<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Remote access without visitor mode enabled? in SASE and Remote Access</title>
    <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-access-without-visitor-mode-enabled/m-p/103205#M11322</link>
    <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/5758"&gt;@Garrett_DirSec&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Firstly, dont reset SIC.&lt;/P&gt;&lt;P&gt;SIC has nothing to do with your issues here, and talk re. cleaning up the ICA is irrelevant.&lt;/P&gt;&lt;P&gt;So - ignore that. If your SIC communication is established and working fine, then leave it &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I suspect you may have VPN configuration changes then, hence the reason why its connecting over 443.&lt;/P&gt;&lt;P&gt;Some settings and features change from 77.30 to 80.40.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Have you seen my post above?&lt;/P&gt;&lt;P&gt;Please can you check through those 5 steps and report back? These ALL need to be adhered to in order to restrict visitor mode.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If all of these check out fine, and you are still seeing issues, then I fully agree with&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/7"&gt;@PhoneBoy&lt;/a&gt;&amp;nbsp;about engaging TAC.&lt;/P&gt;&lt;P&gt;I just don't want TAC to turn around and ask you to check similar parameters as to what we have said above! &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 24 Nov 2020 23:15:16 GMT</pubDate>
    <dc:creator>JackPrendergast</dc:creator>
    <dc:date>2020-11-24T23:15:16Z</dc:date>
    <item>
      <title>Remote access without visitor mode enabled?</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-access-without-visitor-mode-enabled/m-p/77398#M11303</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;What options do I have to configure remote access without enabling Visitor Mode?&amp;nbsp;&lt;/P&gt;&lt;P&gt;Following the Remote Access VPN guide looks like it's mandatory as it's specified in the basic gateway configuration. It's not clear to me how you can set it up without it.&lt;/P&gt;&lt;P&gt;However, this feature opens ports 80, 443 and 264 TCP to the Internet. Why are all of them necessary and how could I restrict them?&lt;/P&gt;&lt;P&gt;Which VPN client can connect to the gateway when visitor mode is disabled?&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;George&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 06 Mar 2020 07:05:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-access-without-visitor-mode-enabled/m-p/77398#M11303</guid>
      <dc:creator>George_Dumitru</dc:creator>
      <dc:date>2020-03-06T07:05:30Z</dc:date>
    </item>
    <item>
      <title>Re: Remote access without visitor mode enabled?</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-access-without-visitor-mode-enabled/m-p/77452#M11304</link>
      <description>&lt;P&gt;No, it is not mandatory, see for details&amp;nbsp;&lt;A class="cp_link sc_ellipsis" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk159372&amp;amp;partition=Advanced&amp;amp;product=Endpoint" target="_blank"&gt;sk159372: &lt;STRONG&gt;Visitor&lt;/STRONG&gt; &lt;STRONG&gt;Mode&lt;/STRONG&gt; in Remote Access clients&lt;/A&gt;&amp;nbsp;!&lt;/P&gt;</description>
      <pubDate>Fri, 06 Mar 2020 13:02:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-access-without-visitor-mode-enabled/m-p/77452#M11304</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2020-03-06T13:02:22Z</dc:date>
    </item>
    <item>
      <title>Re: Remote access without visitor mode enabled?</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-access-without-visitor-mode-enabled/m-p/77453#M11305</link>
      <description>&lt;P&gt;It says it's a backup mechanism but with the Mobile Access blade enabled (which is required in order to use Office Mode with IP pool for the Check Point Mobile client) it's by default enabled and greyed out, it cannot be disabled.&lt;/P&gt;&lt;P&gt;If you only have the IPSec VPN blade enabled, without the visitor mode feature, the gateway doesn't answer to connection requests from VPN clients. It actually warns you when disabling it that VPN Clients (except for the old Secure Client) will not be able to connect.&lt;/P&gt;&lt;P&gt;I haven't found a workaround yet.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;George&lt;/P&gt;</description>
