<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Split tunnel to Microsoft Office 365 / YouTube / or other services based on FQDNs in SASE and Remote Access</title>
    <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Split-tunnel-to-Microsoft-Office-365-YouTube-or-other-services/m-p/80083#M10947</link>
    <description>My opinion: it's better to do whatever kind of filtering/logging you wish to do on the traffic at the client rather than route everything back to a central point to do it.&lt;BR /&gt;That will provide better protection/visibility in the long run.&lt;BR /&gt;&lt;BR /&gt;I believe this is something we are working on as part of SandBlast Agent.</description>
    <pubDate>Sat, 28 Mar 2020 21:24:11 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2020-03-28T21:24:11Z</dc:date>
    <item>
      <title>Split tunnel to Microsoft Office 365 / YouTube / or other services based on FQDNs</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Split-tunnel-to-Microsoft-Office-365-YouTube-or-other-services/m-p/80040#M10942</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;Is it actually possible to configure VPN RA in the default mode (split tunnel) but adding to the unsecured way the cloud services or anything else based on FQDN?&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am thinking of the R80.30 actually. I see Cisco called it Dynamic Split Tunneling and it seems it is something handled from their side.&amp;nbsp; Is Checkpoint able to do the same in this moment?&lt;/P&gt;&lt;P&gt;Thanks to anybody for the feed backs in advance.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;A&amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 28 Mar 2020 01:14:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Split-tunnel-to-Microsoft-Office-365-YouTube-or-other-services/m-p/80040#M10942</guid>
      <dc:creator>Sky</dc:creator>
      <dc:date>2020-03-28T01:14:46Z</dc:date>
    </item>
    <item>
      <title>Re: Split tunnel to Microsoft Office 365 / YouTube / or other services based on FQDNs</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Split-tunnel-to-Microsoft-Office-365-YouTube-or-other-services/m-p/80063#M10943</link>
      <description>&lt;P&gt;Perhaps I am not reading your question right, but this is what should be happening by default:&lt;/P&gt;
&lt;P&gt;When split tunnel is enabled, all traffic NOT addressed to the "&lt;SPAN class="st"&gt;&lt;EM&gt;Remote Access encryption domain" gateway's object&amp;nbsp;&lt;/EM&gt;&lt;/SPAN&gt; properties should go via "Unsecured" channel regardless, so there is no need to define the O365, Youtube, etc. Dynamic objects for RA VPN policy.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 28 Mar 2020 13:43:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Split-tunnel-to-Microsoft-Office-365-YouTube-or-other-services/m-p/80063#M10943</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2020-03-28T13:43:25Z</dc:date>
    </item>
    <item>
      <title>Re: Split tunnel to Microsoft Office 365 / YouTube / or other services based on FQDNs</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Split-tunnel-to-Microsoft-Office-365-YouTube-or-other-services/m-p/80064#M10944</link>
      <description>&lt;P&gt;Thank you Vladimir for your reply.&lt;BR /&gt;Actually I might have not expressed myself clear.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I will try the other way around, I need to pass all traffic to the GW except for the cloud based and intensive bandwidth (YouTube and similar services). Since the IP addresses changes for those services, would be great to use domains (FQDN).&lt;/P&gt;&lt;P&gt;Cisco has Dynamic Split Tunneling using FQDN as an attribute. Does checkpoint has something similar in this moment or if not, do they have this on their road-map anytime soon?&lt;/P&gt;&lt;P&gt;Sorry for the confusing first post, I hope this is more clear on what the achievement is.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards!&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 28 Mar 2020 14:13:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Split-tunnel-to-Microsoft-Office-365-YouTube-or-other-services/m-p/80064#M10944</guid>
      <dc:creator>Sky</dc:creator>
      <dc:date>2020-03-28T14:13:45Z</dc:date>
    </item>
    <item>
      <title>Re: Split tunnel to Microsoft Office 365 / YouTube / or other services based on FQDNs</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Split-tunnel-to-Microsoft-Office-365-YouTube-or-other-services/m-p/80072#M10945</link>
      <description>I think what you're trying to do is "route all traffic" over VPN but not for things like O365.&lt;BR /&gt;The encryption domain (what controls what is sent over the VPN) is fixed and doesn't support things like Updatable Objects or definition by FQDN.&lt;BR /&gt;I recommend engaging with your local Check Point office regarding this.</description>
      <pubDate>Sat, 28 Mar 2020 19:36:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Split-tunnel-to-Microsoft-Office-365-YouTube-or-other-services/m-p/80072#M10945</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-03-28T19:36:48Z</dc:date>
    </item>
    <item>
      <title>Re: Split tunnel to Microsoft Office 365 / YouTube / or other services based on FQDNs</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Split-tunnel-to-Microsoft-Office-365-YouTube-or-other-services/m-p/80081#M10946</link>
      <description>&lt;P&gt;I had similar question too. Looking at some old thread:&lt;BR /&gt;&lt;A href="https://community.checkpoint.com/t5/Remote-Access-Solutions/Split-Tunnel/td-p/34675" target="_blank"&gt;https://community.checkpoint.com/t5/Remote-Access-Solutions/Split-Tunnel/td-p/34675&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I guess Check Point setting is to enabled split tunneling by choosing not to route all traffic to gateway. Then define which specific traffic need to be in the tunnel? (Thus, excluding other traffic such as Offie365....etc?)&lt;/P&gt;</description>
      <pubDate>Sat, 28 Mar 2020 20:36:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Split-tunnel-to-Microsoft-Office-365-YouTube-or-other-services/m-p/80081#M10946</guid>
      <dc:creator>Cyber_Serge</dc:creator>
      <dc:date>2020-03-28T20:36:07Z</dc:date>
    </item>
    <item>
      <title>Re: Split tunnel to Microsoft Office 365 / YouTube / or other services based on FQDNs</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Split-tunnel-to-Microsoft-Office-365-YouTube-or-other-services/m-p/80083#M10947</link>
      <description>My opinion: it's better to do whatever kind of filtering/logging you wish to do on the traffic at the client rather than route everything back to a central point to do it.&lt;BR /&gt;That will provide better protection/visibility in the long run.&lt;BR /&gt;&lt;BR /&gt;I believe this is something we are working on as part of SandBlast Agent.</description>
      <pubDate>Sat, 28 Mar 2020 21:24:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Split-tunnel-to-Microsoft-Office-365-YouTube-or-other-services/m-p/80083#M10947</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-03-28T21:24:11Z</dc:date>
    </item>
  </channel>
</rss>

