P&gt;&lt;/LI-SPOILER&gt;&lt;P&gt;Also, to get this to work, you will need to (one time only) manually edit&amp;nbsp;&lt;SPAN&gt;&lt;FONT face="courier new,courier"&gt;/Library/LaunchAgents/com.checkpoint.eps.gui.plist&lt;/FONT&gt; and&lt;FONT face="courier new,courier"&gt;&amp;nbsp;/Library/LaunchAgents/com.checkpoint.eps.gui.plist&lt;/FONT&gt; to set the key &lt;FONT face="courier new,courier"&gt;RunAtLoad&lt;/FONT&gt; to &lt;STRONG&gt;&lt;FONT face="courier new,courier"&gt;off.&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;The above will also disable Endpoint Security from bringing up a login dialog after every startup even if that is controlled by a policy. So, from an ethical standpoint, this only be used on a personally-owned computer, I think. However, it will, once again, allow me to smb and vnc in from other computers on my home network.&lt;/P&gt;&lt;P&gt;Ric&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 28 Jun 2021 21:08:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/MacOS-EPS-Standalone-Client-VPN-client-Block-All-Incoming/m-p/122414#M10723</guid>
      <dc:creator>RicPCC</dc:creator>
      <dc:date>2021-06-28T21:08:13Z</dc:date>
    </item>
    <item>
      <title>Re: MacOS EPS Standalone Client (VPN client) Block All Incoming Traffic</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/MacOS-EPS-Standalone-Client-VPN-client-Block-All-Incoming/m-p/132986#M10724</link>
      <description>&lt;P&gt;Hi, Any quick way to do it on R81.10?&lt;/P&gt;</description>
      <pubDate>Mon, 01 Nov 2021 05:51:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/MacOS-EPS-Standalone-Client-VPN-client-Block-All-Incoming/m-p/132986#M10724</guid>
      <dc:creator>Mustang</dc:creator>
      <dc:date>2021-11-01T05:51:55Z</dc:date>
    </item>
    <item>
      <title>Re: MacOS EPS Standalone Client (VPN client) Block All Incoming Traffic</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/MacOS-EPS-Standalone-Client-VPN-client-Block-All-Incoming/m-p/132987#M10725</link>
      <description>&lt;P&gt;Believe it's the same procedure in R81.10.&lt;/P&gt;</description>
      <pubDate>Mon, 01 Nov 2021 06:04:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/MacOS-EPS-Standalone-Client-VPN-client-Block-All-Incoming/m-p/132987#M10725</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-11-01T06:04:03Z</dc:date>
    </item>
    <item>
      <title>Re: MacOS EPS Standalone Client (VPN client) Block All Incoming Traffic</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/MacOS-EPS-Standalone-Client-VPN-client-Block-All-Incoming/m-p/132989#M10726</link>
      <description>&lt;P&gt;Actually, I've tried it on 81.10 and it seems to lack the whole "Security Setting" section.&lt;/P&gt;
&lt;DIV id="tinyMceEditor_ef86611a047e8aOr_Hazut_1" class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV id="tinyMceEditor_ef86611a047e8aOr_Hazut_2" class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 01 Nov 2021 06:08:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/MacOS-EPS-Standalone-Client-VPN-client-Block-All-Incoming/m-p/132989#M10726</guid>
      <dc:creator>Mustang</dc:creator>
      <dc:date>2021-11-01T06:08:39Z</dc:date>
    </item>
    <item>
      <title>Re: MacOS EPS Standalone Client (VPN client) Block All Incoming Traffic</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/MacOS-EPS-Standalone-Client-VPN-client-Block-All-Incoming/m-p/132991#M10727</link>
      <description>&lt;P&gt;The section is there, but it's missing the Enable Firewall Policy option.&lt;BR /&gt;Possible that option is configured somewhere else now.&lt;/P&gt;</description>
      <pubDate>Mon, 01 Nov 2021 06:29:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/MacOS-EPS-Standalone-Client-VPN-client-Block-All-Incoming/m-p/132991#M10727</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-11-01T06:29:01Z</dc:date>
    </item>
  </channel>
</rss>