      <pubDate>Fri, 06 Mar 2020 13:11:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-access-without-visitor-mode-enabled/m-p/77453#M11305</guid>
      <dc:creator>George_Dumitru</dc:creator>
      <dc:date>2020-03-06T13:11:53Z</dc:date>
    </item>
    <item>
      <title>Re: Remote access without visitor mode enabled?</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-access-without-visitor-mode-enabled/m-p/77454#M11306</link>
      <description>&lt;P&gt;There is a reason that is needed and this is what it is.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The VERY first time you connect to a VPN Gateway with a Client it asks you to trust the VPN Certificate as being from the ICA then is not a Trusted CA.&lt;/P&gt;&lt;P&gt;That connection is made over HTTPS not IPSEC protocols&lt;/P&gt;&lt;P&gt;You will see subsequently when you connect that before the IPSEC tunnel is initiated then the Client makes a HTTPS connection to the Gateway.&lt;/P&gt;&lt;P&gt;The Visitor Mode allows this HTTPS connection to be made.&lt;/P&gt;&lt;P&gt;No response from the HTTPS request and the IPSEC tunnel doesn't attempt instead it says is unreachable etc.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;264 is the fw1_topo port that used for downloading the topology.&lt;/P&gt;&lt;P&gt;You don't know in advance where they are coming from so you have to have open everywhere.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Same as port 500 and proto 50/51 to allow the IPSec Tunnel to build, you don't know the source so has to be open, of course it doesn't stop them being reported by scanners as vulnerabilties but won't work without them being open&lt;/P&gt;</description>
      <pubDate>Fri, 06 Mar 2020 13:25:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-access-without-visitor-mode-enabled/m-p/77454#M11306</guid>
      <dc:creator>mdjmcnally</dc:creator>
      <dc:date>2020-03-06T13:25:06Z</dc:date>
    </item>
    <item>
      <title>Re: Remote access without visitor mode enabled?</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-access-without-visitor-mode-enabled/m-p/77652#M11307</link>
      <description>&lt;P&gt;Hello,&lt;BR /&gt;&lt;BR /&gt;Thanks for the details, this makes sense.&lt;BR /&gt;&lt;BR /&gt;Following this logic, after I connect the first time and create the site, I should be able to subsequently connect from the same device even if visitor mode is disabled.&lt;BR /&gt;&lt;BR /&gt;Is this correct? Should I be able to connect using Office mode after initial trust is established, with visitor mode disabled? This means mobile access blade removed, and only IPSec VPN active in order to be able to disable visitor mode.&lt;/P&gt;</description>
      <pubDate>Mon, 09 Mar 2020 05:56:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-access-without-visitor-mode-enabled/m-p/77652#M11307</guid>
      <dc:creator>George_Dumitru</dc:creator>
      <dc:date>2020-03-09T05:56:30Z</dc:date>
    </item>
    <item>
      <title>Re: Remote access without visitor mode enabled?</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-access-without-visitor-mode-enabled/m-p/77661#M11308</link>
      <description>&lt;P&gt;Unfortunately you will still see the Client make an attempt to connect with HTTPS every time make a connection.&lt;/P&gt;&lt;P&gt;You can probably get rid of Visitor Mode as long as have a rule open to allow HTTPS to the Gateway as an Explicit Rule, which effetively results in the same rule.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Most people will have moved the Gaia Portal off HTTPS 443 to another port so isn't as if that big a deal having HTTPS open on the box as the HTTPS should only be there for the Remote Access at that point.&lt;/P&gt;</description>
      <pubDate>Mon, 09 Mar 2020 07:06:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-access-without-visitor-mode-enabled/m-p/77661#M11308</guid>
      <dc:creator>mdjmcnally</dc:creator>
      <dc:date>2020-03-09T07:06:21Z</dc:date>
    </item>
    <item>
