<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Routes distribution throught vpn ssl extender in SASE and Remote Access</title>
    <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Routes-distribution-throught-vpn-ssl-extender/m-p/75775#M11422</link>
    <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;I'm not sure if this request has been already done,if so please let me know where I can find it.&lt;/P&gt;&lt;P&gt;Well here is my situation, I've configured a VPN ssl extender and everything is working fine, endpoints are receiving the ip address that I've established but when I type a route print on the endpoint I see that they're receiving some network ranges from my checkpoint and those are the network ranges that the checkpoint has connected. With this said I have two questions:&lt;/P&gt;&lt;P&gt;1- How can I avoid the checkpoint sends those networks to the endpoints?&lt;/P&gt;&lt;P&gt;2- How can I propagate the ip address ranges needed to the endpoint's routing tables ?&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've looking around and I've found nothing,&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm using the SmartConsole R80.20 to configure everything and my checkpoint is 5000 serie.&lt;/P&gt;&lt;P&gt;Any help would be appreciated.&lt;/P&gt;</description>
    <pubDate>Wed, 19 Feb 2020 16:20:44 GMT</pubDate>
    <dc:creator>titoabidan</dc:creator>
    <dc:date>2020-02-19T16:20:44Z</dc:date>
    <item>
      <title>Routes distribution throught vpn ssl extender</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Routes-distribution-throught-vpn-ssl-extender/m-p/75775#M11422</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;I'm not sure if this request has been already done,if so please let me know where I can find it.&lt;/P&gt;&lt;P&gt;Well here is my situation, I've configured a VPN ssl extender and everything is working fine, endpoints are receiving the ip address that I've established but when I type a route print on the endpoint I see that they're receiving some network ranges from my checkpoint and those are the network ranges that the checkpoint has connected. With this said I have two questions:&lt;/P&gt;&lt;P&gt;1- How can I avoid the checkpoint sends those networks to the endpoints?&lt;/P&gt;&lt;P&gt;2- How can I propagate the ip address ranges needed to the endpoint's routing tables ?&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've looking around and I've found nothing,&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm using the SmartConsole R80.20 to configure everything and my checkpoint is 5000 serie.&lt;/P&gt;&lt;P&gt;Any help would be appreciated.&lt;/P&gt;</description>
      <pubDate>Wed, 19 Feb 2020 16:20:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Routes-distribution-throught-vpn-ssl-extender/m-p/75775#M11422</guid>
      <dc:creator>titoabidan</dc:creator>
      <dc:date>2020-02-19T16:20:44Z</dc:date>
    </item>
    <item>
      <title>Re: Routes distribution throught vpn ssl extender</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Routes-distribution-throught-vpn-ssl-extender/m-p/75821#M11423</link>
      <description>The routes sent to the client are a function of the encryption domain you've configured in your gateway object.&lt;BR /&gt;To control that, modify the encryption domain accordingly.&lt;BR /&gt;If you need the encryption domain to contain those networks for site-to-site VPNs, then you will need to use appropriate rules to prevent access to those networks.&lt;BR /&gt;Unfortunately routes for those networks will still show on the client.</description>
      <pubDate>Thu, 20 Feb 2020 05:20:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Routes-distribution-throught-vpn-ssl-extender/m-p/75821#M11423</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-02-20T05:20:01Z</dc:date>
    </item>
    <item>
      <title>Re: Routes distribution throught vpn ssl extender</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Routes-distribution-throught-vpn-ssl-extender/m-p/75911#M11424</link>
      <description>&lt;P&gt;Thank you so much for replying Phoneboy, I'll be checking that out and see how that works.&lt;/P&gt;</description>
      <pubDate>Thu, 20 Feb 2020 15:44:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Routes-distribution-throught-vpn-ssl-extender/m-p/75911#M11424</guid>
      <dc:creator>titoabidan</dc:creator>
      <dc:date>2020-02-20T15:44:07Z</dc:date>
    </item>
    <item>
      <title>Re: Routes distribution throught vpn ssl extender</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Routes-distribution-throught-vpn-ssl-extender/m-p/75932#M11425</link>
      <description>&lt;P&gt;You can have two encryption domains on the gateway, one for the site 2 site VPN and another one for remote access.&lt;/P&gt;
&lt;P&gt;With this extra remote access encryption domain you can define different networks ( shown as routes on the client ) for your ssl extender clients.&lt;/P&gt;
&lt;P&gt;Wolfgang&lt;/P&gt;</description>
      <pubDate>Thu, 20 Feb 2020 19:42:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Routes-distribution-throught-vpn-ssl-extender/m-p/75932#M11425</guid>
      <dc:creator>Wolfgang</dc:creator>
      <dc:date>2020-02-20T19:42:43Z</dc:date>
    </item>
  </channel>
</rss>