      <title>Re: Remote access without visitor mode enabled?</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-access-without-visitor-mode-enabled/m-p/84482#M11309</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;Has anyone confirmed that RA VPN clients (EndPoint Security VPN) can connect when visitor mode is disabled (providing an explicit HTTPS rule is added to the policy)?&lt;BR /&gt;&lt;BR /&gt;In my environment we have moved the portal to a different port, when visitor mode is on (running on port 443), the "enable_tcpt" implied rule is implemented (this isn't configurable via the normal implied rule area, sk119497 explains this). The clients can configure sites and establish phase 1 / 2 normally. However, when turning visitor mode off, and then having an explicit HTTPS rule in the access policy the client is no longer able to connect or create a site / establish VPN. The observed behaviour suggests there is a service which is enabled when visitor mode is enabled which answers requests from the Endpoint Security VPN clients (or possibly this is additional function of visitor mode?). I understand the requirement for visitor mode (sk159372 explains this perfectly). Interestingly,&amp;nbsp;sk159372 also advises to avoid visitor mode if there is no need for it.&lt;BR /&gt;&lt;BR /&gt;So how come EndPoint Security VPN Clients are unable to connect to the gateway when Visitor mode is disabled and an explicit HTTPS rule is implemented in the access policy?&lt;BR /&gt;&lt;BR /&gt;Is anyone from Check Point able to answer / confirm the above?&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Thanks,&lt;BR /&gt;&lt;BR /&gt;Jon</description>
      <pubDate>Thu, 07 May 2020 16:01:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-access-without-visitor-mode-enabled/m-p/84482#M11309</guid>
      <dc:creator>Jonathan_Griffi</dc:creator>
      <dc:date>2020-05-07T16:01:44Z</dc:date>
    </item>
    <item>
      <title>Re: Remote access without visitor mode enabled?</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-access-without-visitor-mode-enabled/m-p/84486#M11310</link>
      <description>&lt;P&gt;My guess would be that disabling Visitor Mode is affecting something in the MultiPortal feature, which arbitrates access to port 443 on the gateway since it is used by so many different features:&lt;/P&gt;
&lt;P&gt;&lt;A class="cp_link sc_ellipsis" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk155512&amp;amp;partition=Advanced&amp;amp;product=Management" target="_blank"&gt;sk155512: How to determine which portal is causing &lt;STRONG&gt;MultiPortal&lt;/STRONG&gt; to respond on external interface&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 07 May 2020 16:55:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-access-without-visitor-mode-enabled/m-p/84486#M11310</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2020-05-07T16:55:10Z</dc:date>
    </item>
    <item>
      <title>Re: Remote access without visitor mode enabled?</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-access-without-visitor-mode-enabled/m-p/84496#M11311</link>
      <description>&lt;P&gt;VPND process is listening on port 443 and Endpoint Security VPN always uses this port to negotiate tunnel. That kind of requires Visitor Mode to be enabled if you want to use this client or capsule.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 07 May 2020 18:21:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-access-without-visitor-mode-enabled/m-p/84496#M11311</guid>
      <dc:creator>HristoGrigorov</dc:creator>
      <dc:date>2020-05-07T18:21:08Z</dc:date>
    </item>
    <item>
      <title>Re: Remote access without visitor mode enabled?</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-access-without-visitor-mode-enabled/m-p/84572#M11312</link>
      <description>&lt;P&gt;Thanks&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/597"&gt;@Timothy_Hall&lt;/a&gt;&amp;nbsp;and&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/18680"&gt;@HristoGrigorov&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;You guys helped point me in the right direction.&lt;/P&gt;&lt;P&gt;I did some further reading/testing, It does appear as you say &lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/597"&gt;@Timothy_Hall&lt;/a&gt;&amp;nbsp;, the mpdaemon has a portal called "clients", which is bound to port 444. When visitor mode is disabled, this portal is removed. It would, therefore, seem visitor mode enables the client portal&lt;SPAN&gt;&amp;nbsp;which supports the hand over of the HTTPS (or whatever visitor mode port is chosen) traffic from Endpoint Security Clients (and possibily other remote access clients) to the vpnd process via port 444.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I don't know if the above is 100% accurate, but the behaviour seen would fit that description.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks again,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;</description>
      <pubDate>Fri, 08 May 2020 12:16:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-access-without-visitor-mode-enabled/m-p/84572#M11312</guid>
      <dc:creator>Jonathan_Griffi</dc:creator>
      <dc:date>2020-05-08T12:16:09Z</dc:date>
    </item>
    <item>
      <title>Re: Remote access without visitor mode enabled?</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-access-without-visitor-mode-enabled/m-p/103058#M11313</link>
      <description>&lt;P&gt;Hello Folks -- I'm working with customer who recently upgraded from R77.30 to R80.40.&amp;nbsp;&amp;nbsp;&amp;nbsp; Part of upgrade includes having to enable Visitor Mode on VPN setup -- in addition to explicitly allowing port 80 (in addition to 443).&amp;nbsp;&amp;nbsp;&amp;nbsp; Their remote-access VPN under R77.30 did not require http/80 or visitor mode and customer feels turning on all additional features -- and opening up ports (especially tcp/80) -- increases complexity and necessarily increases security risk (his words).&lt;/P&gt;&lt;P&gt;reference scenario #8 on following:&lt;/P&gt;&lt;P&gt;Troubleshooting "site is not responding" Issues&lt;/P&gt;&lt;P&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk128652" target="_blank" rel="noopener"&gt;https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk128652&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What can I tell him?&amp;nbsp;&amp;nbsp; -GA&lt;/P&gt;</description>
      <pubDate>Mon, 23 Nov 2020 22:37:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-access-without-visitor-mode-enabled/m-p/103058#M11313</guid>
      <dc:creator>Garrett_DirSec</dc:creator>
      <dc:date>2020-11-23T22:37:01Z</dc:date>
    </item>
    <item>
      <title>Re: Remote access without visitor mode enabled?</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-access-without-visitor-mode-enabled/m-p/103063#M11314</link>
      <description>&lt;P&gt;The only place where it is required for sure is when you are first defining the site.&lt;BR /&gt;After that, it shouldn't be strictly required.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 23 Nov 2020 22:39:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-access-without-visitor-mode-enabled/m-p/103063#M11314</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-11-23T22:39:18Z</dc:date>
    </item>
    <item>
      <title>Re: Remote access without visitor mode enabled?</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-access-without-visitor-mode-enabled/m-p/103064#M11315</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/7"&gt;@PhoneBoy&lt;/a&gt;&amp;nbsp; -- thanks for quick follow-up.&amp;nbsp; &amp;nbsp; &amp;nbsp;I suggest it's pointless to provide the checkbox implying "optional" for visitor mode.&amp;nbsp; &amp;nbsp;If it's required, then HIDE it in GUI and make it default prefs under the covers (behind the scenes).&amp;nbsp; &amp;nbsp; &amp;nbsp;In other words,&amp;nbsp; why give the option to enable/disable something if it's required with R80.xx remote access VPN?&amp;nbsp; &amp;nbsp;that seems silly.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 23 Nov 2020 22:52:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-access-without-visitor-mode-enabled/m-p/103064#M11315</guid>
      <dc:creator>Garrett_DirSec</dc:creator>
      <dc:date>2020-11-23T22:52:26Z</dc:date>
    </item>
    <item>
      <title>Re: Remote access without visitor mode enabled?</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-access-without-visitor-mode-enabled/m-p/103067#M11316</link>
      <description>&lt;P&gt;It is required even after the site is defined on the client? I don't believe so.&lt;BR /&gt;If it is, it's either a bug OR we need to update the documentation.&lt;/P&gt;
&lt;P&gt;Note if you disable Visitor Mode, then you have to distribute to your users an installer that has the site predefined in it.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 23 Nov 2020 23:36:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-access-without-visitor-mode-enabled/m-p/103067#M11316</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-11-23T23:36:38Z</dc:date>
    </item>
    <item>
      <title>Re: Remote access without visitor mode enabled?</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-access-without-visitor-mode-enabled/m-p/103150#M11317</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/7"&gt;@PhoneBoy&lt;/a&gt;, the customer tested this yesterday and without Visitor Mode enabled, he cannot connect. He enabled it to set up the site initially, successfully connected to the VPN, then disabled Visitor Mode and couldn't connect again.&lt;/P&gt;</description>
      <pubDate>Tue, 24 Nov 2020 15:24:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-access-without-visitor-mode-enabled/m-p/103150#M11317</guid>
      <dc:creator>Eric_Oakeson</dc:creator>
      <dc:date>2020-11-24T15:24:19Z</dc:date>
    </item>
    <item>
      <title>Re: Remote access without visitor mode enabled?</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-access-without-visitor-mode-enabled/m-p/103161#M11318</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/7"&gt;@PhoneBoy&lt;/a&gt;&amp;nbsp; is right. After site creation, it shouldnt be needed.&lt;/P&gt;&lt;P&gt;It depends if the client can reach the firewall on port 4500. If it cant, it will switch to 443.&lt;/P&gt;&lt;P&gt;Is there any local endpoint firewalls blocking 4500?&lt;/P&gt;&lt;P&gt;Any upstream blocking of that port?&lt;/P&gt;&lt;P&gt;To check fully, please follow the below to properly prevent visitor mode being used.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;As I said above, on the client side, check that there is no firewall that blocks 4500. If there is, make sure to allow port 4500.&lt;/LI&gt;&lt;LI&gt;Check that there is no duplicate object that uses the same IP as the IP used in&amp;nbsp;Link selection settings - This is a common reason for visitor mode.&lt;/LI&gt;&lt;LI&gt;Check that the option in&amp;nbsp;IPSec VPN,&amp;nbsp;VPN Advanced, "Support NAT traversal"&amp;nbsp;is enabled.&lt;/LI&gt;&lt;LI&gt;Check that the option&amp;nbsp;VPN Clients,&amp;nbsp;Office Mode, "Support connectivity enhancement for gateways with multiple external interfaces&amp;nbsp;is enabled"&lt;/LI&gt;&lt;LI&gt;Check that the&amp;nbsp;IPSec VPN,&amp;nbsp;VPN Advanced,&amp;nbsp;Link Selection&amp;nbsp;that the correct interface to which the client is connecting is selected.&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Tue, 24 Nov 2020 16:50:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-access-without-visitor-mode-enabled/m-p/103161#M11318</guid>
      <dc:creator>JackPrendergast</dc:creator>
      <dc:date>2020-11-24T16:50:23Z</dc:date>
    </item>
    <item>
      <title>Re: Remote access without visitor mode enabled?</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-access-without-visitor-mode-enabled/m-p/103162#M11319</link>
      <description>&lt;P&gt;Thanks&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/40392"&gt;@JackPrendergast&lt;/a&gt;, I'll check to see if there's anything else blocking 4500, as that should be covered in the implied rules for the gateway itself and isn't blocked that I'm aware of.&lt;/P&gt;</description>
      <pubDate>Tue, 24 Nov 2020 16:54:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-access-without-visitor-mode-enabled/m-p/103162#M11319</guid>
      <dc:creator>Eric_Oakeson</dc:creator>
      <dc:date>2020-11-24T16:54:05Z</dc:date>
    </item>
    <item>
      <title>Re: Remote access without visitor mode enabled?</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-access-without-visitor-mode-enabled/m-p/103167#M11320</link>
      <description>&lt;P&gt;A TAC case might be required here to understand what's going on.&lt;/P&gt;</description>
      <pubDate>Tue, 24 Nov 2020 18:17:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-access-without-visitor-mode-enabled/m-p/103167#M11320</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-11-24T18:17:58Z</dc:date>
    </item>
    <item>
      <title>Re: Remote access without visitor mode enabled?</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-access-without-visitor-mode-enabled/m-p/103172#M11321</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/40392"&gt;@JackPrendergast&lt;/a&gt;&amp;nbsp;and&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/7"&gt;@PhoneBoy&lt;/a&gt;&amp;nbsp;.&amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/P&gt;&lt;P&gt;a little background.&amp;nbsp; &amp;nbsp;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;current customer R80.40 (+HFA) distributed setup recently upgraded from all-in-one R77.30 (_HFA).&amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/LI&gt;&lt;LI&gt;The hostname -- and IP -- of SmartCenter service host has changed.&amp;nbsp; &amp;nbsp;upgrade was done via&amp;nbsp;sk154033 (BELOW).&lt;/LI&gt;&lt;LI&gt;The result dedicated R80.40 SmartCenter has an ICA with DN structure that still references the hostname of original stand-alone smartcenter object.&amp;nbsp; &amp;nbsp; &amp;nbsp;I recall from R77.xx word that changing hostname of SmartCenter required a SIC reset.&amp;nbsp; &amp;nbsp;&lt;/LI&gt;&lt;LI&gt;I recently found newer R80.xx &lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk164055" target="_blank"&gt;sk164055&lt;/A&gt;&amp;nbsp;that details procedure to change smartcenter hostname that does not include SIC reset.&amp;nbsp; &amp;nbsp;&lt;/LI&gt;&lt;LI&gt;It appears that changing IP address of Smartcenter still requires either SIC reset or&amp;nbsp;sk40993 (to update CRL references).&amp;nbsp;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;With previous all-in-alone R77.30 platform, there was NO rules to allow http/80 or https/443 from Public/External.&amp;nbsp; &amp;nbsp; Also, Visitor mode was disabled.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Remote-access VPN worked fine on this R77.30 platform (don't know endpoint product used).&lt;/P&gt;&lt;P&gt;However, with dedicated gateway running R80.40 (recent HFA) -- and Checkpoing MOBILE client E83.xx -- we need both explicit policy allowing (a) tcp/80 and tcp/443,&amp;nbsp; and (b) visitor mode.&lt;/P&gt;&lt;P&gt;Because everything worked FINE with r77.30 platform, I'm hesitant to make many changes (as this also makes customer uncomfortable with perception of relaxing security posture by explicitly allowing direct connect to gateway over tcp/80 (for example).&lt;/P&gt;&lt;P&gt;should we reset SIC on this simple distributed setup to clean-up ICA?&amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thanks -GA&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;How to migrate R80.x standalone management environment to a distributed environment&lt;/P&gt;&lt;P&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk154033" target="_blank"&gt;https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk154033&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Changing R80.x Security Management Server Name&lt;/P&gt;&lt;P&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk164055" target="_blank"&gt;https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk164055&lt;/A&gt;&lt;/P&gt;&lt;P&gt;How to change the IP Address of a Security Management&lt;/P&gt;&lt;P&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk40993" target="_blank"&gt;https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk40993&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 24 Nov 2020 18:36:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-access-without-visitor-mode-enabled/m-p/103172#M11321</guid>
      <dc:creator>Garrett_DirSec</dc:creator>
      <dc:date>2020-11-24T18:36:41Z</dc:date>
    </item>
    <item>
      <title>Re: Remote access without visitor mode enabled?</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-access-without-visitor-mode-enabled/m-p/103205#M11322</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/5758"&gt;@Garrett_DirSec&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Firstly, dont reset SIC.&lt;/P&gt;&lt;P&gt;SIC has nothing to do with your issues here, and talk re. cleaning up the ICA is irrelevant.&lt;/P&gt;&lt;P&gt;So - ignore that. If your SIC communication is established and working fine, then leave it &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I suspect you may have VPN configuration changes then, hence the reason why its connecting over 443.&lt;/P&gt;&lt;P&gt;Some settings and features change from 77.30 to 80.40.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Have you seen my post above?&lt;/P&gt;&lt;P&gt;Please can you check through those 5 steps and report back? These ALL need to be adhered to in order to restrict visitor mode.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If all of these check out fine, and you are still seeing issues, then I fully agree with&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/7"&gt;@PhoneBoy&lt;/a&gt;&amp;nbsp;about engaging TAC.&lt;/P&gt;&lt;P&gt;I just don't want TAC to turn around and ask you to check similar parameters as to what we have said above! &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 24 Nov 2020 23:15:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-access-without-visitor-mode-enabled/m-p/103205#M11322</guid>
      <dc:creator>JackPrendergast</dc:creator>
      <dc:date>2020-11-24T23:15:16Z</dc:date>
    </item>
  </channel>
</rss>

